Iphone4 restore error 3149

New PC builder needing some help :)

2024.05.21 13:24 Pristine_Cookie5635 New PC builder needing some help :)

Hi, I’m brand new to PC building and I thought I would give it a go but I’ve run into a snag.
My specs:
Case: deep cool CC560 V2 mid tower - NEW CPU: AMD Ryder 5 5600 with wraith fan - NEW PSU: Corsair CV650 80 Plus bronze non modular ATX 650 - NEW RAM: crucial pro DDR4 RAM 32GB (2x16GB) 3200 MHz - NEW Motherboard: MSI AMD B550M Pro-VDH Wi-Fi - Pre Owned SSD: Samsung PM981A MZ VLB1TB SSD M.2 2280 NVMe PCLe 3.0 - Pre owned Graphics card: Asus Dual Nvidia GeForce RTX 3060 ti V2 mini 8GB GDDR6 - Pre owned (barely used).
Hi, so I put this all together with a helpful YouTube video and I think everything was put together correctly, there was nothing too complicated. Everything ran when I turned it on and I got it to start on the MSI pro series and on there everything seemed to be recognised and running.
I tried installing windows 10, then my problems started happening. I downloaded the windows media creation tool onto a 32Gb USB and tried to install that. It ran the USB and I could go through the early steps like accepting T+Cs and choosing a language and putting my product key in. After it installs my PC restarts which is what it says it will do but then it just keeps restarting with an error saying ‘the computer restarted unexpectedly or encountered an unexpected error. Windows installation cannot proceed’. I switched it on and off again and reinstalled windows but that didn’t work. I tried installing the media creation tool on my housemates laptop and that didn’t work. I’ve updated the drivers for my motherboard and I’ve played around with (enabling/disabling) all the BIOS settings and restored them to default.
I’ve tried windows 11 and that put me into recovery mode. I tried using the start up repair but that instantly crashes. I’ve asked chatGPT for some checks to put into command prompt and all the checks have been successful and nothing came out wrong. I’ve taken out one RAM module at a time, changing where I plug my USB stick in and changing my SSD slot. I changed my USB from fat 32 to NTFS. None of these worked and so I installed a pre installation diagnostic tool using Rufus called Hiren’s bootCD, but that had the exact same problem with windows where it couldn’t boot. I assume it is a hardware problem from my lack of experience.
Anyway sorry for the super long message, I’m very new to this and any help would be much appreciated 😊
submitted by Pristine_Cookie5635 to PcBuildHelp [link] [comments]


2024.05.21 13:24 Grubzer No boot after do-release-upgrade

I wanted to upgrade to 22.04 from my 20.04 on my linux lite 5.8 (Linux 5.4.0-182-generic, HW: samsung np-q330 laptop: nvidia 310m, intel core i3 370m, 8 gb ram) with do-release-upgrade, during packages upgrade there were a few errors but it still finished. Then I rebooted, and after that it failed to boot with initramfs invalid magic error. I tried to boot 5.4.0-181-generic with grub menu, lightdm desktop failed to launch, but tty was working so i decided to regenerate initramfs (i had trouble installing nvidia drivers before, and that fixed them before) so i ran sudo update-initramfs -c -k 5.4.0-182-generic
But now though 181-generic loads at least into tty, 182-generic is stuck at "loading initial ramdisk..."
How do i repair the initramfs properly? Or is issue somewhere else? How do i diagnose what is wrong? Maybe i need to manually install some packages? I have a usb with linux lite on ventoy i used to install the os initially, but i hope i dont have to reinstall it completely. I can use it to perform restorations though. I hope at least to get to desktop, i can deal with nvidia drivers later
submitted by Grubzer to Ubuntu [link] [comments]


2024.05.21 13:18 jhonmark8502 QuickBooks Multi User Mode Not Working Issue

QuickBooks Multi-User Mode is a valuable feature facilitating collaborative financial management within businesses. However, encountering issues with this functionality can impede productivity and hinder smooth operations. This comprehensive guide aims to address the QuickBooks Multi-User Mode Not Working Issue, providing troubleshooting steps and expert insights to resolve the issue effectively.
Understanding QuickBooks Multi-User Mode:
QuickBooks Multi-User Mode allows multiple users to access the same company file simultaneously, enhancing collaboration and streamlining financial workflows. It enables real-time updates, ensuring all users have access to the latest data, and facilitates seamless cooperation among team members, regardless of their physical location.
Common Symptoms of Multi-User Mode Not Working Issue:
  1. Inability to switch to Multi-User Mode: Users may encounter errors or difficulties when attempting to switch QuickBooks to Multi-User Mode.
  2. Connection Issues: Users may experience difficulties connecting to the company file in Multi-User Mode, resulting in errors or disruptions.
  3. Slow Performance: Multi-User Mode may lead to slow performance or system freezes, affecting productivity and efficiency.
  4. Data Corruption: In some cases, Multi-User Mode issues can lead to data corruption or loss if not addressed promptly.
Identifying Possible Causes:
  1. Network Configuration: Incorrect network settings or connectivity issues can prevent users from accessing the company file in Multi-User Mode.
  2. Firewall Settings: Overly restrictive firewall settings may block QuickBooks from communicating over the network, causing Multi-User Mode issues.
  3. Data File Corruption: Corrupted company files can lead to Multi-User Mode not working properly, resulting in errors or data integrity issues.
  4. User Permissions: Insufficient user permissions or improper setup can prevent users from accessing the company file in Multi-User Mode.
  5. Software Compatibility: Compatibility issues between QuickBooks and other software installed on the system may cause Multi-User Mode problems.
Troubleshooting Steps:
  1. Check Network Connectivity:
    • Verify that all computers are connected to the same network.
    • Ensure stable internet connectivity and troubleshoot any network issues.
    • Test network connections using the Ping command to identify potential connectivity issues.
  2. Review Firewall Settings:
    • Adjust firewall settings to allow QuickBooks access through the network.
    • Add QuickBooks as an exception to the firewall's blocking rules.
    • Consider temporarily disabling the firewall for testing purposes (with caution).
  3. Verify User Permissions:
    • Ensure that all users have the necessary permissions to access the company file in Multi-User Mode.
    • Review user roles and permissions within QuickBooks to ensure proper access levels.
    • Verify that the company file is shared correctly and accessible to all authorized users.
  4. Update QuickBooks:
    • Check for and install any available updates for QuickBooks to ensure compatibility and resolve known issues.
    • Update all computers running QuickBooks to the latest version to maintain consistency.
  5. Repair Company File:
    • Use the QuickBooks built-in tool, QuickBooks File Doctor, to diagnose and repair company file issues.
    • Create a backup of the company file before initiating any repair processes to avoid data loss.
    • Follow the on-screen prompts to repair any detected issues with the company file.
  6. Test QuickBooks Database Server Manager:
    • Run the QuickBooks Database Server Manager to scan and troubleshoot database-related issues.
    • Verify that the QuickBooks Database Server Manager is installed and configured correctly on the server hosting the company file.
    • Perform a scan using the Database Server Manager to identify any issues with the company file location or configuration.
  7. Rebuild QuickBooks Data:
    • If data integrity issues are suspected, use the QuickBooks Rebuild Data tool to rebuild the company file.
    • Create a backup of the company file before initiating the rebuild process to prevent data loss.
    • Follow the on-screen instructions to rebuild the company file and resolve any data-related issues.
  8. Run QuickBooks Diagnostic Tool:
    • Utilize the QuickBooks Diagnostic Tool to diagnose and resolve various QuickBooks-related issues, including Multi-User Mode problems.
    • Download and install the QuickBooks Diagnostic Tool from the official Intuit website.
    • Follow the tool's instructions to scan and repair QuickBooks installation and configuration issues.
Expert Tips for Resolving Multi-User Mode Issues:
  1. Keep QuickBooks Updated: Regularly updating QuickBooks ensures compatibility with the latest operating system updates and resolves known issues.
  2. Maintain Data Integrity: Conduct regular data backups and implement data integrity checks to prevent and detect data corruption issues.
  3. Optimize Network Performance: Invest in a robust network infrastructure and ensure adequate bandwidth to support QuickBooks Multi-User Mode.
  4. Seek Professional Assistance: If troubleshooting steps fail to resolve the issue, consider seeking assistance from QuickBooks experts or technical support professionals.
Conclusion:
The QuickBooks Multi-User Mode Not Working Issue can disrupt workflow and impact business operations. However, by following the troubleshooting steps outlined in this guide and implementing expert tips, users can effectively resolve the issue and restore seamless collaboration within QuickBooks. Regular maintenance, data integrity checks, and proactive troubleshooting are essential practices to prevent and address Multi-User Mode issues, ensuring smooth financial management and optimal performance of QuickBooks.
Visit–https://www.errorsfixs.com/blog/quickbooks-multi-user-mode-issue/
submitted by jhonmark8502 to u/jhonmark8502 [link] [comments]


2024.05.21 13:18 Extreme_Theater Nintendo Switch slow Emmc error - out of ideas

I have a Nintendo Switch which when booted into hekate gives me a slow Emmc error. Things I have tried:
I'm stumped as to where else the issue could be - perhaps M92 chip?
submitted by Extreme_Theater to consolerepair [link] [comments]


2024.05.21 13:07 IntelligentLaw2284 Gameboy Enhanced Firmware v0.5 for M5Stack Cardputer More than twice the FPS and Custom Controls, 12 Colour and Super Game Boy modes.

Gameboy Enhanced Firmware v0.5 for M5Stack Cardputer More than twice the FPS and Custom Controls, 12 Colour and Super Game Boy modes.
I've been eager to reach this point; when I can say that I have met my original goals when I started working with this firmware approx 2 weeks ago. Customizable controls, savegames, no memory limitations save for the cost in performance. A slew of other features I couldn't help but implement along the way too. v0.5 is now live on m5burner.
https://preview.redd.it/ul7zf4clgr1d1.jpg?width=966&format=pjpg&auto=webp&s=669a964444c786193574c950f09f39b20ad72145
I've spent the time avoiding the user interface work I finally did yesterday, instead optimizing the rendering and memory subsystem to get more than twice the performance of my last announced release(v0.48). Super Mario Land 2 and Donkey Kong Land show more than a 100% improvement in frame rates (17fps -> 53fps in the overworld for super mario land 2)
The next steps planned:
Audio
Save States
Some more options; custom palette, performance related things
debug w/ Pokemon, figure out why it restarts the firmware
about information screen crediting Matteo Forlani for concept implementation; any one else who ends up contributing.
And in the would be nice category:
Wifi link-cable; I doubt it would get much use but the hooks for it all appear to be present in peanut_gb.
Custom borders (I wont sacrifice ram for this, but I could stream it from the sdcard, it is not redrawn during normal gameplay)
Any other ideas? If there are any pixel artist out there, there is room in the ROM for a cardputer themed border and I'm more than willing to entertain submissions in that area as well, with full credit of course going to the author(s).
Changelog since I started:
20.05.2024:v0.5
* added bottom menu bar with instructions to the main rom selection menu, pres ESC or ' key (same thing) to enter the settings menu either from the main menu or while playing a game
* added options menu, can be entered from the menu or from within a game; displays the 8 main controls with their current setting, saves settings when closed
* added restore defaults for config menu
* settings are saved to gbconfig.dat; delete this if you are having any issues
19.05.2024:v0.492
* Reimplemented memory subsystem to use progressive partial page seeking/pruning; the original memory management code was the first I had typed in 14 years; after some thought I devised something much more suitable for a real time environment. This resulted in the average page seek time being much lower, and distributes maintenance of the paging system across successive calls. The results are the largest improvement to speed to date. Over double the frame rates from before; less stutter, smoother page transitions in memory. Donkey Kong Land averages around 45fps now; Super Mario land 2 gets an average 53fps on the overworld.
18.05.2024:v0.491
* Reduced rendering workload 6.25% by modifying peanut_gb to inherently skip lines that aren't visible due to scaling.
This prevents the engine from having to process the layer and sprite data for these lines all together. Why 6.25%? because 9 lines are skipped which is 6.25% of the lines that were rendered previously.
17.05.2024:v0.49
* Refactored graphics code; ~120,000 less operations a frame
* Scrolling behaviour and screen content differences no longer effect rendering performance Titles such as final fantasy or even super mario land 2 show a huge improvement in overworld movement speed.
17.05.2024: v0.483 Pushing this now as a BUG FIX RELEASE
* Fixed bug in main menu causing selection to only move upward; you can now navigate properly again.
* added FPS display while Fn button is held, causes slow down which is subtracted from the FPS display. This is so I can evaluate performance improvements more than anything else, but it doesn't hurt to have so I'm leaving it in.
* new borders are on hold while I make decisions about the internal format (leaning towards argb1555,presently 565)
16.05.2024: v0.482
* Added Analogue Pocket 12color palette category with 44 palettes
* Automatic 12color(AP) palettes mapped as per Analogue Pocket suggested mappings for:
Mario 1/2/Wario Land/Balloon Kid/F1 Race/Tetris
* added Cottage Daytime SGB border
* Fixed 12colours not being assigned until palette select bug
* regularly mapped controller up/down/a now functions in addition to arrow/enter keys in main menu to allow a single hand posture for the entire interface if desired.
15.05.2024: v0.481
* proper gameboy startup sequence, may help compatibility with some games.
* Message boxes now will display any emulation errors reported by peanut_gb
* Attempts to access ROM address outside of the available cartridge ROM will display an appropriate message
14.05.2024 v0.48 Added 12 colour mode, with the 12 palettes the game boy colour could apply to old game boy games as the first of this mode, but more to come in this area.
*Super gameboy support added for screen borders with gameboy skin set as default, followed by 1 (for now) of the official borders from the hardware itself. Activate by holding Fn and pressing '[' and cycle borders by holding Fn and pressing ']'. Because these are the same keys used for other visual modifications, I hope using the combination of Fn and these keys is intuitive.
* Super gameboy palette support added for balloon kid, the legend of zelda links awakening and kirbys pinball land
* Various other small tweaks you probably wont notice.
12.06.2025 V0.47 Added first iteration of Super Gameboy Mode with all 32 official palettes that were included with the original hardware. Nintendo included a table on the device to map certain games to certain palettes, and that functionality is partially implemented. Mario 1/2/Wario Land, F1 Racer and Tetris all autodetect and assign their colour scheme. This mode can be toggled on and off at any time during play with the '[' button, and the current cycle palette button will cycle through the 32 included palettes. Games with defined profiles with start with that palette selected automatically when Super Gameboy Mode is engaged for the first time each session.
*Lots of user interface changes; message boxes will appear to describe your palette selections, among other things - no console style debug remains in normal operation.
*Another 4k of memory allocated to ROM storage, may smooth out some edge cases of stuttering.
*Improved readability in the main menu; and made highlighted selection more apparent.
*Added smooth transitions to splash screen.
*Disabled unused (for the moment) configuration file
11,05.2024:: 0.44 squished a bug, added palette control, press ']' to cycle between presets.
b/w, gameboy(original), gameboy pocket and gameboy light (in that order).
Huge performance improvements for larger ROMs with over 110k more ram available to the memory sub-system. Palette values are from https://en.wikipedia.org/wiki/List_of_video_game_console_palettes for accuracy.
10.05.2024:: 0.41 added savegame support. if a game uses it's onboard ram constantly though, use the manual backup button (=). The save feature will only automatically engage after the cartridge ram has been left untouched for a second.
08.05.2024: v0.4 forked from gb_cardputer, added memory management subsystem (paging) to manage random access to roms of any size the filesystem supports.
Yellow bars on either side of the display momentarily indicate that the cartridge ram has been backed up. The savegame format will not be changing, its a simple binary dump.
Have fun!
submitted by IntelligentLaw2284 to M5Stack [link] [comments]


