Www data on line

DOLV3 The Online Data Analytics Boot Camp allows you to learn from skilled instructors and gain real-world experience by collaborating with your peers on complex projects. Not only that, but you will also build a comprehensive portfolio along the way, giving you the confidence you need to tap into the industry. The ability to extract value from data is becoming increasingly important in the job market of today. Here, we look at the 9 best data science courses that are available for free online. Climate Data Online (CDO) provides free access to NCDC's archive of global historical weather and climate data in addition to station history information. These data include quality controlled daily, monthly, seasonal, and yearly measurements of temperature, precipitation, wind, and degree days as well as radar data and 30-year Climate Normals. Therefore, instead of searching for a way to recover data online, you can download MiniTool Power Data Recovery Free on your Windows 10/8/7 computer, and follow the 3 simple steps below to recover data from various storage devices. The whole .exe file is about 40MB. The whole download and install process only costs a few seconds. USER AUTHENTICATION Username: : Password: : Remember me Register What's on City-Data.com. We have over 74,000 city photos not found anywhere else, graphs of the latest real estate prices and sales trends, recent home sales, a home value estimator, hundreds of thousands of maps, satellite photos, demographic data (race, income, ancestries, education, employment), geographic data, state profiles, crime data, registered sex offenders, cost of living, housing ... Improving Access to Older Adult Health Data for Timely Use Amid COVID-19 and Beyond. Today marks the launch of the Older Adults Health Data Collection – a new resource cataloging over 200 Federal datasets previously available on Data.gov related to the health of older Americans. This centralized location will assist experts from academia, industry, government, civil society, and the public ... Welcome to Data Online, Oregon's Drinking Water Services data access site. Here you can access a fair amount of data on public water systems in Oregon. You can find data such as coliform testing, chemical testing, contacts, violations, enforcements, public notices, and basic system information. Online Data The Geologic Energy Management Division (CalGEM) is continually working toward improved electronic data management and transparency. In support of that, CalGEM has increased the availability of online data applications for industry operators and the public in recent years.

Data Is Beautiful

2012.02.15 00:45 zanycaswell Data Is Beautiful

A place to share and discuss visual representations of data: Graphs, charts, maps, etc.
[link]


2014.07.14 20:16 MrMonkeyKing Save Sally!!

Anything and everything Line Rangers related! Ask for help with strategies, stats, and trade usernames! Let's save Sally together and have fun!
[link]


2010.05.11 01:25 Aspencer8111 The un-official subreddit for all things AT&T!

Welcome to the Reddit community for all things AT&T. Get help, share your story with AT&T, and get to know some of the people responsible for helping deliver service to all your devices!
[link]


2020.09.24 13:09 howardnguyen714 Finalizing! Feedback appreciated :)

Build Help/Ready:

Have you read the sidebar and rules? (Please do)

Yes

What is your intended use for this build? The more details the better.

Mostly gaming. Other potentially noteworthy uses include:

If gaming, what kind of performance are you looking for? (Screen resolution, framerate, game settings)

Resolution: 2,560 x 1,440, ideally with headroom for 3440 x 1440 if I choose to upgrade my monitor at a later date
Framerate: Ideally 60 fps, but I'm okay with a little lower
Game settings: I'd like to be able to play most AAA titles on max settings for the next 4 years or so.

What is your budget (ballpark is okay)?

~$2,300 USD

In what country are you purchasing your parts?

United States. I live close enough to a Micro Center if that matters.

Post a draft of your potential build here (specific parts please). Consider formatting your parts list. Don't ask to be spoonfed a build (read the rules!).

PCPartPicker Part List
Type Item Price
CPU Intel Core i7-10700K 3.8 GHz 8-Core Processor Purchased For $323.67
CPU Cooler Corsair iCUE H115i ELITE CAPELLIX 97 CFM Liquid CPU Cooler $169.99 @ Best Buy
Motherboard Gigabyte Z490 AORUS ELITE AC ATX LGA1200 Motherboard Purchased For $161.84
Memory Corsair Vengeance RGB Pro 32 GB (2 x 16 GB) DDR4-3600 CL18 Memory $147.99 @ Newegg
Storage ADATA XPG GAMMIX S11 Pro 2 TB M.2-2280 NVME Solid State Drive $220.00
Video Card NVIDIA GeForce RTX 3080 10 GB Founders Edition Video Card $700.00
Case Corsair iCUE 4000X RGB ATX Mid Tower Case $119.99 @ Amazon
Power Supply Corsair AX 850 W 80+ Titanium Certified Fully Modular ATX Power Supply $265.98 @ Newegg
Operating System Microsoft Windows 10 Home OEM 64-bit $30.00
Case Fan Corsair iCUE SP120 RGB Pro 52 CFM 120 mm Fan $24.99 @ Amazon
Prices include shipping, taxes, rebates, and discounts
Total $2164.45
Generated by PCPartPicker 2020-09-24 06:39 EDT-0400

Provide any additional details you wish below.

While I know this build doesn't compromise all that much, I'd like some insight on cost cutting in the following areas:
Side note: I have already purchased the motherboard and CPU, but am open to returning them to Newegg if the benefit is worthwhile. I got those two as part of the bundle that included the new Avengers game.
Thank you!!!
NOTE: You do not have to follow this format, but please be sure to answer these questions. Please do not ask to simply be given a build. You are welcome to delete this section.
submitted by howardnguyen714 to buildapc [link] [comments]


2020.09.24 12:19 XhiyienJeong Texas Hold’em Strategy - 3 Easy Poker Strategies That Will Double cash

Texas Hold’em Strategy - 3 Easy Poker Strategies That Will Double cash

https://preview.redd.it/9kpymwpcn2p51.jpg?width=549&format=pjpg&auto=webp&s=d862f49427ffeaa44a4b62d25406de59d807bc57
If the two pair, but the board has three of a typical suit on it, may potentially move all-in, but for the air conditioning get called by a person with a flush, and if they’ve the Ah or Kh in their hand, may have also call if your shove is less when compared to size of the pot. Not many, nonetheless players will call your shove and draw together with flush whatever the pot odds, but it’s less recognizable.
5) Is vital to keep you just have the pay 1 work-time. Zero paying for anything. Including per acquire service extra charges. Or month to month free of cost. And accessing totally free games regarding PS3 ought to limitless.
For starters, you have to understand everything regarding your real estate services. Require identify crucial benefits for anyone when they choose you over another agent. This must come from the consumer’s point of view, not yours. So step through your shoes and into theirs.
Easy and also Online Blackjack Tip # 6: 21 is primary idea of goal within the game. Your cards must be close to 21 as you possibly can in order to win without looking into the count. So, stick with essentials and focus on 21. Do not copy or try to get over the dealer with his signature moves, stick to the rudiments.
So, there are a actually two most important steps of your own residence based line of work. First is to seek out a legitimate source and second is in order to locate a reliable work get. Once you have both of the aforementioned in your both hands, you will make them meet and and enjoy yourself. 텍사스홀덤사이트 Pay rates of different companies vary depending to the work nature, quantity function available, regarding employers they have, identified on. Therefore, you should first invest your plenty of to look for a betting bigdata entry company. Joining an average company costs you less than $50 only. Provide you with really reasonable and cheap price if you compare it with your own, home based, money-making business.
Mac OS X is a product like a behemoth ultimately software world with a positive change - when compared with not sunk, yet. Macintosh software boasts security features that allow no malware attack. There has been no known outbreak of virus attack on Macintosh software based systems even until today. Apple makes sure that their systems are updated with the security updates on the normal basis. Macintosh software isn’t very popular. Though it has more features and extremely powerful, not many people the idea. Now, Apple is approaching with dual boot features on Macs that will enable users to install Windows OS along with Macintosh system.
Unsurprisingly, it’s is big business within the business entire world. In the involving business intelligence, data can usually be separated into one of two gangs. The first group is transactional data. Transactional data is data collected around events such potential shopping, user journeys and logistics. Important group is interactional important info. Interactional data is data collected around interactions between adult men and women. Think social media profiles, videos and cds. The social media example above is an optimal example of interactional data files.
You may programming your product’s Hadoop database, however, you will be interacting along with IT teams who are. Talk about an opportunity in order for it team generating! You need to understand the particular system works so you are able to interpret what your database support team is a person.
submitted by XhiyienJeong to u/XhiyienJeong [link] [comments]


2020.09.24 11:04 OneSwap OneSwap Series 2 - How to configure smart contracts

In the process of program development, we are often faced with the following requirements:
  1. Static configuration: The source code should be developed to be versatile for different purposes through simple configuration.
  2. Dynamic configuration: During the program operation, change the behavior of the program by modifying some preferences
This article offers suggestions on how to meet the static and dynamic configuration requirements when developing smart contracts using the Solidity language.

Static configuration through constants

Among the static configuration methods well known to programmers, the macro in C/C++ is the oldest. The preprocessor reads the source code with macro definitions and converts it into source code without macro definitions. Because of the lack of type information, macros are inherently inadequate, and thus may bring along security risks when used to define literal values and implement conditional compilation. As an alternative, constants should be used to realize literal values, and constants and if-else for effects similar to conditional compilation.
After learning the lessons of C/C++, many programming languages, such as Java, C# and Golang, no longer support macros and preprocessors. The Solidity language does not support macros or preprocessors, either (https://github.com/ethereum/solidity/issues/10). Although a third-party preprocessor can be used to support macros, such as https://github.com/merklejerk/solpp, that is a rare case in practice.
Solidity provides the constant keyword to define constantsknown at compile time (hereinafter referred to as constants). The use of constants does not involve storage operations at all. In the source code of OneSwap, the constant constant is frequently used for configuration. For example, in OneSwapPair.sol:
 string private constant _NAME = "OneSwap-Share"; uint8 private constant _DECIMALS = 18; 
In the code, the name of the ERC20 token is set by the constant_NAME, and the effective number of decimal places after the decimal point is set by_DECIMALS. As long as these constants are modified, the code can be applied to different occasions.

