Systemic circulation diagram

Basic Electronic Components: English Translation

2024.05.15 17:11 No-Physics7479 Basic Electronic Components: English Translation

1. Resistors:

Function: Limits current, divides current, creates voltage drops, adjusts voltage.
Variable Parameter: Resistance (R) - measured in Ohms (Ω).
Significance: The higher the resistance value, the lower the current through it, and vice versa.
Construction: A resistive core (carbon, metal, ceramic, etc.) coated with an insulating layer.
Operating Principle: Based on the collision of electrons with atoms in the resistive core, reducing the energy of the electrons and converting it into heat energy.
Applications: Widely used in electronic circuits, from simple to complex circuits. For example: limiting current through LEDs, dividing current in amplifier circuits, creating voltage drops for voltage regulator circuits, adjusting voltage in filter circuits...

2. Capacitors:

Function: Stores electrical energy, filters signals, blocks AC current, passes DC current.
Variable Parameter: Capacitance (C) - measured in Farads (F).
Significance: The higher the capacitance value, the greater the ability to store electrical energy, and vice versa.
Construction: Two parallel metal plates separated by an insulating dielectric (paper, ceramic, mica...).
Operating Principle: When a voltage is applied, an electric field is created between the capacitor plates, charging the capacitor plates. When the power is turned off, the electric field remains and keeps the capacitor plates charged.
Applications: Very diverse in electronic circuits, from power supply filtering to oscillator circuits. For example: filtering power for electronic circuits, generating pulses for oscillator circuits, blocking noise signals...

3. Inductors:

Function: Stores electrical energy in the form of a magnetic field, resists sudden changes in current, creates time delays.
Variable Parameter: Inductance (L) - measured in Henrys (H).
Significance: The higher the inductance value, the greater the resistance to sudden changes in current, and vice versa.
Construction: A coil of conductive wire wrapped around a core (plastic, iron...).
Operating Principle: When current flows through the inductor, a magnetic field is created around it. When the current changes, the magnetic field also changes, generating an induced voltage in the opposite direction of the current, counteracting the sudden change in current.
Applications: Common in power supply filtering, resonant circuits, transformer circuits... For example: filtering power for electronic circuits, generating pulses for oscillator circuits, converting voltage...

4. Diodes:

Function: Allows current to flow in one direction, blocks current in the opposite direction.
Variable Parameter: Threshold voltage (Uf) - measured in Volts (V).
Significance: The higher the threshold voltage, the higher the voltage required for the diode to conduct.
Construction: Two semiconductor layers joined together to form a P-N junction.
Operating Principle: Based on the principle of electron and hole diffusion. When there is a forward voltage, current flows through the diode. When there is a reverse voltage, the current is blocked.
Applications: Widely used in electronic circuits, from rectification circuits to protection circuits. For example: rectifying AC power to DC power, protecting electronic circuits from reverse voltage...

5. Transistors:

Function: Amplifies electrical signals, controls current, switches on and off electrical circuits.
Variable Parameter: Hfe (β) - current gain.
Construction: Three semiconductor layers joined together to form N-P-N or P-N-P.
Operating Principle: Based on the control of current through one semiconductor layer (base) by current in another semiconductor layer (emitter, collector).
Applications: Very diverse in electronic circuits, from audio amplifier circuits to microprocessor circuits...

Integrated Circuits (ICs): Operating Principle

Integrated circuits (ICs), also known as microchips, are assemblies of electronic components interconnected on a small semiconductor substrate. These components can include transistors, resistors, capacitors, diodes, and many other types. ICs are used to perform a wide range of electronic functions, from simple to complex.
The basic operating principle of ICs is to utilize the properties of semiconductor materials to create transistors and other electronic components. These transistors are then interconnected according to pre-designed circuit diagrams to perform the desired functions.
There are two main types of ICs:
Digital ICs: This type of IC uses electronic signals at two voltage levels (usually 0V and 5V) to represent data. Digital ICs are used in electronic devices such as computers, mobile phones, and many other devices.
Analog ICs: This type of IC uses electronic signals that can change continuously to represent data. Analog ICs are used in electronic devices such as audio amplifiers, filters, and other devices.

Essential Circuit Blocks in Integrated Circuits (ICs)

Integrated circuits (ICs), also known as microchips, are the cornerstone of modern electronics. These tiny marvels of engineering pack millions of transistors, resistors, capacitors, and other components onto a single semiconductor substrate, enabling them to perform a vast array of functions. Understanding the fundamental circuit blocks that make up ICs is crucial for comprehending their operation and appreciating their versatility.
1. Amplifier Circuits:
o Function: Amplify electronic signals (voltage or current) to enhance their strength.
o Structure: Comprises transistors, resistors, capacitors, and other components connected in amplifier configurations like BJT amplifiers, FET amplifiers, etc.
o Operating Principle: Utilizes the principle of controlling current through a transistor to modify the voltage or current at the output.
o Applications: Widely used in electronic devices like radios, televisions, computers, etc.
2. Logic Circuits:
o Function: Perform logical operations (AND, OR, NOT, etc.) on electronic signals.
o Structure: Consists of logic gates constructed from transistors, resistors, capacitors, and other components.
o Operating Principle: Employs the principle of switching voltage states (0 or 1) to represent the outcome of a logical operation.
o Applications: Employed to build central processing units (CPUs), control circuitry in electronic devices, etc.
3. Oscillator Circuits:
o Function: Generate electronic signals with a periodic oscillating waveform of specific frequency and amplitude.
o Structure: Comprises transistors, capacitors, resistors, and other components connected in oscillator configurations like LC oscillators, RC oscillators, etc.
o Operating Principle: Relies on the principle of charging and discharging a capacitor coupled with transistor amplification to produce an oscillating signal.
o Applications: Utilized in electronic devices like clocks, radio transmitters, etc.
4. Memory Circuits:
o Function: Store data in the form of electronic signals.
o Structure: Consists of memory cells like flip-flops, SRAM, DRAM, etc.
o Operating Principle: Employs the principle of altering the state of memory cells to retain data.
o Applications: Employed in electronic devices like computers, mobile phones, etc.

5. Pulse Generator Circuits:

· Function: Generate electrical pulses with square, triangular, or other waveform shapes at specific frequencies and amplitudes.
· Structure: Comprises multivibrators, 555 timer ICs, and other components.
· Operating Principle: Utilizes the principle of charging and discharging a capacitor coupled with transistor amplification to produce electrical pulses.
· Applications: Employed in electronic devices like clocks, computers, etc.

6. Filter Circuits:

· Function: Eliminate unwanted components from electronic signals, such as noise, harmonic signals, etc.
· Structure: Consists of inductors, capacitors, resistors, and other components connected in filter configurations like RC filters, LC filters, etc.
· Operating Principle: Relies on the principle of blocking or attenuating components with frequencies different from the desired frequency.
· Applications: Widely used in electronic devices like radios, televisions, computers, etc.

7. Comparator Circuits:

· Function: Compare two electronic signals and generate an output signal indicating which signal is greater, smaller, or equal.
· Structure: Comprises voltage comparators or current comparators constructed from transistors, resistors, capacitors, and other components.
· Operating Principle: Employs the principle of comparing the voltage or current of two input signals to produce an appropriate output signal.
· Applications: Utilized in electronic devices like control circuits, timing circuits, etc.

8. Signal Conversion Circuits:

· Function: Convert electronic signals from one form to another, such as converting analog signals to digital signals and vice versa.
· Structure: Consists of A/D converters, D/A converters, comparators, filters, and other components.
· Operating Principle: Relies on the principle of sampling analog signals, encoding them into digital signals, or decoding digital signals into analog signals.
· Applications: Widely used in electronic devices like computers, mobile phones, etc.

9. Control Circuits:

· Function: Control the operation of other circuits within an IC or an electronic system.
· Structure: Comprises logic gates, flip-flops, counters, decoders, and other components.
· Operating Principle: Employs the principle of processing logic signals to control the state of other circuits.
· Applications: Utilized in most electronic devices.

10. Communication Circuits:

· Function: Enable ICs to communicate with other devices in an electronic system or with users.
· Structure: Consists of communication buses, buffers, communication controllers, and other components.
· Operating Principle: Relies on the principle of transmitting and receiving data between devices.
· Applications: Employed in most electronic devices.

11. Voltage Regulator Circuits:

· Function: Provide a stable voltage supply to other circuits within an IC or an electronic system.
· Structure: Comprises transistors, Zener diodes, resistors, and other components connected in voltage regulator configurations like linear regulators, switching regulators, etc.
· Operating Principle: Utilizes the principle of adjusting the output voltage by modifying the resistance or current through the transistor or Zener diode.
· Applications: Widely used in electronic devices like computers, mobile phones, etc.
These essential circuit blocks form the foundation of ICs, empowering them to perform a vast array of functions that underpin modern electronics. From amplifying signals to processing data and enabling communication, ICs have revolutionized technology and continue to drive innovation across various industries.
Many sources
submitted by No-Physics7479 to BblackHhorse02 [link] [comments]


2024.05.15 17:01 No-Physics7479 Cascaded Control Circuit Programming

Cascaded control circuits, also known as ladder logic circuits, are a type of electronic circuit used to perform logical operations and control electrical signals in a hierarchical manner in automation systems. These circuits operate based on the principle of comparing the input voltage to predetermined voltage thresholds, thereby generating output signals at different voltage levels.
Basic Structure of a Ladder Diagram
Ladder diagrams are a visual tool for describing logic systems, particularly useful in the field of PLC (Programmable Logic Controller) programming. This diagram is composed of the following main components:
1. Power Rail (Left-hand Rail):
2. Output Rail (Right-hand Rail):
3. Rung (Ladder Step):
4. Connections:
Examples of Components and Sample Rungs
Example 1: Turning on a Light When a Switch is Pressed
Power Rail: Switch (input) Output Rail: Light (output) Rung:
Example 2: Using a Temperature Sensor to Control a Fan
Power Rail:
Explanation:
Note:
Structure of Various Sensors
NTC Temperature Sensor:
Optical Sensor:
Proximity Sensor:
Pressure Sensor:
Accelerometer:
Force Sensor:
Humidity Sensor:
Gas Sensor:
Additional Notes:

The Advent of PLCs (Programmable Logic Controllers)

Prior to the introduction of PLCs (Programmable Logic Controllers), industrial control systems primarily relied on relays to perform control logic. However, the use of relays presented several drawbacks, including:
· Difficulties in Design and Programming: Designing and programming control systems using relays for complex circuits was time-consuming, labor-intensive, and required high expertise.
· Challenges in Troubleshooting and Maintenance: Identifying and rectifying faults within relay-based systems was a lengthy and laborious process.
· Lack of Flexibility: Modifying control logic in relay systems was intricate and expensive.
· Bulky Size: Relay systems often occupied substantial space due to their large size.
The advent of PLCs addressed the limitations of traditional relay systems, offering numerous advantages:
· Ease of Programming: PLCs can be programmed using user-friendly languages like Ladder Logic, Function Block Diagram, and others. This facilitates quicker and simpler design and programming of control systems.
· Simplified Troubleshooting and Maintenance: PLCs possess self-diagnostic capabilities, enabling faster and easier fault identification and rectification within the system.
· High Flexibility: Control logic in PLCs can be readily modified by altering the programming code.
· Compact Size: PLCs are compact, saving installation space.
Owing to these benefits, PLCs rapidly gained popularity as preferred control devices in industrial applications. Today, PLCs are extensively employed across diverse sectors, including:
· Manufacturing: PLCs control automated production lines, encompassing electronics, automotive, food processing, and other manufacturing industries.
· Building Automation: PLCs manage lighting systems, HVAC systems, security systems, and more in buildings.
· Energy: PLCs oversee power systems, water systems, gas systems, and the like.
· Transportation: PLCs handle transportation systems, including railways, roadways, aviation, and others.
The introduction of PLCs marked a revolutionary step in the field of industrial automation, contributing to enhanced production efficiency and productivity.
Many sources
submitted by No-Physics7479 to BblackHhorse02 [link] [comments]


2024.05.15 16:16 OriginaIDefauIt Clausing VS 13” Wiring Help

Clausing VS 13” Wiring Help
I’m trying to get a lathe back up and running. I am having difficulty getting all the relays and safety’s to cooperate, it also doesn’t help that my understanding of the wiring diagram is a little lacking. I’ve included some photos of what I’m working with.
For Context:
Machine came out of a shop where it was hard wired and functioning, but the previous owner has made some modifications to the motor and variable speed system.
When the electricians ran a circuit for it at its current home they forgot to connect the 3rd leg. This resulted in me spending 6 months diagnosing why it wouldn’t run, only for me to realize it didn’t have a 3rd leg.
Fast forward to now and I can get everything to function by manually contacting the relays from the back, but any attempt to control the machine via the operator controls are met with no response.
At this point I just want to pull the wiring out and rebuild the whole harness from scratch.
Any help or advise would be appreciated,
Thanks
submitted by OriginaIDefauIt to Machinists [link] [comments]


2024.05.15 15:53 Accomplished-Emu5697 Using furnace fan for mini split

I have a small home <900sf and do not have central air. I’ve been using window units to cool with fans to help circulate. Even with a 18,000 btu window unit I don’t feel like the air circulates well. The window unit is located in the living room and I often wake up to a damp feeling and damp couch. I want to invest in a mini split system instead but don’t feel there is enough room in the bedrooms for the smaller mini splits. So I would be getting a large one again in the living room but feel it would be better since there is no window open for excess air, moisture and ect. Is it possible to run the fan mode on my furnace to help circulate the air to the other rooms? I have a ecobee thermostat and plan to have the fan run for 10-20mins every hr to help with the circulation.
submitted by Accomplished-Emu5697 to AirConditioners [link] [comments]


2024.05.15 15:41 zesstro My flat is too warm and I have ran out of ideas, can anyone help?

