27 Matching Annotations
  1. Apr 2025
  2. Feb 2025
    1. We are now confident we know how to build AGI as we have traditionally understood it. We believe that, in 2025, we may see the first AI agents “join the workforce” and materially change the output of companies. We continue to believe that iteratively putting great tools in the hands of people leads to great, broadly-distributed outcomes.

      hello world

  3. Jan 2025
  4. Dec 2024
    1. Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    2. Trust Service Criteria[edit] Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC. Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy. Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed. SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1] Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication

      Trust Service Criteria Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    3. Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    4. Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC. Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy. Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed. SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1] Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

      Trust Services Criteria were designed such that they can provide flexibility in application to better suit the unique controls implemented by an organization to address its unique risks and threats it faces. This is in contrast to other control frameworks that mandate specific controls whether applicable or not. Trust Services Criteria application in actual situations requires judgement as to suitability. The Trust Services Criteria are used when "evaluating the suitability of the design and operating effectiveness of controls relevant to the security, availability, processing integrity, confidentiality or privacy of information and systems used to provide product or services" - AICPA - ASEC.

      Organization of the Trust Services Criteria are aligned to the COSO framework's 17 principles with additional supplemental criteria organized into logical and physical access controls, system operations, change management and risk mitigation. Further, the additional supplemental criteria are shared among the Trust Services Criteria - Common Criteria (CC) and additional specific criteria for availability, processing integrity, confidentiality and privacy.

      Common criteria are labeled as, Control environment (CC1.x), Information and communication (CC2.x), Risk assessment (CC3.x), Monitoring of controls (CC4.x) and Control activities related to the design and implementation of controls (CC5.x). Common criteria are suitable and complete for evaluation security criteria. However, there additional category specific criteria for Availability (A.x), Processing integrity (PI.x), Confidentiality (C.x) and Privacy (P.x). Criteria for each trust services categories addressed in an engagement are considered complete when all criterial associated with that category are addressed.

      SOC 2 reports focus on controls addressed by five semi-overlapping categories called Trust Service Criteria which also support the CIA triad of information security:[1]

      Security - information and systems are protected against unauthorized access and disclosure, and damage to the system that could compromise the availability, confidentiality, integrity and privacy of the system. Firewalls Intrusion detection Multi-factor authentication Availability - information and systems are available for operational use. Performance monitoring Disaster recovery Incident handling Confidentiality - information is protected and available on a legitimate need to know basis. Applies to various types of sensitive information. Encryption Access controls Firewalls Processing Integrity - system processing is complete, valid, accurate, timely and authorized. Quality assurance Process monitoring Adherence to principle Privacy - personal information is collected, used, retained, disclosed and disposed according to policy. Privacy applies only to personal information. Access control Multi-factor authentication Encryption

    5. System and Organization Controls (SOC; also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria.[1] The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3.

      System and Organization Controls (SOC; also sometimes referred to as service organizations controls) as defined by the American Institute of Certified Public Accountants (AICPA), is the name of a suite of reports produced during an audit. It is intended for use by service organizations (organizations that provide information systems as a service to other organizations) to issue validated reports of internal controls over those information systems to the users of those services. The reports focus on controls grouped into five categories called Trust Service Criteria.[1] The Trust Services Criteria were established by The AICPA through its Assurance Services Executive Committee (ASEC) in 2017 (2017 TSC). These control criteria are to be used by the practitioner/examiner (Certified Public Accountant, CPA) in attestation or consulting engagements to evaluate and report on controls of information systems offered as a service. The engagements can be done on an entity wide, subsidiary, division, operating unit, product line or functional area basis. The Trust Services Criteria were modeled in conformity to The Committee of Sponsoring Organizations of the Treadway Commission (COSO) Internal Control - Integrated Framework (COSO Framework). In addition, the Trust Services Criteria can be mapped to NIST SP 800 - 53 criteria and to EU General Data Protection Regulation (GDPR) Articles. The AICPA auditing standard Statement on Standards for Attestation Engagements no. 18 (SSAE 18), section 320, "Reporting on an Examination of Controls at a Service Organization Relevant to User Entities' Internal Control Over Financial Reporting", defines two levels of reporting, type 1 and type 2. Additional AICPA guidance materials specify three types of reporting: SOC 1, SOC 2, and SOC 3.

