Latitude d830 led codes

Does this make sense for magic?

2024.05.15 17:20 darkagni Does this make sense for magic?

In my world magic is the process of bringing order to chaos to manifest chaos in an ordered world, it's as simple as writing a program, you cast magic by using spells, spells are pre-made coding that people can learn in order to manifest that chaos be it in the form of fire, ice, gravity, lightning, ect. Magic is extremely old, but it is younger than the world. It's younger than humans even, or at least its availability is. Magic came to earth when the goddess yōsen was born, upon her birth the world was flooded with the energy and this eventually led to the dark age/age of warlords
One can learn all paths of magic, but if they do this they'll never master any, but they will be much more versatile than someone that has mastered the path of fire. When it comes to learning magic it's not just about learning spells, one must learn to sense the energy, find the energy. Feel the energy not just around you but in others, and in yourself. It is for this reason that the best place to learn magic is in places where the energy is overflowing, in places like these even people with zero attunement to magic will be able to physically feel the energy. It's like a beach, there's people on the sand who can see, hear, and even taste the ocean but they're not getting wet. There people who are putting their feet in the ocean, and there's people swimming in the ocean, and then there's people who have never seen ocean, but in these places overflowing with magic, it's like a tsunami or hurricane, where even those further in get hit by the water. In modern day magic is practically non existent, the majority of the world believed it to be simply myths, stories to make the world seem magical. The people that believed in it were simply crazy conspiracy theorists, that was until the nation of Asheath open up to the rest of the world, and that's when the world began to believe in magic once more.
Arcane is a title given to someone that has grown powerful enough or skilled enough to activate and use magic without casting, they use magic as if it's just their power, they can specialize in one or more types of magic. They're only threatened by Pillars, or another Arcane of equal or greater strength. They can still be killed by a non Arcane, just have to be lucky.
There's four forms of magic
Aspects These are aspects of magic that a person can manifest like power, chaos energy ordering itself into a person, and changing the order into chaos. Its as simple as someone having horns, or someone having the power to turn their skin into stone, think of these as the normal super power type deal, anything abnormal. With time this form of magic died off, and in modern day, it's practically nonexistent.
Casting This is the most flashy type of magic and one of the most dangerous if spells aren't followed. In modern day this is practically nonexistent, people believe that magic like this never really exists, and some governments even have agencies to hunt down anyone that has learned even slightly how to cast, or people with evidence of it being real.
Brewing The easiest form of magic, used to make potions, in modern day its only used as an alternative to medicine and drugs.
Runes This form is right up with casting in terms of danger, this form of magic is writing symbols onto an object, symbols of which order chaos into the object. You're changing something natural into something unnatural. You are writing a program on the item to tell the energy how to behave, it's extremely difficult to learn because the symbols can react in unexpected ways with not just the energy but with other symbols as well.
submitted by darkagni to worldbuilding [link] [comments]


2024.05.15 17:12 No-Physics7479 Digital ICs (Integrated Circuits)

Digital ICs, also known as logic ICs, are designed to process signals in binary form, utilizing only two states, 0 and 1, to represent information. This binary signal processing approach offers several advantages, including simplicity, ease of performing logical operations, and reduced chip area.
Operating Principle:
The fundamental structure of a digital IC consists of logic gates interconnected according to a specific design. Each logic gate performs a basic logical function such as AND, OR, NOT, etc. When binary signals (0, 1) are applied to the logic gates, they are processed and generate new binary signals at the output.
Classification of Digital ICs:
Digital ICs are categorized into various types based on their function and structure, including:

1. Logic Gates

Logic gates are the fundamental building blocks of digital circuits. They perform basic logical operations on binary data, such as AND, OR, NOT, XOR, and more. These operations are essential for manipulating information and implementing various computational tasks in electronic systems.
Key Characteristics:
· Binary Inputs and Outputs: Logic gates operate on binary data, represented by two distinct states, typically 0 and 1. They take one or more binary inputs and produce a single binary output based on the specified logical operation.
· Truth Tables: Truth tables define the behavior of logic gates by listing all possible input combinations and the corresponding output values. These tables provide a clear representation of the gate's functionality.
· Hardware Implementation: Logic gates can be physically implemented using various electronic components, such as transistors, diodes, and resistors. The specific implementation depends on the desired logic family and performance characteristics.
Common Logic Gate Types:
1. AND Gate: Performs the logical AND operation, producing a 1 output only if all inputs are 1. It represents the "and" condition, requiring all inputs to be true for the output to be true.
2. OR Gate: Performs the logical OR operation, producing a 1 output if any or all inputs are 1. It represents the "or" condition, indicating that the output is true if at least one input is true.
3. NOT Gate: Performs the logical NOT operation, inverting the input. It produces a 1 output if the input is 0 and a 0 output if the input is 1. It represents the "not" condition, negating the input value.
4. XOR Gate: Performs the logical exclusive OR operation, producing a 1 output only if the inputs are different (0 and 1 or 1 and 0). It represents the "exclusive or" condition, indicating that the output is true only if the inputs have opposite values.
Applications of Logic Gates:
Logic gates are the foundation of digital circuits, enabling the construction of various electronic components and systems:
· Digital Arithmetic Circuits: Logic gates are used to build arithmetic circuits that perform addition, subtraction, multiplication, and division operations on binary numbers.
· Boolean Expression Simplification: Logic gates can be combined to represent and simplify Boolean expressions, reducing the complexity of digital circuits.
· Data Encoding and Decoding: Logic gates are employed in data encoding and decoding schemes, such as binary to gray code conversion and error detection and correction codes.
· Control Logic and Sequential Circuits: Logic gates are essential for designing control logic in sequential circuits, such as flip-flops, counters, and registers, enabling state storage and timing control.
Logic Gate Families:
Several logic gate families have been developed, each with its own advantages and disadvantages:
· RTL (Resistor-Transistor Logic): A simple and early logic family, but with high power consumption and slow speed.
· DTL (Diode-Transistor Logic): An improvement over RTL, offering better speed and lower power consumption.
· TTL (Transistor-Transistor Logic): A widely used family known for its balance of speed, power consumption, and noise immunity.
· CMOS (Complementary Metal-Oxide-Semiconductor): A modern family with extremely low power consumption, high speed, and high integration density.
· ECL (Emitter-Coupled Logic): A high-speed family used in high-performance applications, but with higher power consumption and complexity.
The choice of logic family depends on factors such as speed, power consumption, noise immunity, and cost. CMOS has become the dominant logic family due to its superior performance and integration capabilities.
Significance of Logic Gates:
Logic gates play a crucial role in the realm of digital electronics, forming the bedrock of modern computers and digital devices:
· Digital Computation: Logic gates enable the execution of complex computations and data manipulation, driving the processing power of digital systems.
· Logic Design and Circuitry: They provide the fundamental building blocks for designing and constructing various digital circuits, from simple logic functions to sophisticated microprocessors.
· Fundamental Building Blocks: Logic gates serve as the essential components that underpin the vast array of digital technologies that shape our modern world.
The development of logic gates has revolutionized the way we process information and interact with technology, enabling the creation of increasingly powerful and versatile electronic devices.

2. Memory

Memory is an essential component of any digital system, responsible for storing data and instructions that enable the system to function. It serves as the repository of information that the system processes and manipulates.
Key Components:
1. Memory Cells: The fundamental units of memory, each capable of storing one bit of data (0 or 1). Memory cells are typically based on transistors or other electronic components that can maintain a stable state.
2. Address Decoder: Responsible for translating memory addresses into specific memory cells. It receives an address from the CPU or other accessing device and identifies the corresponding memory cell where the data resides.
3. Read/Write Control Circuit: Manages the data transfer process between the CPU or other accessing device and the memory cells. It controls the reading of data from memory cells during read operations and the writing of data into memory cells during write operations.
4. Buffer: A temporary storage area that holds data during memory access operations. It acts as a bridge between the faster CPU or accessing device and the slower memory, reducing overall system latency.
Operating Principle:
Memory stores data by altering the state of memory cells. Each cell can represent one bit of data, either a 0 or a 1. The memory address serves as a unique identifier for each cell, enabling the system to locate the specific cell where data resides.
When the CPU or another device needs to access data from memory, it issues a memory request that includes the desired address. The address decoder translates this address into the corresponding memory cell. The read/write control circuit then activates the appropriate cell, either retrieving the stored data (read operation) or updating the cell's state with new data (write operation).
The buffer plays a crucial role in optimizing memory access by temporarily holding data during the transfer process. This reduces the overall delay experienced by the CPU or other accessing device, improving system performance.
Types of Memory:
Memory can be broadly classified into two main categories based on its data retention characteristics:
1. Random Access Memory (RAM): Volatile memory that stores data that can be changed or modified. Data in RAM is lost when the power is turned off. RAM is typically used for storing temporary data, such as program instructions, operating system data, and currently active applications.
2. Read-Only Memory (ROM): Non-volatile memory that stores fixed data that cannot be altered. Data in ROM remains intact even when the power is turned off. ROM is typically used for storing permanent data, such as firmware, boot code, and system configuration information.
Additional Memory Types:
· Programmable Read-Only Memory (PROM): A type of ROM that can be programmed once by the user, typically using a high-voltage device.
· Erasable Programmable Read-Only Memory (EPROM): A type of PROM that can be erased and reprogrammed multiple times using ultraviolet light.
· Electrically Erasable Programmable Read-Only Memory (EEPROM): A type of non-volatile memory that can be erased and reprogrammed electronically, without the need for external light sources.
· Flash Memory: A type of EEPROM that offers fast erase and write operations, making it suitable for use in portable devices and solid-state drives.
Significance of Memory:
Memory plays a fundamental role in modern digital systems:
· Data Storage: It provides the storage medium for essential data, including program instructions, operating system files, user data, and multimedia content.
· System Operation: Memory enables the continuous operation of the system by retaining critical information, such as system state, application data, and intermediate results of calculations.
· Performance Enhancement: Memory plays a crucial role in optimizing system performance by providing fast access to frequently used data and instructions.
The development of memory technologies has been a driving force in the advancement of computing, enabling the creation of increasingly powerful and versatile electronic devices.
3. Clock Circuit
Significance of Clock Circuits
Clock circuits play a crucial role in the operation of digital electronic devices. They provide the essential timing signal that synchronizes the operation of various components within the system, ensuring coordinated and efficient data processing. The frequency of the clock signal directly impacts the speed of the circuit, enabling faster and more powerful electronic devices.
Advancements in clock circuit technology have led to the development of higher-frequency, more stable, and lower-power clock circuits, contributing to the continuous improvement of electronic devices in terms of performance, efficiency, and reliability..
Components of a Clock Circuit
The basic components of a clock circuit include:
1. Oscillator: Generates the fundamental clock signal. Oscillators can utilize various elements, such as quartz crystals, ceramic resonators, or RC (resistor-capacitor) networks, to produce a stable and accurate clock signal.
2. Frequency Divider: Divides the clock signal from the oscillator down to the desired frequency. This is necessary because the oscillator may generate a much higher frequency than required by the circuit.
3. Counter: Counts the clock pulses from the frequency divider. The count value can be used for various purposes, such as generating timing signals or keeping track of time.
4. Decoder: Decodes the count value from the counter into specific time signals, such as seconds, minutes, or hours. This is particularly useful for applications that require real-time clock functionality.
Operating Principle:
A clock circuit operates by generating a clock signal with a stable frequency. This clock signal is used to synchronize the operation of other ICs in the system. The oscillator generates the basic clock signal, which is then divided by the frequency divider and counted by the counter. The decoder decodes the count value into time signals.
Types of Clock Circuits
Clock circuits can be categorized into two main types:
1. Internal Clock Circuit: Integrated within the IC itself. This type of clock circuit is commonly found in microcontrollers and other integrated circuits that require a clock signal for their internal operation.
2. External Clock Circuit: Provides a clock signal for multiple ICs. This type of clock circuit is often used in larger digital systems where multiple ICs need to be synchronized.
Common Clock Circuit Types
Several types of clock circuits are commonly used in electronic devices:
1. RC Oscillator Circuit: A simple and inexpensive oscillator circuit that utilizes resistors and capacitors to generate a clock signal.
2. LC Oscillator Circuit: A more stable and accurate oscillator circuit that employs an inductor and capacitor to produce the clock signal.
3. Phase-Locked Loop (PLL) Circuit: A sophisticated oscillator circuit that locks its frequency to a reference signal, ensuring high stability and precision.

4. Communication Circuits

Communication Circuits

Communication circuits enable integrated circuits (ICs) to exchange information with external devices, facilitating data transfer, device interaction, and system control. These circuits play a crucial role in modern electronic systems, enabling them to function as interconnected components within a larger network.
Key Components:
1. Physical Interface: Establishes a physical connection between the IC and the external device. This can be realized through pins, connectors, or wireless transmission mediums.
2. Data Transmission Circuit: Handles the encoding and decoding of data for transmission and reception. It ensures that data is converted into a suitable format for transmission over the physical interface and accurately interpreted upon reception.
3. Communication Control Circuit: Orchestrates the data transfer process, ensuring proper timing, synchronization, error detection, and error correction. It manages the exchange of data between the IC and the external device in a controlled and reliable manner.
Operating Principle:
Communication circuits operate by establishing a physical link between the IC and the external device, enabling the exchange of electrical signals. The data transmission circuit then encodes the data from the IC into a format suitable for transmission over the physical interface. This may involve converting the data into a serial bit stream, modulating it onto a carrier signal, or encapsulating it in a communication protocol frame.
Once transmitted, the data is received by the external device and passed to its communication circuit. The data transmission circuit then decodes the received data, converting it back into a format that the IC can understand. This may involve demodulating the signal, extracting the data from the protocol frame, or converting the serial bit stream into parallel data.
The communication control circuit oversees the entire data transfer process, ensuring that the data is transmitted and received in a synchronized and error-free manner. It may employ techniques such as clock synchronization, error detection codes, and retransmission mechanisms to guarantee data integrity.
Types of Communication Circuits:
Communication circuits encompass a wide range of technologies tailored for specific communication protocols and applications:
1. Data Bus: Enables multiple ICs to communicate with each other over a shared data path. Data buses are commonly used in microprocessors and other digital systems to transfer data between various components.
2. Serial Communication Port: Facilitates sequential data transmission between ICs, one bit at a time. Serial communication is often employed in applications where bandwidth is limited or long-distance communication is required.
3. Parallel Communication Port: Allows for simultaneous transmission of multiple bits of data between ICs, providing faster data transfer rates compared to serial communication. Parallel communication is commonly used in high-speed data transfer applications.
4. Wireless Communication: Enables ICs to communicate with other devices without the need for physical cables. Wireless communication technologies such as Bluetooth, Wi-Fi, and cellular networks are becoming increasingly prevalent in modern electronic devices.
Significance of Communication Circuits:
Communication circuits are indispensable components in modern electronic devices, enabling them to:
· Exchange data with other devices, such as sensors, actuators, and peripherals.
· Interact with user inputs, such as keyboards, buttons, and touchscreens.
· Respond to network requests and commands.
· Participate in distributed systems and control networks.
The advancement of communication circuit technology has led to the development of higher-speed, more reliable, and more energy-efficient communication interfaces, enabling the creation of more sophisticated and interconnected electronic devices that can seamlessly interact with the surrounding environment and with each other.

