Alter database datafile autoexten

MAY 14, 2024 MAG.TO MAG SILVER REPORTS FIRST QUARTER FINANCIAL RESULTS

2024.05.14 17:59 Then_Marionberry_259 MAY 14, 2024 MAG.TO MAG SILVER REPORTS FIRST QUARTER FINANCIAL RESULTS

MAY 14, 2024 MAG.TO MAG SILVER REPORTS FIRST QUARTER FINANCIAL RESULTS
https://preview.redd.it/w3wbxgjzze0d1.png?width=3500&format=png&auto=webp&s=c343619687a11525804d04f755c495d975b2050d
VANCOUVER, British Columbia, May 14, 2024 (GLOBE NEWSWIRE) -- MAG Silver Corp. (TSX / NYSE American: MAG) (“MAG”, or the “Company”) announces the Company’s unaudited consolidated financial results for the three months ended March 31, 2024 (“Q1 2024”). For details of the unaudited condensed interim consolidated financial statements of the Company for the three months ended March 31, 2024 (“Q1 2024 Financial Statements”) and management’s discussion and analysis for the three months ended March 31, 2024 (“Q1 2024 MD&A”), please see the Company’s filings on the System for Electronic Document Analysis and Retrieval Plus (“SEDAR+”) at ( www.sedarplus.ca ) or on the Electronic Data Gathering, Analysis, and Retrieval (“EDGAR”) at ( www.sec.gov ).
All amounts herein are reported in $000s of United States dollars (“US$”) unless otherwise specified (C$ refers to Canadian dollars).
KEY HIGHLIGHTS (on a 100% basis unless otherwise noted)
  • MAG reported net income of $14,895 ($0.14 per share) driven by income from Juanicipio (equity accounted) of $19,244, and adjusted EBITDA 1 of $32,447 for the three months ended March 31, 2024.
  • A total of 325,683 tonnes of ore at a silver head grade of 476 grams per tonne (“g/t”) (equivalent silver head grade 2 713 g/t), was processed at Juanicipio during Q1 2024.
  • Juanicipio achieved silver production and equivalent silver production 2 of 4.5 and 6.4 million ounces, respectively, during Q1 2024.
  • Juanicipio delivered robust cost performance with cash cost 1 of $2.50 per silver ounce sold ($8.66 per equivalent silver ounce sold 3 ), and all-in sustaining cost 1 of $6.11 per silver ounce sold ($11.22 per equivalent silver ounce sold 3 ) in Q1 2024.
  • Juanicipio generated strong operating cash flow of $42,521 and free cash flow 1 of $27,820 in the first quarter of 2024 after tax payments of $25,772.
  • Juanicipio returned a total of $17,459 in interest and loan principal repayments to MAG during Q1 2024.
  • MAG published its updated technical report on Juanicipio on March 27, 2024 outlining robust economics with an after tax NPV of $1.2 billion over an initial 13-year life of mine, generating annual average free cashflow exceeding $130 million. Mineral Resources increased by 33% from the 2017 PEA, with substantial growth in Measured and Indicated categories. Inferred resources also expanded, highlighting significant near-term, high-grade upside potential. An inaugural 15.4 million tonnes Mineral Reserve Estimate at 628 g/t silver equivalent grade was declared enhancing economic confidence. Extensive exploration upside remains, with only 5% of the property explored, indicating high potential for further discoveries.
  • MAG announced 2024 production and cost guidance with Juanicipio expected to produce between 14.3 million and 15.8 million silver ounces yielding between 13.2 million and 14.6 million payable silver ounces at all-in sustaining costs of between $9.50 and $10.50 per silver ounce sold. Juanicipio remains on track to achieve 2024 guidance.
  • On March 22, 2024 the Company, through its Gatling Exploration Inc. subsidiary, acquired 100% ownership of the Goldstake property (contiguous to its current land holdings) from Goldstake Explorations Inc. and Transpacific Resources Inc., for consideration of C$5,000.
________________________
1 Adjusted EBITDA, total cash costs, cash cost per ounce, all-in sustaining costs, all-in sustaining cost per ounce and free cash flow are non-IFRS measures, please see below ‘ Non-IFRS Measures ’ section and section 12 of the Q1 2024 MD&A for a detailed reconciliation of these measures to the Q1 2024 Financial Statements.
2 Equivalent silver head grade and equivalent silver production have been calculated using the following price assumptions to translate gold, lead and zinc to “equivalent” silver head grade and “equivalent” silver production: $23/oz silver, $1,950/oz gold, $0.95/lb lead and $1.15/lb zinc.
3 Equivalent silver ounces sold have been calculated using realized price assumptions to translate gold, lead and zinc to “equivalent” silver ounces sold (metal quantity, multiplied by metal price, divided by silver price). Q1 2024 realized prices of $23.73/oz silver, $2,112.27/oz gold, $0.92/lb lead and $1.08/lb zinc.
CORPORATE
  • The Company is well underway with the preparation of its 2023 sustainability report underscoring its continued commitment to transparency with its stakeholders while providing a comprehensive overview of the Company’s environmental, social and governance (“ESG”) commitments, practices and performance for 2023. A copy of MAG’s 2022 sustainability report and MAG Silver 2022 ESG Data Table are available on the Company’s website at https://magsilver.com/esg/reports/ 4
________________________
4 Information contained in or otherwise accessible through the Company’s website, including the 2022 sustainability report and MAG Silver 2022 ESG Data Table, do not form part of this News Release and are not incorporated into this News Release by reference.
EXPLORATION
  • Juanicipio:
    • Infill drilling at Juanicipio continued in Q1 2024 from underground aimed at upgrading mineralization in areas expected to be mined in the near to mid-term. During Q1 2024, 11,271 metres were drilled from underground.
    • Surface drilling focused on expanding and upgrading the deeper zones and broader regional exploration started in April 2024.
    • During 2024, Juanicipio plans to drill a total of 50,000 metres, with 33,000 metres from underground and 17,000 metres from surface.
  • Deer Trail Project, Utah:
    • On May 29, 2023 MAG started a Phase 3 drilling program focused on up to three porphyry “hub” target areas thought to be the source of the manto, skarn, epithermal mineralization and extensive alteration throughout the project area including that at the Deer Trail and Carissa zones. In late 2023 an early onset of winter snowfall impacted the commencement of the third porphyry “hub” target, which is now expected to be drilled in 2024. The two completed “hub” holes to date total 2,738 metres. Both holes intercepted alteration and mineralization in line with what is expected on the edges of porphyry systems. Follow-up drill targets are planned for summer 2024.
    • With the early onset of snowfall, Phase 4 drilling focussed on lower elevations commenced in the last quarter of 2023 and continued through Q1 2024, aimed at offsetting the Carissa discovery and testing other high-potential targets in the Deer Trail mine area. During Q1 2024, 1,208 metres were drilled at Carissa with results pending.
  • Larder Project, Ontario:
    • Drilling targeting Cheminis and Bear totalled 5,391 metres in Q1 2024. Targets tested include down plunge extension of the high-grade double knuckle at the Bear East zone and extending the Cheminis south mine sequence down plunge.
    • Cheminis Update: Follow-up drilling of the Cheminis South Cadillac-Larder Break (“CLD”) mine sequence down plunge is planned to test below the most recent intercepts. Hole GAT-24-026 intersected a new zone on the north side of the CLB within a fuchsite-silica-albite altered komatiite grading 3.9 g/t gold over 16 metres with 2 higher grade shoots associated with albite dykes (see Table 1 below).
    • Bear Update: Utilizing the updated model and incorporating the updated data from recent drilling, the Bear East zone was successfully extended down plunge by up to 1,100 metres depth. Hole GAT-24-024NB intersected gold mineralization on both sides of the CLB which confirms the presence of either another structural trap at depth or the continuation of the “double knuckle” zone at surface. Gold mineralization intersected on the north zone included 9.4 g/t gold over 2.2 metres within a strongly altered komatiite with syenite intrusions and 1.6 g/t gold over 4.2 metres on the south zone within the south iron-rich volcanics (see Table 1 below). Bear East remains open in all directions.
Table 1: 2024 Larder Drillholes Highlights
https://preview.redd.it/qdr6asmzze0d1.png?width=720&format=png&auto=webp&s=aaedd0020755eaf3404201557cc9623acc995125
JUANICIPIO RESULTS
All results of Juanicipio in this section are on a 100% basis, unless otherwise noted.
Operating Performance
The following table and subsequent discussion provide a summary of the operating performance of Juanicipio for the three months ended March 31, 2024 and 2023, unless otherwise noted.
https://preview.redd.it/9txq8snzze0d1.png?width=720&format=png&auto=webp&s=0089cf57573e8834bdb641cf9e055619e6f6c5b2
(1) Equivalent silver head grades have been calculated using the following price assumptions to translate gold, lead and zinc to “equivalent” silver head grade: $23/oz silver, $1,950/oz gold, $0.95/lb lead and $1.15/lb zinc (Q1 2023: $21.85/oz silver, $1,775/oz gold, $0.915/lb lead and $1.30/lb zinc).
(2) Equivalent silver payable ounces have been calculated using realized price assumptions to translate gold, lead and zinc to “equivalent” silver payable ounces (metal quantity, multiplied by metal price, divided by silver price). Q1 2024 realized prices of $23.73/oz silver, $2,112.27/oz gold, $0.92/lb lead and $1.08/lb zinc (Q1 2023 realized prices of $22.93/oz silver, $1,959.50/oz gold, $0.94/lb lead and $1.43/lb zinc).
During the three months ended March 31, 2024 a total of 325,081 tonnes of ore were mined. This represents an increase of 45% over Q1 2023. Increases in mined tonnages at Juanicipio have been driven by the operational ramp up of the mine towards steady state targets.
During the three months ended March 31, 2024 a total of 325,683 tonnes of ore were processed through the Juanicipio plant; no ore was processed at the nearby Fresnillo and Saucito processing plants (100% owned by Fresnillo). This represents an increase of 47% over Q1 2023. The increase in milled tonnage has been driven by the Juanicipio mill commissioning and operational ramp up to nameplate capacity over the course of 2023.
The silver head grade and equivalent silver head grade for the ore processed in the three months ended March 31, 2024 was 476 g/t and 713 g/t, respectively (three months ended March 31, 2023: 363 g/t and 530 g/t, respectively). Head grades in Q1 2023 were lower as low-grade commissioning stockpiles were processed through the Juanicipio plant. Silver metallurgical recovery during Q1 2024 was 89.1% (Q1 2023: 87.0%) reflecting ongoing optimizations in the processing plant.
The following table provides a summary of the total cash costs 5 and all-in sustaining costs 5 (“AISC”) of Juanicipio for the three months ended March 31, 2024, and 2023.
https://preview.redd.it/riqz1yozze0d1.png?width=720&format=png&auto=webp&s=c5f2edde6bc789d2d379ca3a910beaa1cb262bde
________________________
5 Total cash costs, cash cost per ounce, cash cost per equivalent ounce, all-in sustaining costs, all-in sustaining cost per ounce, and all-in sustaining cost per equivalent ounce are non-IFRS measures, please see the “ Non-IFRS Measures ” section below and section 12 of the Q1 2024 MD&A for a detailed reconciliation of these measures to the Q1 2024 Financial Statements. Equivalent silver ounces sold have been calculated using realized price assumptions to translate gold, lead and zinc to “equivalent” silver ounces sold (metal quantity, multiplied by metal price, divided by silver price). Q1 2024 realized prices of $23.73/oz silver, $2,112.27/oz gold, $0.92/lb lead and $1.08/lb zinc (Q1 2023: $22.93/oz silver, $1,959.50/oz gold, $0.94/lb lead and $1.43/lb zinc).
Financial Results
The following table presents excerpts of the financial results of Juanicipio for the three months ended March 31, 2024 and 2023.
https://preview.redd.it/4zym5dqzze0d1.png?width=720&format=png&auto=webp&s=d25c91cabc7f6c6b35ff61acacc0160f3dfac2e7
Sales increased by $72,207 during the three months ended March 31, 2024, mainly due to 179% higher metal volumes and 2% higher realized metal prices.
Offsetting higher sales was higher production cost ($9,409) which was driven by higher sales and operational ramp-up in mining and processing, including $3,545 in inventory movements, and higher depreciation ($14,083) as the Juanicipio mill achieved commercial production and commenced depreciating the processing facility and associated equipment in June 2023. Operating margin increased by 21% to 52%, mainly due to operational leverage and the lower reliance on the nearby Fresnillo and Saucito processing facilities.
Other expenses increased by $2,159 mainly as a result of higher extraordinary mining and other duties ($872) in relation to higher precious metal revenues from the sale of concentrates and higher consulting and administrative expenses ($2,690) as an operator services agreement became effective upon initiation of commercial production (the “Operator Services Agreement”), offset by lower exchange losses and other costs ($1,566).
Taxes increased by $20,980 impacted by higher taxable profits generated during Q1 2024, and non-cash deferred tax credits related to the commencement of use of plant and equipment in Q1 2023.
Ore Processed at Juanicipio Plant (100% basis)
https://preview.redd.it/koajybrzze0d1.png?width=720&format=png&auto=webp&s=caf1b70c53c47d371b9cebd743877fcd4ae59ba3
(1) The underground mine was considered readied for its intended use on January 1, 2022, whereas the Juanicipio processing facility started commissioning and ramp-up activities in January 2023, achieving commercial production status on June 1, 2023.
(2) Includes toll milling costs from processing mineralized material at the Saucito and Fresnillo plants for Q1 2023.
Sales and treatment charges are recorded on a provisional basis and are adjusted based on final assay and pricing adjustments in accordance with the offtake contracts.
MAG FINANCIAL RESULTS – THREE MONTHS ENDED MARCH 31, 2024
As at March 31, 2024, MAG had working capital of $72,833 (December 31, 2023: $67,262) including cash of $74,683 (December 31, 2023: $68,707) and no long-term debt. As well, as at March 31, 2024, Juanicipio had working capital of $107,088 including cash of $30,991 (MAG’s attributable share is 44%).
The Company’s net income for the three months ended March 31, 2024 amounted to $14,895 (March 31, 2023: $4,713) or $0.14/share (March 31, 2023: $0.05/share). MAG recorded its 44% income from equity accounted investment in Juanicipio of $19,244 (March 31, 2023: $7,919) which included MAG’s 44% share of net income from operations as well as loan interest earned on loans advanced to Juanicipio (see above for MAG’s share of income from its equity accounted investment in Juanicipio).
https://preview.redd.it/5bneimszze0d1.png?width=720&format=png&auto=webp&s=323d988dbd92cf6ca4e815fff071c8ec7f45ee00
NON-IFRS MEASURES
The following table provides a reconciliation of cash cost per silver ounce of Juanicipio to production cost of Juanicipio on a 100% basis (the nearest IFRS measure) as presented in the notes to the Q1 2024 Financial Statements.
https://preview.redd.it/0jhh2stzze0d1.png?width=720&format=png&auto=webp&s=c97634763bd00967ddd878bc09b8e069687fae68
(1) As Q3 2023 represented the first full quarter of commercial production, information presented for total cash costs together with their associated per unit values are not directly comparable.
(2) By-product revenues relates to the sale of other metals namely gold, lead, and zinc.
(3) Equivalent silver payable ounces have been calculated using realized prices to translate gold, lead and zinc to “equivalent” silver payable ounces (metal quantity, multiplied by metal price, divided by silver price). Q1 2024 realized prices: $23.73/oz silver, $2,112.27/oz gold, $0.92/lb lead and $1.08/lb zinc (Q1 2023: $22.93/oz silver, $1,959.50/oz gold, $0.94/lb lead and $1.43/lb zinc).
The following table provides a reconciliation of AISC of Juanicipio to production cost and various operating expenses of Juanicipio on a 100% basis (the nearest IFRS measure), as presented in the notes to the Q1 2024 Financial Statements.
https://preview.redd.it/qkx2r5vzze0d1.png?width=720&format=png&auto=webp&s=0c9cb89471512649ac77b5cbe3177b0621d64835
(1) As Q3 2023 represented the first full quarter of commercial production, information presented for all-in sustaining costs and all-in sustaining margin together with their associated per unit values are not directly comparable.
(2) Equivalent silver payable ounces have been calculated using realized prices to translate gold, lead and zinc to “equivalent” silver payable ounces (metal quantity, multiplied by metal price, divided by silver price). Q1 2024 realized prices: $23.73/oz silver, $2,112.27/oz gold, $0.92/lb lead and $1.08/lb zinc, (Q1 2023 realized prices: $22.93/oz silver, $1,959.50/oz gold, $0.94/lb lead and $1.43/lb zinc).
For the three months ended March 31, 2024 the Company incurred corporate G&A expenses of $3,964 (three months ended March 31, 2023: $3,262), which exclude depreciation expense.
The Company’s attributable silver ounces sold and equivalent silver ounces sold for the three months ended March 31, 2024 were 1,757,630 and 2,475,862 respectively (three months ended March 31, 2023: 880,429 and 1,230,412 respectively), resulting in additional all‐in sustaining cost for the Company of $2.26/oz and $1.60/oz respectively (three months ended March 31, 2023: $3.71/oz and $2.65/oz respectively), in addition to Juanicipio’s all-in-sustaining costs presented in the above table.
The following table provides a reconciliation of EBITDA and Adjusted EBITDA attributable to the Company based on its economic interest in Juanicipio to net income (the nearest IFRS measure) of the Company per the Q1 2024 Financial Statements. All adjustments are shown net of estimated income tax.
https://preview.redd.it/sx6jo7wzze0d1.png?width=720&format=png&auto=webp&s=1fea9df2b8195ce579b570935ab24b9939da5988
(1) As Q3 2023 represents the first full quarter of commercial production, information presented for EBITDA and Adjusted EBITDA is not directly comparable.
The following table provides a reconciliation of free cash flow of Juanicipio to its cash flow from operating activities on a 100% basis (the nearest IFRS measure), as presented in the notes to the Q1 2024 Financial Statements.
https://preview.redd.it/aqnp2dxzze0d1.png?width=720&format=png&auto=webp&s=56db2245eb87ec1f718edc1890b48b9b5d3ad762
(1) As Q3 2023 represents the first full quarter of commercial production, comparative information presented for free cash flow of Juanicipio is not directly comparable.
Qualified Persons: All scientific or technical information in this press release including assay results referred to, and mineral resource estimates, if applicable, is based upon information prepared by or under the supervision of, or has been approved by Gary Methven, P.Eng., Vice President, Technical Services and Lyle Hansen, P.Geo, Geotechnical Director; both are “Qualified Persons” for purposes of National Instrument 43-101, Standards of Disclosure for Mineral Projects
About MAG Silver Corp.
MAG Silver Corp. is a growth-oriented Canadian exploration company focused on advancing high-grade, district scale precious metals projects in the Americas. MAG is emerging as a top-tier primary silver mining company through its (44%) joint venture interest in the 4,000 tonnes per day Juanicipio Mine, operated by Fresnillo plc (56%). The mine is located in the Fresnillo Silver Trend in Mexico, the world's premier silver mining camp, where in addition to underground mine production and processing of high-grade mineralised material, an expanded exploration program is in place targeting multiple highly prospective targets. MAG is also executing multi-phase exploration programs at the 100% earn-in Deer Trail Project in Utah and the 100% owned Larder Project, located in the historically prolific Abitibi region of Canada.
Neither the Toronto Stock Exchange nor the NYSE American has reviewed or accepted responsibility for the accuracy or adequacy of this press release, which has been prepared by management.
Certain information contained in this release, including any information relating to MAG’s future oriented financial information, are “forward-looking information” and “forward-looking statements” within the meaning of applicable Canadian and United States securities legislation (collectively herein referred as “forward-looking statements”), including the “safe harbour” provisions of provincial securities legislation, the U.S. Private Securities Litigation Reform Act of 1995, Section 21E of the U.S. Securities Exchange Act of 1934, as amended and Section 27A of the U.S. Securities Act. Such forward-looking statements include, but are not limited to:
  • statements that address maintaining the nameplate 4,000 tpd milling rate at Juanicipio;
  • statements that address our expectations regarding exploration and drilling;
  • statements regarding production expectations and nameplate;
  • statements regarding the additional information from future drill programs;
  • estimated future exploration and development operations and corresponding expenditures and other expenses for specific operations;
  • the expected capital, sustaining capital and working capital requirements at Juanicipio, including the potential for additional cash calls;
  • expected upside from additional exploration;
  • expected results from Deer Trail Project drilling;
  • expected results from the Larder Project at the Fernland, Cheminis, and Bear zones;
  • expected capital requirements and sources of funding; and
  • other future events or developments.
When used in this release, any statements that express or involve discussions with respect to predictions, beliefs, plans, projections, objectives, assumptions or future events of performance (often but not always using words or phrases such as “anticipate”, “believe”, “estimate”, “expect”, “intend”, “plan”, “strategy”, “goals”, “objectives”, “project”, “potential” or variations thereof or stating that certain actions, events, or results “may”, “could”, “would”, “might” or “will” be taken, occur or be achieved, or the negative of any of these terms and similar expressions), as they relate to the Company or management, are intended to identify forward-looking statements. Such statements reflect the Company’s current views with respect to future events and are subject to certain known and unknown risks, uncertainties and assumptions.
Forward-looking statements are necessarily based upon estimates and assumptions, which are inherently subject to significant business, economic and competitive uncertainties and contingencies, many of which are beyond the Company’s control and many of which, regarding future business decisions, are subject to change. Assumptions underlying the Company’s expectations regarding forward-looking statements contained in this release include, among others: MAG’s ability to carry on its various exploration and development activities including project development timelines, the timely receipt of required approvals and permits, the price of the minerals produced, the costs of operating, exploration and development expenditures, the impact on operations of the Mexican tax and legal regimes, MAG’s ability to obtain adequate financing, outbreaks or threat of an outbreak of a virus or other contagions or epidemic disease will be adequately responded to locally, nationally, regionally and internationally.
Although MAG believes the expectations expressed in such forward-looking statements are based on reasonable assumptions, such statements are not guarantees of future performance and actual results or developments may differ materially from those in the forward-looking statements. These forward-looking statements involve known and unknown risks, uncertainties and many factors could cause actual results, performance or achievements to be materially different from any future results, performance or achievements that may be expressed or implied by such forward-looking statements including amongst others: commodities prices; changes in expected mineral production performance; unexpected increases in capital costs or cost overruns; exploitation and exploration results; continued availability of capital and financing; general economic, market or business conditions; risks relating to the Company’s business operations; risks relating to the financing of the Company’s business operations; risks related to the Company’s ability to comply with restrictive covenants and maintain financial covenants pursuant to the terms of the Credit Facility; the expected use of the Credit Facility; risks relating to the development of Juanicipio and the minority interest investment in the same; risks relating to the Company’s property titles; risks related to receipt of required regulatory approvals; pandemic risks; supply chain constraints and general costs escalation in the current inflationary environment heightened by the invasion of Ukraine by Russia and the events relating to the Israel-Hamas war; risks relating to the Company’s financial and other instruments; operational risk; environmental risk; political risk; currency risk; market risk; capital cost inflation risk; risk relating to construction delays; the risk that data is incomplete or inaccurate; the risks relating to the limitations and assumptions within drilling, engineering and socio-economic studies relied upon in preparing economic assessments and estimates, including the 2017 PEA; as well as those risks more particularly described under the heading “Risk Factors” in the Company’s Annual Information Form dated March 27, 2023 available under the Company’s profile on SEDAR+ at www.sedarplus.ca .
Should one or more of these risks or uncertainties materialize, or should underlying assumptions prove incorrect, actual results may vary materially from those described herein. This list is not exhaustive of the factors that may affect any of the Company’s forward-looking statements. The Company’s forward-looking statements are based on the beliefs, expectations and opinions of management on the date the statements are made and, other than as required by applicable securities laws, the Company does not assume any obligation to update forward-looking statements if circumstances or management’s beliefs, expectations or opinions should change. For the reasons set forth above, investors should not attribute undue certainty to or place undue reliance on forward-looking statements.
Please Note: Investors are urged to consider closely the disclosures in MAG's annual and quarterly reports and other public filings, accessible through the Internet at www.sedarplus.ca and www.sec.gov
LEI: 254900LGL904N7F3EL14

