Skip to main content

Political Colors of noise charge within Just War Theory upon Texas Independence Day

Kardashev scale

Cyberwarfare

Air gap (networking)

lattice paths and ballot numbers

Stuxnet

Lobb Number

Lobb number

Ballot counting

The combinatorics of parentheses is replaced with counting ballots in an election with two candidates in Bertrand's ballot theorem, first published by William Allen Whitworth in 1878. The theorem states the probability that winning candidate is ahead in the count, given known final tallies for each candidate. 
 
Cognitive load theory was developed in the late 1980s out of a study of problem solving by John Sweller

A random walk is a mathematical object, known as a stochastic or random process, that describes a path that consists of a succession of random steps on some mathematical space such as the integers.

Economic Policy Institute
The Color of Law: A Forgotten History of How Our Government Segregated America
Book • By Richard Rothstein • 2017

What is the Minkowski distance?

The Minkowski distance is a metric in a normed vector space which can be considered as a generalization of both the Euclidean distance and the Manhattan distance:

Taxicab geometry

Random walk in a color of law case

By David Vincent Bell Hirsch

By David Vincent Bell Hirsch

India explores setting up rupee trade accounts with Russia to soften sanctions blow - sources

India is walking a tightrope between Ukraine and Russia

Vrindavan story: Why Lord Krishna Wears Peacock Feather on His Head?

In animism, people believe that living things, inanimate objects and natural phenomena all have a living soul. In totemism, a group of people consider a physical being like a plant or animal as sacred and make it their emblem. Both totemism and animism are aspects of religion, especially seen in smaller communities like tribes and clans. However, we can also observe these features in some popular modern religions.

A feather in your cap

The Pied Piper of Hameln

and related legends from other towns

According to Jainism every act by which a person directly or indirectly supports killing or injury is violence (himsa), which creates harmful karma. The aim of ahimsa is to prevent the accumulation of such karma. … Jains believe that all animals, plants, and human beings contain living souls

Karni Mata Temple[1] (Hindi: करणी माता मंदिर) is a Hindu temple dedicated to Karni Mata at Deshnoke, 30 km from Bikaner, in Rajasthan, India. It is also known as the Temple of Rats.

The temple is famous for the approximately 25,000 black rats that live, and are revered, in the temple. These holy rats are called kabbas, and many people travel great distances to pay their respects. The temple draws visitors from across the country for blessings, as well as curious tourists from around the world.[2]

Kamadhenu, the miraculous "cow of plenty" and the "mother of cows" in certain versions of the Hindu mythology, is believed to represent the generic sacred cow, regarded as the source of all prosperity. In the 19th century, a form of Kamadhenu was depicted in poster-art that depicted all major gods and goddesses in it.
 
What's your beef?
Beefeater is a term often used to refer to the Yeomen Warders of the Tower of London, but originally referring to the Yeomen of the Guard.
Pantera, (Pandera data analyst fans) was an American heavy metal band from Arlington, Texas, formed in 1981. Russian submarine Pantera (K-317), a nuclear-powered attack submarine.

The True Story of the Russian Kursk Submarine Disaster

A navy fleet exercise became a desperate race to recover survivors hundreds of feet beneath the sea.

HOLY COW!

Pandora Papers

Pandera: A Statistical Data Validation Toolkit for Pandas

Pandera is a a flexible and expressive toolkit for performing statistical validation checks on pandas data structures that was recently accepted into the pyOpenSci ecosystem. Learn more about Pandera.

Choose and configure columns in model-driven app views

Method chaining

A tutorial for the best practice with Pandas Method Chaining

Python Type Checking (Guide)

pandas: powerful Python data analysis toolkit  

Refactor your code to make it more understandable

I would rather read binary and bleed from my eyes

Functions — reusable blocks of code

Conjunction, junction, what's your function? 

Maslenitsa

Maslenitsa (Belarusian: Масленіца, Russian: Мaсленица, Rusyn: Fašengy, Ukrainian: Масниця; also known as Butter Lady, Butter Week, Crepe week, or Cheesefare Week) is an Eastern Slavic religious and folk holiday, which has retained a number of elements of Slavic mythology in its ritual, celebrated during the last week before Great Lent, that is, the eighth week before Eastern Orthodox Pascha.

The date of Maslenitsa changes every year depending on the date of the celebration of Easter. It corresponds to the Western Christian Carnival, except that Orthodox Lent begins on a Monday instead of a Wednesday, and the Orthodox date of Easter can differ greatly from the Western Christian date.

The traditional attributes of the Maslenitsa celebration are the Maslenitsa effigy, sleigh rides, festivities. Russians bake bliny and flatbread, while Belarusians and Ukrainians cook pierogi and syrniki.

Great Lent 2022 will begin on
Monday
,
March 7
and ends on
Saturday
,
April 23

Come Clean Monday, Dynamic Programing Scheduling (computing) for Easter Monday as Quantum biology with Word and Actor Model within Roosevelt Corollary and Latin America with Roosevelt's quarantine speech: Copper Borromean rings Game Theory of Pifithrin-α, p53 down Kissing stem-loop research of COVID-19

By David Vincent Bell Hirsch 
A dataframe validation library for scientists, engineers, and analysts seeking correctness.

Just war theory

Augustine asserted that this was a personal, philosophical stance: "What is here required is not a bodily action, but an inward disposition. The sacred seat of virtue is the heart."

Russian Orthodox Church and just war

The War and Peace section in the Basis of the Social Concept of the Russian Orthodox Church is crucial for understanding the Russian Orthodox Church's attitude towards war. The document offers criteria of distinguishing between an aggressive war, which is unacceptable, and a justified war, attributing the highest moral and sacred value of military acts of bravery to a true believer who participates in a justified war. Additionally, the document considers the just war criteria as developed in Western Christianity eligible for Russian Orthodoxy, so the justified war theory in Western theology is also applicable to the Russian Orthodox Church.[33]

In the same document, it is stated that wars have accompanied human history since the fall of man; according to the gospel, they will continue to accompany it. While recognizing war as evil, the Russian Orthodox Church does not prohibit her members from participating in hostilities if there is the security of their neighbors and the restoration of trampled justice at stake. War is considered to be necessary but undesirable. It is also stated that the Russian Orthodox Church has had profound respect for soldiers who gave their lives to protect the life and security of their neighbors.[34] 

Evil is the absence or lack ("privation") of good. It is typically attributed to St. Augustine of Hippo, who wrote: ... Just in the same way, what are called vices in the soul are nothing but privations of natural good.

Elvira Nabiullina, noted for her symbolic outfits, wore funereal black when announcing the economic response to sanctions

India condemns killings in Ukraine's Bucha in apparent hardening of stance

Beginners Guide to Pyjanitor – A Python Tool for Data Cleaning

This article deals with an overview of what pyjanitor is, how it works and a demonstration of using this package to clean dirty data.

EXPLAINER: How dangerous was Russia’s nuclear plant strike?

Mother Russia (disambiguation)

Personification of Russia

Like all novel experiments, the group punishment of Russia is a leap into the unknown.

Logical framework approach

Necessity is the mother of invention

Cognitive-cultural economy

Ahh, this coffee is giving me an anxiety attack the celebrity daughter says... "major esophageal irritator and reflux trigger for me," Ireland Baldwin confessed. Grody to the max, For Sure.

Rust Programming Language

RxJS Tutorial

RxJS is a JavaScript library that uses observables to work with reactive programming that deals with asynchronous data calls, callbacks and event-based programs. RxJS can be used with other JavaScript libraries and frameworks. It is supported by JavaScript and also with typescript.

Prescription strength Java?
public class Prescription extends java.lang.Object. This class represents a typical prescription.

RxJS

Reactive Extensions Library for JavaScript

Sure to get a reaction,

/ RxPY Public

Primitive Data Types

Type factory

Primitive data type vs. Object data type in Java with Examples

Physician champions’ perspectives and practices on electronic health records implementation: challenges and strategies

Boys Don't Cry

stuffed shirt
a conservative, pompous person.


German and English Patriarch position:

English is a Germanic language

It is estimated that more than a third of English non-technical lexicons are of Germanic origin, as are many English words. Furthermore, the modern languages have both loaned words from Latin, Greek and French.

Cultural Differences in Emotion Suppression in Belgian and Japanese Couples: A Social Functional Model

neural networks

Will Transformers Take Over Artificial Intelligence?

A simple algorithm that revolutionized how neural networks approach language is now taking on vision as well. It may not stop there. 

Transformers (film series) ?

Transformer (power)?

Transformer (spirit-being), an indigenous tradition of the Pacific Northwest of North America...

More than meets the eye,

How to (Actually) Change Someone’s Mind

Aerial bombardment and international law

Zeolite in Nuclear Remediation Cleanup and Spills 

Dysfunctional leaders' mindsets attune them to mishandling situations and making subpar decisions, while simultaneously leading them to believe they've taken the best course of action.

Predictably Irrational

Irrational number

Dan Ariely on 10 Irrational Human Behaviors

Linking Human And Machine Behavior: A New Approach
to Evaluate Training Data Quality for Beneficial Machine
Learning

Thilo Hagendorff1

Behavior selection algorithm

Implications of Human Irrationality for Reinforcement Learning

Who invented irrational numbers, janitor of irrational numbers?

Hippasus

Hippasus is credited in history as the first person to prove the existence of 'irrational' numbers. His method involved using the technique of contradiction, in which he first assumed that 'Root 2' is a rational number. He then went on to show that no such rational number could exist.
 
Emmanuel M. Pothos *, Oliver J. Waddup, Prince Kouassi and James M. Yearsley

TRUTH AND PROBABILITY (1926)

& "Further Considerations" (1928) & "Probability and Partial Belief" (1929)
by
Frank P. Ramsey

Dutch book

This article is about gambling. There is also concepts in probability theory from mathematics as well finance and economics:

What are Factor Graphs?

Why should you care about sampling if you are a machine learning practitioner

Gödel's ontological proof is a formal argument by the mathematician Kurt Gödel (1906–1978) for the existence of God.

Gödel's ontological proof

OMG!

Conway-Kochen free will theorem

Anything possible?
Quantum Factor Graphs  

conda-forge / packages / pyjanitor 0.22.0

Bartolomé de las Casas

Shiva Tandava Stotra 

Tandava

Mistrust runs deep between the nuclear-armed neighbors, but Pakistan had a low-key response to what India called a “technical malfunction.” No casualties were reported.

The Infinite Reach of Joel Kaplan, Facebook’s Man in Washington

How one man came to rule political speech on Facebook, command one of the largest lobbies in DC, and guide Zuck through disaster—and straight into it.

Deep Learning Is Hitting a Wall

What would it take for artificial intelligence to make real progress?

The ancient guide for uncertain times

In mathematics, in particular in knot theory, the Conway knot (or Conway's knot) is a particular knot with 11 crossings, named after John Horton Conway.[2]

It is related by mutation to the Kinoshita–Terasaka knot,[3] with which it shares the same Jones polynomial.[4][5] Both knots also have the curious property of having the same Alexander polynomial and Conway polynomial as the unknot.[6]

The issue of the sliceness of the Conway knot was resolved in 2020 by Lisa Piccirillo, 50 years after John Horton Conway first proposed the knot.[6][7][8] Her proof made use of Rasmussen's s-invariant, and showed that the knot is not a smoothly slice knot, though it is topologically slice (the Kinoshita–Terasaka knot is both).[9]

Classifying and Applying Rational Knots and Rational Tangles

Louis H. Kauffman and Sofia Lambropoulou

Quantum entanglement

Quantum social science

The social aspects of quantum entanglement

Good Okie Boy Scout technology!

Knot (mathematics)

With help from spaghetti and color-changing fibers, a new mathematical model predicts a knot’s stability.

Jennifer Chu | MIT News Office
On the Classification of Rational Knots
 
Schubert's Theorem in Knot Theory says that any knot can be uniquely decomposed as the connected sum of prime knots
Knot Factoring
Michael C. Sullivan
Southern Illinois University Carbondale

I am networking academics as a SBIR pitching open source open problem networking solutions doing business as Serenity Sells.

An open loop is a control loop that has an absence of feedback.

Open-loop or open loop may also refer to:

  • Open-loop controller, a system controller that does not use feedback
  • Open-loop model, a model studied in game theory in which players cannot observe the actions of other players
  • Control system, a system for controlling a signal or process that may operate with an open or closed feedback loop
  • Control theory, the theory of control systems, which involves the analysis of feedback loops

Closed loop

Knot loop, a structure used to tie knots

Prime knot

prime numbers

A Chemist Shines Light on a Surprising Prime Number Pattern

When a crystallographer treated prime numbers as a system of particles, the resulting diffraction pattern created a new view of existing conjectures in number theory.
Let us be inclusive networking solutions:

How The Inca Used Knots To Tell Stories

Silvia Ferrara on Quipu, the Ancient Technique of Communicating With Cord

Business & Economy

Moving in with other adults has become a lifeline for single moms hit ‘tenfold’ by the pandemic

Single mothers, who have lost jobs at a higher rate than married parents, are turning to cohabitation as a way to get through the pandemic, get child care support and weather rising rents. Many are moving in with family, friends or other single moms.

Quipu

Did you knot hear?
 

Jerk (physics)

Color charge

Color charge is a property of quarks and gluons that is related to the particles' strong interactions in the theory of quantum chromodynamics (QCD).

The "color charge" of quarks and gluons is completely unrelated to the everyday meaning of color. The term color and the labels red, green, and blue became popular simply because of the loose analogy to the primary colors. Richard Feynman referred to his colleagues as "idiot physicists" for choosing the confusing name.

Color Force

Strong interaction

The Four Color Theorem

Idiot physicist colorful characters

In mathematics, the four color theorem, or the four color map theorem, states that, given any separation of a plane into contiguous regions, producing a figure called a map, no more than four colors are required to color the regions of the map so that no two adjacent regions have the same color

Quantum jump from Frog Texas for Liberty Lunch, hold the octonions

Energy scales in physics

A Horn clause is a clause (a disjunction of literals) with at most one positive, i.e. unnegated, literal. Conversely, a disjunction of literals with at most one negated literal is called a dual-Horn clause.

Force, Mass & Acceleration: Newton's Second Law of Motion

Changes in energy stores

Energy transfers

Systems and stores

A scalar or scalar quantity in physics is a physical quantity that can be described by a single element of a number field such as a real number, often accompanied by units of measurement. A scalar is usually said to be a physical quantity that only has magnitude, possibly a sign, and no other characteristics

Conservation of energy

de Sitter space

Mechanical equivalent of heat

Absolute Temperature Scale

Sun Tzu (mathematician)

His interests were in astronomy. He tried to develop a calendar and for this he investigated Diophantine equations. He is best known for authoring Sun Tzu Suan Ching (pinyin: Sun Zi Suan Jing; literally, "Sun Tzu's Calculation Classic"), which contains the Chinese remainder theorem 

Entropy (order and disorder)

 
Pyjanitor

Conservation of mass

Power (physics)

Mechanical power

 

Combustion reactions

Momentum

In terms of an equation, the momentum of an object is equal to the mass of the object times the velocity of the object. where m is the mass and v is the velocity. The equation illustrates that momentum is directly proportional to an object's mass and directly proportional to the object's velocity.

Bernoulli's equation

Ricci curvature tensor

Ideal gas law

Bernoulli's principle

Kinetic theory of gases

Kinetic Theory

Convective momentum transport 

In it's Scalar form, Coulomb's law is identical to Newton's law of Gravity:

Coulomb's law

Reaction coordinate

Tension (physics)

Tensor

Quantum field theory

Emergence of Riemannian geometry and the massive graviton

and
Book by Richard Feynman

Tensor product of modules 

GCSE Science/Current, voltage resistance and Ohm's law 

Newton's law of universal gravitation

Bimetric gravity

Stress–energy tensor

Massive gravity

Dark fluid

Gravitational wave

Massive gravitons as dark matter and gravitational waves

R-parity

Neutrino Signals from Gravitino Dark
Matter with Broken R-Parity

  Electric field

 Perlin noise

Fractal cosmology

Spin glass

In condensed matter physics, a spin glass is a model of a certain type of magnet.

Spin ice

A spin ice is a magnetic substance that does not have a single minimal-energy state. It has magnetic moments (i.e. "spin") as elementary degrees of freedom which are subject to frustrated interactions.

Absolute zero

Thermodynamic temperature

Heat capacity

Specific heat capacity

Heat capacity formula

The formula for specific heat looks like this:

c = Q / (mΔT)

Q is the amount of supplied or subtracted heat (in joules), m is the mass of the sample, and ΔT is the difference between the initial and final temperatures. Heat capacity is measured in J/(kg·K).

The heat capacity is equal to the energy input to the system divided by the temperature change

The British Scientist James Joule used this apparatus in his now classic paddle-wheel experiment. Falling weights turned the paddles to churn water; the churning raised the water's temperature slightly, and Joule found that the temperature rise was in direct proportion to the amount of work done by the falling weights.

Atmospheric pressure

potential energy equals heat transferred

Scientific notation

Scientific Notation Calculator

Joule's water friction apparatus, 1843.