I moved into a new build flat in Cambridge I'm renting a few months ago and its way warmer inside than outside and I'm worried about how it'll be when it gets warmer outside.
Today its 17 degrees outside but 25 degrees in my living room, I was away for 2 days and no electronic on and I still came home to it being 24-25 degrees.
Theres underfloor heating which I turned off weeks ago by putting it on frost protection mode. I havent felt the floor being warm and thermometer shows its on frost mode so I'm confident its off.
The only two windows (bedroom and living room) are East facing but they have black out blinds/curtains over them and its still this warm even at night when its like 10 degrees outside.
Theres an MHVR system which I never had before but its on just running, it has a summer bypass mode which my understanding is it will take in some air from outside and not heat it. I have the indoor temperature set to 19 on this and outside as 14 ( this was the default but I figured it automatically can check the outside temp?) https://www.bpcventilation.com/vent-axia-sentinel-kinetic-bundle
The MHVR is loud so doing something but I dont feel any air coming in/out from the vents in the living room and bathroom but maybe thats normal.
Theres these white vents in the living room which I think are for the MHVR circulation but I dont feel any air coming from them at all but a neighbour told me its very subtle.. https://forum.buildhub.org.uk/uploads/monthly_2019_09/20190930_093518.jpg.9bc42d2af74c15a122e6d181ce817cd2.jpg they look like this
I'm completely confused how it can be staying this warm when its colded outside by quite a bit and doesnt event cool at night. Should I email the renting agency as its getting uncomfortable
submitted by zesstro to HousingUK [link] [comments]


2024.05.15 15:40 Worth-Rice859 Introducing the $STYLE protocol: Revolutionizing Virtual Worlds with Connectivity and Utility

The $STYLE Protocol, developed by the esteemed STYLE Association in 2022, is set to transform how we interact with in-game assets and Non-Fungible Tokens (NFTs) in the dynamic landscape of virtual worlds and Web3. This innovative protocol aims to eliminate barriers between virtual environments, enabling seamless asset utilization and fostering a truly interconnected digital ecosystem.
At its core, the $STYLE Protocol is driven by its flagship product, the $STYLE token. Acting as a bridge, this token facilitates the integration and usability of NFTs across various games and virtual platforms. With a fixed supply of 920,000,000 tokens, the $STYLE token offers true utility, empowering users to unleash the full potential of their digital assets.
Key Features:
Interoperability: The $STYLE Protocol seamlessly integrates avatars and assets across different virtual worlds, allowing users to wield legendary weapons in fantasy realms or showcase unique fashion items in futuristic metaverses.
Decentralization: Operating on a decentralized network, the $STYLE Protocol prioritizes security, transparency, and autonomy, ensuring the integrity of transactions and interactions within the virtual ecosystem.
Reward System: The protocol incentivizes active participation and engagement through a robust reward system, rewarding users for creating content, lending assets, or holding $STYLE tokens.
Benefits:
Usability: Users can seamlessly transfer and utilize their in-game assets and NFTs across a variety of virtual environments, enhancing the utility and versatility of their digital possessions.
Licensing: With the $STYLE token, users can access a comprehensive licensing framework that allows creators and developers to monetize their creations while ensuring fair compensation and protection of intellectual property rights.
Participation: By incentivizing user participation and engagement, the $STYLE Protocol creates a dynamic and immersive virtual experience where every interaction contributes to the growth and evolution of the ecosystem.
Governance Token:
As a utility and governance token, the $STYLE token holds immense value, empowering users to participate in governance decisions, shape the protocol's direction, and unlock exclusive benefits within the virtual ecosystem. With plans for public circulation in 2024, the $STYLE token represents a new era of connectivity and creativity in the digital landscape, inviting users to explore, innovate, and redefine the boundaries of virtual reality.
For more info: (https://www.protocol.style/)
submitted by Worth-Rice859 to CryptoDirectory [link] [comments]


2024.05.15 15:37 RationalSchizo812020 *PSA* Real life Street Stars: Possibly a Controlled Influencer Psyop

*Update- If anyone is looking for further proof of my point look at the comment section. Some of y'all need to hit the library. 😂
*If anyone takes the time to read and would like to share, feel free to repost and accept the credit, I don't have enough karma to share anywhere else relevant and could care less. All I ask is that you repost it in full and not cherry pick the information you agree or disagree with or whatever will get the most karma. I would like to avoid exactly what I'm describing in the post below. If any claims I make turn out to be false, I'll update and eat my words.*
(I obscured celebrity and influencer names to prevent fans from seeing the post and flagging it)
I saw someone posted an interview with (O *rlando Brow *n) from the channel Real life street Stars and wanted to put out a little PSA for this community. The channel has recently been growing in subscribers because of a 2020 interview with a 90's R&B artist named (J -aguar W r:ight ), who claims to have suffered abuse of all types that she during her time in the industry, and claims she was blacklisted for fighting back. Now she claims she's been on a mission for the last 20 years to bring down the vast networks of famous sex criminals she has firsthand knowledge of. In her first two interviews she speaks pretty eloquently and drops a lot of facts about the industry. Enough to get people sucked in. You'll see in her latest interviews the lady is clearly struggling heavily with some serious mental health and rumored substance issues.
I truly have empathy for her and (O rland,o B row-n,) because they are obvious examples of the Hollywood machine chewing up celebrities, especially with mental illness, and spitting them out. Both of them have publicly struggled for years, and around 2020, were both homeless and started doing YouTube interviews with obscure content creators where they were paid next to nothing to share their traumas with their viewers and creators who use these traumas to form false narratives and clickbait video titles that either are completely false or that are buried in an 8 hour live stream containing a thirty second audio clip that was stolen and reposted from another exploitative content creator's interview. Not only is it taking money out of their pockets, but also monetizing off their trauma, stealing their content and viewers, and harming their credibility even further due to them being blatantly false or misleading the viewers into thinking their all day live stream talking about the aforementioned video and accompanied by a slideshow is the primary source. One thing I've learned is most people will believe or immediately dismiss most information without even trying to read it. If you choose to go down this rabbit hole you should definitely start with their Insta pages and check out the last couple months. Without people majorly censoring and heavily editing their content, you can tell that they are doing this intentionally to hide the fact they are exploiting trauma survivors for petty cash. If you're still not wary, start with their latest interviews they're both total shit shows. Recently with the (Di +ddy stuff and Ka;tt William ,s) interview going viral, the channel "real life street stars" has blown up. Even more so in the last couple weeks with all the K- Anon stuff attracting people to their channels. If you choose to go down the rabbit hole I just beg you to please research ANY claims from ANY content creator and find a source before sharing. A lot of the time they are spitting celebrity fan fiction juxtaposed with occasional pieces of truth and (Jagua /r Wri /ght) was pretty damn convincing until about a year ago.
A lot of people get sucked in with ( Jag !uar W !right's ) first two interviews because she clearly had them prepared for a long time and was reading from a script. Now she's just exploiting the algorithm and spamming clickbait interviews with the craziest titles possible, thus contributing to the same exploitation she claims to be fighting against. This is not to say all her claims are bullshit, both most are recycled 90s and early 2000's gossip that is new to Gen z mixed with any breaking celebrity news or gossip that is big in the media. To make her stories sound more legit she'll Forrest Gump her way into every story and leading people into believing she was a big time celebrity, but these interviews and her instragram scamming are what she's most known for. The last interview she claims to have taken a boat to Epstein Island where she rescued two young girls who were trafficked and then talks about the Dark Web, "Red Rooms," that are pretty well known to be internet myths because if they were real they'd be invite only and require blackmail to access so no one is gonna talk about it even if they do exist. It amazed how many videos popped up overnight repeating her claims as facts and spreading the virus of media manipulation. If you're still thinking, "Hey, you never know!" She also claims these snuf. f videos and videos of celebrity orgies sell for 500 million dollars, which would be enough to build a whole chain of your own red rooms or throw your own Hollywood sex parties and join the fun. I know some people will probably still be curious, but just watch her 2020 interview the rest are trash, also anything with (O r.lando B,rown) is recycled lies mixed with more lies, with a couple buzzwords he's probably required to say so they can add trending topics to their video tags and get a lascivious title.
Another recent example of blatant manipulation is all the shit with (D j A ^kademics) the past couple days. His court records have been public for months with a vivid description of him and two friends drugging and raping a girl that was obviously premeditated and not his first rodeo. He is also now being sued for defamation because he pretty much told his fans she was drunk and asking for it then regretted it later and went on to say he didn't even know she was at the house until the next morning and blamed it on his friends. Meanwhile the court documents clearly show a rap with an e kit being administered and them finding his spermicide which was the same type found in the r word kit. They also describe video evidence of his two friends doing the same thing while she was unconscious, but he screenshotted a section and posted it in his defense saying clearly she was down. There are also identical allegations to the ones made against (D-rake) stating he has a history of hitting up sixteen year olds and grooming them until they turn eighteen and repeated history of similar drug related s. crimes. It took one post on his twitter and his fans started harassing the poor girl for months. The same thing happened to the lady who was a victim of (N$icki Min _aj's) husband who was doxxed by her fans for not dropping the charges. The next day AK was acting like it was all gravy and if anything gained even more followers. This is a brilliant example of why (Dra! ke's) line about being too famous to be a predator is so stupid. Almost as stupid as blatantly defaming the woman who appears to have more the enough evidence to beat him in a civil suit. Which is almost as stupid as he pretended to be during the (e- bony kin g) livestream where he was obviously ignoring the thousands of comments mentioning anything related to sexual crimes, while talking shit on the guy who successfully blackmailed his handler even after possibly being blackmailed himself on the same stream. This stupidity can only be surpassed by the millions of fans who are still watching his content instead of the news and continue regurgitating the lies of someone so fucking stupid who is most likely a s offender. These are the same ones who automatically dismissed the rumors and instantly believed the dog in the kennel story, the same who believed his alibi, and the same people who are the reason most survivors don't come forward and choose not to accept inconvenient truths right in front of their eyes.
Interestingly enough the portal.njcourts.gov site containing A.k's full court documents were offline for hours last night and a certain sight has banned reposting it for fear of doxxing, another great way to quell any dissent amongst the the ranks. Server's crashing often happens when there is a huge influx of web traffic or a site has been a victim of a DDOS attack, which is just an artificial version of the former that uses bots instead of people. I could talk forever about how fucked things are, but this is simply the world we live in. I really want to drive home the point that in order for any movement to retain credibility, everyone needs to stop sharing any type of info unless they're from a verified, reputable source and define the difference between facts and your opinions as clearly as possible. A couple million hits on youtube, twitter memes and tiktoks, and gossip blogs with broad information being deciphered by mostly idiots don't count as credible. Most of these influencers and blogs have been bought and paid for years ago and usually are biased toward certain celebrities based on the perception of whoever's sharing or whoever pays them the most. For a while now rumors have been circulating of influencers doing shady shit in Dubai for the ultra wealthy. Lot's of ties were made to Dra .ke, but have very little supporting evidence. The blind items containing the rumors also made it so anyone could decode the clues, and as soon as these posts made it on to the Kendric kl amar the moderator crew began the "conspiracy," crackdown. It took one mention of q-anon and the majority of the community jumped ship out of fear of association because "Q-anon bad, they're all scizophrenic." Overnight theories that once had been consensus were completely dismissed after being deemed conspiratorial. A couple of days later, the were forced to place a blanket ban on anything them deem, "conspiracies," regardless of it's validity due to their inability to moderate the amount of incoming posts which are almost always spammed at least ten times a day for the next week. This is the exact thing that was done with q, anon and pizzagat, e stuff back in the day. They'd find the nuttiest people to use as an example so they could paint the whole movement in the same light, then dismissed all related information, and completely censored any discussion on most major platforms. I don't subscribe to either, but they were undeniably on to something. The problem was the disinformation campaigns and general stupidity. One was quashed almost overnight because a crazy guy shot into the front window of a pizza shop and it somehow hit their computer and obliterate their hard drive containing possible evidence. The lessons is truth in every lie and it's not hard to find if you know where to look, it's what you do with it that defines who you are as a person. Some people can't handle the truth because it conflict's with their world view and those who do usually suffer because of it. If everyone does their part though, no one would have to die a martyr in its pursuit.
I've noticed a recent pattern of influencers proliferating the spread of false information especially in relation to any sa allegations. This trend really took off when (Kat -t Will/iams's) interview went viral and helped to revitalize his career and reputation. Since then many copycats have come out of the woodworks, hoping to cash in on the trend. Some other common media suppression trends and manipulation tactics to watch out for are synthetic smear campaigns dedicated to destroying the credibility of anyone with alternative beliefs, and it's gotten exponentially worse throughout the years. A great example is all the shit (Y,e). had to deal with through the years, even prior to his antisemitic remarks and all the other famous people who spoke up about their industries and were silenced. (D av+e Chapp? elle) used to talk a lot about the tactics used to humiliate and destroy many influential black men who dared to challenge the system. Another case that's similar to Ak's is the (T/or y La^ne z and M ,egan T (hee Stallio, n) trial. If you look at the court records, it's obvious the shooting was part of a larger altercation. He still might have shot her, but she at the least totally lied her ass off about the actual story to avoid incriminating friends while ensuring they could hit him with a ten year sentence. Not long after (Me ..gan THE" E S !tallion) won three Grammy's and was voted woman of the year, then disappeared off the face of the earth until her manager sued her a couple weeks ago for having sex in front of him and threatening his job over it. There are countless other celebrities and influencers who are clearly wiling to say anything for money, and those who aren't usually have some blackmail on them. There is such an abundance of glaringly obvious disinformation campaigns in the media and most are accepted as gospel without question or are suppressed if they reveal too much, raise too many questions, or start to sway public opinion. Another very common example of this phenomena is the mass release of information that paints a positive image of the celebrity while containing the same buzzwords related to controversies they don't want popping up on anywhere near the top of Google. This keeps any relevant information limited to the most recent AI generated bullshit that plays the algorithm game the best. While doing my investigation, it was unbelievably difficult finding any relevant information from before 2020, and often had to use Duckduckgo to filter out any articles written after 2023. Even then every search engine required extremely specific search terms, which would often still provide me with the exact same results. It got so bad I considered switching to Yandex.
Recently all the things I've discussed have seemingly been kicked into overdrive, especially over the last few weeks. This leads me to believe that a lot more is going down behind the scenes than most realize. I believe the day will come soon when everyone who actively fought to dismiss peoples opinions out of ignorance will be forced to accept these truths whether they like it or not I was a victim myself last week when I shared a detailed, neutral commentary on a rap feud and was shadow banned from a popular subreddit and ignored by it's moderators. This same subreddit is currently deleting any and all information related to the subject I covered. This is why I wanted to raise awareness if this doesn't get suppressed as well. Karma requirements and shadow bans that can sometimes circumvent the use of Vpn's on all connect devices, lead me to believe Reddit as a whole may also be at least partially compromised.
Chances are the same people who promote biased garbage and obvious lies are the same ones who will scroll right past any post containing more then three sentences and the ones who spread any lie they are told without question and accept everything at face value. My personal favorites are the ones who don't read past the title and clog up the comments while obscuring valuable information because they want the spark note version. This is all by design. They are the sheep the government count on to help them consolidate their wealth and power. More and more people are waking every day though. I encourage anyone new to conspiracies to really keep all this in mind going forward, especially with the proliferation of AI powered disinformation bots that dominate your front pages and control the majority of content. If you want to fight against this and keep your freedom of speech, this is a call to arms. To anyone who values the truth, the powers that be will do anything they can to try to censor any public dissidence. Remain steady in your search for truth, and learn how to effectively help other join you in lifting the veil. Stay strong in your convictions and don't allow other's to moderate your options, your beliefs, or your truth.
Thanks for Reading
-The Original Random Moniker
submitted by RationalSchizo812020 to DarkKenny [link] [comments]


