Source Code Quotes

We've searched our database for all the quotes and captions related to Source Code. Here they are! All 100 of them:

We must not see any person as an abstraction. Instead, we must see in every person a universe with its own secrets, with its own treasures, with its own sources of anguish, and with some measure of triumph. —ELIE WIESEL from The Nazi Doctors and the Nuremberg Code
Rebecca Skloot (The Immortal Life of Henrietta Lacks)
When someone chooses to lift the curtain on a perceived imperfection in her story, on a circumstance or condition that traditionally might be considered to be a weakness, what she’s often actually revealing is the source code for her steadiness and strength.
Michelle Obama (The Light We Carry: Overcoming in Uncertain Times)
Even calling DNA “source code” sells it short—compared to DNA, our most complex programming projects are like pocket calculators.
Randall Munroe (What If?: Serious Scientific Answers to Absurd Hypothetical Questions)
The truth is that just as - biologically - males and females are never victims of one another but both victims of the species, so man and wife together undergo the oppression of an institution they did not create. If it is asserted that men oppress women, the husband is indignant; he feels that he is the one who is oppressed - and he is; but the fact is that it is the masculine code, it is the society developed by the males and in their interest, that has established woman's situation in a form that is at present a source of torment for both sexes.
Simone de Beauvoir (The Second Sex)
To the Ultimate Inspiration of the Cosmic Code, The Source of Creativity and Nuanced Realization The Divine Mentor and Channeling Force Of Awakening and Transformation
Mohamad Jebara (The Life of the Qur'an: From Eternal Roots to Enduring Legacy)
Do I believe in an old man in the clouds with a white beard judging us mortals with a moral code from one to ten? Good Lord no, my sweet Elly, I do not! I would have been cast out from this life years ago with my tatty history. Do I believe in a mystery; the unexplained phenomenon that is life itself? The greater something that illuminates inconsequence in our lives; that gives us something to strive for as well as the humility to brush ourselves down and start all over again? Then yes, I do. It is the source of art, of beauty, of love, and proffers the ultimate goodness to mankind. That to me is God. That to me is life. That is what I believe in.
Sarah Winman
Life would be much easier if I had the source code.
Anonymous
I confess that I am now suspicious of nearly every attempt to code anger as unhealthy, no matter how well meaning or persuasive the source. I believe Stanton was correct: what is bad for women, when it comes to anger, are the messages that cause us to bottle it up, let it fester, keep it silent, feel shame, and isolation for ever having felt it or re-channel it in inappropriate directions. What is good for us is opening our mouths and letting it out, permitting ourselves to feel it and say it and think it and act on it and integrate it into our lives, just as we integrate joy and sadness and worry and optimism.
Rebecca Traister (Good and Mad: The Revolutionary Power of Women's Anger)
learn to program by looking at good programs — not just at what they do, but at the source code.
Paul Graham (Hackers & Painters: Big Ideas from the Computer Age)
The Joel Test 1. Do you use source control? 2. Can you make a build in one step? 3. Do you make daily builds? 4. Do you have a bug database? 5. Do you fix bugs before writing new code? 6. Do you have an up-to-date schedule? 7. Do you have a spec? 8. Do programmers have quiet working conditions? 9. Do you use the best tools money can buy? 10. Do you have testers? 11. Do new candidates write code during their interview? 12. Do you do hallway usability testing?
Joel Spolsky (Joel on Software)
Women are instinctively motivated by perfection, and the need to be perceived as perfect enough to be pleasing — and therefore, protected and provided for. But not too perfect so as to cause jealousy in other women. This is the source of our drive to improve ourselves, and our fear of standing out at the same time.
Alison A. Armstrong (The Queen's Code)
One study found that in more than 85% of the open source projects the researchers examined on GitHub, less than 5% of developers were responsible for over 95% of code and social interactions.7
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
So it is customary to see in a mother’s ideals and intensity of ambition what is carried out by one or another of her children. According to biographers, the source of success appears to lie in a mother’s doting—or in her neglectful selfishness, which forces an offspring out on its own.
James Hillman (The Soul's Code: In Search of Character and Calling)
The intelligence we will create from the reverse-engineering of the brain will have access to its own source code and will be able to rapidly improve itself in an accelerating iterative design cycle. Although there is considerable plasticity in the biological human brain, as we have seen, it does have a relatively fixed architecture, which cannot be significantly modified, as well as a limited capacity. We are unable to increase its 300 million pattern recognizers to, say, 400 million unless we do so nonbiologically. Once we can achieve that, there will be no reason to stop at a particular level of capability. We can go on to make it a billion pattern recognizers, or a trillion.
Ray Kurzweil
According to my sources," Megan says, which I'm pretty sure is code for I hacked into the police mainframe, but please don't tell my mom...
Ally Carter (See How They Run (Embassy Row, #2))
But just as tweets are easy to read and retweet without context as to who wrote them, code is easy to copy-paste without knowing, or caring, where it came from.
Nadia Eghbal (Working in Public: The Making and Maintenance of Open Source Software)
the bank had expanded its services in recent years to offer anonymous computer source code escrow services and faceless digitized backup.
Dan Brown (The Da Vinci Code (Robert Langdon, #2))
As a software engineer, how do you feel if your code was running in the production environment being used by millions of customers 30 minutes after you commit it to source control?
Paul Swartout (Continuous delivery and DevOps: A Quickstart Guide)
The Dependency Inversion Principle (DIP) tells us that the most flexible systems are those in which source code dependencies refer only to abstractions, not to concretions.
Robert C. Martin (Clean Architecture: A Craftsman's Guide to Software Structure and Design)
UTSL for "use the source, Luke!" a Star Wars-ian way of suggesting that people read the source code before asking questions about it
Gretchen McCulloch (Because Internet: Understanding the New Rules of Language)
Hormones affect everything. Have you ever struggled with acne, oily hair, dandruff, dry skin, cramps, headaches, irritability, exhaustion, constipation, irregular cycles, heavy bleeding, clotting, shedding hair, weight gain, anxiety, insomnia, infertility, lowered sex drive, or bizarre food cravings and felt like your body was just irrational? It’s not; it’s hormonal.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Does that mean that religious texts are worthless as guides to ethics? Of course not. They are magnificent sources of insight into human nature, and into the possibilities of ethical codes. Just as we should not be surprised to discover that ancient folk medicine has a great deal to teach modern hightech medicine, we should not be surprised if we find that these great religious texts hold versions of the very best ethical systems any human culture will ever devise. But, like folk medicine, we should test it all carefully, and take nothing whatever on faith.
Daniel C. Dennett (Darwin's Dangerous Idea: Evolution and the Meaning of Life)
If it is said men oppress women, the husband reacts indigntantly; he feels oppressed: he is; but in fact, it is the masculine code, the society developed by males and in their interest, that has defined the feminine condition in a form that is now for both sexes a source of distress.
Simone de Beauvoir
The theory behind open source is simple. In the case of an operating system, the source code-the programming instructions underlying the system-is free. Anyone can improve it, change it, exploit it. But those improvements, changes, and exploitations have to be made freely available. Think Zen. The project belongs to no one and to everyone. When a project is opened up, there is rapid and continual improvement. With teams of contributors working in parallel, the results can happen far more speedily and success­ fully than if the work were being conducted behind closed doors.