5. Central Processing Unit (CPU)

The central processing unit (CPU) serves as the "brain" of a computer system, orchestrating the execution of instructions and processing data to drive various operations. It is the heart of a computer, responsible for carrying out calculations, manipulating data, and managing the overall flow of information within the system.
Key Components:
1. Processing Unit: The core of the CPU, responsible for performing arithmetic and logical operations on data. It comprises components like arithmetic logic units (ALUs), floating-point units (FPUs), and registers that handle data manipulation and computations.
2. Control Unit: The maestro of the CPU, directing the overall operation and execution of instructions. It fetches instructions from memory, decodes them into understandable commands, and coordinates the activities of other CPU components to ensure proper instruction execution.
3. Cache Memory: A high-speed storage area that temporarily holds frequently accessed data and instructions, reducing the need for slower memory access. Cache memory acts as a buffer, improving overall system performance by providing faster access to essential data.
4. Data Bus: The communication highway that transports data between the CPU and other system components, such as memory and input/output devices. It serves as the data transfer channel, enabling the exchange of information between the CPU and various parts of the system.
5. Address Bus: The address decoder that identifies the specific location of data or instructions stored in memory. It acts as a pointer, pinpointing the exact memory address where data or instructions reside.
6. Control Bus: The traffic controller that manages the operation of the data bus and address bus, ensuring synchronized data transfers and maintaining overall system coordination. It regulates the flow of data and addresses between the CPU and other components.
Operating Principle:
The CPU functions by executing instructions stored in memory. These instructions dictate the operations to be performed and the data to be processed. The control unit plays a pivotal role in this process, fetching instructions from memory, deciphering their meaning, and directing other CPU units to carry out the specified tasks.
1. Instruction Fetch: The control unit retrieves instructions from memory, typically from the main memory or cache memory.
2. Instruction Decode: The control unit interprets the fetched instructions, breaking them down into their constituent parts and understanding the operations they represent.
3. Instruction Execution: The control unit directs the appropriate CPU units, such as the ALU or FPU, to execute the decoded instructions. These units perform the specified calculations or data manipulations.
4. Result Storage: The outcomes of the executed instructions, such as calculated values or processed data, are stored in registers or memory locations, making them available for further use.
The CPU continuously cycles through this fetch-decode-execute-store process, tirelessly processing instructions and manipulating data to drive the computer system's operations.
Significance of the CPU:
The CPU is the cornerstone of a computer system, enabling it to perform its fundamental tasks:
· Execute programs and applications: The CPU interprets and carries out the instructions that make up software programs, allowing users to run various applications.
· Process data: The CPU performs calculations, manipulates data, and transforms information, enabling the computer to handle complex computations and data analysis.
· Control system operations: The CPU manages the overall flow of information and coordinates the activities of other system components, ensuring smooth and efficient system operation.
The performance and capabilities of the CPU significantly impact the overall responsiveness, speed, and processing power of a computer system. Advancements in CPU technology have led to the development of faster, more efficient, and more powerful CPUs, enabling the creation of increasingly sophisticated and capable computers.
Many Sources
submitted by No-Physics7479 to BblackHhorse02 [link] [comments]


2024.05.15 17:01 No-Physics7479 Cascaded Control Circuit Programming

Cascaded control circuits, also known as ladder logic circuits, are a type of electronic circuit used to perform logical operations and control electrical signals in a hierarchical manner in automation systems. These circuits operate based on the principle of comparing the input voltage to predetermined voltage thresholds, thereby generating output signals at different voltage levels.
Basic Structure of a Ladder Diagram
Ladder diagrams are a visual tool for describing logic systems, particularly useful in the field of PLC (Programmable Logic Controller) programming. This diagram is composed of the following main components:
1. Power Rail (Left-hand Rail):
2. Output Rail (Right-hand Rail):
3. Rung (Ladder Step):
4. Connections:
Examples of Components and Sample Rungs
Example 1: Turning on a Light When a Switch is Pressed
Power Rail: Switch (input) Output Rail: Light (output) Rung:
Example 2: Using a Temperature Sensor to Control a Fan
Power Rail:
Explanation:
Note:
Structure of Various Sensors
NTC Temperature Sensor:
Optical Sensor:
Proximity Sensor:
Pressure Sensor:
Accelerometer:
Force Sensor:
Humidity Sensor:
Gas Sensor:
Additional Notes:

The Advent of PLCs (Programmable Logic Controllers)

Prior to the introduction of PLCs (Programmable Logic Controllers), industrial control systems primarily relied on relays to perform control logic. However, the use of relays presented several drawbacks, including:
· Difficulties in Design and Programming: Designing and programming control systems using relays for complex circuits was time-consuming, labor-intensive, and required high expertise.
· Challenges in Troubleshooting and Maintenance: Identifying and rectifying faults within relay-based systems was a lengthy and laborious process.
· Lack of Flexibility: Modifying control logic in relay systems was intricate and expensive.
· Bulky Size: Relay systems often occupied substantial space due to their large size.
The advent of PLCs addressed the limitations of traditional relay systems, offering numerous advantages:
· Ease of Programming: PLCs can be programmed using user-friendly languages like Ladder Logic, Function Block Diagram, and others. This facilitates quicker and simpler design and programming of control systems.
· Simplified Troubleshooting and Maintenance: PLCs possess self-diagnostic capabilities, enabling faster and easier fault identification and rectification within the system.
· High Flexibility: Control logic in PLCs can be readily modified by altering the programming code.
· Compact Size: PLCs are compact, saving installation space.
Owing to these benefits, PLCs rapidly gained popularity as preferred control devices in industrial applications. Today, PLCs are extensively employed across diverse sectors, including:
· Manufacturing: PLCs control automated production lines, encompassing electronics, automotive, food processing, and other manufacturing industries.
· Building Automation: PLCs manage lighting systems, HVAC systems, security systems, and more in buildings.
· Energy: PLCs oversee power systems, water systems, gas systems, and the like.
· Transportation: PLCs handle transportation systems, including railways, roadways, aviation, and others.
The introduction of PLCs marked a revolutionary step in the field of industrial automation, contributing to enhanced production efficiency and productivity.
Many sources
submitted by No-Physics7479 to BblackHhorse02 [link] [comments]


2024.05.15 16:53 ry0shi Pc randomly started bootlooping

Been using this pc for a couple years now, bit of a Frankenstein since I inherited it from my father; only things that i haven't replaced on it are two drives, psu and the whole chassis.
Nothing seemed out of the ordinary as i shut it down with the windows menu late in the evening, went to sleep, woke up in the morning, pressed the power button, but all I've gotten in response is the fans started spinning, then got all quiet after 3-5 seconds, and that would repeat for several minutes as I was looking for solutions. No leds on the motherboard lighting up, no error codes from the little speaker.
Quick mention but it crashes before it starts listening for any input, so something like safe mode or winRE is not possible. What I've tried:
I don't have a boot usb, but i can make it thanks to the fact that I still have a laptop.
Any advice?
submitted by ry0shi to buildapc [link] [comments]


2024.05.15 16:51 harrifangs Misinterpretion of Haley’s character

I’ve seen a lot of discussion about Haley online recently, especially on tiktok. I think Haley is an interesting character so this is a good thing! But it seems there’s a big gap between Haley as she exists in the game and Haley as she exists in the minds of a lot of fans.
There are a lot of tiktok videos about Haley right now using ‘Good Luck Babe’ by Chappell Roan, which if you didn’t know is about a sapphic relationship where the love interest is repressing her feelings and convincing herself that she’s straight, leading to the end of the relationship. It’s a great song, but I’m really struggling to see how it connects to Haley. I’ve married her as a female farmer expecting this to be a big part of her arc and it just… isn’t? She never mentions struggling with her sexuality, never denies her feelings for you. She just seems happy that you’re interested in her. It’s like she’s been out as bi/lesbian since before you arrived in town. But if you were to only watch tiktoks and read the discussions about her you’d be led to believe that you are the cause of her lesbian awakening and that she has to go through this whole inner battle with herself before she can accept her feelings and then you ride off into the sunset together.
To me, Haley is a character who teaches you the lesson of not judging a book by its cover. She appears to be a vapid valley girl at first glance and is pretty rude to you before you get to know her. At her heart she’s a generous and layered person who has most likely downplayed her interest in photography because people never bothered to ask about her interests, never cared enough to pay attention to anything more than her appearance. This trend of pretending that she’s uncomfortable being anything but straight seems to be based completely on her appearance as a conventionally pretty blonde girl, and ultimately I think making this judgement about her based purely on her looks goes completely against the point of her character’s role in the story.
I also think it’s worth mentioning the amount of people saying that Haley is autistic-coded and twisting what is pretty clearly meant to be rudeness into a lack of social skills, which just seems incredibly lazy to me. I am autistic, I believe there are characters in the game who could be seen as autistic (mostly Emily), but the popular girl who judges people based on their appearance is pretty much the polar opposite of an autistic-coded character. I’m all for headcanons but if you actually spread this interpretation of the dialogue like it’s a solid theory I think you’re just not very good at interpreting text. At the end of the day, sometimes people are just rude on purpose, and not every hobby is a special interest.
TL;DR: Haley according to the game and Haley according to a large portion of the fandom are two completely different characters.
Thank you for coming to my Ted Talk. I’m gonna go pick a sunflower and give it to my virtual wife.
submitted by harrifangs to StardewValley [link] [comments]


2024.05.15 16:27 GrantMeStrength The first computer game "type-in" is 49 today

Happy "Kill the Bit" Day!
This was a game - and I use the term loosely - for the Altair 8800 computer, perhaps the first home computer to appear in the mid 1970s.
Once you had toggled in the code on the front panel switches, you could play a reaction timer game on the LEDs. Five minutes of endless fun!
There was no video output from the Altair (at least, not until the Dazzler video card appeared in 1976 - probably the first graphics card). The Altair was a success (even through it was very expensive) and spawned a generation of compatible machines. The operating system CP/M became the standard (yes, the same CP/M that appeared on Amstrad CPCs and PCWs) making it the "PC" of its day, with games and business applications.
submitted by GrantMeStrength to thisweekinretro [link] [comments]


2024.05.15 16:04 Due-Drummer-8353 What is a Geomagnetic Disturbance and How Does It Affect the Power Grid?

A geomagnetic disturbance (GMD) is also referred to as a geomagnetic storm. A geomagnetic storm is defined as a major disturbance of Earth`s magnetosphere that occurs when there is a very efficient exchange of energy from the solar wind into the space environment surrounding Earth. Solar wind shockwaves can be caused by a solar flare that is followed by coronal mass ejections (CMEs), which eject charged and magnetized particles into space.
The reason that geomagnetic disturbances are of particular concern to the power grid is geomagnetically induced current (GIC). GIC are caused by geomagnetic disturbance causing electric current variations in the magnetosphere and the ionosphere which then cause effects to the Earth`s magnetic field. This causes currents to be induced in conductors such as power lines which will then effect the power grid transformers. GICs can cause “half-cycle saturation” of high-voltage Bulk-Power System transformers, which can lead to increased consumption of reactive power and creation of disruptive harmonics that can cause the sudden collapse of the Bulk-Power System. Further, half-cycle saturation from GICs can potentially damage Bulk-Power System transformers because of overheating. It has been determined by NERC and the Department of Energy that GIC has a higher risk of causing damage to the North American power grid due to increases in high voltage power lines and electric energy usage.
Most well-known recent experience in North America was the March 13-14, 1989 geomagnetic storm, which led to the collapse of the Hydro Québec system in the early morning hours of March 13, 1989. The threat from GMD events have gained renewed attention as recent investigations have suggested the severity of solar storms may be higher and reach lower geographic latitudes than formerly expected.
More information and youtube videos: https://ee-powersystems.com/blogen.php?sifra=340
submitted by Due-Drummer-8353 to PowerSystemsEE [link] [comments]


2024.05.15 16:02 IllicitBiscuits Advice on the right monitor for me - have a chosen the right specs?

Please go easy on me! Appreciate this is not PC build related... I have done hours of research trying to decide on the best/right monitor for me. I think I have narrowed it down to a set of specs to search with, but would appreciate feedback from those who know more than me…
What I want it for:
1) I work from home full time, so office use. Spreadsheets/other O365 apps/video calls/PDFs/internet etc. No funky software/no graphic design or video editing etc. I have a Dell Latitude 13th Gen i5-1335U 16GB RAM - i do not game on this.
2) Gaming with PS5 only. Open world, single player, think Cyberpunk/GTA/Fall Out etc.
Budget: up to £900, could maybe go a bit higher
Available space/desk: desk is 160x80cm – but I’d like to fit it on the wall for a cleaner desk space
Suggested optimal specs based on my research…
Size – 34”, 38” or 43” – I don’t think I can go bigger than 43”, but would like to feel like I am getting an upgrade from my current 32” (Samsung LC32T550FDUXEN), so 34” feels a bit meh, but current is 16:9 so would a 34” 21:9 feel a lot bigger…?
Edited to add - also want curved, really should have led with that!
Ports - x2 HDMI (at least x1 HDMI 2.1) – have read that to future proof and because of the PS5 I should get one with HDMI 2.1. Currently have just x1 HDMI and x1 DP so have had to get a HDMI to DP cable for the PS5 and the sound keeps cutting out.
Aspect ratio – leaning heavily towards 21:9. I think the ultra-wide would be beneficial for work, and while I know the PS5 does not officially support it, I am not sure that the black bars would bother me, and also read that the right monitor can handle the ‘up-scaling’ (stretching). Also want to future proof in case Sony does an update…
Also, I find I rarely ‘look up’ when working on my current 34”/16:9 except to search/close tabs. My natural working space seems to be more in the middle/bottom of the screen, causing me to lean further to 21:9.
Resolution - 3440x1440 or 3840 x 1600 for 21:9 (2560 x 1440 if I did go for 16:9)
Hz - min 144 - ideally more
Refresh rate - 1-3ms
Integrated speakers – Yes – very used to having them especially for virtual meetings, ideally don’t want to have to get external, but looks like I may have to? I have been surprised that so many high end monitors do not have them
Panel – VA or IPS?? – current is VA. I do find the colours can be a bit dull when gaming, however when working I have ‘night mode’ switched on else my eyes start hurting. Research showing the world seems to be a bit split, but maybe leans towards VA? EDITED to add, should I go for OLED?
Other - current has AMD FreeSync, what should I be looking for here for the PS5?
I suppose I am asking if that is all logical, and given no such monitor may exist that ticks all the boxes at the right price... what should I compromise on 1st, 2nd etc.?
Many thanks!
submitted by IllicitBiscuits to buildapc [link] [comments]