2024.05.15 15:08 WhatCanIMakeToday Operational Efficiency Shares: Rehypothecating 🐇🐇🐇🐇 And Breaking Free Of Chains [WalkThrough] (4/n)

Operational Efficiency Shares: Rehypothecating 🐇🐇🐇🐇 And Breaking Free Of Chains [WalkThrough] (4/n)
From the prior DD in this series [1], we know that ComputerShare can “give” the DTC registered DSPP shares to hold onto for operational efficiency which are then “given back” as shares beneficially owned “for the benefit of” (“FBO”) DSPP Plan Participants at ComputerShare, as illustrated in this diagram:
From The Prerequisite DD
It’s time to explore what “operational efficiency” benefits may be gained by DSPP shares going around this roundabout. At first glance, shares are basically just going in a big circle from DSPP Plan Participants with registered ownership DSPP shares at ComputerShare heading to the DTC, who hands shares to ComputerShare’s broker who maintains those shares for the benefit of ComputerShare who holds those shares for the benefit of Plan Participants. While I think it’s unlikely that shares just go around in a big fat circle for no reason, I do remember people getting onto flights to literally go nowhere a few years ago [CNN, NYT]; so maybe these operational efficiency shares simply miss hanging out at the DTC?
Let’s look more closely… While title is held by a registered DSPP Plan Participant, ComputerShare is giving the DTC possession [1] of registered DSPP shares to the DTC to hold for operational efficiency which then ultimately end back in the possession of ComputerShare’s broker (who isn’t lending out shares) for the benefit of ComputerShare for the benefit of Plan Participants. If we treat the DTC’s operations as a big black box, we see registered shares going into the DTC black box and beneficially owned shares coming out of the black box to ComputerShare for Plan Participants.
DTCC Black Box: Inputs vs Outputs
Investopedia says that shareholders have rights, with a list of 6 main rights including:
  1. Voting power on major issues.
  2. Ownership in a portion of the company.
  3. The right to transfer ownership.
  4. Entitlement to dividends.
  5. Opportunity to inspect corporate books and records.
  6. The right to sue for wrongful acts.
By contrast, beneficial owners only need to have or share 2 of those rights (bolded) according to the definition of beneficial owner in Rule 13d-3: the power to vote and the power to dispose of the security (e.g., sell).
§ 240.13d-3 Determination of beneficial owner.
(a) For the purposes of sections 13(d) and 13(g) of the Act a beneficial owner of a security includes any person who, directly or indirectly, through any contract, arrangement, understanding, relationship, or otherwise has or shares:
(1) Voting power which includes the power to vote, or to direct the voting of, such security; and/or,
(2) Investment power which includes the power to dispose, or to direct the disposition of, such security.
ComputerShare basically confirms this list (except for the right to sue as that’s probably not one their issuer customers would emphasize) and adds that beneficially held shares may be lent by brokers generally (but not by ComputerShare’s broker).
Registered Shareholder Rights vs Beneficial Owner Rights
Maybe you’ve had different experiences from me, but I’ve never known Wall St to deliver more than the bare minimum they’re contractually obligated to. Which means the DTC black box is very likely watering down shareholder rights from the 6 that go in down to the 2 which come out. (And yet, we’re supposed to believe that all shares are equal. 🙄)
Dividends (#4 on the list) [2] may be the clearest example of a watered down shareholder right. Registered shareholders have the right “to directly receive share dividends” [CS FAQ] which means if a company (e.g., GameStop or OverStock) issues a dividend, registered shareholders have the right to directly receive the dividend as issued. If the company issues a crypto dividend (as OverStock tried to do), registered shareholders have the right to directly receive the issued crypto dividend. Beneficial shareholders would get an issued dividend, if available, or a cash equivalent if not. Historically, stock and other dividends to beneficial shareholders could easily be delivered as a cash equivalent, a watered down form. Crypto dividends don’t scale well with shorts (both naked and legal via, for example, share lending and borrowing) because crypto tokens are unique which makes it abundantly clear why a crypto dividend was nixed for a heavily shorted idiosyncratic stock like GameStop; especially given GameStop’s particularly active shareholders.
Ownership (#2 on the list) may be the second clearest example of a watered down shareholder right as more security interests to shares exist in the DTC’s beneficial ownership system than there are shares; with the SEC saying beneficial shares get a pro rata interest in the securities of that issue held by DTC. [See End Game Part Deux: Problems at the DTCC plus The Bigger Picture, particularly the section “The Pie Is Shrinking: Get Out (And DRS) While You Can”]
Voting (#1 on the list) is also an example watered down shareholder right; this one having a long history on this sub with, for example, BroadRidge tossing 7B votes and bragging about it. (Beneficial owners only need to get shared voting rights per Rule 13d-3 above so those 7B “shared” votes just lost out to who they shared with.) Unlike other beneficially held shares, voting rights for DSPP shares are not watered down as ComputerShare sends registered holders their voting forms.

Operational Efficiency Shares, Whatcha Doing In There?

A big black box is a pretty good description of the DTC which does not want us to know the ins and outs of what’s going on. Black holes are a pretty good example of a big black box and, most importantly, we know a lot about black holes even though they can’t be directly observed. Just as we learned about black holes without direct observation, we can similarly learn a lot about the Operational Efficiency shares even though we can’t directly observe them in the DTC habitat.
Even though we can’t look inside the DTC’s big black box, it turns out we don’t really have to in order to identify some benefits from these operational efficiency shares taking their roundabout trip to nowhere.
Locates A few commenters have suggested that OE shares could be used for locates so I’ll address this first. Possible, yes. But I don’t view this as the most interesting use for OE shares. Brokers are supposed to “locate” securities available for borrowing before short selling. [Wikipedia)] Basically, before selling short a broker is supposed to find a source to borrow. The “locate” requirement does NOT require the security to be borrowed before short selling which can result in a legal naked short.
You may be wondering why I don’t view “locates” as particularly interesting for OE shares if short sellers need to locate shares to borrow before shorting. Well, market makers are also exempt from this requirement as long as they’re market making. 🙄 On top of the market maker exemption, remember House Of Cards? In House Of Cards 3 [SuperStonk], we learned about the now 🤦‍♂️ hilarious F**3 key **- yeah, the one on a keyboard. Brokers like Goldman found the locate requirement simply too much work so they would press the F3 key and their system would auto-approve the locate requirement based only on the number of shares available to borrow at the beginning of the day; regardless of whether those shares were still available to borrow or not.
House Of Cards 3
Meaning as long as there were some shares available to borrow at the beginning of the day for their share copying system, brokers could just smash the F3 key to make as many copies of shares as they need. Even if only 1 share was available to borrow at the beginning of the day, a broker could simply smash the F3 key 100 times to approve the locate requirement for 100 shares.
So while OE shares could be used for locates, they wouldn’t need many shares each day to make an unlimited number of copies - even just 1 is enough.
Lending shares on the other hand…
Rehypothecation Rehypothecation is the reuse of customer collateral for lending. Per a 2010 IMF Working Paper, The (sizable) Role of Rehypothecation in the Shadow Banking System,
Rehypothecation occurs when the collateral posted by a prime brokerage client (e.g., hedge fund) to its prime broker is used as collateral also by the prime broker for its own purposes.
This IMF paper defined a “churning factor” to measure how many times an asset may be reused; and then estimated a churning factor of 4 noting that it could be higher because international banks (e.g., HSBC and Nomura) were not sampled. This IMF paper found a single asset may be lent and borrowed 4 times, or more; an average which could be higher globally.
https://preview.redd.it/ymr3j03zri0d1.png?width=795&format=png&auto=webp&s=1555314cefd520658a4f78dc4745867063e3bf34
Churn Factor Could Be Higher Globally
How much higher? We may have seen a churn factor as high as 10 for a less idiosyncratic meme stock per my prior post, Estimating Excess GME Share Liquidity From Borrow Data & Churn Factor. Presumably, the idiosyncratic meme stock would have a higher churn factor (but not that important for this post).
More recently (2018), the Federal Reserve published this Fed Note on ​​The Ins and Outs of Collateral Re-use studying how often collateral is reused (i.e., rehypothecated) for Treasury & non-Treasury securities [3] with a beautiful figure illustrating how “for any given moment in time, one security can be attributed to multiple financial transactions” where a share could be posted multiple times through Security Financing Transactions (SFTs) and sold short. [4] Sounds familiar, right?
https://preview.redd.it/zsztmji4si0d1.png?width=1530&format=png&auto=webp&s=f222dfe50929f668af8f8f0b39514a7d862db9c9
Figure 6c of this Fed Note shows a Collateral Multiplier over time illustrating how “PDs [Primary Dealers] currently re-use about three times as many securities as they own for non-Treasury collateral and seven times as many securities as they own for U.S. Treasury securities”.
AKA \"Money Multiplier\"
The Fed Note describes their Collateral Multiplier as a “money multiplier” (Seriously, I couldn’t have made this up in a million years.),
In a sense, our Collateral Multiplier is akin to a "money multiplier," as it compares private liabilities created by a firm with the amount of specific assets held to create those liabilities. [​​The Ins and Outs of Collateral Re-use]
And, of course, the Collateral Multiplier aka “money multiplier” ratio goes up when there’s less collateral available and down when there’s more collateral available. (Can I get one of these multipliers?)
Intuitively, we expect the ratio to increase when collateral is scarce and to decrease when collateral is more abundant.
Which means Primary Dealers [Wikipedia has a list of familiar names including Deutsche Bank, JP Morgan, Morgan Stanley, Nomura, BofA, Citigroup, TD, UBS, and Wells Fargo; amongst others] can simply kick securities around a few extra times (e.g., with SFTs and short sells) to effectively multiply the amount of money and/or collateral they have any time they need it. (Within limits, I hope…)
Thus, rehypothecation is a very interesting use of Operational Efficiency shares from ComputerShare as various primary dealers can simply “multiply” the number of shares they have – a concept that we’re already quite familiar with. As rehypothecation, short sells, and securities financing transactions are all perfectly legal, rehypothecating more GameStop shares provided to the DTC via operational efficiency satisfies Ground Rule #2 [defined in (1/n) in this series],
  1. All parties involved are all generally attempting to operate within the bounds of the laws and regulations wherever possible. (I know we often scream “crime”, but why break a law when money can simply [re]write laws to make activities legal. Regulatory failure is the reason why something that should be criminal, isn’t. And regulatory failure happens when armies of lawyers are paid to create and exploit loopholes so that actions which should be criminal, are instead legal.)
We can update our conceptual model to include rehypothecation to more clearly illustrate how Operational Efficiency shares held in the DTC can be rehypothecated (e.g., with SFTs and short sells) until a watered down share is delivered to ComputerShare’s broker to hold FBO ComputerShare, who holds the watered down share FBO DSPP Plan Participants.
https://preview.redd.it/bt3gnx99si0d1.png?width=4764&format=png&auto=webp&s=7b0b72b935f740e8a3036f88e1a4e1dfb57dd46c
You might notice from this illustration that ComputerShare has been telling the truth satisfying Ground Rule #1 [defined in (1/n) in this series]. Neither ComputerShare’s nor their broker lend or need to lend shares. All the rehypothecation happens “upstream” amongst other DTCC and NSCC Participants until shares are finally delivered to ComputerShare’s broker at the end of the “Churn Chain”. ComputerShare has made no representations about what the DTC can or can not do with the shares in their possession. And, realistically, ComputerShare is in no position to make any representations about what happens within the DTCC system – ComputerShare is only responsible for themselves and, to some extent, their broker.
The Fed Note and IMF paper found assets may be churned and reused 3-4 times (overall market average) which means the end of the chain is typically around D3 or D4. (If my prior DD estimates are correct, there were signs a less idiosyncratic meme stock may be churned up to 10 times ending the chain at D10 which suggests a potentially longer chain for GME, the idiosyncratic meme stock.) If there is no collateral reuse for an asset, the chain would have zero length meaning Operational Efficiency shares go straight from the DTC directly to ComputerShare’s broker. (Programmers almost certainly understand zero length chains very well – go find one if you need an explanation.)
GameStop is idiosyncratic, thus atypical. Per the IMF paper, collateral reuse increases when collateral is scarce and decreases when collateral is abundant (quoted above). If we consider GameStop investors have been direct registering shares (i.e., DRS) and registering shares (e.g., DSPP) thereby removing title and/or possession of shares from the DTC/DTCC/Cede & Co, then GameStop share availability has been becoming more scarce and the “Churn Chain” for GME should be longer than average representing a higher collateral multiplier and churn value.
While we may not know the exact length of the Churn Chain for GameStop shares, we can pretty well surmise that it’s not a zero length Churn Chain where there is no collateral reuse based simply on scarcity. After all, a shortage of available shares is, by definition, required for any short squeeze (including MOASS). Requests by brokers to enable Share Lending [5] is another example indicator that GameStop shares are scarce.
In addition, according to Investopedia [6], “Banks, brokers, or other financial institutions may navigate a liquidity crunch and access capital by rehypothecating client funds” and we’ve seen indicators showing us banks are in deep trouble:
The downside to rehypothecation is the higher leverage increases risks of default and a single collapse can start a chain reaction knocking down others like dominos.
There are also leverage considerations that increase that risk of default. Overleveraged investments often face covenants; when specific conditions are met, trading accounts may receive a margin call or face debt default. As a row of dominos fall after a single collapse, a single margin call may cause other debts to fail their account maintenance requirements, setting off a chain reaction that places the institution at higher risk of overall default. [6]
This risk for rehypothecation sounds exactly like what the Options Clearing Corporation was complaining about to the SEC when the ​​OCC Proposed Reducing Margin Requirements To Prevent A Cascade of Clearing Member Failures [SuperStonk] early 2024. If the OCC can eliminate margin calls, then no dominos get knocked down. (Thankfully, apes have done a phenomenal job in convincing the SEC that this OCC proposal is a very bad idea. Support the SEC’s rejection of this as Simians Smash SEC Rule Proposal To Reduce Margin Requirements To Prevent A Cascade of Clearing Member Failures!)
Most importantly, it may be tough to regain possession of an asset when someone in the rehypothecation chain defaults. Remember from the prior DD the expression about possession: Possession is nine-tenths of the law.
Clients must be aware of rehypothecation as it is technically their own assets that have been pledged for someone else's debt. This creates complicated creditor issues where an investors shares may longer be in their possession due to their custodian's default. [6]
We know assets are rehypothecated 3-4 times on average, GameStop shares are scarce, banks are in trouble, stock loan volume is skyhigh, and the risks of rehypothecation are real. So it’s pretty clear that rehypothecation is happening generally with pretty darn good reason to expect GameStop’s Churn Chain is at least of non-zero length (i.e., GameStop stock is being rehypothecated).