2024.05.21 12:11 phil_not_collins Windows 11 new profile data

So my old profile in windows 11 was broken and it was an administrator account. I created another profile which is local user. I need to copy data from old username folder to the new username folder. Will it cause any issues with my new profile as the old profile was broken?
For more info on what was problem with my old profile:- I couldn't copy some dll files into system32 folder due to permission and ownership issues as it was provided by my organisation. So I had to change some permission settings on that folder. After that some applications started acting weird. Errors like "this application was unable to start correctly 0xc00007b" started appearing. So I tried to reset the permissions by doing system restore. None of these worked and many more problems appeared. The problem was due to temporary profiles getting created by itself everytime I loginned into the pc and I tried to solve it by using regedit command in cmd and deleting the temporary profiles but they still appeared again everytime I shut down and loginned into the device again. Profile was working well in safe mode so I did not reset the laptop but instead repair installed windows 11. So I created new user profile repair installed windows 11. If y'all got any solutions to fix the old profile, do mention the solutions to that too, but I think I'd rather copy those data from old profile to new one
submitted by phil_not_collins to techsupport [link] [comments]


2024.05.21 11:25 The_Way358 Essential Teachings: Understanding the Atonement, the Content of Paul's Gospel Message, and Justification

"Why Did Jesus Die on the Cross?"

The main reason Jesus died on the cross was to defeat Satan and set us free from his oppressive rule. Everything else that Jesus accomplished was to be understood as an aspect and consequence of this victory (e.g., Recapitulation, Moral Influence, etc.).
This understanding of why Jesus had to die is called the Christus Victor (Latin for “Christ is Victorious”) view of the atonement. But, what exactly was Christ victorious from, and why? To find out the answers to these questions, we have to turn to the Old Testament, as that's what the apostles would often allude to in order to properly teach their audience the message they were trying to convey (Rom. 15:4).
The OT is full of conflict between the Father (YHVH) and false gods, between YHVH and cosmic forces of chaos. The Psalms speak of this conflict between YHVH and water monsters of the deeps (an ancient image for chaos) (Psa. 29:3-4; 74:10-14; 77:16, 19; 89:9-10; 104:2-9, etc).
The liberation of Israel from Egypt wasn’t just a conflict between Pharaoh and Moses. It was really between YHVH and the false gods of Egypt.
Regardless of whether you think the aforementioned descriptions are literal or metaphorical, the reality that the Old Testament describes is that humanity lived in a “cosmic war zone.”
The Christus Victor motif is about Christ reigning victorious over wicked principalities and Satan's kingdom, and is strongly emphasized throughout the New Testament. Scripture declares that Jesus came to drive out "the prince of this world” (John 12:31), to “destroy the works of the devil” (1 John 3:8), to “destroy him that had the power of death, that is, the devil” (Heb. 2:14) and to “put all enemies under his feet” (1 Cor 15:25). Jesus came to overpower the “strong man” (Satan) who held the world in bondage and worked with his Church to plunder his "palace" (Luke 11:21-22). He came to end the reign of the cosmic “thief” who seized the world to “steal, and to kill, and to destroy” the life YHVH intended for us (John 10:10). Jesus came and died on the cross to disarm “the principalities and powers” and make a “shew of them openly [i.e., public spectacle]” by “triumphing over them in [the cross]” (Col. 2:15).
Beyond these explicit statements, there are many other passages that express the Christus Victor motif as well. For example, the first prophecy in the Bible foretells that a descendent of Eve (Jesus) would crush the head of the serpent (Gen. 3:15). The first Christian sermon ever preached proclaimed that Jesus in principle conquered all YHVH's enemies (Acts 2:32-36). And the single most frequently quoted Old Testament passage by New Testament authors is Psalm 110:1 which predicts that Christ would conquer all YHVH’s opponents. (Psalm 110 is quoted or alluded to in Matthew 22:41-45; 26:64, Mark 12:35-37; 14:62, Luke 20:41-44; 22:69, Acts 5:31; 7:55-56, Romans 8:34, 1st Corinthians 15:22-25, Ephesians 1:20, Hebrews 1:3; 1:13; 5:6, 10; 6:20; 7:11, 15, 17, 21; 8:1; 10:12-13, 1st Peter 3:22, and Revelation 3:21.) According to New Testament scholar Oscar Cullman, the frequency with which New Testament authors cite this Psalm is the greatest proof that Christ’s “victory over the angel powers stands at the very center of early Christian thought.”
Because of man's rebellion, the Messiah's coming involved a rescue mission that included a strategy for vanquishing the powers of darkness.
Since YHVH is a God of love who gives genuine “say-so” to both angels and humans, YHVH rarely accomplishes His providential plans through coercion. YHVH relies on His infinite wisdom to achieve His goals. Nowhere is YHVH's wisdom put more on display than in the manner in which He outsmarted Satan and the powers of evil, using their own evil to bring about their defeat.
Most readers probably know the famous story from ancient Greece about the Trojan Horse. To recap the story, Troy and Greece had been locked in a ten-year-long vicious war when, according to Homer and Virgil, the Greeks came up with a brilliant idea. They built an enormous wooden horse, hid soldiers inside and offered it to the Trojans as a gift, claiming they were conceding defeat and going home. The delighted Trojans accepted the gift and proceeded to celebrate by drinking themselves into a drunken stupor. When night came and the Trojan warriors were too wasted to fight, the Greeks exited the horse, unlocked the city gates to quietly let all their compatriots in, and easily conquered the city, thus winning the war.
Historians debate whether any of this actually happened. But either way, as military strategies go, it’s brilliant.
Now, there are five clues in the New Testament that suggest YHVH was using something like this Trojan Horse strategy against the powers when he sent Jesus into the world:
1) The Bible tells us that YHVH's victory over the powers of darkness was achieved by the employment of YHVH’s wisdom, and was centered on that wisdom having become reality in Jesus Christ (Rom. 16:25, 1 Cor. 2:7, Eph. 3:9-10, Col. 1:26). It also tells us that, for some reason, this Christ-centered wisdom was kept “secret and hidden” throughout the ages. It’s clear from this that YHVH's strategy was to outsmart and surprise the powers by sending Jesus.
2) While humans don’t generally know Jesus’ true identity during his ministry, demons do. They recognize Jesus as the Son of God, the Messiah, but, interestingly enough, they have no idea what he’s doing (Mark 1:24; 3:11; 5:7, Luke 8:21). Again, the wisdom of YHVH in sending Jesus was hidden from them.
3) We’re told that, while humans certainly share in the responsibility for the crucifixion, Satan and the powers were working behind the scenes to bring it about (John 13:27 cf. 1 Cor. 2:6-8). These forces of evil helped orchestrate the crucifixion.
4) We’re taught that if the “princes of this world [age]” had understood the secret wisdom of YHVH, “they would not have crucified the Lord of glory” (1 Cor 2:8 cf. vss 6-7). Apparently, Satan and the powers regretted orchestrating Christ’s crucifixion once they learned of the wisdom of YHVH that was behind it.
5) Finally, we can begin to understand why the powers came to regret crucifying “the Lord of glory” when we read that it was by means of the crucifixion that the “handwriting of ordinances that was against us, which was contrary to us [i.e., the charge of our legal indebtedness]” was “[taken] out of the way [i.e., canceled]” as the powers were disarmed. In this way Christ “triumph[ed] over” the powers by "his cross” and even “made a shew of them openly” (Col. 2:14-15). Through Christ’s death and resurrection YHVH's enemies were vanquished and placed under his Messiah's feet, and ultimately His own in the end (1 Cor. 15:23-28).
Putting these five clues together, we can discern YHVH's Trojan Horse strategy in sending Jesus.
The powers couldn’t discern why Jesus came because YHVH's wisdom was hidden from them. YHVH's wisdom was motivated by unfathomable love, and since Satan and the other powers were evil, they lacked the capacity to understand it. Their evil hearts prevented them from suspecting what YHVH was up to.
What the powers did understand was that Jesus was mortal. This meant he was killable. Lacking the capacity to understand that this was the means by which YHVH would ultimately bring about the defeat of death (and thus, pave the road for the resurrection itself), they never suspected that making Jesus vulnerable to their evil might actually be part of YHVH's infinitely wise plan.
And so they took the bait (or "ransom"; Matt. 20:28, Mark 10:45, 1 Tim. 2:5-6). Utilizing Judas and other willing human agents, the powers played right into YHVH’s secret plan and orchestrated the crucifixion of the Messiah (Acts 2:22-23; 4:28). YHVH thus brilliantly used the self-inflicted incapacity of evil to understand love against itself. And, like light dispelling darkness, the unfathomably beautiful act of YHVH's love in sending the willing Messiah as a "ransom" to these blood-thirsty powers defeated them. The whole creation was in principle freed and reconciled to YHVH, while everything written against us humans was nailed to the cross, thus robbing the powers of the only legal claim they had on us. They were “spoiled [i.e., disempowered]” (Col. 2:14-15).
As happened to the Trojans in accepting the gift from the Greeks, in seizing on Christ’s vulnerability and orchestrating his crucifixion, the powers unwittingly cooperated with YHVH to unleash the one power in the world that dispels all evil and sets captives free. It’s the power of self-sacrificial love.

Why Penal Substitution Is Unbiblical

For the sake of keeping this already lengthy post as short as possible I'm not going to spend too much time on why exactly PSA (Penal Substitutionary Atonement) is inconsistent with Scripture, but I'll go ahead and point out the main reasons why I believe this is so, and let the reader look further into this subject by themselves, being that there are many resources out there which have devoted much more time than I ever could here in supporting this premise.
"Purge out therefore the old leaven, that ye may be a new lump, as ye are unleavened. For even Christ our passover is sacrificed for us:"-1 Corinthians 5:7
The Passover is one of the two most prominent images in the New Testament given as a comparison to Christ's atonement and what it accomplished, (the other most common image being the Day of Atonement sacrifice).
In the Passover, the blood of the lamb on the door posts of the Hebrews in the book of Exodus was meant to mark out those who were YHVH's, not be a symbol of PSA, as the lamb itself was not being punished by God in place of the Hebrews, but rather the kingdom of Egypt (and thus, allegorically speaking, the kingdom of darkness which opposed YHVH) was what was being judged and punished, because those who were not "covered" by the blood of the lamb could be easily identified as not part of God's kingdom/covenant and liberated people.
Looking at the Day of Atonement sacrifice (which, again, Christ's death is repeatedly compared to throughout the New Testament), this ritual required a ram, a bull, and two goats (Lev. 16:3-5). The ram was for a burnt offering intended to please God (Lev. 16:3-4). The bull served as a sin offering for Aaron, the high priest, and his family. In this case, the sin offering restored the priest to ritual purity, allowing him to occupy sacred space and be near YHVH’s presence. Two goats taken from "the congregation” were needed for the single sin offering for the people (Lev. 16:5). So why two goats?
The high priest would cast lots over the two goats, with one chosen as a sacrifice “for the Lord” (Lev. 16:8). The blood of that goat would purify the people. The second goat was not sacrificed or designated “for the Lord.” On the contrary, this goat—the one that symbolically carried the sins away from the camp of Israel into the wilderness—was “for Azazel” (Lev. 16:8-10).
What—or who—is Azazel?
The Hebrew term azazel (עזאזל) occurs four times in Leviticus 16 but nowhere else in most people's canon of the Bible, (and I say "most people's canon," because some people do include 1 Enoch in their canon of Scripture, which of course goes into great detail about this "Azazel" figure). Many translations prefer to translate the term as a phrase, “the goat that goes away,” which is the same idea conveyed in the King James Version’s “scapegoat.” Other translations treat the word as a name: Azazel. The “scapegoat” option is possible, but since the phrase “for Azazel” parallels the phrase “for YHVH” (“for the Lord”), the wording suggests that two divine figures are being contrasted by the two goats.
A strong case can be made for translating the term as the name Azazel. Ancient Jewish texts show that Azazel was understood as a demonic figure associated with the wilderness. The Mishnah (ca. AD 200; Yoma 6:6) records that the goat for Azazel was led to a cliff and pushed over, ensuring it would not return with its death. This association of the wilderness with evil is also evident in the New Testament, as this was where Jesus met the devil (Matt. 4:1). Also, in Leviticus 17:1-7 we learn that some Israelites had been accustomed to sacrificing offerings to "devils" (alternatively translated as “goat demons”). The Day of Atonement replaced this illegitimate practice.
The second goat was not sent into the wilderness as a sacrifice to a foreign god or demon. The act of sending the live goat out into the wilderness, which was unholy ground, was to send the sins of the people where they belonged—to the demonic domain. With one goat sacrificed to bring purification and access to YHVH and one goat sent to carry the people’s sins to the demonic domain, this annual ritual reinforced the identity of the true God and His mercy and holiness.
When Jesus died on the cross for all of humanity’s sins, he was crucified outside the city, paralleling the sins of the people being cast to the wilderness via the goat to Azazel. Jesus died once for all sinners, negating the need for this ritual.
As previously stated, the goat which had all the sin put on it was sent alive off to the wilderness, while the blood of the goat which was blameless was used to purify the temple and the people. Penal substitution would necessitate the killing of the goat which had the sin put on it.
Mind you, this is the only sacrificial ritual of any kind in the Torah in which sins are placed on an animal. The only time it happens is this, and that animal is not sacrificed. Most PSA proponents unwittingly point to this ritual as evidence of their view, despite it actually serving as evidence to the contrary, because most people don't read their Old Testament and don't familiarize themselves with the "boring parts" like Leviticus (when it's actually rather important to do so, since that book explains how exactly animal offerings were to be carried out and why they were done in the first place).
In the New Testament, Christ's blood was not only meant to mark out those who were his, but also expel the presence of sin and ritual uncleanness so as to make the presence of YHVH manifest in the believer's life. Notice how God's wrath isn't poured out on Christ in our stead on this view, but rather His wrath was poured out on those who weren't covered, and the presence of sin and evil were merely removed by that which is pure and blameless (Christ's blood) for the believer.
All this is the difference between expiation and propitiation.

