- Mar 2025
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
SQL/PGQ reduces the difference in functionality between relational DBMSs and native graph DBMSs. Basically, this new feature makes it easier to query data in tables as if it were in a graph database, providing a possibly more intuitive alternative to writing complex join queries.
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
-
en.wikipedia.org en.wikipedia.org
-
-
Temporal databases are in contrast to current databases (not to be confused with currently available databases), which store only facts which are believed to be true at the current time.
-
-
en.wikipedia.org en.wikipedia.org
-
30 seconds
Test
-
-
en.wikipedia.org en.wikipedia.org
-
sweet
@Janrae.Valencia
-
sometimes
@Janrae.Valencia
-
-
en.wikipedia.org en.wikipedia.org
-
Multiple frequency-shift keying MSK as means for HF (shortwave) text transmission as it's robust in the face of noise, weak signals and fading.
-
-
en.wikipedia.org en.wikipedia.org
-
Although core memory is obsolete, computer memory is still sometimes called "core" even though it is made of semiconductors, particularly by people who had worked with machines having actual core memory. The files that result from saving the entire contents of memory to disk for inspection, which is nowadays commonly performed automatically when a major error occurs in a computer program, are still called "core dumps". Algorithms which work on more data than the main memory can fit are likewise called out-of-core algorithms. Algorithms which only work inside the main memory are sometimes called in-core algorithms.
This is how
core dumpcalled in history.
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
Notion (productivity software)

-
-
en.wikipedia.org en.wikipedia.org
-
<br />
Las castas. Casta painting showing 16 racial groupings. Anonymous, 18th century, oil on canvas, 148×104 cm, Museo Nacional del Virreinato, Tepotzotlán, Mexico
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
"The Sun"
This is a test
-
-
en.wikipedia.org en.wikipedia.org
-
CAPTCHAs attempt to rate-limit automated Sybil attacks by using automated Turing tests to distinguish humans from machines creating accounts or requesting services.
reverse turing tests
-
-
en.wikipedia.org en.wikipedia.org
-
Simple Object Access Protocol
yet another abomination
-
-
en.wikipedia.org en.wikipedia.org
-
It is too complicated (the spec is several hundred pages in a very technical language), so it is hard to use by non-experts—but many non-experts need schemas to describe data formats
an abomination
-
-
en.wikipedia.org en.wikipedia.org
-
John Keats used the phrase only briefly in a private letter to his brothers George and Thomas on 22 December 1817, and it became known only after his correspondence was collected and published. Keats described a conversation he had been engaged in a few days previously:[1] I had not a dispute but a disquisition with Dilke, upon various subjects; several things dove-tailed in my mind, and at once it struck me what quality went to form a Man of Achievement, especially in Literature, and which Shakespeare possessed so enormously—I mean Negative Capability, that is, when a man is capable of being in uncertainties, mysteries, doubts, without any irritable reaching after fact and reason—Coleridge, for instance, would let go by a fine isolated verisimilitude caught from the Penetralium of mystery, from being incapable of remaining content with half-knowledge. This pursued through volumes would perhaps take us no further than this, that with a great poet the sense of Beauty overcomes every other consideration, or rather obliterates all consideration.[2]
content with half-knowledge! no uneasiness about first-principles...
-
-
en.wikipedia.org en.wikipedia.org
-
developed from 1964 to 1967[1
nearly 60 years ago!

-
-
en.wikipedia.org en.wikipedia.org
-
grain-oriented so it has a square hysteresis loop and much lower core losses, for better performance in transformers
Wouldn't you not want a hysteresis loop to have a good transformer?
-
-
en.wikipedia.org en.wikipedia.org
-
The generation effect is a phenomenon whereby information is better remembered if it is generated from one's own mind rather than simply read.
-
- Feb 2025
-
en.wikipedia.org en.wikipedia.org
-
The Roswell incident is a conspiracy theory that alleges that debris from a United States Army Air Forces balloon (pictured) recovered in 1947 near Roswell, New Mexico, was part of a crashed extraterrestrial spacecraft. The debris was from the top-secret Project Mogul, which used high-altitude balloons to detect nuclear tests. Roswell Army Air Field personnel, unaware of Mogul, gathered the material
Today wikipedia day
-
-
en.wikipedia.org en.wikipedia.org
-
-
en.wikipedia.org en.wikipedia.org
-
One notable feature of the ThinkPad 770 is that it was the first laptop available with a DVD-ROM[1] option in addition to a USB port and AC-3 support.
thinkpad is weak in this area
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
The Scotch yoke (also known as slotted link mechanism[1]) is a reciprocating motion mechanism, converting the linear motion of a slider into rotational motion, or vice versa.
The piston or other reciprocating part is directly coupled to a sliding yoke with a slot that engages a pin on the rotating part.
-
-
en.wikipedia.org en.wikipedia.org
-
Club of Rome
History #[[Environmentalism]]
-
-
en.wikipedia.org en.wikipedia.org
-
"Information Theory in Ecology"
fr
-
-
en.wikipedia.org en.wikipedia.org
-
Niska's consciousness tests begin and Laura struggles to elicit an emotional response from her
psycho consciousness?
-
-
en.wikipedia.org en.wikipedia.org
-
- Comparison of web annotation systems
- [[Memex]]
- Desktop
- UI looks good
- Live annotations on the site
- Multiple notes on page
- AI integration
- Annotations for videos
- Mobile
- Annotations through the app
- The app seems to keep the integrity of the original content (no content loss)
- Buggy text input widget
- Annotations through the app
- Syncing
- Require Readwise
- Not bi-directional!
- Unmodifiable log-based format
- Require Readwise
- Desktop
- [[Hypothesis]]
- Desktop
- Mobile
- Bookmarklet is a good option to bypass the need for extension
- Proxy is also an option
- Annotations on the original site (no content loss)
- No annota
- Syncing
- Through Readwise
- Nice format
- Full control over frontmatter
- Obsidian plugin
- No control over frontmatter
- Through Readwise
- [[Readwise]]
- Desktop
- UI looks old and unmaintained
- Live annotations on the site
- Multiple annotation on site can only be achieved by highlights
- Only single note per page without highlighting
- Mobile
- Annotations through the app
- Some content is lost when importing to the app
- Text-to-speech
- Annotations through the app
- Syncing
- Through Readwise
- Not bi-directional!