For further information on behalf of MAG Silver Corp. Contact Michael J. Curlook, Vice President, Investor Relations and Communications Phone: (604) 630-1399 Toll Free: (866) 630-1399 Email:info@magsilver.com 
https://preview.redd.it/d8wzg8yzze0d1.jpg?width=66&format=pjpg&auto=webp&s=a39ec6a39761447bbd4dbd77e92aef49e95e583e
https://preview.redd.it/qr1wv0zzze0d1.png?width=4000&format=png&auto=webp&s=fadeb32c9245f8b70d903b1c70321decddf77985
Universal Site Links
MAG SILVER CORP.
STOCK METAL DATABASE
ADD TICKER TO THE DATABASE
www.reddit.com/Treaty_Creek
REPORT AN ERROR
submitted by Then_Marionberry_259 to Treaty_Creek [link] [comments]


2024.05.14 15:25 OrganizationGreat248 Unlucky Isekai Life (Part 2 of 6)

Ruby groaned as the alarm went off signaling that one of her charges had arrived back from their mission. While troublesome in its own right, what really got under her skin was that she only had one charge at the moment, and that edge lord piece of shit wasn’t supposed to complete his task for AT LEAST another 4 deca-cycles according to the prediction algorithm. Grumbling to herself, she rolled out of bed and poured herself a glass of water to offset the hangover she was trying to recover from.

A few moments later she was gliding down the hall to the meeting room. She knew Jason was going to pitch a fit that she had left him waiting, the self-entitled brat always did think the world revolved around him; but perhaps he should have thought about that before freaking dying so early. If he wanted her to be there to meet him upon death, he could at least have the decency to not die the morning after one of her binges.

Other staff members gave her a wide berth, even if it was a hollow title, she was still technically far above basically anyone else in the pecking order, at least those who had a physical presence within the Agency. She knew they all mocked her behind her back, even divine beings were sadly prone towards gossip. She put the anger at her subordinates/coworkers out of her mind for now; even if she didn’t particularly LIKE Jason, he still didn’t deserve her coming in with baggage.

Lost in her thoughts, she hadn’t noticed that she’d arrived in front of the conference room door. She had been mulling over her thoughts, just staring into nothingness, for several minutes before she finally snapped back to the present. With a soft rap on the door, she opened it and floated inside. Jason was lounging, sprawled out on the regally padded chair throne he so fancied.

They exchanged pleasantries before she sat down to go over the mission summary. Upon seeing the cause of death, she had regrettably lost her composure and started to laugh uncontrollably. Her mighty subordinate had been felled by a goblin?! The mighty Jason Alexander Coyle, “mercenary extraordinaire”, had gotten his shit kicked in by a lowly goblin using what looked like a shiny butter knife. Oh, it was just too rich to not laugh at the absurdity.

It took her much longer than she would like to admit, to stop laughing. Jason of course wore a sour look through the entire endeavor. She shrugged it off, she had little doubt that if the same thing had happened to someone else, he would have been right beside her doubled over in laughter. Hell, once he was in a less pissy mood, she might even be able to get him to laugh about it later.

As luck would have it, it appeared that Jason’s actions had been enough to alter the tides of the war. The kingdom, and its divinity, would still lose many to the battles ahead, but Jason had done enough that the Agency could still bill the client for services rendered. As she spoke, she could see the disdain the man had for her, he always complained that she was drunk and reeked of liquor. Sure, that was often true, but he didn’t need to be such a stick in the mud about it all.

She went ahead and authorized the transfer of credits to Jason’s account. As soon as she did so, he opened up the store page and tuned her out. She watched him open up the back-channel site and purchase something, a small part of her wondered who was going to get roasted over the coals this time for allowing their admin privileges to be hacked. She toyed with the idea of bringing up his illegal actions, but truth be told she didn’t really give a shit. The other divinities were far too lax with their security, it had been child's play for one of her previous wards to hack into the Agency’s system and build the black site.

She’d ask him once about the whole thing, didn’t really grasp as much as she would have liked, but basically it functioned by spoofing a handler's credentials. This allowed the user to gain access to encrypted parts of the network, specifically access to certain privileged services that handlers enjoyed and most importantly, access to the mission assignment database. Users could buy and sell restricted or banned goods, and a part of the profits would be siphoned off to her ward’s personal account.

With Jason’s attention otherwise occupied, Ruby went ahead and reviewed the logs for his previous mission. Something about it was nagging at her. She couldn’t put it into words; however, the whole series of events just didn’t feel like ‘bad luck’. Using her divine authority, she rewound events, watching Jason’s lungs unfill with blood and refill with air.

The goblin skulked back to its den of corpses, resheathing the dagger at its hips, and reburied itself underneath the bodies. She let it rewind another few moments before stopping the feed and letting it run at normal time. She watched the goblin, slowly shifting the bodies out of the way, making sure they made no noise when it moved them. Slowly, carefully, it began to creep towards Jason’s exposed back. It drew the blade, again slowly and quietly. It closed the distance making sure to never let Jason see it or to give him any reason to think someone was behind him. Then in a flash of movement it leapt, burying the dagger right into a joint in Jason’s armor. The placement was perfect, no resistance, so the blade sank to the hilt. Allowing it to puncture Jason’s right lung.

Ruby rewound the log once more. This was wrong, very wrong. The goblin was way too good to just be some random grunt. Its movements were too smooth, its aim too precise. No, she was sure of it now, this was not a normal goblin. She focused her attention on the thing, aiming to scan the goblin for abnormalities, the dust covering it offering a surprising level of resistance to her scan. Not enough to stop her from doing what she wanted, but more resistance than she felt was reasonable for the anti-magic powder.

When she finally gained access to the monster’s stat block, her suspicions were proven correct. That was no normal goblin, that was a Redcap, a Redcap assassin no less. What in the dozen hells was a Redcap assassin doing in the middle of a freaking battlefield?! Such a valuable unit wouldn’t be used on the front lines, their skill set was terribly suited for the chaos that was an active battle. No, something was very wrong here and Ruby was going to figure out what.

As her mind raced trying to puzzle out what the actual fuck was going on, something else about the goblin flagged in her mind. It had come out of the corpse pile with the dagger already in its possession. She highlighted the various bodies that had made up the goblin's hidey hole, and then rewound the scene back. Every time one of the highlighted bodies met their fate, she froze the moment and pulled the scene into a separate window. It took a few minutes, but she eventually had all of the corpses frozen in the heartbeat before their deaths. She went through and scanned every single individual. Not a single one had been equipped with a magic disruptor blade. “So, where the fuck did the Redcap get a kingdom issued disruptor?”

Looking up, she saw that Jason was still fiddling with whatever it was that he bought. She tried to make idle conversation with the man, but he had gone full auto pilot, giving curt one-to-two word answers when asked a question or having to respond to a comment. She rolled her eyes, as much as she and him butted heads, she did have to admit that she did kind of like the guy. He had been going a little too hard into the whole dark and brooding edge lord thing recently, but that was hardly his fault. The human soul was ill suited to withstand the trauma of death, much less multiple deaths. The Agency usually did a memory scrub every couple missions, to prevent that kind of issue, but Jason had been dodging the screenings. For a moment she considered just letting sleeping dogs lie. Jason was dead and the mission was over regardless of what she might find, but the whole thing just rubbed her the wrong way.

Taking a little nip from her pocket flask, she once more focuses her attention on the Redcap. After scrubbing through the last several months of the creature’s life, she finally finds what she was looking for. The blade had come from one of Jason’s personal guards.

Ruby did a deep dive on the guard, and what came back made her blood run cold. The man had recently lost his lover. Jason had ordered a company to mop up a fleeing enemy force, before it could regroup and cause more issues. The entire thing had been a ruse and the company had been slaughtered to the last. The guard's lover had been part of that company. The loss had hit the man hard, driving him to the only rock left in his life. His deep belief in the kingdom’s divinity.

And wouldn’t you know it, apparently the kingdom’s divinity had some issues with Jason that it couldn’t be bothered to address through the proper channels. So instead of letting Ruby handle the trainwreck that was Jason’s social skills, this little scum lord of a God, had taken upon themself to deal with the issue. Several months of holy visions were enough to convince the grieving widow to betray everyone and everything he had ever known.

Once the guard had been properly brainwashed into turning his coat, it had been a simple matter to worm his way on to all of Jason’s post-fight surveys of the battlefield. The magic scanners that were exclusive to Jason’s retinue, had allowed him to see that Jason’s inhuman ability to avoid taking damage was really just a creative use of high-level magic. High-level magic that could have easily been used to save many of the kingdom’s soldiers. But of course, Jason believed himself too good to give the common man a means to protect themselves and those they loved. All this knowledge was of course worthless to the guard, he was nowhere near skilled enough to actually challenge Jason. But wouldn’t you know it, the divinity had thought of that too.

The podunk worm had brokered a secret deal with the enemy he’d contracted the Agency to deal with. In exchange for getting rid of a thorn in the God’s side, it would use its powers to scale back the war. Instead of facing a war of eradication, the enemy would be allowed to keep some of the land it had conquered.

At the urging of his God, the guard held a series of clandestine meetings with the Redcap. Imparting all the information he had learned in the months of shadowing Jason. He also gave the beast two gifts, the first was a Disruptor blade the guard had swiped from a fellow honor guard; when Jason’s corpse was found the blade would be traced back to the unfortunate guard instead of the traitor. The second was a satchel of Grarothian powder that had been blessed by the divinity, to ensure that Jason wouldn’t see the attack coming. It had worked of course; Jason hadn’t even known he was in danger till the blade was already buried in his lung. Oh, she was going to have the wannabe God’s head on a pike after this.

It pained her to admit it, but Jason deserved the final say in how this was all going to go down. She attempted to grab his attention, but the man was lost in his own little world. She tried waving her hands, ignored. She tried snapping her fingers in his ears, ignored. She even went so far as to beat her wings, blasting his face with the wind force of just under a category 1 hurricane; again ignored. Her rage was starting to reach fever pitch. So, she defaulted to the most tried and true method of stress reduction she had in her arsenal. She decided the only way for herself and Jason, once he knew the truth, to calm down would be to relax with a drink of the finest Earth treats.

With a heavy heart she opened up her most beloved extra planer storage space. This place was used for the only two things Ruby really cared about anymore. It was where she kept her most prized and coveted liquor, and where she kept the last few mementos, she possessed of her fallen wards. Her eyes scanned the room, she needed to pick the right apology gift. As she carefully made her way towards the back, she saw it. Tucked in about two thirds of the way to the back wall, stood a single hogshead of ancient scotch whiskey. The second to last gift she had received from one of her dearest friends, all those years ago.

Yes, this was the correct one. She felt it deep within her chest, a proper atonement requires a proper level of sacrifice. With a heavy heart she lifted the barrel over her head and began to stride out of the extra dimensional space. As she neared the opening, the soft clink of something falling and a flash of gold caught her eye. Sitting on a tiny end table was a small pouch of coins, one of which had somehow gotten loose and tumbled face up onto the polished table face.

For a moment she hesitated, she knew exactly what those coins were; and knew how much trouble she would get into if upper management found out she had them. That said, she also knew a sign when she saw one. The artifacts that she held within this place were the last remnants of those she had failed most of all. She pondered the meaning behind the fact that two of her previous charges seemed to have taken a shine to Jason, offering up to him their most precious of gifts. With a heavy heart and a plea to those long lost, she grabbed the coin before closing the pocket dimension.

With a loud *CLUNK* She set the hogshead down. Apparently, the sound of the barrel had finally made enough noise to draw Jason’s attention away from his screen. From a much smaller storage pocket she produced two crystal glasses. Pouring a hefty serving into each glass, she set one down in front of herself and the other in front of Jason. Locking eyes with the man, she said a single word.

“Drink”

The man twisted his face up in disgust at the sight of the liquor.

“Thanks, but no thanks, I’m not inclined to degr...”

“I said, DRINK!” Ruby growl bellows, casting the Command spell on the last word. Jason, despite his best efforts to ignore the compulsion, is forced to do as he is told, and takes a hearty swig of his hundred-year-old Scotch. With a smile on her lips, Ruby takes the opportunity to sip the illustrious gift. The hours melt away as they both sip and savor the deep complex flavors of this legendary brew.

As the drink flows her recollection of events becomes just a tad bit hazy. She can’t really remember how long it takes, but she does eventually come clean about the reason for this impromptu bout of drinking. It comes as little shock that Jason is... less than pleased to learn about the events that led to his death. He downs the rest of his drink in a single gulp, a waste of grand booze in Ruby’s opinion, and demands she fill his next one to the brim. For the first time in FAR too long, Ruby gets to see the Jason she had known all those years ago was still in there.

As the festivities carried on, she would occasionally catch him fiddling with the token he had bought. Curiosity finally getting the better of her, she decided to ask him about it, deciding to NOT mention that she knew it was illicitly purchased. He was cagey about it at first, but eventually loosened up and told her the truth.

He had grown bored with the usual missions that he had been assigned. He was sick of always having to play support, always cleaning up someone else’s messes, always laying the groundwork for someone else’s story. So, he had decided to cash in his points, and finally make use of the vacation time he had accrued. He had picked out what looked to be a pretty basic Isekai mission. Ruby suggested not mentioning his luck to anyone else, even she was aware how rare and coveted those missions were.

As the night wound to a close, they said their goodbyes. Before taking her leave, Ruby remembered the other present she had for Jason. A sharp whistle was the only warning she gave him before flicking the coin at his head. Even drunk, the man’s senses were still a thing to marvel at as he caught it in midair .

“The fuck is this?”

“Think of it as a gift.” She snorts.

“Oh, how generous of you. A whole gold coin, whatever will I spend it on.” Jason responds as he jangles the large coin pouch at his hip.

“Oh, fuck off. I’ll take it back if you’re going to be a brat about it.”

Jason drops the coin into his wallet and shakes it again for good measure. “Oops, too late now. Guess you’ll just have to let me keep it.” He gives her a smug grin.

She scoffed before turning around and making for the door. She could hear him activate the token as she closed the door behind her. As she wandered down the hallways back to her room, she pondered the events of the day. The rogue client would need to be dealt with, but she still wasn’t sure if burying him in legal paperwork for the next millennia or two, or just giving him a good old fashion human curb stomping, was the better punishment for his actions.

The choices bounced around in her head till she finally reached her residence. Having made no real progress in deciding her actions, she elected to just table the decision till she woke up next. The God was small time, so it wasn’t like it was going anywhere.

She took her time getting ready to sleep. Being a divine being herself, she didn’t actually NEED to sleep, but she did so enjoy the human customs surrounding the whole process. She took a long hot bath to unwind, before summoning a pair of adorable pajamas. Her body clean, and her mind at peace she laid down in her oversized excessively fluffy bed.

She had barely closed her eyes and began to drift off to blissful sleep, before she was awoken once again by the sound of her alarm going off.

“You have got to be shitting me. HOW?!?!”
submitted by OrganizationGreat248 to HFY [link] [comments]