Static configuration through persistent storage

Configuration through constants requires modifying the source code and recompiling to get the new bytecode before deployment. Sometimes we find this method not flexible, and hope to decide the value of the configuration at the time of deployment. This can be achieved by assigning values to persistent storage in the constructor. If the value of "constant" can be determined only when the contract is deployed (for example, passed in through the constructor), it can only be achieved through ordinary state variables before Solidity v0.6.5. Below is a code in OneSwapToken.sol:
 mapping (address => uint256) private _balances; uint256 private _totalSupply; string private _name; string private _symbol; uint8 private immutable _decimals; constructor (string memory name, string memory symbol, uint256 supply, uint8 decimals) public OneSwapBlackList() { _name = name; _symbol = symbol; _decimals = decimals; _totalSupply = supply; _balances[msg.sender] = supply; } 
The state variables_name,_symbol, and_decimals here are all assigned values only once in the constructor, and they are read-only during subsequent operations.

Static configuration through Immutable

As we know, the reading and writing of the contract state, that is, the reading and writing of storage, consumes a lot of gas. Therefore, when writing a contract, we should do everything possible to reduce (preferably to eliminate) storage reading and writing. State variables that are written only once are too wasteful of gas. The state variable immutable newly added by Solidity in v0.6.5 optimizes the condition that "a constant, once assigned in the constructor, is read-only during the subsequent operation". By modifying the bytecode during contract runtime when deploying the contract, the "constant" can be determined until the contract is deployed. For the convenience of discussion, we call the state variable immutable as an invariable. In the examples listed above, _decimals is an invariable.

The underlying implementation mechanism of the three static configuration methods

Constants and ordinary state variables are easier to understand. Now we will compare constants, invariables and ordinary state variables through a case study to discuss the realization principle of invariables.
The invariables are easy to use: just add the keyword immutable when defining a state variable, and assign value to it in the constructor. Note that you can only and must assign a value to an invariable when the contract is constructed, and only its value can be read when the contract is executed. At present, invariables can only be used to define value types, not structures or other types. For example, in the above example, _name and_symbol cannot be defined immutable. However, this restriction may be released in future versions of Solidity. Now we use a simple example contract to analyze the principle of invariables. The complete code is as follows:
pragma solidity =0.6.12; contract ImmutableDemo { uint256 private constant _f0 = 0x1234; uint256 private immutable _f1 = 0x5678; uint256 private immutable _f2; uint256 private _f3; constructor(uint256 f2) public { _f2 = f2 & 0xABCD; _f3 = 0xEFEF; } function addF0(uint256 x) external pure returns (uint256) { return (x + _f0) & 0xFFFFFF00; } function addF1(uint256 x) external view returns (uint256) { return (x + _f1) & 0xFFFFFF01; } function addF2(uint256 x) external view returns (uint256) { return (x + _f2) & 0xFFFFFF02; } function addF3(uint256 x) external view returns (uint256) { return (x + _f3) & 0xFFFFFF03; } } 
The contract defines a total of 4 variables. Among them, _f0 is a known constant at compile time, _f1 and _f2 are invariables, and _f3 is an ordinary state variable. The value of _f1 is determined at compile time, and the value of _f2 is calculated through the parameters passed to the constructor when the contract is created. The value of _f3 is initialized when the contract is created. In addition to the constructor, the contract also defines 4 external methods. To facilitate the observation of the compiled bytecode of the contract, we used some special constants in these methods and performed simple calculations. In addition, the logic of these methods is very simple.
Compile the above contract using solc (v0.6.12), and we can get the contract bytecode. The complete contract bytecode is also called the creation bytecode of the contract. It is mainly divided into two parts. The first half is the bytecode executed when the contract is deployed, and the second half is the runtime bytecode of the contract. The constructor of the contract will be compiled to the first half and executed when the contract is deployed for such operations as contract state initialization. After the bytecode is created, the runtime bytecode of the contract will be returned.
Note that for the contract creation bytecode, the runtime bytecode is just normal data. The contract creation bytecode can return the runtime bytecode intact (directly on the chain), or it can be modified arbitrarily and then returned (for example, by injecting the actual value of the invariable. See below for details). For more information on the contract bytecode, please refer to this article, and for more information on contract deployment, please refer to this article.
The compiled bytecode (creation bytecode) of our sample contract totals 673 (0x2A1) bytes, as shown below:
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 
The runtime code of the contract starts from the 134th (0x86) byte and totals 539 (0x21B) bytes, as shown below:
0x608060405234801561001057600080fd5b506004361061004c5760003560e01c8063091ecb4e146100515780632183283914610093578063648dfa46146100d55780637217d1a014610117575b600080fd5b61007d6004803603602081101561006757600080fd5b8101908080359060200190929190505050610159565b6040518082815260200191505060405180910390f35b6100bf600480360360208110156100a957600080fd5b810190808035906020019092919050505061016d565b6040518082815260200191505060405180910390f35b610101600480360360208110156100eb57600080fd5b810190808035906020019092919050505061019f565b6040518082815260200191505060405180910390f35b6101436004803603602081101561012d57600080fd5b81019080803590602001909291905050506101d1565b6040518082815260200191505060405180910390f35b600063ffffff006112348301169050919050565b600063ffffff017f00000000000000000000000000000000000000000000000000000000000000008301169050919050565b600063ffffff027f00000000000000000000000000000000000000000000000000000000000000008301169050919050565b600063ffffff03600054830116905091905056fea2646970667358221220f2e74694c1ee966e6985b7d31032343ce592dc88a10f9359fa6a42fdbeff1cbe64736f6c634300060c0033 
Below we will carefully analyze these two bytecodes to see how the invariables work.

Gas consumption of different configurations

Let's first look at the runtime bytecode of the contract. For the convenience of observation, the assembly code of the contract will be shown below. Long as the assembly code of the contract is, we can be sure that the logic of the constructor is not in the runtime bytecode according to the special constant value in the source code, and thus can easily find the assembly code of the four external methods. Most of the assembly code is omitted here, but only the important parts of the 4 external methods:
... [345] JUMPDEST [346] PUSH1 0x00 [348] PUSH4 0xffffff00 [353] PUSH2 0x1234 [356] DUP4 [357] ADD [358] AND ... [365] JUMPDEST [366] PUSH1 0x00 [368] PUSH4 0xffffff01 [373] PUSH32 0x0000000000000000000000000000000000000000000000000000000000000000 [406] DUP4 [407] ADD [408] AND ... [415] JUMPDEST [416] PUSH1 0x00 [418] PUSH4 0xffffff02 [423] PUSH32 0x0000000000000000000000000000000000000000000000000000000000000000 [456] DUP4 [457] ADD [458] AND ... [465] JUMPDEST [466] PUSH1 0x00 [468] PUSH4 0xffffff03 [473] PUSH1 0x00 [475] SLOAD [476] DUP4 [477] ADD [478] AND ... 
Obviously,
  1. PC (Programm Counter) is the assembly code of the addF0() function starting from 345, and the compile-time constants are compiled into PUSH2 instructions (PC is 353).
  2. The PC from 365 is the assembly code of the addF1() function. The invariable _f1 is compiled into PUSH32 instructions (PC is 373), and the immediate value is 0.
  3. The PC from 415 is the assembly code of the addF2() function. The invariable _f2 is also compiled into PUSH32 instructions (PC is 423), and the immediate value is 0.
  4. PC from 465 is the assembly code of the addF3() function, and ordinary state variables are compiled into SLOAD instruction (PC is 475).
It can be seen that in the runtime bytecode of the contract, the invariable is compiled into a PUSH instruction (the specific instruction depends on the number of bytes occupied by the invariable). But the immediate value of the instruction, which is 0, only serves as a placeholder. The creation bytecode of the contract must properly handle the immediate value of the PUSH instruction corresponding to each invariant, and replace it with the actual value, which will be further analyzed below.
Like constants, invariables are compiled into PUSH instructions, so they both consume the same gas, much lower than the gas consumed by ordinary state variables (SLOAD consumes 800 gas).