Linus Torvalds (Just for Fun: The Story of an Accidental Revolutionary)
We can achieve a sort of control under which the controlled, though they are following a code much more scrupulously than was ever the case under the old system, nevertheless feel free. They are doing what they want to do, not what they are forced to do. That's the source of the tremendous power of positive reinforcement-- there's no restraint and no revolt. By careful cultural design, we control not the final behavior, but the inclination to behave-- the motives, desires, the wishes.
B.F. Skinner (Walden Two (Hackett Classics))
Jonathan Sacks; “One way is just to think, for instance, of biodiversity. The extraordinary thing we now know, thanks to Crick and Watson’s discovery of DNA and the decoding of the human and other genomes, is that all life, everything, all the three million species of life and plant life—all have the same source. We all come from a single source. Everything that lives has its genetic code written in the same alphabet. Unity creates diversity. So don’t think of one God, one truth, one way. Think of one God creating this extraordinary number of ways, the 6,800 languages that are actually spoken. Don’t think there’s only one language within which we can speak to God. The Bible is saying to us the whole time: Don’t think that God is as simple as you are. He’s in places you would never expect him to be. And you know, we lose a bit of that in English translation. When Moses at the burning bush says to God, “Who are you?” God says to him three words: “Hayah asher hayah.”Those words are mistranslated in English as “I am that which I am.” But in Hebrew, it means “I will be who or how or where I will be,” meaning, Don’t think you can predict me. I am a God who is going to surprise you. One of the ways God surprises us is by letting a Jew or a Christian discover the trace of God’s presence in a Buddhist monk or a Sikh tradition of hospitality or the graciousness of Hindu life. Don’t think we can confine God into our categories. God is bigger than religion.
Krista Tippett (Becoming Wise: An Inquiry into the Mystery and Art of Living)
A network can be destroyed by noises that attack and transform it, if the codes in place are unable to normalize and repress them. Although the new order is not contained in the structure of the old, it is nonetheless not a product of chance. It is created by the substitution of new differences for the old differences. Noise is the source of these mutations in the structuring codes. For despite the death it contains, noise carries order within itself; it carries new information. This may seem strange. But noise does in fact create a meaning: first, because the interruption of a message signifies the interdiction of the transmitted meaning, signifies censorship and rarity; and second, because the very absence of meaning in pure noise or in the meaningless repetition of a message, by unchanneling auditory sensations, frees the listener’s imagination. The absence of meaning is in this case the presence of all meanings, absolute ambiguity, a construction outside meaning. The presence of noise makes sense, makes meaning. It makes possible the creation of a new order on another level of organization, of a new code in another network.
Jacques Attali (Noise: The Political Economy of Music)
We must not see any person as an abstraction. Instead, we must see in every person a universe with its own secrets, with its own treasures, with its own sources of anguish, and with some measure of triumph. —ELIE WIESEL from The Nazi Doctors and the Nuremberg Code
Rebecca Skloot (The Immortal Life of Henrietta Lacks)
The great religions are also, and tragically, sources of ceaseless and unnecessary suffering. They are impediments to the grasp of reality needed to solve most social problems in the real world. Their exquisitely human flaw is tribalism. The instinctual force of tribalism in the genesis of religiosity is far stronger than the yearning for spirituality. People deeply need membership in a group, whether religious or secular. From a lifetime of emotional experience, they know that happiness, and indeed survival itself, require that they bond with others who share some amount of genetic kinship, language, moral beliefs, geographical location, social purpose, and dress code—preferably all of these but at least two or three for most purposes. It is tribalism, not the moral tenets and humanitarian thought of pure religion, that makes good people do bad things.
Edward O. Wilson (The Meaning of Human Existence)
In the context of fiercely monolingual dominant cultures like that of the United States, code-switching lays claim to a form of cultural power: the power to own but not be owned by the dominant language...Code-switching is a rich source of wit, humour, puns, word play, and games of rhythm and rhyme.
Mary Louise Pratt
Not caring about our own pain and the pain of others is not working. How much longer are we willing to keep pulling drowning people out of the river one by one, rather than walking to the headwaters of the river to find the source of the pain? What will it take for us to let go of that earned self-righteousness and travel together to the cradle of the pain that is throwing all of us in at such a rate that we couldn’t possibly save everyone? Pain is unrelenting. It will get our attention. Despite our attempts to drown it in addiction, to physically beat it out of one another, to suffocate it with success and material trappings, or to strangle it with our hate, pain will find a way to make itself known. Pain will subside only when we acknowledge it and care for it. Addressing it with love and compassion would take only a minuscule percentage of the energy it takes to fight it, but approaching pain head-on is terrifying. Most of us were not taught how to recognize pain, name it, and be with it. Our families and culture believed that the vulnerability that it takes to acknowledge pain was weakness, so we were taught anger, rage, and denial instead. But what we know now is that when we deny our emotion, it owns us. When we own our emotion, we can rebuild and find our way through the pain. Sometimes owning our pain and bearing witness to struggle means getting angry. When we deny ourselves the right to be angry, we deny our pain. There are a lot of coded shame messages in the rhetoric of “Why so hostile?” “Don’t get hysterical,” “I’m sensing so much anger!” and “Don’t take it so personally.” All of these responses are normally code for Your emotion or opinion is making me uncomfortable or Suck it up and stay quiet. One response to this is “Get angry and stay angry!” I haven’t seen that advice borne out in the research. What I’ve found is that, yes, we all have the right and need to feel and own our anger. It’s an important human experience.
Brené Brown (Braving the Wilderness: The Quest for True Belonging and the Courage to Stand Alone)
Do you believe in God, Arthur?" I said, eating the last piece of sponge. "Do I believe in an old man in the clouds with a white beard judging us mortals with a moral code from one to ten? Good Lord no, my sweet Elly, I do not! Do I believe in a mystery; the unexplained phenomenon that is life itself? The greater something that illuminates inconsequence in our lives; that gives us something to strive for as well as the humility to brush ourselves down and start all over again? Then yes, I do. It is the source of art, of beauty, of love, and proffers the ultimate goodness to mankind. That to me is God.That to me is life. That is what I believe in.
Sarah Winman (When God Was a Rabbit)
In OSW, the source code of warfare is available for anyone who is interested in both modifying and extending it. This means the tactics, weapons, strategies, target selection, planning methods, and team dynamics are all open to community improvement. Global guerrillas can hack at the source code of warfare to their hearts’ delight.
John Robb (Brave New War: The Next Stage of Terrorism and the End of Globalization)
Just like in real life, in code, a feature is triggered by an action (command) that results in a sequence of events that might or might not cause side effects.
Greg Young (Exploring CQRS and Event Sourcing)
Stabilize your blood sugar Nurture your adrenal glands Support your organs of elimination Syncing with your menstrual cycle Engage your feminine energy
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
I am designed to receive. I expect, attract, seduce, welcome, and make room for love and success in my life. I believe in being supported and inviting abundance.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
By 2009 the Debian version 5.0 of GNU/Linux had 324 million source lines of code, and one study estimated that it would have cost about $8 billion to develop by conventional means
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
Love & Gratitude” is not a slogan but an action. If you are sometimes being grateful and sometimes not, it creates a poor connection to the source of positive energy.