    1. In hell, those punished are Christians who have erred. While some usual sins such as usury, adultery, and women having sex before marriage are condemned, the Apocalypse of Paul goes beyond this. Various "bad" Christians are made to stand in a river of fire, including Christians who left the church and argued; Christians who took the Eucharist but then fornicated; and Christians who "slandered" other Christians while in church. Christians who did not trust in the Lord are buried in deep pits. Christians who failed to pay attention as the word of God was read in Church are forced to gnaw on their tongues eternally. Christians who commit infanticide are torn to shreds by beasts eternally while also on fire. Church leaders and theologians who preached incorrect doctrine or were simply incompetent in their positions are punished with torture. For example, a church reader who failed to implement the word of God he read during church services in his own life is thrown into a river of fire while an angel slashes his lips and tongue with a razor. Unholy nuns are thrown into a furnace of fire along with a bishop as punishment (in one Latin manuscript, likely a later addition). Failed ascetics are also punished; those who ended their fasts before their appointed time are taunted by abundant food and water just out of reach as they lie parched and starving in hell. Those who wore the habit of a monk or nun while failing to show charity are given new habits of pitch and sulphur, serpents are wrapped around their necks, and fiery angels physically beat them. The worst punishments ("seven times worse" than those described so far) are reserved for theologically deviant Christians, such as those who believe that Jesus's Second Coming will be a "spiritual" resurrection rather than a "physical" resurrection, or who deny that Jesus came in the flesh (docetism). The exact nature of their punishment is left to the imagination; an awful stench rises from a sealed well that hints of their torment below.[6] One theological oddity is that the text portrays Christians, the angels, and Paul as more merciful than God. Paul expresses pity for those suffering in Hell, but Jesus rebukes him and says that everyone in Hell truly deserves their punishment. The Archangel Michael says he prays continuously for Christians while they are alive, and weeps for the torments the failed Christians endure after it is too late. The twenty-four elders on thrones (presumably the 12 apostles and the 12 patriarchs) as well as the four beasts described in God's throne room in the Book of Revelation also make intercession for the inhabitants of hell. The Christian friends and family of those in Hell also make prayers for the dead that their suffering might be lessened. In responses to the pleas of Paul (or the Virgin Mary in the Apocalypse of the Virgin), Michael, the elders, and the living Christians on Earth, Jesus agrees to release those in hell from their suffering on the day of his resurrection—presumably every Sunday. Manuscripts include variants of the ending: A Coptic manuscript instead describes it as specifically Easter, albeit with a 50-day period afterward, possibly in addition to the Sunday off; the Greek Apocalypse of the Virgin specifically excludes damned Jews from this mercy; and an Armenian manuscript has all sinners released from hell unconditionally.[6][8][4]

      In hell, those punished are Christians who have erred. While some usual sins such as usury, adultery, and women having sex before marriage are condemned, the Apocalypse of Paul goes beyond this. Various "bad" Christians are made to stand in a river of fire, including Christians who left the church and argued; Christians who took the Eucharist but then fornicated; and Christians who "slandered" other Christians while in church. Christians who did not trust in the Lord are buried in deep pits. Christians who failed to pay attention as the word of God was read in Church are forced to gnaw on their tongues eternally. Christians who commit infanticide are torn to shreds by beasts eternally while also on fire. Church leaders and theologians who preached incorrect doctrine or were simply incompetent in their positions are punished with torture. For example, a church reader who failed to implement the word of God he read during church services in his own life is thrown into a river of fire while an angel slashes his lips and tongue with a razor. Unholy nuns are thrown into a furnace of fire along with a bishop as punishment (in one Latin manuscript, likely a later addition). Failed ascetics are also punished; those who ended their fasts before their appointed time are taunted by abundant food and water just out of reach as they lie parched and starving in hell. Those who wore the habit of a monk or nun while failing to show charity are given new habits of pitch and sulphur, serpents are wrapped around their necks, and fiery angels physically beat them. The worst punishments ("seven times worse" than those described so far) are reserved for theologically deviant Christians, such as those who believe that Jesus's Second Coming will be a "spiritual" resurrection rather than a "physical" resurrection, or who deny that Jesus came in the flesh (docetism). The exact nature of their punishment is left to the imagination; an awful stench rises from a sealed well that hints of their torment below.[6]