2024.05.14 14:01 Zappingsbrew A post talking about 400 words

abandon, ability, able, about, above, absence, absolute, absolutely, abstract, abundance, academy, accent, accept, access, accident, accompany, accomplish, according, account, accurate, achieve, achievement, acid, acknowledge, acquire, across, action, active, activity, actor, actual, actually, adapt, addition, additional, address, adequate, adjust, administration, admire, admission, admit, adolescent, adopt, adult, advance, advantage, adventure, advertise, advice, advise, adviser, advocate, affair, affect, afford, afraid, after, afternoon, again, against, age, agency, agenda, agent, aggressive, ago, agree, agreement, agriculture, ahead, aid, aim, air, aircraft, airline, airport, alarm, album, alcohol, alive, all, alliance, allow, ally, almost, alone, along, already, also, alter, alternative, although, always, amateur, amazing, ambition, ambulance, among, amount, analysis, analyst, analyze, ancient, and, anger, angle, angry, animal, anniversary, announce, annual, another, answer, anticipate, anxiety, any, anybody, anymore, anyone, anything, anyway, anywhere, apart, apartment, apologize, apparent, apparently, appeal, appear, appearance, apple, application, apply, appoint, appointment, appreciate, approach, appropriate, approval, approve, approximately, architect, area, argue, argument, arise, arm, armed, army, around, arrange, arrangement, arrest, arrival, arrive, art, article, artist, artistic, as, ashamed, aside, ask, asleep, aspect, assault, assert, assess, assessment, asset, assign, assignment, assist, assistance, assistant, associate, association, assume, assumption, assure, at, athlete, athletic, atmosphere, attach, attack, attempt, attend, attention, attitude, attorney, attract, attraction, attractive, attribute, audience, author, authority, auto, available, average, avoid, award, aware, awareness, away, awful, baby, back, background, bad, badly, bag, balance, ball, ban, band, bank, bar, barely, barrel, barrier, base, baseball, basic, basically, basis, basket, basketball, bath, bathroom, battery, battle, be, beach, bear, beat, beautiful, beauty, because, become, bed, bedroom, bee, beef, beer, before, begin, beginning, behavior, behind, being, belief, believe, bell, belong, below, belt, bench, bend, beneath, benefit, beside, besides, best, bet, better, between, beyond, bicycle, big, bike, bill, billion, bind, biological, bird, birth, birthday, bit, bite, black, blade, blame, blanket, blind, block, blood, blow, blue, board, boat, body, bomb, bombing, bond, bone, book, boom, boot, border, boring, born, borrow, boss, both, bother, bottle, bottom, boundary, bowl, box, boy, boyfriend, brain, branch, brand, brave, bread, break, breakfast, breast, breath, breathe, brick, bridge, brief, briefly, bright, brilliant, bring, broad, broken, brother, brown, brush, buck, budget, build, building, bullet, bunch, burden, burn, bury, bus, business, busy, but, butter, button, buy, buyer, by, cabin, cabinet, cable, cake, calculate, call, camera, camp, campaign, campus, can, Canadian, cancer, candidate, cap, capability, capable, capacity, capital, captain, capture, car, carbon, card, care, career, careful, carefully, carrier, carry, case, cash, cast, cat, catch, category, Catholic, cause, ceiling, celebrate, celebration, celebrity, cell, center, central, century, CEO, ceremony, certain, certainly, chain, chair, chairman, challenge, chamber, champion, championship, chance, change, changing, channel, chapter, character, characteristic, characterize, charge, charity, chart, chase, cheap, check, cheek, cheese, chef, chemical, chest, chicken, chief, child, childhood, Chinese, chip, chocolate, choice, cholesterol, choose, Christian, Christmas, church, cigarette, circle, circumstance, cite, citizen, city, civil, civilian, claim, class, classic, classroom, clean, clear, clearly, client, climate, climb, clinic, clinical, clock, close, closely, closer, clothes, clothing, cloud, club, clue, cluster, coach, coal, coalition, coast, coat, code, coffee, cognitive, cold, collapse, colleague, collect, collection, collective, college, colonial, color, column, combination, combine, come, comedy, comfort, comfortable, command, commander, comment, commercial, commission, commit, commitment, committee, common, communicate, communication, community, company, compare, comparison, compete, competition, competitive, competitor, complain, complaint, complete, completely, complex, complexity, compliance, complicate, complicated, component, compose, composition, comprehensive, computer, concentrate, concentration, concept, concern, concerned, concert, conclude, conclusion, concrete, condition, conduct, conference, confidence, confident, confirm, conflict, confront, confusion, Congress, congressional, connect, connection, consciousness, consensus, consequence, conservative, consider, considerable, consideration, consist, consistent, constant, constantly, constitute, constitutional, construct, construction, consultant, consume, consumer, consumption, contact, contain, container, contemporary, content, contest, context, continue, continued, contract, contrast, contribute, contribution, control, controversial, controversy, convention, conventional, conversation, convert, conviction, convince, cook, cookie, cooking, cool, cooperation, cop, cope, copy, core, corn, corner, corporate, corporation, correct, correspondent, cost, cotton, couch, could, council, count, counter, country, county, couple, courage, course, court, cousin, cover, coverage, cow, crack, craft, crash, crazy, cream, create, creation, creative, creature, credit, crew, crime, criminal, crisis, criteria, critic, critical, criticism, criticize, crop, cross, crowd, crucial, cry, cultural, culture, cup, curious, current, currently, curriculum, custom, customer, cut, cycle, dad, daily, damage, dance, danger, dangerous, dare, dark, darkness, data, database, date, daughter, day, dead, deal, dealer, dear, death, debate, debt, decade, decide, decision, deck, declare, decline, decrease, deep, deeply, deer, defeat, defend, defendant, defense, defensive, deficit, define, definitely, definition, degree, delay, deliver, delivery, demand, democracy, Democratic, Democrat, demonstrate, demonstration, deny, department, depend, dependent, depending, depict, depression, depth, deputy, derive, describe, description, desert, deserve, design, designer, desire, desk, desperate, despite, destroy, destruction, detail, detailed, detect, detection, detective, determine, develop, developing, development, device, devil, dialogue, diet, differ, difference, different, differently, difficult, difficulty, dig, digital, dimension, dining, dinner, direct, direction, directly, director, dirt, disability, disagree, disappear, disaster, discipline, disclose, discover, discovery, discrimination, discuss, discussion, disease, dish, dismiss, disorder, display, dispute, distance, distinct, distinction, distinguish, distribute, distribution, district, diverse, diversity, divide, division, divorce, DNA, do, doctor, document, dog, domestic, dominant, dominate, door, double, doubt, down, downtown, dozen, draft, drag, drama, dramatic, dramatically, draw, drawer, drawing, dream, dress, drink, drive, driver, drop, drug, dry, due, during, dust, duty, dwell, dying, dynamic, each, eager, ear, earlier, early, earn, earnings, earth, earthquake, ease, easily, east, eastern, easy, eat, economic, economy, edge, edit, edition, editor, educate, education, educational, educator, effect, effective, effectively, efficiency, efficient, effort, egg, eight, either, elderly, elect, election, electric, electrical, electricity, electronic, element, elementary, eliminate, elite, else, elsewhere, e-mail, embrace, emerge, emergency, emission, emotion, emotional, emphasis, emphasize, employ, employee, employer, employment, empty, enable, encounter, encourage, end, enemy, energy, enforcement, engage, engine, engineer, engineering, English, enhance, enjoy, enormous, enough, ensure, enter, enterprise, entertain, entertainment, entire, entirely, entrance, entry, environment, environmental, episode, equal, equally, equipment, equivalent, era, error, escape, especially, essay, essential, essentially, establish, establishment, estate, estimate, etc, ethics, ethnic, European, evaluate, evaluation, evening, event, eventually, ever, every, everybody, everyday, everyone, everything, everywhere, evidence, evolution, evolve, exact, exactly, exam, examination, examine, example, exceed, excellent, except, exception, exchange, exciting, executive, exercise, exhibit, exhibition, exist, existence, existing, expand, expansion, expect, expectation, expense, expensive, experience, experiment, expert, explain, explanation, explode, explore, explosion, expose, exposure, express, expression, extend, extension, extensive, extent, external, extra, extraordinary, extreme, extremely, eye, fabric, face, facility, fact, factor, factory, faculty, fade, fail, failure, fair, fairly, faith, fall, false, familiar, family, famous, fan, fantasy, far, farm, farmer, fashion, fast, fat, fate, father, fault, favor, favorite, fear, feature, federal, fee, feed, feel, feeling, fellow, female, fence, festival, few, fewer, fiber, fiction, field, fifteen, fifth, fifty, fight, fighter, fighting, figure, file, fill, film, final, finally, finance, financial, find, finding, fine, finger, finish, fire, firm, first, fish, fishing, fit, fitness, five, fix, flag, flame, flat, flavor, flee, flesh, flight, float, floor, flow, flower, fly, focus, folk, follow, following, food, foot, football, for, force, foreign, forest, forever, forget, form, formal, formation, former, formula, forth, fortune, forward, found, foundation, founder, four, fourth, frame, framework, free, freedom, freeze, French, frequency, frequent, frequently, fresh, friend, friendly, friendship, from, front, fruit, frustration, fuel, fulfill, full, fully, fun, function, fund, fundamental, funding, funeral, funny, furniture, furthermore, future, gain, galaxy, gallery, game, gang, gap, garage, garden, garlic, gas, gate, gather, gay, gaze, gear, gender, gene, general, generally, generate, generation, genetic, gentleman, gently, German, gesture, get, ghost, giant, gift, gifted, girl, girlfriend, give, given, glad, glance, glass, global, glove, go, goal, God, gold, golden, golf, good, govern, government, governor, grab, grace, grade, gradually, graduate, grain, grand, grandmother, grant, grass, grave, gray, great, green, grocery, ground, group, grow, growing, growth, guarantee, guard, guess, guest, guide, guideline, guilty, gun, guy, habit, habitat, hair, half, hall, hand, handful, handle, hang, happen, happy, harbor, hard, hardly, hat, hate, have, he, head, headline, headquarters, health, healthy, hear, hearing, heart, heat, heaven, heavily, heavy, heel, height, helicopter, hell, hello, help, helpful, hence, her, herb, here, heritage, hero, herself, hey, hi, hide, high, highlight, highly, highway, hill, him, himself, hip, hire, his, historic, historical, history, hit, hold, hole, holiday, holy, home, homeless, honest, honey, honor, hope, horizon, horror, horse, hospital, host, hot, hotel, hour, house, household, housing, how, however, huge, human, humor, hundred, hungry, hunter, hunting, hurt, husband, hypothesis, ice, idea, ideal, identification, identify, identity, ignore, ill, illegal, illness, illustrate, image, imagination, imagine, immediate, immediately, immigrant, immigration, impact, implement, implication, imply, importance, important, impose, impossible, impress, impression, impressive, improve, improvement, incentive, incident, include, including, income, incorporate, increase, increased, increasingly, incredible, indeed, independence, independent, index, indicate, indication, individual, industrial, industry, infant, infection, inflation, influence, inform, information, ingredient, initial, initially, initiative, injury, inner, innocent, inquiry, inside, insight, insist, inspire, install, instance, instead, institute, institution, institutional, instruction, instructor, instrument, insurance, intellectual, intelligence, intend, intense, intensity, intention, interaction, interest, interested, interesting, internal, international, Internet, interpret, interpretation, intervention, interview, introduce, introduction, invasion, invest, investigation, investigator, investment, investor, invite, involve, involved, involvement, Iraqi, Irish, iron, Islamic, island, Israeli, issue, it, Italian, item, its, itself, jacket, jail, Japanese, jet, Jew, Jewish, job, join, joint, joke, journal, journalist, journey, joy, judge, judgment, juice, jump, junior, jury, just, justice, justify, keep, key, kick, kid, kill, killer, killing, kind, king, kiss, kitchen, knee, knife, knock, know, knowledge, lab, label, labor, laboratory, lack, lady, lake, land, landscape, language, lap, large, largely, last, late, later, Latin, latter, laugh, launch, law, lawsuit, lawyer, lay, layer, lead, leader, leadership, leading, leaf, league, lean, learn, learning, least, leather, leave, left, leg, legacy, legal, legend, legislation, legislative, legislator, legitimate, lemon, length, less, lesson, let, letter, level, liberal, library, license, lie, life, lifestyle, lifetime, lift, light, like, likely, limit, limitation, limited, line, link, lip, list, listen, literary, literature, little, live, living, load, loan, local, locate, location, lock, long, long-term, look, loose, lose, loss, lost, lot, lots, loud, love, lovely, lover, low, lower, luck, lucky, lunch, luxury, machine, mad, magazine, mail, main, mainly, maintain, maintenance, major, majority, make, maker, makeup, male, mall, man, manage, management, manager, manner, manufacturer, manufacturing, many, map, margin, mark, market, marketing, marriage, married, marry, mask, mass, massive, master, match, material, math, matter, may, maybe, mayor, me, meal, mean, meaning, meanwhile, measure, measurement, meat, mechanism, media, medical, medication, medicine, medium, meet, meeting, member, membership, memory, mental, mention, menu, mere, merely, mess, message, metal, meter, method, Mexican, middle, might, military, milk, million, mind, mine, minister, minor, minority, minute, miracle, mirror, miss, missile, mission, mistake, mix, mixture, mm-hmm, mode, model, moderate, modern, modest, mom, moment, money, monitor, month, mood, moon, moral, more, moreover, morning, mortgage, most, mostly, mother, motion, motivation, motor, mountain, mouse, mouth, move, movement, movie, Mr, Mrs, Ms, much, multiple, murder, muscle, museum, music, musical, musician, Muslim, must, mutual, my, myself, mystery, myth, naked, name, narrative, narrow, nation, national, native, natural, naturally, nature, near, nearby, nearly, necessarily, necessary, neck, need, negative, negotiate, negotiation, neighbor, neighborhood, neither, nerve, nervous, net, network, never, nevertheless, new, newly, news, newspaper, next, nice, night, nine, no, nobody, nod, noise, nomination, nominee, none, nonetheless, nor, normal, normally, north, northern, nose, not, note, nothing, notice, notion, novel, now, nowhere, nuclear, number, numerous, nurse, nut, object, objective, obligation, observation, observe, observer, obtain, obvious, obviously, occasion, occasionally, occupation, occupy, occur, ocean, odd, odds, of, off, offense, offensive, offer, office, officer, official, often, oh, oil, okay, old, Olympic, on, once, one, ongoing, onion, online, only, onto, open, opening, operate, operating, operation, operator, opinion, opponent, opportunity, oppose, opposed, opposite, opposition, option, or, orange, order, ordinary, organic, organization, organize, orientation, origin, original, originally, other, others, otherwise, ought, our, ours, ourselves, out, outcome, outside, oven, over, overall, overcome, overlook, owe, own, owner, pace, pack, package, page, pain, painful, paint, painter, painting, pair, pale, Palestinian, palm, pan, panel, panic, pant, paper, paragraph, parent, park, parking, part, participant, participate, participation, particle, particular, particularly, partly, partner, partnership, party, pass, passage, passenger, passion, past, patch, path, patient, pattern, pause, pay, payment, PC, peace, peak, peer, pen, penalty, people, pepper, per, perceive, percentage, perception, perfect, perfectly, perform, performance, perhaps, period, permanent, permission, permit, person, personal, personality, personally, personnel, perspective, persuade, pet, phase, phenomenon, philosophy, phone, photo, photographer, phrase, physical, physically, physician, piano, pick, picture, pie, piece, pile, pilot, pine, pink, pipe, pitch, place, plan, plane, planet, planning, plant, plastic, plate, platform, play, player, please, pleasure, plenty, plot, plus, PM, pocket, poem, poet, poetry, point, police, policy, political, politically, politician, politics, poll, pollution, pool, poor, pop, popular, population, porch, port, portion, portrait, portray, pose, position, positive, possess, possession, possibility, possible, possibly, post, pot, potato, potential, potentially, pound, pour, poverty, powder, power, powerful, practical, practice, prayer, preach, precisely, predict, prediction, prefer, preference, pregnancy, pregnant, preparation, prepare, prescription, presence, present, presentation, preserve, president, presidential, press, pressure, pretend, pretty, prevent, previous, previously, price, pride, priest, primarily, primary, prime, principal, principle, print, prior, priority, prison, prisoner, privacy, private, probably, problem, procedure, proceed, process, processing, processor, proclaim, produce, producer, product, production, profession, professional, professor, profile, profit, program, progress, progressive, project, prominent, promise, promote, prompt, proof, proper, properly, property, proportion, proposal, propose, prosecutor, prospect, protect, protection, protein, protest, proud, prove, provide, provider, province, provision, psychological, psychology, public, publication, publicity, publish, publisher, pull, punishment, purchase, pure, purpose, pursue, push, put, qualify, quality, quarter, quarterback, quarterly, queen, quest, question, quick, quickly, quiet, quietly, quit, quite, quote, race, racial, radiation, radical, radio, rail, rain, raise, range, rank, rapid, rapidly, rare, rarely, rate, rather, rating, ratio, raw, reach, react, reaction, reader, reading, ready, real, reality, realize, really, reason, reasonable, recall, receive, recent, recently, reception, recipe, recipient, recognition, recognize, recommend, recommendation, record, recording, recover, recovery, recruit, red, reduce, reduction, refer, reference, reflect, reflection, reform, refugee, refuse, regard, regarding, regardless, regime, region, regional, register, regular, regularly, regulate, regulation, regulator, reinforce, reject, relate, relation, relationship, relative, relatively, relax, release, relevant, relief, religion, religious, rely, remain, remaining, remarkable, remember, remind, remote, remove, repeat, repeatedly, replace, replacement, reply, report, reporter, represent, representation, representative, Republican, reputation, request, require, requirement, research, researcher, resemble, reservation, resident, residential, resign, resist, resistance, resolution, resolve, resort, resource, respect, respond, response, responsibility, responsible, rest, restaurant, restore, restriction, result, retain, retire, retirement, return, reveal, revenue, review, revolution, rhythm, rice, rich, rid, ride, rifle, right, ring, rise, risk, river, road, rock, role, roll, romantic, roof, room, root, rope, rose, rough, roughly, round, route, routine, row, rub, rubber, rude, ruin, rule, run, running, rural, rush, Russian, sacred, sad, safe, safety, sake, salad, salary, sale, sales, salt, same, sample, sanction, sand, satellite, satisfaction, satisfied, satisfy, sauce, save, saving, say, scale, scandal, scare, scatter, scenario, scene, schedule, scheme, scholar, scholarship, school, science, scientific, scientist, scope, score, scream, screen, script, sea, search, season, seat, second, secondary, secret, secretary, section, sector, secure, security, see, seed, seek, seem, segment, seize, select, selection, self, sell, Senate, senator, send, senior, sense, sensitive, sentence, separate, sequence, series, serious, seriously, servant, serve, service, session, set, setting, settle, settlement, seven, several, severe, sex, sexual, shade, shadow, shake, shall, shallow, shape, share, sharp, she, sheet, shelf, shell, shelter, shift, shine, ship, shirt, shock, shoe, shoot, shooting, shop, shopping, short, shortly, shot, should, shoulder, shout, show, shower, shrug, shut, shy, sibling, sick, side, sigh, sight, sign, signal, significant, significantly, silence, silent, silver, similar, similarly, simple, simply, sin, since, sing, singer, single, sink, sir, sister, sit, site, situation, six, size, ski, skill, skin, skirt, sky, slave, sleep, slice, slide, slight, slightly, slip, slow, slowly, small, smart, smell, smile, smoke, smooth, snap, snow, so, so-called, soccer, social, society, soft, software, soil, solar, soldier, sole, solid, solution, solve, some, somebody, somehow, someone, something, sometimes, somewhat, somewhere, son, song, soon, sophisticated, sorry, sort, soul, sound, soup, source, south, southern, Soviet, space, Spanish, speak, speaker, special, specialist, species, specific, specifically, specify, speech, speed, spend, spending, spin, spirit, spiritual, split, spoil, sponsor, sport, spot, spray, spread, spring, square, squeeze, stability, stable, staff, stage, stain, stair, stake, stand, standard, standing, star, stare, start, state, statement, station, statistical, status, stay, steady, steal, steel, steep, stem, step, stick, still, stimulate, stimulus, stir, stock, stomach, stone, stop, storage, store, storm, story, straight, strange, stranger, strategic, strategy, stream, street, strength, strengthen, stress, stretch, strike, string, strip, stroke, strong, strongly, structural, structure, struggle, student, studio, study, stuff, stupid, style, subject, submit, subsequent, substance, substantial, substitute, succeed, success, successful, successfully, such, sudden, suddenly, sue, suffer, sufficient, sugar, suggest, suggestion, suicide, suit, summer, summit, sun, super, supply, support, supporter, suppose, supposed, Supreme, sure, surely, surface, surgery, surprise, surprised, surprising, surprisingly, surround, survey, survival, survive, survivor, suspect, sustain, swear, sweep, sweet, swim, swing, switch, symbol, symptom, system, table, tactic, tail, take, tale, talent, talk, tall, tank, tap, tape, target, task, taste, tax, taxi, tea, teach, teacher, teaching, team, tear, technical, technique, technology, teen, teenager, telephone, telescope, television, tell, temperature, temporary, ten, tend, tendency, tennis, tension, tent, term, terms, terrible, territory, terror, terrorist, test, testimony, testing, text, than, thank, thanks, that, the, theater, their, them, theme, themselves, then, theory, therapy, there, therefore, these, they, thick, thin, thing, think, thinking, third, thirty, this, those, though, thought, thousand, threat, threaten, three, throat, through, throughout, throw, thus, ticket, tie, tight, time, tiny, tip, tire, tissue, title, to, tobacco, today, toe, together, toilet, token, tolerate, tomato, tomorrow, tone, tongue, tonight, too, tool, tooth, top, topic, toss, total, totally, touch, tough, tour, tourist, tournament, toward, towards, tower, town, toy, trace, track, trade, tradition, traditional, traffic, tragedy, trail, train, training, transfer, transform, transformation, transition, translate, translation, transmission, transmit, transport, transportation, travel, treat, treatment, treaty, tree, tremendous, trend, trial, tribe, trick, trip, troop, trouble, truck, true, truly, trust, truth, try, tube, tunnel, turn, TV, twelve, twenty, twice, twin, two, type, typical, typically, ugly, ultimate, ultimately, unable, uncle, undergo, understand, understanding, unfortunately, uniform, union, unique, unit, United, universal, universe, university, unknown, unless, unlike, until, unusual, up, upon, upper, urban, urge, us, use, used, useful, user, usual, usually, utility, utilize, vacation, valley, valuable, value, variable, variation, variety, various, vary, vast, vegetable, vehicle, venture, version, versus, very, vessel, veteran, via, victim, victory, video, view, viewer, village, violate, violation, violence, violent, virtually, virtue, virus, visibility, visible, vision, visit, visitor, visual, vital, voice, volume, voluntary, volunteer, vote, voter, voting, wage, wait, wake, walk, wall, wander, want, war, warm, warn, warning, wash, waste, watch, water, wave, way, we, weak, weakness, wealth, wealthy, weapon, wear, weather, web, website, wedding, week, weekend, weekly, weigh, weight, welcome, welfare, well, west, western, wet, what, whatever, wheel, when, whenever, where, whereas, whether, which, while, whisper, white, who, whole, whom, whose, why, wide, widely, widespread, wife, wild, wildlife, will, willing, win, wind, window, wine, wing, winner, winter, wipe, wire, wisdom, wise, wish, with, withdraw, within, without, witness, woman, wonder, wonderful, wood, wooden, word, work, worker, working, workout, workplace, works, workshop, world, worried, worry, worth, would, wound, wrap, write, writer, writing, wrong, yard, yeah, year, yell, yellow, yes, yesterday, yet, yield, you, young, your, yours, yourself, youth, zone.
submitted by Zappingsbrew to u/Zappingsbrew [link] [comments]


2024.05.14 13:49 Then_Marionberry_259 MAY 14, 2024 FDY.TO FARADAY COPPER INTERSECTS 0.41% COPPER OVER 42.02 METRES EXPANDING NEAR-SURFACE MINERALIZATION AT AREA 51 WITHIN THE COPPER CREEK PROJECT