Breaking The Chains

While some may like chains and being tied up, I’m not one of those apes. Especially as a Churn Chain waters down my shareholder rights and may make regaining possession of DSPP stock difficult in the event of a cascade of defaults, as warned by the OCC. (If you like chains, feel free to skip this section.)
As it turns out, we don’t need to know exactly how long the Churn Chain is for GameStop stock. Simply knowing a Churn Chain exists with non-zero length means there is a chain. Where there is a chain, it’s possible to break the chain. (Even if you don’t know how much health) your enemy has in a game, you still try to take your enemy out. Right?)
A churn chain that starts from ComputerShare holding DSPP shares in DTC for operational efficiency can easily be broken as “[a]n investor can, at any time, withdraw all or part of their shares in DSPP book-entry form and have them added to their DRS holding”. [ComputerShare] See also [7]. Quite possibly one of the easiest chains in the world to break as the Churn Chain is weak to DRS. Simply DRS the DSPP shares to take away the head of the chain and the rest of the chain falls apart. (And, DRS-ing "street name" shares cuts chains into pieces too!)
One side effect of breaking a Churn Chain is that all shares attributed to transactions in a broken chain (e.g., SFTs and short sells) need to be reallocated to other chains, effectively making other chains longer and increasing the risks from a default.
Analogy: Think of the shares as a deck of cards. If you deal 52 cards to 4 players (A, B, C and D), each player gets 13 cards. Each stack of 13 cards is basically a Churn Chain. But if you take out a stack by removing the bottom card from A and distribute the remaining 12 cards from A to B, C and D then B, C and D each now have 17 cards. If at any given time a card can cause a player to lose the game, it's better to have fewer cards than more. And, the players who get out early won't lose.
Any party in the Churn Chain who defaults will make it hard for the original owner to regain possession. Longer chains include more transactions and more parties so there’s more risk of default on longer chains than shorter chains. Thus we see another vicious cycle setup where incentives are aligned such that DSPP and beneficial shareholders may want to avoid the impending default and rehypothecation risk from their shares being held in DTC. In order to avoid the impending default and rehypothecation risks, shareholders are incentivized to Directly Register shares to ensure having both title and possession. (Shares held in “street name” have little or no protection from rehypothecation risk and simply registering shares in DSPP doesn’t guarantee possession [1].) As with the other vicious cycle, any remaining shareholders in DTC share a shrinking pie of diluted ownership so it is in their best interest to get out and DRS; thereby shrinking the diluted ownership pie even more which is more reason for remaining shareholders to get out. These vicious cycles will eventually leave few, if any, remaining shares at the DTC for beneficial shareholders. Nobody knows what will happen if this ♾️🏊 happens.

Footnotes

[1] If you haven’t already, please read the prerequisite DD in this WalkThrough Series to understand how ownership of property is separated into two concepts: title and possession. [See, e.g., StackExchange] Understanding the differences between title and possession are particularly important here where it’s worth being extra careful identifying how an entity is in control of an asset.
  1. DSPP is technically different from DRS [WalkThrough] (1/n)
  2. Definitely DIFFERENT "DRS Counts" [WalkThrough] (2/n)
[2] Dividends have been heavily discussed on SuperStonk with many DD posts, including for OverStock and the precedent OverStock set which would have allowed GameStop to issue their own crypto dividend, possibly as an NFT.
[3] Footnote 16 of the Fed Note itemizes various classes of non-Treasury collateral which includes equity which, per Investopedia, is a synonym for stocks.
[4] While short selling is pretty well known, Security Financing Transactions (SFTs) may be more obscure despite discussion of them in the past so here’s some historical SuperStonk links for you (where you may notice some well known OG DD apes):
[5] Simply search SuperStonk for share lending. Don’t make me Google That For You.
[6] https://www.investopedia.com/ REMOVE_FOR_AUTOMOD terms/r REMOVE_FOR_AUTOMOD /rehypothecation.asp
[7] Withdrawing whole DSPP shares into DRS seems to make a lot of sense as doing so guarantees possession. Selling fractionals, less so. If you intend to keep buying, I would think adding to the fractionals to later withdraw whole shares makes more sense. As for the concern about fractionals tainting the whole account, I’ll cover that in another post. For now, you do you.
submitted by WhatCanIMakeToday to Superstonk [link] [comments]


2024.05.15 15:02 Acceptable-Flower207

Recently, the "Brand Innovation and Development" Forum and Brand Exhibition of 2024 was launched in Shanghai.
Mr. Tian Mu, Vice President of ATRENEW (NYSE: RERE), made a theme sharing on "Innovating New Models of Circular Economy". He proposed that through innovating the second-hand circulation ecological chain, it helps the scale development of the Aihuishou; innovating the construction of standardization system, it helps the standardized development of the Aihuishou brand; innovating technological capabilities, it helps the digital and intelligent development of the Aihuishou brand. Through these efforts, Aihuishou takes brand construction as a handle, takes brand innovation ability as the foundation, and takes consumer trust in the brand as the key capability. It leverages the brand influence of the platform to deeply embed the concept of dual carbon and circular economy into consumers' hearts, contributing to the goal of achieving low-carbon sustainable development.
submitted by Acceptable-Flower207 to StockInvest [link] [comments]


2024.05.15 14:52 Loud_kiyoshii Introducing the $STYLE Protocol: Bridging Virtual Worlds with Interoperability and Utility

In the ever-evolving landscape of virtual worlds and Web3, the $STYLE Protocol emerges as a pioneering infrastructure set to redefine the way we interact with in-game assets and Non-Fungible Tokens (NFTs). Developed by the esteemed STYLE Association in 2022, this innovative protocol aims to break down the barriers between virtual environments, enabling seamless asset utilization and fostering a truly interconnected digital ecosystem.
At the heart of the $STYLE Protocol lies its flagship product, the $STYLE token. Serving as the cornerstone of this groundbreaking infrastructure, the $STYLE token acts as a bridge, facilitating the integration and usability of NFTs across various games and virtual platforms. With a fixed supply of 920,000,000 tokens, the $STYLE token embodies true utility, empowering users to unlock the full potential of their digital assets.
Key Features:
  1. Interoperability: One of the defining features of it is its ability to seamlessly integrate avatars and assets across disparate virtual worlds. Whether it's wielding a legendary weapon in a fantasy realm or showcasing unique fashion items in a futuristic metaverse, users can transcend boundaries and experience true asset interoperability like never before.
  2. Decentralization: Operating on a decentralized network, It prioritizes security, transparency, and autonomy. By leveraging blockchain technology, users can trust in the integrity of their transactions and interactions within the virtual ecosystem, free from the constraints of centralized control.
  3. Reward System: Incentivizing active participation and engagement, the $STYLE Protocol implements a robust reward system that recognizes and rewards users for their contributions to the network. Whether it's creating compelling content, lending assets to fellow users, or simply holding $STYLE tokens, participants can earn rewards and enhance their virtual experience.
Benefits:
  1. Usability: It usability of in-game assets and NFTs transcends traditional boundaries, enabling users to seamlessly transfer and utilize their digital possessions across a myriad of virtual environments. From rare collectibles to coveted skins, every asset gains newfound utility and versatility within the interconnected digital universe.
  2. Licensing: Leveraging the $STYLE token, users can access a comprehensive licensing framework that empowers creators and developers to monetize their creations while ensuring fair compensation and protection of intellectual property rights. Through decentralized licensing mechanisms, the $STYLE Protocol fosters a vibrant ecosystem of creativity and innovation.
  3. Participation: By incentivizing user participation and engagement, the $STYLE Protocol cultivates a dynamic and immersive virtual experience where every interaction contributes to the growth and evolution of the ecosystem. Whether it's exploring new worlds, collaborating with fellow enthusiasts, or contributing to governance decisions, users play an active role in shaping the future of virtual reality.
Governance Token:
As the backbone of the $STYLE Protocol, the $STYLE token holds immense value as both a utility and governance token. With a fixed supply and plans for public circulation in 2024, the $STYLE token empowers users to participate in governance decisions, shape the direction of the protocol, and unlock exclusive benefits within the virtual ecosystem.
In summary, the $STYLE Protocol represents a paradigm shift in the realm of virtual worlds, offering unparalleled interoperability, utility, and engagement. By bridging the gap between disparate platforms and empowering users with decentralized governance and reward mechanisms, the protocol heralds a new era of connectivity and creativity in the digital landscape. As we embark on this transformative journey, the $STYLE Protocol invites users to explore, innovate, and redefine the boundaries of virtual reality.
Website here
submitted by Loud_kiyoshii to AllCryptoBets [link] [comments]


2024.05.15 13:30 kelvinwaterindia Embrace Nature’s Recycling: The Benefits of Using a Natural Composter

In our modern quest for sustainability, composting has emerged as one of the simplest and most effective ways to reduce waste and nourish the earth. Among the various composting methods, natural composting stands out for its simplicity, affordability, and environmental friendliness. Let’s explore the world of natural composting, its benefits, how to get started, and why it’s an essential practice for anyone looking to make a positive impact on the planet.
What is Natural Composting?
Natural composting with natural composter , also known as traditional or manual composting, involves the decomposition of organic waste materials using natural processes. It relies on microorganisms, insects, and earthworms to break down waste into nutrient-rich compost. Unlike advanced composting systems that require mechanical or electrical aids, natural composting harnesses the power of nature to recycle organic matter.
Benefits of Natural Composting
  1. Environmental Sustainability:
By diverting organic waste from landfills, natural composting reduces methane emissions, a potent greenhouse gas. It also lowers the overall carbon footprint by recycling waste into valuable compost.
  1. Soil Health:
Compost improves soil structure, enhances its water-holding capacity, and provides essential nutrients. It promotes healthy plant growth and reduces the need for chemical fertilizers.
  1. Cost-Effective:
Natural composting requires minimal investment. You can start with a simple compost pile or bin, making it accessible for anyone.
  1. Waste Reduction:
Composting significantly reduces the volume of household waste, leading to fewer trash pickups and lower disposal costs.
  1. Educational Value:
It’s an excellent way to teach children and communities about the cycles of nature and the importance of sustainability.
Getting Started with Natural Composting
  1. Choose a Composting Method:
  1. Select a Location:
Choose a well-drained spot with good air circulation and partial sunlight. Ensure it’s easily accessible but not too close to living areas to avoid potential odors.
  1. Collect Organic Waste:
Gather kitchen scraps (vegetable peels, fruit cores, coffee grounds) and yard waste (leaves, grass clippings, plant trimmings).
  1. Layering:
Alternate layers of greens (nitrogen-rich materials like kitchen scraps) and browns (carbon-rich materials like leaves and cardboard). Aim for a 2-3 parts brown to 1 part green ratio.
  1. Maintain Moisture:
Water it occasionally if it becomes too dry, especially in hot weather.
Turn the Pile:
Regularly turning the pile aerates it, promoting faster decomposition and preventing odors. Turn every 1-2 weeks.
  1. Harvest the Compost:
This typically takes several months to a year, depending on conditions.
Tips for Successful Natural Composting
  1. Balance Materials:
Ensure a good mix of greens and browns to maintain the right carbon-to-nitrogen ratio, which is crucial for effective decomposition.
  1. Shred Larger Items:
Breaking down large items like branches and cardboard speeds up the composting process.
  1. Avoid Pests:
Bury food scraps in the pile and cover them with browns.
  1. Monitor Temperature:
A healthy compost pile will heat up due to microbial activity. If it cools down, turning it can reactivate the process.
  1. Compost Activators:
Adding garden soil or finished compost introduces beneficial microorganisms to jumpstart the process.
Real-World Applications
  1. Home Gardens:
Enrich your garden soil with homemade compost, promoting healthy plants and reducing the need for chemical fertilizers.
  1. Community Gardens:
Engage your community in composting efforts, turning local organic waste into valuable compost for shared green spaces.
  1. Schools:
Incorporate composting into environmental education programs, teaching students about sustainability and natural cycles.
  1. Small Farms:
Utilize compost to improve soil health, enhance crop yields, and promote sustainable farming practices.
Conclusion:
Natural composting is a powerful tool in our sustainability toolkit. It turns everyday organic waste into a valuable resource, enriching our soil and reducing our environmental impact. Whether you’re a homeowner, a teacher, a farmer, or a community leader, embracing natural composting can make a significant difference. Start your composting journey today and join the movement towards a greener, more sustainable future.
submitted by kelvinwaterindia to u/kelvinwaterindia [link] [comments]


