2016.08.14 22:43 NoirNeko Clouded Leopards
2024.05.19 11:39 The_Nerds_9x The Nerds (9x, Archive)
2024.05.19 10:31 nObody_769 Fandom rp set in the DC animated universe specifically after the events of Justice League unlimited
2024.05.19 10:22 alexa_tuning [ AVAILABLE ] Guidelines for Nurse Practitioners in Ambulatory Obstetric Settings 3rd Edition Third Edition by Kelly D. Rosenberger, Nancy Cibulka, Mary Lee Barron Textbook Ebook PDF reddit. Publisher: Springer Publishing. eText ISBN 9780826148544 ISBN-13: 9780826148452
2024.05.19 09:34 Leebhai7 Mspy Mod Apk (Premium Unlocked) Latest Version size 8.8 MB
The MSPY Mod APK, with its latest version size of 8.8 MB, offers a premium unlocked experience for users seeking advanced monitoring and tracking features on Android devices. This comprehensive guide explores various aspects of the MSPY Mod APK, from its enhanced functionalities to installation tips, ensuring users can leverage its capabilities effectively. submitted by Leebhai7 to goodmodapk [link] [comments] Key Takeaways MSPY Mod APK provides extensive monitoring features such as call and message tracking, GPS location services, and social media monitoring. The premium unlocked version offers all advanced features for free, making it an economical choice for users. Installation is straightforward, requiring Android 5.0 and up, with detailed steps available to guide users through any potential issues. The app ensures robust data protection measures, although users must be aware of legal and ethical considerations in its usage. Future updates promise to enhance functionalities, making MSPY Mod APK a scalable solution for various monitoring needs. Overview of MSPY Mod APK Key Features and Benefits mSpy Mod APK is a modified version of the original mSpy application, designed to provide enhanced monitoring capabilities without the need for a subscription. Key features include tracking of calls, messages, and GPS locations, as well as the ability to block unwanted data on the target device. How MSPY Mod APK Differs from the Original Unlike the original mSpy, the Mod APK version offers many premium features unlocked, allowing users to access advanced monitoring tools for free. This version is particularly tailored for users who require comprehensive tracking capabilities without the financial commitment. Understanding the Premium Unlocked Version The Premium Unlocked version of MSPY Mod APK allows users to utilize all the advanced monitoring features without any cost. It’s akin to having a VIP pass in the world of mobile monitoring, providing extensive access to a suite of powerful tools designed for effective oversight. Installation Guide for MSPY Mod APK Step-by-Step Download Process To ensure a smooth installation, follow these steps: Download the MSPY Mod APK file from a trusted source to avoid malware. Navigate to your device settings and enable installation from unknown sources. Locate the downloaded file in your device’s storage and tap on it to initiate installation. Installation Requirements Ensure your device meets the following requirements: Android version 4.0 or higher Minimum of 50MB free storage Internet connection for downloading the APK file Troubleshooting Common Installation Issues If you encounter issues during installation, consider the following tips: Check your internet connection and retry the download. Ensure there is sufficient storage space on your device. Restart your device if the installation fails initially and attempt the installation again. User Interface and Experience Navigating the MSPY Mod APK The user interface of MSPY Mod APK is designed to be intuitive and easy to navigate, even for those who are not tech-savvy. Users can easily access all monitoring features from the main dashboard, which is organized to provide quick insights at a glance. Customization Options MSPY Mod APK offers various customization options to tailor the app according to individual needs. Users can: Adjust settings for data syncing Choose specific alerts Customize the display and notifications RedMore: https://apkquck.com/mspy-mod-apk-premium-unlocked-latest-version/ |
2024.05.19 08:59 nomorelandfills San Diego Humane Society, Frosted Faces Foundation and Lexie the Biter