The Content of Paul's Gospel Message

When the New Testament writers talked about “the gospel,” they referred not to the Protestant doctrine of justification sola fide–the proposition that if we will stop trying to win God’s favor and only just believe that God has exchanged our sin for Christ’s perfect righteousness, then in God’s eyes we will have the perfect righteousness required both for salvation and for assuaging our guilty consciences–but rather they referred to the simple but explosive proposition Kyrios Christos, “Christ is Lord.” That is to say, the gospel was, properly speaking, the royal announcement that Jesus of Nazareth was the God of Israel’s promised Messiah, the King of kings and Lord of lords.
The New Testament writers were not writing in a cultural or linguistic vacuum and their language of euangelion (good news) and euangelizomai would have been understood by their audience in fairly specific ways. Namely, in the Greco-Roman world for which the New Testament authors wrote, euangelion/euangelizomai language typically had to do with either A) the announcement of the accession of a ruler, or B) the announcement of a victory in battle, and would probably have been understood along those lines.
Let’s take the announcements of a new ruler first. The classic example of such a language is the Priene Calendar Inscription, dating to circa 9 BC, which celebrates the rule (and birthday) of Caesar Augustus as follows:
"It was seeming to the Greeks in Asia, in the opinion of the high priest Apollonius of Menophilus Azanitus: Since Providence, which has ordered all things of our life and is very much interested in our life, has ordered things in sending Augustus, whom she filled with virtue for the benefit of men, sending him as a savior [soter] both for us and for those after us, him who would end war and order all things, and since Caesar by his appearance [epiphanein] surpassed the hopes of all those who received the good tidings [euangelia], not only those who were benefactors before him, but even the hope among those who will be left afterward, and the birthday of the god [he genethlios tou theou] was for the world the beginning of the good tidings [euangelion] through him; and Asia resolved it in Smyrna."
The association of the term euangelion with the announcement of Augustus’ rule is clear enough and is typical of how this language is used elsewhere. To give another example, Josephus records that at the news of the accession of the new emperor Vespasian (69 AD) “every city kept festival for the good news (euangelia) and offered sacrifices on his behalf.” (The Jewish War, IV.618). Finally, a papyrus dating to ca. 498 AD begins:
"Since I have become aware of the good news (euangeliou) about the proclamation as Caesar (of Gaius Julius Verus Maximus Augustus)…"
This usage occurs also in the Septuagint, the Greek translations of the Jewish Scriptures. For instance LXX Isaiah 52:7 reads, “How beautiful upon the mountains are the feet of him who brings good news (euangelizomenou), who publishes peace, who brings good news (euangelizomenos) of salvation, who says to Zion, ‘Your God reigns.'" Similarly, LXX Isaiah 40:9-10 reads:
"…Go up on a high mountain, you who bring good tidings (ho euangelizomenos) to Sion; lift up your voice with strength, you who bring good tidings (ho euangelizomenos); lift it up, do not fear; say to the cities of Ioudas, “See your God!” Behold, the Lord comes with strength, and his arm with authority (kyrieias)…."-NETS, Esaias 40:9-10
This consistent close connection between euangelion/euangelizomai language and announcements of rule strongly suggests that many of the initial hearers/readers of the early Christians’ evangelical language would likely have understood that language as the announcement of a new ruler (see, e.g., Acts 17:7), and, unless there is strong NT evidence to the contrary, we should presume that the NT writers probably intended their language to be so understood.
However, the other main way in which euangelion/euangelizomai language was used in the Greco-Roman world was with reference to battle reports, announcements of victory in war. A classic example of this sort of usage can be found in LXX 2 Samuel 18:19ff, where David receives word that his traitorous son, Absalom, has been defeated in battle. Euangelion/euangelizomai is used throughout the passage for the communications from the front.
As already shown throughout this post, the NT speaks of Jesus’s death and resurrection as a great victory over the powers that existed at that time and, most importantly, over death itself. Jesus’ conquest of the principalities and powers was the establishment of his rule and comprehensive authority over heaven and earth, that is, of his Lordship over all things (again, at that time).
This was the content of Paul's gospel message...

Justification, and the "New" Perspective on Paul

The following quotation is from The Gospel Coalition, and I believe it to be a decently accurate summary of the NPP (New Perspective on Paul), despite it being from a source which is in opposition to it:
The New Perspective on Paul, a major scholarly shift that began in the 1980s, argues that the Jewish context of the New Testament has been wrongly understood and that this misunderstand[ing] has led to errors in the traditional-Protestant understanding of justification. According to the New Perspective, the Jewish systems of salvation were not based on works-righteousness but rather on covenantal nomism, the belief that one enters the people of God by grace and stays in through obedience to the covenant. This means that Paul could not have been referring to works-righteousness by his phrase “works of the law”; instead, he was referring to Jewish boundary markers that made clear who was or was not within the people of God. For the New Perspective, this is the issue that Paul opposes in the NT. Thus, justification takes on two aspects for the New Perspective rather than one; initial justification is by faith (grace) and recognizes covenant status (ecclesiology), while final justification is partially by works, albeit works produced by the Spirit.
I believe what's called the "new perspective" is actually rather old, and that the Reformers' view of Paul is what is truly new, being that the Lutheran understanding of Paul is simply not Biblical.
The Reformation perspective understands Paul to be arguing against a legalistic Jewish culture that seeks to earn their salvation through works. However, supporters of the NPP argue that Paul has been misread. We contend he was actually combating Jews who were boasting because they were God's people, the "elect" or the "chosen ones." Their "works," so to speak, were done to show they were God's covenant people and not to earn their salvation.
The key questions involve Paul’s view(s) of the law and the meaning of the controversy in which Paul was engaged. Paul strongly argued that we are “justified by the faith of Christ, and not by the works of the law” (Gal. 2:16b). Since the time of Martin Luther, this has been understood as an indictment of legalistic efforts to merit favor before God. Judaism was cast in the role of the medieval "church," and so Paul’s protests became very Lutheran, with traditional-Protestant theology reinforced in all its particulars (along with its limitations) as a result. In hermeneutical terms, then, the historical context of Paul’s debate will answer the questions we have about what exactly the apostle meant by the phrase "works of the law," along with other phrases often used as support by the Reformers for their doctrine of Sola Fide (justification by faith alone), like when Paul mentions "the righteousness of God."
Obviously an in-depth analysis of the Pauline corpus and its place in the context of first-century Judaism would take us far beyond the scope of this brief post. We can, however, quickly survey the topography of Paul’s thought in context, particularly as it has emerged through the efforts of recent scholarship, and note some salient points which may be used as the basis of a refurbished soteriology.
[Note: The more popular scholars associated with the NPP are E.P. Sanders, James Dunn, and N.T. Wright. Dunn was the first to coin the term "The New Perspective" in a 1983 Manson Memorial Lecture, The New Perspective on Paul and the Law.]
Varying authors since the early 1900's have brought up the charge that Paul was misread by those in the tradition of Martin Luther and other Protestant Reformers. Yet, it wasn't until E.P. Sanders' 1977 book, Paul and Palestinian Judaism, that scholars began to pay much attention to the issue. In his book, Sanders argues that the Judaism of Paul's day has been wrongly criticized as a religion of "works-salvation" by those in the Protestant tradition.
A fundamental premise in the NPP is that Judaism was actually a religion of grace. Sander's puts it clearly:
"On the point at which many have found the decisive contrast between Paul and Judaism - grace and works - Paul is in agreement with Palestinian Judaism... Salvation is by grace but judgment is according to works'...God saves by grace, but... within the framework established by grace he rewards good deeds and punishes transgression." (Paul and Palestinian Judaism, p. 543)
N.T. Wright adds that, "we have misjudged early Judaism, especially Pharisaism, if we have thought of it as an early version of Pelagianism," (Wright, What Saint Paul Really Said, p. 32).
Sanders has coined a now well-known phrase to describe the character of first-century Palestinian Judaism: “covenantal nomism.” The meaning of “covenantal nomism” is that human obedience is not construed as the means of entering into God’s covenant. That cannot be earned; inclusion within the covenant body is by the grace of God. Rather, obedience is the means of maintaining one’s status within the covenant. And with its emphasis on divine grace and forgiveness, Judaism was never a religion of legalism.
If covenantal nomism was operating as the primary category under which Jews understood the Law, then when Jews spoke of obeying commandments, or when they required strict obedience of themselves and fellow Jews, it was because they were "keeping the covenant," rather than out of legalism.
More recently, N.T. Wright has made a significant contribution in his little book, What Saint Paul Really Said. Wright’s focus is the gospel and the doctrine of justification. With incisive clarity he demonstrates that the core of Paul’s gospel was not justification by faith, but the death and resurrection of Christ and his exaltation as Lord. The proclamation of the gospel was the proclamation of Jesus as Lord, the Messiah who fulfilled Israel’s expectations. Romans 1:3-4, not 1:16-17, is the gospel, contrary to traditional thinking. Justification is not the center of Paul’s thought, but an outworking of it:
"[T]he doctrine of justification by faith is not what Paul means by ‘the gospel’. It is implied by the gospel; when the gospel is proclaimed, people come to faith and so are regarded by God as members of his people. But ‘the gospel’ is not an account of how people get saved. It is, as we saw in an earlier chapter, the proclamation of the lordship of Jesus Christ….Let us be quite clear. ‘The gospel’ is the announcement of Jesus’ lordship, which works with power to bring people into the family of Abraham, now redefined around Jesus Christ and characterized solely by faith in him. ‘Justification’ is the doctrine which insists that all those who have this faith belong as full members of this family, on this basis and no other." (pp. 132, 133)
Wright brings us to this point by showing what “justification” would have meant in Paul’s Jewish context, bound up as it was in law-court terminology, eschatology, and God’s faithfulness to God’s covenant.
Specifically, Wright explodes the myth that the pre-Christian Saul was a pious, proto-Pelagian moralist seeking to earn his individual passage into heaven. Wright capitalizes on Paul’s autobiographical confessions to paint rather a picture of a zealous Jewish nationalist whose driving concern was to cleanse Israel of Gentiles as well as Jews who had lax attitudes toward the Torah. Running the risk of anachronism, Wright points to a contemporary version of the pre-Christian Saul: Yigal Amir, the zealous Torah-loyal Jew who assassinated Prime Minister Yitzhak Rabin for exchanging Israel’s land for peace. Wright writes:
"Jews like Saul of Tarsus were not interested in an abstract, ahistorical system of salvation... They were interested in the salvation which, they believed, the one true God had promised to his people Israel." (pp. 32, 33)
Wright maintains that as a Christian, Paul continued to challenge paganism by taking the moral high ground of the creational monotheist. The doctrine of justification was not what Paul preached to the Gentiles as the main thrust of his gospel message; it was rather “the thing his converts most needed to know in order to be assured that they really were part of God’s people” after they had responded to the gospel message.
Even while taking the gospel to the Gentiles, however, Paul continued to criticize Judaism “from within” even as he had as a zealous Pharisee. But whereas his mission before was to root out those with lax attitudes toward the Torah, now his mission was to demonstrate that God’s covenant faithfulness (righteousness) has already been revealed in Jesus Christ.
At this point Wright carefully documents Paul’s use of the controversial phrase “God’s righteousness” and draws out the implications of his meaning against the background of a Jewish concept of justification. The righteousness of God and the righteousness of the party who is “justified” cannot be confused because the term bears different connotations for the judge than for the plaintiff or defendant. The judge is “righteous” if his or her judgment is fair and impartial; the plaintiff or defendant is “righteous” if the judge rules in his or her favor. Hence:
"If we use the language of the law court, it makes no sense whatsoever to say that the judge imputes, imparts, bequeaths, conveys or otherwise transfers his righteousness to either the plaintiff or the defendant. Righteousness is not an object, a substance or a gas which can be passed across the courtroom. For the judge to be righteous does not mean that the court has found in his favor. For the plaintiff or defendant to be righteous does not mean that he or she has tried the case properly or impartially. To imagine the defendant somehow receiving the judge’s righteousness is simply a category mistake. That is not how the language works." (p. 98)
However, Wright makes the important observation that even with the forensic metaphor, Paul’s theology is not so much about the courtroom as it is about God’s love.
Righteousness is not an impersonal, abstract standard, a measuring-stick or a balancing scale. That was, and still is, a Greek view. Righteousness, Biblically speaking, grows out of covenant relationship. We forgive because we have been forgiven (Matt. 18:21-35); “we love" because God “first loved us” (1 John 4:19). Love is the fulfillment of the law (Rom. 13:8, 10, Gal 5:14, Jam. 2:8). Paul even looked forward to a day when “we must all appear before the judgment seat of Christ; that every one may receive the things done in his body, according to that he hath done, whether it be good or bad” (2 Cor. 5:10), and he acknowledged that his clear conscience did not necessarily ensure this verdict (1 Cor. 4:4), but he was confident nevertheless. Paul did in fact testify of his clear conscience: “For our rejoicing is this, the testimony of our conscience, that in simplicity and godly sincerity, not with fleshly wisdom, but by the grace of God, we have had our conversation [i.e., behavior] in the world, and more abundantly to you-ward” (2 Cor. 1:12). He was aware that he had not yet “attained” (Phil. 3:12-14), that he still struggled with the flesh, yet he was confident of the value of his performance (1 Cor. 9:27). These are hardly the convictions of someone who intends to rest entirely on the merits of an alien righteousness imputed to his or her account.
Wright went on to flesh out the doctrine of justification in Galatians, Philippians, and Romans. The “works of the law” are not proto-Pelagian efforts to earn salvation, but rather “sabbath [keeping], food-laws, circumcision” (p. 132). Considering the controversy in Galatia, Wright writes:
"Despite a long tradition to the contrary, the problem Paul addresses in Galatians is not the question of how precisely someone becomes a Christian, or attains to a relationship with God….The problem he addresses is: should his ex-pagan converts be circumcised or not? Now this question is by no means obviously to do with the questions faced by Augustine and Pelagius, or by Luther and Erasmus. On anyone’s reading, but especially within its first-century context, it has to do quite obviously with the question of how you define the people of God: are they to be defined by the badges of Jewish race, or in some other way? Circumcision is not a ‘moral’ issue; it does not have to do with moral effort, or earning salvation by good deeds. Nor can we simply treat it as a religious ritual, then designate all religious ritual as crypto-Pelagian good works, and so smuggle Pelagius into Galatia as the arch-opponent after all. First-century thought, both Jewish and Christian, simply doesn’t work like that…. [T]he polemic against the Torah in Galatians simply will not work if we ‘translate’ it into polemic either against straightforward self-help moralism or against the more subtle snare of ‘legalism’, as some have suggested. The passages about the law only work — and by ‘work’ I mean they will only make full sense in their contexts, which is what counts in the last analysis — when we take them as references to the Jewish law, the Torah, seen as the national charter of the Jewish race." (pp. 120-122)
The debate about justification, then, “wasn’t so much about soteriology as about ecclesiology; not so much about salvation as about the church.” (p. 119)
To summarize the theology of Paul in his epistles, the apostle mainly spent time arguing to those whom he were sending letters that salvation in Christ was available to all men without distinction. Jews and Gentiles alike may accept the free gift; it was not limited to any one group. Paul was vehement about this, especially in his letter to the Romans. As such, I will finish this post off by summarizing the letter itself, so as to provide Biblical support for the premises of the NPP and for what the scholars I referenced have thus far argued.
After his introduction in the epistle to an already believing and mostly Gentile audience (who would've already been familiar with the gospel proclaimed in verses 3-4), Paul makes a thematic statement in 1:16: “For I am not ashamed of the gospel of Christ: for it is the power of God unto salvation to every one that believeth; to the Jew first, and also to the Greek.” This statement is just one of many key statements littered throughout the book of Romans that give us proper understanding of the point Paul wished to make to the interlocutors of his day, namely, salvation is available to all, whether Jew or Gentile.
In 1:16 Paul sets out a basic theme of his message in the letter to the Romans. All who believed, whether they be Jew or Gentile, were saved by the power of the gospel. The universal nature of salvation was explicitly stated. The gospel saved all without distinction, whether Jew or Greek; salvation was through the gospel of Jesus Christ. Immediately after this thematic declaration, Paul undertakes to show the universal nature of sin and guilt. In 1:18-32 Paul shows how the Gentile is guilty before God. Despite evidence of God and his attributes, which is readily available to all, they have failed to honor YHVH as God and have exchanged His glory for idolatrous worship and self-promotion. As a consequence, God handed them over in judgment (1:18-32). Paul moves to denunciation of those who would judge others while themselves being guilty of the very same offenses (2:1-5) and argues that all will be judged according to their deeds (2:6). This judgment applies to all, namely, Jew and Greek (2:9-10). This section serves as somewhat of a transition in Paul’s argument. He has highlighted the guilt of the Gentiles (1:18ff) and will shortly outline the guilt of the Jew (2:17-24). The universal statement of 2:1-11 sets the stage for Paul’s rebuke of Jewish presumption. It was not possession of the Law which delivered; it was faithful obedience. It is better to have no Law and yet to obey the essence of the Law (2:12-16) than to have the Law and not obey (2:17-3:4). Paul then defends the justice of God’s judgment (3:5-8), which leads to the conclusion that all (Jew and Gentile) are guilty before God (3:9).
Paul argues that it was a mistaken notion to think that salvation was the prerogative of the Jew only. This presumption is wrong for two reasons. First, it leads to the mistaken assumption that only Jews were eligible for this vindication (Paul deals with this misunderstanding in chapter 4 where he demonstrates that Abraham was justified by faith independently of the Law and is therefore the father of all who believe, Jew and Gentile alike). Second, it leads to the equally mistaken conclusion that all who were Jews are guaranteed of vindication. Paul demonstrates how this perspective, which would call God’s integrity into question since Paul was assuming many Jews would not experience this vindication, was misguided. He did this by demonstrating that it was never the case that all physical descendants of Israel (Jacob) were likewise recipients of the promise. In the past (9:6-33) as in the present (at that time; 11:1-10), only a remnant was preserved and only a remnant would experience vindication. Paul also argued that the unbelief of national Israel (the non-remnant) had the purpose of extending the compass of salvation. The unbelief of one group made the universal scope of the gospel possible. This universalism was itself intended to bring about the vindication of the unbelieving group (11:11-16). As a result of faith, all (Jew and Gentile) could be branches of the olive tree (11:17-24). Since faith in Christ was necessary to remain grafted into the tree, no one could boast of his position. All, Jew and Gentile alike, were dependent upon the mercy and grace of God. As a result of God’s mysterious plan, He would bring about the vindication of His people (11:25-27). [Note: It is this author's belief that this vindication occurred around 66-70 AD, with the Parousia of Christ's Church; this author is Full-Preterist in their Eschatology.]
submitted by The_Way358 to u/The_Way358 [link] [comments]