2024.05.15 15:51 btpv i cant get my esp32 s2 working

i run ubuntu 22.04 and these things do not work on my laptop but on other windows pc on my school it works
i use platform io
platformio.ini
[env:lolin_s2_mini] platform = espressif32 board = lolin_s2_mini framework = arduino monitor_speed = 115200 board_build.filesystem = spiffs lib_deps = fastled/FastLED @ ^3.3.3[env:lolin_s2_mini] platform = espressif32 board = lolin_s2_mini framework = arduino monitor_speed = 115200 board_build.filesystem = spiffs lib_deps = fastled/FastLED @ ^3.3.3 
dmesg
[ 4842.609179] cdc_acm 1-1:1.0: ttyACM1: USB ACM device [ 4843.769444] usb 1-1: USB disconnect, device number 56 [ 4844.383222] usb 1-1: new full-speed USB device number 57 using xhci_hcd [ 4844.511342] usb 1-1: New USB device found, idVendor=303a, idProduct=0002, bcdDevice= 1.00 [ 4844.511350] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 4844.511353] usb 1-1: Product: Espressif ESP32-S2-Saola-1 [ 4844.511355] usb 1-1: Manufacturer: Espressif Systems 
lsusb -v
Bus 001 Device 053: ID 303a:0002 Espressif ESP32-S2 Device Descriptor: bLength 18 bDescriptorType 1 bcdUSB 2.00 bDeviceClass 239 Miscellaneous Device bDeviceSubClass 2 bDeviceProtocol 1 Interface Association bMaxPacketSize0 64 idVendor 0x303a idProduct 0x0002 bcdDevice 7.23 iManufacturer 1 Espressif iProduct 2 ESP32-S2 iSerial 3 0 bNumConfigurations 1 Configuration Descriptor: bLength 9 bDescriptorType 2 wTotalLength 0x005d bNumInterfaces 3 bConfigurationValue 1 iConfiguration 0 bmAttributes 0xc0 Self Powered MaxPower 500mA Interface Association: bLength 8 bDescriptorType 11 bFirstInterface 0 bInterfaceCount 2 bFunctionClass 2 Communications bFunctionSubClass 2 Abstract (modem) bFunctionProtocol 0 iFunction 0 Interface Descriptor: bLength 9 bDescriptorType 4 bInterfaceNumber 0 bAlternateSetting 0 bNumEndpoints 1 bInterfaceClass 2 Communications bInterfaceSubClass 2 Abstract (modem) bInterfaceProtocol 0 iInterface 0 CDC Header: bcdCDC 1.10 CDC ACM: bmCapabilities 0x02 line coding and serial state CDC Union: bMasterInterface 0 bSlaveInterface 1 CDC Call Management: bmCapabilities 0x03 call management use DataInterface bDataInterface 1 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x85 EP 5 IN bmAttributes 3 Transfer Type Interrupt Synch Type None Usage Type Data wMaxPacketSize 0x0040 1x 64 bytes bInterval 1 Interface Descriptor: bLength 9 bDescriptorType 4 bInterfaceNumber 1 bAlternateSetting 0 bNumEndpoints 2 bInterfaceClass 10 CDC Data bInterfaceSubClass 2 bInterfaceProtocol 0 iInterface 0 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x03 EP 3 OUT bmAttributes 2 Transfer Type Bulk Synch Type None Usage Type Data wMaxPacketSize 0x0040 1x 64 bytes bInterval 1 Endpoint Descriptor: bLength 7 bDescriptorType 5 bEndpointAddress 0x84 EP 4 IN bmAttributes 2 Transfer Type Bulk Synch Type None Usage Type Data wMaxPacketSize 0x0040 1x 64 bytes bInterval 1 Interface Descriptor: bLength 9 bDescriptorType 4 bInterfaceNumber 2 bAlternateSetting 0 bNumEndpoints 0 bInterfaceClass 254 Application Specific Interface bInterfaceSubClass 1 Device Firmware Update bInterfaceProtocol 1 iInterface 0 Device Firmware Upgrade Interface Descriptor: bLength 9 bDescriptorType 33 bmAttributes 15 Will Detach Manifestation Tolerant Upload Supported Download Supported wDetachTimeout 700 milliseconds wTransferSize 64 bytes bcdDFUVersion 1.10 Device Status: 0x0001 Self Powered 
platform io output
Processing lolin_s2_mini (platform: espressif32; board: lolin_s2_mini; framework: arduino) Verbose mode can be enabled via `-v, --verbose` option CONFIGURATION: https://docs.platformio.org/page/boards/espressif32/lolin_s2_mini.html PLATFORM: Espressif 32 (6.7.0) > WEMOS LOLIN S2 Mini HARDWARE: ESP32S2 240MHz, 320KB RAM, 4MB Flash DEBUG: Current (cmsis-dap) External (cmsis-dap, esp-bridge, esp-prog, iot-bus-jtag, jlink, minimodule, olimex-arm-usb-ocd, olimex-arm-usb-ocd-h, olimex-arm-usb-tiny-h, olimex-jtag-tiny, tumpa) PACKAGES: - framework-arduinoespressif32 @ 3.20016.0 (2.0.16) - tool-esptoolpy @ 1.40501.0 (4.5.1) - tool-mkfatfs @ 2.0.1 - tool-mklittlefs @ 1.203.210628 (2.3) - tool-mkspiffs @ 2.230.0 (2.30) - toolchain-riscv32-esp @ 8.4.0+2021r2-patch5 - toolchain-xtensa-esp32s2 @ 8.4.0+2021r2-patch5 LDF: Library Dependency Finder -> https://bit.ly/configure-pio-ldf LDF Modes: Finder ~ chain, Compatibility ~ soft Found 34 compatible libraries Scanning dependencies... Dependency Graph -- FastLED @ 3.6.0 Building in release mode Retrieving maximum program size .pio/build/lolin_s2_mini/firmware.elf Checking size .pio/build/lolin_s2_mini/firmware.elf Advanced Memory Usage is available via "PlatformIO Home > Project Inspect" RAM: [= ] 8.4% (used 27528 bytes from 327680 bytes) Flash: [== ] 20.1% (used 263710 bytes from 1310720 bytes) Configuring upload protocol... AVAILABLE: cmsis-dap, esp-bridge, esp-prog, espota, esptool, iot-bus-jtag, jlink, minimodule, olimex-arm-usb-ocd, olimex-arm-usb-ocd-h, olimex-arm-usb-tiny-h, olimex-jtag-tiny, tumpa CURRENT: upload_protocol = esptool Looking for upload port... Using manually specified: /dev/ttyACM1 Forcing reset using 1200bps open/close on port /dev/ttyACM1 Waiting for the new upload port... Uploading .pio/build/lolin_s2_mini/firmware.bin esptool.py v4.5.1 Serial port /dev/ttyACM1 Connecting... Traceback (most recent call last): File "/home/borro/.platformio/packages/tool-esptoolpy/esptool.py", line 34, in  esptool._main() File "/home/borro/.platformio/packages/tool-esptoolpy/esptool/__init__.py", line 1032, in _main main() File "/home/borro/.platformio/packages/tool-esptoolpy/esptool/__init__.py", line 674, in main esp = esp or get_default_connected_device( File "/home/borro/.platformio/packages/tool-esptoolpy/esptool/__init__.py", line 921, in get_default_connected_device _esp.connect(before, connect_attempts) File "/home/borro/.platformio/packages/tool-esptoolpy/esptool/loader.py", line 640, in connect last_error = self._connect_attempt(reset_strategy, mode) File "/home/borro/.platformio/packages/tool-esptoolpy/esptool/loader.py", line 525, in _connect_attempt reset_strategy() # Reset the chip to bootloader (download mode) File "/home/borro/.platformio/packages/tool-esptoolpy/esptool/reset.py", line 83, in __call__ self._setDTRandRTS(False, False) File "/home/borro/.platformio/packages/tool-esptoolpy/esptool/reset.py", line 58, in _setDTRandRTS fcntl.ioctl(self.port.fileno(), TIOCMSET, struct.pack("I", status)) BrokenPipeError: [Errno 32] Broken pipe 
submitted by btpv to esp32 [link] [comments]


2024.05.15 15:35 karenvideoeditor The Zoo [Part 6]

First / Previous
Back on the job, my eyes kept going to the camera that was on enclosure one. Andrew told me its real name, but I think that’d be a step too far, putting that out on the internet. I’d just stick with ‘Steve the bear’. Whatever it was, I just knew I’d have a nightmare about it eventually. Last night I slept fitfully but okay. But I know my brain, and I’d already had a nightmare about Yui stabbing me with one of her legs (they are not needle-sharp in real life, this was dream logic) and walking around, having not noticed I was a Ripley-kebab on her leg. I kept trying to get her attention but for some reason I’d been worried about sounding rude.
On my third walk around the zoo, at about 12 a.m. I saw Leila again, who I’d been noticing more and more often. She never looked interested in talking, only walking through the enclosures, and by that I meant any and all of them. She didn’t seem to have a favorite. I assume that however much of her mind that was left over from being alive still gravitated toward looking at the animals, since getting too close was what killed her in the first place.
Then, in enclosure eight, I saw a new creature and stopped abruptly. This one looked chill, but I wasn’t about to make any assumptions. It looked unique in a strange way, shaped like a giant lizard but built like a big cat of some sort. It had an uncanny valley human face, green hair for a mane, and also a horn like a unicorn. It felt like something drawn by an imaginative five-year-old brought to life, but was still somehow oddly endearing.
“Hello,” she spoke, noticing me noticing her. Her voice was distinctly female and oddly deep.
“Hello,” I responded with false cheer.
She pushed herself to her feet and I took an instinctive step back, but she seem to notice, much less take offense. “You’re the guard here?”
“Yup. That’s me.”
“Thank you.”
I blinked, taken aback. “Ah…you’re welcome. For what?”
She cocked her head. “For guarding me.”
That was different. Most of the impressions I had gotten from the animals so far were that they wanted to eat me. And the idea that this one was thankful for me doing my job was refreshing, don’t get me wrong, but made me wary. Call me a cynic, I guess.
“My name is tàiyang. You can call me Sun,” she told me.
“Hi, Sun. I’m Ripley.”
Then she looked toward the sky. “It’s going to rain tonight.”
After a thoughtful moment, I asked, “Does that make you sad?”
“Why would it make you sad?”
I smiled. “Because your name is Sun.”
She paused and then said, “I don’t understand.”
Honestly, I wasn’t sure what I was expecting, telling a pun to one of the animals. “Never mind.” I glanced up at the sky. “I thought the rain is supposed to stay away from here. Are the ones who told me that wrong?”
“Yes.”
“Well that’s good to know,” I murmured to myself, thinking of my raincoat hanging in the security office closet. It wasn’t that surprising, honestly. Sometimes I felt like the meteorologists in Arkansas try to read the entrails of goats to figure out the weather. It’s all a mess and it’s all made up.
At that, the animal looked to the sky and fell silent. She appeared to be the most uneventful introduction I’d had so far, and I was incredibly grateful for it. Except then the animal kept talking. “He’s under a spell.”
I blinked. “What?”
She looked back to me. “Andrew. He’s under a spell. He’s very unhappy.”
I had no idea how to react to that. For a second I just stared. The sudden jolt of being told my boss was currently being afflicted by magic left me floundering. “He… What?” I finally asked. “Where is he?”
“In his office.”
Oh shit. My eyes instinctively darted in the direction of the main office. I always just entered through the door on the west side of the building, of course, since it led to the security room. It was unnecessary for me to go through the door that first led into the lobby-slash-office Andrew worked out of. Sometimes he even left early, so it was locked anyway. I had the key, but again, it was unnecessary.
Whatever had happened, assuming this animal wasn’t joking around (she seemed completely serious), I needed to establish whether she was right. Leaving the enclosure of the animal I’d just met, I quickly walked back to the small building.
Taking a deep breath, I knocked loudly. “Andrew, are you in there?”
The only reply was silence. I stood there until enough time had passed that it was obvious that no one was coming to answer the door. Taking out my phone, I dialed his cell number and wait as it rang. Then I grimaced when I heard it ringing inside.
Hanging up and shoving the phone back in my pocket, I stared at the closed door.
Trying the doorknob, I found that it was unlocked, and my heart skipped a beat. Andrew always locked his office before leaving. Opening the door slowly, the lights were off in the room, leaving only the faint red glow of the lights outside peeking around his curtains, so I turned on a light. Then my heart plummeted into my stomach, because there was Andrew, splayed limply on the ground, his eyes only half open.
I bolted to him and dropped to his side as he let out a whimper.
“Andrew,” I said, putting two fingers to the side of his neck. He remained silent, and despite his relaxed, wilted appearance, his heart was racing, and I wondered if he was in pain. The room smelled, and it was clear to me that he’d lost control of his bowels. I couldn’t believe I’d been working here for hours without knowing he was in the next room like this.
“Fucking hell. I’m so sorry it took me so long to find you. Can you hear me? What happened?” He made a small sound, unfocused eyes attempting to meet mine, but it was as if he were severely deprived of sleep or something, unable to focus. His mouth opened and he tried to say something, but he couldn’t speak. All I got was halting words mushed into each other. I felt for him; he must’ve been mortified by his condition. I would’ve been, at least.
The obvious solution would be to get Suzanne’s number from Andrew’s phone, so I searched him for it and found it in his right jacket pocket. I pressed the button the iPhone, swiped, and let out a sigh of frustration. He was security conscious enough to lock his phone with a code, of course.
“Can you… You can’t tell me the code,” I said knowing. He grunted quietly.
“What happened?”
I shrieked and jumped to my feet. Leila stood in the doorway, staring in shock at Andrew’s body. “You scared the bejesus out of me,” I exclaimed. I stopped myself before asking if she could make some noise when she moved or if I could put a bell on her. “What does it look like happened? Someone put a spell on him.” Abruptly, my stance changed, standing up straight. “Wait. Do you know how to get in touch with…anyone?” I asked desperately.
“I know Ms. Cooper’s phone number,” she said frankly.
My eyes widened. “Seriously? How?”
“Andrew gave it to me after I worked here for three months.”
That stopped my brain dead in its tracks. “You…used to work here?” I whispered. I remembered Andrew telling me that one of the night shift managers had been killed, but he hadn’t told me it was Leila. Whether it was for her own privacy or her dignity or some other reason, it didn’t really matter. What mattered was that I could call Suzanne.
“I worked here for three months,” Leila confirmed as I took out my own phone.
“Okay…what’s her number?” I asked, ready to dial. She rattled off the number and dialed it.
The phone rang twice times before someone answered. “Hello?”
“Hi, is this Suzanne?”
“Yes, who’s this?”
She had a British accent like Andrew did. I took a deep breath and said, “It’s Ripley Mason. I got your number from Leila. I’m here in Andrew’s office and he’s in really bad shape. Someone cast a spell on him and it’s like he’s lost control of the part of his brain that lets him move around and speak.”
“What?” she snapped. “What happened?”
“I-I don’t know,” I said, glancing back to Andrew. He actually looked calmer now, and I hoped that was because he knew Suzanne could fix this. “I was doing my rounds and I met Sun; she’s the one that told me and that’s why I came into his office. I don’t- Who would do this? What do I do?”
“It’s okay, Ripley. I’ll leaving now and will be there soon,” she told me. I heard rustling in the background, the sounds of getting out of a chair and footsteps. “Did you check the security cameras?”
My eyes shut in irritation against my stupidity. It hadn’t even occurred to me. “I’m sorry. Of course, I’ll do that right away.” Proof positive that I was completely out of it. Some security guard I was, not even able to keep my head in an emergency.
“Don’t apologize, Ripley, you’re quite within your rights to be discombobulated at the moment,” she said. “And I’d like you stay with Andrew, but I would prefer to know what happened. Leave his side just for a second to check the footage.
“Okay.” I crouched down to him, putting a hand on his shoulder. “I’ll be right back.” His eyes flicked to me, but he didn’t make a sound. Getting back to my feet and walking over to the security room door, I went in and sat at my desk, putting the phone on speaker so I could more easily navigate the footage.
After fidgeting around with the unfamiliar aspect of the program, since I’d never needed to look back before and Andrew only showed me how to do it once, I finally went back to the point where the spell had been cast. “Okay, he walked into his office with two men at…4:08 p.m. and it looks like he was fine with it. He wasn’t under duress, from what I can see.”
“That’s likely Michael Wise and Eric Henry,” Suzanne told me. “They were allegedly making a donation, a herd of Bagot goats.”
“Allegedly?”
“Well, I’m operating under the assumption that they lied if Andrew is spelled.”
I grimaced. That was a good point. Watching them have a conversation, I saw Andrew tense, and then turn to dart toward his desk, but he only made it two steps before one of the men raised what looked like a wand, snapping it in my late boss’s direction, speaking something. As I saw Andrew’s body seize like he’d been hit with a taser and collapse, I hissed in a sharp breath. “Cripes.”
“What is it?”
“One of them had a wand,” I managed. “He-He did something with it.”
“I’m here, Ripley. Come back to the office.”
My eyes widened and I did as I was told, stunned to see her opening the front door. “How did you get here so fast?” I asked.
The woman gave me a small smile, rendered grim by the situation. “Call it a trick of the trade.”
“Oh. Gotcha.”
Suzanne was all hard edges, her pin-straight blond hair cut at an angle just below her ears, and she wore a smart blue pants suit with matching pumps. But then she looked to Andrew and her face softened, despair and fury flashing across it as she quickly walked to him and knelt at his side, taking his weak hand in hers.
“Oh, Andrew,” she whispered. “I’m so, so sorry. You’ll be okay. I already texted a healer and asked her to come by. A friend of mine named Janine.”
I looked back to Andrew’s face, his eyes open and his expression one of exhaustion, but then quickly looked to Suzanne. “Why would someone do this?” I asked.
“I have a feeling at least one of our animals is missing,” she told me, her voice low and hard.
Anger flared up in me. “What?” I asked tersely. I glanced back in the direction of the cameras. “Should we check the cameras to see which enclosure they went to? Do we- Are there cops you can call for this? What do we do?”
Suzanne’s face slowly faded to sadness. “I’ll take care of it,” she said. “You’re accurate in that I do have a different police I’ll call about this. But there’s a good chance we won’t get the animal back.”
“Wait, why? Come on, there’s got to be magic you could do, right?” I asked anxiously.
“The animal will have been warded and sold to someone immediately,” she explained. “They would’ve had a buyer set up, and gone straight there to reduce the risk of being caught with it. Anyone who is buying an animal like this is extremely powerful, which means that even if we catch the men who stole it, they’d go to prison, but they wouldn’t risk angering the buyer. They won’t tell the authorities who it was, even for a lesser sentence. Losing an animal to robbery has only happened twice in the zoo’s history, this is the third time, but that’s how it played out both times. Actually, in the first instance, the police didn’t even catch the people who took it, since they were wearing masks.”
Just then, there was a knock at the door, and Suzanne pushed herself to her feet, walking over and opening it without hesitation. “He’s in here.” I took the opportunity to open the windows and turned down the thermostat so it would start displacing the smelly air.
A woman walked in, Janine presumably. “Oh, goodness,” she breathed, going quickly to Andrew. She took his pulse with one hand as she pulled a wand out from her purse with the other. “It’s good he’s staying calm. Redire orior can be terrifying to be subjected to.”
“He wasn’t calm when I got here,” I told her quietly. “I’ve been here for hours and didn’t know he was here until just a few minutes ago.”
Janine swore softly. “All right. Let me get started.”
I didn’t know what that meant, so I turned to Suzanne. “What did she call this?”
“The spell is ‘redire orior’. It’s a regression of part of the mind, basically all the way back to when we were first born,” she said tightly, anger flickering across her face. “He has no more control over his body than he did when he was a newborn baby.”
I grimaced, looking back to him. “Oh my god,” I whispered. It meant exactly what it had looked like when I’d walked in: Andrew had been rendered completely helpless. Rage welled up inside me, despising the men who’d done this and wishing desperately that Suzanne had been more confident in finding them.
Suzanne took the opportunity to walk into the security office and I heard her sit in my chair. Janine put down her wand to have both hands free and told Andrew, “Just relax, concentrate on breathing slowly,” she said, carefully pulling both of his legs out and rolling him onto his back. She then put his arms at his sides and, picking up her wand, pointed it at his forehead.
I took in a sharp breath of surprise as I saw a faint glow coming from the wand, through the top of it and then to Andrew’s forehead. She held that position for a while, muttering under her breath.
A few minutes later, Suzanne came out and took her phone from her pocket, saying, “I don’t recognize either of the men in the footage. But they seemed distressed, particularly the one that didn’t hurt Andrew. I don’t think that’s what was meant to happen.”
“Meant to or not, it happened,” I muttered through clenched teeth. I’d already decided that my new to-do list every day included first checking the office cameras.
“Andrew,” Janine said, letting the glow fade. “Can you speak?”
“I…yeah,” he whispered.
Suzanne came over to my side. “Thank goodness. How are you feeling? How’s the vertigo?”
“Pretty much gone,” he said, closing his eyes for a long moment, though he didn’t try to stand up.
“Andrew, I pulled up the cameras in the office and listened to the audio,” she told him. “I know what happened.”
My eyebrows furrowed. “The cameras have audio?”
“It’s under admin privileges, but yes. Andrew, you should have known better,” she said softly, looking back to him. “The gun in one of the desk drawers? I presume that’s what you were lunging for, because those two men had just made it clear they were here for an animal.”
“Yeah,” he sighed. “I just…” He looked distraught.
“They told you to just let them get what they came for,” Suzanne said. “Why didn’t you?” My lips parted in shock.
“The last time this happened, I cooperated, but…I regretted it,” he growled. “We never saw Harriet again. I couldn’t just stand here and let them do whatever they wanted. Not again.” I assumed Harriet was one of their animals, but I didn’t ask.
“Don’t ever do something so foolish again,” she told him, on the verge of being upset, her emotions likely tempered by his condition. “I want to make it clear to you that this job, these animals, they’re immensely important, but they are not worth your life. He could have killed you. If someone gains access to the zoo again to steal an animal I want you to cooperate fully. Understood?”
“Yeah,” Andrew muttered.
The idea that Andrew had tried to bring a gun to a wand fight was staggering. Something heavy curled in my stomach at the thought. It was clear he cared about the wellbeing of the animals to a degree I hadn’t comprehended.
Janine took one of the small pillows from the couch and tucked it under Andrew’s head as Suzanne continued. “All right,” she said with a sigh. “I’ll go through the footage to determine what they stole and then call the authorities to report the theft. Janine, can you continue to treat him?”
I wasn’t sure what that entailed, but Janine apparently did, since she nodded and knelt back down as Suzanne went back into the security office. Janine did the same thing that she’d done before, that soft glow channeling light into Andrew’s head. Obviously, I wanted to ask what she was doing, but I knew better than to think I’d get an answer. Instead, I sat in one of the loveseats in front of Andrew’s desk, turning it to face them.
I heard Suzanne’s voice faintly speaking to someone on the phone and the minutes ticked by. Eventually, Suzanne came back out again and she stood next to me for a long moment, watching the healing process before turning to me.
“Andrew told me you were attempting to create some enrichment activities for the animals?” asked my boss.
“Oh, uh…yeah, I am,” I answered. I assumed she was trying to make small talk to distract me from the current situation, and I appreciated it. “The first one went well. Spike loves artichokes, pecans, and hazelnuts. I went with things that made it a challenge to eat, like it’s a challenge to pull out fingernails of its prey.”
Suzanne’s expression brightened just enough for me to notice. “Ripley, that’s wonderful. Very clever.” She let out a breath. “It’s becoming more and more obvious to me that Andrew chose well in hiring you.” I gave her a small smile. “Listen, I’m going to hire someone else to be here with you on duty,” Suzanne told me, “and by that, I mean someone from my neck of the woods. Andrew explained that to you, correct?”
“Not much. Just that you’re not from Earth.”
Suzanne smiled. “That makes me sound like an alien, but yes, I’m not from this dimension. I can hire someone who has similar abilities to mine, who can check in every few hours, make sure everything’s all right, but generally make themselves scarce unless there’s an emergency. He wouldn’t have been able to do much if he’d already been here, but he’d have known what was going on. Andrew would have received assistance immediately.”
I was curious of what those abilities were, aside from being able to see the animals, but I wasn’t bold enough to ask. Also, I was curious about who this new ‘employee’ would be, but presumably I’d find out sooner or later. “That would make me feel a little better,” I said, nodding. “Knowing there was someone else here.”
She nodded once. “It’s as good as done, then. As for Andrew, he’ll need to take a few days off to recover. Would you be willing to give the tours until he’s back in ship-shape?”
My eyes bugged out of my skull. “Wait, what? I can’t even see all the animals!”
Suzanne chuckled at my expression and shook her head. “I can enchant a pair of specs for you to wear,” she told me. “It’ll give you a bit of a headache, but you’ll be able to see all of the animals. Also, I’ll give you the background for each of them, because you’ll be speaking about them to the tourists.”
I blinked, thinking of how awesome it would be to finally know all about them all. And it was flattering, the fact that she had such confidence in me that, without hesitation, she asked if I could take over for Andrew. The best thing for me to do, of course, was to be confident and assure her that I could take any temporary promotion in stride. “I’m…I’m not great with people,” I managed.
Yup. Nailed it.
“You can be a little harsh with them if you need to,” she said with a small, knowing smile. “I assumed that signing up for a job where you interact with a screen of cameras the whole time means you aren’t great with people. And Andrew did brief me on you when he hired you. How good are you at couching your insults in polite talk? The British are quite skilled, but I know Americans aren’t too bad at it.”
I smirked, remembering how a coworker friend of mine once told a customer, “Oh, bless your heart,” in her thick southern accent and it sounded like the worst insult. “I can manage that, I think.”
A buzz from the gate that went to the panel on the wall drew our attention and Suzanne walked over to let the visitors in. It was three people, a man and two women, with a gurney.
Walking over to Andrew, I folded my arms with a small smile as Janine released his head from the glow the wand was emitting. “Hey. Sorry you had to lay on the floor for so long knowing I was cluelessly reading a book in the next room.”
“Eh, not the end of the world,” he whispered. “I’ll be back on my feet soon. So, no parties while I’m gone.”
I snorted and my smile widened, and he returned it.
Going back into the security room, I pulled the system back to the multi-camera exterior view, and I sat there and listened to Suzanne talk to one of the medics, explaining everything that had happened in detail. Once she’d done that and they brought Andrew outside on the gurney, presumably to a waiting ambulance, I gave my statement, and then…it was back to work.
Obviously going back to work like nothing had changed felt weird, but Suzanne stayed, letting me know that she would get some work done at Andrew’s desk until my shift was over. It was likely the opposite of necessary, the robbers were gone, but it did make me feel a tiny bit better knowing that she was in the next room with her wand.
First / Previous
***
Patreon
My Website
/storiesbykaren
submitted by karenvideoeditor to HFY [link] [comments]