      One theological oddity is that the text portrays Christians, the angels, and Paul as more merciful than God. Paul expresses pity for those suffering in Hell, but Jesus rebukes him and says that everyone in Hell truly deserves their punishment. The Archangel Michael says he prays continuously for Christians while they are alive, and weeps for the torments the failed Christians endure after it is too late. The twenty-four elders on thrones (presumably the 12 apostles and the 12 patriarchs) as well as the four beasts described in God's throne room in the Book of Revelation also make intercession for the inhabitants of hell. The Christian friends and family of those in Hell also make prayers for the dead that their suffering might be lessened. In responses to the pleas of Paul (or the Virgin Mary in the Apocalypse of the Virgin), Michael, the elders, and the living Christians on Earth, Jesus agrees to release those in hell from their suffering on the day of his resurrection—presumably every Sunday. Manuscripts include variants of the ending: A Coptic manuscript instead describes it as specifically Easter, albeit with a 50-day period afterward, possibly in addition to the Sunday off; the Greek Apocalypse of the Virgin specifically excludes damned Jews from this mercy; and an Armenian manuscript has all sinners released from hell unconditionally.[6][8][4]

    1. After an initial ascension, Beatrice guides Dante through the nine celestial spheres of Heaven. These are concentric and spherical, as in Aristotelian and Ptolemaic cosmology. While the structures of the Inferno and Purgatorio were based on different classifications of sin, the structure of the Paradiso is based on the four cardinal virtues and the three theological virtues. The seven lowest spheres of Heaven deal solely with the cardinal virtues of Prudence, Fortitude, Justice and Temperance. The first three spheres involve a deficiency of one of the cardinal virtues – the Moon, containing the inconstant, whose vows to God waned as the moon and thus lack fortitude; Mercury, containing the ambitious, who were virtuous for glory and thus lacked justice; and Venus, containing the lovers, whose love was directed towards another than God and thus lacked temperance. The final four incidentally are positive examples of the cardinal virtues, all led on by the Sun, containing the prudent, whose wisdom lighted the way for the other virtues, to which the others are bound (constituting a category on its own). Mars contains the men of fortitude who died in the cause of Christianity; Jupiter contains the kings of justice; and Saturn contains the temperate, the monks. The seven subdivided into three are raised further by two more categories: the eighth sphere of the fixed stars that contain those who achieved the theological virtues of faith, hope, and love, and represent the Church Triumphant – the total perfection of humanity, cleansed of all the sins and carrying all the virtues of heaven; and the ninth circle, or Primum Mobile (corresponding to the geocentricism of medieval astronomy), which contains the angels, creatures never poisoned by original sin. Topping them all is the Empyrean, which contains the essence of God, completing the nine-fold division to ten. Dante meets and converses with several great saints of the Church, including Thomas Aquinas, Bonaventure, Saint Peter, and St. John. Near the end, Beatrice departs and Bernard of Clairvaux takes over as the guide.[29] The Paradiso is more theological in nature than the Inferno and the Purgatorio. However, Dante admits that the vision of heaven he receives is merely the one his human eyes permit him to see, and thus Dante's personal vision. The Divine Comedy finishes with Dante seeing the Triune God. In a flash of understanding that he cannot express, Dante finally understands the mystery of Christ's divinity and humanity, and his soul becomes aligned with God's love:[30] But already my desire and my will were being turned like a wheel, all at one speed, by the Love which moves the sun and the other stars.[31]

      After an initial ascension, Beatrice guides Dante through the nine celestial spheres of Heaven. These are concentric and spherical, as in Aristotelian and Ptolemaic cosmology. While the structures of the Inferno and Purgatorio were based on different classifications of sin, the structure of the Paradiso is based on the four cardinal virtues and the three theological virtues.

      The seven lowest spheres of Heaven deal solely with the cardinal virtues of Prudence, Fortitude, Justice and Temperance. The first three spheres involve a deficiency of one of the cardinal virtues – the Moon, containing the inconstant, whose vows to God waned as the moon and thus lack fortitude; Mercury, containing the ambitious, who were virtuous for glory and thus lacked justice; and Venus, containing the lovers, whose love was directed towards another than God and thus lacked temperance. The final four incidentally are positive examples of the cardinal virtues, all led on by the Sun, containing the prudent, whose wisdom lighted the way for the other virtues, to which the others are bound (constituting a category on its own). Mars contains the men of fortitude who died in the cause of Christianity; Jupiter contains the kings of justice; and Saturn contains the temperate, the monks. The seven subdivided into three are raised further by two more categories: the eighth sphere of the fixed stars that contain those who achieved the theological virtues of faith, hope, and love, and represent the Church Triumphant – the total perfection of humanity, cleansed of all the sins and carrying all the virtues of heaven; and the ninth circle, or Primum Mobile (corresponding to the geocentricism of medieval astronomy), which contains the angels, creatures never poisoned by original sin. Topping them all is the Empyrean, which contains the essence of God, completing the nine-fold division to ten.