2024.05.21 10:48 pepitorious Container backups to PBS work but VM don't.

Hi there fam!
I have a two nodes cluster that so far is working fine. I added to the mix a Proxmox backup server (PBS) as a VM in my unraid box. I passed a share of unraid to the PBS VM.
I mounted the share in PBS with this line in /etc/fstab
backups_proxmox /mnt/backups_proxmox 9p trans=virtio,version=9p2000.L,_netdev,rw 0 0
Now I configured the PBS in the cluster and I am backing up lxc containers just fine. I can restore them and everything. So far so good.
When it comes to backing up VMs I am getting this errors:
From the node that is trying to backup the VM:
INFO: starting new backup job: vzdump 100 --remove 0 --node gaspar --storage eva01-pbs --mode snapshot --notes-template '{{guestname}}' --notification-mode auto INFO: Starting Backup of VM 100 (qemu) INFO: Backup started at 2024-05-21 09:51:43 INFO: status = running INFO: VM Name: teedybkp INFO: include disk 'scsi0' 'local:100/vm-100-disk-0.qcow2' 64G INFO: backup mode: snapshot INFO: ionice priority: 7 INFO: creating Proxmox Backup Server archive 'vm/100/2024-05-21T07:51:43Z' ERROR: VM 100 qmp command 'backup' failed - backup register image failed: command error: EINVAL: Invalid argument INFO: aborting backup job INFO: resuming VM again ERROR: Backup of VM 100 failed - VM 100 qmp command 'backup' failed - backup register image failed: command error: EINVAL: Invalid argument INFO: Failed at 2024-05-21 09:51:43 INFO: Backup job finished with errors ERROR: could not notify via target `mail-to-root`: could not notify via endpoint(s): mail-to-root: At least one recipient has to be specified! TASK ERROR: job errors INFO: starting new backup job: vzdump 100 --remove 0 --node gaspar --storage eva01-pbs --mode snapshot --notes-template '{{guestname}}' --notification-mode auto INFO: Starting Backup of VM 100 (qemu) INFO: Backup started at 2024-05-21 09:51:43 INFO: status = running INFO: VM Name: teedybkp INFO: include disk 'scsi0' 'local:100/vm-100-disk-0.qcow2' 64G INFO: backup mode: snapshot INFO: ionice priority: 7 INFO: creating Proxmox Backup Server archive 'vm/100/2024-05-21T07:51:43Z' ERROR: VM 100 qmp command 'backup' failed - backup register image failed: command error: EINVAL: Invalid argument INFO: aborting backup job INFO: resuming VM again ERROR: Backup of VM 100 failed - VM 100 qmp command 'backup' failed - backup register image failed: command error: EINVAL: Invalid argument INFO: Failed at 2024-05-21 09:51:43 INFO: Backup job finished with errors ERROR: could not notify via target `mail-to-root`: could not notify via endpoint(s): mail-to-root: At least one recipient has to be specified! TASK ERROR: job errors
And from the PBS I get this errors:
May 21 09:51:43 pbs proxmox-backup-proxy[650]: starting new backup on datastore 'backups' from ::ffff:192.168.0.111: "vm/100/2024-05-21T07:51:43Z" May 21 09:51:43 pbs proxmox-backup-proxy[650]: GET /previous: 400 Bad Request: no valid previous backup May 21 09:51:43 pbs proxmox-backup-proxy[650]: POST /fixed_index: 400 Bad Request: EINVAL: Invalid argument May 21 09:51:43 pbs proxmox-backup-proxy[650]: backup ended and finish failed: backup ended but finished flag is not set. May 21 09:51:43 pbs proxmox-backup-proxy[650]: removing unfinished backup May 21 09:51:43 pbs proxmox-backup-proxy[650]: removing backup snapshot "/mnt/backups_proxmox/pbs/vm/100/2024-05-21T07:51:43Z" May 21 09:51:43 pbs proxmox-backup-proxy[650]: TASK ERROR: backup ended but finished flag is not set. May 21 09:51:43 pbs proxmox-backup-proxy[650]: starting new backup on datastore 'backups' from ::ffff:192.168.0.111: "vm/100/2024-05-21T07:51:43Z" May 21 09:51:43 pbs proxmox-backup-proxy[650]: GET /previous: 400 Bad Request: no valid previous backup May 21 09:51:43 pbs proxmox-backup-proxy[650]: POST /fixed_index: 400 Bad Request: EINVAL: Invalid argument May 21 09:51:43 pbs proxmox-backup-proxy[650]: backup ended and finish failed: backup ended but finished flag is not set. May 21 09:51:43 pbs proxmox-backup-proxy[650]: removing unfinished backup May 21 09:51:43 pbs proxmox-backup-proxy[650]: removing backup snapshot "/mnt/backups_proxmox/pbs/vm/100/2024-05-21T07:51:43Z" May 21 09:51:43 pbs proxmox-backup-proxy[650]: TASK ERROR: backup ended but finished flag is not set.
Any idea that would point me in the right direction would be greatly appreciated.
submitted by pepitorious to Proxmox [link] [comments]


2024.05.21 09:34 vimalpreethi Revolutionizing Joint Health: Robotic Knee Replacement Surgery in Chennai

Revolutionizing Joint Health: Robotic Knee Replacement Surgery in Chennai
In the ever-evolving field of medical technology, robotic knee replacement surgery in Chennai stands out as a groundbreaking advancement, offering patients enhanced precision and faster recovery times. Chennai, a hub of medical excellence, is at the forefront of this innovative approach, attracting patients seeking top-tier orthopedic care. Among the notable names in this domain is Preethi Hospitals, Madurai, known for its exceptional healthcare services and commitment to patient well-being.

The Evolution of Knee Replacement Surgery

Traditional knee replacement surgery has been a standard procedure for decades, providing relief to countless individuals suffering from severe knee pain and mobility issues. However, the conventional method, while effective, comes with limitations in terms of precision and customization. This is where robotic-assisted surgery comes into play, marking a significant leap forward in orthopedic treatment.

What is Robotic Knee Replacement Surgery?

Robotic knee replacement surgery leverages advanced robotic systems to assist surgeons in performing highly precise and minimally invasive knee replacements. The procedure begins with a comprehensive preoperative planning phase, where detailed 3D models of the patient’s knee are created using imaging technology. These models allow surgeons to plan the surgery with unprecedented accuracy, tailoring the procedure to the patient’s unique anatomy.
During the operation, the robotic system provides real-time feedback and assists the surgeon in making precise cuts and implant placements. This level of accuracy reduces the risk of human error, enhances the alignment of the knee components, and ensures optimal joint function.

Benefits of Robotic Knee Replacement Surgery

Enhanced Precision: The robotic system’s ability to provide real-time data and feedback enables surgeons to perform the procedure with a higher degree of accuracy, leading to better alignment and positioning of the knee implant.
Minimally Invasive: Robotic-assisted surgery typically involves smaller incisions, which can reduce trauma to the surrounding tissues. This minimally invasive approach results in less postoperative pain and quicker recovery times.
Customized Treatment: The preoperative planning phase allows for a personalized surgical plan tailored to the patient’s specific knee anatomy. This customization can result in a more natural-feeling knee post-surgery.
Reduced Risk of Complications: The precision of robotic systems minimizes the likelihood of errors during surgery, potentially reducing the risk of complications and improving overall surgical outcomes.
Faster Recovery: Patients often experience shorter hospital stays and quicker rehabilitation periods due to the minimally invasive nature of the procedure.

Preethi Hospitals, Madurai: Pioneers in Advanced Orthopedic Care

While Chennai is a leading destination for robotic knee replacement surgery, Preethi Hospitals in Madurai has also garnered a reputation for excellence in orthopedic care. The hospital is equipped with state-of-the-art facilities and a dedicated team of professionals committed to providing comprehensive and compassionate care.
Preethi Hospitals has embraced the latest advancements in medical technology, including robotic-assisted knee replacement surgery. Their commitment to staying at the forefront of medical innovation ensures that patients receive the highest quality of care available.

Preparing for Robotic Knee Replacement Surgery

Before undergoing robotic knee replacement surgery, patients can expect a thorough evaluation process. This includes a series of preoperative tests to assess the overall health and suitability for surgery. The healthcare team at Preethi Hospitals, Madurai, provides detailed guidance on preparing for the procedure, covering aspects such as medication management, physical conditioning, and dietary recommendations.
Patients are encouraged to discuss their concerns and expectations with the medical team, ensuring they are well-informed and comfortable with the upcoming surgery. The hospital's patient-centric approach prioritizes clear communication and comprehensive preoperative education.