- Cleaner format then memex
- Through Readwise
- Desktop
- [[Memex]]
- Comparison of web annotation systems
-
-
en.wikipedia.org en.wikipedia.org
-
aortic bodies, aortic arch
Inferior ganglion of vagus nerve
IFN, expressed from viral detection response, activates intracellular anti viral mechanism pathways, including OSA > Ribonuclease ANK(ANKH)/pyrophosphate. ANKH (ANKYLOSIS, ie ankylosis spondylosis [autoimmune, macular degeneration, arthritis]) is membrane protein changed regulating pyrophosphate levels intra and extra. Pyrophosphate is an anion from converted ATP and is a CALCIUM AND METAL ION CHELATOR (CA+ SIGNALING DYSFUNCTION). IGVN is a high expression site of ANKH:
- Aortic bodies/arch = happy hypoxia, POTS, tachycardia
- epiglottitis
- ear pain, ringing, pigmentation, facial nerve hives, ocular inflammation
- tonsil swimming, coughing, hoarse
- SOLITARY NUCLEUS = fear response, anxiety, acrophobia
- gasping, nausea
- axial lymph node
- urinary bladder = frequent urination (as common in CFS)
- successful results of ganglion block and vagal stimulation
Google Gemini Clinical Significance: * Damage to the inferior ganglion can result in: * Dysphagia (difficulty swallowing) * Hoarseness * Heart palpitations * Nausea and vomiting * May be involved in certain neurological disorders, such as glossopharyngeal neuralgia and vagus nerve palsy
ANKH Sites (Wikipedia): * IGVN = above * Tibia = shin splints * Parotid = heavy jaw line * Pons = hypersomnia * right ventricle = enlargement/swelling * Skeletal muscle tissue of biceps brachii = my crazy bicep tendon (spondylosis) pain issue * subthalamic nucleus = hypersomnia, anxiety, fear response, gasping, hydrocephalus * synovial joint = juvenile onset arthritis, myopia/astigmatism, macular degeneration, hydrocephalus * superior vestibular nucleus = see above * Skeletal muscle tissue of rectus abdominis = side stitch
IFN/OSA/Ribonuclease:
Destroys all mRNA, viral and host, and prevents cell molecular export and cellular metabolism.
-
-
en.wikipedia.org en.wikipedia.org
-
parotid gland
Heavy jawline
-
tibia
Shin splints
-
-
en.wikipedia.org en.wikipedia.org
-
Why is more important than how
-
Everything is a trade-off
-
Software architecture choices include specific structural options from possibilities in the design of the software.
-
-
en.wikipedia.org en.wikipedia.org
-
The transformation mapping method is applied to exhibit distinct boundaries between incoming and outgoing data. The data flow diagrams allocate control input, processing and output along three separate modules.
-
-
en.wikipedia.org en.wikipedia.org
-
The software design model can be compared to an architected plan for a house. High-level plans represent the totality of the house (e.g., a three-dimensional rendering of the house). Lower-level plans provide guidance for constructing each detail (e.g., the plumbing lay). Similarly, the software design model provides a variety of views of the proposed software solution.
-
including both high-level software architecture and low-level component and algorithm design.
software design is the higher-level/broader/parent concept, which includes: - software architecture: high-level design - algorithm design and other lower-level design
-
-
en.wikipedia.org en.wikipedia.org
-
Cremation dates from at least 17,000 years ago[2][3] in the archaeological record, with the Mungo Lady, the remains of a partly cremated body found at Lake Mungo, Australia.
Seems to be a very common practice in other cultures. some cultures may have practiced cremation longer than the ancient Indians?
-
In the Middle East and Europe, both burial and cremation are evident in the archaeological record in the Neolithic era.
Shows us that it was a widespread practice which dates back to times were religion were more important in the process of the dead.
-
Hinduism and Jainism are notable for not only allowing but prescribing cremation.
Hinduism got some ideals from the Vedic documents.
-
Cremation may serve as a funeral or post-funeral rite and as an alternative to burial. In some countries, including India, Nepal, and Syria, cremation on an open-air pyre is an ancient tradition. Starting in the 19th century, cremation was introduced or reintroduced into other parts of the world.
We have learned a good amount about this in this class.
-
-
en.wikipedia.org en.wikipedia.org
-
Only effect while the token economy is active and no effect once stopped: in this case the token economy is functioning as a prosthesis (like a wheelchair); it does not permanently help the patient once terminated but is necessary to maintain normal functioning;
Consider this. How many people pay for cure and get a prosthetics? Almost all tragedy tells this story.
-
Tokens have no intrinsic value, but can be exchanged for other valued reinforcing events: back-up reinforcers, which act as rewards.
My first thought was crypto currency, but this maps to likes and followers, even money itself. Followers and likes are interesting because they are not single use. £40,000 will get you a nice car, once. But 40,000 followers can get you a brand deal multiple times over. How interesting is that? I guess the trade of is that not everyones followers are equal (some demographics are in more demand than others)
-
Rewarding behavior could increase the extrinsic motivation and at the same time decrease the intrinsic motivation for activities.
Think about social media. No wonder sales teams have to constantly be roused up and consume drugs. When the ratio of extrinsic to intrinsic motivation skews too far to the former you end up unfulfilled and materialistic. You can't find the motivation so you set up a "system" of rewards to help you muster up the strength to do basic things - and then, of course, you fail. How else to deal with the discomfort of failure but with more distracting externals.
But what of motivators like sex and outrage, are those not internal motivators? I suppose they are roused up by externals.
-
-
en.wikipedia.org en.wikipedia.org
-
Static electricity is an imbalance of electric charges within or on the surface of a material
-
-
en.wikipedia.org en.wikipedia.org
-
Electricity. (2025, January 24). In Wikipedia. https://en.wikipedia.org/wiki/Electricity
-
-
en.wikipedia.org en.wikipedia.org
-
Golden Triangle Special Economic Zone
Travel Vlogs:
https://youtu.be/svX0X8qKKjg?si=h760VZopx1NNlKHz https://youtu.be/Lfck8uHXfIY?si=96hpvrVQRHpxfqCK
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
for - history - progress trap - Wikipedia - Daniel O'Leary - Ronald Wright - Walter Von Kramer - Der Spiegel
-
-
en.wikipedia.org en.wikipedia.org
-
The same argument can be used to justify the use of KL divergence
-
-
en.wikipedia.org en.wikipedia.org
-
Bicycles were introduced in the 19th century in Europe. By the early 21st century there were more than 1 billion bicycles.[1][2]
Just a normal sample texts.
-
-
en.wikipedia.org en.wikipedia.org
-
XXI of the constitution contained the transitional provisions. Articles 379 and 394 of Part XXI which contained provisions for provisional parliament and other articles which contained provisions like citizenship, came into force on 26 November 1949, the date on which the constitution was adopted
these provisions related to functioning of democracy came into force earlier than others
-
-
en.wikipedia.org en.wikipedia.org
-
https://en.wikipedia.org/wiki/S._(Dorst_novel)?