Ted Sun (Super Life Secret Codes: Take Control of Life and Achieve Success through Energy Management)
A blanket could be used to crack the code of love. What is it, where do I find it, and how much do I charge people to buy it once I do find a reliable source?

Jarod Kintz (Brick and Blanket Test in Brick City (Ocala) Florida)
We want to avoid forcing our readers to hop around through our source files and classes.
Robert C. Martin (Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series))
Every change that is made to an application’s configuration, source code, environment, or data, triggers the creation of a new instance of the pipeline. One of the first steps in the pipeline is to create binaries and installers. The rest of the pipeline runs a series of tests on the binaries to prove that they can be released. Each test that the release candidate passes gives us more confidence that this particular combination of binary code, configuration information, environment, and data will work. If the release candidate passes all the tests, it can be released. The deployment pipeline has its foundations in the process of continuous integration and is in essence the principle of continuous integration taken to its logical conclusion. The aim of the deployment pipeline is threefold. First, it makes every part of the process of building, deploying, testing, and releasing software visible to everybody involved, aiding collaboration. Second, it improves feedback so that problems are identified, and so resolved, as early in the process as possible. Finally, it enables teams to deploy and release any version of their software to any environment at will through a fully automated process.
David Farley (Continuous Delivery: Reliable Software Releases through Build, Test, and Deployment Automation)
To write timelessly about the here and now, a writer must approach the present indirectly. The story has to be about more than it at first seems. Shakespeare used the historical sources of his plays as a scaffolding on which to construct detailed portraits of his own age. The interstices between the secondhand historical plots and Shakespeare’s startlingly original insights into Elizabethan England are what allow his work to speak to us today. Reading Shakespeare, we know what it is like, in any age, to be alive. So it is with Moby-Dick, a novel about a whaling voyage to the Pacific that is also about America racing hell-bent toward the Civil War and so much more. Contained in the pages of Moby-Dick is nothing less than the genetic code of America: all the promises, problems, conflicts, and ideals that contributed to the outbreak of a revolution in 1775 as well as a civil war in 1861 and continue to drive this country’s ever-contentious march into the future. This means that whenever a new crisis grips this country, Moby-Dick becomes newly important. It is why subsequent generations have seen Ahab as Hitler during World War II or as a profit-crazed deep-drilling oil company in 2010 or as a power-crazed Middle Eastern dictator in 2011.
Nathaniel Philbrick (Why Read Moby-Dick?)
We say if you're just using your engineers to code, you're only getting about half their value. The little secret in product is that engineers are typically the best single source of innovation; yet, they are not even invited to the party in this process.
Marty Cagan (INSPIRED: How to Create Tech Products Customers Love (Silicon Valley Product Group))
What was glimpsed in Aquarius—what was envisioned, believed in, prophesied, predicted, doubted, and forewarned—is made, in Pisces, manifest. Those solitary visions that, but a month ago, belonged only to the dreamer, will now acquire the form and substance of the real. We were of our own making, and we shall be our own end. And after Pisces? Out of the womb, the bloody birth. We do not follow: we cannot cross from last to first. Aries will not admit a collective point of view, and Taurus will not relinquish the subjective. Gemini's code is an exclusive one. Cancer seeks a source, Leo, a purpose, and Virgo, a design; but these are projects undertaken singly. Only in the zodiac's second act will we begin to show ourselves: in Libra, as a notion, in Scorpio, as a quality, and in Sagittarius, as a voice. In Capricorn we will gain memory, and in Aquarius, vision; it is only in Pisces, the last and oldest of the zodiacal signs, that we acquire a kind of selfhood, something whole. But the doubled fish of Pisces, that mirrored womb of self and self-awareness, is an ourobouros of mind—both the will of fate, and the fated will—and the house of self-undoing is a prison built by prisoners, airless, door-less, and mortared from within. These alterations come upon us irrevocably, as the hands of the clock-face come upon the hour.
Eleanor Catton (The Luminaries)
Torvalds decided to use the GNU General Public License, not because he fully embraced the free-sharing ideology of Stallman (or for that matter his own parents) but because he thought that letting hackers around the world get their hands on the source code would lead to an open collaborative effort that would make it a truly awesome piece of software. “My reasons for putting Linux out there were pretty selfish,” he said. “I didn’t want the headache of trying to deal with parts of the operating system that I saw as the crap work. I wanted help.”136
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
The creator of Bitcoin, Satoshi, disappeared back in 2011, leaving behind open source software that the users of Bitcoin could update and improve. Five years later, it was estimated that only 15 percent of the basic Bitcoin computer code was the same as what Satoshi had written.
Nathaniel Popper (Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money)
This wasn’t the only mistake they made. They also botched the cleanup operation on the servers they could access. They had created a script called LogWiper.sh to erase activity logs on the servers to prevent anyone from seeing the actions they had taken on the systems. Once the script finished its job, it was also supposed to erase itself, like an Ouroboros serpent consuming its own tail. But the attackers bungled the delete command inside the script by identifying the script file by the wrong name. Instead of commanding the script to delete LogWiper.sh, they commanded it to delete logging.sh. As a result, the LogWiper script couldn’t find itself and got left behind on servers for Kaspersky to find. Also left behind by the attackers were the names or nicknames of the programmers who had written the scripts and developed the encryption algorithms and other infrastructure used by Flame. The names appeared in the source code for some of the tools they developed. It was the kind of mistake inexperienced hackers would make, so the researchers were surprised to see it in a nation-state operation. One, named Hikaru, appeared to be the team leader who created a lot of the server code,
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
And yet here we were, entrusting our entire digital lives—passwords, texts, love letters, banking records, health records, credit cards, sources, and deepest thoughts—to this mystery box, whose inner circuitry most of us would never vet, run by code written in a language most of us will never fully understand.
Nicole Perlroth (This Is How They Tell Me the World Ends: The Cyberweapons Arms Race)
Spacewar highlighted three aspects of the hacker culture that became themes of the digital age. First, it was created collaboratively. “We were able to build it together, working as a team, which is how we liked to do things,” Russell said. Second, it was free and open-source software. “People asked for copies of the source code, and of course we gave them out.” Of course—that was in a time and place when software yearned to be free. Third, it was based on the belief that computers should be personal and interactive. “It allowed us to get our hands on a computer and make it respond to us in real time,” said Russell.10
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
Everything a person is and everything he knows resides in the tangled thicket of his intertwined neurons. These fateful, tiny bridges number in the quadrillions, but they spring from just two sources: DNA and daily life. The genetic code calls some synapses into being, while experience engenders and modifies others.