Lexie is a small, old dog but Lexie was a highly aggressive small, old dog when she entered the shelterescue pipeline in 2018. The shelter flipped her to a rescue, and the rescue spent 2 years letting her bite and attack people before finding a final adopter who tolerated the attacks long enough for (my opinion) Lexie's deteriorating mental state to reach a point that she lost the ability to carry through on her resource guarding/defensive aggression. I've seen that happen with aggressive dogs before, and it's a mercy for the owner and the dog - which is an incredibly sad reflection on the misery that is aggression, that mental deterioration can make life better. submitted by nomorelandfills to PetRescueExposed [link] [comments] December 2018 photo from original owner December 21, 2018 - a dog owner contacts Frosted Faces Foundation about surrendering their 13yo small dog, Lexie, who has bitten them recently. FFF, like many rescues, doesn't work with owners and prefers to do shelter pulls which are December 31, 2018 - San Diego Humane Society in Escondido contacts FFF asking them to take what turns out to be the same dog - 13yo Maltese, recently bit owner, January 3, 2019 - FFF sends a volunteer and minor child to pick up and transport Lexie to a foster. The child holds Lexie on her lap on the drive from the shelter. November 2019 - FFF posts on FB that Lexie has been adopted and returned 4 times. Each return has been within 48 hours. They blame the adopters, saying "We are always very up front that this girl bites, and she bites hard. Her fosters are patient and forgiving people who have given Lexie the transition time she required to trust them, and even still, they are careful." They also say that "Lexie is food aggressive so she eats in her crate, and does not get bones ever" and also that "she even goes to off leash dog parks." That'll be fun when someone drops a cookie in front of her. Their new perspective on Lexie is that Lexie is pretty much fine with anyone that comes over to the house, everyone can pick her up as long as they let her smell them first and she doesn’t “smile” which means she doesn’t want to be bothered. She is the best with me and David, we can pretty much pick her up anytime and haven’t gotten bitten in a few months.Lexie has some trust issues for sure. She hates being pet when she’s asleep, doesn’t like getting her face washed in the bath, and wants you to check with her before you pick her up. As long as you avoid those, she’s honestly such a sweet pup and once you gain her trust you have it forever! Surprise, she's on the behavior med train. Lexie is on fluoxetine for behavioral reasons, and we have tried trazadone, clomicalm, and CBD oil. Recently Lexie has had a vestibular episode and has had a couple seizures this year, so we do believe there may be a connection between her health and behavior. 1 - interesting they aren't blaming themselves for her aggression, like they blamed her owner. 2 - Old dog vestibular and seizure activity are not linked to aggression involving resource guarding. btdt with both physical issues in an old dog, frankly a lot annoyed at these ailments being used as a cover for a violent dog. October 2020 - Lexie is adopted for the final time. She remains with these owners. Lexie in final home - clearly adored December 31, 2023 - FFF posts on FB Lexie is celebrating her FIFTH Frostiversary!Lexie found herself at the San Diego Humane Society after an unfortunate accident that led to her biting her owner. She was 13 years old and was understandably scared and untrusting. We made her a Frosted Face, and for nearly two years, she divided her time between foster families, several adoptive families that didn't understand her needs, and onsite at our rescue, waiting for a family who would give her the time and space to learn to trust again. In October of 2020, \*** promised to love Lexie forever, and today, they are happy to be celebrating her fifth anniversary as a Frosted Face!"Lexie is a happy puppy. She loves walking in circles; my family calls it her "mall walk" since she does it for hours with no goal and it makes her happy. She smiles a lot and spends all of her time either sleeping on top of Peanut (her bichon sister), walking, staring at random objects, or looking for someone to feed her. Her vision is very impaired so she stood in front of a house plant once for a real long while thinking it was a person that would give her treats.She used to be Lexie the Biter but she'd never bite anyone now.