This was mentioned to me at an IndieWebCamp event today.
Seems interesting with respect to the meta portions of books.
Looks like the sort of thing that @remikalir and @anterobot may be interested in.
-
-
en.wikipedia.org en.wikipedia.org
-
Liza Miller
Well developed character.
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
Wikipedia is a free encyclopedia, written collaboratively by the people who use it. Since 2001, it has grown rapidly to become the world's largest reference website, with 6.9 million articles in English attracting billions
awsedrtfuvyibunjkl
-
- Jan 2025
-
en.wikipedia.org en.wikipedia.org
-
scoring guide used to evaluate the quality of students' constructed responses
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
-
The use of resolvable IRIs allows RDF documents containing more information to be transcluded which enables clients to discover new data by simply following those links; this principle is known as 'Follow Your Nose'.
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
All non-ASCII code points in the IRI should next be encoded as UTF-8, and the resulting bytes percent-encoded, to produce a valid URI.
-
Example: The IRI https://en.wiktionary.org/wiki/Ῥόδος becomes the URI https://en.wiktionary.org/wiki/%E1%BF%AC%CF%8C%CE%B4%CE%BF%CF%82
-
IRIs are mapped to URIs to retain backwards-compatibility with systems that do not support the new format.
-
-
-
en.wikipedia.org en.wikipedia.org
-
Permission to link to a document is explicitly granted by the act of publication.
https://hyp.is/h6UaZilmEemfg7fpWXmWaw/en.wikipedia.org/wiki/Project_Xanadu
-
a tumbler is an address of any range of content or link or a set of ranges or links
-
allow compound documents to be formed from pieces of other documents, a concept named transclusion
-
Nelson wanted to facilitate nonsequential writing, in which the reader could choose their own path through an electronic document.
-
-
-
en.wikipedia.org en.wikipedia.org
-
Hopelessness" redirects here.
hey
-
-
en.wikipedia.org en.wikipedia.org
-
A Uniform Resource Identifier (URI), formerly Universal Resource Identifier, is a unique sequence of characters that identifies an abstract or physical resource,[1] such as resources on a webpage, mail address, phone number,[2] books, real-world objects such as people and places, concepts.[3]
Incoherent concept, just like URL itself
identity tied to location is no identity whatsoever
It may e uniform but most certainly not universal
Let's face it location addressing was just a broken concept at a conceptual level
-
-
en.wikipedia.org en.wikipedia.org
-
Advantages of de-extinction
For further research!
-
-
en.wikipedia.org en.wikipedia.org
-
The Moot was a discussion group concerned with education, social reconstruction, and the role of culture in society.
Its Mooter than ever
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
-
Welsh legend supports that this happened, with stories such as Breuddwyd Macsen Wledig (English: The Dream of Emperor Maximus), where he not only marries a wondrous British woman (thus making British descendants probable), but also gives her father sovereignty over Britain (thus formally transferring authority from Rome back to the Britons themselves).
-
-
en.wikipedia.org en.wikipedia.org
-
indicator notation,
in class our indicator notation looks different, we'd write:
$$h_m(x) = \sum_{j=1}^{J_m} b_{jm}\mathbb{I}{R{jm}} (x)$$
-
. The tree partitions the input space into J m {\displaystyle J_{m}} disjoint regions R 1 m , … , R J m m {\displaystyle R_{1m},\ldots ,R_{J_{m}m}} and predicts a constant value in each region.
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
storytelling
skill to tell a story
-
-
en.wikipedia.org en.wikipedia.org
-
The Disney Renaissance was prompted by competition with Don Bluth's animated productions, along with the evolution of overseas animation, most notably the Studio Ghibli anime productions from Japanese animator Hayao Miyazaki.[16] His Lupin the Third film adaptation of the animated TV series based on the Monkey Punch comics, Castle of Cagliostro (1979), influenced the climax of The Great Mouse Detective, which in turn paved the way for the Disney Renaissance.
One of the key ingredients of scenius! Competition!!
-
-
en.wikipedia.org en.wikipedia.org
-
7 October 2023
!
-
-
en.wikipedia.org en.wikipedia.org
-
Ontology is the philosophical study of being. It is traditionally understood as the subdiscipline of metaphysics focused on the most general features of reality.
Ontology definition
-
-
en.wikipedia.org en.wikipedia.org
-
Douglas Engelbart

-
-
en.wikipedia.org en.wikipedia.org
-
A stub is
A stub is an article deemed too short and incomplete to provide encyclopedic coverage of a subject.
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
A key disadvantage of flash memory is that it can endure only a relatively small number of write cycles in a specific block.
disadvantage of Flash memory
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
study of causation or origination
in psychology compared to Freud's approach vs Adler's approach as the other side of the coin
-
- Dec 2024
-
en.wikipedia.org en.wikipedia.org
-
Aphrahat depicted in Les Vies des Pères des déserts d'Orient : leur doctrine spirituelle et leur discipline monastique
https://archive.org/details/lesviesdespresde05mari/page/n289/mode/1up
-
Demonstrations
Patrologia Syriaca (original syriac & latin transration) https://archive.org/details/patrologiasyriac01graf/ https://archive.org/details/gtu_32400002832867_2/
-
-
en.wikipedia.org en.wikipedia.org
-
The Grecian bend was a term applied first to a stooped posture[1] which became fashionable c. 1820,[2] named after the gracefully-inclined figures seen in the art of ancient Greece.
what on earth
-
-
en.wikipedia.org en.wikipedia.org
-
Henry may have worn the armour as a jest. The helmet has protruding eyes and a toothy grimace and is adorned with horns and spectacles.
You don't put stuff on your head if you're president? No: power must be made to wear shiny nonsense!
-
-
en.wikipedia.org en.wikipedia.org
-
Billy Possum is a type of stuffed toy depicting an opossum. Designed to be the replacement for the Teddy bear after Theodore Roosevelt vacated the office of President of the United States in 1909, the toy's popularity waned quickly, with the trend having lost all momentum by Christmas of that year.
We were robbed of greatness.
-
-
en.wikipedia.org en.wikipedia.org
-
challenging
Hey
-
-
en.wikipedia.org en.wikipedia.org
-
-
Ultra One, a restoration firm whose specialty product is a de-rusting solution which is designed to remove only rust while leaving the underlying metal, paint and decals intact.
Could Ultra One's rust solution be used on typewriters?