Thomas Lewis (A General Theory of Love)
I politely told my doctor that instead of taking her advice, I’d dedicate myself to researching other options for my healing and care. She tried to deter me, repeating stats about infertility and cancer, and insisted I should begin birth control that day. I’d be lying if I didn’t admit that I was nervous to stand my ground, but that No! energy kept me from giving in.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
I feel as though dispossessed from the semblances of some crystalline reality to which I’d grown accustomed, and to some degree, had engaged in as a participant, but to which I had, nevertheless, grown inexplicably irrelevant. But the elements of this phenomenon are now quickly dissolving from memory and being replaced by reverse-engineered Random Access actualizations of junk code/DNA consciousness, the retro-coded catalysts of rogue cellular activity. The steel meshing titters musically and in its song, I hear a forgotten tale of the Interstitial gaps that form pinpoint vortexes at which fibers (quanta, as it were) of Reason come to a standstill, like light on the edge of a Singularity. The gaps, along their ridges, seasonally infected by the incidental wildfires in the collective unconscious substrata. Heat flanks passageways down the Interstices. Wildfires cluster—spread down the base trunk Axon in a definitive roar: hitting branches, flaring out to Dendrites to give rise to this release of the very chemical seeds through which sentience is begotten. Float about the ether, gliding a gentle current, before skimming down, to a skip over the surface of a sea of deep black with glimmering waves. And then, come to a stop, still inanimate and naked before any trespass into the Field, with all its layers that serve to veil. Plunge downward into the trenches. Swim backwards, upstream, and down through these spiraling jets of bubbles. Plummet past the threshold to trace the living history of shadows back to their source virus. And acquire this sense that the viruses as a sample, all of the outlying populations withstanding: they have their own sense of self-importance, too. Their own religion. And they mine their hosts barren with the utilitarian wherewithal that can only be expected of beings with self-preservationist motives.
Ashim Shanker (Sinew of the Social Species)
Now, all of this is enough to make anyone a bit anxious, and I’ve seen women, as well as myself when I first got started, develop a type of eating disorder called “orthorexia,” a term meaning hyper-correct/clean eating. This is behavior where a woman will only eat foods, and will delay eating until she is able to eat foods, that she feels are correct and safe—for orthorexics typically this means organic foods.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
THERE ARE EXTRAORDINARY librarians in every age. Many of today’s librarians, such as Jessamyn West, Sarah Houghton, and Melissa Techman, have already made the transition and become visionary, digital-era professionals. These librarians are the ones celebrated in Marilyn Johnson’s This Book Is Overdue! and the ones who have already created open-source communities such as Code4Lib, social reading communities such as LibraryThing and GoodReads, and clever online campaigns such as “Geek the Library.” There are examples in every big library system and in every great library and information school. These leaders are already charting the way toward a new, vibrant era for the library profession in an age of networks. They should be supported, cheered on, and promoted as they innovate. Their colleagues, too, need to join them in this transformation.
John Palfrey (BiblioTech: Why Libraries Matter More Than Ever in the Age of Google)
PCOS, premenstrual syndrome (PMS), fibroids, cystic ovaries, depression, thyroid issues, adrenal fatigue, irritable bowel syndrome (IBS), amenorrhea, dysmenorrhea, unexplained infertility, low libido, acne/rosacea/eczema, weight problems, human papillomavirus (HPV)—a lot of weighty medical terms to describe a lot of serious and challenging conditions. How can one protocol prevent and treat so many different “castaway conditions”?
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
[ Dr. Lois Jolyon West was cleared at Top Secret for his work on MKULTRA. ] Dr. Michael Persinger [235], another FSMF Board Member, is the author of a paper entitled “Elicitation of 'Childhood Memories' in Hypnosis-Like Settings Is Associated With Complex Partial Epileptic-Like Signs For Women But Not for Men: the False Memory Syndrome.” In the paper Perceptual and Motor Skills,In the paper, Dr. Persinger writes: On the day of the experiment each subject (not more than two were tested per day) was asked to sit quietly in an acoustic chamber and was told that the procedure was an experiment in relaxation. The subject wore goggles and a modified motorcycle helmet through which 10-milligauss (1 microTesla) magnetic fields were applied through the temporal plane. Except for a weak red (photographic developing) light, the room was dark. Dr. Persinger's research on the ability of magnetic fields to facilitate the creation of false memories and altered states of consciousness is apparently funded by the Defense Intelligence Agency through the project cryptonym SLEEPING BEAUTY. Freedom of Information Act requests concerning SLEEPING BEAUTY with a number of different intelligence agencies including the CIA and DEA has yielded denial that such a program exists. Certainly, such work would be of direct interest to BLUEBIRD, ARTICHOKE, MKULTRA and other non-lethal weapons programs. Schnabel [280] lists Dr. Persinger as an Interview Source in his book on remote viewing operations conducted under Stargate, Grill Flame and other cryptonyms at Fort Meade and on contract to the Stanford Research Institute. Schnabel states (p. 220) that, “As one of the Pentagon's top scientists, Vorona was privy to some of the strangest, most secret research projects ever conceived. Grill Flame was just one. Another was code-named Sleeping Beauty; it was a Defense Department study of remote microwave mind-influencing techniques ... [...] It appears from Schnabel's well-documented investigations that Sleeping Beauty is a real, but still classified mind control program. Schnabel [280] lists Dr. West as an Interview Source and says that West was a, “Member of medical oversight board for Science Applications International Corp. remote-viewing research in early 1990s.
Colin A. Ross (The CIA Doctors: Human Rights Violations by American Psychiatrists)
You should maintain a moderate, not high, intake of protein. When it is digested, dietary protein, such as meat, breaks down into amino acids. Adequate protein is required for good health, but excess amino acids cannot be stored in the body and so the liver converts them into glucose. Therefore, eating too much protein adds sugar to the body. So you should avoid highly processed, concentrated protein sources such as protein shakes, protein bars, and protein powders.
Jason Fung (The Diabetes Code: Prevent and Reverse Type 2 Diabetes Naturally (The Code Series))
In my delight to accept the sovereign divinity of my humanity, I am aware of my innocence. In my transcendence to accept the sovereign divinity of my humanity, I am aware of my eternal power. In my commitment to accept the sovereign divinity of my humanity, I am aware of my true creative potential. In my peace to accept the sovereign divinity of my humanity, I am aware of my true worth. In my willingness to accept the sovereign divinity of my humanity, I am aware of my omniscient Source.
Kaia Ra (The Sophia Code: A Living Transmission from The Sophia Dragon Tribe)
There is absolutely nothing divine about the Shariah and in no way can it possibly be considered fixed and infallible. The argument that the Shariah derives its divine nature from its first and primary source, the Quran, falls flat when one recognizes that the Quran, unlike the Torah, is not a book of laws. The Quran is God’s direct self-revelation to humanity. Certainly, it contains the moral framework for living a holy and righteous life as a Muslim. But it was never meant to function as a legal code, which is precisely why scholars had to rely so heavily on extra-Quranic sources like ijma (consensus), qiyas (analogy), istislah (which refers to the common good of the people), and ijtihad (independent juristic reasoning)—all of them, by definition, reliant on human judgment and historical context—in order to construct the Shariah in the first place. To say the Shariah is divine because the Quran is divine is akin to arguing that water and wine are the same, since water is a primary ingredient in wine.