Implementation of immutable variables: Modify bytecode on the chain

Compared to the runtime bytecode of the contract, creation bytecode is a bit more complicated, so we need a form that facilitates observation. With the online disassembler provided by https://www.trustlook.com/services/smart.html, we can disassemble the bytecode into a relatively easy-to-understand pattern. The following is the disassembly result of the contract creation bytecode:
contract disassembler { function main() public return () { mstore(0x40,0xC0); mstore(0x80,0x5678); var0 = msg.value; require(!msg.value); var1 = (code.size - 0x2A1); callcodecopy(0xC0,0x2A1,(code.size - 0x2A1)); mstore(0x40,((code.size - 0x2A1) + 0xC0)); require((0x20 < (code.size - 0x2A1))); temp0 = (0xC0 + var1); temp1 = mload(0xC0); mstore(0xA0,(temp1 & 0xABCD)); sstore(0x0,0xEFEF); temp3 = mload(0x80); temp2 = mload(0xA0); callcodecopy(0x0,0x86,0x21B); mstore(0x1A8,temp2); mstore(0x176,temp3); RETURN(0x0,0x21B); } } 
Compared with the bytecode and assembly code, it is already an improvement. Still hard to understand? Don't worry. We will add comments to the disassembly code above, remove the irrelevant code, rename some variables, and explain each line of code in detail.
 function main() public return () { mstore(0x40,0xC0); // m[0x40] = 0xC0 mstore(0x80,0x5678); // m[0x80] = 0x5678 require(!msg.value); 
Line 1 above: The compiler reserves 0xC0 bytes of memory, and records this number in memory 0x40. Line 2: Record 0x5678 in memory 0x80. Line 3 has nothing to do with the discussion in this article and can be ignored.
 argsLen = (code.size - 0x2A1); callcodecopy(0xC0,0x2A1,argsLen); // m[0xC0] = args mstore(0x40,(argsLen + 0xC0)); // m[0x40] = 0xC0 + argsLen require((0x20 < argsLen)); 
Line 1: When the contract is deployed, the parameters passed to the constructor (after ABI encoding) will be spliced behind the bytecode. We can obtain the total length of the code after adding the parameter with the CODESIZE instruction, and, after subtracting the real code length 0x2A1, get the length of the parameter. Line 2: Copy the incoming parameters to 0xC0 in the memory. Line 3: Update the number of memory usage. Line 4: Ensure the length of the incoming parameter is sufficient.
 f2 = mload(0xC0); // f2 = m[0xC0] mstore(0xA0,(f2 & 0xABCD)); // m[0xA0] = f2 & 0xABCD sstore(0x0,0xEFEF); // _f3 = 0xEFEF 
Line 1: Load the parameter f2 that has been loaded into the memory onto the operand stack. Line 2: Perform a bitwise AND operation between f2 and 0xABCD, and then record it in memory 0xA0. Line 3: Initialize the state variable_f3.
 _f1 = mload(0x80); // _f1 = m[0x80] = 0x5678 _f2 = mload(0xA0); // _f2 = m[0xA0] = f2 & 0xABCD callcodecopy(0x0,0x86,0x21B); // m[0x00:] = code[0x86: 0x86+0x21B] mstore(0x1A8,_f2); // m[0x01A8] = _f2 mstore(0x176,_f1); // m[0x0176] = _f1 RETURN(0x0,0x21B); } 
The first and second lines above load the values at memory 0x80 and 0xA0 onto the operand stack. These two temporary variables record the actual values of _f1 and _f2. Then the value previously placed in memory is completely useless, so on the third line all the runtime bytecodes are copied to memory 0. On Lines 4 and 5, the immediate placeholders of PUSH instructions of two invariables in the runtime bytecode (located at 0x0176 and 0x01A8 in the runtime bytecode, respectively) are replaced with actual values. At this point, the runtime bytecode is ready, and then returns on Line 6 through the RETURN instruction. The following is the complete disassembly code after being adjusted with comments:
contract disassembler { function main() public return () { mstore(0x40,0xC0); // m[0x40] = 0xC0 mstore(0x80,0x5678); // m[0x80] = 0x5678 require(!msg.value); argsLen = (code.size - 0x2A1); callcodecopy(0xC0,0x2A1,argsLen); // m[0xC0] = args mstore(0x40,(argsLen + 0xC0)); // m[0x40] = 0xC0 + argsLen require((0x20 < argsLen)); f2 = mload(0xC0); // f2 = m[0xC0] mstore(0xA0,(f2 & 0xABCD)); // m[0xA0] = f2 & 0xABCD sstore(0x0,0xEFEF); // _f3 = 0xEFEF _f1 = mload(0x80); // _f1 = m[0x80] = 0x5678 _f2 = mload(0xA0); // _f2 = m[0xA0] = f2 & 0xABCD callcodecopy(0x0,0x86,0x21B); // m[0x00:] = code[0x86: 0x86+0x21B] mstore(0x1A8,_f2); // m[0x01A8] = _f2 mstore(0x176,_f1); // m[0x0176] = _f1 RETURN(0x0,0x21B); } } 

Combining proxy mode and static configuration

As mentioned earlier, the value of the invariable is determined when the contract is constructed and injected into the runtime bytecode of the contract, so the gas consumed by the invariable reading during the contract runtime is the same as that consumed by the constant. OneSwap mainly includes 7 contracts, most of which use invariables. Take OneSwapPairProxy as an example:
contract OneSwapPairProxy { uint internal _unlocked; uint internal immutable _immuFactory; uint internal immutable _immuMoneyToken; uint internal immutable _immuStockToken; uint internal immutable _immuOnes; uint internal immutable _immuOther; constructor(address stockToken, address moneyToken, bool isOnlySwap, uint64 stockUnit, uint64 priceMul, uint64 priceDiv, address ones) public { _immuFactory = uint(msg.sender); _immuMoneyToken = uint(moneyToken); _immuStockToken = uint(stockToken); _immuOnes = uint(ones); uint temp = isOnlySwap ? 1 : 0; temp = (temp<<64) stockUnit; temp = (temp<<64) priceMul; temp = (temp<<64) priceDiv; _immuOther = temp; _unlocked = 1; } receive() external payable { } fallback() payable external { /* code omitted */ } } 
Similar to Uniswap, OneSwap's Pair contract is created by the Factory contract. The difference is that OneSwap adopts a proxy model in order to minimize the gas consumption when a Pair is created. Considering the complex logic of Pair and the gas-consuming deployment, OneSwap puts this part of the logic in the OneSwapPair contract which needs to be deployed only once. The Factory deploys the OneSwapPairProxy contract each time, which forwards all actual operations to OneSwapPair for processing. With the proxy mode, OneSwap also supports the upgrade of the Pair logic. In addition, to benefit from both the invariable and proxy mode at the same time, the OneSwap project has also explored the "Immutable Forwading" mode, which we will specifically introduce in a follow-up article.

Dynamic configuration of the contract

Constants must be valued when the contract is compiled, and invariables must be valued when the contract is constructed. That is static configuration. Common state variables can be modified after contract deployment, which is dynamic configuration. It is advised to limit the modification of important configurations to privileged accounts or governance contracts only. For example, the maintenance of the mainstream token list of the BuyBack contract follows this mode, and the list can only be configured by the ONES issuer:
contract OneSwapBuyback is IOneSwapBuyback { mapping (address => bool) private _mainTokens; address[] private _mainTokenArr; ... // Other codes omitted function addMainToken(address token) external override { require(msg.sender == IOneSwapToken(ones).owner()); if (!_mainTokens[token]) { _mainTokens[token] = true; _mainTokenArr.push(token); } } function removeMainToken(address token) external override { require(msg.sender == IOneSwapToken(ones).owner()); if (_mainTokens[token]) { _mainTokens[token] = false; uint256 lastIdx = _mainTokenArr.length - 1; for (uint256 i = 0; i < lastIdx; i++) { if (_mainTokenArr[i] == token) { _mainTokenArr[i] = _mainTokenArr[lastIdx]; break; } } _mainTokenArr.pop(); } } } 
The feeBPS and pairLogic variables of the OneSwapFactory contract are configured through the OneSwapGov contract. The feeBPS variable is read by the OneSwapPair contract to control the fee rate. The pairLogic variable is read by the OneSwapProxy contract. This variable and dynamic configuration is a major contributor to the negligible gas consumed by the Pair deployment and upgradeable Pair logic of the OneSwap project.

Conclusion

This article summarizes the two configuration methods of smart contracts: static configuration and dynamic configuration, and introduces several protection modes of dynamic configuration: privilege modification mode and governance mode. Static configuration can be realized through constants and invariables, and dynamic configuration through ordinary state variables. It also goes deep into the implementation of invariables at the EVM bytecode level.
Before Solidity v0.6.5, the constant value that could be determined when the contract was constructed could only be expressed by the state variable of the contract. Writing state variables during contract creation requires considerable Gas, and reading state variables during contract execution also consumes a lot of Gas (compared to PUSH instructions of the constant). The immutable state variable introduced in Solidity v0.6.5 effectively solves this problem by modifying the contract runtime bytecode (replacing placeholders) when the contract is deployed. In OneSwap, we used immutable state variables as much as possible, and also explored the "Immutable Forwading" mode, which is one of the reasons for the low Gas consumption in OneSwap. In subsequent articles, we will introduce more details on the implementation of the OneSwap project.

References

submitted by OneSwap to defi [link] [comments]


2020.09.24 10:53 GuessRemarkable 2 Steps to No-Code Web Scraping Into Webflow CMS - 2020

As of 2020, there are more than 2 Billion websites offering something or the other. Out of those, only a handful of them has achieved success by engaging visitors and gaining popularity overtime. As someone rightly said, the day a website goes on a consistent 3-month upward trend of returning visitors, victory is near!
Q: So what's unique among such sites?
A: Great engaging content.
Without a doubt, the website's content remains the most crucial factor to pull a lot of traffic and ensure that you have returning visitors. Quite more than often, Webmasters extract relevant data through Web Scraping from multiple sources on the internet to offer a wide range of information on top of their own content.
Here is a web scraping tutorial to help you understand using Byteline's No-Code Platform to leverage the web's full potential and generate an informational widget for your site in less than a minute - without writing a line of code.

What is Web Scraping?

Web Scraping refers to the process of mining data from an external source (usually another website) and then exported in a format of your own choice. The process essentially involves a Web Scraper Tool (for instance, Byteline) through a text transfer protocol to crawl the source website's data, reformat it and integrate through a widget as an additional topping on a different webpage.
Successful businesses use Web Scraping for several uses including the following:
  1. News alert ticker
  2. Weather update
  3. Recent job postings of target companies
  4. Price changes, comparisons and offers
  5. Social media data extraction for market research
  6. ..and several others.
Web Scraping can be done manually, however, a consistent manual task gets overwhelming even to scrape a small piece of data. On the other hand, while there are several automated Web Scraping tools available, Byteline offers a unique No-Code Web Scraping Platform requiring ZERO programming knowledge to operate and scrape data from a source of your choice.
With Byteline, you get:
  1. an automated Web Scraping to crawl any arbitrary website and extract data
  2. integrate in 2 simple steps without writing a line of code
  3. easily configure data through an intuitive GUI
  4. scrape data from website to Excel, CSV, Airtable, Dropbox, Email and more
  5. manage Page Scrolling and Pagination easily
  6. super quick integration with different automation flow components.