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
converges uniformly with limit f : E → X if and only if
For functions whose range is uniform space, the function then thus be defined as uniform space: $$ (f_1 \times f_2) (X) \subseteq U $$ Where \(U\) is entourage. We can apply Moore-Osgood Theorem to such function \( f(x, y) \) if \(f_x \rightrightarrows f\)
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
Laïcité ([la.i.si.te]; 'secularism')[1][2] is the constitutional principle of secularism in France. Article 1 of the French Constitution is commonly interpreted as the separation of civil society and religious society.
-
-
en.wikipedia.org en.wikipedia.org
-
Thinking, Fast and Slow is a 2011 popular science book by psychologist Daniel Kahneman. The book's main thesis is a differentiation between two modes of thought: "System 1" is fast, instinctive and emotional; "System 2" is slower, more deliberative, and more logical.
for - similar to - - Daniel Kahnaman's system 1 fast, instinctive, emotional and system 2 slow, deliberative, logical is similar to - Ian McGilhirist's left brain, right brain
-
-
en.wikipedia.org en.wikipedia.org
-
Here's what ChatGPT shown me as summary of their Privacy policy: Analytics and Third-Party Services They use third-party analytics tools (e.g., Google Analytics) to understand how users interact with their services. These tools may collect anonymized or aggregated data, such as IP addresses or browsing behavior, but not personally identifiable information unless you've explicitly consented. Cookies and Tracking: Their cookies track usage patterns on their platform, which could include data about visited pages, clicks, or time spent on the site. However, this data is anonymized unless tied to your account or explicitly authorized.
^^ let's just trust em, right? or no? Ping me if that ended up being a no-no as I decide to continue using the app.
-
-
en.wikipedia.org en.wikipedia.org
-
Gods change sex or manifest as an avatar of the opposite sex in order to facilitate sexual congress.[
I'm pretty sure Zeus did this, too.
-
-
-
en.wikipedia.org en.wikipedia.org
-
his 1683 edition of Plutarch's Lives Translated From the Greek by Several Hands in which he introduced the word 'biography' to English readers;
via https://en.wikipedia.org/wiki/John_Dryden
John Dryden apparently coined the English word 'biography' in his 1683 edition of Plutarch's Lives.
Does the OED bear this out?
-
-
en.wikipedia.org en.wikipedia.org
-
The epic is regarded as a foundational work in religion and the tradition of heroic sagas,
The gender roles in Gilgamesh's relationship with Enkidu are rendered with contemporary traditional gender expectations. Friendship and intimacy in ways that challenge conventional gender expectations.
-
a wild man created by the gods to stop Gilgamesh from oppressing the people of Uruk. After Enkidu becomes civilized through sexual initiation with Shamhat, he travels to Uruk, where he challenges Gilgamesh to a test of strength.
the gender dynamics emerge with Gilgamesh's relationships with Enkidu, once he has his relations with Shamhat, there's a dichotomy between masculinity and feminity which is characterised by sexual seduction plus the ability to "tame" a "wild" man. which gives me the image that the gender roles here are tied to the feminine playing a role in bringing men into social and moral order.
-
-
en.wikipedia.org en.wikipedia.org
-
Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.
Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.
Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.
SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]
Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption
-
Trust Service Criteria[edit] Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC. Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy. Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed. SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1] Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication
Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.
Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.
Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.
SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]
Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption
-
Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.
Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.
Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.
SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]
Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption
-
Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC. Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy. Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed. SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1] Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption
Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.
Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.
Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.
SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]
Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption
-
System and Organization Controls (SOC; also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria.[1] The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3.
System and Organization Controls (SOC; also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria.[1] The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3.
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
Fixed point (mathematics)

-
-
en.wikipedia.org en.wikipedia.org
-
In hell, those punished are Christians who have erred. While some usual sins such as usury, adultery, and women having sex before marriage are condemned, the Apocalypse of Paul goes beyond this. Various "bad" Christians are made to stand in a river of fire, including Christians who left the church and argued; Christians who took the Eucharist but then fornicated; and Christians who "slandered" other Christians while in church. Christians who did not trust in the Lord are buried in deep pits. Christians who failed to pay attention as the word of God was read in Church are forced to gnaw on their tongues eternally. Christians who commit infanticide are torn to shreds by beasts eternally while also on fire. Church leaders and theologians who preached incorrect doctrine or were simply incompetent in their positions are punished with torture. For example, a church reader who failed to implement the word of God he read during church services in his own life is thrown into a river of fire while an angel slashes his lips and tongue with a razor. Unholy nuns are thrown into a furnace of fire along with a bishop as punishment (in one Latin manuscript, likely a later addition). Failed ascetics are also punished; those who ended their fasts before their appointed time are taunted by abundant food and water just out of reach as they lie parched and starving in hell. Those who wore the habit of a monk or nun while failing to show charity are given new habits of pitch and sulphur, serpents are wrapped around their necks, and fiery angels physically beat them. The worst punishments ("seven times worse" than those described so far) are reserved for theologically deviant Christians, such as those who believe that Jesus's Second Coming will be a "spiritual" resurrection rather than a "physical" resurrection, or who deny that Jesus came in the flesh (docetism). The exact nature of their punishment is left to the imagination; an awful stench rises from a sealed well that hints of their torment below.[6] One theological oddity is that the text portrays Christians, the angels, and Paul as more merciful than God. Paul expresses pity for those suffering in Hell, but Jesus rebukes him and says that everyone in Hell truly deserves their punishment. The Archangel Michael says he prays continuously for Christians while they are alive, and weeps for the torments the failed Christians endure after it is too late. The twenty-four elders on thrones (presumably the 12 apostles and the 12 patriarchs) as well as the four beasts described in God's throne room in the Book of Revelation also make intercession for the inhabitants of hell. The Christian friends and family of those in Hell also make prayers for the dead that their suffering might be lessened. In responses to the pleas of Paul (or the Virgin Mary in the Apocalypse of the Virgin), Michael, the elders, and the living Christians on Earth, Jesus agrees to release those in hell from their suffering on the day of his resurrection—presumably every Sunday. Manuscripts include variants of the ending: A Coptic manuscript instead describes it as specifically Easter, albeit with a 50-day period afterward, possibly in addition to the Sunday off; the Greek Apocalypse of the Virgin specifically excludes damned Jews from this mercy; and an Armenian manuscript has all sinners released from hell unconditionally.[6][8][4]