Reza Aslan (No God But God: The Origins, Evolution and Future of Islam)
To the extent the divine source and inalienability of our rights are purported to be factual, history has proved our Founding Fathers plainly wrong: Every right has, in fact, been alienated by governments since the beginning of time. Within a generation of the establishment of our nation, the Founding Fathers rescinded virtually every right they previously declared unalienable. John Adams, one of the drafters of the Declaration of Independence, alienated the right to speak freely and express dissenting views when, as president, he enforced the Alien and Sedition Acts against his political opponents—with Hamilton’s support. (Perhaps Hamilton’s God had not given “sacred rights” to Jeffersonians!) Another of the drafters, Jefferson himself, alienated the most basic of rights—to the equal protection of the laws, based on the “truth” that “all men are created equal”—when he helped to write (and strengthen) Virginia’s “Slave Code,” just a few years after drafting the Declaration of Independence. The revised code denied slaves the right to liberty and to the pursuit of happiness by punishing attempted escape with “outlawry” or death. Jefferson personally suspected that “the blacks … are inferior to the whites in the endowments of body and mind.” In other words, they were endowed by their Creator not with equality but with inferiority. There is no right that has not been suspended or trampled during times of crisis and war, even by our greatest presidents. ... I wish there were an intellectually satisfying argument for the divine source of rights, as our Founding Fathers tried to put forth. Tactically, that would be the strongest argument liberals could make, especially in America, where many hold a strong belief in an intervening God. But we cannot offer this argument, because many liberals do not believe in concepts like divine hands. We believe in separation of church and state. We are pragmatists, utilitarians, empiricists, secularists, and (God forgive me!) moral relativists. We are skeptical of absolutes (as George Bernard Shaw cynically quipped: “The golden rule is that there are no golden rules.”).
Alan M. Dershowitz (The Case for Liberalism in an Age of Extremism: or, Why I Left the Left But Can't Join the Right)
They came to Virginia City as soon as the true value of the Comstock was perceived. They constituted, no doubt, a deplorable source of gambling, pleasure and embroilment. They were not soft-spoken women, their desire was not visibly separate from the main chance, and they would have beheld Mr. Harte’s portrayal of them at Poker Flat with ribald mirth. But let them have a moment of respect. They civilized the Comstock. They drove through its streets reclining in lacquered broughams, displaying to male eyes fashions as close to Paris as any then current in New York. They were, in brick houses hung with tapestries, a glamour and a romance, after the superheated caverns of the mines. They enforced a code of behavior: one might be a hard-rock man outside their curtains but in their presence one was punctilious or one was hustled away. They brought Parisian cooking to the sagebrush of Sun Mountain and they taught the West to distinguish between tarantula juice and the bouquet of wines. An elegy for their passing. The West has neglected to mention them in bronze and its genealogies avoid comment on their marriages, conspicuous or obscure, but it owes them a here acknowledged debt for civilization.
Bernard DeVoto (Mark Twain's America)
Just as the FBI was haunted by Hoover, the CIA had its own ghost. In the run-up to the 2003 invasion of Iraq, the CIA made a huge mistake. In part as a result of lies told by a key source—amazingly code-named “Curveball”—who claimed he had worked in a mobile chemical weapons lab in Iraq, the CIA had concluded that Iraq had weapons of mass destruction (WMD). The case had been a “slam dunk,” according to a presentation CIA director George Tenet made to President George W. Bush. The alleged presence of WMD was the key justification for the Iraq invasion. No WMD were found, an acute embarrassment for the president and the CIA.
Bob Woodward (Fear: Trump in the White House)
For the anointed, it is desperately important to win, not simply because they believe that one policy or set of beliefs and values is better for society, but because their whole sense of themselves is at stake. Given the high stakes, it is not hard to understand the all-out attacks of the anointed on those who differ from them and their attempts to stifle alternative sources of values and beliefs, with campus speech codes and “political correctness” being prime examples of a spreading pattern of taboos. Here they are not content to squelch contemporary voices, they must also silence history and traditions—the national memory—as well.
Thomas Sowell (The Vision Of The Annointed: Self-congratulation As A Basis For Social Policy)
I’d never coded before, and I’d always thought games were huge undertakings by thousands of people in a big studio. Little did I know that a major part of coding involves Googling to find documentation, code snippets, and communities that help people fix common problems. Free information and guidance aren’t limited to programming, either. The Open Source movement makes tremendous amounts of knowledge and resources available online for free, and some major universities are making classes available for free on the internet. It’s a shame that a lot of us use the internet only to talk shit in comments sections and check our email when we have the sum of human knowledge at our fingertips.
Zoe Quinn (Crash Override: How Gamergate (Nearly) Destroyed My Life, and How We Can Win the Fight Against Online Hate)
of the most momentous innovations tiptoe quietly onto history’s stage. On August 6, 1991, Berners-Lee was glancing through the Internet’s alt.hypertext newsgroup and ran across this question: “Is anyone aware of research or development efforts in . . . hypertext links enabling retrieval from multiple heterogeneous sources?” His answer, “from: timbl@info.cern.ch at 2:56 pm,” became the first public announcement of the Web. “The WorldWideWeb project aims to allow links to be made to any information anywhere,” he began. “If you’re interested in using the code, mail me.”31 With his low-key personality and even lower-key posting, Berners-Lee did not fathom what a profound idea he had unleashed. Any information anywhere.
Walter Isaacson (The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution)
Instead of storing those countless microfilmed pages alphabetically, or according to subject, or by any of the other indexing methods in common use—all of which he found hopelessly rigid and arbitrary—Bush proposed a system based on the structure of thought itself. "The human mind . . . operates by association," he noted. "With one item in its grasp, it snaps instantly to the next that is suggested by the association of thoughts, in accordance with some intricate web of trails carried by the cells of the brain. . . . The speed of action, the intricacy of trails, the detail of mental pictures [are] awe-inspiring beyond all else in nature." By analogy, he continued, the desk library would allow its user to forge a link between any two items that seemed to have an association (the example he used was an article on the English long bow, which would be linked to a separate article on the Turkish short bow; the actual mechanism of the link would be a symbolic code imprinted on the microfilm next to the two items). "Thereafter," wrote Bush, "when one of these items is in view, the other can be instantly recalled merely by tapping a button. . . . It is exactly as though the physical items had been gathered together from widely separated sources and bound together to form a new book. It is more than this, for any item can be joined into numerous trails." Such a device needed a name, added Bush, and the analogy to human memory suggested one: "Memex." This name also appeared for the first time in the 1939 draft. In any case, Bush continued, once a Memex user had created an associative trail, he or she could copy it and exchange it with others. This meant that the construction of trails would quickly become a community endeavor, which would over time produce a vast, ever-expanding, and ever more richly cross-linked web of all human knowledge. Bush never explained where this notion of associative trails had come from (if he even knew; sometimes things just pop into our heads). But there is no doubt that it ranks as the Yankee Inventor's most profoundly original idea. Today we know it as hypertext. And that vast, hyperlinked web of knowledge is called the World Wide Web.