Using Byteline Web Scraper Tool for a Webflow CMS

With the following two steps, you can easily scrape data from a source website through a straightforward UI and feed into your Webflow CMS. Not only that, Byteline also helps you scrape data from a website to Excel and CSV, which can further be consumed by Gmail, Box and several other services.
Prerequisites
For this tutorial, we are taking an example of extracting job posts from Dice.com to be exported into a Webflow CMS.
Step 1
a) After logging to your Byteline account, visit the Web Scraper section to start a New Scrape. Enter the URL of your source site, in this case, its https://www.dice.com/jobs?q=developer
Quick Tip: Ensure that you input the exact page URL consisting of the required data, instead of the home page URL
After entering the URL, the source site's results show up with rendered data.
b) Select elements of your choice from the rendered data and assign them a name. As shown in the video, we selected the Job Title, Job Location and Job Description from the rendered data.
https://www.youtube.com/watch?v=8NX5P_G2-80&feature=share
Step 2
a) Once elements are selected and assigned a name, click on Next to reach the Preview page. Once you confirm everything is as expected, click on Sync to Webflow CMS.
b) This takes you to the last tread by choosing how often you would like this scraper to run. If it's a one-time scrape, you may ignore this part or may schedule to repeat the scraping as per your preference.
Can it be more straightforward than this?

Summing-up

With Web Scraping, there are endless possibilities. A successful Web Scraper knows which data his users might be interested in, and which blends well to his site's niche. Consider this to be similar to a Pizzeria offering a different pizza topping per slice.
With Byteline's No-Code Web Scraper Tool, you can easily and quickly extract data to blend into a Webflow CMS content without the knowledge of any programming language.
Let us know interesting ideas or something that you did through Web Scraping in your comments below.
This article was originally published on https://www.byteline.io/blog/2-steps-to-no-code-web-scraping-into-webflow-cms-2020 and has been authorized by Byteline for a republish.
submitted by GuessRemarkable to webscraping [link] [comments]


2020.09.24 10:45 Vampyricon I decided to graph the gaps between Etho's uploads

We all know Etho doesn't have an upload schedule, but I decided to do it anyway. You might remember u/IKnowATonOfStuffAMA did the same thing a while back, but his was a lot broader, including which day of the week Etho uploads on, and which day of the month he uploads on, and only concentrated on the last 300 videos as of his post. What I did was I took all 2374 of his videos as of this moment and only plotted out how many days there are between each upload. Here are the results:
https://imgur.com/a/m27nj5b
The titles aren't entirely accurate. A more accurate title would be "The number of uploads on the N-th day after a previous upload", but as we can see, daily uploads were the norm no matter whether we count all the videos or only those from the last 5 years (same date as his latest upload, only in 2015), 2-day uploads started becoming more common starting 3 years ago (ditto, 2017), until you count only the last year, when 3- and 4-day uploads became the most common.
What I did was the same thing as u/IKnowATonOfStuffAMA, using youtube-dl to grab the data from Etho's uploads playlist. I had to use the command ./youtube-dl.exe -J -j https://www.youtube.com/playlist?list=UUFKDEp9si4RmHFWJW1vYsMA tee output.txt though, since I was using bash in the command line. From that, you get the raw data.
Now I am a total amateur, despite having some amount of experience in shell scripts and bash (mostly from modifying seniors' codes in our research project), and the people on the SlateStarCodex discord were really helpful in this regard. Here's the link to the Google Drive with the stuff I used: https://drive.google.com/drive0/folders/1umaoui-clNxoPNcECfaw1KmdliL3exgT (tell me if you can't access it)
upload_dates.sh is the shell script used to extract the upload date data from output.txt, which is where I had the most help. Running upload_dates.sh gives you data.csv, which you can open in Excel. Through a bit of googling, you can learn how to turn the 8-digit date (e.g. 20200924) into something Excel would recognize as a proper date (e.g. 2020-09-24), and then you can subtract them to find how many days after the previous video the video was uploaded. Then you can look at the dates and pick out however long the period it is you want. (Side note: The video 3 years ago from the latest upload was Battle Bane.)
The code was ran much faster than I expected. It probably didn't even take 10 minutes, if you don't count the setup and installing its dependencies. So that's that. Hope that satiates your curiosity.
submitted by Vampyricon to ethoslab [link] [comments]


2020.09.24 10:09 FinalGamer14 Turnkey jailed (chrooted) SFTP

I'm having a bit of a problem setting up a jailed SFTP connection to only one directory.
A project I'm working on for a client has to have SFTP access to few directories in the media directory of some syncing service. This is my first time setting up jailed SFTP connection, so I followed few tutorials on the internet, one of them being the official Turnkey forum.
My setup and what I need:
The directory they need to access is located in /vawww/sync/web/media, in here there are multiple directories. The media directory is owned by root (root:root) and permissions are set to 755, while the directories inside, are owned by www-data (www-data:www-data) these also have write permissions added to the group (g+w). I need the www-data user to have access to these directories, because the website also needs access to them.
My user is called uploader and they are also part of www-data group, their shell is set to /bin/false, and their home directory is set to /vawww/sync/web/media.
I've configured the sshd_config like this:
First changed Subsystem to Subsystem sftp internal-sftp
Next added this:
Match user uploaderForceCommand internal-sftpPasswordAuthentication yesChrootDirectory /vawww/sync/web/mediaPermitTunnel noAllowAgentForwarding noAllowTcpForwarding noX11Forwarding no
When I try and comment out ChrootDirector the user can sftp onto the container, but without that they are not jailed. When the line is not commented out, I get client_loop: send disconnect: Broken pipeerror in the terminal.
Now since this is my first time doing it, I might have done something really dumb. So I'd really need help.
Thank you in advanced.
Edit: The problem is solved. For anyone who might have the same problem, make sure all directories leading to the chroot directory are only owned by root (root:root) and make sure that for all of them the root is the only user who can write in them (chmod 755 ). This is what fixed it for me.
submitted by FinalGamer14 to sysadmin [link] [comments]


2020.09.24 10:00 TradeFlags Hourly News Update

🤖 Mean Polarity = 0.04 Mean Subjectivity = 0.24
SPX 3225.0 NASDAQ 10793.75 DOW 26631.0 OIL 41.97
submitted by TradeFlags to tradeflags [link] [comments]


2020.09.24 09:29 yanghm Specification of chicken gizzard peeling machine

Chicken gizzard peeling machine slaughterhouse equipment for sale is made of stainless steel. This machine is using gear motor drives the cutter rotating to peel the gizzard off. Chicken gizzard peeling machine for exporter standard mainly used for 10 pcs chickens after slaughtered for automatic removal feathers ,it can be off feathers by a one-time, the small feathers and the claws with skin dirt can take offer very clearly , so that the work of people from the dirty and tired of the manual labor freed, greatly improve work efficiency.
Chicken gizzard peeling machine for exporter standard: it is used for peeling yellow skin of chicken gizzard. It drives the screw to peel the gizzard on the roller through the decelerating motor to make it rotate relatively, so as to meet the requirements of removing yellow skin of chicken gizzard.

Specification of chicken gizzard peeling machine
1.Material adopted in Chicken Slaughter Poultry Processing Equipment
Main Material is 304 Standard and for the supporting part ,we made them of 304 stainless steel to ensure the quality of the machines and the safety of meat the machine touched,except the some spare parts.The meat produced from our slaughter line reaches international market standard.

2.The standard of our Chicken Slaughter Poultry Processing Equipment
Our Design accords to China National Standards and the demand of the clients as well. From the experiences of many slaughter lines we installed both in domestic and overseas,such as Russia, U.A.E, Egypt, Malaysia etc., the availability of our Slaughter Processing lines has been approved.

  1. Chicken gizzard peeling machine for exporter standard technology data of Chicken Slaughter Poultry Processing Equipment

Machine material of chicken gizzard peeling machine
1.Versatile stainless steel, which is widely used in the manufacture of equipment and components that require good overall performance (corrosion resistance and formability)
  1. Rubber processing made of elastic, insulating, impermeable and air materials, rubber products are widely used in industrial or life aspects
  2. Chicken plucker made of stainless and rubber is very convenient for adjust and the angle when you need.