      Dante meets and converses with several great saints of the Church, including Thomas Aquinas, Bonaventure, Saint Peter, and St. John. Near the end, Beatrice departs and Bernard of Clairvaux takes over as the guide.[29] The Paradiso is more theological in nature than the Inferno and the Purgatorio. However, Dante admits that the vision of heaven he receives is merely the one his human eyes permit him to see, and thus Dante's personal vision.

      The Divine Comedy finishes with Dante seeing the Triune God. In a flash of understanding that he cannot express, Dante finally understands the mystery of Christ's divinity and humanity, and his soul becomes aligned with God's love:[30]

      But already my desire and my will were being turned like a wheel, all at one speed, by the Love which moves the sun and the other stars.[31]

    2. The Divine Comedy is composed of 14,233 lines that are divided into three cantiche (singular cantica) – Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise) – each consisting of 33 cantos (Italian plural canti). An initial canto, serving as an introduction to the poem and generally considered to be part of the first cantica, brings the total number of cantos to 100. It is generally accepted, however, that the first two cantos serve as a unitary prologue to the entire epic, and that the opening two cantos of each cantica serve as prologues to each of the three cantiche.[7][8][9] The number three is prominent in the work, represented in part by the number of cantiche and their lengths. Additionally, the verse scheme used, terza rima, is hendecasyllabic (lines of eleven syllables), with the lines composing tercets according to the rhyme scheme ABA BCB CDC DED ...[10] The total number of syllables in each tercet is thus 33, the same as the number of cantos in each cantica. Written in the first person, the poem tells of Dante's journey through the three realms of the dead, lasting from the night before Good Friday to the Wednesday after Easter in the spring of 1300. The Roman poet Virgil guides him through Hell and Purgatory; Beatrice, Dante's ideal woman, guides him through Heaven.[11] Beatrice was a Florentine woman he had met in childhood and admired from afar in the mode of the then-fashionable courtly love tradition, which is highlighted in Dante's earlier work La Vita Nuova.[12] The Cistercian abbot Bernard of Clairvaux guides Dante through the last three cantos.[13] .mw-parser-output .tmulti .multiimageinner{display:flex;flex-direction:column}.mw-parser-output .tmulti .trow{display:flex;flex-direction:row;clear:left;flex-wrap:wrap;width:100%;box-sizing:border-box}.mw-parser-output .tmulti .tsingle{margin:1px;float:left}.mw-parser-output .tmulti .theader{clear:both;font-weight:bold;text-align:center;align-self:center;background-color:transparent;width:100%}.mw-parser-output .tmulti .thumbcaption{background-color:transparent}.mw-parser-output .tmulti .text-align-left{text-align:left}.mw-parser-output .tmulti .text-align-right{text-align:right}.mw-parser-output .tmulti .text-align-center{text-align:center}@media all and (max-width:720px){.mw-parser-output .tmulti .thumbinner{width:100%!important;box-sizing:border-box;max-width:none!important;align-items:center}.mw-parser-output .tmulti .trow{justify-content:center}.mw-parser-output .tmulti .tsingle{float:none!important;max-width:100%!important;box-sizing:border-box;text-align:center}.mw-parser-output .tmulti .tsingle .thumbcaption{text-align:left}.mw-parser-output .tmulti .trow>.thumbcaption{text-align:center}}@media screen{html.skin-theme-clientpref-night .mw-parser-output .tmulti .multiimageinner img{background-color:white}}@media screen and (prefers-color-scheme:dark){html.skin-theme-clientpref-os .mw-parser-output .tmulti .multiimageinner img{background-color:white}}Dante's guides in the poemVirgilBeatriceSaint Bernard The structure of the three realms follows a common numerical pattern of 9 plus 1, for a total of 10. There are nine circles of the Inferno, followed by Lucifer contained at its bottom; nine rings of Mount Purgatory, followed by the Garden of Eden crowning its summit; and the nine celestial bodies of Paradiso, followed by the Empyrean containing the very essence of God. Within each group of nine, seven elements correspond to a specific moral scheme, subdivided into three subcategories, while two others of greater particularity are added to total nine. For example, the seven deadly sins that are cleansed in Purgatory are joined by special realms for the late repentant and the excommunicated. The core seven sins within Purgatory correspond to a moral scheme of love perverted, subdivided into three groups corresponding to excessive love (Lust, Gluttony, Greed), deficient love (Sloth), and malicious love (Wrath, Envy, Pride).[14] In central Italy's political struggle between Guelphs and Ghibellines, Dante was part of the Guelphs, who in general favoured the papacy over the Holy Roman Emperor. Florence's Guelphs split into factions around 1300 – the White Guelphs and the Black Guelphs. Dante was among the White Guelphs who were exiled in 1302 by the Lord-Mayor Cante de' Gabrielli di Gubbio, after troops under Charles of Valois entered the city, at the request of Pope Boniface VIII, who supported the Black Guelphs. This exile, which lasted the rest of Dante's life, shows its influence in many parts of the Comedy, from prophecies of Dante's exile to Dante's views of politics, to the eternal damnation of some of his opponents.[15] The last word in each of the three cantiche is stelle ("stars").