The experimental aparatus used by James Joule (1818-1889), who proved that energy cannot be created or destroyed, but can only change in form. This idea is now known as the Conservation of Energy. Joule’s experiment consisted of a brass paddle wheel stirring water in a copper vessel. The paddle wheel was turned by falling weights possessing mechanical, or kinetic, energy as they fell. The temperature of the water rose by an amount that depended on how far the weights fell. This showed that the kinetic energy of the weights now existed as heat energy in the water. Joule's experiments also proved that heat is produced by motion, contradicting the caloric theory. The SI unit of energy, the Joule, was named after him.

Flow measurement

Conservation of energy

Temperature Change and Heat Capacity

Gravitational Potential Energy

Energy comes in two forms; organized and disorganized. Organized energy has the potential to be activated (it is being stored). Disorganized energy is the energy of motion. In all natural processes some organized energy is always converted to disorganized energy.

Energy is transfered when work is done

Vampires from Romania... to keep Austin weird... with story telling Spiders from African folklore singing Griots in petitions:
Wolfman Howls for Frankenstein Committee pitch for Circuits of America jumping ethical Spider House proposals of Spider derby Opportunity Costs as
2906 Fruth St, Austin, TX 78705
Is France called the motherland?
 
A motherland refers to the symbolic maternal figurehead of a country, or the metropole (e.g. Mother Russia, in reference to the other 'children' Soviet countries, or as the motherland of the Rus people). Examples of maternal national personification include: France (Marianne)

Marianne

Marianne France
The Marianne is a symbol of the French Republic since the French revolution in 1789 to 1799. She is the figure representing the slogan “Liberty, Equality et Fraternity”. In the 18th century the names Marie and Anne have been very popular.
The term fatherland (Vaterland) is used throughout German-speaking Europe, as well as in Dutch.

Father's make their Marks!

SS Leviathan

Then Dracula from Romania, Transylvania and the Roman Holy War for the World War II

Roman-Dacian WarsTransylvania research 

First Dacian War

Trajan's Dacian Wars


This is very importan research dad. We are talking about trade with Japan with Werewolf Games.

Legions of the Dacian Wars

We are talking about Werewolfs, Dracula and Frankenstein pop culture and trade with Japan and Pacific strategy development for European theater

String (physics)

String galvanometer

String graph

String group

strings (Unix)

Ahh, I am so strung out keeping Austin weird
Strings attached?

Let us observe the model unravel...

Data Structures

Multitape Turing machine

A tape diagram is a rectangular visual model resembling a piece of tape, that is used to assist with the calculation of ratios and addition, subtraction, and commonly multiplication. It is also known as a divided bar model, fraction strip, length model or strip diagram.

Magma (computer algebra system)

Finite element method

The structure of finite element methods

Galerkin method

In mathematics, in the area of numerical analysis, Galerkin methods, named after the Russian mathematician Boris Galerkin, convert a continuous operator problem, such as a differential equation, commonly in a weak formulation, to a discrete problem by applying linear constraints determined by finite sets of basis functions.

Mathematical Methods in Computer Science
Lecture 6: Communication Complexity
Lecturer: Boaz Barak
Scribes: Aditya Bhaskara and Siddhartha Sen

Fracton (subdimensional particle)

Gravitational field

In particle physics, a gauge boson is a force carrier, a bosonic particle that carries any of the fundamental interactions of nature, commonly called forces.

Gabriel's Horn: or Torricelli's trumpet, Spin Ice Perlin noise from the Live Music Capital of the World. 

Bright Week

Bright Week 2022 will begin on
Sunday
,
April 24
and ends on
Saturday
,
April 30

Lord Krishna says to Arjuna, "plunge into the heat of battle and keep your heart at the lotus feet of the lord" PSNS autonomic nervous system is responsible for regulating the body's unconscious actions

"Plank" is the term often given to the components of the political platform – the opinions and viewpoints about individual topics, as held by a party, person, or organization.

Saint Thomas Aquinas

In Summa Theologica Aquinas asserted that it is not always a sin to wage war and set out criteria for a just war. According to Aquinas, three requirements must be met: First, the war must be waged upon the command of a rightful sovereign. Second, the war needs to be waged for just cause, on account of some wrong the attacked have committed. Thirdly, warriors must have the right intent, namely to promote good and to avoid evil.[26] Aquinas came to the conclusion that a just war could be offensive and that injustice should not be tolerated so as to avoid war. Nevertheless, Aquinas argued that violence must only be used as a last resort. On the battlefield, violence was only justified to the extent it was necessary. Soldiers needed to avoid cruelty and a just war was limited by the conduct of just combatants. Aquinas argued that it was only in the pursuit of justice, that the good intention of a moral act could justify negative consequences, including the killing of the innocent during a war.

Ukraine invasion live updates: March 4

Pi Day

Cantor Dust

pandas-profiling

Python for Data Analysis: Data Wrangling with Pandas, NumPy, and IPython

FunctionWrapper is a design pattern used when dealing with relatively complicated functions. The wrapper function typically performs some prologue and epilogue tasks like

Putting a Wrapper Around a Function

functools — Higher-order functions and operations on callable objects

Programming with dplyr

pyjanitor: Clean APIs for Cleaning Data | SciPy 2019 | Eric Ma

Mirror Neurons After a Quarter Century: New light, new cracks

If understanding AI ever scared you, don’t worry it’s not so bad!

AI vs. Machine Learning vs. Deep Learning vs. Neural Networks: What’s the Difference?

A Beginner's Guide to Neural Networks and Deep Learning

Observables

Pandera Labs

Tidy data

There are three rules which make a dataset tidy:

  1. Each variable must have its own column.
  2. Each observation must have its own row.
  3. Each value must have its own cell.

Data Cleaning & Tidying

A must-know concept for Data Scientists.

Introduction to Tidy Data in R

Tidy data

Data tidying

Ty-D-Bol

November 19, 2022
November 19 was designated as World Toilet Day by the United Nations General Assembly, and is coordinated every year by a partnership between UN-Water and governments around the world.

pandas ecosystem

IT is not done until the paperwork is done.

Finance

Finance-specific data cleaning functions.

/ data-wrangling-blog

Code Reuse: Functions and Modules

Introduction to Data Cleaning with Pyjanitor

pyjanitor

Python’s Pandas vs R’s Tidyverse: Who Wins?

Wrangling Pandas with Pandas Flavor

Quark

There are six types, known as flavors, of quarks: up, down, charm, strange, top, and bottom. Up and down quarks have the lowest masses of all quarks.

pandera.typing

Data Synthesis Strategies

pandera.hypotheses.Hypothesis

Falsifiability

Floating-point arithmetic

Boolean data type

R

Boolean data types

Boolean data type in Python

PostgreSQL Boolean Type

Gradual typing

Gradual typing in Python

cron

The Theory of Type Hints

Duck typing

Duck, Duck, Goose Chase

Flowtron「Tickle My Dolphin」(1999)

Level of measurement

Fastest Growing Occupations

Costume attendants

44% Growth Rate 44%

$42,910 per year
Where is my monkey suit? Seriously, make-up artists and costume attendants are some of the fastest growing occupations as well as motion picture projectionists.

Fastest declining occupations

Nuclear power reactor operators

51-8011

5.3

3.6

-1.8

-32.9

$104,040

Guess what Homer Simpson? Nuclear power reactor operators are some of the fastest declining occupations in the United States. Word processors and typists, parking enforcement workers and nuclear power reactor operators are projected to be the fastest declining occupations in the US in the next 10 years, according to new analysis from the Bureau of Labor Statistics

Strong and weak typing

Cloud Native Computing Foundation

On the other hand, publicans were despised Jews who collaborated with the Roman Empire. Because they were best known for collecting tolls or taxes (see tax farming), they are commonly described as tax collectors. ... Coming to God in humility, the publican receives the mercy and reconciliation he asks for.

Pharisee and the Publican

Purusha

Purusha (puruṣa or Sanskrit: पुरुष) is a complex concept[1] whose meaning evolved in Vedic and Upanishadic times. Depending on source and historical timeline, it means the cosmic being or self, consciousness, and universal principle.

Prakṛti

Prakriti or Prakruti (Sanskrit: प्रकृति IAST: prakṛti) is "the original or natural form or condition of anything, original or primary substance".[1] It is a key concept in Hinduism, formulated by its Sāṅkhya school, where it does not refer to matter or nature, but "includes all the cognitive, moral, psychological, emotional, sensorial and physical aspects of reality," stressing "prakṛti's cognitive, mental, psychological and sensorial activities."[2] Prakriti has three different innate qualities (guṇas), whose equilibrium is the basis of all observed empirical reality.[3][4] Prakriti, in this school, contrasts with Puruṣa, which is pure awareness and metaphysical consciousness.[3] The term is also found in the texts of other Indian religions such as Jainism,[5] and Buddhism.[6]

In Indian languages derived from Sanskrit roots, Prakriti refers to the feminine aspect of all life forms, and more specifically a woman is seen as a symbol of Prakriti.[7]

Anima - Mania, a five lettered anagram. Pretend play is a form of symbolic play where children use objects, actions or ideas to represent other objects, actions, or ideas using their imaginations to assign roles to inanimate objects or people.

Make believe 

Scientific control

Artificial Intelligence and Spiritual Life

The Age of Spiritual Machines

Problem-solving capacities of spiritual intelligence for artificial intelligence

Yantras are used for the worship of deities in temples or at home; as an aid in meditation; used for the benefits given by their supposed occult powers based on Hindu astrology and tantric texts. They are also used for adornment of temple floors, due mainly to their aesthetic and symmetric qualities.
literally "machine, contraption"

Yantras are used for the worship of deities in temples or at home; as an aid in meditation; used for the benefits given by their supposed occult powers based on Hindu astrology and tantric texts. They are also used for adornment of temple floors, due mainly to their aesthetic and symmetric qualities.
In Hinduism, Lord Shiva is often shown wearing a crescent moon on his head symbolising that the lord is the master of time and is himself timeless. It is used as the astrological symbol for the Moon, and hence as the alchemical symbol for silver. It was also the emblem of Diana/Artemis, and hence represented virginity.

Crescent

 
moon crescent
“The symbol of the sacral chakra is a moon crescent, which represents the relationship between the tides of water and the phases of the moon.” In Sanskrit, Svadihsthana means “where your being is established.”
What is all this litter doing on the moon St. Francis and Woodsy the Owl? Sure would be a shame to pollute or harm the moon that God made.

The Spaceships of Ezekiel

Snake Oil selling Rocky Balboa
Vāsuki is a serpent king in Hindu and Buddhist religion. He is described as having a gem called Nagamani on his head. Manasa, another naga, is his sister. Vāsuki is Shiva's snake.

Parables (משלים) of Messiah

The Frequency of the Earth-Year

Tone:             136.10 Hz = C#

"OM" is the frequency of the Earth cycling one year.

Essential dignity

Cymatics

Mandala

Sanatana Dharma, Hinduism exhumed and resurrected, Part 39 – Capt Ajit Vadakayil

Kippah

The letter KOOF ק equals the number one hundred in the Hebrew alphabet, signifying the completion of living matter. Qoph is associated with the sign Pisces assigned to the Moon card. It means "back of head" or the unconscious part of the brain.

How to map the brain

Vagus Nerve as Modulator of the Brain–Gut Axis in Psychiatric and Inflammatory Disorders

(What is business vision?)

The third eye (also called the mind's eye, or inner eye) is a mystical and esoteric concept of a speculative invisible eye, usually depicted as located on the forehead, which provides perception beyond ordinary sight.

In the Hebrew Bible, the coat of many colors (Hebrew: כְּתֹנֶת פַּסִּיםketonet passim) is the name for the garment that Joseph owned, which was given to him by his father, Jacob.
Of all the nerves in Las Vegas, Nevada!

sex, drugs, gambling, and other activities with a hit of dopamine

"Separation of church and state" is paraphrased from Thomas Jefferson and used by others in expressing an understanding of the intent and function of the Establishment Clause and Free Exercise Clause of the First Amendment to the United States Constitution which reads: "Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof..."

Between the states of Texas and Nevada may lie some dormant regions that may awaken...
Histaminergic means "working on the histamine system", and histaminic means "related to histamine".
What states made up the cotton belt?

Once confined to the pre-Civil War South, the Cotton Belt was pushed west after the war. Today it extends primarily through North and South Carolina, Georgia, Alabama, Mississippi, western Tennessee, eastern Arkansas, Louisiana, eastern Texas, and southern Oklahoma.

In terms of yoga practice, tejas is considered a type of intense inner power that can be used to discover a deeper and more spiritual side to yoga.
This principle is known as the Hebbian learning rule (1): i.e., if interconnected neurons become active very close in time during a particular event, their connection strengthens and “a memory” of this event is formed (1). In other words, “neurons wire together, if they fire together” (2)
Who said neurons that fire together wire together?

Hebb

They write: 'Hebb famously said that “Cells that fire together, wire together” and, more formally, “any two cells or systems of cells that are repeatedly active at the same time will tend to become 'associated,' so that activity in one facilitates activity in the other”.

Hebbian theory

Corticostriatal circuitry
Ribbon Crystals
twistronics
I'm a going to a invent me one of them
topological quantum computers


Svadhisthana, also called the sacral chakra, is the second primary chakra according to Hindu Tantrism. This chakra is said to be blocked by fear, especially the fear of death. Opening this chakra can boost creativity, manifested desire and confidence.
Elements: water

Sahasrara or the crown chakra is considered the seventh primary chakra in some yoga traditions.

Brain Cells for Socializing

Does an obscure nerve cell help explain what gorillas, elephants, whales—and people—have in common?

In Bonobos Yawn Contagion Is Higher among Kin and Friends

Plasticity of the connectome

Microscale rewiring

Microscale rewiring is the formation or removal of synaptic connections between two neurons and can be studied with longitudinal two-photon imaging. Dendritic spines on pyramidal neurons can be shown forming within days following sensory experience and learning.[42][43][44] Changes can even be seen within five hours on apical tufts of layer five pyramidal neurons in the primary motor cortex after a seed reaching task in primates.

Wednesday
,
March 2
Texas Independence Day 2022

Charlie Chan - Dangerous Money

Happy birthday niece Ava Pearl Gray, here is Charlie Chan in Dangerous Money, a movie your grandmother enjoyed.

Expressions

How do you do and condition in Python?
 
In the following example, we will use and operator to combine two basic conditional expressions in boolean expression of Python If-Else statement. a = 3 b = 2 if a==5 and b>0: print('a is 5 and',b,'is greater than zero. ') else: print('a is not 5 or',b,'is not greater than zero. ')

How to use AND Operator in Python IF?

Create your first ETL Pipeline in Apache Spark and Python

Currency pair

A currency pair is the dyadic quotation of the relative value of a currency unit against the unit of another currency in the foreign exchange market. The currency that is used as the reference is called the counter currency, quote currency, or currency[1] and the currency that is quoted in relation is called the base currency or transaction currency.

Currency pairs are generally written by concatenating the ISO currency codes (ISO 4217) of the base currency and the counter currency, and then separating the two codes with a slash. Alternatively the slash may be omitted, or replaced by either a dot or a dash. A widely traded currency pair is the relation of the euro against the US dollar, designated as EUR/USD. The quotation EUR/USD 1.2500 means that one euro is exchanged for 1.2500 US dollars. Here, EUR is the base currency and USD is the quote currency (counter currency). This means that 1 Euro can be exchangeable to 1.25 US Dollars.

The most traded currency pairs in the world are called the Majors. They involve the currencies euro, US dollar, Japanese yen, pound sterling, Australian dollar, Canadian dollar, and the Swiss franc.

Tuples Class

Tuples in Python

Python Compound statements

Tuple (Database)

Use the BigQuery connector with Spark

Using Spark as an ETL tool for moving data from Hive tables to BigQuery

Insert or delete rows and columns

What is a modulo operator (%) in Python?

With easy to understand examples for beginners! 

Preprocessing BigQuery Data with PySpark on Dataproc

Python if else

Transpose (rotate) data from rows to columns or vice versa

Create a list based on a spreadsheet

/ spark-bigquery-connector 

Create an in-cell dropdown list

Create drop-down lists in a cell with Google Sheets.

Google Sheets function list 

Using arrays in Google Sheets

We may address this issue together to address the health of our community.

APD: 2 dead after multiple overdoses near 6th Street overnight

Fentanyl overdoses dropped in 4 states. These solutions are helping 

The cadets, along with another young man, were exposed to what is believed to be cocaine laced with fentanyl, and two were on ventilators late Friday, officials said.

Voltage-gated sodium channels (VGSCs) are the basic ion channels for neuronal excitability, which are crucial for the resting potential and the generation and propagation of action potentials in neurons. To date, at least nine distinct sodium channel isoforms have been detected in the nervous system.

Sodium channel

Overview of the voltage-gated sodium channel family
Frank H Yu and William A Catterall
 
NaV1.9: a sodium channel linked
to human pain

Sulayman D. Dib-Hajj, Joel A. Black and Stephen G. Waxman
 
Sodium channel, voltage-gated, type XI, alpha subunit also known as SCN11A or Nav1.9 is a voltage-gated sodium ion channel protein which is encoded by the SCN11A gene on chromosome 3 in humans. Like Nav1.7 and Nav1.8, Nav1.9 plays a role in pain perception.

