منابع مشابه
The Tao Te Ching
A number of problems arise when translating any work from a written language, such as early Chinese, into twentieth century English. One such problem is the difference between the written forms of the two languages, another is the difference between the two cultures, and a third is the time which elapsed between the writing of the original work, in this instance, some time between six hundred a...
متن کاملProblem of Evil in Taoism
This paper attempts to present the Taoist understanding of evil. In the Taoist tradition, especially in Tao Te Ching, evil is divided into two categories: causal evil and consequential evil. Causal evils are those evils that are said to be the causes of other evils; consequential evils are those that are said to be the consequences of the causal evils. Causal evils originate from human will, an...
متن کاملThe Relationship of a Measured Taoist Orientation to Western Personality Dimensions
When a psychologist understands the relationship of Taoism to Western personality dimensions, it is then possible for the psychologist to apply counseling and psychotherapy concepts which may surpass traditional methods. A group of writings, the Tao Te Ching, attributed to Lao Tzu (1972), and those of Chuang Tzu, emerged in fifth-century China. These writings expressed a natural way of intercon...
متن کاملThe Philosopher and the Sage: Plato and Lao-Tzu on Following the Way of Nature
*** Lao-Tzu, paradoxical poet-philosopher of the mysterious Tao, father of the mysticalmeditative philosophical religion of Taoism. Plato, mathematically-minded theorizer of Forms, father of Academic philosophy and Western rationalism. What could these two foundational thinkers of East and West possibly have in common? Quite a lot, as it turns out. As we shall see, for both Plato 1 and Lao-Tzu,...
متن کاملThe Tao of Hardware, The Te of Implants
Embedded, IOT, and ICS devices tend to be things we can pick up, see, and touch. They're designed for nontechnical users who think of them as immutable hardware devices. Even software security experts, at some point, consider hardware attacks out of scope. Thankfully, even though a handful of hardware manufacturers are making some basic efforts to harden devices, there's still plenty of cheap a...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: The Iowa Review
سال: 2005
ISSN: 0021-065X,2330-0361
DOI: 10.17077/0021-065x.5968