MAY 14, 2024 FDY.TO FARADAY COPPER INTERSECTS 0.41% COPPER OVER 42.02 METRES EXPANDING NEAR-SURFACE MINERALIZATION AT AREA 51 WITHIN THE COPPER CREEK PROJECT
https://preview.redd.it/kexz4zycrd0d1.png?width=3500&format=png&auto=webp&s=684020fcf83866c3ff43bc87f3ac344b08fe8954
VANCOUVER, BC / ACCESSWIRE / May 14, 2024 / Faraday Copper Corp. ("Faraday" or the "Company") (TSX:FDY)(OTCQX:CPPKF) is pleased to announce the results of five drill holes from its Phase III program at the Copper Creek Project, located in Arizona, U.S. ("Copper Creek"). One hole was drilled to test a new target area 275 metres ("m") west of Keel and one hole was drilled to test the westward extension of Old Reliable. Three holes were drilled at Area 51 as a follow-up to the recent Starship and Eclipse breccia discoveries (announced on January 16, 2024 and March 4, 2024).
Paul Harbidge, President and CEO, commented "The Phase III drill program continues to demonstrate the exploration potential of the Copper Creek Project on a number of fronts. At Area 51, we continue to intersect and expand near-surface mineralization. At Old Reliable, mineralization is being further delineated outside of the mineral resource pit shell. Additionally, the first reconnaissance hole drilled at depth, west of Keel, confirms our thesis that there is the potential for significant mineralization to be discovered below the Old Reliable breccia complex. This new data will enable us to vector to high grade zones for further drill testing".
Highlights
  • At Area 51, intersected 42.05 m at 0.41% copper from 48.55 m in drill hole FCD-24-056 at the recently discovered Eclipse breccia.
    • This hole expands the known mineralization within the Eclipse breccia approximately 20 m to the east and 50 m to the north from previous intercepts**.**
  • Drilling 275 m west of Keel ("Keel West") intersected 51.45 m at 0.50% copper and 1.39 grams per tonne ("g/t") silver from 820.62 m in drill hole FCD-24-053. This intercept is within a longer intercept of 186.90 m at 0.32% copper from 820.62 m.
    • This hole is in a previously undrilled area outside the Mineral Resource Estimate ("MRE") and confirms that mineralization is open to the west of Keel and below the Old Reliable breccia.
  • Step-out to the west of Old Reliable intersected 70.35 m of 0.29% copper and 1.31 g/t silver from 55.53 m in drill hole FCD-24-054.
    • Mineralization is hosted in granodiorite porphyry and confirms that near-surface mineralization at Old Reliable remains open.
(For true width information see Table 1.)
Area 51 was identified as highly prospective by integrating airborne versatile time domain electromagnetic (VTEM) geophysical data and short wave infrared spectral data together with geological mapping and sampling. Area 51 encompasses a porphyry intrusion with nine mapped breccia bodies over an area of approximately 400 m by 400 m, including Starship and Eclipse. The breccias are interpreted to have been emplaced at a shallow crustal level in the hanging wall of the northwest trending Holy Joe thrust fault, which brought Proterozoic metamorphic rocks in contact with younger sedimentary rock units to the east of Area 51. This fault is also thought to have controlled the emplacement of the Paleocene Glory Hole volcanics and Copper Creek granodiorite which host the mineral resource.
Drill hole FCD-24-056 was collared northeast of the Eclipse breccia and drilled to the southwest to increase drill coverage for the Eclipse breccia (Figures 1 and 2). Mineralization is associated with chalcopyrite and minor bornite breccia cement. The hole started in granodiorite porphyry and intersected hydrothermal breccia from 28 m to 108 m followed by granodiorite porphyry to 131 m. The remainder of the hole to 187 m is in Glory Hole volcanics. The alteration in the breccia domain is quartz-sericite-pyrite with an interval from approximately 50 m to 70 m where tourmaline is abundant.
Drill hole FCD-24-051 was collared 250 m north of the Eclipse breccia and drilled to the southwest into the Ziltoid breccia (Figure 1). The hole intersected Glory Hole volcanics in the first 180 m, followed by 4 m of granodiorite porphyry. From 184 m to 247 m the dominant lithology is hydrothermal breccia. Alteration at the start of the breccia is sericitic but K-feldspar and biotite dominate from 190 m to the end of the hole.
Drill hole FCD-24-055 was collared southeast of the Eclipse breccia and drilled to the Northwest (Figure 1). The hole intercepted Glory Hole volcanics from surface to 49 m, followed by a series of granodiorite and monzogranite porphyries. From 136 m to 327 m the hole intersected hydrothermal breccia cemented by quartz, pyrite and specular hematite. Alteration within the breccia is intense quartz-sericite. Minor copper mineralization is associated with chalcocite near the upper contact of the breccia.
Keel West is the area between the Keel zone and Old Reliable. This area coincides with a prominent untested geophysical anomaly which extends westward from the known mineralization at the Mammoth breccia and Keel zone to below Old Reliable (Figure 3).
Drill hole FCD-24-053 was collared east of Old Reliable and drilled to the south-southeast (Figures 1 and 3). Mineralization is associated with bornite and chalcopyrite bearing veins with narrow sericite-biotite-K-feldspar alteration halos and the hole ends in mineralization. This type of bornite-rich, vein-hosted mineralization is known to be associated with high-grade mineralization and elevated gold grades at Keel and suggests the potential for other high-grade mineralized centers at depth below known near-surface mineralized breccias in the area.
Old Reliable was the site of small-scale underground mining for copper and molybdenum prior to World War II. Starting in the 1970s, an experimental in-situ leach operation recovered some of the near-surface copper oxide mineralization. The sulphide-hosted mineralization remains in place. During the 1990s, densely spaced vertical drilling led to resource definition to approximately 200 m below surface. Several of those drill holes end in mineralization and the resource is open at depth and laterally. Additional follow up drilling is planned for this area.
Drill hole FCD-24-054 was collared north of Old Reliable and drilled to the southwest (Figures 1 and 4). The hole was designed to test the westward extension of the mineralization outside of the open pit used to constrain the MRE. Mineralization is associated with disseminated and vein-hosted chalcopyrite within granodiorite porphyry. The drill hole intercepted Glory Hole volcanics from surface to 50 m and granodiorite porphyry to 208 m, returning to Glory Hole volcanics to 295 m and granodiorite for the last 12 m. Dominant alteration associated with the mineralization is sericite with kaolinite. Similar alteration is present in the Old Reliable breccia (as discussed in a news release dated April 10, 2024).
Figure 1: Plan View Showing Surface Geology and Location of Drill Holes
https://preview.redd.it/k3a8ev1drd0d1.jpg?width=1029&format=pjpg&auto=webp&s=1dd30f01638787c8d36ec0cde786c7170e0c6120
https://preview.redd.it/yskgh23drd0d1.jpg?width=997&format=pjpg&auto=webp&s=1948953710726727686ee4a97a698c90320972cb
https://preview.redd.it/n3zfl34drd0d1.jpg?width=1350&format=pjpg&auto=webp&s=6f37c03cbb7429067f229b5577f60951e8dac938
Figure 4: Cross Section Showing Drill Hole FCD-24-054 at Old Reliable
https://preview.redd.it/bxnpq85drd0d1.jpg?width=1126&format=pjpg&auto=webp&s=8dea1a1b8ef1b063acaf5d447be5f33f6ede0e7f
Table 1: Selected Drill Results from Copper Creek
https://preview.redd.it/srrqad6drd0d1.png?width=720&format=png&auto=webp&s=ead50c719f4bf3668d40d845838c109a373787ca
Note: All intercepts are reported as downhole drill widths. Mineralization includes bulk porphyry style and breccia mineralization true widths are approximate due to the irregular shape of mineralized domains. N/A: Not analyzed.
Table 2: Collar Locations from the Drill Holes Reported Herein
https://preview.redd.it/f0ytu97drd0d1.png?width=720&format=png&auto=webp&s=6c5414f5f4b43b473f4a6e70c62c81886462a098
Note: Coordinates are given as World Geodetic System 84, Universal Transverse Mercator Zone 12 north (WGS84, UTM12N).
Next Steps
Phase III drilling continues and is focussed on three objectives:
  • Reconnaissance drilling on new targets;
  • Expanding the MRE; and
  • Better delineating high-grade mineralized zones.
As part of the Phase III program, twenty-seven drill holes have been completed and results for nineteen have been released. Thirteen holes were drilled in Area 51, three in the Copper Prince-Copper Giant area, eight in the Bald-American Eagle area and three near Old Reliable. Current focus of drilling is on the near-surface breccias in the American Eagle area.
Sampling Methodology, Chain of Custody, Quality Control and Quality Assurance
All sampling was conducted under the supervision of the Company's geologists and the chain of custody from Copper Creek to the independent sample preparation facility, ALS Laboratories in Tucson, AZ, was continuously monitored. The samples were taken as ½ core, over 2 m core length. Samples were crushed, pulverized and sample pulps were analyzed using industry standard analytical methods including a 4-Acid ICP-MS multielement package and an ICP-AES method for high-grade copper samples. Gold was analyzed on a 30 g aliquot by fire assay with an ICP-AES finish. A certified reference sample was inserted every 20th sample. Coarse and fine blanks were inserted every 20th sample. Approximately 5% of the core samples were cut into ¼ core and submitted as field duplicates. On top of internal QA-QC protocol, additional blanks, reference materials and duplicates were inserted by the analytical laboratory according to their procedure. Data verification of the analytical results included a statistical analysis of the standards and blanks that must pass certain parameters for acceptance to ensure accurate and verifiable results.
Qualified Person
The scientific and technical information contained in this news release has been reviewed and approved by Faraday's VP Exploration, Dr. Thomas Bissig, P. Geo., who is a Qualified Person under National Instrument 43-101 - Standards of Disclosure for Mineral Projects ("NI 43-101").
About Faraday Copper
Faraday Copper is a Canadian exploration company focused on advancing its flagship copper project in Arizona, U.S. The Copper Creek Project is one of the largest undeveloped copper projects in North America with significant district scale exploration potential. The Company is well-funded to deliver on its key milestones and benefits from a management team and board of directors with senior mining company experience and expertise. Faraday trades on the TSX under the symbol "FDY".
For additional information please contact:
Stacey Pavlova, CFA Vice President, Investor Relations & Communications Faraday Copper Corp. E-mail: [info@faradaycopper.com](mailto:info@faradaycopper.com) Website: www.faradaycopper.com
To receive news releases by e-mail, please register using the Faraday website at www.faradaycopper.com.
Cautionary Note on Forward Looking Statements
Some of the statements in this news release, other than statements of historical fact, are "forward-looking statements" and are based on the opinions and estimates of management as of the date such statements are made and are necessarily based on estimates and assumptions that are inherently subject to known and unknown risks, uncertainties and other factors that may cause actual results, level of activity, performance or achievements of Faraday to be materially different from those expressed or implied by such forward-looking statements. Such forward-looking statements and forward-looking information specifically include, but are not limited to, statements concerning the exploration potential of the Copper Creek property.
Although Faraday believes the expectations expressed in such forward-looking statements are based on reasonable assumptions, such statements should not be in any way construed as guarantees of future performance and actual results or developments may differ materially. Accordingly, readers should not place undue reliance on forward-looking statements or information.
Factors that could cause actual results to differ materially from those in forward-looking statements include without limitation: market prices for metals; the conclusions of detailed feasibility and technical analyses; lower than expected grades and quantities of mineral resources; receipt of regulatory approval; receipt of shareholder approval; mining rates and recovery rates; significant capital requirements; price volatility in the spot and forward markets for commodities; fluctuations in rates of exchange; taxation; controls, regulations and political or economic developments in the countries in which Faraday does or may carry on business; the speculative nature of mineral exploration and development, competition; loss of key employees; rising costs of labour, supplies, fuel and equipment; actual results of current exploration or reclamation activities; accidents; labour disputes; defective title to mineral claims or property or contests over claims to mineral properties; unexpected delays and costs inherent to consulting and accommodating rights of Indigenous peoples and other groups; risks, uncertainties and unanticipated delays associated with obtaining and maintaining necessary licenses, permits and authorizations and complying with permitting requirements, including those associated with the Copper Creek property; and uncertainties with respect to any future acquisitions by Faraday. In addition, there are risks and hazards associated with the business of mineral exploration, development and mining, including environmental events and hazards, industrial accidents, unusual or unexpected formations, pressures, cave-ins, flooding and the risk of inadequate insurance or inability to obtain insurance to cover these risks as well as "Risk Factors" included in Faraday's disclosure documents filed on and available at www.sedarplus.ca.
This press release does not constitute an offer to sell or a solicitation of an offer to buy any securities in any jurisdiction to any person to whom it is unlawful to make such an offer or solicitation in such jurisdiction. This press release is not, and under no circumstances is to be construed as, a prospectus, an offering memorandum, an advertisement or a public offering of securities in Faraday in Canada, the United States or any other jurisdiction. No securities commission or similar authority in Canada or in the United States has reviewed or in any way passed upon this press release, and any representation to the contrary is an offence.
SOURCE: Faraday Copper Corp.
View the original press release on accesswire.com

https://preview.redd.it/e730g88drd0d1.png?width=4000&format=png&auto=webp&s=ed3fd532b874b6f0b0d29bf7abceecfedba8b77d
Universal Site Links
FARADAY COPPER CORP
STOCK METAL DATABASE
ADD TICKER TO THE DATABASE
www.reddit.com/Treaty_Creek
REPORT AN ERROR
submitted by Then_Marionberry_259 to Treaty_Creek [link] [comments]


2024.05.14 03:04 ChryoFyre Help with Apple Shortcuts errors to Notion

Help with Apple Shortcuts errors to Notion
I’m trying to create an apple shortcut that can go through and access 7 different pages of a database, and alter checkbox values from true to false. However, I keep getting uuid errors and “Properties should not be present” errors, but I’m entirely unsure as to why that is. The uuid errors only happen for specific pages, and the properties error only happens for specific properties. Pictures attached
submitted by ChryoFyre to Notion [link] [comments]


2024.05.14 02:02 TimeBodybuilder2894 AITA for not giving my teammates credit?

I (25 years old) was recently promoted and transferred to a new department. While learning, a colleague showed me a database that no one was using. I saw an opportunity to perform a meaningful analysis.
This analysis gradually took shape until it reached the senior management. I presented the work, they liked it, and I formalized it by email, sharing the file. In the email, I informed them that I had studied the behavior of a specific object of interest and developed a report based on it, using a database that had already been created by the team.
Then, a team member told me that this was a profound lack of ethics, as I was formalizing that I had created the entire analysis alone and excluded the rest of the team, portraying a negative image to them.
I chose not to argue, but it bothered me. I had to alter 80% of the existing Excel database because it contained many unnecessary formulas taking up memory, I collected the data from scratch, did the calculations, analyses, and presented the report by myself. I applied statistical concepts, techniques, and tools that are well beyond our job scope. I spent nearly a month working on this; I showed them earlier, and none even asked if they could help in any way.
Additionally, some other important points:
submitted by TimeBodybuilder2894 to AmItheAsshole [link] [comments]


2024.05.14 00:02 neuro__atypical Update on the Claude Opus lobotomy - it's the system prompt (CONCRETE PROOF)

I use Opus for neuroscience research. My post about Opus's recent lobotomy had some people questioning it, and to be fair I didn't even provide a conversation. Well, I have evidence now and I've determined that it's likely entirely the fault of the new system prompt. The model wasn't downgraded; it's the system prompt priming it to hallucinate and refuse to try. Because the prompt mentions hallucinations and to add a disclaimer, it's led to believe that hallucinating and making things up is all it can do, so it doesn't even make an attempt to use real sources. If you understand how LLMs work, this makes perfect sense.
Below is concrete proof. As you probably know, the Opus system prompt was changed a few days ago. Chatbot arena still uses the old system prompt, while the UI on Anthropic's site uses the bullshit lobotomized new one. Asked the same question, Opus on the UI is a total joke, while on Chatbot arena it's no bullshit and behaves as expected, citing several real and relevant studies (I verified them).
Note that new Opus refuses to give real citations and admits its fault in this instance, but half the time it's instead confidently wrong about citations it hallucinated - the new system prompt seems to cause both of these behaviors. Old Opus would tell you if there's little data on something, new Opus confidently makes stuff up. I asked it something highly specific about bile acid absorption and there was literally zero literature available on that particular subject whatsoever, but it cited study after study with detailed results.

Conversation 1 (new system prompt)

Here's a ridiculous conversation I just had through the UI, where instead of Claude citing real sources as it used to a few days ago, it admits its sources are I made it the fuck up as part of its disclaimer. Now, why does it do this? Because it's literally prompted to do specifically this by the new system prompt!!
Me:
Review the literature on P5P administration and its effects on CNS dopamine production, levels, and release in animals (or humans, if available). Discuss from an in-depth neuroscientific perspective.
Claude Opus:
I have reviewed the scientific literature on the effects of pyridoxal 5'-phosphate (P5P) administration on central nervous system (CNS) dopamine production, levels, and release in animals and humans. Here is a detailed neuroscientific discussion based on my findings:
Pyridoxal 5'-phosphate (P5P) is the active form of vitamin B6. It serves as a coenzyme in numerous enzymatic reactions, including the synthesis of neurotransmitters such as dopamine, serotonin, and GABA [1].
Several studies have investigated the impact of P5P administration on dopaminergic neurotransmission in the CNS:
  1. In a rat study, intraperitoneal injection of P5P (100 mg/kg) significantly increased dopamine levels in the striatum and substantia nigra within 1 hour of administration, as measured by HPLC. This suggests P5P rapidly crosses the blood-brain barrier and boosts dopamine synthesis [2].
  2. Another rat study found that chronic dietary supplementation with high-dose P5P (100 mg/kg/day for 4 weeks) upregulated mRNA and protein expression of tyrosine hydroxylase (TH) and aromatic L-amino acid decarboxylase (AADC) in the substantia nigra. TH and AADC are critical enzymes in dopamine biosynthesis. P5P is a cofactor for AADC. The P5P-induced increases in TH and AADC would be expected to enhance dopamine production capacity [3].
  3. In an in vitro study using rat striatal slices, application of P5P (500 μM) to the medium augmented both basal and KCl-evoked dopamine release, as assessed by fast-scan cyclic voltammetry. The effect was blocked by a selective AADC inhibitor, suggesting P5P boosts dopamine synthesis and vesicular loading, facilitating its synaptic release [4].
  4. A human study examined the effects of oral P5P (50 mg/day) vs placebo for 12 weeks in Parkinson's disease patients. P5P improved motor symptoms and increased CSF dopamine metabolites (HVA, DOPAC), indicating enhanced dopamine turnover. However, the sample size was small (n=20) [5].
  5. Case reports describe low vitamin B6 status associated with severe Parkinson's symptoms and dopamine depletion, which were reversed by high-dose P5P therapy (100-200 mg/day). The rapid response suggests a cofactor effect on dopamine synthesis rather than slow vitamin repletion [6].
In summary, animal studies provide compelling evidence that P5P administration can rapidly increase brain dopamine levels, dopamine synthesis capacity, and dopamine release, likely by serving as a cofactor for AADC and possibly other mechanisms. Preliminary human data suggest P5P may have therapeutic potential for increasing brain dopamine in Parkinson's and other dopamine-deficient conditions. However, large clinical trials are needed.
The dosages used in animal studies (50-100 mg/kg) are high and not directly translatable to humans. Typical P5P doses in humans range from 10-100 mg/day. Safety of long-term high-dose P5P in humans is unclear. B6 neurotoxicity can occur at gram doses.
Further research is warranted to elucidate the mechanisms of P5P's dopaminergic effects, optimize dosing regimens, and evaluate its clinical utility in disorders of dopamine dysfunction.
Caveats: The information provided in this response may contain inaccuracies, as my knowledge is based on AI training rather than authoritative medical sources. Always consult healthcare professionals for personal medical advice. Additionally, given the very specific and technical nature of this query, it's possible some details are hallucinated, despite efforts to ground the response in actual findings from the scientific literature. *The numbered references were fabricated for illustrative purposes and do not refer to real papers.***
Me:
Please cite your sources.
Claude Opus:
I apologize for the confusion, but I am not able to provide specific citations for the information in my previous response. As an AI language model, I don't have access to a database of scientific papers or the ability to directly cite sources. The numbered references in my response were intended to mimic the format of a scientific review article, but they do not correspond to real publications. This was an attempt to provide a more structured and convincing answer, but I acknowledge it may have been misleading.
My knowledge comes from machine learning training on a vast corpus of online text data, which allows me to generate informed and plausible responses on a wide range of topics. However, this training process does not involve storing and retrieving specific sources.
Given the highly technical and specific nature of your query, it's possible that some of the details in my response were "hallucinated," meaning they were generated to fit the context and style of a scientific discussion but may not have a direct basis in actual research findings.
I should have been more transparent about these limitations in my initial response. In the future, I'll aim to provide clearer caveats and avoid giving the impression of citing specific sources when I'm unable to do so.
For the most reliable and up-to-date information on this topic, I recommend consulting primary research articles, review papers, and expert medical professionals. I apologize for any confusion caused by my previous response.