* When I first adopted her, she'd bite my face and I'd have cuts all over my hands and arms and had to leave her leash on her indefinitely because she wouldn't let me near her face. But now, she loves being held, cuddled, she's so sweet that it's unbelievable. She's loving and patient and will lick your nose if she thinks you're close." Essentially, I think whatever was going on with this dog neurologically in 2019 with the seizures has likely increased - hence the 'mall walking' and other odd behaviors. And likely the reduction in aggression. Some aggressive dogs who survive their own violence long enough to grow old will develop forms of doggy dementia that reduce their aggression. Note - the current owners obviously dote on this dog and of course they do, she's adorable and we're hard-wired to bond with dogs. This isn't an attack on Lexie, this is pointing out that the rescue placed multiple people, including children, in harm's way through a series of highly unethical actions - disregarding info from the previous owner, choosing to interpret a bite as unimportant, ignoring the dog's behavior, blaming anyone who refuses to live with a dog which will bite them, considering it a win to have gotten people attacked and bitten for 2 years while forcing a nervous and unstable little dog to live in a variety of homes. That it worked out is not an excuse or a justification for their reckless behavior. People drink and drive and make it home without an accident every day. That's not an excuse or justification for drinking and driving. https://preview.redd.it/ip7qq3tsyb1d1.png?width=637&format=png&auto=webp&s=d8979817f6061791dc247c6ccaadb931f5577d27 Kelly and Andy Smíšek, Founders. https://preview.redd.it/0udyqbw5sb1d1.png?width=680&format=png&auto=webp&s=5abe115f69360be4072a2854610df016116e9547 https://preview.redd.it/bpkg9lrptb1d1.png?width=677&format=png&auto=webp&s=5132927f8e140c88c5545da3d5803c6477255d0b https://preview.redd.it/cnk7zbq9sb1d1.png?width=689&format=png&auto=webp&s=74314bb8bff6748dc69e3dce3bee749614d5cd1f The rescue which used a minor, an adolescent girl, to help transport Lexie on her "Freedom Ride," scornfully saying "Look at that liability!" about a photo of the child holding Lexie on her lap in a car. https://preview.redd.it/e0nrbbcqsb1d1.png?width=1002&format=png&auto=webp&s=c8de627f14d73a1ab6a81932b5bb323be1c8b320 https://preview.redd.it/g0xtw7hjsb1d1.png?width=1049&format=png&auto=webp&s=8f0cf300ced12c26ce0787489a9078d7dc953ca1 https://preview.redd.it/82pcpovnub1d1.png?width=679&format=png&auto=webp&s=f8cdf19913eb595516089310dab47e3a0eac87b0 https://preview.redd.it/izwtsv8orb1d1.png?width=586&format=png&auto=webp&s=1f5040e72b4db4b44206c7849ad5e89fccf26845 |
2024.05.19 08:53 Thundahcaxzd Disappointed with the direction they took Kingdom of the Planet of the Apes
2024.05.19 08:46 everything_is_stup1d this is my testimony
2024.05.19 08:27 alexa_tuning [ AVAILABLE ] CURRENT Practice Guidelines in Primary Care 2024 21st Edition by Jacob A. David Textbook Ebook PDF reddit. Publisher: McGraw Hill. eText ISBN 9781265692797 ISBN-13: 9781265690168 ISBN 1265690162
2024.05.19 07:53 scidsg Principles of a Tip Line Platform: A research-based way to evaluate whistleblower systems
Article Cover Showing List of Principles and Names of Researchers submitted by scidsg to HushLine [link] [comments] Thanks to the good work of academic researchers across the globe, we have a data-driven way to evaluate the quality of whistleblower software. The papers we’ve looked to for this article include:
1. Usability of the SoftwareManaged ServiceUsability is the linchpin of any good software system. No matter what your value proposition is — the most private, secure, or whatever — if your targeted audience cannot use the software, no amount of engineering genius will make a difference. As researcher Joakim Uddholm puts it: “The system must be usable for both whistleblowers and journalists. Whistleblowers must be able to use the system without the protection features getting too much in the way, and journalists must be able to use the system without it interfering too much with their work routines.” A key differentiator for Hush Line is that we’re a managed service, meaning you don’t have to host core infrastructure, operate dedicated networks, or hire specialists to start using the service. All a user needs to do to have an anonymous tip line is register an account. UI for Hush