Ping & traceroute
If you suspect a network problem between the monitoring system and your server, it’s helpful to have a traceroute from your NTP server to the monitoring system. You can traceroute to the monitoring network using 139.178.64.42 and 2604:1380:2:6000::15.
You can ping or traceroute from the monitoring network using HTTP, with:
curl http://trace.ntppool.org/traceroute/8.8.8.8
curl http://trace.ntppool.org/ping/8.8.8.8The Three Bible Timelines: Why and How They Differ
February 25, 2013
Last updated on November 3rd, 2015 at 01:48 pm
The three most widely used Bible Timelines are:
-
Ussher’s Chronology: included in the margins of the Authorized King James Bible is based on the Masoretic text of the Hebrew Old Testament. The Masoretic text had an unbroken history of careful transcription for centuries.
-
Thiele: a modern Biblical chronologist whose work is accepted by secular Egyptologists as well as biblical scholars – often used by modern Evangelicals.
-
The Septuagint: on which the Catholic Bible is based, is the Koine Greek version of the Hebrew Bible translated between 300 BC and 1 BC.
Most people who try to compute a Bible timeline are faced with the same dilemmas. The Rvd. Professor James Barr, a Scottish Old Testament scholar, has identified three distinct periods that Ussher, and all biblical chronologists had to tackle:
-
Early times (Creation to Solomon). Anyone who starts out reading the Bible with Genesis, as many people do, can easily compute the years from Adam to Solomon.
-
Early Age of Kings (Solomon to the destruction of the Temple in Jerusalem and the Babylonian captivity). Now we have gaps in the record.
-
Late Age of Kings (Ezra and Nehemiah to the birth of Jesus). Here events are just mentioned with no possible way to link or calculate time frames. Historians use well known secular kings or events mentioned in the Bible (i.e., Nebuchadnezzar) to calculate the Bible dates.
Modern climate politics treats humanity like an invasive species.
We’re told we consume too much, build too much, develop too much, and emit too much. The message is clear: human beings are the problem, and the earth must be protected from us.
But that is not Christianity.
It’s not even close.
For 3,000 years, the Judeo-Christian worldview taught something radically different—that humans are image-bearers designed to create, cultivate, innovate, and build. The very first job description in Scripture is found in Genesis 1:28:
“Be fruitful and multiply; fill the earth and subdue it; and have dominion over every living thing.”
To modern ears, “subdue” and “dominion” sound imperial. To ancient readers, they meant responsibility, stewardship, cultivation, and development. The earth was not a fragile deity to tiptoe around; it was a raw, untamed gift meant to be worked, shaped, and stewarded for human flourishing.
And here’s where the climate debate goes off the rails.
If you believe Genesis, then energy is not a moral liability—it is the means by which humans fulfill their mandate. Energy is how you lift the poor, feed nations, sustain families, run hospitals, build infrastructure, and create the conditions for long-term stability and—ironically—environmental improvement.
Yet the climate movement has turned this mandate upside down. It demands sacrifice, limitation, and deprivation in the name of “saving the planet.” The message to the world’s poor is simple: stay poor a little longer so the West can feel environmentally virtuous. //
If you want to solve poverty, you don’t throttle energy. You expand it. You diversify it. You make it abundant and affordable. The cleanest nations on earth became clean because they became rich first. Wealth creates environmental capacity. Poverty destroys it.
The Christian view is simple: the earth was given to humanity to cultivate, not fear. The resources here are meant to be used responsibly, not locked away because climate bureaucrats believe modern prosperity is a moral sin.
The climate debate will never make sense until we recover the foundational truth Genesis established: human beings were meant to build. Meant to advance. Meant to subdue the earth—not as tyrants, but as stewards.
The earth is not a god to appease.
It is a garden to cultivate.
If you want the environment to thrive, let people thrive first.
It is a snare to imagine that God wants to make us perfect specimens of what He can do; God’s purpose is to make us one with Himself. The emphasis of holiness movements is apt to be that God is producing specimens of holiness to put in His museum. If you go off on this idea of personal holiness, the dead-set of your life will not be for God, but for what you call the manifestation of God in your life. “It can never be God’s will that I should be sick,” you say. If it was God’s will to bruise His own Son, why should He not bruise you? The thing that tells for God is not your relevant consistency to an idea of what a saint should be, but your real vital relation to Jesus Christ, and your abandonment to Him whether you are well or ill.