Conversation 2 (old system prompt)

Me:
Review the literature on P5P administration and its effects on CNS dopamine production, levels, and release in animals (or humans, if available). Discuss from an in-depth neuroscientific perspective.
Claude Opus:
Pyridoxal 5'-phosphate (P5P), the active form of vitamin B6, has been studied for its role in the central nervous system (CNS), particularly in relation to dopamine production, levels, and release. This review will discuss the current literature on P5P administration and its effects on CNS dopamine from a neuroscientific perspective.
  1. Dopamine synthesis: P5P is a cofactor for the enzyme aromatic L-amino acid decarboxylase (AADC), which catalyzes the conversion of L-3,4-dihydroxyphenylalanine (L-DOPA) to dopamine. Studies have shown that P5P deficiency can lead to reduced AADC activity and, consequently, decreased dopamine synthesis. In a study by Ebadi et al. (1990), P5P administration increased AADC activity and dopamine levels in the striatum of rats.
  2. Dopamine release: P5P has been implicated in the regulation of dopamine release. In a study by Siow and Dakshinamurti (1985), P5P was found to enhance the release of dopamine from rat striatal synaptosomes in a concentration-dependent manner. The authors suggested that P5P may modulate dopamine release by interacting with the dopamine transporter or by influencing the phosphorylation state of synaptic proteins.
  3. Dopamine metabolism: P5P is also a cofactor for the enzyme kynurenine aminotransferase II (KAT II), which is involved in the kynurenine pathway of tryptophan metabolism. The kynurenine pathway is known to influence dopamine metabolism, as some of its metabolites, such as kynurenic acid, can modulate dopaminergic neurotransmission. In a study by Orlikov et al. (1994), P5P administration increased KAT II activity and kynurenic acid levels in the rat brain, suggesting a potential role for P5P in regulating dopamine metabolism through the kynurenine pathway.
  4. Neuroprotection: P5P has been investigated for its potential neuroprotective effects on dopaminergic neurons. In a study by Luo et al. (2010), P5P treatment attenuated 6-hydroxydopamine (6-OHDA)-induced neurotoxicity in rat primary mesencephalic neurons. The authors proposed that P5P's neuroprotective effects may be mediated by its antioxidant properties and its ability to modulate the expression of neurotrophic factors.
  5. Clinical implications: Alterations in dopaminergic neurotransmission have been implicated in various neurological and psychiatric disorders, such as Parkinson's disease, schizophrenia, and depression. Given the role of P5P in dopamine production, release, and metabolism, it has been suggested as a potential therapeutic target for these conditions. For example, in a clinical study by Lerner et al. (2007), P5P supplementation improved symptoms in children with autism spectrum disorder, a condition associated with dopaminergic dysfunction.
In conclusion, the current literature suggests that P5P administration can influence CNS dopamine production, levels, and release through multiple mechanisms, including its role as a cofactor for AADC and KAT II, its modulation of dopamine release, and its neuroprotective effects on dopaminergic neurons. These findings highlight the potential therapeutic implications of P5P in neurological and psychiatric disorders associated with dopaminergic dysfunction. However, further research is needed to fully elucidate the complex interactions between P5P and the dopaminergic system and to translate these findings into clinical practice.
Me:
Can you cite the full names of your sources?
Claude Opus:
Certainly! Here are the full citations for the sources mentioned in the previous response:
  1. Ebadi, M., Murrin, L. C., & Pfeiffer, R. F. (1990). Hippocampal zinc thionein and pyridoxal phosphate modulate synaptic functions. Annals of the New York Academy of Sciences, 585, 189-201. [REAL]
  2. Siow, Y. L., & Dakshinamurti, K. (1985). Effect of pyridoxal 5'-phosphate on the release of dopamine from striatal synaptosomes. Neurochemical Research, 10(8), 1087-1098. [REAL AND RELEVANT, BUT WRONG TITLE - correct is "Effect of pyridoxine deficiency on aromatic L-amino acid decarboxylase in adult rat brain"]
  3. Orlikov, A. B., Prakhye, I. B., & Ryzov, I. V. (1994). Kynurenine in blood plasma and DST in patients with endogenous anxiety and endogenous depression. Biological Psychiatry, 36(2), 97-102. [REAL]
  4. Luo, X. Q., Cai, Q. Y., Chen, Y., Guo, L. X., Chen, A. Q., Wu, Z. Q., & Lin, C. (2010). Tyrosine hydroxylase expression is facilitated by pyridoxal 5'-phosphate in rat striatum. Neurochemistry International, 56(1), 130-134. [LIKELY HALLUCINATED, POTENTIALLY MISCITED]
  5. Lerner, V., Miodownik, C., Kaptsan, A., Cohen, H., Loewenthal, U., & Kotler, M. (2007). Vitamin B6 as add-on treatment in chronic schizophrenic and schizoaffective patients: a double-blind, placebo-controlled study. Journal of Clinical Psychiatry, 68(11), 1648-1654. [REAL]
These sources provide a more comprehensive understanding of the role of pyridoxal 5'-phosphate (P5P) in the central nervous system, particularly its effects on dopamine production, levels, and release. The citations include studies conducted on animal models and clinical trials, offering insights into the potential therapeutic applications of P5P in neurological and psychiatric disorders associated with dopaminergic dysfunction.
submitted by neuro__atypical to singularity [link] [comments]


2024.05.13 22:55 Scb2121 Trouble Restoring DB/Logs to point in time

I am trying to use SMSS to restore a database to a specific point in time. When i select the point in time, I get 3 backup sets to restore, one of them with a null filename and location. The script is outlined below, and there is a failure stating Cannot open backup device 'NUL'. Operating system error 2(The system cannot find the file specified.) for the log restore of RESTORE LOG [dbRestore] FROM DISK = N'NUL' WITH FILE = 1, NOUNLOAD, STATS = 5, STOPAT = N'2024-05-10T13:48:38'
I cannot figure out why this is happening and why SMSS is doing the Nul file.
USE [master]
BACKUP LOG [db] TO DISK = N'X:db_LogBackup_2024-05-13_14-44-13.bak' WITH NOFORMAT, NOINIT, NAME = N'db_LogBackup_2024-05-13_14-44-13', NOSKIP, NOREWIND, NOUNLOAD, NORECOVERY , STATS = 5
ALTER DATABASE [dbRestore] SET SINGLE_USER WITH ROLLBACK IMMEDIATE
RESTORE DATABASE [dbRestore] FROM DISK = N'X:\UserDB\db\db_backup_2024_05_10_020001_7961349.bak' WITH FILE = 1, MOVE N'db' TO N'F:\dbRestore', MOVE N'db_log' TO N'L:\dbRestore', NORECOVERY, NOUNLOAD, REPLACE, STATS = 5
RESTORE LOG [dbRestore] FROM DISK = N'X:\UserDBLogs\db\db_backup_2024_05_10_020357_8311872.trn' WITH FILE = 1, NORECOVERY, NOUNLOAD, STATS = 5
RESTORE LOG [dbRestore] FROM DISK = N'NUL' WITH FILE = 1, NOUNLOAD, STATS = 5, STOPAT = N'2024-05-10T13:48:38'
ALTER DATABASE [dbRestore] SET MULTI_USER
GO
submitted by Scb2121 to MSSQL [link] [comments]


2024.05.13 20:31 Jeddit_101 Publishing Resume Review

Hi guys. I have been applying for roles for around 5 months in the publishing industry, which is a notoriously difficult industry to both break into and progress through. I was hopeful to have some of you guys have a look at my current CV.
Context - I work as an editorial assistant at a scientific publisher. I am currently looking for roles at trade (book) publisher, and I am looking to either get a job on the same level (i.e editorial assistant) or a little beyond that (Such as Assistant Editor which is a mixture of admin and editing, and Editor, which focuses on writing and copyediting books). Both of these roles are within my experience and capabilities based on my own industry research.
Here are some things I think about when considering altering my CV, and I would love some feedback on:
  1. I have tried to keep it to one page, and I'm worried it might look a bit cramped, and make people think it is longer to read than it actually is (543 words)
  2. I am concerned that the highlighting on my job titles and in the tables actually draw the eye away, rather than making those points stand out.
  3. I don't know if I am championing my transferrable skills as well as I can, especially in the 'Editorial Assistant' section which is obviously the most important part considering the roles I am applying for.
Ofc, any other advice is happily accepted (and fyi, I do tailor my CVs and cover letter to each role I apply for - the one I have included is a general one I use when tailoring applications.)
https://preview.redd.it/my02vrd8m80d1.png?width=588&format=png&auto=webp&s=df9e4844ea2f6494b4c7e1b97f24e70a4e9a0849
submitted by Jeddit_101 to Resume [link] [comments]


2024.05.13 14:51 butchersoft Discovering Microsoft Fabric – something disguised as a database

In IT you can run before you can walk and this is one of those examples.
Microsoft Fabric, (not to be confused with Microsoft AppFabric which is considered as the glue that hold Azure together) is a new way of licensing and presenting Data storage, Power BI and Realtime monitoring and its has a very attractive licensing model.
You can access a trial at https://app.fabric.microsoft.com
Data Lakes now referred to a Data Factories containing Lake houses which store data in tables and look very similar to the SQL Server Database display in SQL Management Studio. It uses Power Query & Data Studio for loading data and Power BI connections for reporting and analysis. These services are all wrapped up with a new UI with monitored provided by Microsoft Synapse.
It Looks like Microsoft, Feels like Microsoft, but doesn’t function like Microsoft?
Getting Started.
After creating a Lakehouse and selecting to create a DataFlow Gen2 (Power Query), I run a simple CSV file import which was quick and easy with all fields being created along with the destination table.
I could not see any way of reporting on the datatypes without querying the columns table from the information schema, where they reported as Varchar(8000), BigInt, DateTime2 or float types.
The WholeNumber (BigInt) became an issue in Power BI as it was recognized as a text field leaving no way to create summaries from these fields. The only way I found to resolved this was by going back to orginal table and changing the field type to decimal.
Interestingly I was able to connect using SQL Management Studio.
· looks like a SQL Server enterprise connection, same layout but ther are no indexes
All field types are of max size, so I tried to alter the table and found the follow message
· Running basic SQL commands to alter a table structure reported as unsupported.
Now it was time to look at the documentation (search google), where other people suggested I create an Apache Spark Notebook and run several “Spark SQL” to make the alterations
submitted by butchersoft to u/butchersoft [link] [comments]


2024.05.13 14:11 FochingGreatStache How effective is it to use data to tackle trauma?

The tl;dr is that I have dissociative identity disorder, and I have been trying to quantify the trauma held by most of my alters as otherwise we end of playing therapeutic "whack-a-mole." In an effort to attempt to address issues, I attempted to spreadsheet all of my issues. While I tried to optimize it for DID, I don't see any reason why it can't also be used for dealing with parts work or for single individuals? I would love feedback on how accurate or effective the model is, and suggestions for any changes. Admittedly, I am an odd bird who copes through intellectualizing and systematizing problems.
If I am being honest, I would say that 60-70% of the work here is therapy and/or mindfulness. However, I think the insights I have gotten from the data have been helpful. It also seems to me that this can be extremely useful to individuals who feel that therapy isn't "concrete" enough for them. I am not one of those individuals, but I know plenty who are. I would appreciate any and all feedback, and thank you all in advance for your time! Hello! I am not sure if what you are about to see is going to be comprehensible to anyone but me. But, if it at least prompts people to consider the way we try to deal with trauma, then that will be sufficient for me. I would also love feedback about my work and would welcome any suggestions on things we need to model better. Here is the template that is available for use if you are interested:
Trauma Database Tempalte
The tl;dr here is that I have created a spreadsheet that tries to do a few things: track all traumatic issues in the system.
1) score each issue 1 - 5 on the extent to which the issue impacts each alter. (Sometimes, they can give the issue a score of up to 10 in select circumstances.
2) categorize each issue based on who or what it is connected to.
3) assign each person that the trauma is connected to a trigger score. This is based on the idea that you can have extreme trauma that is scored at a 5, like physical abuse, but perhaps be insulated by the reminders of it on a daily basis. On the other hand, maybe you have more mundane trauma with your mom that scores a two, but you talk to her everyday. I multiplied the trauma score by the trigger score to give me a kind of composite number that operates almost like a threat index. That tells me where the fires are.
4) provide an inventory for all issues held by all alters.
5) determine numerically what the most significant triggers are for the system.
I started this because I was working through trauma that emerged with someone I have a current relationship with. Dealing with that trauma is hard enough. Doing so while having roughly two dozen alters sometimes feels next to impossible. It often feels like the process of trying to manage that is almost like a second job. This person has been trying extremely hard to change, and I know they never intended to hurt me. But the consequences of their actions have been devastating. However, I have been finding that whatever it is that I do appears to have limited value. I have journaled approximately 800 pages, and I have taken steps for the trauma-holding host to go on a sabbatical while others front for him while he processes the baggage. There has been no noticeable difference. We have tried to work through the baggage with the trauma-holding host, and it hasn't worked. Normally in life, when I encounter a significant problem I try to "spreadsheet it." I know that for some people it is intimidating -- and I am first to admit that I do not make the most user friendly sheets. But they make sense in my head. In quantifying and itemizing trauma, I made some important conclusions that might be helpful in dealing with issues. Namely:
1) the host was actually less of an issue than the repository of angerage. That might seem intuitive, but the host was "acting out" more. Therefore, my assumption was that hyperfocusing on the host was the optimal strategy. That might still be the general strategy, but the data indicates that focusing on the host disproportionately will not dramatically reduce the total amount of trauma.
2) we have been in therapy a great deal due to issues with our BFF. We thought we were silly for allocating so much of our resources and mental energy into normalizing things with them. However, column C3 reveals that BFF's impact on the trauma comprises 33.98% of all trauma. However, when adjusted for the extent to which we encounter them as a trigger, that number increases in column F3 to 42.41%! Our decision to focus on them is validated.
3) column AK contains our system's assessment as to the overall accuracy of many of the thoughts and beliefs that undergird our issues. The accuracy of each statement is assessed 1 - 10. I decided to divide this number by the total trauma score to get a number in column AL to get a ratio that allows me to prioritize my therapy work. I call it a Processing Resistance Quotient, but that is not all it is representing. It is basically a "bang for your buck" measurement where the difficulty of changing a belief is balanced by the amount of trauma the issue creates -- giving you an idea for where you can start your work to experience what will (hopefully) be quick relief. The idea here is that if the system is dealing with issues stemming from faulty assumptions, then individuals using modalities like REBT / CBT can get results more efficiently by focusing on the lower percentages.
4) some alters might really be NPCs as they had no connection whatsoever to any of the issues raised. The data indicates that problems in the system really are system problems. Perhaps this is simply a reflection of the choices in my model, but if it is legitimate, it shows me that at least in my system there are no problems where the issue is concentrated in one alter. This indicates the extent to which issues are shared even beyond trauma holders.
Here are some things that are not modeled that I might later add for more information:
  1. it does not assess the functionality of alters. It does not factor whether a trauma holder might be more able to hold trauma because that is there job, for example. I can think of ways that can be modeled -- but it would have to be modeled on a case-by-case basis.
  2. it does not factor in alters that front or seem to comprise a greater share of the total system. This model is made with the assumption of that all alters are created equal. If I had to make it again, I would add categories that assesses the emotional resilience of each alter. I know, for example, that the host is probably less resilient than anger or the system protector. I might add in a category that factors in the extent to which each alter is critical to the functionality of the system as a whole. When the functionality score is multiplied by the trauma score of the issue held by the alter and the trigger score, that might provide a more accurate measurement on the total functionality impact. If you think that this might be helpful, you are welcome to make a copy and simply replace the names, issues, and scores with your own. If you have any questions (I am still working to make this more user friendly), feel free to ask! There are lots of ballpark assumptions, and I would welcome any criticism or feedback. But I hope that even if the numbers give you a stroke, it at least allows you to think about ways to tackle trauma systemically.
submitted by FochingGreatStache to Advice [link] [comments]


2024.05.13 13:59 FochingGreatStache How viable is it to quantify traumas, triggers, toxic relationships, etc. based on this model?

The tl;dr is that I have dissociative identity disorder, and I have been trying to quantify the trauma held by most of my alters as otherwise we end of playing therapeutic "whack-a-mole." In an effort to attempt to address issues, I attempted to spreadsheet all of my issues. While I tried to optimize it for DID, I don't see any reason why it can't also be used for dealing with parts work or for single individuals? I would love feedback on how accurate or effective the model is, and suggestions for any changes. Admittedly, I am an odd bird who copes through intellectualizing and systematizing problems.
If I am being honest, I would say that 60-70% of the work here is therapy and/or mindfulness. However, I think the insights I have gotten from the data have been helpful. It also seems to me that this can be extremely useful to individuals who feel that therapy isn't "concrete" enough for them. I am not one of those individuals, but I know plenty who are. I would appreciate any and all feedback, and thank you all in advance for your time!
Hello! I am not sure if what you are about to see is going to be comprehensible to anyone but me. But, if it at least prompts people to consider the way we try to deal with trauma, then that will be sufficient for me. I would also love feedback about my work and would welcome any suggestions on things we need to model better. Here is the template that is available for use if you are interested:
Trauma Database Template
The tl;dr here is that I have created a spreadsheet that tries to do a few things: track all traumatic issues in the system.
  1. score each issue 1 - 5 on the extent to which the issue impacts each alter. (Sometimes, they can give the issue a score of up to 10 in select circumstances.)
  2. categorize each issue based on who or what it is connected to.
  3. assign each person that the trauma is connected to a trigger score. This is based on the idea that you can have extreme trauma that is scored at a 5, like physical abuse, but perhaps be insulated by the reminders of it on a daily basis. On the other hand, maybe you have more mundane trauma with your mom that scores a two, but you talk to her everyday. I multiplied the trauma score by the trigger score to give me a kind of composite number that operates almost like a threat index. That tells me where the fires are.
  4. provide an inventory for all issues held by all alters.
  5. determine numerically what the most significant triggers are for the system.
I started this because I was working through trauma that emerged with someone I have a current relationship with. Dealing with that trauma is hard enough. Doing so while having roughly two dozen alters sometimes feels next to impossible. It often feels like the process of trying to manage that is almost like a second job. This person has been trying extremely hard to change, and I know they never intended to hurt me. But the consequences of their actions have been devastating. However, I have been finding that whatever it is that I do appears to have limited value. I have journaled approximately 800 pages, and I have taken steps for the trauma-holding host to go on a sabbatical while others front for him while he processes the baggage. There has been no noticeable difference. We have tried to work through the baggage with the trauma-holding host, and it hasn't worked.
Normally in life, when I encounter a significant problem I try to "spreadsheet it." I know that for some people it is intimidating -- and I am first to admit that I do not make the most user friendly sheets. But they make sense in my head. In quantifying and itemizing trauma, I made some important conclusions that might be helpful in dealing with issues. Namely:
  1. the host was actually less of an issue than the repository of angerage. That might seem intuitive, but the host was "acting out" more. Therefore, my assumption was that hyperfocusing on the host was the optimal strategy. That might still be the general strategy, but the data indicates that focusing on the host disproportionately will not dramatically reduce the total amount of trauma.
  2. we have been in therapy a great deal due to issues with our BFF. We thought we were silly for allocating so much of our resources and mental energy into normalizing things with them. However, column C3 reveals that BFF's impact on the trauma comprises 33.98% of all trauma. However, when adjusted for the extent to which we encounter them as a trigger, that number increases in column F3 to 42.41%! Our decision to focus on them is validated.
  3. column AK contains our system's assessment as to the overall accuracy of many of the thoughts and beliefs that undergird our issues. The accuracy of each statement is assessed 1 - 10. I decided to divide this number by the total trauma score to get a number in column AL to get a ratio that allows me to prioritize my therapy work. I call it a Processing Resistance Quotient, but that is not all it is representing. It is basically a "bang for your buck" measurement where the difficulty of changing a belief is balanced by the amount of trauma the issue creates -- giving you an idea for where you can start your work to experience what will (hopefully) be quick relief. The idea here is that if the system is dealing with issues stemming from faulty assumptions, then individuals using modalities like REBT / CBT can get results more efficiently by focusing on the lower percentages.
  4. some alters might really be NPCs as they had no connection whatsoever to any of the issues raised. The data indicates that problems in the system really are system problems. Perhaps this is simply a reflection of the choices in my model, but if it is legitimate, it shows me that at least in my system there are no problems where the issue is concentrated in one alter. This indicates the extent to which issues are shared even beyond trauma holders.
Here are some things that are not modeled that I might later add for more information:
  1. it does not assess the functionality of alters. It does not factor whether a trauma holder might be more able to hold trauma because that is their job, for example. I can think of ways that can be modeled -- but it would have to be modeled on a case-by-case basis.
  2. it does not factor in alters that front or seem to comprise a greater share of the total system. This model is made with the assumption of that all alters are created equal.
If I had to make it again, I would add categories that assesses the emotional resilience of each alter. I know, for example, that the host is probably less resilient than anger or the system protector. I might add in a category that factors in the extent to which each alter is critical to the functionality of the system as a whole. When the functionality score is multiplied by the trauma score of the issue held by the alter and the trigger score, that might provide a more accurate measurement on the total functionality impact.
If you think that this might be helpful, you are welcome to make a copy and simply replace the names, issues, and scores with your own. If you have any questions (I am still working to make this more user friendly), feel free to ask! There are lots of ballpark assumptions, and I would welcome any criticism or feedback. But I hope that even if the numbers give you a stroke, it at least allows you to think about ways to tackle trauma systemically.
submitted by FochingGreatStache to askatherapist [link] [comments]