Narcos: Transnational Cartels and Border Security

Hollywood Woman and TV Actor Charged with Participating in Home-Delivery Drug Trafficking Ring that Led to Fatal Fentanyl Overdose

Combatting Transnational Criminal Organizations

Decrease the ability of targeted transnational criminal organizations to conduct illicit activities impacting the southern border and approaches region of the United States. By September 30, 2017, actions by the DHS Joint Task Forces via synchronized component operations will result in the disruption and/or dismantlement of 15% of targeted transnational criminal organizations. 

Mexico’s Transnational Criminal Organizations are Benefitting from the Pandemic

Culture and Society

The Importance of Competition for the American Economy

Beatitudes

Silence Dogood

How does Huck escape from imprisonment by his father?

... Huck hides the canoe and loads it with food and other supplies. Then he shoots a wild pig, takes it into the cabin, and slits its throat. He uses the pig's blood to fake his own murder.

Saint Petersburg (Russian: Санкт-Петербург, tr. Sankt-Peterburg, IPA: [ˈsankt pʲɪtʲɪrˈburk] (audio speaker iconlisten)), formerly known as Petrograd (1914–1924) and later Leningrad (1924–1991), is the second-largest city in Russia. It is situated on the Neva River, at the head of the Gulf of Finland on the Baltic Sea, with a population of roughly 5.4 million residents.[9] Saint Petersburg is the fourth-most populous city in Europe, the most populous city on the Baltic Sea, as well as the world's northernmost city with over 1 million residents. As Russia's Imperial capital, and a historically strategic port, it is governed as a federal city

The True Story of ‘The Underground Railroad’

The adaptation of Colson Whitehead’s Pulitzer Prize–winning novel reimagines the eponymous trail to freedom as an actual train track

Why does Huck dress up as a girl?

Huck disguises himself as a girl to go ashore so no one would suspect his true identity. He went ashore to find out what was going on and whether the townspeople were still looking for him and Jim. He found out that people think Pap Finn or Jim may have killed Huck.

Chapter 11. The woman lets Huck into the shack but eyes him suspiciously. Huck introduces himself as “Sarah Williams” from Hookerville.

In the fictitious town of St. Petersburg, Missouri, Huck Finn currently resides at the beginning of the novel. This town of St. Petersburg is a town made-up by Mark Twain and shows similarities to a place Twain knew well - his own stomping grounds as a boy: Hannibal, Missouri

What does the Mississippi river symbolize in The Adventures of Huckleberry Finn?
 
For Huck and Jim, the Mississippi River is the ultimate symbol of freedom. Alone on their raft, they do not have to answer to anyone. The river carries them toward freedom: for Jim, toward the free states; for Huck, away from his abusive father and the restrictive “sivilizing” of St. Petersburg.
 
 
snips and snails and puppy dog tails 
 

Frog, Texas

Frog is an unincorporated community in Kaufman County, located in the U.S. state of Texas.

Python | range() does not return an iterator

How to use a List as a key of a Dictionary in Python 3?

Python Dictionaries

Frog

Frog is an integration of memory-based natural language processing (NLP) .

Church–Turing thesis

Success of the thesis

Get-ChildItem

A decision tree is a flowchart-like structure in which each internal node represents a "test" on an attribute (e.g. whether a coin flip comes up heads or tails), each branch represents the outcome of the test, and each leaf node represents a class label (decision taken after computing all attributes).

Cucumber, Celery, Pickles, what kind of software names are these?

Cucumber: BDD Testing & Collaboration Tools for Teams

What is pickle Python?
Pickle in Python is primarily used in serializing and deserializing a Python object structure. In other words, it's the process of converting a Python object into a byte stream to store it in a file/database, maintain program state across sessions, or transport data over the network

Shoki or Shōki may refer to:

  • the Japanese pronunciation of Zhong Kui, a figure in Chinese mythology, traditionally regarded as a vanquisher of ghosts and evil beings
ZeroNet, Texas Zero Waste

DNAFET Emboss wordcount Bioinformatics Howler, LuaJIT Project

By David Vincent Bell Hirsch
What is a cmdlet in PowerShell?
 
A cmdlet is a lightweight command that is used in the PowerShell environment. The PowerShell runtime invokes these cmdlets within the context of automation scripts that are provided at the command line. The PowerShell runtime also invokes them programmatically through PowerShell APIs

PowerShell errors: Dealing with 'term is not recognized as the name of a cmdlet'

Hooking FastAPI Endpoints up to a Postgres Database

PostgreSQL

PostgreSQL: The world's most advanced open source database

Elephant Room

Swift Building, 315 Congress Ave, Austin, TX 78701

Bash

Software
Bash is a Unix shell and command language written by Brian Fox for the GNU Project as a free software replacement for the Bourne shell.

How Do Arbitrage and Hedging Differ? 

In 2020, the industrial sector accounted for 36% of total U.S. end-use energy consumption and 33% of total U.S. energy consumption.
 
 
Texas Senator Sarah Eckhardt,

How about an open energy forum at Spider House for Pi Day 2022?

example, a Pi dollar bill made of Hemp to keep Austin, Texas weird
 
Aerothermal

Hydrothermal synthesis

Thermal Metamaterial: Fundamental, Application, and Outlook

Transfer function

In engineering, a transfer function (also known as system function[1] or network function) of a system, sub-system, or component is a mathematical function which theoretically models the system's output for each possible input.[2][3][4] They are widely used in electronics and control systems. In some simple cases, this function is a two-dimensional graph of an independent scalar input versus the dependent scalar output, called a transfer curve or characteristic curve. Transfer functions for components are used to design and analyze systems assembled from components, particularly using the block diagram technique, in electronics and control theory.

Thermal engineering

Geothermal gradient

Thermal Plasma

Quark–gluon plasma

Plasma parameters

Control system

Knudsen number

Model theory

Free molecular flow

Anisothermal plasma

Nonthermal plasma

About Building Energy Modeling

416.1212. Exclusion of the home

Review of building energy modeling for control and operation

REO Auction Vs. Courthouse Foreclosures

City-Owned Property For Sale

Travis County Foreclosure Sales

choose you this day whom ye will serve; … but as for me and my house, we will serve the Lord” (Josh. 24:2, 15)
Deuteronomy 11:31 - For ye shall pass over Jordan to go in to possess the land which the LORD your God giveth you, and ye shall possess it, and dwell therein.

State Surplus Property

Jeremiah 29:5 - Build ye houses, and dwell in them; and plant gardens, and eat the fruit of them;

University Surplus Property (Equipment and Consumable Supplies)

Psalms 24:1 - (A Psalm of David.) The earth is the LORD'S, and the fulness thereof; the world, and they that dwell therein.

Texas has nearly 97000 vacant or abandoned properties within its boundaries.

A Detailed Look Using Vacancy Data for the State of Texas

Acts 5:1-4 - But a certain man named Ananias, with Sapphira his wife, sold a possession,

Auctions and Sales of State Property

Texas has nearly 97000 vacant or abandoned properties within its boundaries.
More than 25000 Texans are homeless in a state whose officials frequently boast...

Spiritual care in health care professions

Professional field
Occupational therapy is a profession within healthcare. It is the use of assessment and intervention to develop, recover, or maintain the meaningful activities, or occupations, of individuals, groups, or communities.

House of David

Empowering all workers: morning, noon and night. U.S. Department of Labor

Interested in our grants? Start here.

Our grants connect, protect, train, support and empower workers and job seekers at home and abroad. Watch agency experts share what you need to know about our grants, and how to apply.

DOE Announces Nearly $83 Million to Increase Building Energy Efficiency and Cut Consumers' Energy Bills

Topological insulator

A currency arbitrage is a forex strategy in which a currency trader takes advantage of different spreads offered by brokers for a particular currency pair by making trades. Different spreads for a currency pair imply disparities between the bid and ask prices

A simple guide to creating, updating and manipulating python’s most popular data structures, and their key differences.

Anomalous monism

Have to be smarter than the tool you are using.
 

Quantum neural networks
Alexandr A. Ezhov
1 and Dan Ventura 

Quantum decoherence

Phase-space picture 

In physics, the Heisenberg picture (also called the Heisenberg representation[1]) is a formulation (largely due to Werner Heisenberg in 1925) of quantum mechanics in which the operators (observables and others) incorporate a dependency on time, but the state vectors are time-independent, an arbitrary fixed basis rigidly underlying the theory.

It stands in contrast to the Schrödinger picture in which the operators are constant, instead, and the states evolve in time. The two pictures only differ by a basis change with respect to time-dependency, which corresponds to the difference between active and passive transformations. The Heisenberg picture is the formulation of matrix mechanics in an arbitrary basis, in which the Hamiltonian is not necessarily diagonal.

It further serves to define a third, hybrid, picture, the interaction picture.

Schrödinger picture

In physics, the Schrödinger picture (also called the Schrödinger representation[1]) is a formulation of quantum mechanics in which the state vectors evolve in time, but the operators (observables and others) are constant with respect to time.[2][3] This differs from the Heisenberg picture which keeps the states constant while the observables evolve in time, and from the interaction picture in which both the states and the observables evolve in time. The Schrödinger and Heisenberg pictures are related as active and passive transformations and commutation relations between operators are preserved in the passage between the two pictures.  

Conductance quantum

M-theory is a theory in physics that unifies all consistent versions of superstring theory. Edward Witten first conjectured the existence of such a theory at a string-theory conference at the University of Southern California in the spring of 1995



P-type semiconductors are created by doping an intrinsic semiconductor with an electron acceptor element during manufacture. ... In p-type semiconductors, holes are the majority carriers and electrons are the minority carriers. A common p-type dopant for silicon is boron or gallium.

De Broglie wavelength

Matter wave

Identity (mathematics)

Get() method for dictionaries in Python

How to Use an Arbitrage Strategy in Forex Trading?

Decoherence, the measurement problem, and
interpretations of quantum mechanics

Lunch with our US Treasury, Department of Labor and DARPA for a Texas Senator?

US Hemp Bank Treasury Notes are savings for our Department of Agriculture, Department of Energy, and EPA

By David Vincent Bell Hirsch

Guidelines to use dictionaries in Python

Accessing and writing data in a Python dictionary:
 
Values can be written by placing key within square brackets next to the dictionary and using the assignment operator ( = ). If the key already exists, the old value will be overwritten. Attempting to access a value with a key that does not exist will cause a KeyError .

Transfer function

How about Texas launching state to state energy independence charters to serve citizens of each state in healthy competition? 
 

Texas Able, ADA, different abled, Machine Learning Augmented Intelligence may serve with engineering architecture to the nation with global capacity to generate clean energy while addressing global pollution issues.

Typology

Beat Generation

How does US culture influence behaviors in state to state healthy competition?

Richard P. Feynman Quotes About Energy 

EPR paradox

Matrix mechanics 

How to use OR operator in Python If Statement?

A Comprehensive Guide To Conditional Statements in Python For Data Science Beginners

Decision-making in a programming language is automated using conditional statements, in which Python evaluates the code to see if it meets the specified conditions. The conditions are evaluated and processed as true or false. If this is found to be true, the program is run as needed  

The rupee-rouble trade arrangement may get a push now that Russia is out of SWIFT

Does India have 2 currencies?

You'll find Indian banknotes in denominations of 1, 2, 5, 10, 20, 50, 100, 200, 500 and 2000 - although the 1 and 2 INR notes are seldom used. Indian coins come in 1, 2, 5, 10 rupee and 50 paisa.

Netflix Has Defied the Russian Government, for Now

With Russia accused of war crimes in Ukraine, the streaming platform finds itself increasingly isolated as Western companies abandon the pariah state.

Meaning of quantum entanglement

get

Python list | pop()

SWIFT

The Society for Worldwide Interbank Financial Telecommunication (SWIFT), legally S.W.I.F.T. SC, is a Belgian cooperative society providing services related to the execution of financial transactions and payments between banks worldwide. Its principal function is to serve as the main messaging network through which international payments are initiated.[2] It also sells software and services to financial institutions, mostly for use on its proprietary "SWIFTNet", and ISO 9362 Business Identifier Codes (BICs), popularly known as "SWIFT codes". 
 

The Dollar Game - Numberphile

Dr Holly Krieger

Charles Lutwidge Dodgson (/ˈlʌtwɪ ˈdɒsən/; 27 January 1832 – 14 January 1898), better known by his pen name Lewis Carroll, was an English writer of children's fiction, notably Alice's Adventures in Wonderland and its sequel Through the Looking-Glass. He was noted for his facility at word play, logic, and fantasy. The poems Jabberwocky and The Hunting of the Snark are classified in the genre of literary nonsense. He was also a mathematician, photographer, and Anglican deacon.

Carroll came from a family of high-church Anglicans, and developed a long relationship with Christ Church, Oxford, where he lived for most of his life as a scholar and teacher. Alice Liddell, daughter of the Dean of Christ Church, Henry Liddell, is widely identified as the original for Alice in Wonderland, though Carroll always denied this.

Born in All Saints' Vicarage, Daresbury, Cheshire, in 1832, Carroll is commemorated at All Saints' Church, Daresbury, in its stained glass windows depicting characters from Alice's Adventures in Wonderland. In 1982, a memorial stone to Carroll was unveiled in Poets' Corner, Westminster Abbey.

Comprehensions in Python

Build, deploy, and scale ML models faster, with pre-trained and custom tooling within a unified artificial intelligence platform.

Why do we need it, how good is the code-free ML training, really, and what does all this mean for data science jobs?

Azure Machine Learning capabilities that automate and accelerate the machine learning lifecycle

U.S. Coast Guard offloads $1 billion worth of narcotics

A currency arbitrage is a forex strategy in which a currency trader takes advantage of different spreads offered by brokers for a particular currency pair by making trades. Different spreads for a currency pair imply disparities between the bid and ask prices

Triangular trade

In trigonometry and geometry, triangulation is the process of determining the location of a point by forming triangles to it from known points.
Dirk WillenbockelMiddlesex University Business School - LondonEnfield EN3 4SF - UK

What Is Amazon SageMaker?

Citing drought, US won’t give water to California farmers

Mexicali Rose

Who is Mexico's biggest trade partner?
The United States

What is Amazon VPC?

Currency Pair

Mexican peso crisis

Apache Airflow Tutorial

This tutorial walks you through some of the fundamental Airflow concepts, objects, and their usage while writing your first pipeline.

What are the steps in building a data warehouse? What cloud technology should you use? How to use Airflow to orchestrate your pipeline?

General equilibrium theory

In economics, general equilibrium theory attempts to explain the behavior of supply, demand, and prices in a whole economy with several or many interacting markets, by seeking to prove that the interaction of demand and supply will result in an overall general equilibrium. General equilibrium theory contrasts to the theory of partial equilibrium, which only analyzes single markets. In general equilibrium, constant influences are considered to be noneconomic, therefore, resulting beyond the natural scope of economic analysis.[1]

What Is an Oligopoly?

Oligopoly is a market structure with a small number of firms, none of which can keep the others from having significant influence.

How riskless is “riskless” arbitrage?

The Numeraire Problem in General Equilibrium Models with Market Power : Much Ado About Nothing ?

Denomination

irrational numbers cannot be expressed as the ratio of two integers.

Gresham's law

In economics, Gresham's law is a monetary principle stating that "bad money drives out good". For example, if there are two forms of commodity money in circulation, which are accepted by law as having similar face value, the more valuable commodity will gradually disappear from circulation.
 
The Treasury Resource Center contains information and documents that are organized by topic area.
 
 
Triangular Arbitrage in the Forex
Market

Emerging
versus Developed markets

Source code for airflow.contrib.hooks.bigquery_hook

Simple ETL with Airflow

Some fundamentals you need to know to start using Airflow with Python

airflow-with-pandas

Writing DAGs (workflows)

Fusion Centers and Joint Terrorism Task Forces

VPC network overview

Virtual private cloud (VPC)

PyFlink: The integration of Pandas into PyFlink 

U.S. Treasury Announces Unprecedented & Expansive Sanctions Against Russia, Imposing Swift and Severe Economic Costs

Texas Department of Banking
2601 N. Lamar Blvd
Austin, Texas 78705
Address: 2601 N Lamar Blvd, Austin, TX 78705

Data mart 

Developing your C-Suite
by Nancy Atwood, PhD and Terry Bacon, PhD

Corporate title

Limited liability company (LLC)-structured companies are generally run directly by their members, but the members can agree to appoint officers such as a CEO or to appoint "managers" to operate the company.

American companies are generally led by a CEO. In some companies, the CEO also has the title of "president". In other companies, a president is a different person, and the primary duties of the two positions are defined in the company's bylaws (or the laws of the governing legal jurisdiction). Many companies also have a CFO, a chief operating officer (COO) and other senior positions such as General Counsel (CLO), chief strategy officer (CSO), chief marketing officer (CMO), etc. that report to the president and CEO. The next level, which are not executive positions, is middle management and may be called "vice presidents", "directors" or "managers", depending on the size and required managerial depth of the company.