Postoperative Care and Rehabilitation

The success of robotic knee replacement surgery also heavily depends on postoperative care and rehabilitation. At Preethi Hospitals, patients receive individualized rehabilitation plans designed to facilitate a smooth and speedy recovery. Physical therapy plays a crucial role in restoring mobility, strength, and function to the operated knee.
Patients are closely monitored throughout the recovery process, with regular follow-up appointments to track progress and address any concerns. The dedicated rehabilitation team at Preethi Hospitals works collaboratively with patients, offering support and encouragement every step of the way.

Conclusion

Robotic knee replacement surgery in Chennai represents a significant advancement in orthopedic care, offering patients in Chennai and beyond a path to improved joint health and quality of life. With institutions like Preethi Hospitals in Madurai leading the way in adopting this innovative technology, patients can expect exceptional outcomes and a brighter, pain-free future. Whether you are in Chennai or Madurai, exploring robotic knee replacement surgery could be the key to reclaiming your mobility and living life to the fullest.
Robotic Knee Replacement
submitted by vimalpreethi to u/vimalpreethi [link] [comments]


2024.05.21 08:49 ayonc46 How Do You Develop a Custom WordPress Website?

To develop a custom WordPress website, plan your site structure and design. Next, install WordPress on your hosting server and choose a suitable theme or create a custom one. Customize the design and functionality using HTML, CSS, and PHP coding as needed. Add content, including pages, posts, and media, to populate your site. Finally, test your site thoroughly across different browsers and devices to ensure it functions correctly before launching it to the public.
What are the initial steps to create a personalized WordPress site?
  1. Define your goals and objectives for the website.
  2. Choose a suitable domain name for your WordPress site.
  3. Select a reliable web hosting provider that meets your needs.
  4. Install WordPress on your hosting server.
  5. Choose a theme that aligns with your brand and design preferences.
  6. Customize the theme settings and appearance to match your desired look and feel.
  7. Create essential pages such as Home, About, Contact, and Services.
  8. Install and configure necessary plugins for added functionality.
  9. Set up user roles and permissions as per your requirements.
  10. Develop a content strategy and plan for creating and organizing your website content.

Step-by-Step Guideline Develop a Custom WordPress Website

Step 1: Choose a Domain Name and Hosting
Your domain name is your website's address on the internet, like www.yoursite.com. Choose a domain name that's easy to remember, relevant to your brand, and not too long. Next, you'll need hosting, which is like renting space on the internet to store your website files. Look for a hosting provider that offers reliable service, good customer support, and enough storage and bandwidth for your needs.
Step 2: Install WordPress
WordPress is a popular platform for building websites because it's easy to use and highly customizable. Many hosting providers offer a one-click WordPress installation, which makes getting started a breeze. Simply log in to your hosting account, find the WordPress installer, and follow the prompts to set up your site. Once WordPress is installed, you can log in to your site's dashboard and start customizing it to your liking.
Step 3: Select a Theme
A WordPress theme determines the overall look and layout of your website. There are thousands of free and premium themes available, so take your time to find one that fits your style and the goals of your site. Look for a theme that's responsive (meaning it looks good on all devices), easy to customize, and well-supported by its developers. Once you've chosen a theme, you can install it on your WordPress site with just a few clicks.
Step 4: Customize Your Theme
Once you've installed your theme, it's time to customize it to make it your own. Most WordPress themes come with built-in customization options that allow you to change things like colors, fonts, and layouts without needing to know any code. Use the theme customizer in your WordPress dashboard to tweak your site's appearance until it looks just the way you want it to. Don't be afraid to experiment until you find the perfect look for your website.
Step 5: Add Content
With your theme customized, it's time to start adding content to your website. Create pages for important information like your Home page, About page, Services page, and Contact page. Use the WordPress editor to add text, images, videos, and other media to your pages. Write clear, engaging copy that tells visitors what your website is about and encourages them to explore further. Remember to proofread your content carefully before publishing to ensure it's free of errors.
Step 6: Install Plugins
WordPress plugins are like apps that add extra features and functionality to your website. There are thousands of plugins available for everything from contact forms to social media integration to search engine optimization. Think about the goals of your website and choose plugins that will help you achieve them. Be selective about the plugins you install, as too many can slow down your site and cause conflicts. Install and activate your chosen plugins from the WordPress plugin directory, then configure them to suit your needs.
Step 7: Optimize for SEO
Search engine optimization (SEO) is the process of improving your website's visibility in search engine results. A well-optimized website is more likely to rank higher in search results, driving more traffic to your site. Install an SEO plugin like Yoast SEO or All in One SEO Pack to help you optimize your content for relevant keywords, add meta tags and descriptions, and improve your site's overall SEO performance. Take the time to research keywords relevant to your niche and incorporate them naturally into your content for the best results.
Step 8: Test and Launch
Before you launch your website, it's important to test it thoroughly to ensure everything is working correctly. Check your site on different devices and browsers to make sure it looks good and functions properly. Test all links, forms, and interactive elements to make sure they work as expected. Once you're confident that everything is working as it should, it's time to launch your website and share it with the world. Celebrate your hard work and take pride in your new custom WordPress website!
Step 9: Maintain and Update
Building a website is just the beginning – maintaining it is an ongoing process. Regularly update your content to keep it fresh and relevant, and update your plugins and themes to ensure your site stays secure and performs well. Monitor your site's performance using tools like Google Analytics, and make adjustments as needed to improve usability and user experience. Listen to feedback from your visitors and make changes accordingly to keep your website running smoothly and meeting the needs of your audience.
What do you consider to select hosting and a domain name for your WordPress site?
Firstly, you'll want to choose a hosting provider that offers good speed and reliability. Look for one that has a solid reputation and good customer support in case you run into any issues. Consider your budget too, as hosting costs can vary.
As for the domain name, it's important to choose something that's easy to remember and relevant to your site's content. Avoid using complicated or obscure words that might be hard for people to spell or remember. It's also a good idea to check if your desired domain name is available on social media platforms to maintain consistency across your online presence. Lastly, think about whether you want to use a .com, .net, or other domain extension, keeping in mind what best suits your site's purpose and audience.
How do you evaluate and choose a theme that suits your brand and design preferences?
Firstly, consider your brand identity and the message you want to convey to your audience. Look for a theme that aligns with the style, colors, and overall feel of your brand.
Next, think about the functionality you need. Do you want a theme that's highly customizable or one that's more straightforward? Consider features like layout options, customization options, and compatibility with plugins you might want to use.
It's also important to check the responsiveness of the theme. Make sure it looks good and functions well on various devices, including smartphones and tablets.
Lastly, take some time to browse through different themes and read reviews from other users. This can give you a better idea of what to expect and help you make an informed decision that suits your brand and design preferences.
What essential pages should you create first?
How do you decide which plugins to install?
  1. Identify Needs: Determine the specific functionality you require for your site.
  2. Research: Look for plugins that offer the features you need.
  3. Ratings and Reviews: Check plugin ratings and read user reviews to gauge reliability and performance.
  4. Compatibility: Ensure the plugin is compatible with your WordPress version and other installed plugins.
  5. Active Installations: Choose plugins with a high number of active installations for reliability and community support.
Example:
How do you integrate custom features and functionalities into your WordPress site?
Integrating custom features and functionalities into your WordPress site involves adding extra capabilities beyond what comes with the standard installation. One way to do this is by using plugins. These are like apps for your website, and they can add all sorts of new features, from contact forms to e-commerce shops.
For example, let's say you want to add a feature for visitors to book appointments on your site. You could search for a booking plugin like "Bookly" or "Appointment Booking Calendar." After installing and activating the plugin, you'd typically set it up by following the provided instructions, which might involve configuring settings, creating booking forms, and placing them on your site where you want them to appear.
Another way to integrate custom features is by adding code directly to your site. This could involve writing your own custom functions or modifying existing ones. For instance, if you wanted to add a custom sidebar widget displaying your latest Instagram photos, you might need to write some PHP code to fetch the photos from Instagram's API and display them on your site.
In summary, integrating custom features and functionalities into your WordPress site can be done through plugins or by adding custom code, allowing you to tailor your site to your specific needs and preferences.
How do you manage user roles and permissions?
RoleCapabilitiesHow to Manage AdministratorCan do everything, including managing other users, installing plugins, and changing themes.Go to Users > All Users in the dashboard, find the user, and change their role to Administrator. EditorCan publish and manage posts, including those of other users.Go to Users > Add New, fill in user details, and assign the role of Editor. AuthorCan publish and manage their own posts only.In Users > All Users, select a user and change their role to Author. ContributorCan write and manage their own posts but cannot publish them.Add or edit a user and assign the role of Contributor. SubscriberCan only manage their own profile and read content.Change the user role to Subscriber in the Users section.
What security measures should you implement to protect your custom WordPress website?
To protect your custom WordPress website, you need to implement several security measures. Here are some specific steps:
  1. Install a Security Plugin: Use plugins like Wordfence or Sucuri. They offer features like malware scanning and firewall protection.
  2. Use Strong Passwords: Make sure all users have strong, unique passwords. A good password includes letters, numbers, and symbols.
  3. Enable Two-Factor Authentication (2FA): This adds an extra layer of security. Users will need to enter a code from their phone in addition to their password.
  4. Keep WordPress Updated: Always update WordPress to the latest version. Updates fix security vulnerabilities.
  5. Limit Login Attempts: Use a plugin like Limit Login Attempts Reloaded to prevent brute-force attacks.
  6. Change the Default "admin" Username: Don’t use "admin" as your username. Choose something unique to make it harder for hackers to guess.
  7. Use HTTPS: Get an SSL certificate to encrypt data between your website and visitors. Most hosting providers offer this for free.
  8. Backup Your Site Regularly: Use plugins like UpdraftPlus to create regular backups. If your site gets hacked, you can restore it.
How do you ensure responsiveness and mobile-friendliness in a custom WordPress site?
To ensure your custom WordPress site is responsive and mobile-friendly, follow these steps:
  1. Pick a Responsive Theme: Start with a theme known for being responsive, such as Astra or GeneratePress.
  2. Use a Mobile-Friendly Plugin: Install plugins like WP Touch, which help make your site mobile-friendly.
  3. Apply Media Queries: Add CSS media queries to adjust your layout for different screen sizes. For example:
(Css code)@media (max-width: 768px) {
.sidebar { display: none; }
.content { width: 100%; }
}
  1. Flexible Images and Videos: Ensure images and videos resize properly with:
(Css code)img, video { max-width: 100%; height: auto; }
  1. Mobile Menu: Use a plugin like Responsive Menu to create a user-friendly mobile menu.
  2. Optimize for Speed: Compress images using a plugin like Smush and enable caching with a plugin like W3 Total Cache.
  3. Testing: Regularly test your site on different devices and browsers. Tools like Google’s Mobile-Friendly Test and BrowserStack can help.
How do you troubleshoot and debug issues that arise during the development of a custom WordPress site?
Troubleshooting and debugging issues during the development of a custom WordPress site involves several steps. Here are some real-world challenges and specific issues you might encounter:
  1. White Screen of Death (WSOD): This issue often occurs due to PHP errors, plugin conflicts, or exhausted memory limits. Solution: Enable WordPress debugging by adding define('WP_DEBUG', true); to your wp-config.php file to display error messages. Check the error log for specific issues.
  2. Plugin Conflicts: Plugins can conflict with each other or with the theme, causing functionality problems.Solution: Deactivate all plugins and reactivate them one by one to identify the conflicting plugin. Check for updates or consider alternative plugins.
  3. Theme Issues: Custom themes might have coding errors or compatibility issues with WordPress updates. Solution: Use a child theme for customizations to avoid losing changes during updates. Validate your theme code using tools like Theme Check.
  4. Database Errors: Corrupt or misconfigured databases can lead to errors or data loss. Solution: Use phpMyAdmin to check and repair database tables. Ensure regular backups are in place to restore data if needed.
  5. Broken Links and 404 Errors: Incorrect URLs or deleted pages can lead to 404 errors, affecting user experience and SEO. Solution: Use a plugin like Redirection to manage and fix broken links. Regularly check for 404 errors using tools like Google Search Console.
  6. Slow Performance: Poor performance can result from unoptimized images, bulky plugins, or inefficient code. Solution: Optimize images, use caching plugins like W3 Total Cache, and minimize CSS and JavaScript files. Profile your site using tools like Query Monitor to identify slow queries.
  7. JavaScript Errors: JavaScript errors can break site functionality, especially interactive features. Solution: Use the browser’s developer tools (F12) to inspect the console for JavaScript errors. Fix issues by debugging the scripts or checking for library conflicts.
  8. Security Vulnerabilities: Sites can be vulnerable to attacks if not properly secured. Solution: Regularly update WordPress, themes, and plugins. Use security plugins like Wordfence, and implement strong passwords and two-factor authentication.
  9. Responsive Design Issues: Ensuring the site looks good on all devices can be challenging. Solution: Use responsive design techniques and test the site on various devices and screen sizes. Tools like BrowserStack can help simulate different environments.
  10. User Role and Permission Problems: Incorrect configuration of user roles and permissions can lead to security and functionality issues. Solution: Use the User Role Editor plugin to manage and troubleshoot roles and capabilities. Ensure that users have appropriate access levels.
How do you create a seamless user experience (UX) in a custom WordPress site?
To create a seamless user experience (UX) in a custom WordPress site, start by choosing a clean, responsive theme that looks good on all devices. Ensure your site loads quickly by optimizing images and using caching plugins like W3 Total Cache. Simplify navigation with clear menus and breadcrumbs, making it easy for users to find what they need. Use readable fonts and sufficient white space to make content easy to read. Add a search bar so visitors can quickly locate information. Implement intuitive forms with clear labels and error messages. Regularly test your site on different devices and browsers to ensure everything works smoothly. By focusing on these details, you can make your WordPress site user-friendly and enjoyable to navigate.
How do you implement e-commerce functionality in a custom WordPress site?
To implement e-commerce functionality in a custom WordPress site, start by installing a reliable e-commerce plugin like WooCommerce. Set up your store by adding products with detailed descriptions, prices, and images. Configure payment gateways such as PayPal or Stripe to accept online payments securely. Customize the appearance of your store using built-in themes or by modifying CSS styles. Create user-friendly navigation with categories and filters to help customers easily browse products. Implement shopping cart functionality to allow users to add items and proceed to checkout seamlessly. Set up shipping options and rates based on location and weight. Test the entire purchasing process to ensure it works smoothly for users. Regularly update plugins and monitor sales to optimize your e-commerce site for success.
Conclusion
Creating a custom WordPress website involves several key steps. You start by deciding on your site's goals and picking a domain name and hosting provider. Then, you install WordPress, choose a theme, and customize it to match your brand. Next, you add content, like pages and posts, and install plugins for extra features, such as contact forms or SEO optimization. You'll want to make sure your site is responsive and works well on mobile devices. Lastly, you test everything thoroughly before launching your site to ensure it's ready for visitors. And don't forget to keep it updated and secure over time!
submitted by ayonc46 to redditreviewer [link] [comments]