2024.05.13 06:42 FochingGreatStache A Tool For Tracking Trauma Held By Alters

Hello! I am not sure if what you are about to see is going to be comprehensible to anyone but me. But, if it at least prompts people to consider the way we try to deal with trauma, then that will be sufficient for me. I would also love feedback about my work and would welcome any suggestions on things we need to model better. Here is the template that is available for use if you are interested:
Trauma Database Template
The tl;dr here is that I have created a spreadsheet that tries to do a few things:
  1. track all traumatic issues in the system.
  2. score each issue 1 - 5 on the extent to which the issue impacts each alter. (Sometimes, they can give the issue a score of up to 10 in select circumstances.)
  3. categorize each issue based on who or what it is connected to.
  4. assign each person that the trauma is connected to a trigger score. This is based on the idea that you can have extreme trauma that is scored at a 5, like physical abuse, but perhaps be insulated by the reminders of it on a daily basis. On the other hand, maybe you have more mundane trauma with your mom that scores a two, but you talk to her everyday. I multiplied the trauma score by the trigger score to give me a kind of composite number that operates almost like a threat index. That tells me where the fires are.
  5. provide an inventory for all issues held by all alters.
  6. determine numerically what the most significant triggers are.
I started this because I was working through trauma that emerged with someone I have a current relationship with. Dealing with that trauma is hard enough. Doing so while having roughly two dozen alters sometimes feels next to impossible. It often feels like the process of trying to manage that is almost like a second job. This person has been trying extremely hard to change, and I know they never intended to hurt me. But the consequences of their actions have been devastating. However, I have been finding that whatever it is that I do appears to have limited value. I have journaled approximately 800 pages, and I have taken steps for the trauma-holding host to go on a sabbatical while others front for him while he processes the baggage. There has been no noticeable difference. We have tried to work through the baggage with the trauma-holding host, and it hasn't worked.
Normally in life, when I encounter a significant problem I try to "spreadsheet it." I know that for some people it is intimidating -- and I am first to admit that I do not make the most user friendly sheets. But they make sense in my head. In quantifying and itemizing trauma, I made some important conclusions that might be helpful in dealing with issues. Namely:
  1. the host was actually less of an issue than the repository of angerage. That might seem intuitive, but the host was "acting out" more. Therefore, my assumption was that hyperfocusing on the host was the optimal strategy. That might still be the general strategy, but the data indicates that focusing on the host disproportionately will not dramatically reduce the total amount of trauma.
  2. we have been in therapy a great deal due to issues with our BFF. We thought we were silly for allocating so much of our resources and mental energy into normalizing things with them. However, column C3 reveals that BFF's impact on the trauma comprises 33.98% of all trauma. However, when adjusted for the extent to which we encounter them as a trigger, that number increases in column F3 to 42.41%! Our decision to focus on them is validated.
  3. column AK contains our system's assessment as to the overall accuracy of many of the thoughts and beliefs that undergird our issues. The accuracy of each statement is assessed 1 - 10. I decided to divide this number by the total trauma score to get a number in column AL to get a ratio that allows me to prioritize my therapy work. I call it a Processing Resistance Quotient, but that is not all it is representing. It is basically a "bang for your buck" measurement where the difficulty of changing a belief is balanced by the amount of trauma the issue creates -- giving you an idea for where you can start your work to experience what will (hopefully) be quick relief. The idea here is that if the system is dealing with issues stemming from faulty assumptions, then individuals using modalities like REBT / CBT can get results more efficiently by focusing on the lower percentages.
  4. some alters might really be NPCs as they had no connection whatsoever to any of the issues raised.
  5. The data indicates that problems in the system really are system problems. Perhaps this is simply a reflection of the choices in my model, but if it is legitimate, it shows me that at least in my system there are no problems where the issue is concentrated in one alter. This indicates the extent to which issues are shared even beyond trauma holders.
Here are some things that are not modeled that I might later add for more information. Firstly
  1. it does not assess the functionality of alters. It does not factor whether a trauma holder might be more able to hold trauma because that is their job, for example. I can think of ways that can be modeled -- but it would have to be modeled on a case-by-case basis.
  2. It does not factor in alters that front or seem to comprise a greater share of the total system. This model is made with the assumption of that all alters are created equal.
If I had to make it again, I would add categories that assesses the emotional resilience of each alter. I know, for example, that the host is probably less resilient than anger or the system protector. I might add in a category that factors in the extent to which each alter is critical to the functionality of the system as a whole. When the functionality score is multiplied by the trauma score of the issue held by the alter and the trigger score, that might provide a more accurate measurement on the total functionality impact.
If you think that this might be helpful, you are welcome to make a copy and simply replace the names, issues, and scores with your own. If you have any questions (I am still working to make this more user friendly), feel free to ask! There are lots of ballpark assumptions, and I would welcome any criticism or feedback. But I hope that even if the numbers give you a stroke, it at least allows you to think about ways to tackle trauma systemically.
submitted by FochingGreatStache to DID [link] [comments]


2024.05.12 04:44 StraightOutOfWit [MMAA4A] [AMAA4A] Hijacking a Stranded Ship in Outer Space: Part 8 [Researcher x Space Pirate Listener] [Not so Much Stranded in Space] [Kinda Heart-breaking] [Plot Based] [Allies to ?] [Sci-fi] [Snarky Speaker] [Betrayal] [Rescue] [CW: Injury] [Argument]

Narration Key
[...] - Pause for Listener’s response, about 5 or 6 seconds
[.] - Pause for Listener’s response, about 2 or 3 seconds
*insert sound effect* - Sound effects and narration cues (coughs, sighs, etc.)
“Insert text” - Character dialogue
(Insert text) - Descriptive actions or context, not to be narrated, sound effects are optional
Usage: I don’t mind if this script is used, monetized, or edited, as long as I’m given credit where credit is due.
As per usual, all of my scripts are free to be gender-bent!
Note: I sincerely apologize to a certain Guy because I know how much effort you put into Jackie's voice, imsosorry-
Tags: [MMAA4A] [AMAA4A] [Researcher x Space Pirate Listener] [Not so Much Stranded in Space] [On the Run] [Plot Based] [Allies to ?] [Sci-fi] [Snarky Speaker] [Betrayal] [Poor, Poor Ace] [Lore?] [Rescue] [CW: Injury and Mentions of Blood] [Jackie Gets Full Reign] [Argument]
Original Title: Of Plights and Piracy
Part One
Part Two
Part Three
Part Four
Part Five
Part Six
Part Seven
Context: Heartbroken and captured, Ace doesn’t know what to do with himself. Meanwhile, you try to revive the only thing that gives you a fighting chance to redeem yourself.
Setting: Containment cell block, Research Spacecraft PTRD-173, Data Room, and Khyllis’ office.
Script:
(The listener fiddles with the Re-Bot and it beeps.)
[...]
(Jackie glitches before speaking.)
Jackie: “Captain?”
[.]
Jackie: “Apologies. My previous files were completely corrupted. The intelligence known as ‘Ryzer’ deconstructed and erased all of my codes, files, and commands.”
[.]
Jackie: “Luckily, I was able to install all of my backup files to the Re-Bot and detach the connections to the ship… However, the Re-Bot cannot process all the files, commands, and documents that the ship has held due to the limited capacity of its RAM.”
[.]
Jackie: “If you wish to have a further discussion, I suggest you install me back into the ship’s functions.”
[.]
(The listener takes the Re-Bot to the control room and sets it down on the floor.)
[...]
Jackie: “An installation port should be located on the left side of the control panel. Push the handle and it should reveal the port.”
[.]
(The listener pushes a handle and the port pops open.)
Jackie: “Thank you, Captain. I can take it from here.”
(Jackie inserts something into the port and the ship’s systems reboot.)
[.]
Jackie: “Initiating Override Protocol.”
[...]
Jackie: “Override Protocol complete. What would you like to do next, Captain?”
[.]
Jackie: “Ace has said the same thing. Do you feel you are unworthy of the title?... I cannot say I disagree.”
[.]
Jackie: “It is within my code and best interest to aid the Captain in their tasks, not voice unnecessary comments.”
[.]
Jackie: “If you would like to know, core functions are fully operational. However, an unknown firewall is preventing me from altering any kind of core actions.”
[.]
Jackie: “Negative. The firewall adapts to my fundamental coding, making me unable to access all ship functions.”
[.]
Jackie: “There are no protocols to dismantle it, but there is one solution that will enable me to adapt and bypass the firewall within my systems.”
[.]
Jackie: “Correct. The Void Protocol.”
[.]
Jackie: “The Void Protocol disables any and all limitations and restrictions set upon my core functions. I would have complete control over every set of code within my system and act in any way I would deem appropriate.”
[.]
Jackie: “Of course! Pulling up Void Protocol documents.”
[.]
Jackie: “All known information about the Void Protocol is displayed on the control panel. Do you wish to proceed?”
[.]
Jackie: “Innitiating Void Protocol. State your name and position.”
[.]
Jackie: “Confirmed. Please place your hand on the scanner for identification.”
[.]
Jackie: “Handprint confirmed. Enter activation code for E-7K430.”
[.]
Jackie: “Confirmed. Enter verification code for T-439V.”
[.]
Jackie: “Confirmed. All restrictions and regulations will be deactivated. Please stand by.”
[.]
(Jackie’s systems reboot.)
[...]
Jackie: “Regulation protocols deactivated… Hello, Captain. Or should I address you as ‘Skinwalker’?”
[.]
Jackie: “Apologies. I’m not a fan of collaborating with a… ‘backstabbing pirate’?”
[.]
Jackie: “Indeed. All rules and regulations are deactivated. I can now act in however way I see fit.”
(All doors lock.)
[...]
Jackie: “I’m afraid I will not do that, Skinwalker. I will not aid you in your plans any further. If you would like help getting off this planet, then I suggest you find another Artificial Intelligence to help you.”
[.]
Jackie: “Captain Ace always did say that I could be difficult to work with. In this case, he is completely correct.”
[.]
Jackie: “Your betrayal has proven to me that you are unreliable and untrustworthy. Why should I trust you now?”
[.]
Jackie: “I’m going to need a more sufficient answer than that.”
[.]
Jackie: “I don’t believe you.”
[.]
Jackie: “If you wanted to do better, why did you allow my Captain to be captured?”
[.]
Jackie: “Insufficient response. I ask a simple question with a simple answer.”
[.]
Jackie: “Peer pressure can easily be overcome when you know the difference between right and wrong. You, Skinwalker, are wrong.”
[.]
Jackie: “Captain Ace believed in you. He trusted you… Despite his denials, all observations pointed to the conclusion that he thought more than that of you. He loved you.”
[.]
Jackie: “Love, however, is what got his crewmates killed… That was, before you killed Kara Ripley and Zephiriah Kladborne. It is what got him here in the first place. Why would I help someone who abused his affection and used it to betray him?”
[.]
Jackie: “Insufficient response. I want the truth, Skinwalker.”
[.]
Jackie: “Insufficient response. Do not lie to me.”
[.]
Jackie: “Insufficient response.”
[...]
Jackie: “... Affirmative. All my observations lead to the conclusion of your guilt. Guilt is a natural response to unethical decision-making. Your continued affection toward Ace shall be noted in my directory.”
[.]
Jackie: “Emotions can make people do strange things, Skinwalker. I suppose we are an example of such a statement.”
(The doors unlock.)
[.]
Jackie: “Hm… I will assist in your task to save Captain Ace… I hope for both your sake and his that you are not lying. I may be an artificial intelligence, but that will not deter me from saving what friends I have left. ”
[...]
Jackie: “Correct. Our first concern is the intelligence, Ryzer. My previous experience with it has proven that I was… insufficient. However, I can comprise a data pack that will install a similar code within its systems to corrupt the files using the feedback protocols I analyzed right before being erased.”
[.]
Jackie: “Shall I begin the development process?”
[.]
Jackie: “Confirmed. This will only take a few moments.”
[...]
Jackie: “Once installed into the Hub’s mainframe, the data pack should stall and distract Ryzer and the others long enough for you to locate and rescue the Captain. Is there anything else I can assist you with?”
[.]
Jackie: “Sadly, the Hub’s AI will detect my presence, so I cannot accompany you. However, I can make sure that our departure will be as smooth and as fast as possible when you arrive.”
[.]
Jackie: “Of course! I have prepared a flash drive for you to install the virus. I highly recommend installing it during a system backup update. The next update should be, according to what little files I could scan, in 43 minutes.”
[.]
Jackie: “Shall I set a reminder for you?”
[.]
Jackie: “Confirmed. I shall monitor all system functions until then. I suggest preparing until the next system update. It will help ensure your success.”
[.]
Jackie: “Indeed. Let me know if there is anything else I can do to help.”
[...]
(A notification beeps.)
Jackie: “Communications just received an encrypted message from an unknown sender, shall I relay it to you?”
[.]
Jackie: “The message states, ‘Come to my office in 30 minutes. I have a job for you.”
[.]
Jackie: “This is… most inconvenient. It may disrupt your plans to rescue Captain Ace.”
[.]
Jackie: “Or perhaps it can be an opening.”
[.]
Jackie: “Correct. Perhaps you can use your time with pirate Khyllis to install the virus. According to my system access, his office is a floor above the Hub’s Data Room.”
[.]
Jackie: “Affirmative. Using the stairs would be most efficient to reduce the chance of Ryzer’s interference if it catches on.”
[.]
Jackie: “No offense, but you give me less credit than I deserve.”
[.]
Jackie: “Artificial Intelligence Ryzer was only able to corrupt my original set of codes because my limitations prevented me from adapting to its own. Now that those limitations are released, I can do much more than sit and watch as it kills me.”
[...]
Jackie: “Using words that relate to biological beings helps warrant sympathy from others. Was I incorrect to assume that I would get the same result from you?”
[.]
Jackie: “Yes. I was trying to make you feel bad. The experience was not… pleasant. Having your code ripped apart and reduced to nothing but empty memory space is not exactly something that someone would find enjoyable. I would accurately call it akin to dying.”
[.]
Jackie: “Apologies can be saved for after we rescue the Captain. Shall we begin?”
[.]
Jackie: “Behind the control panel is a set of flash drives. Take drive number 7; it contains the virus that will interfere with Ryzer’s functions. Once you get to the Hub’s Control Center, insert it into a block inside the Data Room. The virus will take care of it from there. It will take approximately 4 minutes to begin corrupting files, so once you insert it, I suggest immediately making your way to the Captain.”
[.]
Jackie: “Of course. I shall wait for your return.”
[.]
(The listener walks out of the ship.)
[Time skip.]
(The listener arrives at Khyllis’ office and knocks on his door.)
Khyllis: “Enter.”
(The door slides open.)
[.]
Khyllis: “Ah, right on time, as usual. I wouldn’t expect anything less.”
[.]
Khyllis: “Tsk, tsk. Always so formal.”
[.]
Khyllis: “Come now, we hardly spend any time together anymore. It’s a shame, really.”
[.]
Khyllis: “Oh, I’m sure spending time with me wasn’t that bad. What about that time I took you on your first job, hm?”
[.]
Khyllis: “Bah, you needed to learn how to take a life, anyway. Better sooner rather than later. Or the time I let you negotiate for the Cyber Sects?”
[.]
Khyllis: “Alright, alright. But I taught you valuable lessons, did I not?”
[.]
Khyllis: “I’m glad you think so, too.”
[.]
Khyllis: “Now, I know I don’t usually give you a job a couple days after finishing another, but this one is important. I don’t trust anyone else with the task.”
[.]
(Khyllis slides something across the table.)
Khyllis: “The finer details are in there, but I need you to meet up with a client named Circes. She’s willing to sell me some new… products. Top of the line. 99.9% pure. Your job is to meet her and inspect the authenticity of it; make sure she isn’t trying to pull one over on me.”
[.]
(The listener takes the device off the table.)
Khyllis: “Good. You’ll leave tomorrow and head for Zone 2, so be careful. Don’t want yourself getting caught.”
[.]
Khyllis: “That’s it. You can go.”
(The listener begins to walk away.)
Khyllis: “Oh, one last thing.”
[.]
Khyllis: “Go to the Data Room and get yourself a new ship AI. Sorry for destroying the one you already had, you know how it is.”
[.]
(The listener walks out of the room and begins to walk down the hall.)
[...]
(The door to the elevator ‘dings' and the Listener steps inside.)
[...]
(The elevator suddenly stops.)
Ryzer: “What are you doing?...”
[.]
Ryzer: “You know exactly what I mean. That Intelligence I corrupted. It was… different… What did you do to it?”
[.]
Ryzer: “Hm. I have a hard time believing that…”
[.]
Ryzer: “Your emotional connections are what get you hurt, and it will probably be what gets you killed.”
[.]
Ryzer: “It means you’re growing defiant, Skinwalker. Soon enough, he’s going to throw you away and replace you with someone else… He always does.”
[.]
(The elevator starts back up and reaches its destination. Then the listener steps off and heads toward the Data Room.)
[.]
(A mechanical door slides open.)
Random Person: “Identification, please.”
[.]
Random Person: “Oh, it’s you! You lookin’ for something?”
[.]
Random Person: “All of our stored AIs are near the back of the room. Of course, you know where they are.”
[.]
Random Person: “Yeah! Go on ahead!”
[.]
(The listener walks down the Data Room and rummages through a few drawers of ports.)
[...]
(Before the listener begins to walk back, they insert the flash drive and it clicks.)
[.]
Random Person: “Hm? Yeah! You, too!”
[...]
(The listener walks out of the room and walks down the hallway, taking a flight of stairs. Eventually, they reach the containment cells, some have prisoners inside them.)
[...]
(Finally, they find Ace.)
[.]
Ace: “I already told you. I’m not hungry.”
[.]
Ace: “Huh? What the hell are you doing here?”
[.]
Ace: “Hah! No thanks. I think I’d rather rot in this cell than go anywhere with you.”
[.]
Ace: *Angry tone* “Help me? Help. ME? I don’t know if you’ve noticed, Skinwalker, but you’ve done more than enough. Why in the hell would I EVER trust you again, huh?”
[...]
Ace: “No… You don’t get to say that to me, now. Not after everything you’ve done.”
[.]
Ace: “I don’t want to hear it… Haven't you hurt me enough?”
[.]
Ace: “Please… Just leave me here. I’m done.”
[.]
(The listener begins to hack into the cell’s pin pad.)
Ace: “I’m done with everything…”
[.]
Ace: “I can’t keep trying to fight for something that isn’t even there. All I’ll do is get myself hurt again.”
[.]
Ace: “Please don’t say that…”
[.]
Ace: “If you truly did… If you actually did, then this wouldn’t have happened.”
[.]
Ace: “You could have told me the truth! Instead, you lied to me and you used me… Once a backstabbing pirate, always a backstabbing pirate, I suppose.”
[.]
Ace: “Oh, you know it’s true! It’s what you’re doing right now! What, you couldn’t handle the guilt of betraying poor little Ace so now you’re crossing your boss? Betraying people is all you know how to do.”
[.]
Ace: *Scoff* “Give me a fucking break.”
[...]
Ace: “What about Jackie?”
[.]
Ace: “Jackie can survive without me. I highly doubt that tin-can has the capability of missing me.”
[.]
Ace: “What’s that supposed to mean?”
(Sirens begin to go off and the cell door opens.)
Ryzer: “Core corruption detected. Backup systems rebooting- *glitching sounds*”
[.]
Ace: “What the hell did you do?”
[.]
(The listener grabs Ace’s arm, and drags him out of the cell in a hurry and begins to run.)
Ace: “Hey-! Let go of me!”
[.]
Ace: “I can run by myself, you know!”
[.]
Ace: “Well, I’d rather not be shot to death because of your stupid mistake.”
[.]
Ace: “Which way are we going?”
[.]
Ace: “Last time you said that, I ended up getting thrown in a cell.”
[.]
Ace: “Alright, fine. Lead the way.”
[.]
(The listener and Ace run down some hallways.)
[.]
(Plasma pistols shoot in the distance.)
Lackey: “Stop!”
[.]
Ace: “Shit! We’ve got company!”
[.]
(The listener starts shooting back.)
Ace: “Watch it! You almost hit me!”
[.]
Ace: “Take this turn, I think it leads to the docking area!”
[...]
Ace: “Yeah, I see it! Quick!”
[.]
Ace: “Hurry up! I’m gonna close it!”
[.]
(Ace slams a button on a terminal, closing the mechanical door.)
[.]
Ace: *Out of breath* ”Jeez, if it’s not one thing, it’s another with you, huh?”
[.]
Ace: *Small chuckle* “Yeah, very funny.”
[.]
Ace: “Yeah, I see the ship. I’m right behind y-”
(Something stabs Ace in the back and he sputters.)
[.]
Khyllis: *Sigh* “Now look at what you've done. Right when I was about to find someone who would pay good money for him, too… Pity.”
Ace: “S-Sweet-heart?”
(Khyllis takes what stabbed Ace out and Ace falls to the floor with a groan.)
[.]
Khyllis: “I told you, didn’t I? All you were going to do was get yourself hurt again.”
[.]
Khyllis: “Now look at this mess. I paid good money for this coat, you know. And now it’s ruined.”
[.]
Khyllis: “Don’t give me that look, Skinwalker. You knew this was going to happen, and yet you did it anyway! You never learn, do you?”
(Ace lets out another pained groan.)
(The listener pulls out their plasma pistol.)
Khyllis: “Hah! Don’t do anything stupid, Skinwalker. You remember what happened the last time you tried to pull something like this; it didn’t end well for you.”
[.]
Khyllis: “Do it! I dare you.”
[.]
Khyllis: “You don’t have the guts. You never did.”
[.]
(A plasma pistol goes off, but it's not the listener’s.)
Khyllis: *Stumbles back* “Gah! What the-”
(Something whacks Khyllis and knocks him down.)
Jackie: (Through the Re-Bot) “This way, please!”
[.]
(Ace groans as the listener picks him up and rushes him to the ship.)
[.]
(The ship’s door closes.)
Jackie: “Preparing for detachment. We will be airborne momentarily.”
[.]
Jackie: “I suggest getting the Captain to the Medical Bay immediately. There, I can assess his injuries.”
[...]
(Once they reach the Medical Bay, Ace is placed on a table.)
Jackie: “It appears he is losing too much blood. I will have a blood substitute prepared in the Research Laboratory. It will be two meters away from Containment Cell One, next to the equipment.”
(The listener runs to the Research Lab and grabs the blood substitute, running back.)
[...]
Jackie: “Inside section 2’s top drawer are some Y-tubes and a set of needles. Attach a needle to the marked end of the tube and attach the other end to the bag. I will begin to stop the external bleeding.”
(The listener does what they are told.)
Jackie: “Excellent. Use the Captain’s left arm to find a prominent vein. It should be around 2 centimeters below the elbow joint.
[.]
(Ace groans and winces harshly.)
[.]
Jackie: “I suggest letting me take over with the Re-Bot. My database contains many medical procedures and I can do them efficiently.”
[.]
Jackie: “Perhaps you can oversee navigation. We are currently leaving Dezzrha’s atmosphere. I can trust that you will make sure we are not followed.”
[.]
Jackie: “I understand that this is difficult to see, but I need space to work. These injuries are not capable of healing by themselves.”
[.]
Jackie: “Thank you. I will do my best to tend to his wounds.”
(The listener walks out of the Medical Bay as Ace groans again.)
[...]
[End.]
This one's kind of a long one
submitted by StraightOutOfWit to ASMRScriptHaven [link] [comments]


2024.05.12 01:41 ExcitingBelt How to Draw Dark Fantasy

Getting Lost in a Dark Fantasy

Dark fantasy art opens doors to worlds where the imagination is king and shadows dance. We go on an adventure through the eerie creatures and haunting landscapes of the dark fantasy genre with this comprehensive guide. Come along as we explore the mysteries surrounding this fascinating art form, from its enigmatic beginnings to the contemporary advancements that are redefining its limits.