Data Science for Startups: PySpark

The gathering, interchange or distribution of information about an enemy or a potential enemy and the evaluated conclusions drawn from such information. The CIO as Chief Intelligence Officer has a complete awareness of trends, competition and markets and communicates these to the enterprise.

Intelligence officer

The New Path To the C-Suite

Understanding the C-Suite

Batch Processing — Apache Spark

Chief Information Officer (CIO)

The chief analytics officer oversees an organization's collection of data and its use to create analytics and business intelligence models.
The velocity of an object is the rate of change of its position with respect to a frame of reference, and is a function of time.

Accelerator program

EXCLUSIVE India plans urea import deal with Iran using rupee payments-sources

Apache Spark and Jupyter Notebooks on Cloud Dataproc

Putin bans cash exports from Russia exceeding $10,000 in value - Kremlin

Use Dataproc, BigQuery, and Apache Spark ML for Machine Learning

Feds rescind license extension for Florida nuclear plant

Ukraine jets hit Russian column; Russia has used thermobarics, Ukraine military says

EMERGING MARKETS-Brazil real, Mexican peso higher as Ukraine-Russia tensions mildly ease

Russian oligarchs move yachts as U.S. looks to ‘hunt down’ and freeze assets

Cloud Logging


IN THE NAME AND BY THE AUTHORITY OF THE STATE OF TEXAS, I, , do solemnly swear (or affirm), that I will faithfully execute the duties of the office of of the State of Texas, and will to the best of my ability preserve, protect, and defend the Constitution and laws of the United States and of this State, so help me God.
GOVERNMENT CODE
TITLE 6. PUBLIC OFFICERS AND EMPLOYEESSUBTITLE A. PROVISIONS GENERALLY APPLICABLE TO PUBLIC OFFICERS ANDEMPLOYEESCHAPTER 602. ADMINISTRATION OF OATHS
AAThe oath made and signed statement executed as required by Section 1, Article XVI, Texas Constitution, by any of the following judicial officers and judicial appointees shall be filed with the secretary of state: (1)AAan officer appointed by the supreme court, the court of criminal appeals, or the State Bar of Texas; ...

R.A.T Detection Using Python
Mr. Mohammed Ratlamwala , Mr. Omkesh Rane

Project Guide: Prof. Martina DSouza (B.E IT, M.E Comp)

Austin Python Meetup pitch to serve our military

EAR (file format)

EAR (Enterprise Application aRchive) is a file format used by Java EE for packaging one or more modules into a single archive so that the deployment of the various modules onto an application server happens simultaneously and coherently. It also contains XML files called deployment descriptors which describe how to deploy the modules.

What is ITAR and EAR compliance?
The International Traffic in Arms Regulations (ITAR) and the Export Administration Regulations (EAR) are two important United States export control laws that affect the manufacturing, sales and distribution of technology. The legislation seeks to control access to specific types of technology and the associated data.


The name code talkers is strongly associated with bilingual Navajo speakers specially recruited during World War II by the US Marine Corps to serve in their standard communications units of the Pacific theater. Code talking, however, was pioneered by the Cherokee and Choctaw peoples during World War I.

Debug and Diagnose Spark Applications on SQL Server Big Data Clusters in Spark History Server

Behavior-driven development (BDD)

View persistent application user interfaces

Union() function in Python

Python | set() method

Behavioral Economics

Voting behavior

A Step-by-Step Tutorial

Finite element method

The structure of finite element methods

Galerkin method

In mathematics, in the area of numerical analysis, Galerkin methods, named after the Russian mathematician Boris Galerkin, convert a continuous operator problem, such as a differential equation, commonly in a weak formulation, to a discrete problem by applying linear constraints determined by finite sets of basis functions.

Mathematical Methods in Computer Science

Attributes and behaviors

Every class contains attributes and behaviors. Attributes are the characteristics of the class that help to distinguish it from other classes. Behaviors are the tasks that an object performs

Dataproc Persistent History Server

Delegation is one of the core concepts of management leadership. The process involves managers deciding which work they should do themselves and which work should be delegated to others for completion.

Delegation (computing)

Pointer (computer programming)

Hooking

What is a behavior class?
 
The behavior of class or its instances is defined using methods.

Method (computer programming)

The behavior of an object is defined by its methods, which are the functions and subroutines defined within the object class. Without class methods, a class would simply be a structure. Methods determine what type of functionality a class has, how it modifies its data, and its overall behavior.

Call an object method

__call__ in Python

Python Classes

Social class

Why are strings in Python immutable?

In Python, strings are made immutable so that programmers cannot alter the contents of the object (even by mistake). This avoids unnecessary bugs. Some other immutable objects are integer, float, tuple, and bool.

Explaining One Of The Most Fundamental Concepts Of Python Programming Language

To assign variable a value, use the equals sign (=). Sure, go ahead get into a logical argument with a math professor concerning programmers use of the equal sign. Python's variables aren't buckets that contain things; they're pointer. The == operator checks for equality (do two objects represent the same data). Premises of logic students distribution as the fallacy of the undistributed middle. 
 
 
 
 

Jakarta Persistence

Java Persistence API (JPA) Data Persistence is a means for an application to persist and retrieve information from a non-volatile storage system. Persistence is vital to enterprise applications because of the required access to relational databases.

The Java Persistence API (JPA) is a Java specification that bridges the gap between relational databases and object-oriented programming. 

(Java) Using Objects

Calling an object's method is similar to getting an object's variable. To call an object's method, simply append the method name to an object reference with an intervening '. ' (period), and provide any arguments to the method within enclosing parentheses.

In software engineering, a WAR file (Web Application Resource or Web application ARchive) is a file used to distribute a collection of JAR-files, JavaServer Pages, Java Servlets, Java classes, XML files, tag libraries, static web pages (HTML and related files) and other resources that together constitute a web ..

Answer
  1. Open the command prompt. Follow the menu path Start > Programs > Accessories > Command Prompt.
  2. Type: java -version and press Enter on your keyboard. Result: A message similar to the following indicates that Java is installed and you are ready to use MITSIS via the Java Runtime Environment.

Java is supported on Windows, OS X and Linux. It is not supported in iOS or Chrome OS. Java is very much involved in Android, but not in a way that is visible to end users.

What is meant by EJB in Java?

Enterprise JavaBeans (EJB) is the server-side and platform-independent Java application programming interface (API) for Java Platform, Enterprise Edition (Java EE). EJB is used to simplify the development of large distributed applications.

What is a Schemaless database?
 
1, database schema is the data structure of a database table, in RDBMS, such as MySQL, every database table should have a fixed data structure. Database schema. 2, schema less means the database don't have fixed data structure, such as MongoDB, it has JSON-style data store, you can change the data structure as you wish .

 

 

White's law

White's law, named after Leslie White and published in 1943, states that, other factors remaining constant, "culture evolves as the amount of energy harnessed per capita per year is increased, or as the efficiency of the instrumental means of putting the energy to work is increased".[1]

How Broadway got the nickname ‘The Great White Way’ in 1880

Massive open online course

What is degeneracy psychology?
 
n. 1. a state in which a person has declined or reverted to an earlier or simpler state of development in physical, mental, or moral qualities.

Degeneracy (graph theory)

What is an example of degeneracy?
 
The definition of degenerate is someone or something that has lost their former good character or morality. An example of something that would be described as degenerate is an immoral society. ... Degenerate is defined as a person who is immoral, corrupt or sexually perverted. An example of a degenerate is a thief.

Python Module Index

Graph coloring

Degenerate energy levels

Mutations Are the Raw Materials of Evolution

How does mutation lead to an adaptation?
 
If the mutation has a deleterious affect on the phenotype of the offspring, the mutation is referred to as a genetic disorder. Alternately, if the mutation has a positive affect on the fitness of the offspring, it is called an adaptation.

Adaptation (film)

By David Vincent Bell Hirsch

How to Run Unix Commands in Your Python Program

os — Miscellaneous operating system interfaces

pdb — The Python Debugger

ctypes — A foreign function library for Python

Passing By Pointer Vs Passing By Reference in C++

Shallow Copy and Deep Copy in C++

copy — Shallow and deep copy operations

What is the difference between print and return Python? 
 
Printing means showing a value in the console. Returning means giving back a value from a function. Printing and returning are completely different concepts in Python. Print is a function you call. Calling print will immediately make your program write out text for you to see. When a return statement is reached, Python will stop the execution of the current function, sending a value out to where the function was called.

Create a directory in Python

Get directory of current Python script

Python Scope of Variables

Global and Local Variables in Python

Common Python Data Structures (Guide)

9. Classes

glob — Unix style pathname pattern expansion

Standard input, output, and error 

fcntl — The fcntl and ioctl system calls

Reading data from UNIX pipes

File and Directory Access

Biopython: Python tools for computation biology

Conda

The Python Standard Library

Running Spark on Kubernetes

Apache Spark on Kubernetes
Cloud-Native Spark: The Easy Way

I have the Git Bash Compiler for the online Harvard courses for topics in the above URL's blog topcs: 

Bash Reference Manual

Advanced Bash-Scripting Guide:

I/O Redirection

Index

Command-line interface (CLI)

argparseParser for command-line options, arguments and sub-commands

Input Output Redirection in Linux

Cat Command

Standard Input and Output Streams 

White noise

colorednoise 

African-American English

Declarative programming

Command-line argument parsing

Dyck language

They have applications in the parsing of expressions that must have a correctly nested sequence of brackets, such as arithmetic or algebraic expressions. 

What is Infrastructure as Code?

Dyck path factorization
Gennady Eremin

Cluster manager

Dyck Words of given length 

Dyck language

Fuss–Catalan number

Cluster vs Client: Execution modes for a Spark application

Giving Credit to the Texas Able program: Pricing Revolution

By David Vincent Bell Hirsch

Cluster Mode Overview

clush

clush is a program for executing commands in parallel on a cluster and for gathering their results. It can execute commands interactively or can be used within shell scripts and other applications.

Yale Online Tutorials

Linux/Unix and Command Line

Institute of Nuclear Materials Management

Institute of Nuclear Materials Management

  • 1120 Rt 73, Suite 200
  • Mount Laurel, NJ 08054
  • Tel: 856.380.6813
  • Fax: 856.439.0525

White's Law addresses ethics and Morals with a Great Filter of World energy supply and consumption

Submitting Applications

Nuclear material

Abstract

A text useful at the undergraduate and graduate levels with most coverage given to primary components and main materials of nuclear reactors or generators. Special topics in the last three chapters will be of special interest to those involved in research and development. Safety and health are mentioned. Contents, abridged: Nuclear energy and materials. Fundamental radiation effects on materials. Plutonium. Moderator, reflector, blanket, and coolant materials. Control, shielding, and safety system materials. Reactor materials in nuclear fuel cycles, fuel enrichment, and reprocessing. Radioisotopic power generation and nuclear fusion reactor materials.

ClusterShell

Scalable Python Framework

The Cluster and Basic UNIX Commands

Microsoft Windows Failover cluster resource dependencies in SQL Server

Mutable vs Immutable Objects in Python

Molten salt reactor (MSR)

Thorium fuel cycle

Generation IV reactor (GenIV)

Installing Python Modules (Legacy version) 

grp — The group database

MNE software for processing MEG and EEG data

Overview of the MNE tools suite 

PaSh: Light-touch Data-Parallel Shell Processing

Pick the right one for you

Pipeline (Unix)

Immutability in Python is *really* hard

Piping in Unix or Linux

Setup modern CI/CD for Azure Functions using .NET6 & GitHub Actions

pipes — Interface to shell pipelines

Continuous delivery by using GitHub Action

The CI / CD pipeline of Github Action for serverless lambda function containerization deployment.

Subprocesses

Continuous delivery with Azure Pipelines

Working with actions in CodePipeline

Modernizing web application development and deployment

CI/CD Pipeline for OpenWhisk Functions Using Whisk Deploy

Python Streams vs Unix Pipes

Enter the Pyed Piper

The pyed piper, or pyp, is a python-centric command line text manipulation tool. It allows you to format, replace, augment and otherwise mangle text using standard python syntax with a few golden-oldie tricks from unix commands of the past. You can pipe data into pyp just like any other unix command line tool.

After it's in, you can use the standard repertoire of python string and list methods to modify the text.

unix-pipes

A quick overview of GitLab CI

Infrastructure Department Performance Indicators

Infrastructure performance management: The final piece of the puzzle

18 KPIs To Measure Performance (& How To Choose & Track Them)

Learn to connect data streams from one utility to another using STDIO.

stdio.h — Standard input and output 

Cat command in Linux with examples 

Invoke an AWS Lambda function in a pipeline in CodePipeline

 
In the Bhagavad-Gita, the sacred book of the Hindus, Lord Krishna says to Arjuna, “Plunge into the heat of battle and keep your heart at the lotus feet of the lord"

The US Military and Oil

The US military uses more oil than any other institution in the world—but it’s also a leader in clean vehicle technology.

Published Jun 1, 2014

The US military is the largest institutional consumer of oil in the world. Every year, our armed forces consume more than 100 million barrels of oil to power ships, vehicles, aircraft, and ground operations—enough for over 4 million trips around the Earth, assuming 25 mpg.

-Jun-2019

US military consumes more hydrocarbons than most countries -- massive hidden impact on climate

The US military's carbon footprint is enormous and must be confronted in order to have a substantial effect on battling global warmin

Oil Dependence and U.S. Foreign Policy

1850 – 2021
Houston Medical Center, We have a problem,

The materiality of the corporation:
Oil, gas, and corporate social technologies in the remaking
of a Russian region
DOUGLAS ROGERS
Yale University

March 01, 2022

In 2020, Texas accounted for 43% of the nation's crude oil production and 26% of its marketed natural gas production.

Senator Markey Announces Legislation to Stop Russian Oil Imports

What percentage of the world's oil comes from Texas?
 
About 69% of total U.S. crude oil production in 2019 came from five states: Texas (41.4%), North Dakota (11.6%), New Mexico (7.4%), Oklahoma (4.7%), and Colorado (4.2%). Texas is the largest producer of crude oil in the United States. In 2019, Texas produced 5,070,450 barrels per day.

Sen. Markey Urges Support for People of Ukraine, Calls For Ban on Russian Oil

Sen. Ed Markey had introduced legislation earlier this week designed to stop the import of Russian oil into the U.S.

Texas oil and gas pulled in nearly $16 billion in taxes and royalties last year as the industry recovers from pandemic downturn

The Texas Oil and Gas Association’s annual energy and economic impact report says both taxes and royalties paid to the state went up by more than 20% over the previous fiscal year.

An oligopsony is a market form in which the number of buyers is small while the number of sellers in theory could be large. This typically happens in a market for inputs where numerous suppliers are competing to sell their product to a small number of buyers.

In the oil and gas industry, the Organization of the Petroleum Exporting Countries (OPEC) is often used as an example of a cartel. Although there is debate around whether the economic evidence demonstrates it is a true cartel, OPEC's member countries do exert market influence

Hemp as an Agricultural Commodity

Renée JohnsonSpecialist in Agricultural PolicyJune 22, 2018

Apparatchik

See also

Roman Patronage in Society, Politics, and Military

Patronage in ancient Rome

Jewish–Roman wars

US Hemp Bank Treasury Notes are savings for our Department of Agriculture, Department of Energy, and EPA

By David Vincent Bell Hirsch

Is narcissism a dissociative disorder?
 
Howell (2003) sees narcissism as a type of dissociative disorder that is created by an experience of trauma that leads to a "closed system" being created by the ego as a defense mechanism heightening the importance of empathy and inter-subjectivity.
 
 
Do narcissists suffer from cognitive dissonance?
 
One of the key methods of emotional abuse employed by people with narcissistic tendencies is the generalized concept called cognitive dissonance. What this abuse tactic does is create in the target a sense of unreality, confusion, and a mind-set of not trusting their own perception of the situation

A vampire is a creature from folklore that subsists by feeding on the vital essence (generally in the form of blood) of the living. In European folklore, vampires are undead creatures that often visited loved ones and caused mischief or deaths in the neighbourhoods they inhabited while they were alive.

Cyberwar-Netwar: Security in the Information Age

edited by F.D. Carvalho, E. Mateus da Silva

Docbot Careers

As a matter of basic economics, fewer doctors means less care and more expensive services.

By Derek Thompson

Open Medical Record System

GNU Health

List of open-source health software 

Precision medicine (PM)

This is a copy of the 18F open source policy.

Open Source

The People's Code

Applying for SBIR/STTR Funding?
Review NIH's Hyperlink Policy for Grant Applications

 
The integrity of NIH’s review system must always be protected to maintain public trust. However, a simple click on a link in a grant application can be tracked to the IP (Internet Protocol) address of the reviewer, unmasking their confidential identity. The NIH Office of Extramural Research assembled a list of Do’s and Don’ts of Hyperlinks

Double check the FOAs and NIH guidance to make sure your hyperlinks respect the boundaries set by NIH grant rules and general principles to ensure that your application gets accepted for review.

A scalable, secure, and interoperable platform for deep data-driven health management

Why Apply? 