Features of chicken gizzard peeling machine
  1. This equipment specializes in chicken gizzard skin removing.
  2. Using chain transmission. The motor drives the spiral gizzard rollers, making it achieve relatively rotate, to peel gizzard. The effect is pretty good.
3.It adopts stainless steel 304 or 201 material with long service life.
  1. Reasonable design, compact structure, convenient operation, stable performance.
submitted by yanghm to u/yanghm [link] [comments]


2020.09.24 06:00 TAMExSTRANGE69 Week 4 Match-up Preview Thread: #5 Oklahoma Sooners vs. Kansas State Wildcats

#5 Oklahoma vs. Kansas State
When: Saturday, September, 26, 12:00 PM Eastern
Where: Memorial Stadium (Norman, OK) - Norman, OK
Watch: Fox
Odds: Oklahoma by 27.5 pts.
Total Points: 60.5
All-Time Series : Oklahoma vs. Kansas State
Oklahoma and Kansas State have met 100 times since 10/20/1908.
These teams last met 333 days ago on 10/26/2019.
Series Wins: Oklahoma 76-4-20 Kansas State
Longest streak of continuous meetings: 79 (1919-1997).
Kansas State has won the most recent meeting (2019) in this series.
Last 6 Meetings
Winner Date Location Oklahoma Kansas State Notes
Kansas State 2019-10-26 Manhattan, KS 41 48
Oklahoma 2018-10-27 Norman, OK 51 14
Oklahoma 2017-10-21 Manhattan, KS 42 35
Oklahoma 2016-10-15 Norman, OK 38 17
Oklahoma 2015-10-17 Manhattan, KS 55 0
Kansas State 2014-10-18 Norman, OK 30 31
Series Comparison Data via Winsipedia
Through Week 3
Week Oklahoma 1-0(0-0) Result Kansas State 0-1(0-0) Result
1 BYE N/A BYE N/A
2 Missouri State 0-1(0-0) W 48-0 Arkansas State 1-1(0-0) L 31-35
3 BYE N/A BYE N/A
All rankings reflect the current /cfb poll
Oklahoma Injury Report
Data Scraped: 2020-09-23 20:00:03
Player Position Status Reported Notes
Gabe Brkic PK Ques Sat – Undisclosed Mon, Sep 21 Brkic was held out of the previous game with an unspecified ailment, and it remains to be seen if he will be on the field for Saturday’s game against Kansas State.
Marcus Stripling DE Ques Sat – Undisclosed Mon, Sep 21 Stripling sat out the last game with an unspecified ailment, and it has yet to be determined if he will be in the lineup against Kansas State on Saturday.
T.J. Pledger RB Ques Sat – Undisclosed Mon, Sep 21 Pledger missed the previous game with an unspecified ailment, and it has yet to be established if he will line up Saturday against Kansas State.
Obi Obialo WR Ques Sat – Undisclosed Mon, Sep 21 Obialo was absent from the lineup during the last game with an unspecified ailment, and it is undetermined if he will take the field against Kansas State on Saturday.
Brayden Willis HB Ques Sat – Undisclosed Mon, Sep 21 Willis was held out of the previous game with an unspecified ailment, and it is uncertain if he will be available for Saturday’s contest against Kansas State.
Drake Stoops WR Ques Sat – Undisclosed Mon, Sep 21 Stoops sat out the last game with an unspecified ailment, and it is unknown if he will suit up against Kansas State on Saturday.
Ronnie Perkins DE Out Indefinitely – Suspension Sat, Sep 12 Perkins is serving a suspension of unknown length after failing a drug test.
Anton Harrison OL Ques Sat – Undisclosed Mon, Sep 21 Harrison missed the previous game with an undefined ailment, and it is unclear if he will play in Saturday’s tilt against Kansas State.
Jadon Haselwood WR Out Indefinitely – Knee Tue, Sep 1 Haselwood is sidelined due to a torn ACL in his right knee, and there is no timetable for return.
Trejan Bridges WR Elig Oct 31 – Suspension Sat, Aug 29 Bridges is serving a six-game suspension for failing a previous drug test. He missed the final game last season and will not be eligible to return until Oct. 31 versus Texas Tech.
Justin Harrington DB Out For Season – Knee Thu, Aug 27 Harrington tore his ACL, signaling that he will miss the entire season.
Marcus Hicks DL Out Indefinitely – Achilles Thu, Aug 27 Hicks is sidelined after undergoing surgery to fix a left Achilles injury, and the severity of the ailment is unknown.
Chris Murray OL Out For Season – Eligibility Wed, Aug 26 Murray will sit out the entire 2020 season due to NCAA eligibility rules.
Caleb Kelly LB Out Indefinitely – Knee Tue, Aug 25 Kelly sustained a knee injury that will keep him out of the lineup for an unknown length of time.
Rhamondre Stevenson RB Out Indefinitely – Suspension Tue, Aug 25 Stevenson is serving a suspension for an undetermined length of time after testing positive for a drug test.
Jalen Redmond DL Out For Season – Personal Sat, Sep 12 Redmond has opted out of the 2020 season for personal reasons.
Injury data lifted from: boydsbets.com
Kansas State Injury Report
Data Scraped: 2020-09-23 20:00:03
Player Position Status Reported Notes
Noah Johnson OL Ques Sat – Elbow Mon, Sep 21 Johnson was forced from the previous game with an elbow injury. It remains to be seen if he will be available for Saturday’s tilt against Oklahoma.
Skylar Thompson QB Ques Sat – Undisclosed Tue, Sep 22 Thompson is bothered by an unspecified injury, and it is undetermined if he will dress for Saturday’s battle with Oklahoma.
Wayne Jones DB Ques Sat – Concussion Mon, Sep 21 Jones exited the last game due to concussion-like symptoms. It is unknown if he will suit up Saturday against Oklahoma.
Joshua Youngblood WR Ques Sat – Undisclosed Mon, Sep 21 Youngblood sat out the previous game with an unspecified injury, and it is unclear if he will suit up against Oklahoma on Saturday.
Joe Ervin RB Out For Season – Personal Thu, Sep 10 Ervin has informed the program that he will not take part in the 2020 season due to concerns about the virus.
Thomas Grayson RB Out For Season – Personal Thu, Sep 10 Grayson has opted-out of the entire 2020 season due to a personal reason.
Jonathan Alexander DB Out For Season – Personal Tue, Aug 25 Alexander will sit out the entire 2020 campaign after letting the program know about his personal decision.
Wykeen Gill WR Ques Sat – Undisclosed Mon, Sep 21 Gill missed the last game due to an unspecified ailment. It has yet to be established if he will face Oklahoma on Saturday.
Injury data lifted from: boydsbets.com
What are your "Keys to the Game"?
Who do you think wins?
Do you think the favorite will cover the spread?
Which player(s) are you most interested to watch?
Let's talk football!
To vote in the matchup "who will win poll" simply include the name of the team you think will win enclosed by {} as part of your TOP LEVEL comment discussing the matchup. To change your vote just edit your initial comment to bracket the other team. You can change your vote as often as you like until the GAME THREAD is posted
A full listing of accepted FBS team aliases can be found here.. For FCS teams you will need to use the full name as it appears in the post title.
A listing of links, and live vote totals, to all Match-up Preview threads for the current week can be found HERE.
Like this format? Generate your own "Match-up Discussion Thread" with the Match-up Discussion Thread Generator. Please DM dupreesdiamond with any issues/suggestions regarding this template
submitted by TAMExSTRANGE69 to CFB [link] [comments]


2020.09.24 05:58 perfectjammer The shielding effect of the jammer is related to the distance from the base station

GPS jammer At this time, the gps blocker function will be displayed. One day it will interfere with the GPS placed in your body, thereby preventing the GPS from detecting the signal. People with a heart will get your location information. You can protect yourself from obstruction. I think it is very necessary to buy Women's WiFi Radio Wave Jammer. In addition, it is a small mobile phone and the price is not high. As a woman, do you or the people around you have stalking behavior? Have you seen such news? Today, the development of technology has brought a lot of convenience to our lives, but at the same time, it also provides opportunities for criminals and criminals. We often see this kind of social news on the Internet and newspapers. I don't have that kind of experience, but of course I will see a lot of similar news.
Since the anti-interference performance of CDMA mobile phones is much better than that of GSM mobile phones, the signal interference of CDMA mobile phones is smaller than that of GSM mobile phones, but the difference is about 2%. 4 meters, but if necessary, you should increase the number of signal wifi jammer on site to ensure the shielding effect of CDMA phones, so as to attract users' attention in some particularly important places. Can the super jammer work for a long time, and the signal box will not damage the machine for a long time after working for a long time? Thank you for your attention, GPS jammers are normal. When designing, we use aluminum alloy line drawing machine to help heat the heat. Therefore, long-term stable work can be guaranteed. Therefore, even if the machine is heated, it will not be damaged.
With the advent of high-tech detectors, to prevent the use of computers and other electronic information equipment, the leakage of power cords in the workplace and the leakage of electromagnetic radiation are an important part of safe work. signal jammer is an electronic information protection product developed to meet market information needs. The product covers a wide range of functions, is safe, reliable and easy to use. It can be used alone or easily installed, and can be used with a small network with good electromagnetic compatibility. In standalone mode, only partial protection can make the network protect the entire area. Performance standard: BMB4-20002 Interference: Smart phone scrambler is built-in to encrypt all the trade secret tables of related information. Bandwidth scrambling: 10 kHz~1.2 GHz (no notch point)
Many drones rely on critical Wi-Fi capabilities, and some can even be fully controlled. Wireless networks make drones available to more users, but they make them vulnerable to cyber attacks. Security differs between drones, but some drones use dangerous applications to control them. Just like laptops, Wi-Fi access and antennas, you can log into these dangerous applications (such as regular Wi-Fi networks) and turn your computer into an unattended antenna 5g jammer device. Using Telnet, you can even access open points without knowing the original owner or even shutting down the device. In many cases, the WLAN alarm jammer will give the same result.
The telephone signal drone jammer not only has the function of mobile communication, but also does not interfere with other harmless electronic devices and can be widely used. Conference rooms, auditoriums, courts, libraries, consulting rooms, schools, theaters, hospitals; other gas stations, gas stations, oil fields, oil fields, government, military, financial, securities, prisons, public security command centers, or prohibited in any place Use mobile phone. The interference function signal of the mobile phone alarm will interfere with all the latest jumper components and integrated circuits. It has advanced performance and is easy to install for a long time. The manufacturing process is strict, stable and reliable. According to the quality system, it can improve information security, ensure safe production and protect the environment. It is an ideal and reliable safety product.
The electromagnetic environment requires the interference effect of the electronic information protection system to be affected by external interference. For this, you must be careful! AC power so that the host can effectively filter interference. The AC socket handheld jammer should be a PGND three-phase single-phase power socket and filter circuit. Electronic information protection, long-distance wireless transmitter, high-frequency equipment of radar station. The electronic data protector has very little heat, so natural cooling should be used. It can protect vents, electronic information of vents, and the protection space is 10cm. Do not place batteries that should allow the flow of electronic information.

http://facebookhitlist.com/profiles/blogs/more-and-more-parents-are-starting-to-buy-jammers
http://perfectjammer.blogger.ba/arhiva/2020/04/16/4207748
submitted by perfectjammer to u/perfectjammer [link] [comments]


2020.09.24 05:47 -CJF- Passed Data Structures and Algorithms II on first submission

This class is overwhelming at a glance, but not so bad once you know what they're actually asking you to do. Knowing where to start can be a little challenging.
This was the most helpful post I could find, and I read everything on this sub and the WGU sub: https://www.reddit.com/WGU_CompSci/comments/g0rd0k/lazy_students_guide_to_c950/
Some additional tips, observations and pitfalls:
Took me about 3 weeks altogether. My entire program was about 400 lines of code with comments and I got a total of ~107 miles. A hard (and overwhelming) class for sure, but I would rather do this one again than retake Operating Systems (which was not too hard but long and had a lot of material to get through and remember).
submitted by -CJF- to WGU_CompSci [link] [comments]


2020.09.24 05:40 Pathogen188 Spartans III and the Misconceptions Around Them

Out of all the classes of Spartan, the Spartan III Program is probably the least understood. In part it’s because out of the main three classes they’ve received the least amount of time in the spotlight, but arguably more importantly there is a disconnect between what has been stated about the Spartan III Program and the reality that is the canon.