2024.05.15 15:29 Tycho_Jissard MS-ISAC CYBERSECURITY ADVISORY - Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution - PATCH: NOW

MS-ISAC CYBERSECURITY ADVISORY
MS-ISAC ADVISORY NUMBER: 2024-056
DATE(S) ISSUED: 05/14/2024
SUBJECT: Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
OVERVIEW: Multiple vulnerabilities have been discovered in Mozilla Products, the most severe of which could allow for arbitrary code execution.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
THREAT INTELLIGENCE: There are no reports that these vulnerabilities are being exploited in the wild
SYSTEMS AFFECTED:
RISK: Government:
Businesses:
Home users: Low
TECHNICAL SUMMARY: Multiple vulnerabilities have been discovered in Mozilla Products, the most severe of which could allow for arbitrary code execution. Details of the most critical vulnerabilities are as follows:
Tactic: Initial Access (TA0001):
Technique: Drive-by Compromise (T1189):
Additional lower severity vulnerabilities include:
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
RECOMMENDATIONS:
We recommend the following actions be taken:
REFERENCES:
Mozilla: https://www.mozilla.org/en-US/security/advisories/ https://www.mozilla.org/en-US/security/advisories/mfsa2024-21/ https://www.mozilla.org/en-US/security/advisories/mfsa2024-22/ https://www.mozilla.org/en-US/security/advisories/mfsa2024-23/
CVE: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4765 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4766 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4772 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4775 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4778
submitted by Tycho_Jissard to k12cybersecurity [link] [comments]


2024.05.15 15:07 savage8190 Sony XBR-65X900E 4 red light error with no image issue?

I've read up a lot about this 4 blinking red light issue, but it seems that for most people there are problems with the image (apparently this is some kind of LED error code?). For me though, my TV starts fine and works perfectly for about 20 minutes, then turns off and gives me the 4 blinking red lights. If I power cycle it I can start it back up, and again it will work for 20 minutes. Or, if I wait long enough the error code will go away and I can restart it without the power cycle.
I'd really like to repair this. I'm still happy with the TV. It seems wasteful to toss it over potentially one failed part. I did pop it open just to double check all the connections and to give it a visual check for fried components. I found nothing out of sorts.
Thanks!
submitted by savage8190 to TVRepair [link] [comments]


2024.05.15 15:04 ioana_radu @HatomProtocol beyond limits: boosting APY, minting stability, and Soul Protocol's genesis

@HatomProtocol beyond limits: boosting APY, minting stability, and Soul Protocol's genesis
The last few months have been incredibly active; we've been pushing boundaries, building, experimenting, fine-tuning, and deploying robust and secure products to create a unique DeFi ecosystem without limits. However, our journey is far from over, and it's time to provide you with a global update on our progress.

HatomProtocol beyond limits: boosting APY, minting stability, and Soul Protocol's genesis
Our mission on #MultiversX began with kickstarting DeFi and increasing on-chain DeFi TVL. Now, we aim to address the final piece of the puzzle that is still causing issues for both #MultiversX and #Hatom. The lack of stablecoin liquidity hinders our growth.

The absence of an EGLD-backed stablecoin forces users to forgo exposure to their $EGLD whenever they need liquidity, creating selling pressure on $EGLD. This is what we aim to tackle with this protocol update, which will primarily focus on two of the most impactful products in the Hatom Ecosystem: Hatom USD ($USH) and Booster V2.

Without further ado, let’s delve into these two modules in more detail:

Booster V2

While Booster V2 was initially designed to introduce additional features and improvements, we have further refined the model to enhance its utility.

Let’s break down the new features and implementations:

• Global Position Tracking: Optimizes boosting by monitoring a unified global position rather than individual positions, enhancing efficiency.

• Rebalance at Protocol Level: Reduces gas fees for claiming rewards by integrating rebalances directly at the protocol level.

• Multiple Deposit Options: Enables the deposit of HTM LPs and Metastaking tokens into the Booster Module, which will track only the $HTM token's weight.

• Simplified LP/Metastaking Creation: Allows for direct creation of LP/Metastaking positions within the Booster Module itself, eliminating the need to use the xExchangeApp dashboard.

• Reward Structure Adjustment: Shifts all rewards from $USDC to $EGLD, with claims exclusively in $HTM to boost demand and buying pressure for the $HTM token.

One new key improvement in the upcoming version of the Booster that has been added is the elimination of the $HTM cap in the HTM Booster to achieve optimal boosting.

Currently, users must deposit an equivalent of 10% of their collateral value in $HTM tokens within the booster to attain the maximum Boosted APY on their positions. With the launch of Booster V2, this cap will be removed, allowing users to increase their APY in proportion to the amount of $HTM they stake.

With the new implementation of Booster V2, rewards will be split into two batches.

In the first batch, users can achieve a certain APY by staking a specific ratio of HTM compared to the collateral they have supplied.

In the second batch, this cap will be removed, allowing users to increase their APY in proportion to the amount of $HTM they stake. The more $HTM tokens you stake beyond the threshold set in the first batch, the higher the APY you can achieve. However, this metric still depends on the value of your collateral and the total amount of $HTM staked by other liquidity providers.

For example: (Please note that all the metrics provided are hypothetical and are intended solely to illustrate the concept.)

• In the current Booster implementation, there is a maximum APY (let's consider that the $EGLD Booster APY is 6%) that users can achieve by staking 10% of the value of their collateral in $HTM. Staking additional $HTM beyond this does not increase returns, and the rewards from users who do not reach the optimal boost level within the booster are recycled.

• In the new implementation, we have opted for a dual-batch mechanism. The first batch is implemented to guarantee a threshold, maintaining the same rules as the old implementation. For instance, if users stake 5% of the value of their collateral in $HTM, they could achieve an optimal APY of 2%.

The remaining rewards will be distributed in a second batch with no cap, allowing users to potentially generate a higher APY than the 6% achievable in the previous implementation. This model allows them to earn rewards from users who didn't fully boost their position or to out-earn other users by staking more $HTM.

To put it simply, the first batch ensures that a threshold ratio of $HTM staked to collateral is met and maintained in the protocol. The second batch is where the majority of the rewards will be distributed and where strong competition will take place.

Hatom has invented the concept of the Booster, setting itself apart from other liquidity protocols by placing the $HTM token at the heart of its ecosystem, thereby creating an entire financial economy around it. It's crucial for us to refine this model and iterate on it to maximize its impact while ensuring the best possible user experience.

Hatom has already distributed millions of dollars in incentives, demonstrating the effectiveness of this model in attracting liquidity and sustaining a healthy ecosystem. As we move toward a sustainable state of incentivization, it is essential to ensure that the final implementation of the Booster is robust before integrating the governance module and allowing token holders to manage its parameters.

The process and user interface will be very intuitive and easy to use. Users will have access to a gauge that allows them to estimate the APY they can achieve by staking more $HTM tokens, simply by adjusting it.