NIA’s SBIR and STTR programs offer non-dilutive, no-strings-attached funding up to $2.5 million (depending on funding opportunity) to commercialize products addressing aging and aging-related diseases and conditions. Small businesses and research organizations retain intellectual property rights for their innovations, NIH’s rigorous peer-review process lends validation and visibility to early-stage companies, and the prestige associated with these awards can help attract more funding from other partners and investors.  

Proximity to Texas oil refineries increases cancer risk, study finds

Hyun Jung Kim

Assistant Professor of Biomedical Engineering and Oncology

Gene Therapy for Cancer Treatment: Past, Present and Future


Telomere shortening rate predicts species life span

View ORCID ProfileKurt Whittemore, Elsa Vera, Eva Martínez-Nevado, Carola Sanpera, and Maria A. Blasco

Python dictionary of tuples

/ prometheus-operator

Morris W. Hirsch

Research
Primary Research Area: 
Geometry/Topology
Research Interests: 
Dynamical systems, Neural networks

Daniel Hirsch

Jeffrey M. Hirsch

Geneva Yeargan Rand Distinguished Professor of Law

Dr. Robert L. Hirsch is a Senior Energy Advisor at MISI and a consultant in energy, technology, and management.

A FarnsworthHirsch fusor is the most common type of fusor. The typical Farnsworth-Hirsch fusor has two concentric electrical grids inside a vacuum chamber.

You Are Not Your Depression

6 Signs That Your Pet Is Lonely (And What You Can Do About It)

What is the best medication for anxiety in dogs?
 
The best dog anxiety medication
The best dog anxiety medication

Benadryl (diphenhydramine)OTCAntihistamine
Prozac (fluoxetine)RxAntidepressant selective serotonin reuptake inhibitor (SSRI)
TrazodoneRxAntidepressant selective serotonin reuptake inhibitors (SSRI)
Xanax (alprazolam)RxBenzodiazepine GABA receptor agonist

BlackRock and Vanguard are two of the Big Three (every industry is clumping) passive fund asset management firms. The third, State Street, is owned by BlackRock. Whose largest shareholder is Vanguard.

The Vanguard Group

Investment management company
 
Who put the Dexedrine in Mrs Murphy's Ovaltine?

Much earlier, in 1946, a minor hit record by Harry Gibson was, "Who Put the Benzedrine in Mrs. Murphy's Ovaltine," which was a song about a women who partied at all the nightclubs and lost a lot of weight doing so. One line in the song was, "The benzedrine's the thing that makes her swing."

Harry Hipster Gibson - Who Put The Benzedrine In Mrs. Murphys Ovaltine (1944)

Ritalin at 75: what does the future hold?

In 1937, psychiatrist Charles Bradley administered Benzedrine sulfate, an amphetamine, to “problem” children at the Emma Pendleton Bradley Home in Providence, Rhode Island, in an attempt to alleviate headaches; however, Bradley noticed an unexpected effect upon the behavior of the children: improved school performance, social interactions, and emotional responses.

Bradley’s Benzedrine Studies on Children with Behavioral Disorders

The first benzodiazepine, chlordiazepoxide (Librium), was discovered accidentally by Leo Sternbach in 1955 and was made available in 1960 by Hoffmann–La Roche, which soon followed with diazepam (Valium) in 1963.[1]

Diazepam (Valium)

Benzodiazepines (BZD, BDZ, BZs), sometimes called "benzos", are a class of psychoactive drugs whose core chemical structure is the fusion of a benzene ring and a diazepine ring

Is Xanax and benzo the same?

Benzodiazepines (sometimes called "benzos") work to calm or sedate a person, by raising the level of the inhibitory neurotransmitter GABA in the brain. Common benzodiazepines include diazepam (Valium), alprazolam (Xanax), and clonazepam (Klonopin), among others

The history of benzodiazepines

Benzodiazepines and Opioids

Do No Harm issue are ethical concerns for healthcare in Texans.
 
From research, Pyrrolobenzodianepine looks promising:

Pyrrolobenzodiazepine

Prescription medicine is abused by many and many are in denial over the abuse in the US and world.

It is similar to alcohol abuse but worse as systemic bad faith iatrogenesis.

Blacking Out From Benzodiazepines

 For Frog Texas under a BlackRock sake!

How a Company Called BlackRock Shapes Your News, Your Life, Our Future

Who Owns Big Pharma + Big Media? You’ll Never Guess.

BlackRock and the Vanguard Group, the two largest asset management firms in the world, combined own The New York Times and other legacy media, along with Big Pharma.

Why Do Women Act Catty?

The unhealthy way women act on healthy feelings of competition

cat·ty | \ ˈka-tē
\
plural catties

Definition of catty

 (Entry 1 of 2)

: any of various units of weight of China and southeast Asia varying around 1¹/₃ pounds (about 600 grams) also : a standard Chinese unit equal to 1.1023 pounds (500 grams)

Fat cat is a political term originally describing a rich political donor, also called an angel or big money man

cat bur·glar
/ˈkat ˌbərɡlər/
noun
noun: cat burglar; plural noun: cat burglars
  1. a thief who enters a building by climbing to an upper story.

President James Garfield

Of all the President's bad Monday's, Garfield takes some kind of cake.
 
 
 
 

Dr. Peter Venkman : Human sacrifice, dogs and cats living together... MASS HYSTERIA! Mayor : All right, all right!

Bob Newhart-Stop It

1991
Competency, Deinstitutionalization, and Homelessness: A Story of Marginalization
Michael L. Perlin
New York Law School,

Data for Change, Notes from Industry

Obtaining interpretable predictions of clients at risk of chronic homelessness 6 months in the future

Blake VanBerlo is a data scientist who supports the Municipal AI Applications Lab at the City of London, Canada. The lab operates out of the Information Technology Services Division. Blake posts about our open source AI projects. See “Contact” section below for other key City stakeholder contacts.

Homelessness team data wrangling meeting

  • Wednesday, January 4, 2017

Criminal Behavior

By Elaine Cassel, Douglas A. Bernstein 
 
After his mother's death in 1971 he started taking antidepressants and amphetamines, despite the concern of his friends, one of whom (Ron Graham) bet him $500 ...

Erdős number

The Erdős number (Hungarian: [ˈɛrdøːʃ]) describes the "collaborative distance" between mathematician Paul Erdős and another person, as measured by authorship of mathematical papers. The same principle has been applied in other fields where a particular individual has collaborated with a large and broad number of peers.

Aug 14, 1971 – Aug 20, 1971
A prisoner's dilemma is a situation where individual decision-makers always have an incentive to choose in a way that creates a less than optimal outcome for the individuals as a group. The prisoner's dilemmas occur in many aspects of the economy.

COMMITMENT AND SELF-CONTROL IN A PRISONER'S DILEMMA GAME


Revenue may be generated by flipping properties in this enterprise as to house the homeless... just a

Moment (mathematics)

Prisoner’s dilemma shows exploitation is a basic property of human society

A new analysis of the famous game-theory puzzle finds that even when the players seem equal, one can learn to profit at the other’s expense—and the victim will cooperate.

Prisoner’s Dilemma

First published Thu Sep 4, 1997; substantive revision Tue Apr 2, 2019

A Judge Asked Harvard to Find Out Why So Many Black People Were In Prison. They Could Only Find 1 Answer: Systemic Racism

Prisoner's dilemma

In-group and out-group

Three quarks for Muster Mark!

The passage that Gelll-Mann refers to from Joyce's Finnegans Wake (Book 2, Episode 4, Page 383) is the following:
Three quarks for Muster Mark!
Sure he hasn't got much of a bark
And sure any he has it's all beside the mark.
But O, Wreneagle Almighty, wouldn't un be a sky of a lark
To see that old buzzard whooping about for uns shirt in the dark
And he hunting round for uns speckled trousers around by Palmerstown Park?
Hohohoho, moulty Mark!
You're the rummest old rooster ever flopped out of a Noah's ark
And you think you're cock of the wark.
Fowls, up! Tristy's the spry young spark
That'll tread her and wed her and bed her and red her
Without ever winking the tail of a feather
And that's how that chap's going to make his money and mark!

Data Analysis Algorithm

Data Structures

Streaming algorithm

HHS is the largest grant-making agency in the US. Most HHS grants are provided directly to states, territories, tribes, and educational and community organizations, then given to people and organizations who are eligible to receive funding.

Israel's been persecuted and exiled by both Assyria and Babylon. God will punish Babylon like he did Assyria, and the Hebrews will all return home and live without sin. God continues to get riled up about Babylon—he'll bring out his full armory to destroy them. Its bulls will get killed and its grain will be plundered.

Prometheus Operator

The Prometheus Operator manages Prometheus clusters atop Kubernetes.

Institute of Nuclear Materials Management - Purdue Chapter

Ignatius of Loyola

How do you trigger an amygdala hijack?

They can be either sudden, emotional, negative emotion or doing something which leads to regret. Psychological threats that can trigger amygdala hijack are pressures and stressors of modern life, work, and relationships. Anger, aggression, anxiety, and fear are also common emotional triggers.

JAR (file format)

Amygdala Hijack and the Fight or Flight Response

Creating non persistent GKE cluster to run Spark Code

grep(1) — Linux manual page

GNU Grep

John of God

Portuguese soldier
PatronageBooksellers, hospitals, nurses, the mentally ill and the dying   

Pan (god)

In ancient Greek religion and mythology, Pan (/pæn/;[1] Ancient Greek: Πάν, romanizedPán) is the god of the wild, shepherds and flocks, nature of mountain wilds, rustic music and impromptus, and companion of the nymphs.[2] He has the hindquarters, legs, and horns of a goat, in the same manner as a faun or satyr. With his homeland in rustic Arcadia, he is also recognized as the god of fields, groves, wooded glens and often affiliated with sex; because of this, Pan is connected to fertility and the season of spring.[citation needed] The word panic ultimately derives from the god's name.

In Roman religion and myth, Pan's counterpart was Faunus, a nature god who was the father of Bona Dea, sometimes identified as Fauna; he was also closely associated with Sylvanus, due to their similar relationships with woodlands. In the 18th and 19th centuries, Pan became a significant figure in the Romantic movement of western Europe and also in the 20th-century Neopagan movement.[3]

Dataproc FAQ

What induces a panic attack?

Triggers for panic attacks can include overbreathing, long periods of stress, activities that lead to intense physical reactions (for example exercise, excessive coffee drinking) and physical changes occurring after illness or a sudden change of environment.

apache/spark

I Dream of Jeannie

What is the 3 3 3 rule for anxiety?
Follow the 3-3-3 rule.

Look around you and name three things you see. Then, name three sounds you hear. Finally, move three parts of your body — your ankle, fingers, or arm.

bitnami/spark

Dymphna

Saint

Patronagerunaways, mental disorders, neurological disorders, victims of incest, victims of sexual assault, depression, anxiety, sleep disorders

Python 3.10.2 documentation

A Stoic’s Key to Peace of Mind: Seneca on the Antidote to Anxiety

“There are more things … likely to frighten us than there are to crush us; we suffer more often in imagination than in reality"

Image Segmentation with K-means on Apache Spark and Scala

Get started and do your work with all the common data sources supported by Spark.

The Size and Quality of a Data Set

Material transfer agreement

A Material transfer agreement (MTA) is a contract that governs the transfer of tangible research materials between two organizations when the recipient intends to use it for his or her own research purposes. The MTA defines the rights of the provider and the rights and obligations of the recipient with respect to the materials and any progeny, derivatives, or modifications. Biological materials, such as reagents, cell lines, plasmids, and vectors, are the most frequently transferred materials, but MTAs may also be used for other types of materials, such as chemical compounds, mouse models, and even some types of software.

What are purple skills?

These human capabilities, or, 'purple' superpowers, can be defined as a combination of technical (red) and business (blue) skills, spanning the spectrum—from creativity, intuition, critical thinking, and resilience to collaboration, inclusive leadership and cultural intelligence among a well-rounded collection

The Gannett Mockingbird Elder Sledgehammer and the Wall

By David Vincent Bell Hirsch

'Purple people' have the knowledge and insight to leverage new and emerging technologies and undertake analytics of data to solve business problems through traditional business skills.

City of the Violet Crown is a term for at least two cities:

In one of his surviving fragments (fragment 64), the lyric poet Pindar wrote[1] of Athens:

City of light, with thy violet crown, beloved of the poets, thou art the bulwark of Greece.

The climate of Attica is characterised by low humidity and a high percentage of dust in the air, which make sunsets display hues of violet and purple and the surrounding mountains often appear immersed in a purple haze.
In Geoffrey Trease's novel The Crown of Violet, the name is explained as referring to the mauve-tinted marble of the Acropolis hill.
According to the City of Austin's History Center, the phrase first appeared in The Austin Daily Statesman (Now the Austin American Statesman) on May 5th, 1890.[2]
It was long believed to have originated in O. Henry's story "Tictocq: The Great French Detective, In Austin", published in his collection of short stories The Rolling Stone published October 27, 1894.
In chapter 2 of Tictocq, O. Henry writes:

The drawing-rooms of one of the most magnificent private residences in Austin are ablaze of lights. Carriages line the streets in front, and from gate to doorway is spread a velvet carpet, on which the delicate feet of the guests may tread. The occasion is the entrée into society of one of the fairest buds in the City of the Violet Crown.

The phrase is generally thought to refer to the atmospheric phenomenon more commonly known as the Belt of Venus. The phrase is also said to be connected to the moonlight towers of Austin.[3]
Another explanation: during the 19th century, residents began to call Austin the "Athens of the South" for its university. With his sly reference to the poetry of Pindar, O. Henry may have been satirizing Austin's ambitious claim of a cultural link to ancient Athens.[4]

Ghost Fleet Overlord Unmanned Surface Vessel Program Completes Second Autonomous Transit to the Pacific

June 7, 2021 

XONSH is a Python-powered shell

Xonsh is a Python-powered, cross-platform, Unix-gazing shell language and command prompt. The language is a superset of Python 3.6+ with additional shell primitives that you are used to from Bash and IPython. It works on all major systems including Linux, OSX, and Windows. Xonsh is meant for the daily use of experts and novices.

IBM AIX

7 of the Most Popular DevOps Certifications in 2021

Chaining Commands in Linux

Advancing Sustainable Solutions

Coast Guard cutter and RDC join forces to complete annual Arctic Technology Evaluation

UNITED STATES COAST GUARD

Stephens' constant

Schubert (1949) showed that every knot can be uniquely decomposed (up to the order in which the decomposition is performed) as a knot sum of prime knots. In general, it is nontrivial to determine if a given knot is prime or composite (Hoste et al. 1998).

Schubert calculus

Prime knot

Ayyám-i-Há 2022 began in the evening of
Friday
,
February 25
and ends in the evening of
Tuesday
,
March 1

An Introduction to Ayyam-i-Ha

How ‘Big’ should be your Data?

Who am I today?

Tulsidas?

“Lord Ram gave Hanuman a quizzical look and said, "What are you, a monkey or a man?" Hanuman bowed his head reverently, folded his hands and said, "When I do not know who I am, I serve You and when I do know who I am, You and I are One.” - Tulsidas

Vertex AI Workbench

List of mathematical constants

Stefan–Boltzmann constant

(also Stefan's constant)

PHYSCI 11. Foundations and Frontiers of Modern Chemistry: A Molecular and Global Perspective.

Professor: James G. Anderson, Gregory Tucci

How to deploy a simple Spark ML pipeline using Vertex AI Pipelines

socketserver — A framework for network servers

Google finally did it and now the dream came true: we are now able to run serverless Kubeflow pipelines from the former AI Platform

Why load everything into a spreadsheet when the terminal can be faster, more powerful, and more easily scriptable?

Create a cluster

Ius 

Ius or Jus (Latin, plural iura) in ancient Rome was a right to which a citizen (civis) was entitled by virtue of his citizenship (civitas).

Woman of the Apocalypse

The Bahá'í Faith

Bhikshatana

Angered by Brahma's vanity, Shiva—as the terrifying Bhairava—cut off one head of the five-headed Brahma with a mere flick of his fingernail

Python | Execute and parse Linux commands

IPython and Shell Commands

Input and Output 

IDLE

Apache Iceberg

Revelation 12:7-17

Command Line Interfacing

Bhairava

Ashta Bhairava

Shatarupa

Guardians of the directions

Eightfold way (physics)

Accessing a Table

Package ‘data.table’

Data types and transformations for tabular data

JSON file

Ingest JSON data with Auto Loader

Vagus nerve

Microbiome

Magnetocardiography

PythonEditors

editor.py

Wrap sed in Python to provide ed-style line editing in a simple function call.  

Sed Command in Linux/Unix with examples

A Thorough Comparison of Delta Lake, Iceberg and Hudi

Performance comparison: counting words in Python, Go, C++, C, AWK, Forth, and Rust

 
“Don't fire till you see the whites of their eyes!” is one of the most famous quotations to come out of the Revolutionary War.

The Relationship between Retinal Microvascular Abnormalities and Coronary Heart Disease: A Review

Benjamin R. McClintic, MD, Jedediah I. McClintic, BS BA, John D. Bisognano, MD PhD, and Robert C. Block, MD

Delta Lake quickstart

fish is a Unix shell with a focus on interactivity and usability. Fish is designed to give the user features by default, rather than by configuration. Fish is considered an exotic shell since it does not rigorously adhere to POSIX shell standards, at the discretion of the maintainers

Is Broken Heart Syndrome Real?