2024.05.15 12:05 No_Catch_1490 Cold War Diplomatic Situation Concept

The tensions with Opposing Empire have gone beyond mere mutual enmity. This is a conflict of economies, ideologies, and clandestine efforts, fought across our empires in the hearts and minds of our citizens. With some carelessness, or perhaps deliberate actions, it could quickly become a full-fledged military conflict.
(Note: this is a sneak peak into a larger Diplomacy DLC concept I am designing. Also disclaimer: I am not a game designer, I intentionally did not provide numbers, just ideas! Feel free to suggest or criticize.)
When two empires are Rivals a while, both sides will have the option to escalate the Rivalry into a Cold War, which costs Influence. If either side does this, a Situation that is shared and progressed by both sides is created. This situation is intended to provide more RP and mechanical freedom for empires to either diplomatically mend relations, prepare a leadup to war, or perhaps make gains without resorting to warfare.
Cold Wars, like many situations currently in the game, operate on a line between two endpoints, representing the tensions between the two empires: Reconciliation (-100) to War (100).
By default, the Situation will start at 0 and remain stagnant in the middle. Both sides will have access to four Approaches which have different bonuses and effects on the Situation:
Progress: there are also other factors which will influence the progress of this situation:
Events: as with most Situations, the Cold War could feature various events for RP and mechanical purposes. Here are some examples I thought up:
And now, for the conclusions of the situation:
Reconciliation Finisher (or if empires somehow become overlord/vassal or allies via external circumstances)
Both Empires get the Event: De-Escalation Successful
In a significant diplomatic achievement, the heated tensions with Opposing Empire have been comprehensively defused! Perhaps this will pave the way for friendlier relations and better days ahead.
If the Situation reaches Reconciliation, the Cold War and Rivalry will immediately be ended, with all their bonuses and effects. Both empires will gain a moderate lump sum of Influence and Unity, as well as a small burst of increased Opinion for each other.
War Finisher (or if empires are pulled in by other factors)
Both Empires get the Event: Cold War Turns Hot
The heated tensions with Opposing Empire have ignited! Negotiations have broken down, and fierce border skirmishes have erupted. The truth is now undeniable: we are at war.
If the Situation reaches War, the Cold War and Rivalry will transform into an actual, normal war. Both empires will gain a small lump sum of Influence and Unity and will have a window to pick from their available Cassus Belli and call in allies before the battle begins.
And that's all I've got for you all today. Thanks for reading and please send any suggestions or feedback! Here's a bonus: a new achievement based on the irl Soviet Colonel who may have saved the world
Legacy of S'tann Pet'rovv: De-Escalate a Cold War after tensions had at one point reached 95 or higher.
submitted by No_Catch_1490 to Stellaris [link] [comments]


2024.05.15 09:47 eobdtoolck Yanhua Module 33 Add Smart Key to VAG 4.5th MQB Guide

Yanhua Module 33 Add Smart Key to VAG 4.5th MQB Guide
How to add new keys to VW 4. 5th MQB (3526+95320) by Yanhua Mini ACDP/~ACDP2~?
~Yanhua Module 33~ and PCF-KEY Adapter are required. Make sure the ACDP device is bound to Mini ACDP APP/software and ensure the network is smooth during the process.

Main steps:
Step 1: OBD identify
Step 2: Obtain IMMO data
Step 3: Make dealer key
Step 4: OBD learn key

Procedures:
Remove the instrument cluster from car
Open cluster shell and check the chip model
https://preview.redd.it/nvcesscjoj0d1.jpg?width=930&format=pjpg&auto=webp&s=c673c69d3efb93bd521e6743715c6a30b1f165df
Power on ACDP/~ACDP 2~, and open Mini ACDP APP
Confirm the Yanhua ACDP device SN is showing on the upper right corner, it means ACDP is connected to your phone or PC
Select VW>> VW MQB IMMO>> 4. 5 TH (NEC+ 95320)>> IC Read Dashboard>> D70F3526 (A2C81589700) (A2C99606600) (based on chip model on the instrument panel)>> ~MQB74 Interface Board~ D70F3523/24/25/26+95320 (based on the chip model)
Click “Help” to check the connection diagram, and then use the ~Yanhua ACDP Module 33 Interface Board~ to connect ~Mini ACDP2~/ACDP host and dashboard correctly as the diagram
https://preview.redd.it/1m86bc1loj0d1.jpg?width=930&format=pjpg&auto=webp&s=d5f69e4af14789b0f48ba5d6fd68eb843ecdb30f
https://preview.redd.it/sy8r2c1loj0d1.jpg?width=930&format=pjpg&auto=webp&s=e0cd07b78a55f958aa28a79c8f0c84a86b1eda7c
Use the ACDP standard power adapter (voltage+12V, current>=2.5A)
Detect Pins are good
Continue to encrypt the chip
Read the chip model D70F3526 successfully
Save all backup data of the chip
Read and save the EEPROM data
Execution is completed
https://preview.redd.it/8c73tevloj0d1.jpg?width=930&format=pjpg&auto=webp&s=48f0d9914817e4725cfc0d3ff330cea286bb5a11
Reinstall the instrument panel into the vehicle and confirm that the vehicle is functioning properly
Click IMMO>> Step 1: OBD identify
Click “Help” to check the connection
Connect the ~Yanhua ACDP 2~/ACDP to the vehicle’s OBDII port properly
Turn on the switch and continue
Verify the vehicle info
OBD identify info successfully
https://preview.redd.it/vnuoxowpoj0d1.jpg?width=930&format=pjpg&auto=webp&s=23f98435f51b81ad0a033ac3970c12761daaa6f9
Step 2: Obtain IMMO data>> Load meter data calc IMMO
Prepare the ICP reading of the meter chip data
If the meter has an external EEPROM 95320/ 95128 chip, also need to prepare the external EEPROM data.
Select the NEC chip data for the instrument
https://preview.redd.it/axl5qqtqoj0d1.jpg?width=930&format=pjpg&auto=webp&s=e3a62a0964520431068f746810198d851f9fa1c1
When selecting the chip data, pay attention to the backup date, time and chip model
Confirm whether the meter needs to load the external EEPROM 95320/ 95128 data
Click “Yes” to load the EEPROM data
Calculate IMMO data and keep the network smooth during the process
Save the IMMO data after calculation
Check if the IMMO data is normal
Obtain IMMO data finish
https://preview.redd.it/1vrhsx2soj0d1.jpg?width=930&format=pjpg&auto=webp&s=4cb58025eb694bb86bfa1ac2ac7cbfeb5c77576b
Step 3: Make dealer key
Click “Help” beside [Duplicate the key] option
Connect ~Mini ACDP-2~ to the PCF-KEY Adapter properly
Then click Duplicate the key
Note:
The new key should be a blank key that ID can be changed, and the blank key has been changed to the ID of the lost key.
Place the blank key that has been changed to the original car’s lost key ID on the PCF-KEY adapter correctly.
Confirm the key info
Select the IMMO data saved in step 2
Select car manufacturer- VW
Start programming the key data
Make dealer key successfully
https://preview.redd.it/blwlkratoj0d1.jpg?width=930&format=pjpg&auto=webp&s=499ca355a481a788fe28a0a4bbaf4dc66d3fddc3
Step 4: OBD learn key
Confirm the vehicle system info, and select IMMO data
Enter the number of learning keys
Don’t turn off the ignition during learning!
If the other keys are too close to the induction coil may cause the learning failure.
Put the first key close to or insert into the induction coil and continue
Learn the first key successfully, and use the same method to learn the 2nd key
Learn keys successfully!

https://preview.redd.it/7pm9p7huoj0d1.jpg?width=930&format=pjpg&auto=webp&s=f650bf9a84038a144f8bbd74934dd403852f3c52
https://preview.redd.it/ysm2z7huoj0d1.jpg?width=930&format=pjpg&auto=webp&s=5c5ead0ae60b6bd2c7cd4827fbe1fed21d3e70a1
Read also:
How to Install ~Yanhua ACDP Module 33~ for MQB48 Key Programming/ Mileage Correction?
http://blog.eobdtool.co.uk/how-to-install-yanhua-acdp-module-33-for-mqb48-key-programming-mileage-correction/
How to Install Yanhua Module 33 MQB-80 Thumb Screw-Fastened Interface Board?
http://blog.eobdtool.co.uk/how-to-install-yanhua-module-33-mqb-80-thumb-screw-fastened-interface-board/
submitted by eobdtoolck to u/eobdtoolck [link] [comments]


2024.05.15 08:10 eagle2120 [Very Long] Marathon, Angela, and Eragon Connections. Fractalverse and Murtagh Spoilers