Line Registration page By providing a centralized service, we significantly reduce the risk of user error, making the service more consistent, predictable, and trustworthy. Email DeliveryHush Line can deliver messages directly to your email inbox. Users may enter their preferred SMTP information from Gmail or Riseup, for example, and any message submitted to their tip line will be delivered to their email account. Enabling users to set it and forget it makes using Hush Line effortless and integrates into the systems they’re already using.SMTP Hush Line Settings Clearnet and Tor AddressesHush Line is also available on both Clearnet and Tor Onion addresses. This approach is critical for users where Tor might be blocked or having anonymizing software on their device could be incriminating, like in the case of Ola Bini in Ecuador.Screenshot of Ola Bini’s tweet about his conviction. Since Hush Line can be accessed over a Clearnet address with the default browser already on your phone, your fingerprint will be the same as everyone else who just bought a new phone. Making PGP EasyBefore, using PGP meant adopting cumbersome workflows that even stumped journalists at the heart of the Snowden disclosures. Journalist Glenn Greenwald didn’t have PGP set up, and didn’t have the time to learn how to do it, resulting in Snowden not being able to securely contact him. Even Snowden forgot to send his PGP key to journalists when initially contacting them.Inbox view with Mailvelope browser extension. Hush Line attempts to solve this problem through our integration of Mailvelope, a powerful open-source browser extension for Chrome and Firefox that enables users to create keys, decrypt and encrypt message directly in their browser, and export their public PGP key. For tip line owners, once adding their PGP key to Hush Line, all messages are end-to-end encrypted by default and when a tip comes in, they can read it within the Hush Line app. For whistleblowers, this means they don’t need to do anything to send a secure, anonymous message. 2. Authenticity of the ReceiverVerification SystemHush Line has a verification system for journalists, organizations, activists, or other public figures. Verified accounts receive a special badge on their message submission page so that people submitting messages know they’re contacting the right person. To be verified, users must submit proper information to prove their identity or approval to represent a company.Submit Message page with a “Verified Account” badge. Opt-In User DirectoryUsers may opt-in to a public directory where others can find their address. The default tab is prioritized to make it easy to find verified users. The directory is searchable, and a whistleblower can have confidence of the validity of an address.Hush Line User Directory page Account ReportingThe verification system and user directories are two ways to help ensure the authenticity of the receiver, but to help ensure the platform’s health, we enable users who have logged in to report spam or abuse accounts. We will address reported accounts immediately to determine the best next steps, whether deleting the account, sending a warning message, or other appropriate methods.3. Plausible Deniability of the WhistleblowerNo DownloadsHush Line is accessible over a Clearnet address, so a user doesn’t have to download any new software to send an anonymous message. If someone wants to use a Tor-only tip line service on their mobile device, they must sign in to the Apple App Store or Google Play Store. To download Tor Browser, you need to provide a valid email address or phone number and possibly payment information, all considered personally identifiable information. Now that you’ve downloaded new software on your phone, your “fingerprint” has become unique to who you are. If you only have Robinhood, Tor Browser, Mastodon, Chrome, and Slack on your phone, the likelihood of someone else having only those same apps becomes less likely. If you have even 50 apps, your fingerprint will be more associated with you, possibly entirely unique. The more unique your fingerprint is, the less realistic a plausible deniability claim is.One-Way MessagingMost people fail to report information because they fear retaliation and the significant risks of whistleblowing. Hush Line is a one-way messenger explicitly designed to protect the individual submitting the message. If the person submitting a message feels comfortable enough to leave a contact method, they may or can submit a message without any further involvement.Account-Free for WhistleblowersSomeone submitting a message does not need to create an account to use the app. This crucial feature allows a whistleblower to reduce the trail of information they leave behind. No credentials can be found if you have no username or password to save. And since Hush Line requires no special software, a message can be submitted from any phone or computer, from a pubic library or internet cafe, for example.Success message after sending a message without an account. 