In hell, those punished are Christians who have erred. While some usual sins such as usury, adultery, and women having sex before marriage are condemned, the Apocalypse of Paul goes beyond this. Various "bad" Christians are made to stand in a river of fire, including Christians who left the church and argued; Christians who took the Eucharist but then fornicated; and Christians who "slandered" other Christians while in church. Christians who did not trust in the Lord are buried in deep pits. Christians who failed to pay attention as the word of God was read in Church are forced to gnaw on their tongues eternally. Christians who commit infanticide are torn to shreds by beasts eternally while also on fire. Church leaders and theologians who preached incorrect doctrine or were simply incompetent in their positions are punished with torture. For example, a church reader who failed to implement the word of God he read during church services in his own life is thrown into a river of fire while an angel slashes his lips and tongue with a razor. Unholy nuns are thrown into a furnace of fire along with a bishop as punishment (in one Latin manuscript, likely a later addition). Failed ascetics are also punished; those who ended their fasts before their appointed time are taunted by abundant food and water just out of reach as they lie parched and starving in hell. Those who wore the habit of a monk or nun while failing to show charity are given new habits of pitch and sulphur, serpents are wrapped around their necks, and fiery angels physically beat them. The worst punishments ("seven times worse" than those described so far) are reserved for theologically deviant Christians, such as those who believe that Jesus's Second Coming will be a "spiritual" resurrection rather than a "physical" resurrection, or who deny that Jesus came in the flesh (docetism). The exact nature of their punishment is left to the imagination; an awful stench rises from a sealed well that hints of their torment below.[6]
One theological oddity is that the text portrays Christians, the angels, and Paul as more merciful than God. Paul expresses pity for those suffering in Hell, but Jesus rebukes him and says that everyone in Hell truly deserves their punishment. The Archangel Michael says he prays continuously for Christians while they are alive, and weeps for the torments the failed Christians endure after it is too late. The twenty-four elders on thrones (presumably the 12 apostles and the 12 patriarchs) as well as the four beasts described in God's throne room in the Book of Revelation also make intercession for the inhabitants of hell. The Christian friends and family of those in Hell also make prayers for the dead that their suffering might be lessened. In responses to the pleas of Paul (or the Virgin Mary in the Apocalypse of the Virgin), Michael, the elders, and the living Christians on Earth, Jesus agrees to release those in hell from their suffering on the day of his resurrection—presumably every Sunday. Manuscripts include variants of the ending: A Coptic manuscript instead describes it as specifically Easter, albeit with a 50-day period afterward, possibly in addition to the Sunday off; the Greek Apocalypse of the Virgin specifically excludes damned Jews from this mercy; and an Armenian manuscript has all sinners released from hell unconditionally.[6][8][4]
-
-
en.wikipedia.org en.wikipedia.org
-
After an initial ascension, Beatrice guides Dante through the nine celestial spheres of Heaven. These are concentric and spherical, as in Aristotelian and Ptolemaic cosmology. While the structures of the Inferno and Purgatorio were based on different classifications of sin, the structure of the Paradiso is based on the four cardinal virtues and the three theological virtues. The seven lowest spheres of Heaven deal solely with the cardinal virtues of Prudence, Fortitude, Justice and Temperance. The first three spheres involve a deficiency of one of the cardinal virtues – the Moon, containing the inconstant, whose vows to God waned as the moon and thus lack fortitude; Mercury, containing the ambitious, who were virtuous for glory and thus lacked justice; and Venus, containing the lovers, whose love was directed towards another than God and thus lacked temperance. The final four incidentally are positive examples of the cardinal virtues, all led on by the Sun, containing the prudent, whose wisdom lighted the way for the other virtues, to which the others are bound (constituting a category on its own). Mars contains the men of fortitude who died in the cause of Christianity; Jupiter contains the kings of justice; and Saturn contains the temperate, the monks. The seven subdivided into three are raised further by two more categories: the eighth sphere of the fixed stars that contain those who achieved the theological virtues of faith, hope, and love, and represent the Church Triumphant – the total perfection of humanity, cleansed of all the sins and carrying all the virtues of heaven; and the ninth circle, or Primum Mobile (corresponding to the geocentricism of medieval astronomy), which contains the angels, creatures never poisoned by original sin. Topping them all is the Empyrean, which contains the essence of God, completing the nine-fold division to ten. Dante meets and converses with several great saints of the Church, including Thomas Aquinas, Bonaventure, Saint Peter, and St. John. Near the end, Beatrice departs and Bernard of Clairvaux takes over as the guide.[29] The Paradiso is more theological in nature than the Inferno and the Purgatorio. However, Dante admits that the vision of heaven he receives is merely the one his human eyes permit him to see, and thus Dante's personal vision. The Divine Comedy finishes with Dante seeing the Triune God. In a flash of understanding that he cannot express, Dante finally understands the mystery of Christ's divinity and humanity, and his soul becomes aligned with God's love:[30] But already my desire and my will were being turned like a wheel, all at one speed, by the Love which moves the sun and the other stars.[31]
After an initial ascension, Beatrice guides Dante through the nine celestial spheres of Heaven. These are concentric and spherical, as in Aristotelian and Ptolemaic cosmology. While the structures of the Inferno and Purgatorio were based on different classifications of sin, the structure of the Paradiso is based on the four cardinal virtues and the three theological virtues.
The seven lowest spheres of Heaven deal solely with the cardinal virtues of Prudence, Fortitude, Justice and Temperance. The first three spheres involve a deficiency of one of the cardinal virtues – the Moon, containing the inconstant, whose vows to God waned as the moon and thus lack fortitude; Mercury, containing the ambitious, who were virtuous for glory and thus lacked justice; and Venus, containing the lovers, whose love was directed towards another than God and thus lacked temperance. The final four incidentally are positive examples of the cardinal virtues, all led on by the Sun, containing the prudent, whose wisdom lighted the way for the other virtues, to which the others are bound (constituting a category on its own). Mars contains the men of fortitude who died in the cause of Christianity; Jupiter contains the kings of justice; and Saturn contains the temperate, the monks. The seven subdivided into three are raised further by two more categories: the eighth sphere of the fixed stars that contain those who achieved the theological virtues of faith, hope, and love, and represent the Church Triumphant – the total perfection of humanity, cleansed of all the sins and carrying all the virtues of heaven; and the ninth circle, or Primum Mobile (corresponding to the geocentricism of medieval astronomy), which contains the angels, creatures never poisoned by original sin. Topping them all is the Empyrean, which contains the essence of God, completing the nine-fold division to ten.
Dante meets and converses with several great saints of the Church, including Thomas Aquinas, Bonaventure, Saint Peter, and St. John. Near the end, Beatrice departs and Bernard of Clairvaux takes over as the guide.[29] The Paradiso is more theological in nature than the Inferno and the Purgatorio. However, Dante admits that the vision of heaven he receives is merely the one his human eyes permit him to see, and thus Dante's personal vision.