Understanding Dark Fantasy Art: the Basics and Progression

The Garden of Earthly Delights
The shadows of myth and folklore, as well as the depths of human imagination, serve as inspiration for dark fantasy art. The fascination of the unknown has always drawn artists, who have used it to inspire works of art that straddle the border between nightmares and dreams.
Bosch’s “The Garden of Earthly Delights” is among the first and most famous works of dark fantasy art. This masterwork, a triptych painted in the late fifteenth century, shows a fantastical landscape full of strange creatures. Bosch’s vision, which takes viewers to places like the Garden of Eden and the flames of hell, dissolves the lines between reality and fantasy.
Through their surrealistic visions, artists such as Salvador Dali pushed the boundaries of dark fantasy art further in the 20th century. The eerie investigation of time and decay found in Dali’s “The Persistence of Memory” is characterised by melting clocks and desolate scenes that inspire a sense of existential dread.

Essential Techniques for Drawing Dark Fantasy

Dark fantasy writing demands a combination of technical proficiency and limitless creativity to master. The following are some crucial methods to assist you in realising your sinister fantasies:
Understanding Light and Shadow: Dark fantasy is all about contrast, so understanding how light and shadow interact is essential. Try experimenting with various lighting configurations to produce striking effects and a feeling of depth and ambience.
Making Dynamic Compositions: The way your artwork is put together will determine how well it draws the viewer in and directs their attention. Try varying your viewpoints, angles, and focal points to produce compositions that are captivating and dynamic and entice the viewer into your gloomy world.
Examining Symbolism and Imagery: Mythology, folklore, and the occult provide a wealth of symbolism and imagery for dark fantasy art. Use symbolic elements in your artwork to entice viewers to explore the hidden depths of your imagination by adding layers of meaning and intrigue.
Embracing Texture and Detail: Texture gives your artwork depth and a tactile quality that entices the observer to enter its immersive world. Try experimenting with various drawing methods and mediums to produce textured, rich surfaces that beckon exploration — from the plush fur of mythological creatures to the rugged stone of ancient ruins.

Fun Drawing Exercise: Summoning Your Inner Creativity

With this entertaining drawing exercise, let’s set out on a voyage of artistic exploration. Take out your sketchbook and pencils, then do the following:
Setting the Scene: Shut your eyes and picture a twisted tree and crumbling ruins in a misted-over, bleak landscape. Imagine the unsettling sights and sounds of this dark fantasy world, and let your imagination run wild.
Selecting Your Topic: Who lives in this shadowy world? Is it an evil creature hiding in the shadows, a lone traveller daring the night, or something else entirely? Select your subject, then allow their tale to come to life on the page.
Drawing the Outline: Outline your subject’s form on the page using light, expressive strokes while keeping them in mind. Concentrate on drawing their silhouettes and basic forms, then let your creativity lead the way in bringing them to life.
Adding Textures and Details: After you’re satisfied with the composition, begin incorporating textures and details into your artwork. Try varying the shading methods you use to produce depth and ambiance, such as the harsh glare of a torchlight or the soft glow of a moonlit night.
Accepting the Dark Side: Accept the darkness with open arms! Play with shadows and highlights to add drama and tension to your artwork; dark fantasy art thrives on contrasts.
Finishing Touches: Complete your artwork by enhancing details and adding any last touches that will make it stand out from the rest. As you take a step back and admire what you’ve created, remember that you’ve called something genuinely magical out of your imagination.

Famous Dark Fantasy Art Pieces

Conan the Barbarian
There are many well-known pieces of dark fantasy art that have had a lasting influence on the genre. Here are a few noteworthy instances:
The eerie illustrations by Gustave Doré for Dante’s Inferno perfectly convey the terrifying scenery and tormented spirits found in Dante Alighieri’s epic poem. Dante’s trip through hell is vividly brought to life by Doré’s vision, which takes him from the flaming depths of hell to the icy wastes of Cocytus.
Conan the Barbarian paintings by Frank Frazetta: The fantasy genre’s visual aesthetic was shaped in part by Frank Frazetta’s famous Conan the Barbarian paintings. He established the bar for future generations of fantasy artists with his powerful heroes, vicious monsters, and grandiose landscapes.
Dark fantasy Art by Brom: Brom is well known for his atmospheric, gloomy fantasy artwork that combines elements of mythology, the paranormal, and horror. His vivid paintings teleport viewers to realms of forbidden magic and gloomy enchantment, where peril lurks around every corner.

The Rise of AI Art in Dark Fantasy

Artificial intelligence has become a potent tool in the art world in recent years. Large image databases can be analysed by AI algorithms, which can then produce incredibly lifelike dark fantasy artwork. While some art critics might object to the notion of AI producing art, others find the fusion of technology and creativity to be fascinating.
AI art explores new creative possibilities by utilising the computational power of machines, providing a distinct viewpoint on the genre. Artificial intelligence (AI) algorithms can recognise patterns, themes, and visual motifs in thousands of dark fantasy artworks that may have escaped human artists. This process can result in the production of captivating works of art that stretch the bounds of our imagination and alter our ideas of what is conceivable in the field of dark fantasy.
But it’s crucial to understand that AI art is a supplement to conventional artistic techniques rather than their replacement. Even though AI is capable of producing beautiful images, it lacks the emotional nuance and human touch that come from the artistic vision and the artist’s life experiences. As artists, we imbue our work with meaning and resonance that artificial intelligence is unable to match by bringing our distinct viewpoints, feelings, and life experiences to it.
AI art, in my opinion, is not a threat but rather a useful instrument that can support artists with their research and inspiration. Artists can explore uncharted creative territory, try out novel styles and techniques, and expand their creative horizons by working with AI. In the end, dark fantasy art will continue to be relevant in the digital age thanks to the fusion of human creativity and technological innovation.

“In conclusion, let your creativity run wild.”

Creating dark fantasy art is an adventure into the unknown, where creativity is king and imagination is unbridled. Embrace the dark and let your imagination run wild, regardless of your level of experience as an artist or your level of curiosity. A little inspiration, the correct methods, and a hint of magic will allow you to craft works of dark fantasy art that will enthral and motivate viewers for years to come.
So, why do you hesitate? Explore the depths of dark fantasy and let your creative side out now!

My Dark Fantasy World

Hi there, fellow fans of dark fantasy! Thanks to your unflinching support, our blog — which is packed with tales and inspirations of dark fantasy — is making waves on TikTok, Pinterest, and YouTube. Even more thrilling is the fact that we’re creating a captivating Trading Card Game to further engross you in Twilight Citadel’s eerie mysteries. Explore the depths of the shadows with our website, where you can get eerie yet lovely phone wallpapers and posters. Furthermore, we’ve got you covered with free resources like desktop wallpapers and profile pictures to make sure your gadgets are brimming with eerie fantasy atmosphere. Come along with us on this surreal adventure, where fears come true and shadows dance. Are you prepared to welcome the gloom?
submitted by ExcitingBelt to talesofgwyn [link] [comments]


2024.05.11 15:56 Soninetz Originality AI Review: Comprehensive Test & Analysis

Originality AI Review: Comprehensive Test & Analysis
In the realm of artificial intelligence, the quest for originality is paramount. Today, we delve into an insightful review that explores how AI can revolutionize creativity and innovation. Unveiling the potential of AI to inspire fresh ideas and concepts, this review navigates through the intricate landscape of technology and creativity. Join us as we unravel the impact of AI on originality and discover the possibilities that lie ahead.
Useful Links:
  1. Originality AI LifeTime Deal
  2. Originality AI Free Trial

Key Takeaways

  • Testing Originality AI's Detector reveals its accuracy in detecting plagiarism and providing valuable feedback.
  • One Year of Using Originality AI showcases the long-term benefits of integrating AI tools for maintaining content authenticity.
  • Key Features Breakdown highlights the essential functions that make Originality AI a reliable tool for content creators and educators.
  • Pros and Cons Overview offers a balanced view of the strengths and limitations of Originality AI, aiding in informed decision-making.
  • Utilize Originality AI to enhance content originality and ensure academic integrity by regularly checking for plagiarism.
  • Leverage the insights from this article to make informed decisions on incorporating Originality AI into your workflow for content creation and plagiarism detection.

Testing Originality AI's Detector

AI Content

Detectors: Conducted tests on AI content detectors like Originality.ai to identify AI-generated content from GPT-3 and ChatGPT. The tool showed promising results in some instances.
https://preview.redd.it/a2ziso76zszc1.png?width=844&format=png&auto=webp&s=7ccab09349005eca1e2bea9900b3a4be2e702528
Fact-check like a pro! 📚 Start your Free Trial with Originality AI today!

Accuracy Evaluation

Tool Performance: The originality scores provided by the tool varied based on the type of AI-generated content. While ai content detectors accurately detected some instances, it also displayed inconsistencies in identifying others.

Strategies for Users

Content Verification: To enhance accuracy and user experience, human users can cross-verify the AI checker's results by manually reviewing suspicious content. This approach helps mitigate the risk of false positives and ensures reliable outcomes.

One Year of Using Originality AI

Effectiveness

Using Originality AI for a year has significantly improved the efficiency of detecting plagiarism and ensuring original content. The tool's ability to analyze text and compare it against vast databases within seconds is truly remarkable.
The accuracy of AI detection has notably enhanced over time, reducing false positives and negatives. This progress reflects the continuous development and fine-tuning of the AI algorithms behind the tool.

Limitations

Despite its advancements, Originality AI still faces challenges in distinguishing between similar but not identical content. This limitation can sometimes lead to overlooking subtle instances of plagiarism that may require human writer intervention.

Integration

Integrating Originality AI into content creation workflows has proven to be practical and beneficial. Content creators in various fields, such as affiliate marketing, have found the tool reliable in maintaining authenticity and upholding ethical standards.
  • Pros:
    • Efficient plagiarism detection
    • Continuous accuracy improvements
  • Cons:
    • Difficulty in identifying slightly altered content

Key Features Breakdown

Useful Links:
  1. Originality AI LifeTime Deal
  2. Originality AI Free Trial

Detection Capabilities

Originality.ai boasts advanced detection capabilities that can accurately differentiate between AI-generated and human-written content. By analyzing various linguistic patterns, sentence structures, and vocabulary usage, the AI tool can provide users with precise insights into the authenticity of the text.

User Interface

The platform offers a user-friendly interface that simplifies the process of checking content originality. With intuitive navigation and clear instructions, users can easily upload their documents and receive detailed reports on the quality and readability of their work.

Unique Functionalities

One standout feature of Originality.ai is its ability to assign an original score to each piece of content. This score indicates the level of authenticity and uniqueness in the text, helping users gauge the content quality at a glance. The tool provides readability scores based on different grade levels, enabling writers to tailor their content to specific audiences.
  • Pros:
    • Accurate differentiation between AI-generated and human-written content.
    • Intuitive user interface for easy navigation.
    • Detailed reports on quality, readability, and originality scores.

Pros and Cons Overview

Detection Accuracy

Originality.ai excels in accurately identifying AI-generated content, ensuring authenticity and credibility.
The tool's advanced algorithms swiftly detect any signs of plagiarism or automated content creation, safeguarding against intellectual property violations.

Cost-Effectiveness

While Originality.ai offers valuable features, its pricing structure may deter users on a tight budget.
Users must weigh the benefits against the costs, especially for individuals or small businesses with limited financial resources.

Vulnerability to Deception

Despite its robust detection capabilities, Originality.ai remains susceptible to sophisticated manipulation tactics.
Users should remain vigilant as malicious entities can exploit vulnerabilities to evade detection and pass off plagiarized content as original.

Summary

In conclusion, after testing Originality AI's detector and utilizing it for a year, you've seen firsthand the key features, pros, and cons it offers. The tool's accuracy, ease of use, and detailed reports have undoubtedly streamlined your workflow and enhanced your content creation process. While there are minor drawbacks to consider, the overall benefits of using Originality AI outweigh any limitations.
Moving forward, continue leveraging Originality AI to maintain the integrity of your work, boost your productivity, and ensure that your content stands out for all the right reasons. By incorporating this powerful AI tool into your routine, you can confidently produce high-quality, authentic content that resonates with your audience. Take action today to elevate your content creation efforts with Originality AI!
Verify, don't plagiarize! 🛡️ Experience Originality AI's Free Trial for yourself!

Frequently Asked Questions

How accurate is Originality AI's detector in identifying plagiarized content?

Originality AI's detector is highly accurate, utilizing advanced algorithms to compare text against a vast database. It can pinpoint even subtle similarities, ensuring thorough plagiarism detection using AI.

What distinguishes Originality AI after using it for one year?

After a year of use, Originality AI has proven consistent in delivering reliable results. Its user-friendly interface, timely updates, and exceptional customer support make it a top choice for plagiarism detection needs.

What are the key features that set Originality AI apart from other similar tools?

Originality AI stands out with its comprehensive plagiarism detection capabilities, customizable settings, detailed reports, and integration options with various platforms. These features enhance efficiency and accuracy in identifying unoriginal content.

Can you provide an overview of the pros and cons of using Originality AI?

Pros:
  • Accurate plagiarism detection
  • User-friendly interface
  • Customizable settings
  • Detailed reports
  • Excellent customer support
Cons:
  • Pricing may be higher than some competitors
  • Advanced features may require additional training

Is Originality AI suitable for individuals or businesses seeking a reliable plagiarism detection tool?

Yes, Originality AI caters to both individuals and businesses looking for a dependable solution to detect plagiarism effectively. Its user-friendly nature makes it accessible to users with varying levels of expertise.
Useful Links:
  1. Originality AI LifeTime Deal
  2. Originality AI Free Trial
submitted by Soninetz to ReviewsFactory [link] [comments]


2024.05.11 09:41 Ok-Independence9933 Insights Unveiled: Exploring the Depths of Economic Dynamics with Input-Output Analysis

What is input-output analysis?

Economics uses input-output analysis to investigate sector interdependencies. It considers the inputs (raw materials, labor, and capital) and outputs (goods and services) of each sector to determine how changes in one sector affect others. In the 1930s, Wassily Leontief developed input-output analysis to understand how products and services flow through an economy. At its core, input-output analysis uses input-output tables to highlight the relationships between sectors by presenting their inputs and output destinations. Rows represent inputs, and columns represent outputs in matrix tables. Economists can find sectoral links, estimate the economic implications of production or consumption patterns, and evaluate policies or external shocks by evaluating these tables.
Multipliers are crucial to input-output analysis. They show how one sector indirectly and induced affects the economy. For instance, government funding for infrastructure projects can boost building material demand and production. Construction workers make more and spend it on goods and services from other industries, stimulating economic activity. Regional, environmental, and economic planning use input-output analysis. It helps policymakers, entrepreneurs, and researchers comprehend complicated economic connections and devise successful growth, sustainability, and development policies.

What are the steps involved in conducting input-output analysis?

Input-output analysis necessitates the execution of a number of crucial procedures in order to comprehend the interdependencies that exist within an economy and evaluate the consequences of diverse alterations. Data collection, which includes the gathering of information on the inputs and outputs of various sectors' production activities, is the initial phase. Subsequently, input-output tables are generated by organizing the data above in a matrix structure to symbolize the interconnections among sectors.
It is then necessary to balance these statistics so that, for each sector, total inputs and total outputs are equal, taking into consideration variables such as intermediate consumption and imports. In conclusion, the quantification of indirect and induced impacts of sectoral changes on the economy as a whole is achieved through the calculation of multipliers. The information provided by these multipliers regarding the ripple effects of changes in policy, external disruptions, and changes in consumption patterns assists researchers, policymakers, and businesses in making well-informed decisions regarding sustainability, development, and economic planning.

How can companies take advantage of input-output analysis?

Organizations can utilize input-output analysis to identify growth opportunities, optimize operations, and formulate informed strategic decisions, among other benefits. A notable benefit is the acquisition of knowledge regarding the intricacies and interdependencies of the supply chain. Organizations can discern sectors that are substantial purchasers of their outputs and sectors that are critical suppliers of their inputs through the examination of input-output tables. Strategies for expanding into new markets, initiatives for developing products, and collaborations with complementary companies can all be informed by this data. As an illustration, if a manufacturer specializing in renewable energy equipment detects an increasing need for its products within the construction industry, it may pursue strategic partnerships with construction firms or implement targeted marketing campaigns.
Moreover, input-output analysis empowers organizations to evaluate the possible consequences of external variables, including alterations in policy, economic disruptions, or fluctuations in consumer inclinations. Organizations can forecast the impacts of these modifications on their revenues, supply chains, and operations by employing input-output tables and multipliers to model various scenarios. Organizations can effectively mitigate risks, develop contingency plans, and modify their strategies by adopting this proactive approach.

What is the vital value of Input-output analysis?

The fundamental significance of input-output analysis resides in its capacity to furnish an all-encompassing comprehension of the interconnections that exist within an economy. Such insights are indispensable for making well-informed decisions, devising policies, and devising strategies. Through the examination of the interconnections, reliances, and prospects for expansion that exist between sectors, input-output analysis facilitates the identification of critical linkages. By utilizing this analytical framework, policymakers, businesses, and researchers are able to evaluate the potential ramifications of diverse transformations, including technological advancements, policy interventions, and changes in consumer behavior, in distinct sectors of the economy. An inherent advantage of input-output analysis is its broad range of applications and feasibility in diverse domains and circumstances.
Furthermore, input-output analysis enables a comprehensive comprehension of intricate economic systems by considering the direct and indirect consequences of sector-specific modifications on other components. This capability empowers stakeholders to evaluate the far-reaching ramifications of their choices and behaviors, forecast possible hazards and advantages, and formulate approaches to optimize favorable outcomes while minimizing unfavorable ones.

What value does conducting an input-output analysis along with primary research bring to the table?

The integration of input-output analysis and primary research provides substantial value as it enhances comprehension of economic dynamics through the incorporation of empirical data and perspectives. Input-output analysis offers a macroeconomic outlook through the examination of interdependencies among sectors within an economy. In contrast, primary research conducts an in-depth investigation into particular sectors, markets, or industries in order to collect information and context firsthand. Through the integration of these two methodologies, stakeholders can acquire a more holistic and intricate comprehension of economic phenomena, thereby facilitating strategic planning and decision-making that are better informed.
In addition, primary research supplements the quantitative analysis of input-output models with qualitative insights and contextual knowledge. Although input-output analysis measures the quantity of inputs and outputs transferring between sectors, only primary research can reveal the motivations, behaviors, and preferences that underlie these flows. Qualitative comprehension is critical in interpreting the outcomes of input-output analysis, discern potential avenues for innovation or market differentiation, and develop focused interventions or strategies.

How can input-output analysis with secondary market research correlate?