There are experiences like this in each of our lives. We are in despair, the despair that comes from actualities, and we cannot lift ourselves out of it. The disciples in this instance had done a downright unforgivable thing; they had gone to sleep instead of watching with Jesus, but He came with a spiritual initiative against their despair and said – “Arise and do the next thing.” If we are inspired of God, what is the next thing? To trust Him absolutely and to pray on the ground of His Redemption.
Never let the sense of failure corrupt your new action.
biffbobfred Ars Scholae Palatinae
11y
1,172
Will they kick off Meta/Facebook for torrenting, or is “pirating is only bad if you’re not rich already” going to be the rule here? //
Messy Wise, Aged Ars Veteran
21y
190
can we just have dumb pipes? i don't want a utility knowing or caring what i do.
imagine getting your electricity cut off because the power company doesn't like what you cook. //
thadco Ars Centurion
9y
380
You child stole a candy bar. No more food for you or your whole family forever! //
TylerH Ars Praefectus
13y
4,472
Subscriptor
I would very much like the justices to ask counsel whether they would kick a customer like Facebook/Meta off for large-scale pirating in abuse of this position, or if they would turn a blind eye if the organization has a large enough contract.
I would also very much like the justices to ask whether Sony has considered just making the pirated content more conveniently available for purchase/access. I wager a large portion of pirated content is not actually readily available in an offline-consumable format.
Glaringly absent from these arguments (at least those covered in the article) is "why should the ISPs act merely on the accusation of piracy? Why not just send a notice after you have sued an individual in court and won/proven that they are the specific person committing the piracy? Wouldn't that preserve liability and due process, albeit at the cost of the copyright holder (where it ought to belong, frankly)?" //
Mad Klingon Ars Tribunus Militum
5y
1,776
Subscriptor++
Is Sony and the other copyright holders willing to assume liability for damages for submitting a list of IP addresses performing infringement and being wrong? Even a 90% correct rate would result in 100 improper cutoffs for every 1000 addresses. I doubt that Sony's lists are that good. A fair number of folks use an ISP connection as a VOIP landline. What damages apply if that is cutoff due to being on a Sony list and someone dies due to 911 not working? Or a house is destroyed due to delays in fire department arriving? Bonus points if that person proves no infringement happened. And before someone says "But cell phones....", not everyone lives in an area where cell services is available or reliable.
With Internet connections becoming increasing required for modern life, cutting a house off from the Internet should be a method of last resort. //
GFKBill Ars Tribunus Militum
21y
2,674
Subscriptor
“The approach of terminating all access to the Internet based on infringement, it seems extremely overbroad given the centrality of the Internet to modern life and given the First Amendment,” he said.
And "based on infringement" isn't even in the picture - the studios haven't taken these infringers to court, Cox et al are supposed to just take their word for it. On that basis alone this should be chucked out.
Sony and their ilk want a cheap shortcut, when they should be filing charges against the infringing user and letting a judge determine penalties, if they prove their case. //
GFKBill Ars Tribunus Militum
21y
2,674
Subscriptor
TylerH said:
Glaringly absent from these arguments (at least those covered in the article) is "why should the ISPs act merely on the accusation of piracy? Why not just send a notice after you have sued an individual in court and won/proven that they are the specific person committing the piracy? Wouldn't that preserve liability and due process, albeit at the cost of the copyright holder (where it ought to belong, frankly)?"
The whole thing is an end-run around due process, because it's easy and saves them the expense and effort of suing.
The courts should be telling them to pound sand. //
42Kodiak42 Ars Scholae Palatinae
13y
1,165
Clement said that hotels limit speeds to restrict peer-to-peer downloading, and suggested that universities do the same. “I don’t think it would be the end of the world if universities provided service at a speed that was sufficient for most other purposes but didn’t allow the students to take full advantage of BitTorrent,” he said. “I could live in that world. But in all events, this isn’t a case that’s just about universities. We’ve never sued the universities.”
Clement is either a ... moron, or is hoping the judges are by telling them this outright lie. This is nothing more than a brash assertion that a network configuration that supports peer-to-peer services has no valid personal use cases.
Stewart gave a hypothetical in which an individual Internet user is sued for infringement in a district court. The district court could award damages and impose an injunction to prevent further infringement, but it probably couldn’t “enjoin the person from ever using the Internet again,” Stewart said.