4. Availability of the SystemCentralized ServicesBy providing a centralized service, Hush Line is more reliably available by only requiring a single system to be maintained and secured. Centralizing our services protects users by removing the responsibility of managing specialized infrastructure and following complex workflows, which, if done incorrectly, could have real-world implications.Decentralized systems help with censorship resistance (and Hush Line can also be self-hosted), but when there are tens, hundreds, or thousands of separate instances all disconnected from each other, there is no way to ensure the quality of those systems. What other software is on the server? Is it updated? Are any ports open? Who currently has or has had access? What hardware are they using? It’s impossible and foolhardy to assume that everyone will follow best practices consistently. An analogous example of the inherent risks of decentralization is from the Mastodon network — a decentralized version of Twitter where anyone can run an instance. The database for Kolektiva.social, a service tailored to anarchist users, was compromised. In 2023, the home of its admin was raided for an unrelated event, and the FBI seized an unencrypted database backup. Snippet from the Kolektiva admin account’s post after the raid. 5. Anonymity of the WhistleblowerLeaking IP AddressesTo make Hush Line accessible to as many people as possible, the app is available on a publicly accessible URL, which is what you might expect from any web service. However, when using a Clearnet URL, leaking a user’s IP address is a real possibility.To help defend against this, we scrub IP addresses from our access logs to minimize the risk of this happening when you use our app. To remove the possibility of IP leaks in high-threat scenarios, we deploy Hush Line as a Tor Onion service. Tor SupportTor is a network that anonymizes your internet browsing activity. It acts as a proxy by randomly routing your request through its network of relays, hiding who is making the request. Tor also has a feature called Onion Services. An Onion service makes a website or application accessible through a special .onion address that is only available through the Tor Browser.Message submission onion site. When using a regular browser like Chrome or Firefox, when you enter an address like hushline.app the browser needs to know the server address for that URL. A long chain of services helps make it possible, from your ISP to DNS services, the server running the app, and more to make it possible to type something memorable like hushline.app instead of remembering and entering 64.23.155.36. Just as the browser needs to know the IP address of the target web server, your IP address is also necessary to know where to send the information. Your IP address is essentially your customer ID for your internet service provider. All someone with the necessary authority needs to do is request the information of the owner of that IP, and your real identity is exposed. Onion services defeat this kind of threat because they don’t operate using the same DNS and IP protocols. Tor Browser is connected to the Tor anonymizing network, and so are the Onion services that exist within it. When someone uses a .onion address, the request from the browser to the server and back never leaves the Tor network, completely sidestepping IP leakage. To access Hush Line’s information site using our Onion address, enter `http://w25rxxn62dgix7qdbw4ot37m2y4ty7kxfrinspw4ce7jzse7pb6rhaqd.onion/\`, or to access the app’s Onion site, enter `http://ghj4vviaoccj4tj2r3ss52arbnchkfvs7uft4sgtrkuvdha5zjgo6yqd.onion\` in Tor Browser. Timing CorrelationTo know that two people are talking to each other, you don’t