Misconception 1: The Spartan IIIs were in training for a fraction of the time as the IIs

This isn’t totally a misconception because it’s not totally wrong, but there’s a bit more nuance than what one might initially think.
The idea first comes up, like many things, on page 63 of Ghosts of Onyx
There was however, only a fraction of the original SPARTAN program training time and budget...You need to make these Spartans better and train them faster
That seems pretty cut and dry? And it almost is. This is entirely dependent on which company of Spartan IIIs we’re discussing. Alpha Company began training at the very end of 2532 and graduated at the end of November 2536 for a total training period of 4 years and 11 months at bare minimum. And while 5 years is certainly shorter, I’d hardly consider it a “fraction” of the time the IIs had.
But Gamma Company is a different story entirely. Unlike Alpha Company, when Gamma started training is unknown. We know that the Company was authorized in July of 2544, but when it was formed is unknown. Based on the time between when Kurt was recruited and when Alpha began training note 1, we get a rough start date of February 2545 at the latest for Gamma. Of course that is assuming that the company didn’t start training in July of 2544. And we know that training ended for the bulk of the class in late October 2552, giving us a minimum training duration of 7 years and around 8-9 months, just a bit under the original Spartan II program. But that’s where the issue is.
While the exact day the Spartan II program finished training is a bit unclear (at the earliest you could argue that it’s March-April 2525 and the latest it’s early September of the same year), no matter how you look at it, Gamma and the IIs were in training for almost the exact same amount of time, with the difference between the two classes coming down to months, potentially even weeks. Which would contradict the previously established idea that the Spartan III Program was supposed to produce Spartans faster than the Spartan II Program.
The training duration of Beta Company is honestly a bit hard to put together because there’s conflicting dates for when the company started training and we don’t know when they finished training, so the duration could be anywhere from 5-7 years and there’s arguments to be made for both sides and for as long as this post is, I don’t particularly feel like making sense of it at this moment.
However, while the training for Alpha Company was accelerated, it was still a fairly long time all things considered. So while the IIIs were originally intended to be produced in a fraction of the amount of time as the IIs that clearly isn’t the case in reality. Gamma spent essentially the same amount of time in training as the IIs and Alpha spent 5 years in training. And while that’s a decent bit shorter than the IIs, I don’t think that really meets the goal of quickly producing Spartans. It still took half a decade to produce 300 Spartans, I wouldn’t consider that quick.
TL;DR: The training duration of the Spartan III programs is dependent on the Company of IIIs. Gamma was in training for about as long as the IIs while Alpha was in training for a bit more than half the duration of their predecessors.

Misconception 2: The Spartan IIIs had inferior training compared to that of the IIs.

I can only assume this is a case of people misremembering Ghosts of Onyx and other material, because this is explicitly not the case.
Page 67 of Ghosts of Onyx
In the last six months [Kurt] had developed a training regime tougher than the original SPARTAN program. He had created obstacle courses, firing ranges, classrooms, mess halls, and dormitories from what had been jungle and scrub plain.
Headhunters states:
Now with the Spartan IIIs and the advancements in their training and the technologies and equipment available to them further and more intrusive campaigns into Covenant-held regions were deemed a necessary risk
The Spartan IIIs were trained by one of the best IIs, CPO Mendez and had a harsher training regime than the IIs, the idea that the quality of their training was somehow worse is somewhat baffling. Especially because they wouldn’t have Mjolnir to support them. Much like the augmentations (which’ll come later), it makes sense that the Spartan IIIs would have higher quality training than their predecessors because they wouldn’t be equipped with Mjolnir and superior training would be one way to help mitigate the difference in ability between an SPI equipped III and a Mjolnir clad II.
The only area where there’s potential to be made for inferiority is general education. We know for a fact that the Spartan IIs received some pretty good general education, but the Spartan Field Manual claims that the training of the Spartan IIIs was streamlined and general education was dropped in favor of a greater emphasis on combat.
Despite what the Field Manual claims, I’m skeptical to take that as fact.
Ghosts of Onyx on several occasions makes note of non-combat oriented knowledge held by the IIIs.
Page 91
Deep Winter turned his glacier-blue gaze to the Lieutenant. “You’ve seen my reports. You know they are. Since you announced their grades were a factor in the selection process, they practically kill themselves every night to learn everything before they pass out.
So we know that grades were incredibly important to the selection process. Spartans with poor grades washed out. While we don’t know exactly what they were being tested on, I’d be surprised if general education wasn’t included in the rigorous testing they went through.
Page 133
Fhejelet non sequitor, now?”
“I got part of that,” Ash said. “Non-sequitor, that’s Latin, right?”
Ash is able to recognize that an Onyx Sentinel speaks Latin, which obviously isn’t particularly useful in combat most of the time.
Halo Reach’s Promotional Intel featured profiles for every member of NOBLE team. Kat’s profile states that she is a brilliant cryptanalyst. And while it is true that Kat is a Cat-II and superior to an ordinary III, the education requirements to become a cryptanalyst today, much less be a brilliant one 500 years from now, require a hefty amount of non combat related education. And while Kat undoubtedly did a lot of her training on her own, I find it unlikely that Kat self taught years of basic math before graduating to higher level math. Realistically, I believe that it makes more sense for Kat and the other IIIs to have received a general education in training and then Kat expanded upon what she already knew in order to reach the level she did.
TL;DR: The Spartan IIIs undoubtedly had higher quality training than the IIs. Not only were they trained by a II and CPO Mendez, Kurt designed their training regime to be more advanced and harder than that of the IIs.

Misconception 3: The Spartan IIIs have worse augmentations than the IIs.

Again, there’s a bit of gray area with this one. While it’s widely accepted that Project Chrysanthemum is superior in that the genetic requirements for the augmentations are less and the augmentations themselves are significantly safer, the actual physical abilities of the IIIs are often regarded as inferior to those of the IIs, trading efficacy for safety. However very little suggests that the Spartan IIIs are physically inferior to the IIs.
First and foremost, a major piece of evidence in favor of that interpretation is that because Project Aster was more invasive, it must have produced better results. But that’s not really the case.
Page 57 of the Fall of Reach tells us the Spartan IIs received the following augmentations:
Page 102 of Ghosts of Onyx tells us the Spartan IIIs received the following augmentations:
The Spartan IIIs also received several of other augmentations
These additional augmentations have hardly been touched and I’m not entirely sure how some of them would be beneficial at all, such as anticoagulants i.e. blood thinners. To that end it is possible that these secondary augmentations might be temporary, only being used to aid in the actual augmentation process.
But that’s not important. What is important is the primary augmentations. And they’re almost exactly the same. Both received carbide ceramic ossification to make their bones nigh unbreakable, both received HGH to increase size and muscle mass and some sort of inversion to improve eyesight as well as an augmentation to decrease reaction times.
The only direct comparison made between the two projects is made by Kurt on page 63 of Ghosts of Onyx
The new bioaugmentations were a quantum leap ahead of those he had received. There were lower projected wash-out rates.
While it’s been argued that Kurt is referring to the lower washout rates, I do not believe this is the case. For one, he specifically states that it is the bioaugmentations themselves he is talking about, while the washout rates appear to have more to do with the actual delivery of the augmentations rather than the actual quality of the augmentations themselves.
And while he certainly makes note of the lower washout rates, it’s a separate sentence, a separate complete idea. While the two are related, the writing makes a distinction between the two statements.
Furthermore, given the IIIs would primarily be operating without Mjolnir, it would make sense that they would have superior augmentations, as the superior augmentations would be compensating for the inferior physical enhancement that SPI offered.
As to actual performance, the IIs and IIIs are virtually identical. Mjolnir clad IIIs routinely demonstrate physical parity to their predecessors, and even SPI clad IIIs have on occasion been shown to replicate the feats of the IIs, even if they aren’t capable of the same peaks because they lack Mjolnir.
Furthermore, cheaper does not necessarily mean worse. The fact that the IIIs were supposedly cheaper is a common argument against the quality of the augmentations and of SPI, but there’s very little connecting the cost to that.
After a decade of R&D, the augmentations would be cheaper even though they maintained the quality, that’s a goal of R&D, lowering cost without sacrificing quality.
SPI, while cheap compared to Mjolnir, is not poor armor. It’s stealth capabilities are second to none in the UNSC’s arsenal and it provides more protection than ODST BDUs.
TL;DR: Very little if any evidence suggests that the IIIs have inferior augmentations, and most, if not all evidence points to the IIIs being just as physically capable, if not more capable than the IIs.