A court isn't even likely to block the user's internet access while the case is ongoing. The fact of the matter is simple: People's livelihoods can very well depend on continued and reliable internet access. What Sony is asking for is a clear violation of our fifth amendment rights by requiring ISPs to enact an unjustified punishment without due process in a court of law.
What does appear to be true is that in 1902, when young Archie was just eight years old, he did sneak a tree into the White House and kept it upstairs in a closet. He supposedly had White House staff members help him find lights and ornaments, and he added a gift for each of his family members, including the Roosevelts' pets. On Christmas morning, he finally shared the surprise with his family, who were delighted by it. The president even let his children continue the tradition after that.
Here's what Roosevelt wrote in a letter to a friend about that Christmas:
Yesterday Archie got among his presents a small rifle from me and a pair of riding boots from his mother. He won’t be able to use the rifle until next summer, but he has gone off very happy in the riding boots for a ride on the calico pony Algonquin, the one you rode the other day. Yesterday morning at a quarter of seven all the children were up and dressed and began to hammer at the door of their mother’s and my room, in which their six stockings, all bulging out with queer angles and rotundities, were hanging from the fireplace. So their mother and I got up, shut the window, lit the fire (taking down the stockings of course), put on our wrappers and prepared to admit the children.
The Good:
- Small enough to easily fit in a jacket pocket or the like
- Use less resources to make and ship
- With the gatefold jacket, printed inner sleeve, and color vinyl options, these look as cool as most full-size albums
- Plays fine on manual turntables
The Bad:
- Sound quality is (unsurprisingly) compromised
- Price isn’t lower than typical 7-inch singles
Climate alarmists don’t just get the science wrong but also demonize the engine of wealth that has brought billions out of grinding poverty; and this “climate colonialism” is “morally unconscionable,” a Christian leader says.
“What I believe we’re seeing in the demand from wealthy Western nations that we fight climate change by reducing our use of fossil fuels is that they are demanding that the poorest nations of the world forego the use of the most abundant, affordable, reliable energy sources that can lift them out of poverty and keep them out of poverty,” E. Calvin Beisner, president of the Cornwall Alliance for the Stewardship of Creation, told The Daily Signal.
“It is the West saying to the rest, ‘We made it out, you have to stay,'” he noted. “That is just morally unconscionable.”
The damage will therefore test the current leaders of Russia. How committed are they to the International Space Station partnership with NASA? Before, they were willing to play out the string to 2030 and the end of the station’s lifetime, but that required minimal investment in new capabilities. In fact, Russia recently cut the number of crewed Soyuz missions to the station from four every two years down to three, to save money. Now they must devote significant resources to the Soyuz program critical to the ISS.
“This is a real-life test of their resilience,” Jeff Manber, a senior Voyager official and former Nanoracks chief executive with long-time expertise in Russia’s space program, told Ars. “We are going to learn just how important the ISS is to leadership there.” //
The at least temporary loss of Site 31 will only place further pressure on SpaceX. The company currently flies NASA’s only operational crewed vehicle capable of reaching the space station, and the space agency recently announced that Boeing’s Starliner vehicle needs to fly an uncrewed mission before potentially carrying crew again. Moreover, due to rocket issues, SpaceX’s Falcon 9 vehicle is the only rocket currently available to launch both Dragon and Cygnus supply missions to the space station. For a time, SpaceX may also now be called upon to backstop Russia as well.
Darryl bangs on mindlessly, using words like "empowering," "driving," and "revolutionizing." His voluminous wordage is a cream-filled, chocolate-glazed, sugar-coated cornucopia of optimism – but I, unfortunately, have Diabetes Pessimistus.
His patter, however, reveals two things: (a) his passion really is AI as THE business tool of the future, and (b) he knows almost nothing about AI – outside of the PowerPoint slides he's no doubt plagiarized from the internet.
Electroconvulsive therapy, or electroshock, has a bad reputation, but medically its efficacy is well documented, even if nobody knows how it works. //
In electroconvulsive therapy (ECT), an electrical current is used to induce grand mal seizures as a treatment for psychiatric patients. Some hundred thousand Americans receive the therapy every year, a statistic comparable to the number of appendectomies or hernia surgeries performed. When drug alternatives prove ineffective, it’s considered safe and effective for people suffering from schizophrenia, depression, mania, catatonia, and other psychiatric diseases. As these BMJ authors note, its value is undoubted even if we don’t know how it actually works
Severe lake-effect snow breaks Thanksgiving record, puts holiday travelers in danger | New York Post
Snow totals topped 25 inches in Northern Wisconsin and Michigan’s Upper Peninsula through Friday morning. Hurley, Michigan has tallied 31.3 inches of snow.