2024.05.21 08:43 Live-Frosting5393 QuickBooks Error 3008 Resolved Best Practices and Solutions

QuickBooks Error 3008 Resolved: Best Practices and Solutions" delves into effective strategies to tackle this common issue encountered by users. The article explores various troubleshooting methods to address the error, which often stems from internet connectivity or firewall settings. It outlines steps such as checking internet connection stability, temporarily disabling firewall or antivirus software, updating QuickBooks, running QuickBooks File Doctor for diagnostics, and resetting Internet Explorer settings. By implementing these solutions, users can swiftly resolve Error 3008 and restore normal functionality to their QuickBooks software.
submitted by Live-Frosting5393 to u/Live-Frosting5393 [link] [comments]


2024.05.21 08:22 balmic26 SCSI file transfer between two Macs

Hi all,
I know there's SCSI disk mode for powerbooks to transfer data over to a Macintosh using special cables.
Just wondering if there's a similar mechanism to transfer the files between two Macs in normal operation (or a way to make images to use one as a "boot drive" for the other in a ZuluSCSI like way - yes it's a weird suggestion).
I'm currently restoring floppy drives and the HDD is dead (haven't got around to replacing it yet as all solutions are quite expensive!).
I've was looking at AppleShare but seem to have an unknown software configuration error somewhere (cable is a genuine Apple cable and crossed over).
submitted by balmic26 to VintageApple [link] [comments]


2024.05.21 08:12 ComplexSupermarket89 Custom Mini RX 480 Project

Custom Mini RX 480 Project
"How I turned two partially working GPUs into the world's smallest RX 480"
Disclaimer:
I tried making a post about this project once already, only to find out later that my original text did not make it into the actual post, only the photos. It's a real shame because the original post was heavily trimmed and I tend to ramble (like I am now) so this repost will probably be a lot longer than the original. Please forgive any excessive, ADHD fueled, ranting. I'll try to put headers between each part, if you just wanted to skim though. Feel free to just skim the TLDR if you aren't in the mood for a short novel.
The TLDR:
I took a reference RX 480 8GB card and made it into the smallest instance of an RX 480 card that I could find anywhere. It is even smaller than some prototype SFX versions that never came to market. It's very janky, and took some TLC to make it all work.
I have outlined the whole process below if you are brave and have some time to kill. I have trouble keeping things short and sweet while still keeping the meat on the bone. So don't proceed if you are easily bored or hoping for a scientific breakdown. You have been warned.
Some backstory to start:
I took the cooler from an old R9 285 that was purchased for my father when he was using a Ryzen 2600 and needed some kind of graphics card. We tried a few cheap DP cards I had around but couldn't get any to work. I resorted to buying the cheapest working GPU I could find. This was peak mining boom, about 4 years ago now. He has since been upgraded to a 9600K system and no longer uses the R9 285.
That card had been sitting for a long time in a box of GPUs that needed attention. All of the cards were either obsolete or damaged in some way. I had a few decent RX 8GB cards in there that functioned, but had either a sketchy cooling solution, corrupted VBIOS, or both. I had gotten all my old RX cards to be at least "barely functional" so that I could mine on them, back when it was profitable. I already had a number of these cards on hand, so it was free money on the table as long as I could get them to a somewhat functional state.
However, the cooling on one particular RX 480 reference card only consisted of it's original slimmed down, blower style heatsink, nothing else. The original fan shroud was gone, which made the dangling blower fan all but useless. I had since removed it and strapped a 120mm case fan to the heatsink with zip ties, but even this had been removed after I stopped mining. In an open air chassis with good external airflow it has worked just fine, but to become a viable card for a more conventional PC case it's cooling solution needed to be addressed.
Starting on the project itself:
I noticed while going through all of my AMD cards that the mounting holes for most of their coolers were in the same pattern. Many of the cards even had unused mounting holes in the same spots. This made me curious if one of my less valuable cards had a cooler that would work with my 480. Because it was a reference card it had a short PCB, so I started by finding a card with a cooler that was roughly the length of the 480s bare PCB. This brought my attention to the neglected but functional R9 285.
When comparing the PCBs of both cards I found that the power delivery, memory chips, and MOSFET layout was almost identical. There were a couple of capacitors and connectors that caused interference. This stopped a quick and dirty cooler swap from being possible. After dealing with some of the other cards and not finding a better solution for the 480, I put the project on pause for a few months and forgot about it.
Fast forward a few months and I again noticed those 2 cards in my storage. They were the only 2 remaining in there. The rest had either already been fixed and deployed or were discarded. Finding those 2 cards again, I remembered my original idea. I decided to see if it would be possible to modify the heatsink of the R9 285 cooler so it could be mated to the RX 480 proper. I found that this would require cuts in the heatsink in 4 relatively small areas. Some cuts would be sketchier than others, but it was theoretically a viable project. Better yet, it looked as if all of the memory chips and power delivery would still get contact with the new cooler (assuming proper thickness of the replacement thermal pads).
The material removal itself was fairly straightforward. I used a variable speed Dremel and reinforced cutting disks for all of the cuts. Swapping out to some other bits definitely would have been ideal in a few areas. I made things harder on myself trying to make small, delicate cuts with a disk. Especially the cuts near the heat pipes required a lot of patience and many small adjustments before enough material was removed. I also needed a fairly decent chunk to be removed from the back corner of the card to avoid a large capacitor on the PCB. This cut would have removed one of only 2 remaining mounting points for the plastic fan shroud to attach to the heatsink, so I had to be very careful there too.
I managed to leave enough material around the fan mount so that it kept most of it's rigidity. The shroud was able to screw in without issue. It now mounts with only the 2 screws, rather than 4. Both screw locations are on the side of the shroud closest to the motherboard, when the card is installed. For the 2 empty mounting holes on the front facing side of the card I used thin twist ties to hold the shroud to the heatsink. This worked fine and is only really noticeable if you're looking for it. It was not a necessity to do this anyway, as the shroud was sturdy enough with just the 2 screws. It did help with the slight wobble of the shroud from vibration, but it would have functioned fine without the twist ties. I could have found a better solution but this one worked fine for my purposes.
Now that I knew the heatsink would mount to the 480 without any interference, and the fan shroud was firmly attached to the heatsink, it was time to think about thermal transfer. For the thermal pads I settled on one long pad over the length of the entire power delivery. The 285 heatsink had a strip of copper that covered the entirety of it's power delivery However, the 480 only had a thermal pad that partially covered it's power delivery, and no copper strip to help carry the heat to the fins. Because of this, I figured that one large pad covering almost all of the power delivery would suffice. There WAS a thin strip down the length of the power delivery that was not completely covered by the copper strip on the heatsink. But the full length thermal pad allowed at least most of the heat to make its way to the fins. I figured it would be fine, as it still covered more of the power delivery than the original 480 cooler had to begin with.
I chose to cut out individual thermal pads for each of the memory chips on board. This allowed me to double up in a couple areas where it was necessary to do so because of a slight height difference. The 285 heatsink had concave areas where it made contact with the memory chips on the board. These didn't quite line up perfectly with the memory chips on the 480, so a couple of them needed a second layer of thermal pad to reach the heatsink. This ultimately made little to no difference in the end. The memory temps ended up not being a problem at all.
I used Noctua thermal paste for the die, being careful to cover it entirely and I removed the cooler afterwards to ensure it had made good contact. I am sure there is better paste for this purpose, but it was the best I had on hand and this project was meant to be about recycling. I didn't exactly want to spend a bunch of money trying to fix up a card that might not make it, especially a GPU that had spent the better part of 4 years in a box at this point. This is something that I may change out later on, if I ever repaste one of my better GPUs and buy something better for the job. For now it is not a huge problem to me.
First attempts to boot. Some TLC is needed:
Because this was an old mining card it gave me a lot of grief initially. At first it just didn't show up in device manager at all, and I only had integrated graphics to boot. The fans on the card would occasionally spin up and then stop, so I knew that it was getting power. It just seemed like the Windows 11 machine had no idea how to communicate with whatever flashed VBIOS it had when it was mining.
The fact the fan spun at all gave me a lot of hope. The fan connector had looked the sameom both cards, but you can never be certain. The original blower fan had a much higher RPM and I worried about the new fan receiving too much power, frying something on the board. It turns out I just needed a reminder that electronic devices PULL power from a source, rather than the source forcing power to the fan. At least when they are working properly. In the end it ran at a reasonable speed the entire time, without any sort of fan tuning needed.
I decided the next step was to try the card in another PC. I turned to a Windows 10 install and a Supermicro 1155 motherboard and Xeon combo I had on hand. For whatever reason this did a lot to resolve the problem. I still had to use the onboard graphics to boot (VGA at this point because of the server motherboard). Once I was in Windows I could actually see the card listed as a video device, with the expected exclamation mark next to it, informing me that Windows had no idea how to communicate with it. This device manager error was something that I was familiar with and I knew what to do to get it working.
At that point it was probably already functional as a mining card. Mining software would recognize it and the fact it could be picked up by the system was probably enough for it to send mining data to the program (at least this was my experience in the past). However, I would definitely need to find a proper VBIOS and flash the GPU if I wanted to restore it's functionality as a video card. I began looking for one, but I knew that it may be a long shot. I could not find a VBIOS for the paritcular VisionTek reference card variant that I had, and I had to settle on a VBIOS for a Sapphire RX 480 8GB refrence card instead. I really lucked out, and this seemed to function. I was able to boot into Windows using the GPU for display, rather than the onboard header.
Once I was back inside Windows the card was properly reporting in device manager. The exclamation mark was still there, but updating the drivers was all that was needed to make it disappear. I now had a (hopefully) functioning card, with no obvious issues. I know that there may be unforseen long term consequences operating the card with the wrong VBIOS. As of rewriting this post I still have not experienced any, though. Time will tell if this was a temporary fix or if it is close enough that it won't be an issue.
Since it had booted properly in the Windows 10 machine, I moved it back to the Windows 11 bench, where it was thankfully recognized. This time no driver update was needed for device manager to recognize it. I decided it was time to do some testing to make sure it was all functioning as it should.
Testing for stability / temperature:
Huge disclaimer here, I am not a professional benchmarker. I don't do a battery of tests with comprehensive data analysis and visual charts. I am not overly concerned with all of the specifics in this situation. I just wanted to make sure the card was functional in the real world and that it wouldn't overheat under a realistic load. So I apologize that this isn't a comprehensive breakdown of the performance of my sketchy mod. I may return to this later on and do some more in depth testing of the performance. It is possible that the card is underperforming compared to a normal RX 480 8GB, but there were no obvious red flags to me.
To start I opened HW Monitor to watch the thermals and then I started a run of Heaven Benchmark. I ran it at 1440p, highest settings, and it basically maxed out the GPU usage. The card showed no noticable glitches or artifacting, and had fairly smooth FPS values, so left it to run in the background. I came back after well over an hour when I was sure the temperature had settled in. The final results were a max core temp of 81C, with no listed hotspot temp (I believe it just showed dashes). Idon't know if this was due to the particular model of GPU, the version of the Heaven software, or the improper VBIOS that I had installed. Memory temps were well under control with a max temp of just 62C.
After this successful stress test I decided to put it through some real world usage. I replaced the RTX 3060 in the kids PC with the it and I had them use it for a few days. I checked on temps periodically during this time and never saw the card go above 80C. I asked if they had any issues running any of their games, or if they had experienced any glitches or artifacts. But I did not make a comprehensive chart or do any detailed analysis. The fact that I don't think they had even noticed the swap from a 3060 to a 480 was enough evidence that it was working for me. As far as I am concerned it is now a functional RX 480 again. That was about as high as the bar was ever going to be for this project. I may do some more "in depth" testing of specific games in the future. For now I am happy to call this project a success.
In summary:
What started as spring cleaning of my tech cabinet snowballed into a restoration project, and then a full on GPU "mod". It may not be the most exciting thing I've done. I don't know if it even counts as a real mod. I definitely put more time and effort into this than it was worth. Still, I am happy with the result and glad I did it overall.
At the start of this project the finished card was probably destined to be donated, like most of my spare technology is. I work for some older folks and they will sometimes need replacement parts that they can't really afford. Cards like this are perfect for situations like that. It clears up some space in my cabinets and it saves them from spending money at the same time. It's also great for repeat business. But after all of the effort it took to get this card functional again, I think I'm going to keep it around. It may be retired from regular use, but it will make a cool little trophy to add to my tech collection. It may end up finding a home in a future ultra-SFF build I make. In any case I'll keep it as another cool piece of my personal tech history.
submitted by ComplexSupermarket89 to pcmasterrace [link] [comments]


2024.05.21 06:12 Celebril63 My thoughts on survival settings. What works for *me*.