The Divine Comedy finishes with Dante seeing the Triune God. In a flash of understanding that he cannot express, Dante finally understands the mystery of Christ's divinity and humanity, and his soul becomes aligned with God's love:[30]
But already my desire and my will were being turned like a wheel, all at one speed, by the Love which moves the sun and the other stars.[31]
-
The Divine Comedy is composed of 14,233 lines that are divided into three cantiche (singular cantica) – Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise) – each consisting of 33 cantos (Italian plural canti). An initial canto, serving as an introduction to the poem and generally considered to be part of the first cantica, brings the total number of cantos to 100. It is generally accepted, however, that the first two cantos serve as a unitary prologue to the entire epic, and that the opening two cantos of each cantica serve as prologues to each of the three cantiche.[7][8][9] The number three is prominent in the work, represented in part by the number of cantiche and their lengths. Additionally, the verse scheme used, terza rima, is hendecasyllabic (lines of eleven syllables), with the lines composing tercets according to the rhyme scheme ABA BCB CDC DED ...[10] The total number of syllables in each tercet is thus 33, the same as the number of cantos in each cantica. Written in the first person, the poem tells of Dante's journey through the three realms of the dead, lasting from the night before Good Friday to the Wednesday after Easter in the spring of 1300. The Roman poet Virgil guides him through Hell and Purgatory; Beatrice, Dante's ideal woman, guides him through Heaven.[11] Beatrice was a Florentine woman he had met in childhood and admired from afar in the mode of the then-fashionable courtly love tradition, which is highlighted in Dante's earlier work La Vita Nuova.[12] The Cistercian abbot Bernard of Clairvaux guides Dante through the last three cantos.[13] .mw-parser-output .tmulti .multiimageinner{display:flex;flex-direction:column}.mw-parser-output .tmulti .trow{display:flex;flex-direction:row;clear:left;flex-wrap:wrap;width:100%;box-sizing:border-box}.mw-parser-output .tmulti .tsingle{margin:1px;float:left}.mw-parser-output .tmulti .theader{clear:both;font-weight:bold;text-align:center;align-self:center;background-color:transparent;width:100%}.mw-parser-output .tmulti .thumbcaption{background-color:transparent}.mw-parser-output .tmulti .text-align-left{text-align:left}.mw-parser-output .tmulti .text-align-right{text-align:right}.mw-parser-output .tmulti .text-align-center{text-align:center}@media all and (max-width:720px){.mw-parser-output .tmulti .thumbinner{width:100%!important;box-sizing:border-box;max-width:none!important;align-items:center}.mw-parser-output .tmulti .trow{justify-content:center}.mw-parser-output .tmulti .tsingle{float:none!important;max-width:100%!important;box-sizing:border-box;text-align:center}.mw-parser-output .tmulti .tsingle .thumbcaption{text-align:left}.mw-parser-output .tmulti .trow>.thumbcaption{text-align:center}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .tmulti .multiimageinner img{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .tmulti .multiimageinner img{background-color:white}}Dante's guides in the poemVirgilBeatriceSaint Bernard The structure of the three realms follows a common numerical pattern of 9 plus 1, for a total of 10. There are nine circles of the Inferno, followed by Lucifer contained at its bottom; nine rings of Mount Purgatory, followed by the Garden of Eden crowning its summit; and the nine celestial bodies of Paradiso, followed by the Empyrean containing the very essence of God. Within each group of nine, seven elements correspond to a specific moral scheme, subdivided into three subcategories, while two others of greater particularity are added to total nine. For example, the seven deadly sins that are cleansed in Purgatory are joined by special realms for the late repentant and the excommunicated. The core seven sins within Purgatory correspond to a moral scheme of love perverted, subdivided into three groups corresponding to excessive love (Lust, Gluttony, Greed), deficient love (Sloth), and malicious love (Wrath, Envy, Pride).[14] In central Italy's political struggle between Guelphs and Ghibellines, Dante was part of the Guelphs, who in general favoured the papacy over the Holy Roman Emperor. Florence's Guelphs split into factions around 1300 – the White Guelphs and the Black Guelphs. Dante was among the White Guelphs who were exiled in 1302 by the Lord-Mayor Cante de' Gabrielli di Gubbio, after troops under Charles of Valois entered the city, at the request of Pope Boniface VIII, who supported the Black Guelphs. This exile, which lasted the rest of Dante's life, shows its influence in many parts of the Comedy, from prophecies of Dante's exile to Dante's views of politics, to the eternal damnation of some of his opponents.[15] The last word in each of the three cantiche is stelle ("stars").
The Divine Comedy is composed of 14,233 lines that are divided into three cantiche (singular cantica) – Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise) – each consisting of 33 cantos (Italian plural canti). An initial canto, serving as an introduction to the poem and generally considered to be part of the first cantica, brings the total number of cantos to 100. It is generally accepted, however, that the first two cantos serve as a unitary prologue to the entire epic, and that the opening two cantos of each cantica serve as prologues to each of the three cantiche.[7][8][9]
The number three is prominent in the work, represented in part by the number of cantiche and their lengths. Additionally, the verse scheme used, terza rima, is hendecasyllabic (lines of eleven syllables), with the lines composing tercets according to the rhyme scheme ABA BCB CDC DED ...[10] The total number of syllables in each tercet is thus 33, the same as the number of cantos in each cantica.
Written in the first person, the poem tells of Dante's journey through the three realms of the dead, lasting from the night before Good Friday to the Wednesday after Easter in the spring of 1300. The Roman poet Virgil guides him through Hell and Purgatory; Beatrice, Dante's ideal woman, guides him through Heaven.[11] Beatrice was a Florentine woman he had met in childhood and admired from afar in the mode of the then-fashionable courtly love tradition, which is highlighted in Dante's earlier work La Vita Nuova.[12] The Cistercian abbot Bernard of Clairvaux guides Dante through the last three cantos.[13]
Dante's guides in the poem Virgil Virgil
Beatrice
Saint Bernard The structure of the three realms follows a common numerical pattern of 9 plus 1, for a total of 10. There are nine circles of the Inferno, followed by Lucifer contained at its bottom; nine rings of Mount Purgatory, followed by the Garden of Eden crowning its summit; and the nine celestial bodies of Paradiso, followed by the Empyrean containing the very essence of God. Within each group of nine, seven elements correspond to a specific moral scheme, subdivided into three subcategories, while two others of greater particularity are added to total nine. For example, the seven deadly sins that are cleansed in Purgatory are joined by special realms for the late repentant and the excommunicated. The core seven sins within Purgatory correspond to a moral scheme of love perverted, subdivided into three groups corresponding to excessive love (Lust, Gluttony, Greed), deficient love (Sloth), and malicious love (Wrath, Envy, Pride).[14]
In central Italy's political struggle between Guelphs and Ghibellines, Dante was part of the Guelphs, who in general favoured the papacy over the Holy Roman Emperor. Florence's Guelphs split into factions around 1300 – the White Guelphs and the Black Guelphs. Dante was among the White Guelphs who were exiled in 1302 by the Lord-Mayor Cante de' Gabrielli di Gubbio, after troops under Charles of Valois entered the city, at the request of Pope Boniface VIII, who supported the Black Guelphs. This exile, which lasted the rest of Dante's life, shows its influence in many parts of the Comedy, from prophecies of Dante's exile to Dante's views of politics, to the eternal damnation of some of his opponents.[15]
The last word in each of the three cantiche is stelle ("stars").