Misconception 4: The Spartan III Program was significantly cheaper than the Spartan II Program

Again, kind of true, but also kind of not true, there’s more nuance to it. From what we can tell, the biggest cost sink of the Spartan II Program is unsurprisingly their armor. At the time Mjolnir cost as much as a destroyer. So because the IIIs didn’t all receive Mjolnir, the project was ultimately cheaper. But that doesn’t mean the Spartans themselves were cheaper. Realistically, there’s no way that the Spartan III Program could have been cheaper per class of Spartans, much less the entire program being cheaper.
With hundreds of candidates in every class, the cost of living for each class would’ve been higher just solely based on the number of people, it’s more expensive to house 500 Candidates than it is 75. But then you need to take into account the larger staff, cost of moving materials to Onyx. The Spartan II program benefited from being stationed on Reach, where supplies and goods would be going to every day. Reach was centrally located and a major economic hub of the UEG. Onyx didn’t receive nearly that level of traffic, meaning that in order to get shipments of supplies ships would have to go more out of their way to get to Onyx which would increase costs. The Spartan II Program could get some if not a bulk of their supplies from on Reach itself, totally taking space travel out of the equation, but Onyx was mostly undeveloped, so that level of vertical integration just wouldn’t be possible.
So really, whether or not the Spartan III Program was cheaper is more dependent on whether or not you include the cost of Mjolnir in the Spartan II Program. If you do, then the IIIs were cheaper due to how insanely expensive Mjolnir was. But if you don’t include Mjolnir, logistically I’m not sure how the Spartan III program could ever be cheaper.
TL;DR: The only reason why the IIIs were cheaper than the IIs is because they weren’t equipped with Mjolnir. The actual training of the IIIs would have been more expensive than that of the IIs.

Misconception 5: Alpha and Beta Companies only went on one mission.

While the IIIs were to an extent intended to be suicide soldiers we do know that Alpha and Beta Company took part in several operations before their destruction. Alpha was active for 9 months before its destruction, although it’s unknown how long Beta was active before Torpedo.
Halo Ghosts of Onyx page 81
"We were reviewing the record of your SPARTAN-IIIs since they went operational nine months ago," she said. "Impressive." The Rear Admiral gestured at floating holographic panes that contained after-action reports, still shots of battlefields full of Covenant corpses, and ship damage-assessment profiles. "The insurrection of Mamore," he said "that nasty business at New Constantinople, actions in the Bonanze asteroid belt and the Far Gone colony platforms, and half a dozen other engagements- this reads like the campaign record of a cracking good battalion not company of three hundred. Damned impressive."
While there's no explicit confirmation as to how much of the Company took part in each mission, given the last line, I’d say it’s likely that the entire or most of the Company took part in each operation.
Beta’s history prior to Torpedo is less well documented, but we still know a little of what they did before Torpedo. Operation Cartwheel took place before Torpedo, where Kat-B320 distinguished herself enough to become a Cat-II and Lucy and B170 took part in an unnamed mission shortly before Torpedo took place. Unlike Alpha Company it's unclear whether or not Cartwheel was the entire Company, at the very least we know that Torpedo was not the first mission members of Beta were sent on.
TL;DR: Both Alpha and Beta took part in several missions before they were destroyed. Alpha was active for 9 months.

In Contention: Spartan IIIs are smaller than the IIs

This isn't necessarily a misconception, but it’s a subject that’s up to debate. Mainly because there’s conflicting information. Some sources suggest that the IIIs are the same height as the IIs while other sources suggest they’re smaller.
One of the most commonly cited pieces of evidence against the IIIs being the same height as the IIs and even the IVs is that they didn’t receive any augmentation to increase their height, instead all they received was supplements to induce puberty so they’d reach their adult height more quickly.
Page 98 of Ghosts of Onyx
His candidates had had to endure so much in the last year. To accelerate the program’s timetable, puberty had been artificially induced. Human-growth hormone as well as cartilage, muscle and bone supplements had been introduced into their diet, and the children had metamorphosed into near-adult stature within nine months.
Page 100 of Ghosts of Onyx
On average only twelve years old, they looked closer to fifteen with the sculpted musculature of Olympic athletes
The biggest issue here is that the biology at play is a bit off. First off, artificially inducing puberty is slightly unnecessary. Puberty usually begins between ages 8-13 in girls and 9-14 for boys. So while there would’ve been late bloomers who could have benefitted from a puberty jump start, a large portion of the IIIs also would’ve been well into puberty at that point. Yes, they wouldn’t have had their growth spurts yet, but puberty wasn’t accelerated, it was supposedly artificially induced.
Second, human growth hormone doesn’t start puberty. It’s released during puberty, but the hormones that induces puberty are Gonadotropins (more specifically LH and FSH), which signal the gonads to release sex hormones (testoserone or estrogen) which then in turn start puberty. Not to mention, the Spartan IIs were also given HGH to reach their massive height. I don’t see why there would be such a significant difference between the results of the same augmentation. Especially considering that what the IIIs received is presumably superior to what the IIs received. Furthermore, the cartilage and bone supplements would also presumably increase their height, because as far as I know, those wouldn’t affect their natural development. Although I assume someone who knows more about anatomy would be able to correct me.
Page 265 of Last Light states that Tom is a Spartan of average size. Legacy of Onyx then goes on to tell us that Tom’s height out of armor is well above 2m. Tom’s a physically average male Beta III so based on that IIs and IIIs fall into the same height range as John’s unarmored height is 6’10” and while “well above 2m” is a bit vague, I don’t see how Tom could be well above 2m but also still be significantly shorter than John.
However, A Necessary Truth seemingly contradicts this.
Page 253 of Fractures
At only fourteen, they continued to show hints of adolescence in their soft-featured faces, but their size and musculature were those of twenty-year-old junior lieutenants fresh out of ODST school-which happened to be their cover legend
So according to Fractures the IIIs at age 14 are the size of normal adults, which would seemingly contradict the idea that the IIIs are a similar size to the IIs.
But given that Tom is several years older than Mark and Ash, it stands to reason that this difference is merely the result of Tom being close to a decade older than they are. After all, we’re comparing 14 year old Spartans to 40 year olds, as we have never been given the heights of the IIs at age 14. Furthermore we know based on their ages they still have several more years of growth ahead of them so it’s likely that the Gammas were still growing.
However theoretically this should only apply to the males, as women generally reach their adult height by age 15. So at 14 Olivia should almost be done growing. But we know from Kat that even female IIIs should be much taller than the average woman, as the conservative estimate for Kat’s height put’s her at 6’5”. Lucy is noted to be an extraordinarily short Spartan and she has the height of an average woman at 5’3”. So clearly the IIIs are much taller than an average person, which lends further credence to the idea that their heights in A Necessary Truth aren’t final.
At bare minimum, I think we can confidently rule out the idea that the IIIs are only the height of an average person based on what we know of Tom and Lucy’s heights as well as what we’re told of the augmentations.
Whether or not they’re taller than the IIs is a different story. A commonly cited piece of evidence against according to the visual guide the members of NOBLE team are shorter.
However I think there’s a bit more to it than that. For one, the visual guide is not the source for either of their heights. Both John’s height and the heights of NOBLE come from promotional material for Halo Reach. John’s height comes from Data Drop 5 while NOBLE’s heights come from the February 2010 issue of Game Informer Magazine.
Data Drop 5 lists both John’s actual height and height in-armor, however the Game Informer article does not specify which it is. This is important because if NOBLE’s heights are their actual heights rather than their heights in-armor then they wouldn’t be shorter, they’d be right in line with the IIs. Carter, Emile and John would all be 6’10”, Jun would be the tallest at 6'11" and Fred and Noble 6 would both be 6’9” and Kat would be taller than both Linda and Kelly by 1-2 inches at 6'9".
But there’s nothing that really suggests which it is. While 343’s policy has generally been to list their heights in-armor, based on the essential visual guide and Locke’s Classified Intel (Waypoint switches back and forth), the Game Informer article precedes that and Bungie doesn’t appear to have had a policy, primarily because there doesn’t appear to be that many set heights before 343 took over. The heights are included in the "vital information" section, which could either mean "important information" or "biological information". If it's the latter then those are most definitely their actual heights as armor wouldn't be included under biological information.
Personally, I think that the heights given in the Game Informer article are their out of armor heights. Again, Tom is “well over 2m” and he is described as a physically average Spartan III, so it doesn’t make much sense for all of NOBLE to be below average in height. If their heights are their natural heights then they’d fall in line with what we know of Tom. And again, both the IIs and IIIs received HGH to increase their size and I don’t see any particular reason why Chrysanthemum would produce shorter Spartans.
That being said, it’s still not definite proof of NOBLE’s heights. But to be honest, I'm not sure if that actually matters. Tom's height and description is pretty strong evidence against the idea that the IIIs are on average shorter given that Tom is an average III and he's just as tall as the male IIs. Even if Noble's heights are their heights in armor, that wouldn't contradict anything, they would just be below average IIIs in regards to height.
TL;DR: Spartan IIIs are definitely taller than the average person and based on descriptions of Tom and what we know of his height as well as the augmentation procedures of each group, I find it unlikely that the IIIs do not fall into the same height range as the IIs.
In conclusion, there’s a lot of misconceptions about the Spartan IIIs, mainly due to more minor details that contradict what the goals of the project were as well as fans just not remembering everything in Ghosts of Onyx.
Note 1: Alpha began training 6 months after Kurt was recruited. As seen in the quote Kurt did more than just design the training regime in 6 months, the entirety of Camp Curahee was built in those 6 months. But Camp Curahee only had to be built once and Kurt only ever had to design one training program from the ground up once. While we know Kurt made changes to the training from Alpha to Beta, those changes wouldn’t have taken nearly as long to make unless Kurt was totally redesigning their training regime, which isn’t suggested.
Meaning that the time between Kurt being recruited and Alpha beginning training should be a high estimate for how long the period of time between formation of Beta and Gamma and when the companies began training, because the most time consuming part of preparation for Alpha, the construction of Camp Curahee was done, meaning that they could begin training earlier than the Alpha did.
This is entirely speculation on my part, but I feel it is pretty reasonable.
submitted by Pathogen188 to HaloStory [link] [comments]


2020.09.24 05:34 earthceltic How would you go about making this high count server ping app in 2020?