Is Bashing Fish translation tables a Python script in the Monty editor?
 

Finally, a command
line shell for the 90s

fish is a smart and user-friendly command line
shell for Linux, macOS, and the rest of the family.  

Shankha

A Shankha (conch shell) has religious ritual importance in Hinduism. It is the shell of any suitable sea snail which had a hole made for the performer's embouchure. In Hindu history, the shankha is a sacred emblem of The Hindu preserver god Vishnu.

Matsya

Matsya (Sanskrit: मत्स्य, lit. fish) is the fish avatar of the Hindu god Vishnu. Often described as the first of Vishnu's ten primary avatars, Matsya is described to have rescued the first man Manu from a great deluge.

Noah's Ark

Gilgamesh flood myth

Apache Hudi Spark Guide

Hrishikesha, Hṛṣīkeśa, Hrishika-isha: 18 definitions

Create Delta Table from JSON File in Databricks

What can your eyes tell you about heart disease?

This verse continues the metaphor of a person with a plank in their own eye who criticizes someone for a speck in that person's eye. In this verse, Jesus argues that one must first remove the plank before going on to remove the speck.

Business intelligence analyst vs. data analyst: A comparison

BI analysts and data analysts provide specific benefits for organizations looking to improve how they interpret and use data. Review these unique roles and their responsibilities.

Metadata

Metamaterial

A nanopore is a pore of nanometer size. It may, for example, be created by a pore-forming protein or as a hole in synthetic materials such as silicon or graphene.

When a nanopore is present in an electrically insulating membrane, it can be used as a single-molecule detector. It can be a biological protein channel in a high electrical resistance lipid bilayer, a pore in a solid-state membrane or a hybrid of these – a protein channel set in a synthetic membrane. The detection principle is based on monitoring the ionic current passing through the nanopore as a voltage is applied across the membrane. When the nanopore is of molecular dimensions, passage of molecules (e.g., DNA) cause interruptions of the "open" current level, leading to a "translocation event" signal. The passage of RNA or single-stranded DNA molecules through the membrane-embedded alpha-hemolysin channel (1.5 nm diameter), for example, causes a ~90% blockage of the current (measured at 1 M KCl solution).[1]

It may be considered a Coulter counter for much smaller particles.

Per- and polyfluoroalkyl substances (PFAS) are a family of human-made chemicals that are found in a wide range of products used by consumers and industry. There are nearly 5,000 different types of PFAS, some of which have been more widely used and studied than others. Many PFAS are resistant to grease, oil, water, and heat. For this reason, beginning in the 1940’s, PFAS have been used in a variety of applications including in stain- and water-resistant fabrics and carpeting, cleaning products, paints, and fire-fighting foams. Certain PFAS are also authorized by the FDA for limited use in cookware, food packaging, and food processing equipment.

Infectious diseases are caused by pathogens, which include bacteria, fungi, protozoa, worms, viruses, and even infectious proteins called prions.

Some of the most commonly used PFAS chemicals, like PFOS and PFOA (perfluorooctanesulfonic acid and perfluorooctanoic acid) have long half-lives, earning them the moniker “the forever chemical.” In tests of 44 different taps in 31 states, the EWG found that 43 exceeded a limit they deem safe by their own standards.
Membranes for reverse osmosis
The membranes used for reverse osmosis have a dense layer in the polymer matrix—either the skin of an asymmetric membrane or an interfacially polymerized layer within a thin-film-composite membrane—where the separation occurs.

The Federal Data Strategy Development Team is comprised of a core group of cross-disciplinary data experts from across the Federal Government.

The Leveraging Data as a Strategic Asset Cross Agency Priority (CAP) Goal commits the Administration to developing a long-term comprehensive Federal Data Strategy. Senior officials from the Department of Commerce, the Small Business Administration, the Office of Management and Budget, and the Office of Science and Technology Policy co-lead the CAP Goal. The Federal Data Strategy Development Team conducts research and analysis; facilitate stakeholders; and distill feedback for the Federal Data Strategy.

Methods for analyzing peptides and proteins on a chromatographic timescale by electron-transfer dissociation mass spectrometry 

FragPipe: a complete proteomics pipeline with the MSFragger search engine at heart

MSFragger
MSFragger is an ultrafast database search tool that uses a fragment ion indexing method to rapidly perform spectra similarity comparisons. On a typical quad-core workstation, MSFragger is able to perform open searching (500 Da precursor mass window tolerance) in under 10 minutes for a single LC-MS/MS run.

Ms. Pac-Man

Fragger

frag

military slangNorth American
noun
  1. a hand grenade.
verb
deliberately kill (an unpopular senior officer) with a hand grenade.  

ping (networking utility)

Defragmentation

MSFragger: ultrafast and comprehensive peptide identification in mass spectrometry–based proteomics 

Graphics processing unit

MSFragger is an ultrafast database search tool for peptide identification in mass spectrometry-based proteomics. It has demonstrated excellent performance across a wide range of datasets and applications. MSFragger is suitable for standard shotgun proteomics analyses as well as large datasets (including timsTOF PASEF data), enzyme unconstrained searches (e.g. peptidome), ‘open’ database searches (i.e. precursor mass tolerance set to hundreds of Daltons) for identification of modified peptides, and glycopeptide identification (N-linked and O-linked) with MSFragger Glyco mode.

Peptide Library Data Analysis 

Sesquipower

In mathematics, a sesquipower or Zimin word is a string over an alphabet with identical prefix and suffix. Sesquipowers are unavoidable patterns, in the sense that all sufficiently long strings contain one.

Deep Local Volatility
Marc Chataigner1,† ; Stéphane Crépey1,‡ ; Matthew Dixon 

ABACABA pattern

Learning to rank or machine-learned ranking (MLR)

Content-based image retrieval

also known as query by image content (QBIC) and content-based visual information retrieval (CBVIR)

Using R for proteomics data analysis

Laurent Gatto, Lisa Breckels, Vlad Petyuk, Thomas Lin Pedersen and Sebastian Gibb

21 August 2021

Hessian affine region detector

The Hessian affine region detector is a feature detector used in the fields of computer vision and image analysis. Like other feature detectors, the Hessian affine detector is typically used as a preprocessing step to algorithms that rely on identifiable, characteristic interest points.

The Hessian affine detector is part of the subclass of feature detectors known as affine-invariant detectors: Harris affine region detector, Hessian affine regions, maximally stable extremal regions, Kadir–Brady saliency detector, edge-based regions (EBR) and intensity-extrema-based (IBR) regions.

Proteomics

Harris affine region detector

Vision chip

Implement a content-based image retrieval using Tensorflow and Numpy.

Differentiable programming

Query by Example

Contrast invariant image analysis and PDE’s
Fr ́ed ́eric Guichard Jean-Michel Morel Robert Ryan 

Neuromorphic engineering

Texas Syndromic Surveillance (TxS2)

Texas Syndromic Surveillance (TxS2) is the statewide syndromic surveillance system hosted by the Texas Department of State Health Services (DSHS) for use by Local Health Departments (LHDs), DSHS Public Health Regions (PHRs, see map of DSHS PHRs at http://www.dshs.texas.gov/regions/state.shtm ), DSHS central office, and data providers (hospitals, free standing emergency centers, and urgent care centers, for example) for enhanced surveillance of emerging public health conditions or threats. Syndromic surveillance utilizes trend analysis to establish a baseline and then uses algorithms to compare the current data to that baseline and issue alerts when aberrations are detected. DSHS has authority to operate TxS2 under Chapter 81 of the Texas Health and Safety Code.

Scheduling is the action of assigning resources to perform tasks. The resources may be processors, network links or expansion cards. The tasks may be threads, processes or data flows.

Samsung Reportedly Close to Finalizing Its $17 Billion Chip Plant in Texas in an Effort to Catch up to TSMC

Asynchronous job executions system in-house systems engineering may assist on site worksites given enough data points were collected for crews, materials and designs as well data gaps with projections to be on time and budget for project managers human machine interfacing.

From paints to plastics, a chemical shortage ignites prices

Synchronizing framing, decking, electric, plumbing, masonry work tasks with dependent variables may have trouble when the rubber meets the road with independent variables of emotional agility of construction crews, especially with supply chain breakdowns or acts of God as Snowpocalypse or Pandemics. I love the City of Austin Library, thank you City of Austin. It was not on time and it was over budget so, we may compose literature to serve our community. Thank you problem solvers in Austin Texas.

Professor who called Dow 20,000 says he’s nervous about trends in inflation that could spark a stock-market correction

I have composed a few SBIR blog articles concerning Net Zero Buildings, innovations for on site energy manufacturing, geothermal, terrestrial plasma and other green electricity generating, blue energy, purple economy proposals.  

Why Is Everyone Talking About a Global Power Shortage?

As a reply, a teaming agreement with DPS and DoN for, please follow through entire email to address global security issues with communications and proposals with India as well Native Americans in my communications of this email thread:
It is often misattributed to Thomas Jefferson, but the real source of the quote is Wendell Phillips, an abolitionist. Speaking to the Massachusetts Anti-Slavery Society in 1852, Phillips said: “Eternal vigilance is the price of liberty; power is ever stealing from the many to the few."

Spock says, “Logic clearly dictates that the needs of the many outweigh the needs of the few.” Captain Kirk answers, “Or the one.” This sets up a pivotal scene near the end of the film for rhetorical analysis film philosophers to compare notes with the Book of John from the Bible 15 : 13 Greater love has no one than this: to lay down one's life for one's friends.

Business intelligence metadata

Amazon Redshift

Using enhanced dataset metadata

Matthew 7:5

Control of senses

Mahindra Satyam
Information technology company
Mahindra Satyam was an Indian information technology services company based in Hyderabad, India, offering software development, system maintenance, packaged software integration and engineering design services.

Yamas

Satyam, 'truthfulness' as a virtue. The most often mentioned Yamas are Ahimsa (non-violence), Satya (non-falsehood, truthfulness), Asteya (non-stealing), Mitahara (non-excess in food, moderation in food), Kṣamā (non-agitation about suffering, forgiveness), and Dayā (non-prejudgment, compassion).

Matthew 7:3-5

“Why do you look at the speck of sawdust in your brother’s eye and pay no attention to the plank in your own eye? How can you say to your brother, ‘Let me take the speck out of your eye,’ when all the time there is a plank in your own eye? You hypocrite, first take the plank out of your own eye, and then you will see clearly to remove the speck from your brother’s eye.

people who live in glass houses shouldn't throw stones

saying
This means that you should not criticize other people for bad qualities in their character that you have yourself.

Russian traditions and superstitions

Petabyte-scale Analytics with Power BI and Azure

The Heart-Brain Connection: The Neuroscience of Social, Emotional, and Academic Learning

"behavioral interventions can produce more specific brain changes than biological intervention as a medication"

Papez circuit

Prefrontal cortex

Dorsolateral prefrontal cortex

Frontal Structural Neural Correlates of Working Memory Performance in Older Adults

BigQuery : Petabyte Scale Data warehouse In GCP

11 Natural Ways to Lower Your Cortisol Levels

Negative emotion modulates prefrontal cortex activity during a working memory task: a NIRS study

                affective                 chronometry

...oxyHb changes during the task were significantly greater following negative rather than neutral stimulation... SO TAXING! (Scientific proof for a need of an attitude to commit to cognitive labor for moxy sake)

grep — Search a file for a specified pattern

memory

Scientists Watch a Memory Form in a Living Brain

While watching a fearful memory take shape in the brain of a living fish, neuroscientists see an unexpected level of rewiring occur in the synaptic connections.

Dialectical behavior therapy(DBT)

Cognitive-cultural economy

Cognitive behavioral therapy(CBT)

Critical thinking

What is working memory?

Working memory, or operative memory, can be defined as the set of processes that allow us to store and manipulate temporary information and carry-out complex cognitive tasks like language comprehension, reading, learning, or reasoning. Working memory is a type of short-term memory.

Short-term memory

Short-term memory (or "primary" or "active memory") should be distinguished from working memory, which refers to structures and processes used for temporarily storing and manipulating information. Random-access memory, is the analogy of active memory in computers.

Researchers uncover how the human brain separates, stores, and retrieves memories

Researchers have identified two types of cells in our brains that are involved in organizing discrete memories based on when they occurred. This finding improves our understanding of how the human brain forms memories and could have implications in memory disorders such as Alzheimer’s disease.

What is The BRAIN Initiative®?

The Brain Research Through Advancing Innovative Neurotechnologies® (BRAIN) Initiative is aimed at revolutionizing our understanding of the human brain. By accelerating the development and application of innovative technologies, researchers will be able to produce a revolutionary new dynamic picture of the brain that, for the first time, shows how individual cells and complex neural circuits interact in both time and space

Boundary cell

Dirichlet boundary condition

Cellular neural network

Finite element method

The finite element method (FEM) is a popular method for numerically solving differential equations arising in engineering and mathematical modeling. Typical problem areas of interest include the traditional fields of structural analysis, heat transfer, fluid flow, mass transport, and electromagnetic potential.

The FEM is a general numerical method for solving partial differential equations in two or three space variables (i.e., some boundary value problems). To solve a problem, the FEM subdivides a large system into smaller, simpler parts that are called finite elements. This is achieved by a particular space discretization in the space dimensions, which is implemented by the construction of a mesh of the object: the numerical domain for the solution, which has a finite number of points. The finite element method formulation of a boundary value problem finally results in a system of algebraic equations. The method approximates the unknown function over the domain.[1] The simple equations that model these finite elements are then assembled into a larger system of equations that models the entire problem. The FEM then approximates a solution by minimizing an associated error function via the calculus of variations.

BitTorrent

  • Automated documentation (Swagger/OpenUI)

ZeroNet

ZeroNet is a decentralized web-like network of peer-to-peer users, created by Tamas Kocsis in 2015. Programming for the network is based in Budapest, Hungary; is built in Python; and is fully open source.[2] Instead of having an IP address, sites are identified by a public key (specifically a bitcoin address).

ZeroNet

Open, free and uncensorable websites,
using Bitcoin cryptography and BitTorrent network

Net-Zero

The Climate Program leads City efforts to address the challenges of climate change for Austin.

Zero Waste Case Study: Austin

Karpman Drama Triangle 

Pourquoi story 

Google Play Developer API 

EVOLUTION OF BEHAVIOR 

Writing WebSocket client applications

Internet protocol suite

The Internet protocol suite, commonly known as TCP/IP, is the set of communications protocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP).

Dapper ORM

Hibernate (framework)

October is a self-hosted content management system (CMS) based on the PHP programming language and Laravel web application framework. It supports MySQL, SQLite and PostgreSQL for the database backend and uses a flat file database for the front end structure.

Magento

Software
Magento is an open-source e-commerce platform written in PHP.

PHP-Nuke

concrete5

System software
Concrete CMS is an open-source content management system for publishing content on the World Wide Web and intranets

ProcessWire is a free and open source content management system, content management framework and web application framework written in the PHP programming language.
django CMS is a free and open source content management system platform for publishing content on the World Wide Web and intranets

Social netwroking platform to house the homeless as technocracy planks of a computing platfrom.

io — Core tools for working with streams

Attention (machine learning)

Neuroplasticity

Pipes

Computer memory

Cognitive computing

python-pipes

The concept of toxic masculinity is used in academic and media discussions of masculinity to refer to certain cultural norms that are associated with harm to society and men themselves. 

How Toxic Is Oil?

Houston oilfield services company Baker Hughes 
Kleshas (Sanskrit: क्लेश, romanized: kleśa; Pali: किलेस kilesa; Standard Tibetan: ཉོན་མོངས། nyon mongs), in Buddhism, are mental states that cloud the mind and manifest in unwholesome actions. Kleshas include states of mind such as anxiety, fear, anger, jealousy, desire, depression, etc.

Ten Unmistakable Signs Of A Toxic Culture

A toxic work culture is one where the workplace is plagued by fighting, drama and unhappy employees to the point that productivity and the well-being of the people in the office is affected

Texas wildcatting 'culture', fighting in sandbox over toys... in the middle east, Syria, Ukraine, Romania Holy Wars from world war occupying Ukraine, Soviet occupation of Bessarabia and Northern Bukovina

Texas leads the U.S. in fatal industrial accidents.

Fatal Occupational Injuries in Texas

Why does Texas have so many natural disasters?
 
Withdrawal of extreme amounts of groundwater, as well as the long history of hydrocarbon production along the Gulf Coast, has caused some areas to sink (land subsidence), and these populated areas have become even more vulnerable to the effects of the plethora of natural hazards that occur in the state.
Texas is ranked first in the U.S. in the variety and frequency of natural disasters. Flooding, wildfires, tornados, hurricanes, hail storms, sinkholes, erosion and drought all occur in the state. Sometimes, even utilization of the state’s natural reserves of oil, gas, and water can lead to subsidence and earthquakes

The Texas Cancer Belt

Houston Health Department

Fifth Ward/Kashmere Gardens Union Pacific Railroad Site Contamination and Area Cancer Cluster

Department heads take charge of departments. They monitor, lead, train, and manage staff. They may also conduct research and set goals. Department heads ensure that overall day-to-day operations run smoothly.