-
-
en.wikipedia.org en.wikipedia.org
-
Melanin may also be able to help the fungus metabolize radiation, but more evidence and research is still needed.[1]
Would be interesting to see hypotheses as to the mechanism in which energy could be harvested by melanin and any experiments that could test it?
Tags
Annotators
URL
-
-
en.wikipedia.org en.wikipedia.org
-
In Arabic, rubʿ means 'one-fourth' or 'quarter', while ḥizb (plural aḥzāb) translates to 'a group'.
۞

-
-
en.wikipedia.org en.wikipedia.org
-
magical palantíri were "seeing-stones,"

-

-
-
en.wikipedia.org en.wikipedia.org
-
Palantír

-
-
en.wikipedia.org en.wikipedia.org
-
Panentheism (/pæˈnɛnθiɪzəm/;[1] "all in God", from the Greek πᾶν, pân, 'all', ἐν, en, 'in' and Θεός, Theós, 'God')[2] is the belief that the divine intersects every part of the universe and also extends beyond space and time.
penentheism
al in god
-
Panentheism

-
-
en.wikipedia.org en.wikipedia.org
-
xanadu.com/zigzag
-
Get out of here with your crazy ideas." Nelson took this as permission to develop the idea independently.
crazy ideas develop independently
-
user can zig and zag through structures in multiple dimensions
zigzag through dimensions
-
user may step freely from a cell to any adjacent cell
adjacency
-
ZigZag
software

-
-
en.wikipedia.org en.wikipedia.org
-
To become conscious of their gains from slavery, segregation, and voter suppression would shatter that Dream.
people experiencing racism, sexism, violence cannot drink the koolaid. but are there enough of them for revolution?
-
He contrasts these experiences with neat suburban life, which he calls "the Dream" because it is an exclusionary fantasy for White people who are enabled by, yet largely ignorant of, their history of privilege and suppression
how can you have both of these completely seperate groups, living in the same nation, where all their votes are equal? how can a society encompass all of them equally?
-
Coates's position is that absent the religious rhetoric of "hope and dreams and faith and progress," only systems of White supremacy remain along with no real evidence that those systems are bound to change.[
is religion the koolaid? kammas kammas says religion creates better citizens is religion both a pacifying agent and an agent that works agasint the state?
-
-
en.wikipedia.org en.wikipedia.org
-
weet corn (Zea
test
-
encyclopedia
Who can see this
-
-
en.wikipedia.org en.wikipedia.org
-
British engineer John Hoyte led an expedition that tried to reenact aspects of Hannibal's crossing of the Alps during the Second Punic War in 218 BCE. The group took the female Asian elephant Jumbo, provided by a zoo in Turin, from France over the Col du Mont Cenis into Italy.
Don't do your archeology experiments with elephants! Leave the elephants alone!!
-
-
en.wikipedia.org en.wikipedia.org
-
Ādityahṛdayam
DONE
-
-
en.wikipedia.org en.wikipedia.org
-
Meyer, David. (September 3, 2010) Google puts open-source Wave in a 'box' | Application Development | ZDNet UK. Zdnet.co.uk. Retrieved on 2010-12-14.
:from: https://hyp.is/SQNWiDDgEe-MS1f4YUPecw/en.wikipedia.org/wiki/Google_Wave
-
started to develop a server-based product called Wave in a Box
server based product
-

-
-
en.wikipedia.org en.wikipedia.org
-
I think this word comes from the word αστερισμός (Asterismōs, constellation in Greek)
aserism constellations ⁂ =
-
-
en.wikipedia.org en.wikipedia.org
-
∵ ஃ ⁂ ⛬
asterism
ஃ
⁂
-
ஃ
three dots
-
-
en.wikipedia.org en.wikipedia.org
-
⁂
asterism
-
-
en.wikipedia.org en.wikipedia.org
-
At the opening of the play Aphrodite, Goddess of love, explains that Hippolytus has sworn chastity and refuses to revere her. Instead, he honours the Goddess of the hunt, Artemis. This has led Aphrodite to initiate a plan of vengeance on Hippolytus. When Hippolytus went to Athens two years previously Aphrodite caused Phaedra to fall in love with him. Hippolytus appears with his followers and shows reverence to a statue of Artemis, a chaste goddess. A servant warns him about slighting Aphrodite, but Hippolytus refuses to listen. The chorus, consisting of young married women of Troezen, enters and describes how Theseus's wife, Phaedra, has not eaten or slept in three days. Phaedra, sickly, appears with her nurse. After an agonizing discussion, Phaedra finally confesses why she is ill: she loves Hippolytus. The nurse and the chorus are shocked. Phaedra explains that she must starve herself and die with her honour intact and to save Theseus from shame. However, the nurse quickly retracts her initial response and tells Phaedra that she has a magical charm to cure her. However, in an aside she reveals different plans. The nurse, after making Hippolytus swear not to tell anyone, informs Hippolytus of Phaedra's desire and suggests that Hippolytus consider yielding to her. He reacts with a furious tirade and threatens to tell his father, Theseus, everything as soon as he arrives. Phaedra realizes disaster has fallen. After making the chorus swear secrecy, she goes inside and hangs herself. Theseus returns and discovers his wife's dead body. Because the chorus is sworn to secrecy, they cannot tell Theseus why she killed herself. Theseus discovers a letter on Phaedra's body, which falsely asserts that she was raped by Hippolytus. Enraged, Theseus curses his son either to death or at least exile. To execute the curse, Theseus calls upon his father, the god Poseidon, who has promised to grant his son three wishes. Hippolytus enters and protests his innocence but cannot tell the truth because of the binding oath that he swore. Taking Phaedra's letter as proof, Hippolytus proudly defends his innocence, saying that he has never looked at any woman with sexual desire. Theseus does not believe his son and still exiles him. As Hippolytus is departing he swears that if he is lying then Zeus should strike him down on the spot. The chorus sings a lament for Hippolytus. A messenger enters and describes a gruesome scene to Theseus; as Hippolytus got in his chariot to leave the kingdom, a bull roared out of the sea, frightening his horses, which dashed his chariot among the rocks, dragging Hippolytus behind. Hippolytus seems to be dying. The messenger protests Hippolytus' innocence, but Theseus refuses to believe him. Theseus is glad that Hippolytus is suffering and about to die. But then the goddess, Artemis, appears and rages at Theseus for killing his own son. She brutally tells him the truth and that Aphrodite was behind all their suffering, because she felt disrespected