need to know the contents of their messages if you have enough metadata about the conversation. One such way to reveal important context about who might be talking to each other is to learn when the messages were sent. If there’s a flurry of activity from two accounts — one after the other, repeatedly, pausing at similar times, being active at similar times— someone analyzing the logs might assume those accounts are talking to each other.To address this, we do not timestamp messages or relate accounts in any way. An attacker with access to the server cannot relate two messages on the platform, which is largely irrelevant as Hush Line is designed as a one-way messenger. 6. Confidentiality and Integrity of the DisclosuresMessage EncryptionHush Line uses PGP for message encryption, making the key owner the only one technically able to read the decrypted messages. Messages are end-to-end encrypted using OpenPGP.js, meaning our server will never see the decrypted contents.Hush Line Inbox with an encrypted message. We’re proactive about communicating with senders and receivers about the importance of the tip line owner adding their public PGP key, and we discourage sharing sensitive information if the receiver doesn’t encrypt their messages. Unencrypted warning on a message submission page. HTTPSWe use Let’s Encrypt for HTTPS certificates. When a site uses HTTPS, requests use the TLS protocol to encrypt data in transit from the browser to the server and back. This protects your activity from being monitored or tampered with while using the app.For an attacker who can monitor network connections, instead of seeing which page you’re on or who you’re submitting a message to, the primary URL is only visible. So if a message submitter is on https://hushline.app/submit_message/artvandelay the recipient remains unobservable, and the only thing visible to a network snoop is https://hushline.app/. ConclusionThere are many tip-line solutions on the market, and it can be intimidating to choose the right one for you. We hope this article gives you a data-driven way to evaluate the software that fits your needs.Additional Research
Originally posted on Medium: https://medium.com/p/51beb8b05eb1 |
2024.05.19 06:56 NeuronsToNirvana Figures; Conclusions; Future directions Hypothesis and Theory: Chronic pain as an emergent property of a complex system and the potential roles of psychedelic therapies Frontiers in Pain Research: Non-Pharmacological Treatment of Pain [Apr 2024]
Despite research advances and urgent calls by national and global health organizations, clinical outcomes for millions of people suffering with chronic pain remain poor. We suggest bringing the lens of complexity science to this problem, conceptualizing chronic pain as an emergent property of a complex biopsychosocial system. We frame pain-related physiology, neuroscience, developmental psychology, learning, and epigenetics as components and mini-systems that interact together and with changing socioenvironmental conditions, as an overarching complex system that gives rise to the emergent phenomenon of chronic pain. We postulate that the behavior of complex systems may help to explain persistence of chronic pain despite current treatments. From this perspective, chronic pain may benefit from therapies that can be both disruptive and adaptive at higher orders within the complex system. We explore psychedelic-assisted therapies and how these may overlap with and complement mindfulness-based approaches to this end. Both mindfulness and psychedelic therapies have been shown to have transdiagnostic value, due in part to disruptive effects on rigid cognitive, emotional, and behavioral patterns as well their ability to promote neuroplasticity. Psychedelic therapies may hold unique promise for the management of chronic pain. Figure 1https://preview.redd.it/zgpjyihsdb1d1.jpg?width=945&format=pjpg&auto=webp&s=6ec6f8e4cab44213aa6330998ba8febd85f5315aProposed schematic representing interacting components and mini-systems. Central arrows represent multidirectional interactions among internal components. As incoming data are processed, their influence and interpretation are affected by many system components, including others not depicted in this simple graphic. The brain's predictive processes are depicted as the dashed line encircling the other components, because these predictive processes not only affect interpretation of internal signals but also perception of and attention to incoming data from the environment. Figure 2https://preview.redd.it/e9g8b5stdb1d1.jpg?width=1056&format=pjpg&auto=webp&s=83febb37a610bb6b01c5cec42be127b1dd72d7b3Proposed mechanisms for acute and long-term effects of psychedelic and mindfulness therapies on chronic pain syndromes. Adapted from Heuschkel and Kuypers: Frontiers in Psychiatry 2020 Mar 31, 11:224; DOI: 10.3389/fpsyt.2020.00224. 