M. Mitchell Waldrop (The Dream Machine: J.C.R. Licklider and the Revolution That Made Computing Personal)
You could defend Ren’s codes. But you didn’t,” Yuan replies. “You wanted an excuse to talk about your source.” “But you said I don’t need defense from Ren Agnello.” Pico uses all its logic. “You said he passes the definitions of ‘friend’ and ‘trustworthy’ and ...” Pico begins a list of keywords. Yuan ignores the keywords. The thin lines on his forehead deepen, the wrinkles near his eyes tighten, and the frown in between his brows grows visible. These days, the word Source is coming frequently, ever since that man asked to meet. Don’t meet him. That monster has an agenda. Ren. Yuan’s CRAB forwards the text to his mind. So, he silences it. Why after two decades? Ren. It smells fishy. Ren. Just because he's a childhood buddy, you'll run to him? Ren. Maybe I didn’t see the Apocalypse with you, but I'm your war comrade, too. Ren. The texts stay unread in his CRAB.
Misba (The High Auction (Wisdom Revolution, #1))
So which theory did Lagos believe in? The relativist or the universalist?" "He did not seem to think there was much of a difference. In the end, they are both somewhat mystical. Lagos believed that both schools of thought had essentially arrived at the same place by different lines of reasoning." "But it seems to me there is a key difference," Hiro says. "The universalists think that we are determined by the prepatterned structure of our brains -- the pathways in the cortex. The relativists don't believe that we have any limits." "Lagos modified the strict Chomskyan theory by supposing that learning a language is like blowing code into PROMs -- an analogy that I cannot interpret." "The analogy is clear. PROMs are Programmable Read-Only Memory chips," Hiro says. "When they come from the factory, they have no content. Once and only once, you can place information into those chips and then freeze it -- the information, the software, becomes frozen into the chip -- it transmutes into hardware. After you have blown the code into the PROMs, you can read it out, but you can't write to them anymore. So Lagos was trying to say that the newborn human brain has no structure -- as the relativists would have it -- and that as the child learns a language, the developing brain structures itself accordingly, the language gets 'blown into the hardware and becomes a permanent part of the brain's deep structure -- as the universalists would have it." "Yes. This was his interpretation." "Okay. So when he talked about Enki being a real person with magical powers, what he meant was that Enki somehow understood the connection between language and the brain, knew how to manipulate it. The same way that a hacker, knowing the secrets of a computer system, can write code to control it -- digital namshubs?" "Lagos said that Enki had the ability to ascend into the universe of language and see it before his eyes. Much as humans go into the Metaverse. That gave him power to create nam-shubs. And nam-shubs had the power to alter the functioning of the brain and of the body." "Why isn't anyone doing this kind of thing nowadays? Why aren't there any namshubs in English?" "Not all languages are the same, as Steiner points out. Some languages are better at metaphor than others. Hebrew, Aramaic, Greek, and Chinese lend themselves to word play and have achieved a lasting grip on reality: Palestine had Qiryat Sefer, the 'City of the Letter,' and Syria had Byblos, the 'Town of the Book.' By contrast other civilizations seem 'speechless' or at least, as may have been the case in Egypt, not entirely cognizant of the creative and transformational powers of language. Lagos believed that Sumerian was an extraordinarily powerful language -- at least it was in Sumer five thousand years ago." "A language that lent itself to Enki's neurolinguistic hacking." "Early linguists, as well as the Kabbalists, believed in a fictional language called the tongue of Eden, the language of Adam. It enabled all men to understand each other, to communicate without misunderstanding. It was the language of the Logos, the moment when God created the world by speaking a word. In the tongue of Eden, naming a thing was the same as creating it. To quote Steiner again, 'Our speech interposes itself between apprehension and truth like a dusty pane or warped mirror. The tongue of Eden was like a flawless glass; a light of total understanding streamed through it. Thus Babel was a second Fall.' And Isaac the Blind, an early Kabbalist, said that, to quote Gershom Scholem's translation, 'The speech of men is connected with divine speech and all language whether heavenly or human derives from one source: the Divine Name.' The practical Kabbalists, the sorcerers, bore the title Ba'al Shem, meaning 'master of the divine name.'" "The machine language of the world," Hiro says.
Neal Stephenson (Snow Crash)
When a domain reaches a point where the knowledge for skillful professional practice cannot be acquired in a decade, more or less, then several adaptive developments are likely to occur. Specialization will usually increase (as it has, for example, in medicine), and practitioners will make increasing use of books and other external reference aids in their work. Architecture is a good example of a domain where much of the information a professional requires is stored in reference works, such as catalogues of available building materials, equipment, and components, and official building codes. No architect expects to keep all of this in his head or to design without frequent resort to these information sources. In fact architecture can almost be taken as a prototype for the process of design in a semantically rich task domain. The emerging design is itself incorporated in a set of external memory structures: sketches, floor plans, drawings of utility systems, and so on. At each stage in the design process, partial design reflected in these documents serves as a major stimulus suggesting to the designer what he should attend to next. This direction to new sub-goals permits in turn new information to be extracted from memory and reference sources and another step to be taken toward the development of the design.
Herbert A. Simon (The Sciences of the Artificial)
What is WordPress? WordPress is an online, open source website creation tool written in PHP. But in non-geek speak, it’s probably the easiest and most powerful blogging and website content management system (or CMS) in existence today. Many famous blogs, news outlets, music sites, Fortune 500 companies and celebrities are using WordPress. WordPress is web software you can use to create a beautiful website, blog, or app. We like to say that WordPress is both free and priceless at the same time. There are thousands of plugins and themes available to transform your site into almost anything you can imagine. WordPress started in 2003 with a single bit of code to enhance the typography of everyday writing and with fewer users than you can count on your fingers and toes. Since then it has grown to be the largest self-hosted blogging tool in the world, used on millions of sites and seen by tens of millions of people every day. You can download and install a software script called WordPress from wordpress.org. To do this you need a web host who meets the minimum requirements and a little time. WordPress is completely customizable and can be used for almost anything. There is also a servicecalled WordPress.com. WordPress users may install and switch between different themes. Themes allow users to change the look and functionality of a WordPress website and they can be installed without altering the content or health of the site. Every WordPress website requires at least one theme to be present and every theme should be designed using WordPress standards with structured PHP, valid HTML and Cascading Style Sheets (CSS). Themes: WordPress is definitely the world’s most popular CMS. The script is in its roots more of a blog than a typical CMS. For a while now it’s been modernized and it got thousands of plugins, what made it more CMS-like. WordPress does not require PHP nor HTML knowledge unlinke Drupal, Joomla or Typo3. A preinstalled plugin and template function allows them to be installed very easily. All you need to do is to choose a plugin or a template and click on it to install. It’s good choice for beginners. Plugins: WordPress’s plugin architecture allows users to extend the features and functionality of a website or blog. WordPress has over 40,501 plugins available. Each of which offers custom functions and features enabling users to tailor their sites to their specific needs. WordPress menu management has extended functionalities that can be modified to include categories, pages, etc. If you like this post then please share and like this post. To learn more About website design in wordpress You can visit @ tririd.com Call us @ 8980010210
ellen crichton
What is scarce? Surely time is scarce? This is true in the sense that we get only one life, but yet again there are ways in which competition and how we use our time can make us feel an artificial sense of time scarcity. Each time we are able to build on the work of others with confidence, each time we use the elements of life pulled from our commonwealth of agricultural knowledge, we bundle time, and so get the benefit of having multiple lifetimes. Each time nature uses genetic code that has been developed over millions of years, millions of years of development are collapsed into something that works in our lifetimes. Each time we add to that collection, we are putting our lifetimes' work into a useful form for the benefit of future generations. At the same time, yes, we each have only our own single lives in which to pursue happiness. The goal is to spend as much of that time in a framework of sharing abundance rather than having it squeezed into a life of scarcity and competition. In contrast, we need not look far to find lots of frustrating examples in which our time is treated as abundant when we would rather have it be valued as scarce. It happens each time we must stand in line at the DMV, fill out redundant forms at the hospital, reproduce others' efforts by spending time searching for knowledge or data that already exists somewhere, create a report that no one reads. In those cases, we are creating and living in artificial and unnecessary time scarcity. Time is indeed one of the most curious elements of life, especially since our lifetimes and those of plants and animals all move at different rates. We know, for example, that the urgency to address climate change is really on our human scale, not geologic scale. The Earth has been through greater upheavals and mass extinctions and will likely go through them again, but for the narrowest of narrow bands of human history on Earth, we require very specific conditions for us to continue to thrive as a species. To keep our planet within a habitable and abundant balance, we have, as Howard Buffet noted, only 'forty seasons' to learn and adjust. That is why building on one another's work is so important. One farmer can have the benefit of forty seasons and pass some of that experience down, but if 1,000 farmers do the same, there is the collective benefit of 1,000 years in a single year. If a million people participate, then a million years of collective experience are available. If we are then able to compound knowledge across generations and deepen our understanding of human and natural history, we add even greater richness. It is in this way of bundling our experiences for continual improvement, with compound interest, that time shifts from a scarce resource to being far less of a constraint, if not truly abundant. However, for time to be compounded, knowledge must be shared, and real resources, energy, and infrastructure must exist and function to support and grow our commonwealth of knowledge.