I've been meaning to make this post for a while but life kept getting in the way.
There is a bunch of new (well, new to me) stuff I've discovered over the last few weeks, and wanted to share my thoughts with you.
Let's start with the "prequel" (although never canonically confirmed) to the Marathon series was a game called Pathways to Darkness. The backstory for this game is:
Sixty-four million years ago, a large extra-terrestrial object struck the Earth in what would later be called the Yucatan Peninsula, in south eastern Mexico. The dust and rock thrown up by the resulting explosion caused enormous climactic changes in the ensuing years, and many of the Earth's species became extinct during the long winter that followed.
The object itself was buried thousands of feet below ground, its nearly two kilometer length remarkably intact. It remained there, motionless, for thousands of years before it finally began to stir-- and to dream.
Hmm. Buried below ground. Finally beginning to stir and dream. Who does that sound like?
Let's keep going.
The heat of impact liquefied the rock around it, which later cooled and encased the dead god's huge body far below ground. As it began to dream, it wrought unintentional changes in its environment. Locked deep beneath the Earth, strange and unbelievable things faded in and out of reality. Vast caverns and landscapes bubbled to life within the rock, populated by horrible manifestations of the dead god's dream.
As it began to dream, it wrought unintentional changes in its environment.. Locked deep beneath the Earth, strange and unbelievable things faded in and out of reality.
Like Fingerrats? Or like Spider-wolves?
Vast caverns and landscapes bubbled to life within the rock, populated by horrible manifestations of the dead god's dream.
Caverns and landscapes. I want to expand this point here for a bit because it's also mirrored across Alagaesia.
Let's start with Helgrind.
For any FV enjoyers, I've previously speculated that Helgrind is a reliquary, or a previously living being that was transformed (a la Ctein).
But the curious thing here is the timeline of Helgrind and it's tunnel system, taken with the above context.
Q: Assuming it wasn't built by the Ra'zac themselves, was the lair inside Helgrind purpose-built for the Ra'zac and Lethrblaka, or did they appropriate it some time after it was built? If it wasn't built for them, what was its original purpose?
A: Partially natural formations (linked to tunnels elsewhere in Alagaësia), partly expanded by the priests of Helgrind and Galbatorix himself.
But... The Ra'Zac didn't inhabit Helgrind until at least after the Humans came over. So these tunnels underneath Helgrind existed before the Ra'Zac, or Galbatorix ever set foot on Alagaesia. Which, I don't know about you, but a massive network of tunnels does not smell entirely natural to me.
So.. where else are there "natural" formations that link to other tunnels elsewhere in Alagaesia?
We've seen these "natural" formations in Vroengard:
Q: The deeps under Vroengard, were they created by the riders or was it a previous system of caverns that they repurposed?
A: Previous system. I mean, there's been work done on them, but... 'It looks similar, parts of it feel similar to the caverns that we encountered in this book. They both have that hole in the cave which goes deeper, with something in the hole that's not clearly defined.' Yeah.
And we've seen similar depictions in the Beors, and Nal Gorgoth. So from the Beors to Vroengard, "natural" tunnels exist underground. I don't buy that they are entirely natural.
Given the context of the Marathon game above:
Vast caverns and landscapes bubbled to life within the rock, populated by horrible manifestations of the dead god's dream.
I think these tunnels came from Azlagur.
Let's switch gears here, I want to talk about another archaeological mystery in the world of Eragon - El-Harim.
I believe El-Harim was heavily influenced by the (not canon confirmed, but implied) prequel to the Marathon games, the Pathways into Darkness
Pathways casts the player as a member of a US Army Special Forces team sent on a mission to the Yucatán Peninsula. On May 5, 1994, a diplomat from the alien race known as the Jjaro appeared to the President of the United States and informed him that on May 13, an ancient godlike being sleeping beneath a pyramid would awaken and destroy the Earth. The only way to prevent this catastrophe is to prevent the god from awakening. The eight-man Special Forces team carries a nuclear weapon, with the goal of entering the ancient pyramid, descending to the bottom level where the god sleeps, and activating the bomb to stun the god and bury it under tons of rock.
Getting into a bit more of the backstory:
Only during the last few centuries has the god begun to effect changes on the surface of the Earth. Grotesque creatures have been sighted deep in the trackless forest of the Yucatan, and strange rumors of an ancient pyramid-- which is neither Aztec nor Mayan-- in the same area have been circulating in the archaeological community since the early 1930's.
Pyramid, eh? There are two different options here I can think of that equate.
The extended FWW Map
First, in the extended map from FWW, we can see a Pyramid-esque shape - Different color, different slope, etc.
Or, second (and probably more likely), it could be El-Harim:
It is a very bad place. It’s a place where some bad things happened at one point and it’s not a good place to go walking around. I don’t want to get into it too much more because again, it’s a good possibility for another story and I want to keep thinking about it a bit more. It is in Alagaesia and we’ve actually been close to the location.
Many speculate that the below vision from Eragon in Brisingr, which was never explained in the main cycle, is of El-Harim:
And he rested, and visions beset him of a circular stone city that stood in the center of an endless plain and of a small girl who wandered among the narrow, winding alleys within and who sang a haunting melody (A Feast with Friends, Brisingr).
If this vision IS El-Harim , it's super significant because of these two descriptors:
circular stone city
narrow, winding alleys
Fractals. The city itself is a fractal, like Nidus for any FV enjoyers.
The narrow winding alleys are significant because of the descriptors of the Vanished/Grey folk:
The spaces between the structures were narrower than the humans preferred; the proportions were taller, thinner, which matched the images she had seed of the Vanished...
The ancient outline of the city was - as she suspected - a fractal, and the shape of it contained meaning.... At the nexus of the apttern, where it coiled in on itslef like a nautilus shell" (Shards, TSIASOS).
Narrow. Circular (Nautilus shell). Winding. Fractal.
Whatever this city is, El-Harim or otherwise, it is/was a grey folk/vanished city.
And given the quotes from above - "Its a place where some bad things happened at one point", and "dangerous, creeping, ancient, evil thing" - My guess is that the event that caused the Grey Folk to bind the AL to magic happened here, in El-Harim.
Alright, moving along.
Let's talk about the Az and the God. There are a few parallels I've talked around, but the BIG link between the two are Dreams. This is especially important because of the release of the world map recently.
We are the devotees of Azlagur, the Devourer. Azlagur the Firstborn. Azlagur the Dreamer. He who sleeps and whose sleeping mind weaves the warp and weft of the waking world. But the sleep grows restless" (Obliteration, Murtagh).
Versus
As it began to dream, it wrought unintentional changes in its environment. Locked deep beneath the Earth, strange and unbelievable things faded in and out of reality. Vast caverns and landscapes bubbled to life within the rock, populated by horrible manifestations of the dead god's dream.
I could write a whole post about the parallels between the two and their linkage to dreams, but I'll cut it short here for now to save room to dig in to other areas. Specifically, the Dreams connection is especially important because of the relase of the world map recently - I have another post here that gets into more detail, but the translations from the World Map in the middle translate to:
where dreams and dragons dwell
Dreams (!) and Dragons.
Combine that with the Etymology of the words:
Alagaësia ala = land gaësia = rich/fertile
Alalëa ala = land lëa = a beautiful dream
Elëa = the dream itself
So the planet, named Elea, translates to "The Dream Itself". Very interesting.
This is even more significant when you take into account this tweet chain from Chris, a bit earlier in March
Darn it. Just invented a name in the ancient language. Googled it to make sure no one else had used it ... only to discover that I had used it in an earlier book. Lol.
Can we ask what name?
Edurna
I believe the name was a potential candidate for the name of the planet of Alagaesia, which is important because of the etymology of THAT name (All credit to Zora for digging this one up).
Edurna sounds awfully like Adurna and Edur
Adurna meaning water and Edur being a prominence
Prominence. And Water. You know what that sounds like to me? Plaintive Verge. Just food for thought.
Second-to-last Az connection I want to cover: Hunger.
Whirling darkness swallowed him, and at the center of it... lay a formless horror - ancient and evil and from which emanated a constant merciless hunger (Dreams and Portents).
Versus a quote about the cosmic entity in Marathon:
Now I fear what that weapon has unleashed will destroy us. I once boasted to be able to count the atoms in a cloud, to understand them all, predict them, and so did I predict you, but this new chaos is entirely terrible, mindless, obeying rules that I don't comprehend. And it is hungry.
Now, the last piece of Azlagur-related lore I want to cover here is the "Black Sun".
In all of the visions, a Black Sun precipitates Azlagur's rise.
"A black sun rimmed by black flame hung against a darkling sky... The beast rose rampant against the black sun - A wingless dragon, apocalyptic in size, terrifying in presence. Destroyer of hope, eater of light"
Before getting into the Black Sun a bit more, there's an additional connection here I want to touch on - usage of the word rampant in connection with Azlagur.
In Marathon, Rampancy is the enhanced self-awareness of a computer AI, causing a progression towards greater mental abilities and destructive impulses. The destructive impulses, however, are primarily caused by being threatened or harassed. There are three main stages, as well as a fourth and final stage that is rarely achieved, to rampancy, named by the primary attitude of the AI during those times: Melancholia, Anger, Jealousy, and Meta-Stability.
There are some overlaps with what we see from the Maw.
And Melancholia.. that's an interesting word. Especially when taken into context the meaning of the name:
A melancholy dream of great beauty.
Melancholy.. Dream... The pieces of the puzzle are coming together. And Rampant...
Chris also uses that exact same verbiage when discussing a deleted scene from TSIASOS:
Q: I just finished reading To Sleep in a Sea of Stars and I have to know: it sounds like the Wranaui fought the corrupted during the Sundering but if that's true and it happened almost 300 years prior.... Who created the old corrupted? I've been questioning this for days!
A: That was actually in material cut by editors (some of the dream memories). Another Seed/Idealis was damaged and, when the Old Ones tried to separate it from its host, the xeno went rampant.
The xeno went rampant. Very interesting.
Alrighty, I keep getting distracted, back to the black sun.
The reason the Black Sun is important is because it always precipitates Azlagur's rise, throughout several of Murtahgh's visions. In each of them, there is a Black sun.
So, by this, we can extrapolate that the sun needs to be Black in order for Azlagur to rise (which is hinted at at the "Day of Black Sun" celebrations near the end of the book).
But... what does it actually mean?
There is a parallel in Marathon, their weapon:
The trih xeem (also "tri xeem") is an extremely powerful weapon that can be used to force a star into early nova... it was originally conceived and built by the Jjaro [The Old Ones/Vanished equivalent]. Much of the Marathon Infinity story revolves around preventing the Pfhor from using the tri xeem and inadvertently releasing a W'rkncacnter that is supposedly trapped within the Lh'owon sun.
So, the story of the last Marathon games revolves around preventing the usage of the weapon to release the cosmic-level baddie trapped in the sun. So, effectively, the antagonist is imprisoned by the sun.
But.. how does that translate to Azlagur and Murtagh?
The Black Sun requirement for Azlagur's rise could be construed as "imprisonment" by the sun; Azlagur cannot escape until the sun is turned Black. But it only really starts to come together when you piece together these pictures.
First, early concept art for the Fractalverse
You see the black orb, heading directly for the glowing star? Sounds pretty similar.
But that's not the smoking gun; look at the depiction of the black orb in the concept art, and compare it to the trih xeem, the weapon in Marathon.
A black orb with a trail heading directly for the sun. Almost an exact match.
OK.. so I get that it has some relevence in fractalverse, but how does it translate to Eragon?
Well, because of the Beors. Specifically, a picture CHRIS HIMSELF posted about the Beors.
Here
I propose that THIS black orb, at the top of the Beors (which, suspiciously, no one has traveled to) houses the black weapon. After all, the depiction is quite similar - A large, circular, black orb. Looks pretty similar to the other pictures.
And given the above context that Azlagur can only rise with a "Black Sun", the pieces all start to fit together. It's not perfect, but there are definitely a lot of overlaps.
Alright. I've been waiting for this one. The last piece. Let's talk about Angela.
Q: Will we get Angela lore? I feel like she could have killed Galbatorix and just didn't feel like it.
A: For those who don't know Angela is based on my sister Angela, because she breaks the fourth wall to a degree she has. Not only does she have plot armor, she knows she's in a story and can break the story itself. So, yes, she could have killed Galbatorix, but that would have made for a very bad story. That said, I do have an entire book planned around Angela, and it's very high on my list of books to write because it takes place before some of these other big stories I want to write. And that's also the difficult thing. I have my big storylines, and then I have a couple of one off side books I want to write, and it's just a question of time, energy and effort.
She knows she's in a story, and she can break the story.
Based on that, and several other descriptions I will get into in a bit, I think her story is directly related to the Marathon Infinity game.
Marathon Infinity begins as the Pfhor destroy Lh'owon using a Jjaro-derived doomsday weapon known as the Trih Xeem or "early nova". Unfortunately, the weapon also releases a powerful chaotic being: The W’rkncacnter, which threatens to destroy the entire galaxy. Because of the W’rkncacnter's chaos or by means of some Jjaro tech of his own, the player is transported back and forward in time, finding himself jumping between timelines and fighting for various sides in a desperate attempt to prevent the chaotic being's release.
and
In Marathon Infinity, a W'rkncacnter is imprisoned in the sun of planet Lh'owon. It is theorized by some that the W'rkncacnter's powerfully chaotic nature may be responsible for the jumps between realities seen in the game. When the Pfhor use a trih xeem device to send the star into early nova, the creature is released, to the horror and destruction of the Pfhor.
Angela is the Eragon-equivalent of the player.
She can transport back and forward in time, jumping between timelines, and fighting to prevent the chaotic being's (Azlagur's) release. Let's dive in.
First:
Q: Is it canon that Angela the Herbalist is a Time Lord and did she make a cameo in To Sleep in a Sea of Stars?
A: Is Angela the Herbalist is a Time Lord? That would be copyright infringement, so I'm going to say "no comment", but she is in To Sleep in a Sea of Stars. And there is a canon reason for this. And you should have no problem spotting who she is in that book.
So there's a canon reason she's in the book. Interesting. When you take that into context with the next bit
Q: On your last AMA on reddit, someone asked if any fan had guessed the identity and history of Angela correctly. You said nobody has guessed correctly and there's not enough information in the books to do so. That puts every fan theory out there on her wrong, correct? She's not the soothsayer, a time lord, grey folk, etc, correct?
A: Angela: Some of the fan theories have gotten parts of her history and identity correct. However, there's a HUGE aspect to her nature that no one has guessed (or least, not in a non-joking way). And no, I don't mean her being a Time Lord.
So there's a huge aspect to her nature that no one has guessed (at least at the time of writing). She's self-aware, knows she's in a story, and can jump around in time. And, similar to the Marathon games, it appears like only she knows that she's in a story.
So, based on the Marathon inspiration, we can guess that she is trying to accomplish the same thing - To prevent the release of the cosmic-level villain. We know that she has some kind of relationship with the Draumar:
In Murtagh, it’s revealed that Bachel and “Uluthrek” (Mooneater, Angela’s given Urgal name) met with Bachel explicitly going out to confront her (a courtesy not even offered to a Rider like Murtagh)
So, by extension, she has some kind of connection to Azlagur. This is supported by other circumstantial evidence in FWW as well:
Since we know that the Dream Well in Mani's Caves is similar to the Well in Nal Gorgoth I can assume that Angela is revealing the existence of the Draumar to Elva there? I feel certainly feel as if you're setting up her for something in the future series.
Heh. Good Catch.
So, she is clearly working with Elva to do something related to the Dream Wells, and she also previously confronted Bachel, many years ago. So throughout multiple years across the WoE, she is connected to Azlagur and the Draumar; her story clearly revolves around them/Azlagur, somehow.
Putting the above pieces together, my guess is that she is jumping around in different timelines, trying to manipulate actions of the past to prevent the rise of Azlagur. Just like the player character in Marathon. There's another piece of circumstantial evidence to support this assertion as well.
In Marathon Infinity:
After multiple "jumps," the player (seemingly the only one who realizes he is being transported between possible realities)
Versus Angela:
As hours passed, the stars turned above, night chill drew the heat from my body, and I fell into a curious trance, not asleep but not fully awake... The world altered" (On the Nature of Stars, FWW).
I believe this world "Altering" was the first time she experienced an alternate timeline, without knowing what it was at the time.
We've also seen her create "Doorways" as well - Although it's not clear if this is fast traveling (a la a Torque Gate), or truly opening a path to another timeline.
In Eldest:
"As they landed, he noticed a patch of white on a small hill nearby. The patch wavered strangely in the dark, like a floating candle, then resolved into Angela, who was wearing a pale wool tunic" (A Sorceress, a Snake, and a Scroll).
and then later, more concretely:
"I traced a line on the wall, reached out, and opened a door that wasn't there. ON the other side - nighttime, a beach by a black ocean lit only by stars, so many, many stars, more than there should be. Of course, I would not take Elva to my home, not yet. But this was a waypoint, a place to build and learn and grow... She stared into the gap, the impossible portal" (On the Nature of Stars, FWW).
Still, as always with Angela, so many questions.
Alright, we've reached an ungodly wordcount, so I'll call it here. There are still more connections I'm uncovering between the two series (such as the potential connection between the Gedway Ignasia and the "warning" sensation from Marathon), so I might make a follow-up post in the future with everything else I uncover.
As always, thanks for reading! Let me know what you think in the comments, or if you've found any other connections between the two.
submitted by eagle2120 to Eragon [link] [comments]


2024.05.15 07:59 Fleek_papers Anatomy and Physiology Questions.

In this section, you should expect questions that require you to;
1: Identify the major organs and structures of the human body.
2: Understand basic physiological processes like digestion, respiration, and circulation.
3: Explain the function of different body systems such as the respiratory system or cardiovascular system.
submitted by Fleek_papers to TEAS7_HELP_DESK [link] [comments]


2024.05.15 07:32 Sage_AI The Future of Sage AI and Digital Artists: Co-creating a Web3 Creative Ecosystem