5 ConclusionsWhile conventional reductionist approaches may continue to be of value in understanding specific mechanisms that operate within any complex system, chronic pain may deserve a more complex—yet not necessarily complicated—approach to understanding and treatment. Psychedelics have multiple mechanisms of action that are only partly understood, and most likely many other actions are yet to be discovered. Many such mechanisms identified to date come from their interaction with the 5-HT2A receptor, whose endogenous ligand, serotonin, is a molecule that is involved in many processes that are central not only to human life but also to most life forms, including microorganisms, plants, and fungi (261). There is a growing body of research related to the anti-nociceptive and anti-inflammatory properties of classic psychedelics and non-classic compounds such as ketamine and MDMA. These mechanisms may vary depending on the compound and the context within which the compound is administered. The subjective psychedelic experience itself, with its relationship to modulating internal and external factors (often discussed as “set and setting”) also seems to fit the definition of an emergent property of a complex system (216). 6 Future directionsPsychedelic-assisted therapy research is at an early stage. A great deal remains to be learned about potential therapeutic benefits as well as risks associated with these compounds. Mechanisms such as those related to inflammation, which appear to be independent of the subjective psychedelic effects, suggest activity beyond the 5HT2A receptor and point to a need for research to further characterize how psychedelic compounds interact with different receptors and affect various components of the pain neuraxis. This and other mechanistic aspects may best be studied with animal models. Original Source |
2024.05.19 06:49 GT_Numble Canadian stoner food 🇨🇦🫎🥞
submitted by GT_Numble to stonerfood [link] [comments] |
2024.05.19 06:17 alexa_tuning [ AVAILABLE ] Anatomy & Physiology: An Integrative Approach 4th Edition Fourth Edition by Michael McKinley, Valerie O'Loughlin, Theresa Bidle - McGraw Hill Textbook Ebook PDF reddit. ISBN13: 9781264398867 ISBN13: 9781260265217 ISBN13: 9781264399086 ISBN10: 1260265218 ISBN 9781264265435
2024.05.19 05:39 entropyposting The babyproofing of the internet
2024.05.19 05:33 alexa_tuning [ AVAILABLE ] Research Design: Qualitative, Quantitative and Mixed Methods Approaches 6th Edition Sixth Edition by John W. Creswell, J. David Creswell Textbook Ebook PDF reddit. Supplier: SAGE Publications. eText ISBN 9781071817964 ISBN-13 9781071817940 ISBN-10 1071817949
2024.05.19 04:47 Pro-editor-1105 Excel VBA "response.txt not opening"
Sub GetCEONames() Dim scriptPath As String Dim apiKey As String Dim prompt As String Dim company As String Dim ceoName As String Dim i As Integer Dim lastRow As Long Dim responseFile As String Dim fileNum As Integer Dim responseText As String Dim json As Object Dim choices As Object Dim message As Object ' Set your OpenAI API key here apiKey = "my_api_key" ' Path to the AppleScript file scriptPath = "/Users/rajshah/Downloads/GetCEONames.scpt" ' Determine the last row with data in column B (assuming company names are in column B) lastRow = Cells(Rows.Count, 2).End(xlUp).Row ' Loop through each company name in column B For i = 2 To lastRow company = Cells(i, 2).Value ' Adjust the column number if necessary ' Create the prompt for GPT-4o prompt = "Who is the current CEO of " & company & "?" ' Construct the AppleScript command to save the response in a temporary file responseFile = "/Users/rajshah/Downloads/response.txt" Dim appleScriptCommand As String appleScriptCommand = "osascript " & Chr(34) & scriptPath & Chr(34) & " " & Chr(34) & apiKey & Chr(34) & " " & Chr(34) & company & Chr(34) ' Debug message to check the AppleScript command Debug.Print appleScriptCommand ' Run the AppleScript