Dorn Cox (The Great Regeneration: Ecological Agriculture, Open-Source Technology, and a Radical Vision of Hope)
I tried, but I can’t access the source code or the system logs,” Mike said. “I assumed David locked down access so no one would find what he’d done. I didn’t say anything to the rest of the team, because I didn’t want to raise suspicions. I’m still trying to cover for you, David.” Mike glared.
William Hertling (Avogadro Corp (Singularity, #1))
Even after the aliens from Andromeda land with their massive spaceships and undreamed-of computing power, they will not be able to read the Soviet spy messages encrypted with one-time pads (unless they can also go back in time and get the one-time pads).
Bruce Schneier (Applied Cryptography: Protocols, Algorithms, and Source Code in C)
Another example is Cython to enhance the speed of algorithms by converting Python to C code, and cx_Freeze to create a standalone application from your source.
Anonymous
TFS has an option to publish all the PDB files from your builds to a shared location, which can then act as a Symbol Server for Visual Studio, enabling you to debug all previous versions of an application without having the source code around.
Anonymous
debugger, a tool that will preserve your C source code after compilation and enable you to do such things as step through it manually, or alter data as an aid to finding and correcting programming errors.
Wiki Books (C Programming)
Counter Strike Source Hackss X22 [36649] Copy And Visit The Link Here -> freehackstools.frogcp.com Hacks Hotmail Account Hacksforums, Dungeon Rampage Cheats Engine Hacks, Avast Antivirus Product Keygen, Dragon City Cheats Without Cheats Engine, Goodgame Empire Hacks Download - Adder V1.3, Marvel Avengers Alliance Cheats Engine October 2012, Need For Speed World Boost Hacks May 2012, Criminal Case Cheats Level, Paypal Generator.rar, Csr Racing Cheats Codes For Android, Angry Birds Star Wars 2 Hacks No Root, Pou Cheatss To Get Coins, Criminal Case Hacks And Cheatss, Wifi Hacks Download Mac, Jailbreak Ios 7 Download Free, Amazon Gift Card Generator October 2012, Facebook Credits Generator November 2012, Maplestory Nx Cash Code Generator 2012, Pop Songs About Cheatsing Boyfriends, Cityville Cheatss Pier, Jailbreak Ios 7 Status, Song Pop Cheats Droid, Combat Arms Hacks Buy, 8 Ball Pool Cheats Pro V3.1 Password, Itunes Gift Card Generator 5.1, Plants Vs Zombies Hacks Wiki, Playstation Vita Blue Emulator 0.3 Bios, Empires And Allies Hacks For Empire Points, Minecraft Premium Account Generator Unlimited 2011, Gta 5 Money Cheats 12000, Modern War 2.0 Hacks, Realm Of The Mad God Hacks V.2.6, Medal Of Honor Cheats Codes Xbox, Guild Wars 2 Keygen 2013, Microsoft Office 2010 Keygen Works In All Computers, Crossfire Hacks Aimbot, Ask.fm Beğeni Hacks, Cheats Engine In Dragon City, Xbox Live Code Generator July, Farmville 2 Hacks Enjoy! :)
Counter Strike Source Hackss X22 36649 Todd McFarlane's Spawn The Ultimate Collection
French fries (often dusted with flour before freezing) fried vegetables/tempura fruit fillings and puddings gravy hot dogs ice cream imitation crabmeat, bacon, etc. instant hot drinks ketchup malt/malt flavoring malt vinegar marinades mayonnaise meatballs/meatloaf non-dairy creamer oat bran (unless certified gluten-free) oats (unless certified gluten-free) processed cheese (e.g., Velveeta) roasted nuts root beer salad dressings sausage seitan soups soy sauce and teriyaki sauces syrups tabbouleh trail mix veggie burgers vodka wheatgrass wine coolers The following are miscellaneous sources of gluten: cosmetics lipsticks/lip balm medications non-self-adhesive stamps and envelopes Play-Doh shampoos/conditioners vitamins and supplements (check label) The following ingredients are often code for gluten: amino peptide complex Avena sativa brown rice syrup caramel color (frequently made from barley) cyclodextrin dextrin fermented grain extract Hordeum distichon Hordeum vulgare hydrolysate hydrolyzed malt extract hydrolyzed vegetable protein maltodextrin modified food starch natural flavoring phytosphingosine extract Secale cereale soy protein Triticum aestivum Triticum vulgare vegetable protein (HVP) yeast extract
David Perlmutter
Does an arbitrary human convention, a mere custom, decree that man must guide his actions by a set of principles—or is there a fact of reality that demands it? Is ethics the province of whims: of personal emotions, social edicts and mystic revelations—or is it the province of reason? Is ethics a subjective luxury—or an objective necessity? In the sorry record of the history of mankind’s ethics—with a few rare, and unsuccessful, exceptions—moralists have regarded ethics as the province of whims, that is: of the irrational. Some of them did so explicitly, by intention—others implicitly, by default. A “whim” is a desire experienced by a person who does not know and does not care to discover its cause. No philosopher has given a rational, objectively demonstrable, scientific answer to the question of why man needs a code of values. So long as that question remained unanswered, no rational, scientific, objective code of ethics could be discovered or defined. The greatest of all philosophers, Aristotle, did not regard ethics as an exact science; he based his ethical system on observations of what the noble and wise men of his time chose to do, leaving unanswered the questions of: why they chose to do it and why he evaluated them as noble and wise. Most philosophers took the existence of ethics for granted, as the given, as a historical fact, and were not concerned with discovering its metaphysical cause or objective validation. Many of them attempted to break the traditional monopoly of mysticism in the field of ethics and, allegedly, to define a rational, scientific, nonreligious morality. But their attempts consisted of trying to justify them on social grounds, merely substituting society for God. The avowed mystics held the arbitrary, unaccountable “will of God” as the standard of the good and as the validation of their ethics. The neomystics replaced it with “the good of society,” thus collapsing into the circularity of a definition such as “the standard of the good is that which is good for society.” This meant, in logic—and, today, in worldwide practice—that “society” stands above any principles of ethics, since it is the source, standard and criterion of ethics, since “the good” is whatever it wills, whatever it happens to assert as its own welfare and pleasure. This meant that “society” may do anything it pleases, since “the good” is whatever it chooses to do because it chooses to do it. And—since there is no such entity as “society,” since society is only a number of individual men—this meant that some men (the majority or any gang that claims to be its spokesman) are ethically entitled to pursue any whims (or any atrocities) they desire to pursue, while other men are ethically obliged to spend their lives in the service of that gang’s desires. This could hardly be called rational, yet most philosophers have now decided to declare that reason has failed, that ethics is outside the power of reason, that no rational ethics can ever be defined, and that in the field of ethics—in the choice of his values, of his actions, of his pursuits, of his life’s goals—man must be guided by something other than reason. By what? Faith—instinct—intuition—revelation—feeling—taste—urge—wish—whim Today, as in the past, most philosophers agree that the ultimate standard of ethics is whim (they call it “arbitrary postulate” or “subjective choice” or “emotional commitment”)—and the battle is only over the question or whose whim: one’s own or society’s or the dictator’s or God’s. Whatever else they may disagree about, today’s moralists agree that ethics is a subjective issue and that the three things barred from its field are: reason—mind—reality. If you wonder why the world is now collapsing to a lower and ever lower rung of hell, this is the reason. If you want to save civilization, it is this premise of modern ethics—and of all ethical
Anonymous
Don't make more versions of your source code. Rather than add more code bases, fix the underlying design problem that is preventing you from running from a single code base.