by Hippolytus's pride in his chastity. Artemis states that there was no rape, Phaedra had lied, and Theseus' son is innocent. Theseus is devastated by this revelation. Hippolytus is carried in physically battered and barely clinging to life. In the last moments of the play, Hippolytus forgives his father, kind words are exchanged between father and son, and then Hippolytus dies. Theseus is then left living to dwell on the fact that he killed his beloved son. Interpretations[edit] In this play, all characters, humans and gods, have blindnesses that prevent them from understanding others, and these blindnesses combine to result in tragedy. The clash between Phaedra and Hippolytus is a conflict between what is repugnant and depraved — a woman sexually desiring her step son–and what is inhuman and arrogant–a young man that finds sexuality repellant. Hippolytus is possessed by a desire for purity, which is represented by the goddess Artemis. Hippolytus describes the goddess' purifying power in terms of the ancient Greek concept of sophrosyne, which is translated in the script variously as the situation requires–"wisdom, chastity, moderation, character". This play illustrates that it is not possible for a person to be sophron and also a devotee of Aphrodite.[3] Scholar Rachel Bruzzone argued in 2012 that Pygmalion in Book X of Ovid's Metamorphoses and Hippolytus share certain characteristics. The main antagonist of both stories is Aphrodite, who seeks revenge on both for insulting her by remaining virgins. They are also both obsessed with remaining pure. Both are misogynistic with Hippolytus believing that women are morally corrupt and will ruin his pureness. Pygmalion believes the same in that women are just lust-filled creatures that will ruin his pureness.
This play is another example of a woman causing a tragedy because of her emotions. Hippolytus, the "pure" hero, reveres Artemis instead of Aphrodite and swears chastity. Aphrodite wants revenge and causes Phaedra to yearn for Hippolytus. Hippolytus refuses her advances and she kills herself. Hippolytus is then accused of raping her, turning his own father against him. False allegations are once again made by a woman. Hippolytus denies the accusations, but cannot tell what really happened because of his oath of secrecy. Theseus curses Hippolytus, causing Hippolytus's death. Hippolytus dies because of his righteousness; he does not break his oath. Neither Phaedra nor Hippolytus would have died if the "vengeful" Aphrodite did not cause Phaedra to fall for Hippolytus.
-
-
en.wikipedia.org en.wikipedia.org
-
However, Siyâvash repeatedly rejects her advances and also strikes down her suggestion to kill his father so that they can rule together. Fearing that he might inform the Shah and have her executed, Sudabeh falsely accuses Siyâvash of raping her.
I find a bit of a pattern with many stories and the main character being accused of rape. It's also terrible that his father seems to be so quick to believe the accusation, and then when he proves himself innocent, their relationship grows weak. Sadly though, this still happens today in our world and not many have the fortune to be proven innocent, such as Siyavash was.
-
Owing to his birth to a non-aristocratic mother, Siyâvash is sent away by his father to Zabulistan, where he is raised by the holy warrior Rostam to be well-versed in the arts of war. He returns as a highly skilled and handsome young man, and is granted entry to the royal court as a prince and the new ruler of Ctesiphon. Shortly thereafter, he meets his
I find it messed up that he was sent away, was it for money? I like how he comes back better than ever and is given the title of a prince. Its weird that his step mother "lusts" over him though.
-
- Nov 2024
-
en.wikipedia.org en.wikipedia.org
-
for - definition - deadlock - Wikipedia
-
-
en.wikipedia.org en.wikipedia.org
-
This article is about Homer's epic poem.
The use of the word epic to describe this piece of literary work is a perfect example on how to use the word. I don't think it is appropriate to use epic to describe a concert performance or a TV show.
-
-
en.wikipedia.org en.wikipedia.org
-
There was a movie about this crop that I watched way way back, and it was tragic.
-
-
en.wikipedia.org en.wikipedia.org
-
over breeding as a fundamental human right
Perhaps the removal of this as a human right is justified.
-
-
en.wikipedia.org en.wikipedia.org
-
for - TPF - administrative divisions for each country of the world
note - This table needs to be updated
-
-
en.wikipedia.org en.wikipedia.org
-
Natural resources are resources that are drawn from nature and used with few modifications. This includes the sources of valued characteristics such as commercial and industrial use, aesthetic value, scientific interest, and cultural value. On Earth, it includes sunlight, atmosphere, water, land, all minerals along with all vegetation, and wildlife.[1][2][3][4] Natural resources are part of humanity's natural heritage or protected in nature reserves. Particular areas (such as the rainforest in Fatu-Hiva) often feature biodiversity and geodiversity in their ecosystems. Natural resources may be classified in different ways. Natural resources are materials and components (something that can be used) found within the environment. Every man-made product is composed of natural resources (at its fundamental level).
Natural Resource Definition
-
-
en.wikipedia.org en.wikipedia.org
-
iamb
Curious if any poets (or poet interested hypothesizers) will find this, and long it will take. I am.
-
-
en.wikipedia.org en.wikipedia.org
-
Co-founder Jackson Palmer left the cryptocurrency community in 2015 and has no plans to return, having come to the belief that cryptocurrency, originally conceived as a libertarian alternative to money, is fundamentally exploitative and built to enrich its top proponents. His co-founder, Billy Markus, agreed that Palmer's position was generally valid.[26]
LMAO. LMAO.
-
-
en.wikipedia.org en.wikipedia.org
-
13 counties 3 cities 6 special municipalities
Special municipalities Counties Cities Kaohsiung City New Taipei City Taichung City Tainan City Taipei City Taoyuan City Changhua County Chiayi County Hsinchu County Hualien County Miaoli County Nantou County Pingtung County Taitung County Yilan County Yunlin County Chiayi City Hsinchu City Keelung City
-
-
en.wikipedia.org en.wikipedia.org
-
Yoruba religion
-
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
-
en.wikipedia.org en.wikipedia.org