Hatom USD (USH)

From the start, we recognized the liquidity issue with stablecoins in the #MultiversX ecosystem. With under $30 million in stable liquidity, the growth of DeFi products is restricted. The ecosystem needs a native stablecoin that not only offers a hedge against volatility but also provides a straightforward way for users to earn passive yield.

The low stable liquidity primarily affected the Hatom Lending Protocol, where high demand and positive market sentiment led users to leverage their positions for long strategies on chosen assets. Consequently, the utilization rates of both $USDC and $USDT exceeded optimal levels despite the constant increase in their respective TVL, driving interest rates to mid to high double digits during certain periods.

Let’s discuss the innovative design and progress on $USH:

Facilitators

Different from $USDC and $USDT that must be brought into the ecosystem through the bridge, $USH will be minted natively through multiple methods, also called facilitators. These facilitators will ensure that users are able to access $USH in a simple and efficient manner.

At launch, $USH will have two facilitators available:

  1. Lending Protocol

Users will be able to mint $USH directly within the Hatom Lending Protocol, an experience similar to taking loans. However, it’s important to note that 'minting' $USH is different from 'borrowing' it. As a result, the rates for minting $USH through the Lending Protocol are fixed and not influenced by utilization rates, unlike when borrowing assets like $USDC or $USDT.

These rates vary based on the discount factor of the collateral used; more liquid and stable assets yield better rates than less liquid ones. Note that $USH cannot be minted through the Lending Protocol using $EGLD or $sEGLD; instead, these assets must be used via a separate facilitator, known as Isolated Pools.

  1. Isolated Pools

The Isolated Pools represent a crucial component of the USH Ecosystem, offering significant revenue potential through its innovative mechanism. Users can deposit $EGLD or $sEGLD to mint $USH under specific conditions:

Minting USH with EGLD:

Users can deposit $EGLD at a 0% Supply APY to mint USH with no minting fees. The deposited $EGLD is staked in Liquid Staking to obtain $sEGLD, which is then deposited in the Lending Protocol to earn a base supply APY.

Minting USH with sEGLD:

Similarly, users can deposit $sEGLD into the Isolated Pools to mint $USH without a minting fee. When using $sEGLD, the users’ exposure shifts entirely to EGLD, as all rewards from sEGLD are retained by the protocol to boost the Staking Module yield.

The Isolated Pools provide a key advantage by allowing users to mint USH with no fee while maintaining exposure to potential price increases in EGLD. This setup enables users to leverage the stability of USH without the concern of interest rates that could lead to position liquidation.

Moreover, this module is poised to become the top revenue generator within the protocol. Assets deposited in the Isolated Pools generate income through Liquid Staking and the Lending Protocol. In the future, we can explore the possibility of using a portion for Leverage Liquid Staking strategies when conditions are favorable, further optimizing the returns.

USH Staking Module

Establishing robust facilitators to enable the safe and reliable minting of USH was crucial; however, we also recognize that building a powerful stablecoin requires strong utility and significant benefits.

While users will benefit from fixed or even zero minting fees, along with numerous integrations within the #MultiversX ecosystem, our goal is to ensure a robust mechanism for users to generate high yields on their stablecoins.

Through the Staking Module, users can deposit $USH or USH LP tokens, such as USH/USDC, USH/USDT, USH/EGLD, and USH/HTM, to generate yield on their positions. We have designed the source of this yield to be as organic as possible, using the revenue generated by all the USH facilitators.

Consider this example based only on the revenue from the Isolated Pools:

Suppose $100M worth of EGLD and sEGLD are deposited in the Isolated Pools. Since it's an over-collateralized minting, let's assume $50M worth of USH will be minted to maintain a safe health factor. This collateral is minting at 0% interest and will generate a 7% APY through Liquid Staking and the Lending Protocol, equivalent to about $7 million annually or ~$580,000 monthly in rewards for USH stakers.

Since the protocol earns rewards on $100 million but distributes them to just $50 million worth of USH, the APY for USH stakers effectively doubles, reaching 14%. With $EGLD's inherent volatility, any price increase in $EGLD further boosts the APY, motivating additional USH buying/minting and thus increasing liquidity for USH.

To integrate HTM within the USH ecosystem effectively, we are excited to announce that all rewards in the Staking Module will be distributed in HTM tokens. The revenue generated from users minting USH through the Lending Protocol and Isolated Pools will be used to purchase HTM tokens from the open market and distribute them to stakers.

USH will be the highest revenue-generating product on the #MultiversX Blockchain, with all that income redirected to the HTM token.

This strategy will create millions of dollars in additional buying pressure on HTM, significantly boosting demand for the token without direct community involvement. The buyouts will happen on a daily basis and will constitute the largest buyback module of an ESDT to date.

Please note that a portion of the rewards generated by the USH facilitators will be allocated to incentivize the Lending Protocol Markets, alongside other sources of revenue. This ensures that the protocol is driven by its utility and remains fully sustainable. This approach is designed to eliminate our reliance on the treasury for offering protocol incentives, promoting a more self-sustaining ecosystem.

Booster V2 x USH Staking Module

We went a step further in developing a strong utility for $HTM in the USH Staking Module; given the real success that Booster V1 had at launch, we have decided to offer a similar implementation for users in the USH Staking Module.

We are pleased to announce that Booster V2 will now play a significant role not only in the Lending Protocol but also in the USH Staking Module.

Here are a few of the benefits of the Booster V2 in the USH Staking Module:

• Yield Optimization: Earn rewards for your USH LP & farm tokens in addition to the USH Staking Module yields.

• Booster V2 Implementation: Users can access a base APY when staking USH in the Booster, with additional rewards earned when staking HTM tokens. Staking caps will be removed, allowing users to stake any amount they choose, with yields increasing proportionally to the amount of HTM staked.

This implementation allows users to boost the APY on their USH-staked positions within the USH Staking Module by allocating a specific amount of HTM to the Booster Module, mirroring the design of the HTM Booster in the Lending Protocol.

Peg Mechanisms

The peg mechanism is the most important feature of a stablecoin, therefore we spent countless hours researching and adjusting our mechanisms:

Soft Peg Mechanism:

In the Lending Protocol, USH will consistently be valued at $1, regardless of its market price elsewhere. For instance, if USH is trading at $0.99 on a decentralized exchange like ash_swap, users can purchase USH at this lower rate and use it to repay loans valued at $1 within the protocol, thereby profiting from the difference.

Hard Peg Mechanism:

Through the Hard Peg Mechanism, if USH trades at a certain percentage below $1, Redemption Mode is activated. In this mode, anyone can seize users' collateral up to a specified "Borrow Limit Used" for the account. The process starts with the least solvent accounts and continues to the most solvent until the peg is restored. Unlike liquidation, redemption does not incur any penalty for users.

This update aims to provide an overall view of the entire design without overwhelming you with technical jargon. More detailed definitions and explanations of the concepts will be available in our updated documentation on USH.

Development Status

We are pleased to announce that the peer code review of all USH modules has now been completed, and both the audits and front-end integration will commence this week. We recognize the importance of these next steps and acknowledge the complexities and potential challenges they may entail. Moving forward, our focus will be on ensuring that the audits are conducted to the highest standards of accuracy and security.

USH is a complex protocol that aims to once again elevate the status quo of DeFi within the #MultiversX ecosystem by solving real problems and enhancing user experience like never before. As we make progress on both the front-end integration and audits, we will be able to estimate an exact release date. However, as specified in Protocol Update #7, we are still targeting a launch timeframe of late Q2 to early Q3.

Go-To-Market Strategy

First, it's important to emphasize that Booster V2 and USH will be released simultaneously. We are developing a robust Go-To-Market Strategy for the launch of USH, focusing on the design's impact on the HTM token. Initially, a Private Mainnet for USH will be launched, operating exclusively with our network of partners and co-led with the MultiversX Foundation.

This Private Mainnet will operate for one month, using EGLD and sEGLD deposited by partners to generate our initial revenue. This revenue will be accumulated and used to buy back HTM tokens from the open market and distribute them as rewards. We anticipate a TVL in the seven-figure range during this phase, generating over $1.5 million in rewards for the first distribution.

At the moment we announce the public launch of USH, all rewards generated in the first month will be immediately used to buy back HTM tokens and transferred to the USH Staking Module to kickstart the protocol and to establish the bootstrapping APY for staked USH.

This strategy will create significant buying pressure on HTM, positively impacting the token’s market value. We are mindful of potential slippage impacts and will limit this aggressive buyback strategy to bootstrapping.

Right after the launch, these continuous buyouts will occur on a daily basis, creating sustainable growth for HTM.

Regarding the USH Airdrop, all participants will receive their allocations shortly after USH is publicly launched on the Mainnet and stabilized. Until then, users maintaining a 200% Booster Percentage in the HTM Booster during the daily random snapshot will share the daily allocation based on their liquidity weight.

Accumulator

The Accumulator was initially designed to allow users to claim rewards in either USDC or HTM, offering a 5% bonus for choosing HTM. However, with the new change of distributing rewards exclusively in HTM, the Accumulator will serve a better purpose.

As an alternative, we are exploring an "Affiliate Program." This initiative will enable users to introduce others to the Hatom Ecosystem and earn a percentage of the rewards their referrals generate.

For instance, if someone refers users who earn a total of $100,000 a month in rewards, the referrer would be entitled to claim $5,000 without affecting the earnings of the referred users.

While this is still in the brainstorming phase, we believe this could attract many new users to the ecosystem. We will provide more details about its implementation in future updates.

Soul

As we near the launch of 0xSoulProtocol, we're excited to provide a brief update. Future updates will be shared via Soul’s official channels.

The development of the 0xSoulProtocol has been a year-long journey marked by intense effort across all fronts, culminating in significant progress. We're thrilled to announce the official release of the website and documentation on Friday, May 24th. Concurrently, we will launch Soul’s official communication channels to foster direct engagement with the community.

This milestone signifies the genesis of the 0xSoulProtocol. We're eager to demonstrate its potential to become a leading DeFi project, thanks to its innovative design and business model.

Soul will serve as key infrastructure for all lending protocols, aiming to create a more cohesive and synergistic lending environment, unifying billions in liquidity across the entire space.

The feedback from our network of partners has been overwhelmingly positive, underscoring the protocol's potential and the quality of our work. We're optimistic about a successful journey as we continue development and move toward future stages in the protocol's lifespan.

We're excited for the months ahead, poised for growth given the rapid pace of our progress. We will continue to push for innovation, ready to transform the entire ecosystem. Your support is invaluable, and we want to thank you for being a pivotal part of this journey!

Source: Twitter @HatomProtocol
submitted by ioana_radu to MultiversXOfficial [link] [comments]


2024.05.15 15:02 Puzzled_Battle_5670 ALGEBRA with an inclination to geometry . so it requires one to view this from an historical viewpoint

Right from Fermat, through Lagrange, Gauss etc solving equations and similar pursuit invited geometric intuition and this has led to the subject of ALGEBRAIC GEOMETRY that has intersections with parts of Control theory, Linear programming, CODES(ECC), Cryptography and even Computer Graphics "myquals" - Academic Coordinator ALGEBRA AND GEOMETRY - SOME INTERCONNECTIONS
submitted by Puzzled_Battle_5670 to Indian_Academia [link] [comments]


2024.05.15 14:49 r3crac LIFEFIT TM5100 Folding Treadmill 4.0 HP 19km/h 120kg [EU] for 449.99 USD with coupon (Best price in history: 629.99 USD) [only CzechRepublic,Hungary,Poland,Slovakia(SlovakRepublic)!]

Here is the link: LIFEFIT TM5100 Folding Treadmill 4.0 HP 19km/h 120kg [EU]
Best price with coupon code (apply in the cart!): BGHUTM5100
Current price is 449.99 USD. The lowest price in my database is 629.99 USD. There're already 2 records in DB. Price monitoring since 25.9.2023!
Notes (coupon may work only in selected countries): CzechRepublic,Hungary,Poland,Slovakia(SlovakRepublic)
Of course if you want current coupons and e-mail PRICE ALERTS for LIFEFIT TM5100 Folding Treadmill 4.0 HP 19km/h 120kg then you can just go to the CouponsFromChina product page. It's right there: https://couponsfromchina.com/lifefit-tm5100-folding-treadmill-4-0-hp-19km-h-120kg-eu-coupon-price/
Cheers
Good deal with nice discount.
Telegram: https://t.me/couponsfromchinacom
FB Page: https://www.facebook.com/CouponsFromChinaCom
FB group: https://www.facebook.com/groups/couponsfromchinacom/
Reddit: https://www.reddit.com/couponsfromchina/
Website: https://couponsfromchina.com
submitted by r3crac to couponsfromchina [link] [comments]