      The Divine Comedy is composed of 14,233 lines that are divided into three cantiche (singular cantica) – Inferno (Hell), Purgatorio (Purgatory), and Paradiso (Paradise) – each consisting of 33 cantos (Italian plural canti). An initial canto, serving as an introduction to the poem and generally considered to be part of the first cantica, brings the total number of cantos to 100. It is generally accepted, however, that the first two cantos serve as a unitary prologue to the entire epic, and that the opening two cantos of each cantica serve as prologues to each of the three cantiche.[7][8][9]

      The number three is prominent in the work, represented in part by the number of cantiche and their lengths. Additionally, the verse scheme used, terza rima, is hendecasyllabic (lines of eleven syllables), with the lines composing tercets according to the rhyme scheme ABA BCB CDC DED ...[10] The total number of syllables in each tercet is thus 33, the same as the number of cantos in each cantica.

      Written in the first person, the poem tells of Dante's journey through the three realms of the dead, lasting from the night before Good Friday to the Wednesday after Easter in the spring of 1300. The Roman poet Virgil guides him through Hell and Purgatory; Beatrice, Dante's ideal woman, guides him through Heaven.[11] Beatrice was a Florentine woman he had met in childhood and admired from afar in the mode of the then-fashionable courtly love tradition, which is highlighted in Dante's earlier work La Vita Nuova.[12] The Cistercian abbot Bernard of Clairvaux guides Dante through the last three cantos.[13]

      Dante's guides in the poem Virgil Virgil

      Beatrice

      Saint Bernard The structure of the three realms follows a common numerical pattern of 9 plus 1, for a total of 10. There are nine circles of the Inferno, followed by Lucifer contained at its bottom; nine rings of Mount Purgatory, followed by the Garden of Eden crowning its summit; and the nine celestial bodies of Paradiso, followed by the Empyrean containing the very essence of God. Within each group of nine, seven elements correspond to a specific moral scheme, subdivided into three subcategories, while two others of greater particularity are added to total nine. For example, the seven deadly sins that are cleansed in Purgatory are joined by special realms for the late repentant and the excommunicated. The core seven sins within Purgatory correspond to a moral scheme of love perverted, subdivided into three groups corresponding to excessive love (Lust, Gluttony, Greed), deficient love (Sloth), and malicious love (Wrath, Envy, Pride).[14]

      In central Italy's political struggle between Guelphs and Ghibellines, Dante was part of the Guelphs, who in general favoured the papacy over the Holy Roman Emperor. Florence's Guelphs split into factions around 1300 – the White Guelphs and the Black Guelphs. Dante was among the White Guelphs who were exiled in 1302 by the Lord-Mayor Cante de' Gabrielli di Gubbio, after troops under Charles of Valois entered the city, at the request of Pope Boniface VIII, who supported the Black Guelphs. This exile, which lasted the rest of Dante's life, shows its influence in many parts of the Comedy, from prophecies of Dante's exile to Dante's views of politics, to the eternal damnation of some of his opponents.[15]

      The last word in each of the three cantiche is stelle ("stars").