Unlearning Toxic Masculinity

Former President Trump
Senator Ted Cruz
Governor Abbott
AG Ken Paxton
Lt. Gov. Dan Patrick
 
Formally stated, Newton's third law is: For every action, there is an equal and opposite reaction. The statement means that in every interaction, there is a pair of forces acting on the two interacting objects. The size of the forces on the first object equals the size of the force on the second object

Toxic Femininity

Is acting as fragile and frivolous internalized misogyny?

Toxic behavior as traits include unsupportive, manipulative, judgemental, controlling, self centered behavior and trigger feelings of worthlessness, depression, anxiety and unhappiness. 

7 Types of Toxic People and How to Spot Them

Kleshas (Hinduism)

Learned helplessness

Learned helplessness creates a self-reinforcing negative feedback loop that can harm people's health, career, and relationships. When parents are neglectful, emotionally absent, or abusive, children can come to feel insecure, inadequate, and helpless.

Chaos, Cancer, the Cellular Operating System and the Prediction of Survival in Head and Neck Cancer

United States federal executive departments

Behavioral theory holds that psychological events can be described and explained in terms of observable behavior and its associations with environmental stimuli and occurrences.

What is the behavioral learning theory?

Your first baby step to learn Deep Learning for Image Classification

CNN is a type of neural network model which allows us to extract higher representations for the image content. Unlike the classical image recognition where you define the image features yourself, CNN takes the image's raw pixel data, trains the model, then extracts the features automatically for better classification.

NOAA Grants

Assessing the Aquatic Life Use 

A simple technique to mitigate microplastic pollution and its mobility (via ballast water) in the global ocean

Cancer cluster

Wax

Resin

Bioresins

Bioresins based on polyfurfuryl alcohol and produced from agricultural wastes have recently been used with interesting results in engineering structures (Gkaidatzis, 2014).

Picard horn

Diagnosis of lung cancer by canine olfactory detection in urine and breath samples.

" Brown's special highlights the link between courage and vulnerability, which she describes as "having the courage to show up when you can't control the outcome."

Dogs Are Teaching Machines to Sniff Out Cancer

In a proof-of-concept study, researchers used dogs’ diagnoses of prostate cancer to inform a machine learning algorithm with the goal of one day detecting cancers with canine-level accuracy.

Python code for octonion and sedenion multiplication

Molecular geometry

Leslie Miller-Robbie1,2, Anu Ramaswami1,3 and Priyanie Amerasinghe4

Cancer clusters in the USA: What do the last twenty years of state and federal investigations tell us?

Michael Goodman,1 Joshua S. Naiman,2,3 Dina Goodman,4 and Judy S. LaKind2,5,6

Great Pacific Garbage Patch

The Great Pacific Garbage Patch is a collection of marine debris in the North Pacific Ocean. Marine debris is litter that ends up in the ocean, seas, and other large bodies of water.

Decision trees: leaf-wise (best-first) and level-wise tree traverse

What is a cancer cluster?

The electronic Contract Proposal Submission (eCPS) is a component of NIH's integrated, secure system for the electronic submission, capture, tracking and review of contract proposals.

Python | os.getpid() method

ps command in Linux with Examples 

gnuplot homepage

What is gnuplot used for?
 
gnuplot is a command-line and GUI program that can generate two- and three-dimensional plots of functions, data, and data fits. The program runs on all major computers and operating systems (Linux, Unix, Microsoft Windows, macOS, FreeDOS, and many others).

Prefrontal-Hippocampal Interactions in Memory and Emotion

When computers can read emotions by analyzing data, including facial expressions, gestures, tone of voice, force of keystrokes, and more to determine a person's emotional state and then react to it, we call this artificial emotional intelligence

Emotion AI, explained

Radiofrequency ablation

Radiofrequency ablation (RFA), also called fulguration,[1] is a medical procedure in which part of the electrical conduction system of the heart, tumor or other dysfunctional tissue is ablated using the heat generated from medium frequency alternating current (in the range of 350–500 kHz).[2] RFA is generally conducted in the outpatient setting, using either local anesthetics or conscious sedation anesthesia. When it is delivered via catheter, it is called radiofrequency catheter ablation.

Two important advantages of radio frequency current (over previously used low frequency AC or pulses of DC) are that it does not directly stimulate nerves or heart muscle and therefore can often be used without the need for general anesthesia, and that it is very specific for treating the desired tissue without significant collateral damage.

Limbic System: Amygdala

Anthony Wright, Ph.D., Department of Neurobiology and Anatomy, McGovern Medical School

PySerial

What is Python serial library?
 
PySerial is a library which provides support for serial connections ("RS-232") over a variety of different devices: old-style serial ports, Bluetooth dongles, infra-red ports, and so on. It also supports remote serial ports via RFC 2217 (since V2. 5) 

Welcome to PySerial’s documentation

This module encapsulates the access for the serial port. It provides backends for Python running on Windows, OSX, Linux, BSD (possibly any POSIX compliant system) and IronPython. The module named “serial” automatically selects the appropriate backend.

Tools

serial.tools.list_ports

Visual perception

Early studies

Sympathetic and Parasympathetic, take a step back and take a deep breath

Ganglia

A ganglion is a fluid-filled structure that connects to a joint or tendon sheath through a one-way tract from the joint into the mass.3 Unlike a synovial hernia, the mass lacks a synovial lining and often is filled with mucin.

RGCs are important neuronal cells in the eye, which receive visual information ... and the ganglia also receive sympathetic and parasympathetic connections ...

Optic disc

Ganglion cell

Optic nerve

Optical Biosensors for Label-Free Detection of Small Molecules

Optical biosensors

Monitoring Editor: Pedro Estrela

Surface plasmon resonance

Surface plasmon resonance (SPR) is the resonant oscillation of conduction electrons at the interface between negative and positive permittivity material stimulated by incident light. SPR is the basis of many standard tools for measuring adsorption of material onto planar metal (typically gold or silver) surfaces or onto the surface of metal nanoparticles. It is the fundamental principle behind many color-based biosensor applications, different lab-on-a-chip sensors and diatom photosynthesis.

Amygdala

Warning, warning... The amygdala has a central role in anxiety responses to stressful and arousing situations. Pharmacological and lesion studies of the basolateral, central, and medial subdivisions of the amygdala have shown that their activation induces anxiogenic effects, while their inactivation produces anxiolytic effects.

Amygdala hijack

DEEP LEARNING BREATHING
NCJ Number
25441
Author(s)
C J FRIEDRICH
Date Published
1972

Bhagavad Gita: Chapter 2, Verse 47

Actions do not cling to me because I am not attached to their results. Those who understand this and practise it live in freedom.

Screener may refer to:

Best Stock Screeners

When you need to find the perfect stock for your investment strategy

American Broadcasting-Paramount Theatres

Texas Third Coast Developers, with those holy cows, for weird Batman Bollywood performance art

Persian Bayán

 with 19 months of 19 days each and a period of intercalary days to allow for the calendar to be solar:

March equinox

Voice Dialogue is the specific method we developed to explore the world of the Selves – also known as sub-personalities.

Water quality in Mexico, UN, Global Water Security, Toilets in Africa and India, Sensors to detect pathogens, cancer built into toilets that wireless transmitting data to a secure docbot channel and then harnessing energy from biowaste are huge innovations for municipal county water treatment systems engineering.  Serenity Sells HHS Medicare Medicaid Innovation smart contracts as well global fixed income arbitrage as an income optimization commodity pool operation WIOA ADA pilot prototypes..

I am on a mission to cure river blindness in Africa, cure muscular dystrophy, cancer, innovate clean energy systems and address water security and sanitation in Africa and India as well house the homeless in America and the world, innovating Net Zero building architecture and thank you kindly for helping with such pursuits to serve the greater part of Texas.

Dowry Deaths in India: A Harrowing Reality

How to support a struggling friend

Sometimes it’s hard to know what to say or do. Use these five strategies for providing effective emotional support

Statistics review 7: Correlation and regression

U.S. Debt and Foreign Loans, 1775–1795

What Is a War Chest?

The Plight of the Invisibly Ill

Chronic diseases perplex doctors, while leaving patients mysteriously sick. Meghan O’Rourke explores the struggle in an excerpt from her new book, The Invisible Kingdom.

Retiring members of Congress have $50 million in their campaign coffers. Where will it go?

Freud’s Shylock
DAVID HILLMAN

Some social conventions look less like a debate about asset classes and more like a religious cult: HAM, LEGION, PIGGYBACKING...

The Merchant of Venice

What is the symbolic meaning of throne?
 
throne, chair of state often set on a dais and surmounted by a canopy, representing the power of the dignitary who sits on it and sometimes conferring that power. ... In the ancient world, especially in the East, thrones almost invariably had symbolic magnificence.Throne is defined as the power of a king, or the chair where royalty sits. An example of a throne is where a queen sits in royal court. noun.

Toilet psychology

"Gold Buggery"

Religious belief

What a shame, man.

Shame

Shame

By James M. Shultz, M.D., Jungian analyst (IRSJA--Austin, Texas)

And yet by a throne set in heaven is signified the Divine truth there, thus heaven as to Divine truth; and by Him that sat upon the throne is meant the Lord.

Singin' in the Bathtub

Jason Mellard

Director, Center for Texas Music History
Assistant Professor of Practice
Department of History
Texas State University

Thanks Mom, for instrumental orchestration legacy composition sake...

The ancient history of adding insult to injury

The goals of the Research and Development Center, at 1 Chelsea St. in New London, Connecticut, are to pursue and apply new scientific technologies for the maritime environment and provide incremental improvements that strategically transform the way the Coast Guard does business

Hailing Acoustic Laser & Light Tactical System (HALLTS)

Helicopter Interdiction Tactical Squadron

Research & Development Center

BIENNIAL REPORT 2017-2018
Basic Concepts and Processes for
First-Time CubeSat Developers

Jonathan (High Priest)

Battle of Adasa

Alcimus

Can police use drones in Texas?
 
Specifically, Texas police are permitted under the language off the Act to use drone surveillance when they have “reasonable suspicion” that a person has committed a crime and they are using the drone in the immediate pursuit of such person.

Shadow Wolves

Bureau of Indian Affairs

Careers

The Bureau of Indian Affairs (BIA), Office of Justice Services (OJS), provides police, investigative, corrections, technical assistance, and court services across this broad expanse of Indian Country. 

How machine learning can be a force multiplier for public safety

Machine learning can offer an extra pair of hands to do a repetitive task, or provide an extra pair of eyes and ears

12 Innovative Police Technologies

Erik Fritsvold, PhD

Controlling Our Airspace in the Age of Drones

S&T ARTIFICIAL
INTELLIGENCE &
MACHINE LEARNING
STRATEGIC PLAN

Intergovernmental organization (IGO)

The term intergovernmental organization (IGO) refers to an entity created by treaty, involving two or more nations, to work in good faith, on issues of common interest. In the absence of a treaty an IGO does not exist in the legal sense. For example, the G8 is a group of eight nations that have annual economic and political summits. IGOs that are formed by treaties are more advantageous than a mere grouping of nations because they are subject to international law and have the ability to enter into enforceable agreements among themselves or with states.

Interoperability

In the New Testament the word pharmekeia occurs three times (Gal 5:19-21; Rev 9:21; 18:23). Each time, it is translated as ‘sorcery’ or ‘magic’ and it is something that is spoken of in negative terms.

covet

verb
1 : to wish for earnestly covet an award
2 : to desire (what belongs to another) inordinately or culpably The king's brother coveted the throne.

4You cover up your ignorance with lies;
    you are like doctors who can't heal anyone.
Say nothing, and someone may think you are wise!

Listen while I state my case.

Sophist

Austin resident philosopher David Hirsch DBA Serenity Sells SBIR Blackrock as the rock Texans have been living under for Texas Independence Day 2022 open  Maslenitsa forum with democratic representatives

Chief Officer Era of Accountability:

What is BlackRock known for?

BlackRock is one of the world's leading providers of investment, advisory and risk management solutions. ... We manage assets for clients in North and South America, Europe, Asia, Australia, the Middle East and Africa.

Maccabean Revolt

Feller's coin-tossing constants

Chaotic behavior exists in many natural systems, including fluid flow, heartbeat irregularities, weather and climate. It also occurs spontaneously in some systems with artificial components, such as the stock market and road traffic.

Chaos theory

Quantized Columns

How We Can Make Sense of Chaos

Dynamical systems can be chaotic and impossible to predict, but mathematicians have discovered tools to help understand them.

Smith–Volterra–Cantor set

Feigenbaum constants

Butter Lady

Crepe week

Visual Studio Container Tools for Docker

For Jung Shadow Sake with that Devil Staircase Cantor Set!
 
My great grandfather was Dr. Price Bell, one of the first western doctors to treat Native Americans in Indian Territory.

"Honor the Texas flag; I pledge allegiance to thee, Texas, one state under God, one and indivisible." I pledge: My Head to clearer thinking, My Heart to greater loyalty, My Hands to larger service, and My Health to better living, For my club, my community, My country and my world.

Writing a Resilient and Scalable RESTful API in Go

This article covers the topic of creating a scalable and configurable REST API, served with the help of express. The code is written in TypeScript. The API is database-agnostic, but in the final example, I will use MongoDB.


Google

Mean, Median, Mode and Range

Howdy, I'm Dave and I'm from Austin Texas
Ye Haw
Urine my way for world toilet day?

Stream processing

Domain knowledge

At the Domain in Austin?
 
Not exactly, more like...

Domain knowledge

Why domain knowledge is important in Data Science

Primitive data type

Dynamic typing

Indentation refers to the spaces at the beginning of a code line. Where in other programming languages the indentation in code is for readability only, the indentation in Python is very important.

Indentation style

Python is completely object oriented, and not "statically typed". You do not need to declare variables before using them, or declare their type

Variable (computer science)

Free variables and bound variables

Using the Python Interpreter

VISUALIZE CODE EXECUTION
Learn Python, Java, C, C++, JavaScript, and Ruby
 
 

Information theory

Qubit

Quantum channel

Memory safety

Network packet

Node (computer science)

Python Shell

A simple way to run Python scripts from Node.js with basic but efficient inter-process communication and better error handling.

Feature selection

Data Science Education With Domain Knowledge and System Principles

Cluster analysis

k-means clustering

Standard algorithm (naive k-means)

A Gentle Introduction on Market Basket Analysis — Association Rules

Affinity analysis

Graph Analytics

Basic Introduction to what Graph Analytics is…

Data cleansing

Data Lake,
does charter hold water

Decision tree learning

Estimate of Positive Correctness

Getting Started

Know your species of machine learning task

Google Chart API

About Google chart tools

Timeline

Overview

The Timeline is an interactive javascript visualization chart to visualize data in time.

You could help your dad or neighbor for example with

A step-by-step guide to visualizing the development of COVID-19 vaccines

Or even your brother in law

Creating a Timeline with TimelineJS and JSON

Monty Python programers flying circus

Coat of arms of Mexico

The emblem shows an eagle devouring a serpent, which actually is in conflict with Mesoamerican belief. The eagle is a symbol of the sun and a representation of the victorious god Huitzilopochtli, in which form, according to legend, bowed to the arriving Aztecs.
Blazon: Atop a nopal pedestal, a Mexican gold...
Armiger: United Mexican States
Adopted: 16 September 1968

Snake handling in religion

Garuda

Garuda (Sanskrit: गरुड Garuḍa; Pāli: गरुळ Garuḷa), also Galon or Nan Belu in Burmese and Karura in Japanese, is a legendary bird or bird-like creature in Hindu, Buddhist and Jain faith.[1][3][4] He is variously the vehicle mount (vahana) of the Hindu god Vishnu, a dharma-protector and Astasena in Buddhism, and the Yaksha of the Jain Tirthankara Shantinatha.[3][4][5] The Brahminy kite is considered as the contemporary representation of Garuda.

Harvey Birdman, Attorney at Law

Anthropomorphism is the attribution of human traits, emotions, or intentions to non-human entities. It is considered to be an innate tendency of human psychology

For literary art considerations, I am including my sister Carmen and father to mention:

My sister Carmen game me a book Book by Max Ernst


A Week of Kindness or the Seven Deadly Elements

Seton and Lorenz were unabashedly anthropomorphic. In other words, they attributed human reactions to animals.

Crow

By Boria Sax
page 151


My dad gave me a few Ernest Thompson Seton books, and I am enjoying the literary anthropomorphic writing style.

Of Course Carole Zoom....

The word zoomorphism derives from the Greek ζωον (zōon), meaning "animal", and μορφη (morphē), meaning "shape" or "form". It can mean:

  • Art that imagines humans as non-human animals[1]
  • Art that portrays one species of animal like another species of animal
  • Art that creates patterns using animal imagery, or animal style
  • Deities depicted in animal form, such as exist in ancient Egyptian religion[2]
  • Therianthropy: the ability to shapeshift into animal form[3]
  • Attributing animal forms or animal characteristics to other animals, or things other than an animal; similar to but broader than anthropomorphism
  • The tendency of viewing human behaviour in terms of the behaviour of animals, contrary to anthropomorphism, which views animal or non-animal behaviour in human terms

Perl is open-source, object-oriented programming used for building and implementing applications in unix systems, similar to python.
... Though Perl is not easy to learn, it makes text processing simple & short. Whereas Python is easy to learn, and it requires functions for text processing.