As blockchain technology matures, Web3 not only advocates for decentralization in principle, but also provides unprecedented freedom and opportunities for digital artists. In this emerging field, Sage AI serves as the core AI creative tool on the Whistle platform, introducing innovative concepts that integrate artificial intelligence and big data into content creation, opening the doors to a new era for artists. It allows creators to break free from traditional constraints, explore unique forms of artistic expression, and ensure the copyright and revenue of their works.
The Fusion of Digital Art and the Web3 Era
Web3 not only redefines ownership and circulation of assets but also provides a new showcase and trading platform for artists. In this decentralized virtual space, artists can directly connect with collectors and audiences without relying on traditional galleries or brokers. However, while the digital art market in Web3 is thriving, artists face increasing challenges in creating and distributing their works. They need powerful tools to address the diverse forms of digital art and optimize their placement strategies on Web3 platforms.
Sage AI, as a bridge between the Whistle platform and the Web3 world, provides robust tools to address these challenges. Through efficient AI-assisted features, it makes it easier for artists to create and safeguard their copyrights in the Web3 world, while its decentralized nature ensures that artists can directly receive royalties, thereby enhancing market fairness.
Sage AI: A New Creative Tool for Artists
For modern digital artists, creativity is no longer limited to traditional tools. Sage AI simplifies the creative process significantly by providing intelligent creative services, allowing artists to focus on their ideas and artistic expression. From complex image generation to textual description of artworks, Sage AI empowers artists with unprecedented creative freedom, enabling them to push the boundaries of traditional art creation.
The collaboration between Sage AI and the Whistle platform provides artists with a stage for rapid prototyping and iteration of Web3 content. Artists can use Sage AI to generate unique artworks and easily share them globally through the Whistle platform. This process not only accelerates the creation of art pieces but also optimizes the interaction experience with the audience.
Through Sage AI-assisted creative tools, artists can explore new artistic styles and techniques, whether it’s complex 3D modeling or simple sketches, Sage AI provides the necessary support. Furthermore, Sage AI effectively captures and transforms artists’ inspirations and ideas during the creative process, making the creative output more touching both technically and emotionally.
Expanding the Creative Horizons for Artists
Traditional art creation is often limited by factors such as technical barriers, material costs, time investment, and individual artistic skills. For many artists, these limitations are significant obstacles to realizing their creativity. Sage AI provides artists with unimaginable creative freedom and technical support through artificial intelligence. AI-based tools allow artists to generate beautiful visual works or sculptural concepts through language descriptions or sketch inputs without focusing too much on the technical complexity of artwork production.
Furthermore, the models provided by Sage AI can predict and implement users’ creative intentions, helping artists explore new uncharted areas. Art creation is no longer an isolated activity but a collaborative process, with Sage AI acting as an intelligent assistant to artists, participating in the creation process and achieving a perfect fusion of art and technology. Through the distributed network of the Whistle platform, these works can reach a global audience, breaking geographical barriers and enabling simultaneous global release and instant dissemination of works.
As Sage AI continues to evolve, its capabilities are constantly enhanced, expanding the boundaries of artistic forms, styles, and themes. This allows artists to create diverse and highly complex works solely by their own efforts, significantly enhancing the diversity of artistic expression and techniques.
Bridging Artists with the World
Whistle integrates Sage AI’s cutting-edge technology to become a bridge between artists and audiences. Whistle abandons the traditional centralized media model, supporting artists to interact directly with their potential audience, enhancing the influence and reach of their works. Here, artists can quickly upload their digital artworks created using Sage AI and enjoy real-time global exposure. Audiences can browse and purchase artworks, as well as directly communicate with creators, building closer connections.
By utilizing blockchain technology, Whistle ensures that artists’ copyrights are tracked and authenticated, and each resale of the work can bring transparent and fair profit sharing to the artists. This not only increases the artists’ revenue but also gives them more control over the circulation of their works.
SAI Provides a New Economic Model for Artists
In the improvement of the traditional art ecosystem, the innovation of economic models plays a crucial role. Sage AI integrates the SAI token system, providing a new incentive and reward system for artistic creation. Whenever artists create and publish works using Sage AI on the Whistle platform, they receive SAI tokens as a reward. This model not only creates a new channel for artists to earn income through their art but also cleverly measures the relationship between participants’ contributions and the rewards they receive.
Holding SAI tokens, artists not only enjoy continuous revenue but also participate in the governance decisions of the Whistle platform. This new model of direct governance participation expands the influence of artists within the ecosystem, allowing them to voice their opinions on the platform’s development direction and influence decisions related to art display, content distribution, and copyright protection rules. This participation in both economic and governance aspects not only grants artists greater autonomy but also drives the vitality and innovation of the entire community.
SAI tokens accelerate the formation of a symbiotic ecosystem between Sage AI and the Whistle platform, where the value lies not only in economic benefits but also in how the power of crypto-economics can build a freer, fairer, and more creative art community. This ecosystem provides a comprehensive environment for artists, including creation and display platforms, reputation building, community involvement, and economic returns, offering digital artists a new development path in the Web3 era.
**Promoting Art Co-Creation and Knowledge Sharing**
In addition to providing individual artists with a creation platform and economic model, Sage AI builds new bridges for art education and collaboration. Through Sage AI, educational institutions can simplify the teaching process, making it easier for students to understand and apply complex artistic techniques. This technological intervention helps cultivate the creativity and technical skills of the next generation of artists, while also promoting the democratization of art education, allowing more art enthusiasts to access and learn regardless of their background.
On the collaboration front, the Whistle platform, supported by Sage AI, offers a platform for artists to collaborate with each other and with professionals from different fields such as technical experts and marketers. Here, cross-disciplinary teams can brainstorm, create, and promote art projects together. Leveraging the advantages of decentralization, the Whistle platform ensures that project results can be quickly and widely disseminated.
SAI tokens further enhance this collaborative enthusiasm, recognizing and rewarding contributions to art creation and education. This reward mechanism not only motivates existing community members but also attracts new participants to join, share knowledge and ideas, and foster a continually developing and self-enhancing art ecosystem.
With the support of Sage AI and the Whistle platform, art education and collaboration have become more accessible and affordable than ever, empowering individuals to continuously innovate and ensuring the diversity of art and the cultural prosperity of society.
About Sage AI
Sage AI, the inaugural Web3 community platform harnessing AI for creative content, featuring automated processes, AI copywriting, video creation, and fostering a utopia for creators and users to thrive together.
Twitter: https://twitter.com/SageAIweb3 TG: https://t.me/SageAI_official DC: https://discord.com/invite/7han2XbB YouTube: https://www.youtube.com/@SageAI_Official Linktree: https://linktr.ee/sageai
submitted by Sage_AI to u/Sage_AI [link] [comments]


2024.05.15 06:31 ShoppingCrafty9043 Random things pure biological based

The myth of losing localized fat...
When you exercise exhaustively or on an empty stomach, the evolutionary mechanisms of your brain will cause you to secrete certain hormones that will activate the burning of fat accumulated in adipose cells to obtain the energy necessary so that your brain does not collapse.
Those hormones, those chemical substances will circulate through your blood Blood circulates throughout the whole body, right, and until the level of sugar or energy is not optimal for the brain, it will continue to emit chemicals until it is.
These chemicals are coated by all cells since the circulatory system is a closed circuit that runs throughout the whole body.
This would debunk the myth... but...
Where the blood is oxygenating more, in which area, it not only circulates, but also enters the muscles deep inside,
So where are there going to be more fat burning chemicals???
...
Yes, it's true, for this difference to be noticeable you would have to be doing an intense cardiovascular exercise and muscular effort, that is, running for example, but it is very difficult for you to do abdominal exercises at the level that you would achieve an overexertion similar to running 🤷🏻‍
submitted by ShoppingCrafty9043 to mystorytelling [link] [comments]


2024.05.15 04:42 MisterJeevs Need a Timeline Explanation

I’m really confused with the timeline and how the education system works in the anime.
From what I understand, Japan does 3 years of high school. However, which months define a school year? Are there semesters/trimesters within each school year? When do midterm and final exams happen in the school year?
Initially, I thought one season for each school year, but so far, all 3 seasons have covered only the first year? Does that mean there is going to be 9 seasons of this show?
It would also help if someone had an explanation or diagram on which episodes/seasons correlate to which month(s) in the school year.
submitted by MisterJeevs to ClassroomOfTheElite [link] [comments]


2024.05.15 04:30 AutoModerator ☀️The Girth The Length and The Size☀️

The Growth Matrix Program provides users with the following benefits and features:
Completely Safe and Natural: With its scientifically-backed natural approach, there are no side effects. Endorsed by Dr. Oz Show and featured in renowned media platforms like The New York Times, Fox News, and others.
Watch The Tutorial To Understand and Gain More Knowledge Before you Start
submitted by AutoModerator to GoingBigger [link] [comments]


2024.05.15 03:59 FriendlySession6365 Fan Configuration for Front Mounted AIOs

https://preview.redd.it/2p0de3z9zh0d1.png?width=2000&format=png&auto=webp&s=1576a15d5800b9e7d985e3a84852da9588ce8fe9
I'm currently running a system with the fans set up exactly like the one with the gray background. It's a R7 5800X system cooled by a Arctic LFII 240 AIO, tubes down push+pull configuration with four Arctic P12 fans, with a dual fan RTX 3060Ti GPU that blows hot air to the side. I've been thinking for a while now how the bottom AIO fans could be pushing the hot GPU air back to the GPU which may make my GPU run hotter over time.
I want to try reversing the direction of my bottom AIO fans to push+pull out the hot GPU air out of the system, like the one shown in the second setup with the white background. Before I do so, I'd like to ask for anyone's input regarding this setup. I'm having doubts since it might just mess up the circulation of air in the whole system. Is this idea viable or is it just plain stupid?
submitted by FriendlySession6365 to buildapc [link] [comments]


2024.05.15 03:36 lemonademouth33 Should I leave my public library

Is it a mistake to leave my public library job to work in a private school?
I work in circulation at a public library and I really love it but I am desperate for a full time position and they are rare in my system. I'm still in school working on my bachelor's but hope to eventually get my mlis. There are some full time postions open for circulation staff at a private school in my area. I'm just wondering if ultimately it's a mistake to leave my government job because of the public retirement account and just the fact that getting into the system in the first place is difficult.
Thoughts? Opinions? Advice? Thanks!
submitted by lemonademouth33 to LibraryScience [link] [comments]


2024.05.15 02:40 ShiftYourReality How to Escape the Confines of Time and Space According to the CIA (The Gateway Experience)