2024.05.15 14:34 MountainSkald [A Valkyrie's Saga] - Part 102

Prequel (Chapters 1 to 16)
1. Rise of a Valkyrie
First ¦ Previous ¦ Royal Road ¦ Patreon
Christie emerged from the bathroom once her nerves had calmed and found one of the chateau’s windows that looked out on the western ridgelines. She reached into her handbag and produced a stick of lipstick, sighted on a curve of blackness intersecting a particular constellation rising into the night sky, and pushed a discreet button on the base. The task force now had confirmation that Rayker was inside the chateau and the machine would be set in motion.
As she turned to head back to the party, Christie saw a different range of mountains in the corner of her eye. A fishhook stabbed into the muscle of her heart and tugged, while she was nearly overwhelmed with nausea. For a moment, a dusty valley surrounded her, the rocky ground coursing with streams of blood. The ghostly white face of Rose Djallen was before her, life fading from her eyes. Christie wanted to gasp, but she let the pain wash over her in silence, as they had all done so often. A moment’s concentration brought her back to the present, and the dangerous operation ahead.
Rayker’s expression had been so devoid of warmth—as though she wore her psychotic nature with pride. Christie couldn’t understand how someone could be so inhuman. She wondered what would happen if Rayker sensed the trap that was closing around her. Christie knew that she, and probably some of the guests, would be taken hostage. No doubt the dozens of Rangers stalking through the darkness would break cover, racing through the night to rescue her, with one particularly hard-headed individual out front. The highly skilled operators now preparing their own move on the chateau would fight their way inside, killing anyone who resisted them. The Banshee, their well-armed gunship, would break its cloak, leaving its position behind Ambrosia’s second moon to rain hellfire down on the small army that provided security for the Helvetic League’s pleasure planet. Rayker would probably die in a hail of gunfire—giving Rose her deserved retribution—for the Valkyrie would eagerly sacrifice their own lives before leaving one of their own behind.
Then the news of the incident would spread, and humanity’s thirty-seven worlds would talk of nothing else but the secret army of super soldiers that protected them from the arsenal of the Jotnar—an ancient and extinct civilization, who’s abandoned weapons and warships littered the stars. Nations, corporations and crime syndicates would find ways to track down those weapons, exploiting their incredible destructive power for their own selfish purposes. There would be war, billions would die, and, like those who had preceded them, humanity would probably wipe itself out.
Rose had died protecting Christie from Rayker’s drone army, but she had also died to uphold Valkyrie’s ancient responsibility.
That operation had ultimately saved the planet Caldera, but in the chaos and confusion of the battle Rayker had managed to slip away. The organization had spent nearly two years trying to hunt her down, but she was too skilled, too deeply enmeshed in the Helvetic League’s underworld.
The council of chiefs, Valkyrie’s inscrutable governing body, had agreed to form Task Force Nemesis under the command of General Smyrna. She was assigned the Mountain Ranger’s Bravo company—the Venomous Vipers—a Raider squadron of elite counter terrorists, and a task unit from Orbital Demolition Team Four. Supported by the Banshee and guided by Christie’s intelligence gathering unit, their mission statement was simple—do whatever it took to kill or capture Allana Rayker.
As they made slow, painstaking process, they began to receive indications that their target had rejoined her old corporate paymasters at VennZech, the most powerful weapons manufacturer in the galaxy. Then, the news broke that Joakkim Meissner, one of Rayker’s suspected allies, had been promoted to Chief Executive, arranging his party on Ambrosia to celebrate.
He had also invited one of the League’s rising stars in physics. The brilliant young doctor Ernst Kolar was a specialist in theoretical energy development. He had recently published a paper describing a theoretical anti-matter reactor alarmingly similar to those that powered the warships and killing machines of the Jotnar. Christie’s team leader, Jiao Zhang, had offered the high-confidence assessment that Rayker would refuse to let such an asset out of her sight. And, on the protected world of Ambrosia, what could she have to fear?
But Valkyrie had been breaking through Helvetic security barriers since the creation of the quasi-imperial state, and had become extremely good at it. And so, the operation had been set in motion.
Christie took a deep breath and prepared herself, soothing away any traces of nervousness. She left the outer hall and re-entered the party.
***
“Olympus, Olympus, Olympus,” a voice intoned through Kayla’s headset.
The code word signaled that Christie had identified Rayker in the chateau, and the operation was a go. A double burst of static followed; a squad-level transmission from Kes. It was the order to take out the security guards.
Kayla and Ray had crawled as close as they could to their position, readied their stun rifle and waited patiently. As the signal came in, the men had pushed away from their boulder rest spot and were resuming their patrol through the woods. Kayla waited until their line of sight had passed her, before she stood slowly, weapon aimed. A faint rustle told her that Ray had done the same.
The guard at the back, still slurping from a water bottle, fell a little further behind. The stun rifle’s projectile hit him in the neck, shocking his nervous system into an overload state. He seized and dropped to the ground, unconscious. The men ahead of him span and there was a mechanical thump from Ray’s weapon. Her shot struck center mass, and another figure collapsed, just as Kayla pulled the trigger again. The last guard went down quickly, but, to Kayla’s shock, seemed to remain conscious. He struggled on the ground like a dying fish as he tried to reach for his radio, so she sprinted forward and kicked him in the head.
Kayla wrinkled her nose and cursed quietly. The scientist who had trained her squad on the weapon had explained that a failed shot would result in the victim emptying the contents of their bowels and bladder. Looks like she had been right.
“Three down,” she muttered into her helmet mic. “No other contacts in sight.”
Even so, she continued to scan the distant trees carefully.
Ray secured the guards with serum injections while Tian and Yak, the other two members of the fire team joined them. The projectiles were gathered into Tian’s rucksack, and, when the rest of the squad arrived, they moved off through the trees together, climbing the slope until they reached another crest, and a chain link fence.
Half a mile away from the chateau, the main security compound provided a base for the guard’s rapid reaction force. The compound had a single entrance and out of the blockhouse blue light flickered to the loud chatter of an excited racing commentator.
Kayla stopped in the shadows of the trees and waited patiently. The air above her head snapped and cracked as rounds shot past, impacting security cameras and sensors around the compound. The bullets were a large caliber, but with a thermic charge core. Each strike glowed brilliantly as intense temperatures melted through their targets, leaving no evidence of what had neutralized them.
She grinned. Thandi was going to work, and though her presence and skill made Kayla feel much more confident, she would still tease her about doing the ‘easy part’ later.
In the near distance, there were a pair of flashes and loud zaps as the base’s generator and backup went out to EMP charges. Another squad from their platoon was working their own approach. That made Kayla nervous. The two elements would soon have to meet up, and nothing could be more dangerous to those who owned the night than confusing each other for the enemy.
She took her team around the base to the now dark main gate as the on-duty guards emerged to check on the loss of power. Stun rifle shots knocked them out, and the squad regrouped behind the cover of a vehicle bay, while Kayla identified the largest building in the compound and watched it attentively.
They waited patiently until the silence was broken by a new voice on the radio.
“Eyes on the barracks, north side. No movement.”
“South side clear,” Kayla confirmed.
“Approaching,” the other squad leader said.
Kayla waited until she saw shapes emerging from the shadows and sprinting behind the back of the large structure. Then, one leaned out from the corner, watching. Kayla tapped a control on her helmet, and a perfect white line broke through her grey world, pointing towards the figure. She was answered with a similar flash of infra-red energy, and her anxiety eased.
Kes, who had also been watching, tapped her shoulder, and Kayla led off towards the barracks.
From outside the Rangers could make out the annoyed calls of men and women stumbling around in the darkness. One emerged from a side door and nearly got off a shout before Tian tackled him and knocked him out. The two squads moved quickly, cracking open doorways and rolling gas grenades inside.
Invisible and odorless, the gas contained the signature compound Valkyrie used to erase memories. The Rangers waited a few minutes, safe behind their face masks, then entered and confirmed that all inside were unconscious. Kes and Thandi smashed a few liquor bottles against the walls, while others dragged the bodies into the main room, and distributed more ‘evidence’.
Eventually, Kes called ‘all clear’, and Kayla emerged from the building into the night, lifting her faceplate to breathe in some fresh air. She saw her fire team, Ray, Tian and Yak, heading to the vehicles to place EMP charges, and began to follow them, when a sharp rap on her helmet brought her up short.
She turned to see Thandi, vizor up, and an expectant expression on her face.
“Was that a curse word I heard earlier?” Thandi asked, keeping her voice low.
Kayla shook her head. “Negative. I was providing a biological assessment of the dude.”
“Ick. Two in the barracks were uh… in the middle of something when they passed out. I had to pull them apart.” She pulled a face. “That was gross.”
Kayla winked at her friend, who was spiritual enough for the both of them. “Unmarried, I bet. Your god approves.”
Thandi nodded gratefully, then shot her a look. “He’s not just my—"
Kes marched over, her expression severe. “Do either of you have EMP charges left?” she demanded.
“Yes Corporal,” Kayla nodded, and patted her rucksack.
“There’s a couple of transports left in the north corner. Get on it, then rejoin us on the east fence. Come on, we need to move quickly!”
Kayla scampered away, buzzing with energy. The squad still had to head for the chateau, and take up their position in the perimeter that was slowly drawing tighter around Rayker. She glanced at the dark mountains around her. In a dozen locations, radar arrays, missile defenses and communications stations were being similarly neutralized by small teams of Valkyrie from the various units. Soon they would have their prey, and Kayla privately hoped that she wouldn’t surrender.
***
Christie found Doctor Kolar, alone as usual, in the main hall and painfully out of place at such a large social gathering. He nursed a champagne glass, and smiled at passersby. Christie stared at him until their eyes met, and he quickly looked away, pretending to study one of Meissner’s diamond statues.
She walked in his direction, and as she passed, she flashed him a shy smile. Then, returning to her coterie of admirers, she looked back with another friendly expression.
Kolar cautiously approached the group, obviously unsure of what to do. The men ignored him, but the second he managed to breach the outer mass of bodies, Christie was on him.
“Oh hello! I don’t believe I’ve had the pleasure!” she cried, extending her hand and beaming like a searchlight.
The other men frowned as they lost her attention.
“Um… All mine,” stammered Kolar. “Sorry. I’m—”
“Doctor Kolar, isn’t it?” interrupted a renowned and pompous pianist. “You’re working on space batteries for VennZech weapons research, or some such thing?”
“Well…” Kolar gulped. “We’re starting a new project on micro-singularities at the Planck scale, you see the current theory on weak—”
“It’s weak, you say?” The pianist laughed raucously as he slapped the doctor’s back. “Well, I never would have guessed, old boy.”
“Tell me, Zotty,” Christie cut in, addressing one of the other men, “Didn’t you just tell me this was one of Meissner’s inner circle?” she tottered forward slightly as she spoke.
“Correct,” the elder son and heir apparent of the largest media corporation in the League replied with a smile. He lifted his gaze from her bosom. “Doctor Kolar’s work is vital for the Maestro.”
Kolar smiled gratefully. “Indeed. Well, it’s about energy generation.”
“Oh, I hope you aren’t helping him make more of those dreadful bombs,” Christie said, and pouted. “War is very wrong! Really, I don’t know why they haven’t sanctioned the company for some of the absolutely horrid things they produce.”
The surrounding billionaires nodded their approval, while Kolar flushed. “No… well, I mustn’t talk about it, but I shouldn’t be getting involved in that side of VennZech’s business.”
“Quite right.” Christie nodded. “Oh, but you’re dry.” She turned to a waiter, grabbed a pair of glasses from his tray and handed one to Kolar.
First ¦ Previous ¦ Royal Road ¦ Patreon
Prequel (Chapters 1 to 16)
1. Rise of a Valkyrie
submitted by MountainSkald to redditserials [link] [comments]


2024.05.15 14:29 MountainSkald A Valkyrie's Saga - Part 102

Prequel (Parts 1 to 16)
1. Rise of a Valkyrie
First ¦ Previous ¦ Royal Road ¦ Patreon
Christie emerged from the bathroom once her nerves had calmed and found one of the chateau’s windows that looked out on the western ridgelines. She reached into her handbag and produced a stick of lipstick, sighted on a curve of blackness intersecting a particular constellation rising into the night sky, and pushed a discreet button on the base. The task force now had confirmation that Rayker was inside the chateau and the machine would be set in motion.
As she turned to head back to the party, Christie saw a different range of mountains in the corner of her eye. A fishhook stabbed into the muscle of her heart and tugged, while she was nearly overwhelmed with nausea. For a moment, a dusty valley surrounded her, the rocky ground coursing with streams of blood. The ghostly white face of Rose Djallen was before her, life fading from her eyes. Christie wanted to gasp, but she let the pain wash over her in silence, as they had all done so often. A moment’s concentration brought her back to the present, and the dangerous operation ahead.
Rayker’s expression had been so devoid of warmth—as though she wore her psychotic nature with pride. Christie couldn’t understand how someone could be so inhuman. She wondered what would happen if Rayker sensed the trap that was closing around her. Christie knew that she, and probably some of the guests, would be taken hostage. No doubt the dozens of Rangers stalking through the darkness would break cover, racing through the night to rescue her, with one particularly hard-headed individual out front. The highly skilled operators now preparing their own move on the chateau would fight their way inside, killing anyone who resisted them. The Banshee, their well-armed gunship, would break its cloak, leaving its position behind Ambrosia’s second moon to rain hellfire down on the small army that provided security for the Helvetic League’s pleasure planet. Rayker would probably die in a hail of gunfire—giving Rose her deserved retribution—for the Valkyrie would eagerly sacrifice their own lives before leaving one of their own behind.
Then the news of the incident would spread, and humanity’s thirty-seven worlds would talk of nothing else but the secret army of super soldiers that protected them from the arsenal of the Jotnar—an ancient and extinct civilization, who’s abandoned weapons and warships littered the stars. Nations, corporations and crime syndicates would find ways to track down those weapons, exploiting their incredible destructive power for their own selfish purposes. There would be war, billions would die, and, like those who had preceded them, humanity would probably wipe itself out.
Rose had died protecting Christie from Rayker’s drone army, but she had also died to uphold Valkyrie’s ancient responsibility.
That operation had ultimately saved the planet Caldera, but in the chaos and confusion of the battle Rayker had managed to slip away. The organization had spent nearly two years trying to hunt her down, but she was too skilled, too deeply enmeshed in the Helvetic League’s underworld.
The council of chiefs, Valkyrie’s inscrutable governing body, had agreed to form Task Force Nemesis under the command of General Smyrna. She was assigned the Mountain Ranger’s Bravo company—the Venomous Vipers—a Raider squadron of elite counter terrorists, and a task unit from Orbital Demolition Team Four. Supported by the Banshee and guided by Christie’s intelligence gathering unit, their mission statement was simple—do whatever it took to kill or capture Allana Rayker.
As they made slow, painstaking process, they began to receive indications that their target had rejoined her old corporate paymasters at VennZech, the most powerful weapons manufacturer in the galaxy. Then, the news broke that Joakkim Meissner, one of Rayker’s suspected allies, had been promoted to Chief Executive, arranging his party on Ambrosia to celebrate.
He had also invited one of the League’s rising stars in physics. The brilliant young doctor Ernst Kolar was a specialist in theoretical energy development. He had recently published a paper describing a theoretical anti-matter reactor alarmingly similar to those that powered the warships and killing machines of the Jotnar. Christie’s team leader, Jiao Zhang, had offered the high-confidence assessment that Rayker would refuse to let such an asset out of her sight. And, on the protected world of Ambrosia, what could she have to fear?
But Valkyrie had been breaking through Helvetic security barriers since the creation of the quasi-imperial state, and had become extremely good at it. And so, the operation had been set in motion.
Christie took a deep breath and prepared herself, soothing away any traces of nervousness. She left the outer hall and re-entered the party.
***
“Olympus, Olympus, Olympus,” a voice intoned through Kayla’s headset.
The code word signaled that Christie had identified Rayker in the chateau, and the operation was a go. A double burst of static followed; a squad-level transmission from Kes. It was the order to take out the security guards.
Kayla and Ray had crawled as close as they could to their position, readied their stun rifle and waited patiently. As the signal came in, the men had pushed away from their boulder rest spot and were resuming their patrol through the woods. Kayla waited until their line of sight had passed her, before she stood slowly, weapon aimed. A faint rustle told her that Ray had done the same.
The guard at the back, still slurping from a water bottle, fell a little further behind. The stun rifle’s projectile hit him in the neck, shocking his nervous system into an overload state. He seized and dropped to the ground, unconscious. The men ahead of him span and there was a mechanical thump from Ray’s weapon. Her shot struck center mass, and another figure collapsed, just as Kayla pulled the trigger again. The last guard went down quickly, but, to Kayla’s shock, seemed to remain conscious. He struggled on the ground like a dying fish as he tried to reach for his radio, so she sprinted forward and kicked him in the head.
Kayla wrinkled her nose and cursed quietly. The scientist who had trained her squad on the weapon had explained that a failed shot would result in the victim emptying the contents of their bowels and bladder. Looks like she had been right.
“Three down,” she muttered into her helmet mic. “No other contacts in sight.”
Even so, she continued to scan the distant trees carefully.
Ray secured the guards with serum injections while Tian and Yak, the other two members of the fire team joined them. The projectiles were gathered into Tian’s rucksack, and, when the rest of the squad arrived, they moved off through the trees together, climbing the slope until they reached another crest, and a chain link fence.
Half a mile away from the chateau, the main security compound provided a base for the guard’s rapid reaction force. The compound had a single entrance and out of the blockhouse blue light flickered to the loud chatter of an excited racing commentator.
Kayla stopped in the shadows of the trees and waited patiently. The air above her head snapped and cracked as rounds shot past, impacting security cameras and sensors around the compound. The bullets were a large caliber, but with a thermic charge core. Each strike glowed brilliantly as intense temperatures melted through their targets, leaving no evidence of what had neutralized them.
She grinned. Thandi was going to work, and though her presence and skill made Kayla feel much more confident, she would still tease her about doing the ‘easy part’ later.
In the near distance, there were a pair of flashes and loud zaps as the base’s generator and backup went out to EMP charges. Another squad from their platoon was working their own approach. That made Kayla nervous. The two elements would soon have to meet up, and nothing could be more dangerous to those who owned the night than confusing each other for the enemy.
She took her team around the base to the now dark main gate as the on-duty guards emerged to check on the loss of power. Stun rifle shots knocked them out, and the squad regrouped behind the cover of a vehicle bay, while Kayla identified the largest building in the compound and watched it attentively.
They waited patiently until the silence was broken by a new voice on the radio.
“Eyes on the barracks, north side. No movement.”
“South side clear,” Kayla confirmed.
“Approaching,” the other squad leader said.
Kayla waited until she saw shapes emerging from the shadows and sprinting behind the back of the large structure. Then, one leaned out from the corner, watching. Kayla tapped a control on her helmet, and a perfect white line broke through her grey world, pointing towards the figure. She was answered with a similar flash of infra-red energy, and her anxiety eased.
Kes, who had also been watching, tapped her shoulder, and Kayla led off towards the barracks.
From outside the Rangers could make out the annoyed calls of men and women stumbling around in the darkness. One emerged from a side door and nearly got off a shout before Tian tackled him and knocked him out. The two squads moved quickly, cracking open doorways and rolling gas grenades inside.
Invisible and odorless, the gas contained the signature compound Valkyrie used to erase memories. The Rangers waited a few minutes, safe behind their face masks, then entered and confirmed that all inside were unconscious. Kes and Thandi smashed a few liquor bottles against the walls, while others dragged the bodies into the main room, and distributed more ‘evidence’.
Eventually, Kes called ‘all clear’, and Kayla emerged from the building into the night, lifting her faceplate to breathe in some fresh air. She saw her fire team, Ray, Tian and Yak, heading to the vehicles to place EMP charges, and began to follow them, when a sharp rap on her helmet brought her up short.
She turned to see Thandi, vizor up, and an expectant expression on her face.
“Was that a curse word I heard earlier?” Thandi asked, keeping her voice low.
Kayla shook her head. “Negative. I was providing a biological assessment of the dude.”
“Ick. Two in the barracks were uh… in the middle of something when they passed out. I had to pull them apart.” She pulled a face. “That was gross.”
Kayla winked at her friend, who was spiritual enough for the both of them. “Unmarried, I bet. Your god approves.”
Thandi nodded gratefully, then shot her a look. “He’s not just my—"
Kes marched over, her expression severe. “Do either of you have EMP charges left?” she demanded.
“Yes Corporal,” Kayla nodded, and patted her rucksack.
“There’s a couple of transports left in the north corner. Get on it, then rejoin us on the east fence. Come on, we need to move quickly!”
Kayla scampered away, buzzing with energy. The squad still had to head for the chateau, and take up their position in the perimeter that was slowly drawing tighter around Rayker. She glanced at the dark mountains around her. In a dozen locations, radar arrays, missile defenses and communications stations were being similarly neutralized by small teams of Valkyrie from the various units. Soon they would have their prey, and Kayla privately hoped that she wouldn’t surrender.
***
Christie found Doctor Kolar, alone as usual, in the main hall and painfully out of place at such a large social gathering. He nursed a champagne glass, and smiled at passersby. Christie stared at him until their eyes met, and he quickly looked away, pretending to study one of Meissner’s diamond statues.
She walked in his direction, and as she passed, she flashed him a shy smile. Then, returning to her coterie of admirers, she looked back with another friendly expression.
Kolar cautiously approached the group, obviously unsure of what to do. The men ignored him, but the second he managed to breach the outer mass of bodies, Christie was on him.
“Oh hello! I don’t believe I’ve had the pleasure!” she cried, extending her hand and beaming like a searchlight.
The other men frowned as they lost her attention.
“Um… All mine,” stammered Kolar. “Sorry. I’m—”
“Doctor Kolar, isn’t it?” interrupted a renowned and pompous pianist. “You’re working on space batteries for VennZech weapons research, or some such thing?”
“Well…” Kolar gulped. “We’re starting a new project on micro-singularities at the Planck scale, you see the current theory on weak—”
“It’s weak, you say?” The pianist laughed raucously as he slapped the doctor’s back. “Well, I never would have guessed, old boy.”
“Tell me, Zotty,” Christie cut in, addressing one of the other men, “Didn’t you just tell me this was one of Meissner’s inner circle?” she tottered forward slightly as she spoke.
“Correct,” the elder son and heir apparent of the largest media corporation in the League replied with a smile. He lifted his gaze from her bosom. “Doctor Kolar’s work is vital for the Maestro.”
Kolar smiled gratefully. “Indeed. Well, it’s about energy generation.”
“Oh, I hope you aren’t helping him make more of those dreadful bombs,” Christie said, and pouted. “War is very wrong! Really, I don’t know why they haven’t sanctioned the company for some of the absolutely horrid things they produce.”
The surrounding billionaires nodded their approval, while Kolar flushed. “No… well, I mustn’t talk about it, but I shouldn’t be getting involved in that side of VennZech’s business.”
“Quite right.” Christie nodded. “Oh, but you’re dry.” She turned to a waiter, grabbed a pair of glasses from his tray and handed one to Kolar.
First ¦ Previous ¦ Royal Road ¦ Patreon
Prequel (Parts 1 to 16)
1. Rise of a Valkyrie
submitted by MountainSkald to HFY [link] [comments]