My thoughts on survival settings. What works for *me*.
These settings give a +49% XP bonus!
I've spent the time since the last update playing around with the settings to find just what is my sweet spot. After a lot of trial and error, this is what I've come up with. Following is just going down the list and my thoughts/reasons on each. I'll note that I am in the mid-140 level and on NG+7. That said, I am pretty confident I can use these settings when I start my new character eventually.
Combat Damage: Extreme. I tend to fight patiently and methodically. I'll use cover and my sights, rather than just hip firing the on-screen reticule. I use only a few weapons and have pretty much mastered them. Extreme means I have to fight smart. Even Very Hard is just a "Be careful," difficulty. Extreme fights my fighing style and the bumped up AI is refreshing. Not only do the enemies fight smarter, they are also more prone to run away if they have a chance.
Ship Damage: Very Hard. I play from the cockpit view and use a controller. I hate keyboard/mouse in space combat sims. One of the things I've noticed is that the AI has definitely had some improvements. Rather than being able to treat those 4 ships in the random encounter as 4 seperate dogfights, it has a feel that they are using tactics against me. A Wight and 3 escorts - all at level 75 - is a challenging fight now on Very Hard and downright ridiculous on Extreme. Crew contributions definitely matter now. This combination actually feels on par with the Extreme setting for Combat Damage.
If I could use my Throttle/Stick, though, I would almost certainly be going to Extreme difficulty. For controller, though, Very Hard is the best pairing with my other settings.
Ammo Weight: Weighted. That seems almost like a no-brainer. Frankly, this setting is almost too generous. If you've ever picked up an ammo can of 5.56, or a case of .22LR, you know what I mean. You can carry more than enough easily for any mission and still come out ahead in the end.
Carry Capacity: Normal. I go back and forth on this one. Since I'm using food buffs and nerfs, I'd be tempted to use the reduced capacity for the XP bonus. But it feels like I'm shortchanging myself for spending all those skill points to specifically increase my carry. It is just a better "game feel" for me to leave this at normal.
Cargo Access: Normal. Again, it's really just trading XP for a very mild inconvenience. Leaving it at normal keeps a slightly better gameflow without the cheesy feeling that Anywhere gives.
Vendor Credits: Increased. Normal certainly felt too lean. Greatly Increased was defintely too rich. Increased really was the happy middle, where there was some sense of prosperity for the vendors but avoided the monty haul feeling. And the XP loss is really minimal on Increased.
Medical Healing: Slowly. This was really based on what just felt right. Truth is, I've got max rejuvination skill, so I don't need medpacks often, especially how I fight. If I do need one, then slow has the best gameplay feel.
Food Healing: None. I'm using food for sustenance. It really doesn't need to contribute to healing, between medkits and natural regeneration.
Sleep Healing: Location Limited. Since I regenerate, I really should set this to None for the XP. For roleplay, though, Location Limited healing gives better gameplay for me.
Sustenance: Positive and Negative. There could probably be a bit of balancing and tweaking done here. There's no grey zone between malnourished and well fed. It's a binary buff or nerf. However, the time limit is 30 minutes of playing time for the buff, not in-game time. Frankly, I carry food and eat anyway. Roleplaying. Now there's a point to it.
Affliction Gain/Treatment/Prognosis: These settings really feel good on the most difficult settings. I think Bethesda hit a home run with this trio. I've spent the game, so far, carrying a solid IFAK load. It's light, but complete. Now there finally is a real point to it. And ultimately, you need either time or professional treatment to get over that final hill. I like how this works here.
Environmental Damage: Normal. Frankly, I've felt from the beginning that evironmental damage was a bit broken. When you could get frostbite walking from your ship to the Ship Technician on New Homestead in high-tech environmental armor and that ship tech is standing around like it's a summer day, something's not quite right. Turning them Off didn't feel very good in game, either, though. At the end of the day, I had to leave this at Normal.
I really don't want Bethesda to change much in the hardest settings for Environmental Damage, though. There are plenty of survival game lovers that are enjoying this setting. What is needed though, is some balancing of Normal and/or the addition of a difficulty that is between Normal and Advanced. Restoration can then stay where it is.
Overall, though, I'd have to say these environmental settings are pretty close to a home run. At least a triple. :-) The level of configurability to match your gameplay and style is outstanding. These are the settings that work for me. You will likely have different preferences.
I don't suggest you use these settings or that these are the best settings. I do, however, encourage you to play around with them and tailor your game experience to what gives you the best feel in the game. It's absolutely worth the effort and there is no reaon not to.
submitted by Celebril63 to Starfield [link] [comments]


2024.05.21 04:43 fionaaaa99 ICCID Numbers: Finding the Code on Your SIM Card

SIM cards and their associated ICCID numbers have played a large role in the development of the modern Internet. This article will tell you the essentials of both and show you how to locate the ICCID numbers.

About the SIM card

SIM cards are a fundamental component of mobile communications technology. Acting as a digital identity in the mobile space, it plays a key role in facilitating seamless connectivity and access to cellular services. Let's delve deeper into its functionality and significance:
Storage of essential information: At its core, the SIM card acts as a repository of important information related to your mobile subscription. This includes your unique number (which acts as your identifier within the network)
User profile management: Additionally, SIM cards enable you to manage various aspects of your mobile subscription, such as activating new services, updating contact information, and transferring subscriptions to new devices. By securely storing your user profile, SIM cards facilitate seamless mobility and flexibility in managing mobile services.
Physical Characteristics: Typically, a SIM card is a small rectangular chip, typically measuring around 25mm x 15mm. It is designed to fit into a corresponding slot on a mobile device for easy insertion and removal when necessary. While traditional SIM cards are larger in size, advancements in technology have led to the development of smaller form factors such as Micro SIM and Nano SIM to meet the changing design requirements of modern devices.

Understand ICCID

The ICCID (Integrated Circuit Card Identifier) is a key element of the SIM card and plays an important role in identifying and authenticating your device on mobile networks. Let's explore the intricacies of ICCID and its importance:
Unique Identifier: ICCID is a long sequence of numbers assigned to each SIM card as a globally unique identifier. Like a serial number or fingerprint, it distinguishes your SIM card from millions of other cards on the network, facilitating precise identification and tracking.
Structure: An ICCID usually consists of 19 to 20 digits and consists of a combination of individual identifiers that convey specific information about the SIM card. While the exact structure may vary slightly depending on the standards followed by the mobile industry, an ICCID typically contains elements such as an issuer identification number (IIN), individual account identification, and a checksum number for error detection.
Role in Authentication: ICCID plays a key role when you try to connect to a mobile network or initiate a transaction that requires network authentication. It is a key component of the authentication process, allowing the network to verify the legitimacy of your device and verify your access to the services provided.
Activation and configuration: During the initial setup of a mobile subscription, the ICCID is used to activate and configure your SIM card within the operator's network. By linking your ICCID to your subscriber profile and service plan, operators ensure your device is seamlessly integrated into their infrastructure, allowing you to easily access voice, data, and messaging services.
Accessibility: While the ICCID is primarily encoded within the SIM card itself, it can also be printed on the surface of the card for easy reference. Additionally, modern smartphones enable users to view their ICCID directly from the device settings, eliminating the need for physical access to the SIM card.
In summary, ICCID acts as an important identifier and authentication mechanism in the mobile ecosystem, enabling seamless connectivity and access to essential services. Its unique structure and role in network operations highlight its importance, making it an integral part of the functionality of mobile devices.

Steps to Find These Two Numbers on Various Devices

If you carry the card with you, the ICCID will usually be written on the front and back of the card. Simply remove the SIM card and check if it has the ICCID printed on its surface.
If the user has already recharged, you can ask customer service to help you find the ICCID via email, or check the email records to find the ICCID. Typically, mobile carriers will include this information in the confirmation email or bill.
The card is inserted into the device. You can find the card number by logging into the device APP. For the reolink camera, you can log into the reolink app and you should find an option to view your SIM card information, including the ICCID number.

Common Questions and Troubleshooting

Q: What should I do if the device cannot connect to the network after inserting theSIM card
A: If your device can't connect to the network after inserting a SIM card, there are a few potential issues you might want to consider:
  1. Confirm that the card is inserted in the correct direction; re-insert and remove the card; refresh the card
  2. Confirm that the device has sufficient power
  3. Confirm that the customer's country of use corresponds to the country where the card product is available
  4. The signal at the current location is weak; move to a place with a better signal.
  5. Check that the device is properly configured to use the correct network settings and access point name (APN) provided by the mobile operator.
  6. Verify that the device supports the frequency bands and network technologies used by mobile operators in your area (e.g., 3G, 4G/LTE).
  7. Insert the card into the mobile phone or use another card to insert into the device to determine whether it is a card problem or a device problem.
Please contact your mobile operator's customer support for assistance if you still encounter issues.
Q: How to check data usage and remaining data
A: To monitor your data usage and check your remaining data allowance, you cantypically do the following:
Download the Eiotclub APP to view detailed information about data usage, including the amount of data consumed and remaining data allowance. The platform offers additional features such as data usage alerts and usage history tracking.
Q: What should I do if I run out of traffic?
A: If you've exhausted your data allowance, there are several steps you can take to manage your data usage and potentially restore your connection:
Download the Eiotclub app or log in to refill pages and enter the ICCID to recharge.

Conclusion

In the digital age, the ability to find your SIM card and ICCID number is crucial. Armed with this knowledge, you can navigate the complexities of mobile networks and ensure seamless access to essential services. Next time you find yourself needing to find your ICCID, remember these simple steps.
submitted by fionaaaa99 to EiotclubSIMCard [link] [comments]


2024.05.21 04:10 GOLFZONM_Pro [Notice] Compensation for Abnormal Application of Putter Option

[Notice] Compensation for Abnormal Application of Putter Option

Dear Golfers,

We would like to inform you that the restoration of Gold and compensation related to the previously mentioned issue with abnormal application of a putter option has been completed.

Please check the details below.

■ Compensation Recipients
Players whose "Awesome-in-hole rate increase" option was randomly changed to another option after the 4/23 (Tue) update.

■ Compensation Details
  1. Restoration of Gold used for changing the club option
Gold used for changing the club option between the 4/23 Update and the maintenance on 5/14 has been returned.
This restoration is limited to those who had the "Awesome-in-hole rate increase" option.

  1. Compensation for the issue
As an apology for the inconvenience caused by the error with the "Awesome-in-hole rate increase" option, 100,000 Gold has been provided to affected players.
This compensation is limited to those who had the "Awesome-in-hole rate increase" option.

The above compensations have been delivered through the in-game mailbox. If you were eligible for compensation but did not receive it, please contact our 1:1 customer support center.
GOLFZON M 1:1 Customer Support


We apologize again for any inconvenience caused by the unexpected issues.

Thank you.
submitted by GOLFZONM_Pro to GOLFZONM [link] [comments]


2024.05.20 23:46 Usuario_inverso Wallet restore Daedalus mainnet trouble

I was trying to restore my wallet, and my wallet recovery phrase got right, is just that after I choose my new configuration, as I try to restore it, it says “an error was found” may it be because my computer is not capable because of its hardware(too wack)? Or how could I solve this
submitted by Usuario_inverso to cardano [link] [comments]


2024.05.20 22:53 digiphaze Recovery Media missing proxy dll error

Hi All,
This past weekend a client wanted us to test the restore process to a blank HD.
As soon as the restoration starts, it immediately fails with:
Restore failed: Unable to load DLL 'CInterop.VeeamProxyClient.dll' code: 0x8007007F
The Veeam B&R console shows a restoration error without any details as well.
Google search is coming up empty.. Has anyone encountered this before? I've recreated the ISO and it still throws this.
Thanks!
submitted by digiphaze to Veeam [link] [comments]