command using the Shell function On Error Resume Next Shell "sh -c " & Chr(34) & appleScriptCommand & Chr(34), vbWait If Err.Number <> 0 Then MsgBox "Shell command execution failed: " & Err.Description, vbCritical Exit Sub End If On Error GoTo 0 ' Debug message to check if the response file exists If Dir(responseFile) = "" Then MsgBox "Response file was not created: " & responseFile, vbCritical Exit Sub End If Debug.Print "Response file path: " & responseFile ' Read the response from the temporary file fileNum = FreeFile On Error GoTo FileError Open responseFile For Input As fileNum responseText = Input$(LOF(fileNum), fileNum) Close fileNum ' Debug message to check the response Debug.Print responseText ' Parse the JSON response Set json = JsonConverter.ParseJson(responseText) Set choices = json("choices") Set message = choices(1)("message") ceoName = message("content") ' Update the Excel sheet with the CEO name in column C Cells(i, 3).Value = ceoName ' Adjust the column number if necessary Next i MsgBox "CEO names updated successfully!" Exit SubFileError: MsgBox "Error accessing file: " & responseFile, vbCritical End Sub
on run {apiKey, company} -- Prepare the API request set openaiURL to "https://api.openai.com/v1/chat/completions" set model to "gpt-4o" set prompt to "Who is the current CEO of " & company & "?" set messages to "[{\"role\": \"system\", \"content\": \"You are a helpful assistant.\"}, {\"role\": \"user\", \"content\": \"" & prompt & "\"}]" set requestData to "{\"model\": \"" & model & "\", \"messages\": " & messages & "}" -- Perform the API request set curlCommand to "curl -X POST " & openaiURL & " -H \"Authorization: Bearer " & apiKey & "\" -H \"Content-Type: application/json\" -d '" & requestData & "'" try set response to do shell script curlCommand on error errMsg number errNum display dialog "Error: " & errMsg return end try -- Write response to file set responseFile to POSIX file "/Users/rajshah/Downloads/response.txt" try open for access responseFile with write permission set eof of responseFile to 0 write response to responseFile starting at eof close access responseFile on error errMsg number errNum close access responseFile error "Error writing to file: " & errMsg number errNum end tryend run
2024.05.19 04:12 pizzapillowfort FMH Master Doc
2024.05.19 03:45 tuckAND_roll I've become an adult...and I think my wife can read my mind.
2024.05.19 03:23 Sariel007 Why Are Tuna Crabs Swarming Off the Coast of San Diego? Scientists are perplexed by the massive group of crustaceans, but they suspect the animals were pushed north by strong ocean currents originating near Mexico.
submitted by Sariel007 to nature [link] [comments] |
2024.05.19 03:22 Sariel007 Why Are Tuna Crabs Swarming Off the Coast of San Diego? Scientists are perplexed by the massive group of crustaceans, but they suspect the animals were pushed north by strong ocean currents originating near Mexico
submitted by Sariel007 to environment [link] [comments] |
2024.05.19 03:22 Sariel007 Why Are Tuna Crabs Swarming Off the Coast of San Diego? Scientists are perplexed by the massive group of crustaceans, but they suspect the animals were pushed north by strong ocean currents originating near Mexico
submitted by Sariel007 to EverythingScience [link] [comments] |
2024.05.19 03:15 alexa_tuning [ AVAILABLE ] HDEV 5th Canadian Edition Fifth Edition by Spencer Rathus, Rebecca Rogerson - Cengage Textbook Ebook PDF reddit. eText ISBN: 9781778412011 ISBN: 9781774741078 ISBN: 9781778412042 ISBN: 9781778416477
2024.05.19 03:01 miceonparade [Braves] Tonight’s game against the San Diego Padres has been postponed due to inclement weather. We had been hopeful that we would find conditions suitable to play; however, after further consultation with the weather service, radar indicates unsuitable conditions for starting the game.
Tonight’s game against the San Diego Padres has been postponed due to inclement weather. We had been hopeful that we would find conditions suitable to play; however, after further consultation with the weather service, radar indicates unsuitable conditions for starting the game. This game has been rescheduled for Monday at 6:20 PM ET as part of a split doubleheader. A separate ticket is required for each game. submitted by miceonparade to AtlantaBraves [link] [comments] Monday’s originally scheduled 12:20 PM ET game will be played as planned. |