2024.05.15 12:45 r3crac BlitzMax BM-CT2 Open Ear Headphones [EU] for 28.99 USD with coupon (Best price in history: 29.99 USD) [only CzechRepublic,Greece,Hungary,Latvia,Poland,Romania,Slovenia,Slovakia(SlovakRepublic)!]

Here is the link: BlitzMax BM-CT2 Open Ear Headphones [EU]
Best price with coupon code (apply in the cart!): BGRMAYBCT2
Current price is 28.99 USD. The lowest price in my database is 29.99 USD. There're already 2 records in DB. Price monitoring since 3.11.2023!
Notes (coupon may work only in selected countries): CzechRepublic,Greece,Hungary,Latvia,Poland,Romania,Slovenia,Slovakia(SlovakRepublic)
Damn, coupon doesn't work anymore? Currently best price is here: https://couponsfromchina.com/blitzmax-bm-ct2-open-ear-headphones-coupon-price/ You can also set price alert there. Have a nice day!
Good deal with nice discount.
Telegram: https://t.me/couponsfromchinacom
FB Page: https://www.facebook.com/CouponsFromChinaCom
FB group: https://www.facebook.com/groups/couponsfromchinacom/
Reddit: https://www.reddit.com/couponsfromchina/
Website: https://couponsfromchina.com
submitted by r3crac to couponsfromchina [link] [comments]


2024.05.15 11:51 Apart-Awareness-4594 How to do well in GP: Solution

Hi there everyone we are a group of students wanting to help make GP easy for all JC students. All it takes is 3 minutes a week to ace your GP paper.
Our newsletter will differentiate you from the rest of the students not reading our newsletter. In just 3 minutes a week, you will be in the know of all the biggest news and become smarter in just 3 minutes. The best part of it all is that we compile all the latest news from various sources and rewrite them such that it is more useful for your GP paper in a fun, easy-to-read format.

Join today and get exclusive access to our newsletter, thousands of students are already loving our newsletter:
https://bizbrew-worldnews.beehiiv.com/

Here are some snippets from our stories :
1. Unmasking the Deepfake Nightmare: When Tech Goes Too Far 💻
So, you know how sometimes technology can be super cool? Well, sometimes it’s not so cool. Take deepfake apps, for example. Teens are using these apps to make fake nude photos of their classmates and share them around. Not cool, right?📸
What’s the Deal? At high schools in places like Washington and New Jersey, guys are using these apps to take photos of girls and make them look naked. Then they share these fake photos with everyone. It’s causing a lot of trouble. 😱Why is it a Problem? Imagine someone using a fake photo of you without your permission. It's not just embarrassing; it’s a type of sexual abuse. That’s why people are trying to stop it. Laws have been passed in some places, and more are in the works.
But here’s the thing: some people think these laws aren’t enough. They say we need to crack down on the apps themselves. If we make it harder to use these apps, then there won’t be as many fake photos floating around. What Can We Do? So, how do we stop this? ...( read more on our student newsletter)

2. Rioting Farmers Derail Europe's Green Dream 🌍💥
Imagine this: Lyon, France, 2021. The mayor decides to take red meat off school menus, not just for fun, but because it's safer and saves time during a pandemic. But oh boy, did the farmers lose it! They rolled into the city with tractors and cows, yelling about ideology on kids' plates 😱.
But Lyon was just the beginning. All over Europe, farmers revved up their engines, protesting against new eco-friendly rules and demanding more subsidies 💰. From Paris to Brussels to the Netherlands, it was a tractor-tastic rebellion.Europe had big plans to fight climate change with a Green Deal 🌍. But farmers weren't having it! They wanted all the perks of government help without any strings attached. And guess what? They got their way!
You see, for years, the EU has been giving farmers tons of money 💸. But here's the twist: most of these farms aren't exactly eco-friendly 🌱. They guzzle water, spew greenhouse gases, and use a truckload of pesticides 🚱.
But despite their small economic footprint, farmers in Europe have a HUGE say in politics 🚜. They've been getting away with demanding subsidies and blocking eco-friendly rules for ages! So when the EU proposed new laws to clean up farming, like using less pesticides and raising animals more humanely, farmers went ballistic! 💥
And guess what? They won! Politicians caved...( read more on our student newsletter)

3. How AI is Cooking Up Food Innovation!
Hey foodies! Ever wondered how those tasty treats in your pantry get their delicious flavors? Well, buckle up because Unilever's spilling the beans on their secret ingredient: Artificial Intelligence!
Picture this: instead of chefs slaving away in the kitchen, Unilever's whipping up new recipes with the help of super-smart AI models. 👩‍🍳 These digital wizards predict how new products will taste, feel, and even behave on factory lines—all without breaking a sweat! 💡
But wait, there's more! Unilever's not just cooking up yummy snacks; they're also making them healthier, planet-friendly, and affordable! 🌍 With AI in their toolkit, they're cracking the code to create the perfect balance of taste and sustainability.
Take Knorr's Zero Salt Bouillon Cubes, for example. 🍲 By harnessing the power of AI, Unilever crafted a sodium-free sensation that's just as tasty as the original—no salt shaker required! 🧂 ...( read more on our student newsletter)

4. Crime and Perception: Are People Reacting to the Wrong Alarm?

Lawmakers have two main jobs: reducing crime and making people feel safe. But sometimes there's a big gap between what's happening with crime and how people feel about it.
For example, a Gallup poll showed that more Americans than ever—63 percent in 2023—think crime is a big problem, even though crime rates have actually been dropping. It's like thinking the house is on fire when it's just the toaster burning your toast.🍞 This gap between reality and what people think is a big deal. It affects what laws get made. Lawmakers don’t always look at what’s really happening; they also look at what people believe is happening.
So, when people feel scared about crime—maybe because of news reports about a rise in crime that isn't really there—lawmakers often feel pressured to act. This has led to some places passing tough laws that bring back the harsh punishments of the 1980s and '90s. They're trying to fix a problem that's already getting better... (read more on our student newsletter)
Join today and get exclusive access to our newsletter, thousands of students are already loving our newsletter:
https://bizbrew-worldnews.beehiiv.com/
(Do give us an upvote and share this with your friends so we know you find this useful )
submitted by Apart-Awareness-4594 to SGExams [link] [comments]


2024.05.15 11:37 r3crac MUSTOOL 3.5X 90X Simul-Focal Double Boom Stand Trinocular Stereo Microscope [EU] for 415.99 USD with coupon (Best price in history: 411.99 USD) [only Greece!]

Here is the link: MUSTOOL 3.5X 90X Simul-Focal Double Boom Stand Trinocular Stereo Microscope [EU]
Best price with coupon code (apply in the cart!): BG0d9618
Current price is 415.99 USD. The lowest price in my database is 411.99 USD. There're already 2 records in DB. Price monitoring since 19.3.2024!
Notes (coupon may work only in selected countries): Greece
If you're too late or you want e-mail PRICE ALERTS, then you can check current coupons for MUSTOOL 3.5X 90X Simul-Focal Double Boom Stand Trinocular Stereo Microscope here: https://couponsfromchina.com/mustool-3-5x-90x-simul-focal-double-boom-stand-trinocular-stereo/
Best regards.
Good deal with nice discount.
Telegram: https://t.me/couponsfromchinacom
FB Page: https://www.facebook.com/CouponsFromChinaCom
FB group: https://www.facebook.com/groups/couponsfromchinacom/
Reddit: https://www.reddit.com/couponsfromchina/
Website: https://couponsfromchina.com
submitted by r3crac to couponsfromchina [link] [comments]


2024.05.15 11:02 Chance_Two1498 QR code generator matchup

Previously, I've used the Adobe QR code generator so I can easily create a QR code linked to my PDF files. I've been using PDF files linked to QR codes because of the futuristic sense it gives off when sharing files or doing presentations for work. The set up was working well until I mistakenly used and distributed the wrong QR code for a presentation. I wanted to change the PDF linked to the QR code I sent out but it wasn't possible with the QR code I inherently got from Adobe.
This led to my falling out of love with using QR codes. Later on, I learned that you can create two general types of QR codes: static and dynamic. And that if I created a dynamic QR code, I could have easily changed the content linked to my QR codes. This could have solved my previous issue. Upon further investigation, I've learned that Adobe only gives off static QR codes; these are the ones that you can't change whatever is linked to the QR code.
submitted by Chance_Two1498 to u/Chance_Two1498 [link] [comments]


2024.05.15 10:37 M1lk_4_Kh0rn3 New sub-faction ideas for Kane Wrath #7 Japan-Korea Defense Initiative (GDI)