2024.05.20 22:47 Ecstatic-Mall8535 The Mandela (Catalogue) Effect Theory

So I've had this theory on my mind for quite a while but I have become more rigid in my belief of it since not only Mandela Catalyst but the new channel ''GENESIS APOCRYPHON'' as well. I know you guys have probably read endless litanies of theories written on this subreddit, so perhaps this will fall through the cracks like the rest and understandably so. Perhaps my theory is just flagrantly wrong also but I think even if that happens to be the case perhaps I can get some aspect of the Mandela Catalogue correct within this. I will begin with an introduction to the theory, then I will bring forth my evidence which will be followed with speculation upon the piece of evidence in relation to the theory. Finally, I will end with a conclusion based on the introduction and evidence combined.
Introduction:
There has been two aspects of the Mandela Catalogue which have distracted me ever since the series began, these two aspects are things which I see seldom discussed within the various theory channels, forums and other mediums which have taken on the yolk of unpacking this anomaly of a horror series. They are as follows:
  1. Why was the name Mandela Catalogue chosen? Is it really just a random name that Alex came up with in reference to the fictional Mandela County?
  2. What is the true meaning of the US Department of Temporal Phenomena? Meaning, in what sense do their focus or actions relate to temporal operations?
These questions on their own may seem distantly connected or unrelated completely but with a bit of speculation one could see these two being completely intertwined. In regards to question one, what do we know about the term ''Mandela''? Well everyone has heard of the famous ''Mandela Effect'' where a large amount of people believe something to be true (usually relating to something in their childhood) but is not actually the case, the namesake being an example of this. A large proportion of people mistakenly believed Nelson Mandela to have passed away in prison during the 1980's, in actuality he died in 2013. Hence being the first popular example of this effect and thus obtaining the name of ''The Mandela Effect''.I am not here to argue the veracity of the Mandela Effect or any of the theories regarding it but I am here to focus in on this definition. So keep the definition of ''where a large amount of people believe something to be true (usually relating to something in their childhood) but is not actually the case'' in your mind going forward. Another point of note is the usage of ''Catalogue'' for the name. This implies a retroactive look at the events taking place in the series, someone is ''cataloguing'' the events taking place in Mandela county. This little titbit will come in to be very important in my theory.
In regards to question two, we need to properly define ''temporal'' which I have seen many wrongly define. Temporal does not simply refer to time but rather the perception of the linear progression of time from past to present to future. This perception is not universal in humanity and many cultures don't view time in this fashion. So we may be able to define ''Temporal Phenomena'' as psychological/sociological occurrences relating to the perception of linear time. Under this definition the Mandela Effect would be seen as a ''Temporal Phenomena''.
The theory I'm going to lay out before you requires these definitions to be cleared up and properly defined, for my theory directly relates to the theory and praxis of the alternates. I believe that the alternates are attempting to make humanity remember a different history, an alternate (badumtss) history which is not our own. However, what is history if you don't perceive time in a linear sense? If the alternates don't perceive time linearly or experience it temporally, then maybe history to them includes the present and future. If humanity begins to believe the alternate history which Gabriel and his flock are attempting to make us believe, then alternates will have total power over our world, I will explain why this is the case in the evidence section.
Evidence:
1A - https://www.youtube.com/watch?v=q0EpOiu8YkI 1B - https://www.youtube.com/watch?v=C1bYOi7lHJU 1C - https://www.youtube.com/watch?v=RCl-M_l-Kv0
1A Evidence: Overthrone is essential to understanding what is going on within the Mandela Catalogue universe. We see here that a False Gabriel is taking the place of the biblical angel Gabriel in order to preaching a sort of prophecy or foretelling of what he will do, he will ''Fool the Shepherds'' he will ''Know their greatest fear'' before saying later to the shepherds ''I am your true saviour, I know everything about what makes you human. I know what you love. I know what you dread.'' and ultimately turning into the spooky Gabriel for lack of a better term. At the very end (Which I will not analyse fully for I don't believe the rest has much relevance to my theory) Gabriel says ''I deceived them, such weak minds''. So we know that there are shepherds (which seems to be distinct from THE Shepard) which may be followers or rather now former followers of the Shepard. We also see that he foretold his act of deceiving them to Joseph, perhaps to break Joseph down mentally before telling him to ''Wake Up'' which I will get into later.
1A Speculation: I think it would be a grave error to see Overthrone and all the subsequent alternate bible stories shown in the Mandela Catalogue as actual historical account in universe. What I mean by this is that the alternates are simply editing the cartoon to reflect what they want people to believe ergo Gabriel did not actually interact with these Biblical figures, the events shown in the cartoon did not actually happen (at least literally). I say this partially using an argument from silence admittedly, seeing as though we have no evidence that the events within the cartoons actually happened in universe but seeing as how alternates constantly corrupt videos to suit their needs I don't think this is a far out conclusion. However, I think there is ample evidence for this in 1B.
1B Evidence: The first upload of Alex's new and disturbing channel. I'm going to be a little cheeky here and include the whole channel in my analysis of 1B. Now we found out about this channel from the link shown on the tv when the news report was intercepted by the alternates. This may mean that the channel is in universe. The channels name is ''GENESIS APOCRYPHON'' which is incredibly groundbreaking in how we view the series and supports my speculation above. The Genesis Apocryphon is a real thing, it is one of the original seven dead sea scrolls and (According to Wikipedia :P) the Genesis Apocryphon lies within the "rewritten bible" category and is a retelling of the stories of the patriarchs. An Alternate Genesis. I believe this more than supports my speculation of 1A.From the banner of the channel we see Dave Lee's store with one of the signs saying ''Trade in your VHS'' and taking into account volume 4 we know that Dave Lee is in possession of a lot of the tapes we have seen previously on the main channel, if not all. Another thing to note is the @ for the Genesis Apocryphon channel, @ allocateundamage as if this channel may be perhaps allocating the undamaged tapes or tapes that are being repaired. Conveniently this segways us into the 1B video, it is the same video seen in overthrone but without the crazy alternate stuff going on. The most odd part of it is all the dialogue of Gabriel being cut out around half way through and the ending slowly going black and white. This is a damaged tape or a tape that was damaged being repaired, for example it may be an attempt at repairing the overthrone tape.
1B Speculation: I think that what we are seeing are David Lee's attempts at repairing the biblical cartoon tapes corrupted by the alternates and his collection of other damaged tapes. As we know from the end of Volume 4, these tapes are incredibly important to Gabriel for he said ''We have their prayers and their records''. I believe these records are the tapes of the corrupted bible cartoon tapes, this must have been why David Lee was an important target, if they lose those tapes then they lose their false account of history which they are trying to convince humanity of. However, David is already dead and this channel can be assumed to be in universe, so who's uploading these leftover tapes? Perhaps it's Thatcher, maybe he's copped on to what the alternates are trying to do.
1C Evidence: This video is most interesting, as it is a part of the biblical narrative that we've never seen before on the main channel; The Resurrection of Christ. The video starts off in the same relative normality established in the video prior but slowly goes on to reveal the usual dark elements that we see in the other corrupted Bible Cartoon tapes. It appears as though the longer the video goes on the worse it gets, as if there's parts which haven't been repaired yet. Ending with Gabriel in the tomb of Christ speaking to perhaps Mary Magdalene. Beyond that, there's not much hard evidence to be divulged in the case of my theory but there's a lot to speculate on.
1C Speculation: It appears as though all of these bible tapes may be representative or symbolic of what's presently going on in Mandela and the surrounding counties. With Mary Magdalene being a stand in for Evelin just how Adam and Eve seemed to be a stand in for Adam and Evelin in volume 4. Which could indicate that the alternates are trying to tell the story of what's going on currently in the Mandela Catalogue in order to have tangible events attached to the false history which they will preach to the world. Thus the present becomes the past and becomes the gospel.
2A - https://www.youtube.com/watch?v=ZUrCO_x3VHk&t=48s 2B - https://www.youtube.com/watch?v=C8d12w6pMos&t=104s
2A/B Evidence: I should first note that I will not be analysing the M.A.D section of the video, I will instead analyse the standalone M.A.D video in another post about this theory maybe, nor will I be analysing the Toddler Stress Assessment section for I feel it holds no relevance to my theory. This video is the remake or restored edition of Volume 1, you will find out why I put this version of Volume 1 and the original Volume 1 as separate evidence entries in the speculation following. However, what I wish for you to notice now is the differences between the original and the restored version. Notice how many of the glitches, odd messages such as ''Kill yourself, there's not enough room for the two of us'' and the lack of the faceless alternate.
2A/B Speculation: This is not mere remastering of old videos on the part of Alex, the restored version is the version which has had all editing and falsities from the alternates removed. As much the same with Genesis Apocryphon, we are seeing the fruits of David and Thatcher's labour to restore the tapes and show the real history of what has been going on in Mandela county. We can assume that the alternates are not only using this as a form of rewriting history but also to implant themselves into the mind of the viewer as with Stanley.
In summary: The alternate history we see with the bible cartoons is not accurate history in universe, it is in fact a fake history being made up by the alternates perhaps to cement themselves in our collective psyche. It seems that David caught on to this which is why Gabriel had to get rid of him. Thatcher may soon discover this if he somehow gets a hold of David's tapes. The retold bible stories are representative of events that have been going on in Mandela county since the arrival of the alternates and these events may be an attempt to create a new gospel of sorts. They are targeting children specifically with this fake history since they will be more likely to forget the true history of the world, true history then becomes subject to the Mandela effect.
That's all I can muster to think of right now but I will consider making a part two to this theory as I think there is still a bunch more evidence to sift through. This post was more a proof of concept than anything.
submitted by Ecstatic-Mall8535 to MandelaCatalogue [link] [comments]


2024.05.20 22:45 HeteropodaMaxima Yennefer DLC Dress Neck Seam Flickering Line Glitch [Fix]

Yennefer DLC Dress Neck Seam Flickering Line Glitch [Fix]
Watch the video in full screen and set the resolution to the highest to be able to see it better. Directly below the medalion goes a flickering line all the way around her neck
Only had this problem with Yennefer's DLC dress, her normal outfit doesn't have these flickering lines at the neck. It is just below her collar directly below the medalion goes a flickering line all the way around her neck
I thought maybe one of my High Res face texture mods was triggering these lines so I tried all these mods to fix it:
Improved Yennefer (E3 Trailer and DLC Appearance) NEXT GEN
Brothers in Arms - TW3 Bug Fix and Restored Content Collection - Next-Gen
Yennefer body texture Fix ( next gen )
None of these mods helped, they only fix texture problems. I found out through long trial and error that it is not a texture problem it is a DLSS Graphics setting problem.
Ingame Settings: Options > Video > Graphics
Setting Anti-aliasing to any other setting than DLSS fixed it for me
DLSS or Deep Learning Super Sampling is a technology by Nvidia so this seems to be a exlusive Nvidia graphics card problem. I have a RTX 3080 TI.
Wanted to share this because I couldn't find anything else on this topic online, aside from the color texture seams on the neck. Which is not the same problem. Maybe someone will find this helpful
submitted by HeteropodaMaxima to Witcher3 [link] [comments]


2024.05.20 21:48 jhonmark8502 QuickBooks Unable to Decrypt File with Password: QBwin.log

QuickBooks Unable to Decrypt File with Password: QBwin.log
QuickBooks is a comprehensive accounting software developed by Intuit, designed to meet the financial management needs of small to medium-sized businesses. It offers a range of features that streamline complex financial processes, enhance efficiency, and ensure accuracy in business operations. One of the critical components of QuickBooks is the QBwin.log file, which logs transactions and internal operations, providing a detailed record that is crucial for maintaining data integrity and troubleshooting issues.
However, users sometimes encounter a significant issue where QuickBooks is unable to decrypt the QBwin.log file with a password. This problem can disrupt access to essential financial data, posing a challenge to business operations. Understanding the causes of this error, its implications, and how to resolve it is vital for any QuickBooks user.

What is the QBwin.log File?

The QBwin.log file is an integral part of QuickBooks, recording a log of internal activities within the software. It tracks transactions, error messages, and various operations that occur during the use of QuickBooks. This log file is essential for several reasons:
  1. Troubleshooting and Debugging: When errors occur, the QBwin.log file provides detailed information that can help identify and resolve issues.
  2. Data Integrity: It ensures that all transactions are recorded accurately, maintaining the integrity of financial data.
  3. Audit Trail: The log file acts as an audit trail, helping accountants and auditors verify the correctness of financial records.

The Problem: QuickBooks Unable to Decrypt File with Password

When QuickBooks is unable to decrypt the QBwin.log file with a password, it signifies a problem with accessing the encrypted data within the log file. This error can arise due to several reasons, including:
  1. Incorrect or Corrupted Encryption Keys: The encryption keys used to decrypt the log file may be incorrect or have become corrupted.
  2. Compatibility Issues: There might be compatibility problems with the cryptographic algorithms used for encryption and decryption.
  3. Software Conflicts or Updates: Conflicts with other software or recent updates to QuickBooks can sometimes cause decryption issues.
  4. Data Corruption: The log file itself may be corrupted, preventing decryption.

Implications of Decryption Failure

The inability to decrypt the QBwin.log file can have several significant implications for a business:
  1. Data Inaccessibility: Critical financial data may become inaccessible, hindering the ability to perform necessary accounting tasks.
  2. Operational Disruptions: Disruptions in accessing the log file can lead to delays in financial reporting and other business operations.
  3. Security Risks: Inability to decrypt the log file may indicate underlying security issues that need to be addressed to protect sensitive financial information.
  4. Increased Error Risk: Without access to the log file, identifying and resolving errors within QuickBooks becomes challenging, increasing the risk of data inaccuracies.

Troubleshooting the Issue

To resolve the "QuickBooks Unable to Decrypt File with Password" error, a systematic approach to troubleshooting is required. Here are the steps to follow:
  1. Verify Encryption Keys: Ensure that the encryption keys used for decrypting the log file are correct and have not been altered or corrupted. This might involve resetting the encryption keys or re-entering the password.
  2. Check Cryptographic Settings: Review the cryptographic algorithms and settings used by QuickBooks. Ensure they are properly configured and compatible with your version of QuickBooks.
  3. Update QuickBooks: Ensure that you are using the latest version of QuickBooks. Updates often include fixes for known issues, including decryption problems.
  4. Inspect for Software Conflicts: Check for conflicts with other software on your system that might interfere with QuickBooks’ encryption and decryption processes. Temporarily disable any non-essential software to see if the issue persists.
  5. Run QuickBooks File Doctor: Use the QuickBooks File Doctor tool to diagnose and fix file-related issues. This tool can help identify and resolve problems with the QBwin.log file.
  6. Restore from Backup: If the log file is corrupted, restore it from a recent backup. Ensure regular backups are performed to minimize data loss.
  7. Consult QuickBooks Support: If the issue remains unresolved, contact QuickBooks support for expert assistance. They can provide specialized help and may offer advanced troubleshooting steps.

Preventive Measures

To avoid encountering the "QuickBooks Unable to Decrypt File with Password" error in the future, consider implementing the following preventive measures:
  1. Regular Backups: Regularly back up your QuickBooks data, including the QBwin.log file, to prevent data loss in case of corruption.
  2. Update Regularly: Keep QuickBooks updated to the latest version to benefit from bug fixes and security patches.
  3. Secure Passwords: Use strong, unique passwords for encryption and regularly update them to maintain security.
  4. Monitor System Health: Regularly monitor the health of your computer system to ensure there are no underlying issues that could affect QuickBooks.
  5. Train Users: Ensure that all users of QuickBooks are adequately trained in using the software and understand the importance of maintaining data security.

Conclusion

The "QuickBooks Unable to Decrypt File with Password" error can be a significant hurdle for businesses that rely on QuickBooks for their accounting needs. However, by understanding the potential causes and following a structured approach to troubleshooting, users can resolve this issue and restore access to their critical financial data.
Encryption is a fundamental aspect of QuickBooks’ security architecture, designed to protect sensitive information from unauthorized access. When decryption fails, it’s essential to act promptly to diagnose and rectify the problem. By verifying encryption keys, checking cryptographic settings, ensuring software updates, and consulting support when needed, businesses can overcome decryption challenges and maintain the seamless operation of their accounting processes.
In addition to resolving existing issues, taking preventive measures such as regular backups, updating software, using strong passwords, and monitoring system health can help prevent future occurrences of decryption errors. Ultimately, safeguarding the integrity and accessibility of financial data is crucial for the operational efficiency and success of any business using QuickBooks.
Visit–https://www.errorsfixs.com/blog/quickbooks-unable-to-decrypt-file/
https://preview.redd.it/m8u486ocym1d1.png?width=1920&format=png&auto=webp&s=a0ceadebd0206c480cb77cec9376ef3881cb0f62
submitted by jhonmark8502 to u/jhonmark8502 [link] [comments]


2024.05.20 21:30 evolutionxtinct Anyone having issues with PSGallery right now?

Has anyone getting the same errors? I'm trying to setup a new box but the repository PSGallery I think is down. But not sure if its our firewall classifying the traffic wrong again (Network team is off site so can't get a quick answer)
Our services aren't available right now
We're working to restore all services as soon as possible. Please check back soon.
20240520T191401Z-184677ccfcbrtbvb1ged4dma1w00000001r000000000494dOur services aren't available right now
We're working to restore all services as soon as possible. Please check back soon.
submitted by evolutionxtinct to PowerShell [link] [comments]


http://swiebodzin.info