    1. An AI-Powered Speech Processing Toolkit and Open Source SOTA Pretrained Models, Supporting Speech Enhancement, Separation, and Target Speaker Extraction, etc.

      Another annotation

    1. Let's make it a page note

      Lorem Ipsum es simplemente el texto de relleno de las imprentas y archivos de texto. Lorem Ipsum ha sido el texto de relleno estándar de las industrias desde el año 1500, cuando un impresor (N. del T. persona que se dedica a la imprenta) desconocido usó una galería de textos y los mezcló de tal manera que logró hacer un libro de textos especimen. No sólo sobrevivió 500 años, sino que tambien ingresó como texto de relleno en documentos electrónicos, quedando esencialmente igual al original. Fue popularizado en los 60s con la creación de las hojas "Letraset", las cuales contenian pasajes de Lorem Ipsum, y más recientemente con software de autoedición, como por ejemplo Aldus PageMaker, el cual incluye versiones de Lorem Ipsum.

    2. Note: it's okay to use some # pragma: no cover's to get make test coverage to pass if there are some parts of the code that are too awkward or not worthwhile to write tests for. Our approach to unittests is that we enforce 100% coverage but are pragmatic about using # pragma: no cover to get there if necessary. Note: the code in this project was hacked together without a lot of care. You might find that you have to refactor it in order to make it unit-testable. You might find it helpful to write functests first (there's a separate issue for those: #7) as these will enable large-scale refactorings with confidence.Create sub-issue

      Note: it's okay to use some # pragma: no cover's to get make test coverage to pass if there are some parts of the code that are too awkward or not worthwhile to write tests for. Our approach to unittests is that we enforce 100% coverage but are pragmatic about using # pragma: no cover to get there if necessary.

      Note: the code in this project was hacked together without a lot of care. You might find that you have to refactor it in order to make it unit-testable. You might find it helpful to write functests first (there's a separate issue for those: #7) as these will enable large-scale refactorings with confidence.

    3. slack-annotations doesn't have any unittests: when you run make test (which is an alias for tox, which is an alias for tox -e tests) or when you open a PR and CI runs on GitHub Actions, it runs the tests in tests/unit/slack_annotations/ but those consist of only a couple of placeholder tests: There's test_help() and test_version(). These are actually real unit tests for the --help and --version command-line arguments, but nothing else in cli.py is tested. And there's test_it() which is just a placeholder test for core.py. It would be good to fill this out with proper unittests. Note that slack-annotations makes HTTP requests to the Hypothesis API. We don't want it to make real HTTP requests when you run the functests. Since slack-annotations uses HTTPX to send HTTP requests we may be able to use something like pytest-httpx or respx. Done when

      slack-annotations doesn't have any unittests: when you run make test (which is an alias for tox, which is an alias for tox -e tests) or when you open a PR and CI runs on GitHub Actions, it runs the tests in tests/unit/slack_annotations/ but those consist of only a couple of placeholder tests:

      There's test_help() and test_version(). These are actually real unit tests for the --help and --version command-line arguments, but nothing else in cli.py is tested. And there's test_it() which is just a placeholder test for core.py. It would be good to fill this out with proper unittests.

      Note that slack-annotations makes HTTP requests to the Hypothesis API. We don't want it to make real HTTP requests when you run the functests. Since slack-annotations uses HTTPX to send HTTP requests we may be able to use something like pytest-httpx or respx.

    4. slack-annotations doesn't have any unittests: when you run make test (which is an alias for tox, which is an alias for tox -e tests) or when you open a PR and CI runs on GitHub Actions, it runs the tests in tests/unit/slack_annotations/ but those consist of only a couple of placeholder tests: There's test_help() and test_version(). These are actually real unit tests for the --help and --version command-line arguments, but nothing else in cli.py is tested. And there's test_it() which is just a placeholder test for core.py. It would be good to fill this out with proper unittests. Note that slack-annotations makes HTTP requests to the Hypothesis API. We don't want it to make real HTTP requests when you run the functests. Since slack-annotations uses HTTPX to send HTTP requests we may be able to use something like pytest-httpx or respx. Done when

      Huge annotation