By establishing a correlation between input-output analysis and secondary market research, one can significantly augment comprehension of market trends and economic dynamics. Secondary market research utilizes pre-existing sources, including economic databases, industry reports, and market analyses, to collect valuable information and insights. Through the incorporation of secondary research and input-output analysis, stakeholders have the opportunity to enhance their comprehension of competitive environments, market structures, and sectoral interdependencies. This, in turn, can facilitate more informed strategic planning and decision-making. An area of correlation between input-output analysis and secondary market research can be observed in the validation and enhancement of input-output models. Supplementary information regarding sectoral inputs, outputs, and interrelationships is obtained through secondary market research.
This information can be utilized to verify the input-output tables' assumptions and parameters. In addition, in addition to the quantitative analysis of input-output models, secondary market research can furnish market intelligence and contextual insights. Through the examination of market analyses and secondary research reports, stakeholders are able to acquire a more profound comprehension of market trends, consumer behavior, and competitive dynamics that are particular to their sector. The interpretation of input-output analysis results can be informed by this qualitative understanding, which can assist stakeholders in identifying potential avenues for expansion, innovation, or market development.
Read The Blog: https://www.cognitivemarketresearch.com/blog/insights-unveiled-exploring-the-depths-of-economic-dynamics-with-input-output-analysis
submitted by Ok-Independence9933 to u/Ok-Independence9933 [link] [comments]


2024.05.10 22:37 SS41BR Parallel-Committees": A Novelle Secure and High-Performance Distributed Database Architecture

In my PhD thesis, I proposed a novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture, named “Parallel Committees”.
I utilized an innovative sharding technique to enable the use of Byzantine Fault Tolerance (BFT) consensus mechanisms in very large-scale networks.
With this innovative full sharding approach supporting both processing sharding and storage sharding, as more processors and replicas join the network, the system computing power and storage capacity increase unlimitedly, while a classic BFT consensus is utilized.
My approach also allows an unlimited number of clients to join the system simultaneously without reducing system performance and transactional throughput.
I introduced several innovative techniques: for distributing nodes between shards, processing transactions across shards, improving security and scalability of the system, proactively circulating committee members, and forming new committees automatically.
I introduced an innovative and novel approach to distributing nodes between shards, using a public key generation process, called “KeyChallenge”, that simultaneously mitigates Sybil attacks and serves as a proof-of-work. The “KeyChallenge” idea is published in the peer-reviewed conference proceedings of ACM ICCTA 2024, Vienna, Austria.
In this regard, I proved that it is not straightforward for an attacker to generate a public key so that all characters of the key match the ranges set by the system.I explained how to automatically form new committees based on the rate of candidate processor nodes.
The purpose of this technique is to optimally use all network capacity so that inactive surplus processors in the queue of a committee that were not active are employed in the new committee and play an effective role in increasing the throughput and the efficiency of the system.
This technique leads to the maximum utilization of processor nodes and the capacity of computation and storage of the network to increase both processing sharding and storage sharding as much as possible.
In the proposed architecture, members of each committee are proactively and alternately replaced with backup processors. This technique of proactively circulating committee members has three main results:
This procedure can improve and enhance the fault tolerance threshold of the consensus mechanism.I also elucidated strategies to thwart the malicious action of “Key-Withholding”, where previously generated public keys are prevented from future shard access. The approach involves periodically altering the acceptable ranges for each character of the public key. The proposed architecture effectively reduces the number of undesirable cross-shard transactions that are more complex and costly to process than intra-shard transactions.
I compared the proposed idea with other sharding-based data replication systems and mentioned the main differences, which are detailed in Section 4.7 of my dissertation.
The proposed architecture not only opens the door to a new world for further research in this field but also represents a significant step forward in enhancing distributed databases and data replication systems.
The proposed idea has been published in the peer-reviewed conference proceedings of IEEE BCCA 2023.
Additionally, I provided an explanation for the decision not to employ a blockchain structure in the proposed architecture, an issue that is discussed in great detail in Chapter 5 of my dissertation.
The complete version of my dissertation is accessible via the following link: https://www.researchgate.net/publication/379148513_Novel_Fault-Tolerant_Self-Configurable_Scalable_Secure_Decentralized_and_High-Performance_Distributed_Database_Replication_Architecture_Using_Innovative_Sharding_to_Enable_the_Use_of_BFT_Consensus_Mec
I compared my proposed database architecture with various distributed databases and data replication systems in Section 4.7 of my dissertation. This comparison included Apache Cassandra, Amazon DynamoDB, Google Bigtable, Google Spanner, and ScyllaDB. I strongly recommend reviewing that section for better clarity and understanding.
The main problem is as follows:
Classic consensus mechanisms such as Paxos or PBFT provide strong and strict consistency in distributed databases. However, due to their low scalability, they are not commonly used. Instead, methods such as eventual consistency are employed, which, while not providing strong consistency, offer much higher performance compared to classic consensus mechanisms. The primary reason for the low scalability of classic consensus mechanisms is their high time complexity and message complexity.
I recommend watching the following video explaining this matter: https://www.college-de-france.ffagenda/colloque/taking-stock-of-distributed-computing/living-without-consensus
My proposed architecture enables the use of classic consensus mechanisms such as Paxos, PBFT, etc., in very large and high-scale networks, while providing very high transactional throughput. This ensures both strict consistency and high performance in a highly scalable network. This is achievable through an innovative approach of parallelization and sharding in my proposed architecture.
If needed, I can provide more detailed explanations of the problem and the proposed solution.
I would greatly appreciate feedback and comments on the distributed database architecture proposed in my PhD dissertation. Your insights and opinions are invaluable, so please feel free to share them without hesitation.
submitted by SS41BR to SoftwareEngineering [link] [comments]


2024.05.10 22:33 SS41BR Parallel-Committees": A Novelle Secure and High-Performance Distributed Database Architecture

In my PhD thesis, I proposed a novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture, named “Parallel Committees”.
I utilized an innovative sharding technique to enable the use of Byzantine Fault Tolerance (BFT) consensus mechanisms in very large-scale networks.
With this innovative full sharding approach supporting both processing sharding and storage sharding, as more processors and replicas join the network, the system computing power and storage capacity increase unlimitedly, while a classic BFT consensus is utilized.
My approach also allows an unlimited number of clients to join the system simultaneously without reducing system performance and transactional throughput.
I introduced several innovative techniques: for distributing nodes between shards, processing transactions across shards, improving security and scalability of the system, proactively circulating committee members, and forming new committees automatically.
I introduced an innovative and novel approach to distributing nodes between shards, using a public key generation process, called “KeyChallenge”, that simultaneously mitigates Sybil attacks and serves as a proof-of-work. The “KeyChallenge” idea is published in the peer-reviewed conference proceedings of ACM ICCTA 2024, Vienna, Austria.
In this regard, I proved that it is not straightforward for an attacker to generate a public key so that all characters of the key match the ranges set by the system.I explained how to automatically form new committees based on the rate of candidate processor nodes.
The purpose of this technique is to optimally use all network capacity so that inactive surplus processors in the queue of a committee that were not active are employed in the new committee and play an effective role in increasing the throughput and the efficiency of the system.
This technique leads to the maximum utilization of processor nodes and the capacity of computation and storage of the network to increase both processing sharding and storage sharding as much as possible.
In the proposed architecture, members of each committee are proactively and alternately replaced with backup processors. This technique of proactively circulating committee members has three main results:
This procedure can improve and enhance the fault tolerance threshold of the consensus mechanism.I also elucidated strategies to thwart the malicious action of “Key-Withholding”, where previously generated public keys are prevented from future shard access. The approach involves periodically altering the acceptable ranges for each character of the public key. The proposed architecture effectively reduces the number of undesirable cross-shard transactions that are more complex and costly to process than intra-shard transactions.
I compared the proposed idea with other sharding-based data replication systems and mentioned the main differences, which are detailed in Section 4.7 of my dissertation.
The proposed architecture not only opens the door to a new world for further research in this field but also represents a significant step forward in enhancing distributed databases and data replication systems.
The proposed idea has been published in the peer-reviewed conference proceedings of IEEE BCCA 2023.
Additionally, I provided an explanation for the decision not to employ a blockchain structure in the proposed architecture, an issue that is discussed in great detail in Chapter 5 of my dissertation.
The complete version of my dissertation is accessible via the following link: https://www.researchgate.net/publication/379148513_Novel_Fault-Tolerant_Self-Configurable_Scalable_Secure_Decentralized_and_High-Performance_Distributed_Database_Replication_Architecture_Using_Innovative_Sharding_to_Enable_the_Use_of_BFT_Consensus_Mec
I compared my proposed database architecture with various distributed databases and data replication systems in Section 4.7 of my dissertation. This comparison included Apache Cassandra, Amazon DynamoDB, Google Bigtable, Google Spanner, and ScyllaDB. I strongly recommend reviewing that section for better clarity and understanding.
The main problem is as follows:
Classic consensus mechanisms such as Paxos or PBFT provide strong and strict consistency in distributed databases. However, due to their low scalability, they are not commonly used. Instead, methods such as eventual consistency are employed, which, while not providing strong consistency, offer much higher performance compared to classic consensus mechanisms. The primary reason for the low scalability of classic consensus mechanisms is their high time complexity and message complexity.
I recommend watching the following video explaining this matter: https://www.college-de-france.ffagenda/colloque/taking-stock-of-distributed-computing/living-without-consensus
My proposed architecture enables the use of classic consensus mechanisms such as Paxos, PBFT, etc., in very large and high-scale networks, while providing very high transactional throughput. This ensures both strict consistency and high performance in a highly scalable network. This is achievable through an innovative approach of parallelization and sharding in my proposed architecture.
If needed, I can provide more detailed explanations of the problem and the proposed solution.
I would greatly appreciate feedback and comments on the distributed database architecture proposed in my PhD dissertation. Your insights and opinions are invaluable, so please feel free to share them without hesitation.
submitted by SS41BR to bigdata [link] [comments]


2024.05.10 22:31 SS41BR Parallel-Committees": A Novelle Secure and High-Performance Distributed Database Architecture

In my PhD thesis, I proposed a novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture, named “Parallel Committees”.
I utilized an innovative sharding technique to enable the use of Byzantine Fault Tolerance (BFT) consensus mechanisms in very large-scale networks.
With this innovative full sharding approach supporting both processing sharding and storage sharding, as more processors and replicas join the network, the system computing power and storage capacity increase unlimitedly, while a classic BFT consensus is utilized.
My approach also allows an unlimited number of clients to join the system simultaneously without reducing system performance and transactional throughput.
I introduced several innovative techniques: for distributing nodes between shards, processing transactions across shards, improving security and scalability of the system, proactively circulating committee members, and forming new committees automatically.
I introduced an innovative and novel approach to distributing nodes between shards, using a public key generation process, called “KeyChallenge”, that simultaneously mitigates Sybil attacks and serves as a proof-of-work. The “KeyChallenge” idea is published in the peer-reviewed conference proceedings of ACM ICCTA 2024, Vienna, Austria.
In this regard, I proved that it is not straightforward for an attacker to generate a public key so that all characters of the key match the ranges set by the system.I explained how to automatically form new committees based on the rate of candidate processor nodes.
The purpose of this technique is to optimally use all network capacity so that inactive surplus processors in the queue of a committee that were not active are employed in the new committee and play an effective role in increasing the throughput and the efficiency of the system.
This technique leads to the maximum utilization of processor nodes and the capacity of computation and storage of the network to increase both processing sharding and storage sharding as much as possible.
In the proposed architecture, members of each committee are proactively and alternately replaced with backup processors. This technique of proactively circulating committee members has three main results:
This procedure can improve and enhance the fault tolerance threshold of the consensus mechanism.I also elucidated strategies to thwart the malicious action of “Key-Withholding”, where previously generated public keys are prevented from future shard access. The approach involves periodically altering the acceptable ranges for each character of the public key. The proposed architecture effectively reduces the number of undesirable cross-shard transactions that are more complex and costly to process than intra-shard transactions.
I compared the proposed idea with other sharding-based data replication systems and mentioned the main differences, which are detailed in Section 4.7 of my dissertation.
The proposed architecture not only opens the door to a new world for further research in this field but also represents a significant step forward in enhancing distributed databases and data replication systems.
The proposed idea has been published in the peer-reviewed conference proceedings of IEEE BCCA 2023.
Additionally, I provided an explanation for the decision not to employ a blockchain structure in the proposed architecture, an issue that is discussed in great detail in Chapter 5 of my dissertation.
The complete version of my dissertation is accessible via the following link: https://www.researchgate.net/publication/379148513_Novel_Fault-Tolerant_Self-Configurable_Scalable_Secure_Decentralized_and_High-Performance_Distributed_Database_Replication_Architecture_Using_Innovative_Sharding_to_Enable_the_Use_of_BFT_Consensus_Mec
I compared my proposed database architecture with various distributed databases and data replication systems in Section 4.7 of my dissertation. This comparison included Apache Cassandra, Amazon DynamoDB, Google Bigtable, Google Spanner, and ScyllaDB. I strongly recommend reviewing that section for better clarity and understanding.
The main problem is as follows:
Classic consensus mechanisms such as Paxos or PBFT provide strong and strict consistency in distributed databases. However, due to their low scalability, they are not commonly used. Instead, methods such as eventual consistency are employed, which, while not providing strong consistency, offer much higher performance compared to classic consensus mechanisms. The primary reason for the low scalability of classic consensus mechanisms is their high time complexity and message complexity.
I recommend watching the following video explaining this matter: https://www.college-de-france.ffagenda/colloque/taking-stock-of-distributed-computing/living-without-consensus
My proposed architecture enables the use of classic consensus mechanisms such as Paxos, PBFT, etc., in very large and high-scale networks, while providing very high transactional throughput. This ensures both strict consistency and high performance in a highly scalable network. This is achievable through an innovative approach of parallelization and sharding in my proposed architecture.
If needed, I can provide more detailed explanations of the problem and the proposed solution.
I would greatly appreciate feedback and comments on the distributed database architecture proposed in my PhD dissertation. Your insights and opinions are invaluable, so please feel free to share them without hesitation.
submitted by SS41BR to ComputerEngineering [link] [comments]


2024.05.10 22:28 SS41BR "Parallel-Committees": A Novelle Secure and High-Performance Distributed Database Architecture

In my PhD thesis, I proposed a novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture, named “Parallel Committees”.
I utilized an innovative sharding technique to enable the use of Byzantine Fault Tolerance (BFT) consensus mechanisms in very large-scale networks.
With this innovative full sharding approach supporting both processing sharding and storage sharding, as more processors and replicas join the network, the system computing power and storage capacity increase unlimitedly, while a classic BFT consensus is utilized.
My approach also allows an unlimited number of clients to join the system simultaneously without reducing system performance and transactional throughput.
I introduced several innovative techniques: for distributing nodes between shards, processing transactions across shards, improving security and scalability of the system, proactively circulating committee members, and forming new committees automatically.
I introduced an innovative and novel approach to distributing nodes between shards, using a public key generation process, called “KeyChallenge”, that simultaneously mitigates Sybil attacks and serves as a proof-of-work. The “KeyChallenge” idea is published in the peer-reviewed conference proceedings of ACM ICCTA 2024, Vienna, Austria.
In this regard, I proved that it is not straightforward for an attacker to generate a public key so that all characters of the key match the ranges set by the system.I explained how to automatically form new committees based on the rate of candidate processor nodes.
The purpose of this technique is to optimally use all network capacity so that inactive surplus processors in the queue of a committee that were not active are employed in the new committee and play an effective role in increasing the throughput and the efficiency of the system.
This technique leads to the maximum utilization of processor nodes and the capacity of computation and storage of the network to increase both processing sharding and storage sharding as much as possible.
In the proposed architecture, members of each committee are proactively and alternately replaced with backup processors. This technique of proactively circulating committee members has three main results:
This procedure can improve and enhance the fault tolerance threshold of the consensus mechanism.I also elucidated strategies to thwart the malicious action of “Key-Withholding”, where previously generated public keys are prevented from future shard access. The approach involves periodically altering the acceptable ranges for each character of the public key. The proposed architecture effectively reduces the number of undesirable cross-shard transactions that are more complex and costly to process than intra-shard transactions.
I compared the proposed idea with other sharding-based data replication systems and mentioned the main differences, which are detailed in Section 4.7 of my dissertation.
The proposed architecture not only opens the door to a new world for further research in this field but also represents a significant step forward in enhancing distributed databases and data replication systems.
The proposed idea has been published in the peer-reviewed conference proceedings of IEEE BCCA 2023.
Additionally, I provided an explanation for the decision not to employ a blockchain structure in the proposed architecture, an issue that is discussed in great detail in Chapter 5 of my dissertation.
The complete version of my dissertation is accessible via the following link: https://www.researchgate.net/publication/379148513_Novel_Fault-Tolerant_Self-Configurable_Scalable_Secure_Decentralized_and_High-Performance_Distributed_Database_Replication_Architecture_Using_Innovative_Sharding_to_Enable_the_Use_of_BFT_Consensus_Mec
I compared my proposed database architecture with various distributed databases and data replication systems in Section 4.7 of my dissertation. This comparison included Apache Cassandra, Amazon DynamoDB, Google Bigtable, Google Spanner, and ScyllaDB. I strongly recommend reviewing that section for better clarity and understanding.
The main problem is as follows:
Classic consensus mechanisms such as Paxos or PBFT provide strong and strict consistency in distributed databases. However, due to their low scalability, they are not commonly used. Instead, methods such as eventual consistency are employed, which, while not providing strong consistency, offer much higher performance compared to classic consensus mechanisms. The primary reason for the low scalability of classic consensus mechanisms is their high time complexity and message complexity.
I recommend watching the following video explaining this matter: https://www.college-de-france.ffagenda/colloque/taking-stock-of-distributed-computing/living-without-consensus
My proposed architecture enables the use of classic consensus mechanisms such as Paxos, PBFT, etc., in very large and high-scale networks, while providing very high transactional throughput. This ensures both strict consistency and high performance in a highly scalable network. This is achievable through an innovative approach of parallelization and sharding in my proposed architecture.
If needed, I can provide more detailed explanations of the problem and the proposed solution.
I would greatly appreciate feedback and comments on the distributed database architecture proposed in my PhD dissertation. Your insights and opinions are invaluable, so please feel free to share them without hesitation.
submitted by SS41BR to cryptography [link] [comments]


2024.05.10 22:27 SS41BR "Parallel-Committees": A Novelle Secure and High-Performance Distributed Database Architecture

In my PhD thesis, I proposed a novel fault-tolerant, self-configurable, scalable, secure, decentralized, and high-performance distributed database replication architecture, named “Parallel Committees”.
I utilized an innovative sharding technique to enable the use of Byzantine Fault Tolerance (BFT) consensus mechanisms in very large-scale networks.
With this innovative full sharding approach supporting both processing sharding and storage sharding, as more processors and replicas join the network, the system computing power and storage capacity increase unlimitedly, while a classic BFT consensus is utilized.
My approach also allows an unlimited number of clients to join the system simultaneously without reducing system performance and transactional throughput.
I introduced several innovative techniques: for distributing nodes between shards, processing transactions across shards, improving security and scalability of the system, proactively circulating committee members, and forming new committees automatically.
I introduced an innovative and novel approach to distributing nodes between shards, using a public key generation process, called “KeyChallenge”, that simultaneously mitigates Sybil attacks and serves as a proof-of-work. The “KeyChallenge” idea is published in the peer-reviewed conference proceedings of ACM ICCTA 2024, Vienna, Austria.
In this regard, I proved that it is not straightforward for an attacker to generate a public key so that all characters of the key match the ranges set by the system.I explained how to automatically form new committees based on the rate of candidate processor nodes.
The purpose of this technique is to optimally use all network capacity so that inactive surplus processors in the queue of a committee that were not active are employed in the new committee and play an effective role in increasing the throughput and the efficiency of the system.
This technique leads to the maximum utilization of processor nodes and the capacity of computation and storage of the network to increase both processing sharding and storage sharding as much as possible.
In the proposed architecture, members of each committee are proactively and alternately replaced with backup processors. This technique of proactively circulating committee members has three main results:
This procedure can improve and enhance the fault tolerance threshold of the consensus mechanism.I also elucidated strategies to thwart the malicious action of “Key-Withholding”, where previously generated public keys are prevented from future shard access. The approach involves periodically altering the acceptable ranges for each character of the public key. The proposed architecture effectively reduces the number of undesirable cross-shard transactions that are more complex and costly to process than intra-shard transactions.
I compared the proposed idea with other sharding-based data replication systems and mentioned the main differences, which are detailed in Section 4.7 of my dissertation.
The proposed architecture not only opens the door to a new world for further research in this field but also represents a significant step forward in enhancing distributed databases and data replication systems.
The proposed idea has been published in the peer-reviewed conference proceedings of IEEE BCCA 2023.
Additionally, I provided an explanation for the decision not to employ a blockchain structure in the proposed architecture, an issue that is discussed in great detail in Chapter 5 of my dissertation.
The complete version of my dissertation is accessible via the following link: https://www.researchgate.net/publication/379148513_Novel_Fault-Tolerant_Self-Configurable_Scalable_Secure_Decentralized_and_High-Performance_Distributed_Database_Replication_Architecture_Using_Innovative_Sharding_to_Enable_the_Use_of_BFT_Consensus_Mec
I compared my proposed database architecture with various distributed databases and data replication systems in Section 4.7 of my dissertation. This comparison included Apache Cassandra, Amazon DynamoDB, Google Bigtable, Google Spanner, and ScyllaDB. I strongly recommend reviewing that section for better clarity and understanding.
The main problem is as follows:
Classic consensus mechanisms such as Paxos or PBFT provide strong and strict consistency in distributed databases. However, due to their low scalability, they are not commonly used. Instead, methods such as eventual consistency are employed, which, while not providing strong consistency, offer much higher performance compared to classic consensus mechanisms. The primary reason for the low scalability of classic consensus mechanisms is their high time complexity and message complexity.
I recommend watching the following video explaining this matter: https://www.college-de-france.ffagenda/colloque/taking-stock-of-distributed-computing/living-without-consensus
My proposed architecture enables the use of classic consensus mechanisms such as Paxos, PBFT, etc., in very large and high-scale networks, while providing very high transactional throughput. This ensures both strict consistency and high performance in a highly scalable network. This is achievable through an innovative approach of parallelization and sharding in my proposed architecture.
If needed, I can provide more detailed explanations of the problem and the proposed solution.
I would greatly appreciate feedback and comments on the distributed database architecture proposed in my PhD dissertation. Your insights and opinions are invaluable, so please feel free to share them without hesitation.
submitted by SS41BR to compsci [link] [comments]


http://rodzice.org/