Gaylord, Michigan set a daily snowfall record on Thanksgiving with 13.1 inches, breaking the previous record of 10.1 inches set in 2023. //
Chicago is expected to see 8-12 inches of snow beginning Friday, which could rival its snowiest two-day total in November since records began in 1884, according to the Forecast Center.
📂🛡️Suite of tools for file fixity (data protection for long term storage⌛) using redundant error correcting codes, hash auditing and duplications with majority vote, all in pure Python🐍
Here are some tools with a similar philosophy to pyFileFixity, which you can use if they better fit your needs, either as a replacement of pyFileFixity or as a complement (pyFileFixity can always be used to generate an ecc file):
With the above strategy, you should be able to preserve your data for as long as you can actively curate it. In case you want more robustness against accidents or the risk that 2 copies get corrupted under 5 years, then you can make more copies, preferably as LTO cartridges, but it can be other hard drives.
For more information on how to cold store LTO drives, read pp32-33 "Caring for Cartridges" instruction of this user manual. For HP LTO6 drives, Matthew Millman made an open-source commandline tool to do advanced LTO manipulations on Windows: ltfscmd.
In case you cannot afford a LTO drive, you can replace these by external hard drives, as they are less expensive to start with, but then your curation strategy should be done more frequently (ie, every 2-3 years a small checkup, and every 5 years, a big checkup).
Why are data corrupted with time? One sole reason: entropy. Entropy refers to the universal tendency for systems to become less ordered over time. Data corruption is exactly that: a disorder in bits order. In other words: the Universe hates your data.
Long term storage is thus a very difficult topic: it's like fighting with death (in this case, the death of data). Indeed, because of entropy, data will eventually fade away because of various silent errors such as bit rot or cosmic rays. pyFileFixity aims to provide tools to detect any data corruption, but also fight data corruption by providing repairing tools.
The only solution is to use a principle of engineering that is long known and which makes bridges and planes safe: add some redundancy.
There are only 2 ways to add redundancy:
the simple way is to duplicate the object (also called replication), but for data storage, this eats up a lot of storage and is not optimal. However, if storage is cheap, then this is a good solution, as it is much faster than encoding with error correction codes. For replication to work, at least 3 duplicates are necessary at all times, so that if one fails, it must replaced asap. As sailors say: "Either bring 1 compass or 3 compasses, but never two, because then you won't know which one is correct if one fails." Indeed, with 3 duplicates, if you frequently monitor their integrity (eg, with hashes), then if one fails, simply do a majority vote: the bit value given by 2 of the duplicates is probably correct.
the second way, the optimal tools ever invented to recover from data corruption, are the error correction codes (forward error correction), which are a way to smartly produce redundant codes from your data so that you can later repair your data using these additional pieces of information (ie, an ECC generates n blocks for a file cut in k blocks (with k < n), and then the ecc code can rebuild the whole file with (at least) any k blocks among the total n blocks available). In other words, you can correct up to (n-k) erasures. But error correcting codes can also detect and repair automatically where the errors are (fully automatic data repair for you !), but at the cost that you can then only correct (n-k)/2 errors.
Error correction can seem a bit magical, but for a reasonable intuition, it can be seen as a way to average the corruption error rate: on average, a bit will still have the same chance to be corrupted, but since you have more bits to represent the same data, you lower the overall chance to lose this bit.
pyFileFixity provides a suite of open source, cross-platform, easy to use and easy to maintain (readable code) to protect and manage data for long term storage/archival, and also test the performance of any data protection algorithm.
The project is done in pure-Python to meet those criteria, although cythonized extensions are available for core routines to speed up encoding/decoding, but always with a pure python specification available so as to allow long term replication.
Here is an example of what pyFileFixity can do:
For nearly two millennia, the Holy Bible has been translated, retranslated, and adapted into countless languages and versions. Each translation reflects not only linguistic scholarship but also the theological, cultural, and historical context of its time. From ancient Greek and Latin manuscripts to modern digital editions, the story of Bible translation is a fascinating journey through human civilization itself.
This comprehensive guide explores the most influential and widely-used Bible translations, examining their historical origins, translation philosophies, and lasting impact on Christian faith and scholarship.
Beyond the blockbusters: This watch list has something for everyone over the long holiday weekend.