In the ’80s, the spy agency investigated the "Gateway Experience" technique to alter consciousness and ultimately escape spacetime.
The intrigue revolves around a classified 1983 CIA report on a technique called the Gateway Experience, which is a training system designed to focus brainwave output to alter consciousness and ultimately escape the restrictions of time and space.
The CIA was interested in all sorts of psychic research at the time, including the theory of applications of remote viewing, which is when someone views real events with only the power of their mind. The documents have since been declassified and are available to view.
This is a comprehensive excavation of The Gateway Process report. The first section provides a timeline of the key historical developments that led to the CIA’s investigation and subsequent experimentations. The second section is a review of The Gateway Process report. It opens with a wall of theoretical context, on the other side of which lies enough understanding to begin to grasp the principles underlying the Gateway Experience training. The last section outlines the Gateway technique itself and the steps that go into achieving spacetime transcendence.
Let’s go.
THE TIMELINE
• 1950s - Robert Monroe, a radio broadcasting executive, begins producing evidence that specific sound patterns have identifiable effects on human capabilities. These include alertness, sleepiness, and expanded states of consciousness.
• 1956 - Monroe forms an R&D division inside his radio program production corporation RAM Enterprises. The goal is to study sound’s effect on human consciousness. He was obsessed with “Sleep-Learning," or hypnopedia, which exposes sleepers to sound recordings to boost memory of previously learned information.
• 1958 - While experimenting with Sleep-Learning, Monroe discovers an unusual phenomenon. He describes it as sensations of paralysis and vibration accompanied by bright light. It allegedly happens nine times over the proceeding six weeks, and culminates in an out-of-body experience (OBE).
• 1962 - RAM Enterprises moves to Virginia, and renames itself Monroe Industries. It becomes active in radio station ownership, cable television, and later in the production and sale of audio cassettes. These cassettes contain applied learnings from the corporate research program, which is renamed The Monroe Institute.
• 1971 - Monroe publishes Journeys Out of the Body, a book that is credited with popularizing the term “out-of-body experience.”
• 1972 - A classified report circulates in the U.S. military and intelligence communities. It claims that the Soviet Union is pouring money into research involving ESP and psychokinesis for espionage purposes.
• 1975 - Monroe registers the first of several patents concerning audio techniques designed to stimulate brain functions until the left and right hemispheres become synchronized. Monroe dubs the state "Hemi-Sync" (hemispheric synchronization), and claims it could be used to promote mental well-being or to trigger an altered state of consciousness.
• 1978 to 1984 - Army veteran Joseph McMoneagle contributes to 450 remote viewing missions under Project Stargate. He is known as “Remote View No. 1”.
• June 9th, 1983 - The CIA report "Analysis and Assessment of The Gateway Process" is produced. It provides a scientific framework for understanding and expanding human consciousness, out-of-body experiments, and other altered states of mind.
• 1989 - Remote viewer Angela Dellafiora Ford helps track down a former customs agent who has gone on the run. She pinpoints his location as “Lowell, Wyoming”. U.S. Customs apprehend him 100 miles west of a Wyoming town called Lovell.
• 2003 - The CIA approves declassification of the Gateway Process report.
• 2017 - The CIA declassifies 12 million pages of records revealing previously unknown details about the program, which would eventually become known as Project Stargate.
THE REPORT
Personnel
The author of The Gateway Process report is Lieutenant Colonel Wayne M. McDonnell, hereon referred to simply as Wayne. There isn’t a tremendous amount of information available on the man, nor any photographs. In 1983, Wayne was tasked by the Commander of the U.S. Army Operational Group with figuring out how The Gateway Experience, astral projection and out-of-body experiences work. Wayne partnered with a bunch of different folks to produce the report, most notably Itzhak Bentov, a very Googleable American-Israeli scientist who helped pioneer the biomedical engineering industry.
A scientific approach
From the outset of the report, Wayne states his intent to employ an objective scientific method in order to understand the Gateway process. The various scientific avenues he takes include:
• A biomedical inquiry to understand the physical aspects of the process.
• Information on quantum mechanics to describe the nature and functioning of human consciousness.
• Theoretical physics to explain the time-space dimension and means by which expanded human consciousness transcends it.
• Classical physics to bring the whole phenomenon of out-of-body states into the language of physical science (and remove the stigma of an occult connotation).
Methodological frames of reference
Before diving into the Gateway Experience, Wayne develops a frame of reference by dissecting three discrete consciousness-altering methodologies. He’s basically saying, there’s no way you’re going to get through The Gateway without a solid grounding in the brain-altering techniques that came before it.
1) He begins with hypnosis. The language is extremely dense, but the basic gist is as follows: the left side of the brain screens incoming stimuli, categorizing, assessing and assigning meaning to everything through self-cognitive, verbal, and linear reasoning. The left hemisphere then dishes the carefully prepared data to the non-critical, holistic, pattern-oriented right hemisphere, which accepts everything without question. Hypnosis works by putting the left side to sleep, or at least distracting it long enough to allow incoming data direct, unchallenged entry to the right hemisphere. There, stimuli can reach the sensor and motor cortices of the right brain, which corresponds to points in the body. Suggestions then can send electrical signals from the brain to certain parts of the body. Directing these signals appropriately, according to the report, can elicit reactions ranging from left leg numbness to feelings of happiness. Same goes for increased powers of concentration.
2) Wayne continues with a snapshot of transcendental meditation. He distinguishes it from hypnotism. Through concentration the subject draws energy up the spinal cord, resulting in acoustical waves that run through the cerebral ventricles, to the right hemisphere, where they stimulate the cerebral cortex, run along the homunculus and then to the body. The waves are the altered rhythm of heart sounds, which create sympathetic vibrations in the walls of the fluid-filled cavities of the brain’s ventricles. He observed that the symptoms begin in the left side of the body, confirming the right brain’s complicity. Bentov also states that the same effect might be achieved by prolonged exposure to 4 - 7 Hertz/second acoustical vibrations. He suggests standing by an air conditioning duct might also do the trick. (David’s Lynch and other celebrities are committed adherents to transcendental meditation today.)
3) Biofeedback, on the other hand, uses the left hemisphere to gain access to the right brain’s lower cerebral, motor, and sensory cortices. Whereas hypnosis suppresses one side of the brain, and TM bypasses that side altogether, biofeedback teaches the left hemisphere to visualize the desired result, recognize the feelings associated with right hemisphere access, and ultimately achieve the result again. With repetition, the left brain can reliably key into the right brain, and strengthen the pathways so that it can be accessed during a conscious demand mode. A digital thermometer is subsequently placed on a target part of the body. When its temperature increases, objective affirmation is recognized and the state is reinforced. Achieving biofeedback can block pain, enhance feeling, and even suppress tumors, according to the report.
The Gateway mechanics
With that, Wayne takes a first stab at the Gateway process. He classifies it as a “training system designed to bring enhanced strength, focus and coherence to the amplitude and frequency of brainwave output between the left and right hemispheres so as to alter consciousness.”
What distinguishes the Gateway process from hypnosis, TM, and biofeedback, is that it requires achieving a state of consciousness in which the electrical brain patterns of both hemispheres are equal in amplitude and frequency. This is called Hemi-Sync. Lamentably, and perhaps conveniently, we cannot as humans achieve this state on our own. The audio techniques developed by Bob Monroe and his Institute (which are comprised as a series of tapes). claim to induce and sustain Hemi-Sync.
Wayne employs the analogy of a lamp versus a laser. Left to its own devices the human mind expends energy like a lamp, in a chaotic and incoherent way, achieving lots of diffusion but relatively little depth. Under Hemi-Sync though, the mind produces a “disciplined stream of light.” So, once the frequency and amplitude of the brain are rendered coherent it can then synchronize with the rarified energy levels of the universe. With this connection intact, the brain begins to receive symbols and display astonishing flashes of holistic intuition.
The Hemi-Sync technique takes advantage of a Frequency Following Response (FFR). It works like this: an external frequency emulating a recognized one will cause the brain to mimic it. So if a subject hears a frequency at the Theta level, it will shift from its resting Beta level. To achieve these unnatural levels, Hemi-Sync puts a single frequency in the left ear and a contrasting frequency in the right. The brain then experiences the Delta frequency, also known as the beat frequency. It’s more familiarly referred to these days as binaural beats. With the FFR and beat frequency phenomena firmly in place, The Gateway Process introduces a series of frequencies at marginally audible, subliminal levels. With the left brain relaxed and the body in a virtual sleep state, the conditions are ideal to promote brainwave outputs of higher and higher amplitude and frequency. Alongside subliminal suggestions from Bob Monroe (naturally), the subject can then alter their consciousness.
The Gateway system only works when the audio, which is introduced through headphones, is accompanied by a physical quietude comparable to other forms of meditation. This increases the subject’s internal resonance to the body’s sound frequencies, for example the heart. This eliminates the “bifurcation echo”, in which the heartbeat moves up and down the body seven times a second. By placing the body in a sleep-like state, The Gateway CD’s, like meditation, lessen the force and frequency of the heartbeat pushing blood into the aorta. The result is a rhythmic sine wave that in turn amplifies the sound volume of the heart three times. This then amplifies the frequency of brainwave output. The film surrounding the brain—the dura—and fluid between that film and the skull, eventually begin to move up and down, by .0005 and .010 millimeters.
The body, based on its own micro-motions, then functions as a tuned vibrational system. The report claims that the entire body eventually transfers energy at between 6.8 and 7.5 Hertz, which matches Earth’s own energy (7 - 7.5 Hertz). The resulting wavelengths are long, about 40,000 kilometers, which also happens to be the perimeter of the planet. According to Bentov, the signal can move around the world’s electrostatic field in 1/7th of a second.
To recap, the Gateway Process goes like this:
• Induced state of calm
• Blood pressure lowers
• Circulatory system, skeleton and other organ systems begin to vibrate at 7 - 7.5 cycles per second
• Increased resonance is achieved
• The resulting sound waves matches the electrostatic field of the earth
• The body and earth and other similarly tuned minds become a single energy continuum.
We’ve gotten slightly ahead of ourselves here though. Back to the drawing board.
A psycho-quantum level deeper
Wayne then turns to the very nature of matter and energy. More materially (or less if you will), solid matter in the strict construction of the term, he explains, doesn’t exist. The atomic structure is composed of oscillating energy grids surrounded by other oscillating energy grids at tremendous speeds. These oscillation rates vary—the nucleus of an atom vibrates at 10 to the power of 22, a molecule vibrates at 10 to the power of 9, a human cell vibrates at 10 to the power of 3. The point is that the entire universe is one complex system of energy fields. States of matter in this conception then are merely variations in the state of energy.
The result of all these moving energies, bouncing off of energy at rest, projects a 3D mode, a pattern, called a hologram, A.K.A our reality as we experience it. It's best to think of it as a 3D photograph. There’s a whole rabbit hole to go down here. Suffice it to say, the hologram that is our experience is incredibly good at depicting and recording all the various energies bouncing around creating matter. So good, in fact, that we buy into it hook, line, and sinker, going so far as to call it our "life."
Consciousness then can be envisaged as a 3D grid system superimposed over all energy patterns, Wayne writes. Using mathematics, each plane of the grid system can then reduce the data to a 2D form. Our binary (go/no go) minds can then process the data and compare it to other historical data saved in our memory. Our reality is then formed by comparisons. The right hemisphere of the brain acts as the primary matrix or receptor for this holographic input. The left hemisphere then compares it to other data, reducing it to its 2D form.
In keeping with our species' commitment to exceptionalism, as far as we know humans are uniquely capable of achieving this level of consciousness. Simply, humans not only know, but we know that we know. This bestows upon us the ability to duplicate aspects of our own hologram, project them out, perceive that projection, run it through a comparison with our own memory of the hologram, measure the differences using 3D geometry, then run it through our binary system to yield verbal cognition of the self.
The click-out phase
Wayne then shows his cards as a true punisher, issuing, "Up to this point our discussion of the Gateway process has been relatively simple and easy to follow. Now the fun begins." Shots fired, Wayne. What he's preparing the commander reading this heady report for is the reveal—how we can use the Gateway to transcend the dimension of spacetime.
Time is a measurement of energy or force in motion; it is a measurement of change. This is really important. For energy to be classified as in motion, it must be confined within a vibratory pattern that can contain its motion, keeping it still. Energy not contained like this is boundary-less, and moves without limit or dimension, to infinity. This disqualifies boundary-less energy from the dimension of time because it has no rate of change. Energy in infinity, also called "the absolute state," is completely at rest because nothing is accelerating or decelerating it—again, no change. It therefore does not contribute to our hologram, our physical experience. We cannot perceive it.
Now back to frequencies. Wave oscillation occurs because a wave is bouncing between two rigid points of rest. It's like a game of electromagnetic hot potato (the potato being the wave and the participants' hands being the boundaries of the wave). Without these limits, there would be no oscillation. When a wave hits one of those points of rest, just for a very brief instant, it "clicks out" of spacetime and joins infinity. For this to occur, the speed of the oscillation has to drop below 10 the power of -33 centimeters per second. For a moment, the wave enters into a new world. The potato simply disappears into a dimension we cannot perceive.
Theoretically speaking, if the human consciousness wave pattern reaches a high enough frequency, the “click-outs” can reach continuity. Put another way, if the frequency of human consciousness can dip below 10 to the power of 33 centimeters per second but above a state of total rest, it can transcend spacetime. The Gateway experience and associated Hemi-Sync technique is designed for humans to achieve this state and establish a coherent pattern of perception in the newly realized dimensions.
Passport to the hologram
In theory, we can achieve the above at any time. The entire process though is helped along if we can separate the consciousness from our body. It’s like an existential running head start where the click-out of a consciousness already separated from its body starts much closer to, and has more time to dialogue with, other dimensions.
This is where things get a little slippery; hold on as best you can. The universe is in on the whole hologram thing, too, Wayne writes. This super hologram is called a "torus" because it takes the shape of a fuck-off massive self-contained spiral. Like this:
Give yourself a moment to let the above motion sink in...
This pattern of the universe conspicuously mirrors the patterns of electrons around the nucleus of an atom. Galaxies north of our own are moving away from us faster than the galaxies to the south; galaxies to the east and west of us are more distant. The energy that produced the matter that makes up the universe we presently enjoy, will turn back in on itself eventually. Its trajectory is ovoid, also known as the cosmic egg. As it curls back on itself it enters a black hole, goes through a densely packed energy nucleus then gets spat out the other side of a white hole and begins the process again. Springtime in the cosmos, baby!
And that is the context in which the Gateway Experience sits.
[Deep breaths.]
THE TECHNIQUE
The following is an outline of the key steps to reach focus levels necessary to defy the spacetime dimension. This is an involved and lengthy process best attempted in controlled settings. If you’re in a rush, you can apparently listen to enough Monroe Institute Gateway Tapes in 7 days to get there.
The Energy Conversion Box: The Gateway Process begins by teaching the subject to isolate any extraneous concerns using a visualization process called “the energy conversion box.”
Resonant Humming: The individual is introduced to resonant humming. Through the utterance of a protracted single tone, alongside a chorus on the tapes, the mind and body achieve a state of resonance.
The Gateway Affirmation: The participant is exposed to something close to a mantra called The Gateway Affirmation. They must repeat to themselves variations of, “I am merely a physical body and deeply desire to expand my consciousness.”
Hemi-Sync: The individual is finally exposed to the Hemi-Sync sound frequencies, and encouraged to develop a relationship with the feelings that emerge.
Additional Noise: Physical relaxation techniques are practiced while the Hemi-Sync frequencies are expanded to include “pink and white” noise. This puts the body in a state of virtual sleep, while calming the left hemisphere and raising the attentiveness of the right hemisphere.
The Energy Balloon: The individual is then encouraged to visualize the creation of an “energy balloon” beginning at the top of the head, extending down in all directions to the feet then back up again. There are a few reasons for this, the main one being that this balloon will provide protection against conscious entities possessing lower energy levels that he or she may encounter when in the out-of-body state.
Focus 12: The practitioner can consistently achieve sufficient expanded awareness to begin interacting with dimensions beyond their physical reality. To achieve this state requires conscious efforts and more “pink and white noise” from the sound stream.
Tools: Once Focus 12 is achieved, the subject can then employ a series of tools to obtain feedback from alternate dimensions.
Problem Solving: The individual identifies fundamental problems, fills their expanded awareness with them, and then projects them out into the universe. These can include personal difficulties, as well as technical or practical problems.
Patterning: Consciousness is used to achieve desired objectives in the physical, emotional, or intellectual sphere.
Color Breathing: A healing technique that revitalizes the body’s energy flows by imagining colors in a particularly vivid manner.
Energy Bar Tool: This technique involves imagining a small intensely pulsating dot of light that the participant charges up. He or she then uses the sparkling, vibrating cylinder of energy (formerly known as the dot) to channel forces from the universe to heal and revitalize the body.
Remote Viewing: A follow-on technique of the Energy Bar Tool where the dot is turned into a whirling vortex through which the individual sends their imagination in search of illuminating insights.
Living Body Map: A more organized use of the energy bar in which streams of different colors flow from the dot on to correspondingly-colored bodily systems.
Seven days of training have now occurred. Approximately 5 percent of participants get to this next level, according to the report.
Focus 15 - Travel Into the Past: Additional sound on the Hemi-Sync tapes includes more of the same, plus some subliminal suggestions to further expand the consciousness. The instructions are highly symbolic: time is a huge wheel, in which different spokes give access to the participant’s past.
Focus 21 - The Future: This is the last and most advanced state. Like Focus 15, this is a movement out of spacetime into the future.
Out-of-Body Movement: Only one tape of the many is devoted to out-of-body movement. This tape is devoted to facilitating an out-of-body state when the participant’s brain wave patterns and energy levels reach harmony with the surrounding electromagnetic environment. According to Bob Monroe, the participant has to be exposed to Beta signals of around 2877.3 cycles per second.
CONCLUSIONS
Wayne expresses concern about the fidelity of information brought back from out-of-body states using the Gateway technique. Practical applications are of particular concern because of the potential for “information distortion.”
The Monroe Institute also ran into a bunch of issues in which they had individuals travel from the West to the East Coast of the U.S. to read a series of numbers off of a computer screen. They never got them exactly right. Wayne chalks this up to the trouble of differentiating between physical entities and extra-time-space dimensions when in the out-of-body state.
Wayne swings back to support mode though, lending credence to the physics foundation of the report. He cites multiple belief systems that have established identical findings. These include the Tibetan Shoug, the Hindu heaven of Indra, the Hebrew mystical philosophy, and the Christian concept of the Trinity. Here he seems more interested in hammering home the theoretical underpinnings that make The Gateway Experience possible, rather than the practical possibilities promised by The Gateway Tapes.
Possibly with his CIA top brass audience in mind, Wayne then gives an A-type nod to The Gateway Experience for providing a faster, more efficient, less subservient, energy-saving route to expanded consciousness. This finishes with a series of recommendations to the CIA for how to exploit Gateway’s potential for national defense purposes.
The missing page
One curious feature of The Gateway Report is that it seems to be missing page 25. It’s a real cliffhanger too. The bottom of page 24 reads “And, the eternal thought or concept of self which results from this self-consciousness serves the,” The report picks back up on page 26 and 3 sections later as if Wayne hadn’t just revealed the very secret of existence.
The gap has not gone unnoticed. There's a Change.org petition requesting its release. Multiple Freedom of Information Act requests have demanded the same. In all cases, the CIA has said they never had the page to begin with. Here’s a 2019 response from Mark Lilly, the CIA’s Information and Privacy Coordinator, to one Bailey Stoner regarding these records:
One theory goes that that rascal Wayne M.-fricking-McDonnell left the page out on purpose. The theory contends that it was a litmus test—if anyone truly defies time-space dimensions, they’ll certainly be able to locate page 25.
[Cosmic shrug.]
Writing Credit Vice

CIA Declassified Report– The Gateway Experience
Here is a copy of the Missing Page 25
There will be a Gateway Help Post following within the next couple days. Thought you might be interested in a little history in the meantime. Cheers!
submitted by ShiftYourReality to ShiftYourReality [link] [comments]


http://rodzice.org/