New sub-faction ideas for Kane Wrath #7 Japan-Korea Defense Initiative (GDI)
"Greeting Brothers and Sisters, today we bring you grave news. The sun we though had set long ago had risen again. Those remained from wars of fifty years ago revived from their tombs, readied to served their GDI masters once more. Our brother in China once underestimated them, now they are trampled under their feet. I fear we will faced them soon."
Brother Duc, a Confessor in Ho Chi Minh city.
Konnichiwa, Annyeong hasimnikka and hello guys and girls. I'm back with the third trilogy of homebrew sub-factions. This time, we'll take a look to the far east, where the Empire of Rising Sun used to be, at least in Red Alert 3 timeline. In the lands of Korean Peninsula and Japan Island, a branch of GDI, the Japan-Korea Defense Initiative (J-KDI) is in charge. This concept based on the Empire of Rising Sun from RA3 with many touches to fit in the scenario of the Tiberium Universe. As this region unique geography, society, economical and technological advances, the sub-faction leaned more toward urban warfare, drone combat and the fragile but versatile mech walker.
As you already know, the Steel Talon also favor walkers but their mech are crude, rugged and focus on late-game punch, J-KDI mechs are more futuristic, high-tech, highly versatile, which is an odd for GDI doctrine, but when taking their operating region into account, the feat seem not very complicated, as Japan and Korea are the least suffered from the first two Tiberium Wars and designated as Blue Zones (Yes, even North Korea is a Blue Zone, maybe Kane get scared, who know?). So, without any further ado, let dive in.
Disclaimer: As always, The image I used in the Post below is from various source on the internet such as CnC wiki and Deviantart to give reader a better look at my idea. If you you felt uncomfortable with this, please let me know in the comment below and I'll remove them
------------------------------------------------------------------------------------------------------------------------
J-KDI insignia
Lore
Originally created by the United Nations as a branch of GDI in charge of Japan and Korean region and after decades maintaining security and prosperity with advancing in technologies, J-KDI is one of the most renowned division within GDI. They often active in Japan Main Islands and Korean Peninsula, which saw little Tiberium infestation and stable politic and economic environments. During the chaotic time before the Second Tiberium War, the three governments met with GDI presentative and strike a deal: The three countries will accept GDI officials, tactics, policies and complied to mobilization orders in exchange for maintaining their own decree of independent, including the right to command and develop their own army with access to some GDI technologies. This deal has led to the birth a semi-independent regional forces within GDI, known as Japan-Korea Defense Initiative (J-KDI).
One of J-KDI unique characteristic is due to they mostly operate in large city, thus their arsenal is modified to suit urban combats. With their freedom in R&D and a huge sum of budget to do so, their units seem more futuristic and sometime unrealistic compare to normal GDI war machines. Most noticeable is they managed to recovered old prototypes from older projects, upgraded and let them enter services once again. With North Korea also in the mix, J-KDI also employed well trained armed military polices and tactical nuclear ballistic weapons. On the other side, J-KDI saw limited use of aircraft and cannot access to Ion Cannons due to GDI constrictions, however, they soon found out other "solutions" to fulfill their role.
In recent years, J-KDI had found a new talent, Dr. Liang, brother of Jade Liang, a NOD notorious commander. Dr. Liang worked side by side with his sister Jade in the GDI research labs until they were both accidentally exposed to raw Tiberium. Liang chose to amputate his arm rather than succumb to mutation. He now dedicates himself to finding ways to heal wounds of all kinds with most of his research into pilotless vehicles. And Dr. Liang, who in need of a sponsor met with J-KDI, who scouting for talents in robotics and drone vehicles, thus Dr. Liang was recruited as chief scientist and a battle commander for J-KDI. His contributed in drones and AI developments helped J-KDI advanced further to their vision of a futuristic army, until the end of Third Tiberium War, that is ...
Building
  • Can not build Airfield.
  • Can not build Combat Support Airfield.
  • Call for Transport available after a Command Post is built
Defense
  • Missile Silo replaces Ion Cannon: Sponsored by United Republic of Korea, these things make NOD green with envy. It can launch a tactical nuclear strike delivered by an ICBM with 5 tactical nuclear MIRV warheads at the target location anywhere on the map. If this is not enough, J-KDI commanders can purchase additional warheads at the Silo. Each warheads cost 1500$ and each ICBM can carry 10 warheads at most.
The Missile Silo ready to deliver it payloads
Infantry
  • Riot Squad replaces Riflemen Squad: Basic infantry/policeman armed with mini assault rifles, riot shield and flash bang. They are studier but slower than their counterpart and trained to clear garrisoned building. On the flip side, they can throw flash bang at enemies infantry, which stunned for a while.
  • Dragonfly Drone: Flying scout drones armed with EMP Immobilizer, which can disable ground vehicle. It can ordered to charge and self-destruct in an EMP explosion, hopefully damaging anything around it. Require Command Post.
  • Service Drone: Flying support drone with timed life that can repair or heal adjacent allies units. Can only summoned through Instant Service support power.
The Riot Squad (from Crossfire Legion), the Dragonfly Drone and the Service Drone
Vehicle
  • Cannot build Rig and Mammoth Tank.
  • Assault APC: Troop transport vehicle armed with weapon jammer and fire ports. Weapon Jammer can render enemies weapons to useless, even infantry weapons. Can upgraded to deploy smoke screen to support friendly units.
  • Robo Tengu replaces Guardian APC: Anti-infantry hover walker, first designed for security, then converted for military use. It can upgrade to transform into the Jet Tengu, a VTOL air superiority fighter. Can detect stealth.
  • Striker-VX: Anti-air walker that can spew out surface-to-air missiles into air. It can upgraded to transform into the Chopper-VX, to combat incoming ground targets with air-to-surface missiles. Require Command Post.
  • Megalodon: Powerful assault walker designed for melee combat with plasma blade, excellence durability and quite fast (for a heavy tank). It also immune to hijacking, mind control and only slowed down by EMP effects. Commandos, however, can plant charges on it legs to bring it down. It leaves behind a husk when destroyed, which can be captured or destroyed. Require Tech Center.
The Assault APC (From Generals 2), the Tengu, VX (both from Red Alert 3) and the mighty Megalodon (from Reign of Steel mod)
Aircraft
  • Cannot build any "traditional" aircraft.
Upgrade
  • Cannot purchase Sensor Pods, Hardpoints, Stratofighter and Railgun Upgrade.
  • AP Ammo upgrade benefit Riot Squad and Tengu
  • Transform Modules: Allow Robo Tengu to transform into the Jet Tengu and Striker-VX transform to Chopper-VX. Purchase at War Factory.
  • Smoke Launcher: Allow Assault APC and Predator Tank launch smoke grenades at targeted area, creating a smokescreen that lasts for 6 seconds and greatly reduce sight range and attack range of units caught within. It can also force garrisoned infantry out of buildings. Purchase at Command Post.
  • Expanded Missile Pods: Expands the Missile Pods for Pitbull and Striker-VX, allowing more missiles per salvo. Purchase at Tech Center.
  • Hydrogen Fuel Cells: Increase Robo Tengu, Striker-VX and Megalodon speed by 33%. Megalodon also gain immunity from EMP effect. Purchase at Tech Center.
Support Power
  • Cannot use Orca Strike and Bloodhounds.
  • GDI Airborne summon two Riot Squads and two Missile Squads instead of two Rifle Squads and two Missile Squads.
  • Drone Strike: Call in kamikaze drone which crashes itself onto targeted area, explode and causing high damage. Summon 3 drones initially but every GDI War Factory present on the battlefield will release an additional Hunter-Seeker drone upon activation. Require Command Post.
  • Instant Service: Call in a flock of 3 Service Drones with timed life anywhere on the map that can heal and repair adjacent allies units. Require War Factory.
Notable Events
  1. Clear House. Location: Kobe, Japan. After the Firestorm Crisis, Empire of Japan and the United Republic of Korea, designated as Blue Zones B-6 and B-7, entered a decade of rapid development thanks to geography locations, efficient governments and technological advances. But shadows of previous conflicts still remained and now, they stir once again. Dr. Liang, a newly appointed chief scientist of J-KDI, accompanied by Battle Commander Sato in a riot control mission in Kobe. The investigators discovered that riots incited by the local Yakuza and backed by NOD. A MCV with escort arrived and quelled the riots by destroyed all hidden NOD infrastructures around the city. At one of the base, J-KDI found documents about a large operation in nearby Osaka Port.
  2. Hand of Darkness. Location: Osaka, Japan. From the documents J-KDI discovered NOD had secretly taken control of Osaka Port operations through several Yakuza shell companies. There, they established a base, hidden by Disruption Towers to wait for a "special shipment" arrive. J-KDI sent a Commando task force to intercept the cargo. As the Commando arrived, he cut through NOD patrols and secured the cargo ship. With the cargo carried away by a V-35 Ox, J-KDI sent in their MCV to build a base and proceed to eliminate NOD presence in the port.
  3. Hidden Vipers. Location: Ningbo, China. The cargo contained parts of a liquid Tiberium base explosive device and from NOD captives and documents, they intended stage a "test" in Tokyo area. This information raised concern for both J-KDI and GDI alike as such attack will cause massive casualties. Doctor Liang traced back the device is manufactured in Ningbo, China and had signatures of his sister, Jade Liang, now a defector. GDI Council authorized a joined assault on China Yellow Zone and put a stop to these devices production. After a bombardment, Steel Talon vanguards landed at the port while J-KDI mech wings escort Hovercraft upstream Yong Jiang river to strike at the rear. However, the city is defended by Emerald Vipers, a NOD faction specialized in toxic and liquid-T weapon. The Vipers led by Jade resisted fiercely to defend their facilities but crushed eventually. Jade escaped with only a handful of troops and GDI claimed their victory.
  4. Incoming Storm. Location: Tumangang, North Korea. Several years passed since NOD Incursion and GDI slowly diminished their military forces. But J-KDI still maintained their semi-independent status and continued to developed new weapons. Recently, there words of a huge NOD armored column pushed down from Siberia toward the Korean Peninsula. Commander Sato had been mobilized to Tumangang in the Russia-North Korea border to intercept NOD advance. He arrived and begin fortified river crossing just before NOD first wave arrived. After the first wave intercepted, second wave arrived and set up shops at the opposite river bank. From there, NOD aircraft and infantry can support the third and fourth wave directly, giving Sato a hard time, however, no vehicle crossed the river. Just before the last wave, Sato receive information about the attacks on GDSS Philadelphia and Japan. He quickly finished the last wave and returned to Japan.
  5. Day at the bay. Location: Yokohama, Japan. NOD attacked a GDI Council's installations in Yokohama and J-KDI called in as reinforcement to take back Ion Cannon Control Centers there. However, there early reports that another GDI force already there. Feeling something amiss, Commander Sato send a Commando and a Sniper Team to investigate the situation. Turned out, a GDI Insurgent, the Dark Eyes Insurgency (D.E.I) had taken control of the Ion Control Centers there and in process of stealing an Ion Cannon for there usage. After a brief skirmish, Sato cannot stop the D.E.I from finished taking control an Ion Cannon. At this point, the D.E.I commander propose a deal with Sato, as they willingly to help him take back the vital port of Yokohama in exchange for a blind eye, as GDI Council not giving J-KDI access to Ion Cannon Network either. Having no better choice, Sato agreed and the combined GDI wiped out remaining NOD foothold in Yokohama. Before leaving, the D.E.I generously provide Sato a shocking new: Dr. Liang life is under threat by his little sister, as she going to attack at San Diego Conference, where Dr. Liang and many GDI top scientist currently in.
  6. Santa Coming, Too. Location: San Diego, California. Dr. Liang and San Diego base had been warned about the coming of NOD forces. However, the defense of the base fall in local GDI hands, as Dr. Liang forces are only a handful of guards and mechs. As the Vipers approached, they were caught surprised by J-KDI transform mechs and Vipers aircraft soon removed out the sky as their home Air Tower destroyed. This angered Jade and she soon send in more troops to the meat grinder. In the moment the base about to fall, an APCOM reinforcement wing arrived and bombed NOD forces to oblivion. Jade herself forced to abandoned the battle, leaving behind many Vipers casualties behind.
  7. Relics of the Past. Location: Point Hope, Alaska. Having stabilized the Blue Zones, GDI High Command planned for a retaliation strike at NOD. J-KDI Command didn't sit still either, as they're dangerously close to the China Yellow Zone. However, to J-KDI also lack the capability to strike deep into China mainland where NOD headquarter is. Dr. Liang proposed a bold idea: by using an old experimental device Allied forces used during the Third World War, they can teleport a limited number of vehicle directly at NOD headquarter and destroy NOD from inside out. However, this device currently mothballed in a abandoned base in Alaska, with rumors of NOD activities in the region. As the plan when through by GDI High Command, Dr. Liang and Sato lead and expedition to dig out the old Chronosphere and charged it to full. While Dr. Liang busy restore and recharge the Chronosphere, Commander Sato take charge of a naval battle with two NOD Battleships and their escort.
  8. Chrono You Didn't. Location: Nanchang, China. With the old Chronosphere device fully charged, J-KDI begin their raid on NOD Asian Headquarter in China. After clear out a NOD outpost, a MCV with some mech teleported and begin set up shops at the west bank of the river. Local Black Hand alerted of J-KDI presence and sent a Purifier with a few Scorpions to intercept GDI but soon torn to shed by mech reinforcement. This, however, do not deter the Black Hand and NOD from sending in more troop and vehicles at the J-KDI base, stalling J-KDI advance for a time. After a few round of reinforcements, Dr. Liang inform commander Sato that the Chronosphere will reach it limit soon, but a ZOCOM commander volunteer to arrived at a last batch reinforcement. A ZOCOM MCV with some vehicle and two MARVs soon teleported in was the last reinforcement, but they are more than enough. Together with ZOCOM, J-KDI pushed forward and even destroyed a Black Hand Redeemer, forcing them to retreat. The main NOD base soon followed suit and fall to the combined might of the two MARVs. With their Command Headquarter destroyed, NOD forces in China soon fall to disarray. This mission is a total victory.
  9. Doomsday Countdown. Location: Incheon, South Korea. The situation in the Far East is stabled and only minor NOD resistances remained but a large number of NOD had escaped their demise. Peace finally there, but it is short lived, as the Earth under attack by an unknown Aliens. There crafts landed across the globe and their forces strike in every Blue and Yellow Zones. A Drone Platform had landed in Incheon and Commander Sato sent to deal with it. A strike team arrived from sea and encountered heavy Alien patrols. Battleship called for bombards to clear a landing zone for an J-KDI outpost. The alien deployed their Rift Generator, intend using it to wipe out any humans resistant. In face such mass destruction weapons, J-KDI authorized the use of Tactical Nukes and a Silo is deployed. With the help of a EMP Control Center, J-KDI disrupt the Rift Generator long enough for their forces to destroyed the Rift Generator and nuked the Drone Platform along with any remained Aliens to oblivion.
  10. Under the Sacred Mountain. Location: Mt. Fuji, Japan. When Commander Sato busy dealing with the aliens in Hiroshima, Dr. Liang received distress signals from a GDI facility in Mt. Fuji. Apparently, his little sister, Jade attacked the facility to eliminate a high ranking NOD defector sheltered there. But the Aliens arrival foiled her plan and now she caught in the crossfire between GDI and Aliens. This opportunity cannot be missed but J-KDI had given order to prioritized the defector safety first, thus Dr. Liang led reinforcements to Mt. Fuji. He arrived from the north to the final GDI base there while Jade three base besieging them. As for the Aliens, there coming from the South, keep hammering Jade from behind. J-KDI first recaptured the Power Plant to reactivate the remain defend system, which temporally push Jade forces back. Afterward, they begin to hammer Jade bases while she fend off the Aliens. Cannot withstand any further, Jade flee again, abandoned remaining forces to their fate. The Aliens also dealt with afterward and the defector escorted to safety.
  11. Shipwright. Location: Naval Base White Beach, Okinawa. A ZOCOM aircraft carrier task force arrived in Okinawa for emergency repair and refuel. The carrier carried with it a special cargo and under attack by the Reaper-17 pursuers. J-KDI sent Commander Sato to unsured the cargo safety. When be Carrier under repaired, all sirens sounded as Alien Storm Riders approached, but all shot down. Soon, more Aliens ground forces arrived along the north beach while more Storm Riders flied in from the sea. J-KDI and ZOCOM hold off the Aliens long enough for the Carrier Task force to repair and refuel, then escort the task force to high sea, after destroyed the Alien foothold in the region, of course.
  12. Race of Arms. Location: Threshold 14, Guangdong, China. The cargo had reached safety in the high sea while the Aliens pursuer retreated. GDI High Command, alerted of Alien's Towers in the Red Zone, planned to destroyed them before they finished constructing. J-KDI had been assigned to bring down the Tower in China Red Zone, code name Threshold 14. When the vanguard arrived, they found themself not only facing Alien but also NODs. Under pressure from both side, J-KDI hold on to their footholds while withering down Alien and NOD forces. Soon, Dr. Liang informed that a special Chrono delivery is coming. Commander Sato send the signal for three warheads to teleported near the Phase Generators and denotate them, reduced a huge chunk of Alien base to dust. With the Phase Generators outed, the Tower is now vulnerable and a nuclear strike later, it blew to smithereens.
  13. Of Brother and Sister. Location: Giraud-Moebius Tiberium Crater. Five years after the Third Tiberium War, GDI now stand victorious and the Brotherhood back to it shadows once more, J-KDI busying rebuild their city and society when Dr. Liang receive a shocking news, his sister, Jade Liang had betrayed Kane and now withdrawn to her final stronghold deep within Central Asia Red Zone. Dr. Liang asked for permission to finish business with his sister and authorized by GDI High Command. As Jade stronghold is hard to breached, J-KDI use a more bold approach, drop a MCV dropped from orbit inside her compound and destroy it from within. As J-KDI about to attack, the Marked of Kane already begun their assault. This created distraction needed for the MCV to make land fall and how can Dr. Liang refuse such a chance. A MCV task force dropped behind Jade lines and start to set up shops while Jade busy fighting cyborgs. Only when she realized her defend line pincered by both mechs and cyborgs then it is already too late. Not willing give up, Jade activated four Cloning Vats, devices left behind from Soviet-era that can clones every infantry Jade forces have trained. Fortunately, the Kenan Corp reinforcements arrived and together, the three forces pushed toward Jade headquarter. Jade in her madness, denotate a Liquid-T Bomb, intended to take the attacker down but ultimately failed and captured by J-KDI troops. After a brief conversation, Dr. Liang bid farewell to his sister and handed her to a cyborg, then a gunshot rang ....
------------------------------------------------------------------------------------------------------------------------
That all for this post. If you have any opinions, please let me know in the comment section below as usual. The next post is right about the corner as I take for a change and do a Kilian Loyalist NOD sub-faction next time. Thanks you for reading and I hope to hear from your comments soon. Best regards.
submitted by M1lk_4_Kh0rn3 to commandandconquer [link] [comments]


http://activeproperty.pl/