Three pearls of number theory

Book by Aleksandr Khinchin

Icon (computing)

Iconography

Iconoclasm is the social belief in the importance of the destruction of icons and other images or monuments, most frequently for religious or political reasons

Aniconism

Religion
Aniconism is the absence of material representations of both the natural and supernatural worlds in various cultures, particularly in the monotheistic Abrahamic religions.

Byzantine Iconoclasm

Katsushika Hokusai Japanese. Shōki (Chinese: Zhong Kui) was a scholar of early seventh-century China who committed suicide after being cheated out of the first rank in civil service examinations, yet who was buried with honors after the emperor heard the tragic tale.
The Green Tara (Sanskrit: Shyamatara; Tibetan: Sgrol-ljang) was believed to be incarnated as the Nepali princess. She is considered by some to be the original Tara and is the female consort of Amoghasiddhi (see Dhyani-Buddha), one of the “self-born” buddhas.

Zoomorphism

Sacred Animals of India

Magico-religious and social belief of tribals of district Udaipur, Rajasthan

Buddhism : Naga, Nagas, Nagi

Nāga

Chandra

NASA

Chandra as Moon and Monday as well

Allah as a lunar deity

Khonsu (Ancient Egyptian: ḫnsw; also transliterated Chonsu, Khensu, Khons, Chons or Khonshu) is the ancient Egyptian god of the Moon. His name means "traveller", and this may relate to the perceived nightly travel of the Moon across the sky. Along with Thoth he marked the passage of time.

Deities in Ancient Egypt - Thoth

Thoth was the god of the moon, sacred texts, mathematics, the sciences, magic, messenger and recorder of the deities, master of knowledge, and patron of scribes. His Egyptian name was Djehuty, which means “He who is like the Ibis.” He was depicted as an ibis bird or a baboon.

Khonsu

Chronos

Saturn (mythology)

Saturn Devouring His Son

Kali

master of death, time and change 
 

Magi were priests in Zoroastrianism and the earlier religions of the western Iranians
In the Osiris myth, the most important Egyptian myth, Set is portrayed as the usurper who killed and mutilated his own brother, Osiris. Osiris's wife, Isis, reassembled his corpse and resurrected her dead husband with the help of the goddess Nephthys. The resurrection lasted long enough to conceive his son and heir, Horus. Horus sought revenge upon Set and many of the ancient Egyptian myths describe their conflicts.[5]

In ancient Egyptian astronomy, Set was commonly associated with the planet Mercury.[6]

Since he is related to the west of Nile which is the desert, he is sometimes associated with a lesser deity, Ha, god of the desert, which is a deity depicted as a man with a desert determinative on his head.

Budha is part of the Navagraha in Hindu zodiac system, considered benevolent, associated with an agile mind and memory.

Budha

AbodeBudhaloka
PlanetMercury
DayWednesday
MountYali lion, or chariot hauled by eight horses of deep yellow colour

The Philosophical Significance of the Concept of Probability in Quantum Mechanics 

  F. S. C. Northrop

Cat People

Disputes

Abuwtiyuw

Stratego

Romulus and Remus

Romulus And Remus And The Similarities Between The Story Of Cain And Abel

Dogon people

The Dogon learned from the Nommos that there was a companion star (Sirius B) orbiting the main star. This legend supposedly goes back hundreds of years. In 1970 scientists discovered there was indeed a Sirius B, though they had suspected its existence for over a century.
This culture was aware of Sirius B before the inventions of the telescope from Europe helped Europeans distinguish Sirius A from Sirius B.

What did the Dogon call Sirius?

Sirius is also referred to as ''Stella Splendida,'' implying that then, as now, it was the brightest star. Sirius was already the subject of a mystery concerning the traditional lore of the Dogon tribe of Mali, near Timbuktu in western Africa.

6TH-CENTURY MANUSCRIPT ADDS TO MYSTERY OF STAR

Dog Star
Zipporah or Tzipora is mentioned in the Book of Exodus as the wife of Moses, and the daughter of Reuel/Jethro, the priest and prince of Midian.


Upanayana (Sanskrit: उपनयन upanayana-) Janai or janeau or poita or Yagnopavita (Sanskrit: जनै, जनेऊ) is one of the traditional saṃskāras (rites of passage) that marked the acceptance of a student by a guru (teacher or tutor) and an individual's entrance to a school in Hinduism. The tradition is widely discussed in ancient Sanskrit texts of Hinduism and varies regionally.[2] The sacred thread (yagyopavita or janeu) is received by the boy during this ceremony, that he continues wearing from left shoulder to the right crossing the chest thereafter. Generally this ceremony should be done before the age of 16.

Four Noble Truths

Buddhist paths to liberation


Yantra (यन्त्र) (Sanskrit) (literally "machine, contraption"[1])

Pure land

Amitabha's forty-eight vows

Hinduism and Judaism

Orthodox Jewish philosophy

Anarchism and Orthodox Judaism

Marian feast days are specific holy days of the liturgical year recognized by Christians as significant Marian days for the celebration of events in the life of the Blessed Virgin Mary and her veneration. The number of Marian feasts celebrated, their names (and at times dates) can vary among Christian denominations.

Sati (Hindu goddess)

Sati (/ˈsʌt/, Sanskrit: सती, IAST: Satī), is also known as Dākṣāyaṇī (Sanskrit: दाक्षायणी, lit. daughter of Daksha), is the Hindu goddess of marital felicity and longevity. She was the first wife of Shiva, other being Parvati, who was her reincarnation after her death.

In Hindu legend, both Sati and Parvati, successively play the role of bringing Shiva away from ascetic isolation into creative participation with the world.[1] The act of Sati, in which a Hindu widow self-immolates on her husband's pyre as a final and consummate act of loyalty and devotion, is patterned after the deed committed by this goddess to uphold the honour of her husband.[2]

Avidya,

Vairagya

Vairāgya (वैराग्य) is a Sanskrit term used in Hindu as well as Jain philosophy that roughly translates as dispassion, detachment, or renunciation, in particular renunciation from the pains and pleasures in the temporary material world. The Hindu philosophers who advocated vairāgya told their followers that it is a means to achieve moksha.

True vairāgya refers to an internal state of mind rather than to external lifestyle and can be practiced equally well by one engaged in family life and career as it can be by a renunciate. Vairāgya does not mean suppression of or developing repulsion for material objects. By the application of vivek (spiritual discrimination or discernment) to life experience, the aspirant gradually develops a strong attraction for the inner spiritual source of fulfillment and happiness and limited attachments fall away naturally. Balance is maintained between the inner spiritual state and one's external life through the practice of seeing all limited entities as expressions of the one Cosmic Consciousness or Brahman.

Christianity in Ethiopia

Christianity in Ethiopia is the largest religion in the country and dates back to the ancient Kingdom of Aksum, when the King Ezana first adopted the faith. This makes Ethiopia one the first regions in the world to officially adopt Christianity. Various Christian denominations are now followed in the country. Of these, the largest and oldest is the Ethiopian Orthodox Tewahedo Church (in Amharic: የኢትዮጵያ ኦርቶዶክስ ተዋሕዶ ቤተክርስትያን Yäityop'ya ortodoks täwahedo bétäkrestyan) an Oriental Orthodox church centered in Ethiopia. The Orthodox Tewahedo Church was part of the Coptic Orthodox Church until 1959, when it was granted its own patriarch by Coptic Orthodox Pope of Alexandria and Patriarch of All Africa Cyril VI. Ethiopia was the only region of Africa to survive the expansion of Islam as a Christian state.[1]

Kwanzaa

Nag Hammadi library

The Gnostic Gospels

Keepers of the Lost Ark?

Christians in Ethiopia have long claimed to have the ark of the covenant. Our reporter investigated

Bezalel is said to have been only thirteen years of age when he accomplished his great work (Sanhedrin 69b); he owed his wisdom to the merits of pious parents; his grandfather being Hur and his great-grandmother Miriam, he was thus a grandnephew of Moses (Exodus R. 48:3, 4).

1 Peter 5 : 3
not lording it over those entrusted to you, but being examples to the flock.

Church of Our Lady Mary of Zion

According to Ethiopian tradition, the Ark of the Covenant is preserved in the ancient holy city of Aksum. For centuries, the great relic was kept in the Church of Mary of Zion, where the emperor Iyasu is recorded as having seen it and spoken to it in 1691. Now it is kept in the Chapel of the Tablet, which was built beside the church during the reign of the last emperor Haile Selassie. The relic is entrusted to a single guardian, who burns incense before it and recites the Biblical Book of Psalms. No one else can approach it, including the high priest of Aksum. The guardian is not only a monk, but a virgin as well, and he serves the Ark until he appoints a successor as his own death approaches. 


'.MatthewC.Foulkes*

Remembering the Perez Orchestra

"Perez-Uzzah", literally "Outburst Against Uzzah",[37]

Luke 22 : 26
26 But you are not to be like that. Instead, the greatest among you should be like the youngest, and the one who rules like the one who serves.

Ark of the Covenant

In the days of King David

In the Biblical narrative, at the beginning of his reign over the United Monarchy, King David removed the Ark from Kirjath-jearim amid great rejoicing. On the way to Zion, Uzzah, one of the drivers of the cart that carried the Ark, put out his hand to steady the Ark, and was struck dead by God for touching it. The place was subsequently named "Perez-Uzzah", literally "Outburst Against Uzzah",[37] as a result. David, in fear, carried the Ark aside into the house of Obed-edom the Gittite, instead of carrying it on to Zion, and it stayed there for three months.[38][39]

On hearing that God had blessed Obed-edom because of the presence of the Ark in his house, David had the Ark brought to Zion by the Levites, while he himself, "girded with a linen ephod ... danced before the Lord with all his might" and in the sight of all the public gathered in Jerusalem, a performance which caused him to be scornfully rebuked by his first wife, Saul's daughter Michal.[40][41][42] In Zion, David put the Ark in the tent he had prepared for it, offered sacrifices, distributed food, and blessed the people and his own household.[43][44][45] David used the tent as a personal place of prayer.[46][47]

The Levites were appointed to minister before the Ark.[48] David's plan of building a temple for the Ark was stopped on the advice of the prophet Nathan.[49][50][51][52] The Ark was with the army during the siege of Rabbah;[53] and when David fled from Jerusalem at the time of Absalom's conspiracy, the Ark was carried along with him until he ordered Zadok the priest to return it to Jerusalem.[54]

ATK-SemiEmpirical (ATK-SE) can model the electronic properties of molecules, crystals and devices using both self-consistent and non-self-consistent tight-binding models. In this chapter the implemented tight-binding models based on the Slater-Koster model and the extended Hückel model are presented.

In Solomon's Temple

According to the Biblical narrative, when Abiathar was dismissed from the priesthood by King Solomon for having taken part in Adonijah's conspiracy against David, his life was spared because he had formerly borne the Ark.[55] Solomon worshipped before the Ark after his dream in which God promised him wisdom.[56]

During the construction of Solomon's Temple, a special inner room, named Kodesh Hakodashim (Eng. Holy of Holies), was prepared to receive and house the Ark;[57] and when the Temple was dedicated, the Ark—containing the original tablets of the Ten Commandments—was placed therein.[58] When the priests emerged from the holy place after placing the Ark there, the Temple was filled with a cloud, "for the glory of the Lord had filled the house of the Lord".[59][60][61]

When Solomon married Pharaoh's daughter, he caused her to dwell in a house outside Zion, as Zion was consecrated because it contained the Ark.[62] King Josiah also had the Ark returned to the Temple,[63] from which it appears to have been removed by one of his predecessors (cf. 2 Chron. 33-34 and 2 Kings 21-23).

Indiana Jones and the Temple of Doom

Sobek

Ammit

Worship of this Egyptian goddess spread from Egypt to England

Egyptians adored Isis, divine protector of the dead, for two millennia before her cult spread beyond the Nile to the rest of the Roman Emprie.

From cats to cows to crocodiles, ancient Egyptians worshipped many animal gods

As 3,000 years of art and sculpture reveal, the divine menagerie of ancient Egypt reflects the rich and varied creatures of the Nile Valley.

Maat

evolution

Evolution Runs Faster on Short Timescales

Examine evolution over the course of years or centuries, and you’ll find that it progresses much more quickly than it does over geologic time. Now the oldest viruses on the planet are enabling scientists to calibrate this evolutionary clock.

The timetable of evolution

Ahvaz

Pol-e Kaisar ("Caesar's bridge"),

Old MacDonald Had a Farm

UAS/AUV Lab Experiment Results

10 Properties of Secure Embedded Systems

Secure EmbeddedSystems
Michael Vai, David J. Whelihan, Benjamin R. Nahill, Daniil M. Utin,

Sean R. O’Melia, and Roger I. Khazan

CubeSat-based Science Missions for Geospace and Atmospheric Research

AIS Vessel Traffic Data - Continental US - US Coast Guard - Yearly Totals 


The Age of With™
The AI advantage in
defence and security

 
US Army Artificial Intelligence Innovation Institute (A2I2) Aiding Multi-DomainOperations (MDO)

Military Applications of Artificial Intelligence: Ethical Concerns in an Uncertain World

Real-time kinematic positioning (RTK)

GNSS reflectometry

GNSS positioning calculation 

GNSS software-defined receiver

GNSS applications

DARPA Opportunities

DARPA Robotics Challenge

Antonov An-225 Mriya

The world's largest cargo aircraft was reportedly destroyed in Ukraine during a Russian attack. Take a look at the plane, which was big enough to carry 50 cars. 

Cybersecurity

Minotaur Mission System

Coast Guard Office of C4 & Sensors Capabilities (CG-761)
Formerly the Office of Command and
Control Capabilities (CG-37RCC)

CONTRIBUTION OF ARTIFICIAL INTELLIGENCE TO BORDER SECURITY

Kokkalis, Konstantinos
Monterey, CA; Naval Postgraduate School

NIH Entrepreneurship News: Innovations for Healthy Living webinar, MedTech Pitch Competition, and funding opportunities

Comments

Popular posts from this blog

Wisdom of Solomon Chapter 13 Playing with Pyroelectricity Fermi Surface lattice dynamics doping nanopore semiconductors

  Serenity inside Sells ventures, lease options and charters from Texas By David Vincent Bell Hirsch Frank Zappa - Valley Girl Valleytronics (from valley and electronics) is an experimental area in semiconductors that exploits local minima ("valleys") in the electronic band structure . Certain semiconductors have multiple "valleys" in the electronic band structure of the first Brillouin zone , and are known as multivalley semiconductors. [1] [2] Valleytronics is the technology of control over the valley degree of freedom, a local maximum/minimum on the valence / conduction band , of such multivalley semiconductors. The term was coined in analogy to spintronics . While in spintronics the internal degree of freedom of spin is harnessed to store, manipulate and read out bits of information, the proposal for valleytronics is to perform similar tasks using the multiple extrema of the band structure, so that the information of 0s and 1s would be stored as diff

Wild Turkey Calls to not be attached to inaction with Turkey bowling in the Dark Store Theory

Inclusive considerations for Constitutional Freedom of Religion as a convention of our society in the United States has many tangents of consideration: Shahid and Shaheed (Arabic: شهيد ‎ šahīd , plural: شُهَدَاء šuhadāʾ  ; female: šahīda ) originates from the Quranic Arabic word meaning "witness" and is also used to denote a martyr.  The word shahid in Arabic means "witness". Its development closely parallels that of Greek martys (Greek: μάρτυς - "witness", in the New Testament also "martyr"), the origin of the term martyr. Shaheed Singh Martyrs of Sikh History History of Martyrdom in Sikhism During the 1700s And concerning Ram Dass , an American spiritual teacher, former academic and clinical psychologist, and the author of the seminal 1971 book Be Here Now: Cultivating the Witness In philosophy, normative statements make claims about how things should or ought to be, how to value them, which

Thomas Sunday Texas disparity reply follow up with the Latin America Roosevelt Corollary and Roosevelt's quarantine speech, including Frida Kahlo and Saint Hubert Iconography for considerations

Self-portrait on the borderline between Mexico and the United States (1932) Coronavirus: Sick Americans face Kafkaesque nightmare in search of testing Innovation, Anyon ?   Год крысы   God krysy    With Heartful Mind upon moral and etiquette ... cut your cloth (idiom) If you cut your cloth according to your situation, you limit what you do to take account of the resources you have. Ford would be forced to cut its cloth according to the demands of the market. Bless Me, Ultima   What is the meaning of the idiom Cut your coat according to your cloth? cut your coat according to your cloth . UK. said to emphasize that someone should do as well as possible with the limited money they have. Copper Anti-microbial Clothing & Fabrics What is the origin and meaning of the idiom cut from the same cloth? The term cut from the same cloth refers to individuals that are similar in specific ways. The origin of this phras