Kent Beck (Extreme Programming Explained: Embrace Change (The XP Series))
Fruits: blueberries, strawberries, apples, melons, pears, peaches •  Miscellaneous: celery, peppers, tomatoes •  Root vegetables: potatoes, sweet potatoes, squash •  Leafy green vegetables: all lettuces, kale, cabbage, spinach, other greens •  Animal protein: beef, poultry, dairy, eggs (especially because these animals, when not organically fed and properly pastured, are fed a diet of antibiotics, growth hormones, and genetically modified foods that will exacerbate your existing hormonal imbalance)
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
here are a few personal-care items with the most offending endocrine disruptors.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
epigenetics,
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
how you eat and live actually gets passed down to at least one successive generation through this epigenetic process.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Not only do hormones tell all the systems of your body what to do—kidneys, liver, metabolism, digestion, nervous system, reproductive organs—they also have an impressive second job: self-regulation.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
that hormones seek balance and when you disrupt the endocrine system that governs them, you’ll present with a symptom, then another, then another, until you have a condition. The conditions that women exhibit might be different from one female to the next, based on your genetic predisposition and lifestyle factors, but focusing on the symptoms and/or the conditions is less valuable than addressing the underlying causes.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Most women know very little about our hormonal biochemistry, and as a result, we’re making choices about our menstrual care, fertility, and libido that have long-term negative repercussions.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Over twenty million women suffer from polycystic ovary syndrome (PCOS), fibroids, endometriosis, painful/difficult/heavy periods, and thyroid and adrenal issues.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Exposure to endocrine disruptors (chemicals that interfere with the production, release, transport, metabolism, or elimination of the body’s natural hormones) can occur through air, water, soil, food, and consumer products. These disruptors can mimic naturally occurring hormones, potentially causing overproduction and underproduction of actual hormones. They block the way natural hormones and their receptors are made or controlled. Some
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
In the short term, your body has checks and balances to compensate for too much or too little of any hormone; it’s your system’s long-term response that causes persistent symptoms and chronic conditions. As your hormones try to help your body get balanced again, they may instead overcompensate and create other imbalances. This will impact how much estrogen and testosterone, growth hormones, hunger hormones, stress hormones, fat-burning hormones, energy- and libido-related hormones, and sleep hormones it should be making to amend the situation.
Alisa Vitti (WomanCode: Perfect Your Cycle, Amplify Your Fertility, Supercharge Your Sex Drive, and Become a Power Source)
Something that looks like a protocol but does not accomplish a task is not a protocol—it’s a waste of time.
Bruce Schneier (Applied Cryptography: Protocols, Algorithms, and Source Code in C)
Благоденстващият дом не е само почистен от смет и вехтории, той е изпълнен с живот, радост и спокойствие, с добрина, която кара всички да се чувстват обичани и щастливи.
Alexander Loyd (The Healing Code: 6 Minutes to Heal the Source of Your Health, Success or Relationship Issue)
One was a complaint from a DHS field operative about a target who'd installed "ParanoidAndroid" on his phone and couldn't be gotten at. "What's ParanoidAndroid?" I asked. "I'm reading up on that now," Ange said. "Looks like it's a fork from the CyanogenMod." I knew about Cyanogen, of course -- hackers had taken the source code for Google's Android operating system and made a fully free and open version that could do all kinds of cool tricks.
Anonymous
In the midst of his great difficulties, Job’s source of delight was seeing God in the next life. He knew that “in the end” heaven is a wonderful place.
O.S. Hawkins (The Jesus Code: 52 Scripture Questions Every Believer Should Answer (The Code Series))
If the disk crashes—taking all of your source code with it—and you don't have a backup, it's your fault. Telling your boss "the cat ate my source code" just won't cut it.
Anonymous
I would love to change the world, but they won't give me the source code.
Anonymous (HOLY BIBLE AMPLIFIED VERSION)
El otro día vi el anuncio de una película cuyos puntos promocionales más atractivos, y por los que se suponía que usted iría a verla, eran «Sexo, asesinato, traición y decepción». ¿Se da cuenta? Esto es lo que construye sus recuerdos celulares, los que bloquean los resultados que usted quiere conseguir, y los que le ponen enfermo. Ver una buena película puede infundir recuerdos saludables y estimulantes; de la misma manera, también nos puede causar serios daños.
Alexander Loyd (The Healing Code: 6 Minutes to Heal the Source of Your Health, Success, or Relationship Issue)
The topmost parts of the source file should provide the high-level concepts and algorithms. Detail should increase as we move downward, until at the end we find the lowest level functions and details in the source file.
Robert C. Martin (Clean Code: A Handbook of Agile Software Craftsmanship (Robert C. Martin Series))
The delivery pipeline is the key concept that enables a continuous flow of changes to production in a Continuous Delivery environment. Key points of the pipeline are: Functionality is only added when the quality is right. All changes to the source code immediately result in a new version of the application. Each new version is automatically tested against all available tests. New versions are automatically deployed to production. All installation and configuration of machines and environments is fully automated.
Andrew Phillips (The IT Manager’s Guide to Continuous Delivery: Delivering Software in Days)
would love to change the world, but they won't give me the source code.
Various (101 Best Jokes)