The point of this is to take hundreds of thousands of servers and ping them to get latency stats back. I see a lot of stuff on stackoverflow but it's all super old and deals with code that isn't quite standard these days.
The application :
I've played around with asyncio, mutliprocessing, and threading.
I feel like asyncio would be the way to go because you should be able to free up the processor while you're waiting a long time for a ping to come back except for a few things. One, there doesn't seem to be an asyncio compatible ping library and two, I think the way to do it would be with libraries that haven't been updated once in over six years. I'm looking for something I can update with recent tech without having to completely remake old dependencies later on. I'm also having trouble finding good examples with modern coding standards for this one.
Multiprocessing seems fun but it might be overkill and I'm not sure if it's going to be efficient when it's a very low CPU activity. Occasionally this project might end up on very low resource VPS machines so it might not make sense.
I've made something with subprocess but I've seen lots of posts saying its way better to use something that's native to python for pinging because you get a lot of overhead when you open a new process (=bottleneck) for each commandline you run. This is super rough, don't kick me too hard for it. It's modified from an example I found here.
#!/usbin/python3 import queue import threading import time import logging exitFlag = 0 nameList = [] with open("listofurlsfortesting.txt", "r") as reader: for line in reader: #logger.error(line) if line != '': nameList.append(line) class myThread (threading.Thread): def __init__(self, threadID, name, q): threading.Thread.__init__(self) self.threadID = threadID self.name = name self.q = q def run(self): print ("Starting " + self.name) process_data(self.name, self.q) print ("Exiting " + self.name) def process_data(threadName, q): import time while not exitFlag: queueLock.acquire() if not workQueue.empty(): data = q.get() queueLock.release() print ("%s processing %s" % (threadName, data)) from subprocess import Popen, PIPE import re import logging logger = logging.getLogger(__name__) data = data.replace('\n', '') try: cmd = ['ping', data, '-c1', '-W5'] process = Popen(cmd, stdout=PIPE, stderr=PIPE) stdout, stderr = process.communicate() stdout, stderr result = stdout.decode('utf-8') print (stdout) print (stderr) print (result) regex = r"PING.*time=(.*) ms..---" result = result.replace('\r', '').replace('\n', '') matchlist = re.findall(regex, result, flags=0) if len(matchlist) == 0: threads.append('unknown') else: threads.append( matchlist[0] ) except Exception as e: logger.error('Exception:') logger.error(e) #result= output.decode('utf-8', 'ignore') else: queueLock.release() time.sleep(1) threadList = ["Thread-1", "Thread-2", "Thread-3"] queueLock = threading.Lock() workQueue = queue.Queue() threads = [] threadID = 1 # Create new threads for tName in threadList: thread = myThread(threadID, tName, workQueue) thread.start() threads.append(thread) threadID += 1 # Fill the queue queueLock.acquire() for word in nameList: workQueue.put(word) queueLock.release() # Wait for queue to empty while not workQueue.empty(): pass # Notify threads it's time to exit exitFlag = 1 print (*threads) print ("Exiting Main Thread") 
submitted by earthceltic to learnpython [link] [comments]


2020.09.24 05:06 Reubenpolin Huawei H35-211 practice questions

Pass H35-211 with Huawei H35-211 practice questions

Testpassport can provide you with the real Huawei H35-211 practice questions online to ensure you 100% pass the exam. When having passed Huawei certification H35-211 exam your status in the IT area will be greatly improved and your prospect will be good.You will have 100% confidence to participate in the exam and disposably pass HCNP certification H35-211 exam. At last, you will not regret your choice.Testpassport Huawei H35-211 practice questions online can help you 100% pass the exam. This is a real news. If you want to scale new heights in the IT industry, select Testpassport please.

Share Testpassport H35-211 Dumps Questions

Huawei OLT equipment supports diagnosis based on service flow, which means to capture packets according to the service flow. Which of the following description is wrong? A. Configure business flow capture packet in the global configuration view B. Need to set the backup server information C. Data message only grabs the header, protocol message grabs the entire message D. support the specified number of capture or duration Answer: A
View the protection configuration on the OLT side as follows. huawei(config)#protect-group 0 protect-target gp on-uni-port work mode time delay huawei(protect-group-0)#protect-group member port 0/5/0role work huawei(protect-group-0)#protect-group member port 0/5/1role protect huawei(protect-group-0)#protect-group enable According to the above information, which of the following statement is correct? (Multiple choice) A. When port 0/5/0 fails, the system can automatically switch to port 0/5/1 to continue accessing services B. After creating a protection group, the default status of the protection group is disabled, and you need to command protect-group enab1e to enable the protection group C. The member ports of this protection type must be the same as the ports on the GPON board D. GPON Type B single-homing protection is configured Answer: ABD
IPTV users can go online normally, but the multicast program screen does not appear for a long time, a black screen appears, and the user cannot watch normally. What are the possible reasons? (Multiple choice) A. Multicast users are blocked B. User does not have program viewing rights C. Pre-join programs occupy too much bandwidth D. The maximum multicast bandwidth allocated by the PON port is too small Answer: ABCD
Which of the following description of GPON Type C dual-homing protection is correct? A. Simple networking, simple OLT/ONU management. B. The two PON lines of one ONU and two OLTs are in the active and standby state C. Does not support branch fiber protection. D. OLT failure will cause business interruption. Answer: B
POE dial simulation means simulates user terminal initiates the access device P PoE dialing process, by analyzing the PPE dial simulation results, to check the network connectivity between the access device and Radius k servers. A. True B. False Answer: B

Prepare with Huawei H35-211 practice questions

In this era, everything is on the rise. Do not you want to break you own? Double your salary, which is not impossible. Through the Huawei H35-211 exam, you will get what you want. Testpassport will provide you with the best Huawei H35-211 practice questions, and make you pass the exam and get the certification. It's a marvel that the pass rate can achieve 100%. This is indeed true, no doubt, do not consider, act now.About H35-211 exam, Testpassport has a great sound quality, will be the most trusted sources.

H35-211 Study Guides

With this certification, you will achieve your dreams, and become successful.Testpassport can provide you with a reliable and comprehensive solution to pass Huawei certification H35-211 exam. Our Huawei H35-211 practice questions can 100% guarantee you to pass the exam, and also provide you with a one-year free update service. You can also try to free download the Huawei H35-211 practice questions on Testpassport website.With the arrival of the flood of the information age of the 21st century, people are constantly improve their knowledge to adapt to the times.

Useful Huawei H35-211 practice questions

Testpassport Huawei H35-211 practice questions can help you to pass the exam. Any restrictions start from your own heart, if you want to pass the Huawei H35-211 examination, you will choose the Testpassport. And Testpassport can guarantee your HCNP certification H35-211 exam to be qualified. Before you choose to buy the Testpassport products before, you can free download part of the Huawei H35-211 practice questions as a try, then you will be more confident to choose Testpassport products to prepare your Huawei certification H35-211 exam.
submitted by Reubenpolin to u/Reubenpolin [link] [comments]


2020.09.24 04:01 JohnAaronson The Statistics and Black Lives Matter

Original post.
In American cops make about 10,000,000 arrests a year. Those ten million arrests don't include detentions, traffic stops or any of the other peaceful public interactions that make up the remaining approximately 60,000,000 police and citizen contact every year. On average per year, only about 1,000 of those 70 MILLION people interacted with end up dead due to police. Yet, people act like their chances of dying at the hands of a cop are anything but minuscule. The entire blm narrative is built on the foundation of "police brutality" and "racism" that simply isn't reflected in reality.
We're not even going to begin to discuss how many of those 1,000 people killed by cops each year are armed and dangerous (which is the majority of cases), or how many of them aren’t black (also the majority). It's also important to note that in police reporting "unarmed" does not mean "not violent". We can even assume, for the sake of argument, that none of those 1,000 police killings each year are justified (even though the vast majority of them are). The ratio of unarmed black men shot and killed (23) in 2018 was 1 out of 67,334 black men arrested. According to the FBI’s Uniform Crime Reporting, there were 686,665 sworn police officers in the United States in 2018. That’s one unarmed black male shot and killed for every 49,047 sworn police officers. Out of the nearly 47.8 million black Americans, the police have shot roughly one unarmed black male per roughly 2.1 million people.
The inevitable conversation that follows is that black people only represent 14% of the US population, how is it that they make up such a high number of overall police deaths**.** blm and it's supporters would like to propagate the idea that it's racism. Which fortunately has little factual basis in this topic. This is where we need to have those brutal, honest conversations that everyone claims to want to have regarding race (silence is violence after all), but nobody is actually allowed to discuss without being banned, canceled or called a racist nazi.
In the US, the American black population represents 53% of convicted murders, 29% of rapes, 54% of robberies, 33% of assaults, 43% of weapons charges, 29% of domestic abuse and 27% of drug abuse violations among others (continuing to over index in almost all areas of remaining crime). The vast majority of these crimes were conducted by males, meaning that half of the violent crime in America is committed by less than the roughly 6-7% of black men in the US. It's not only understandable but expected that there would be a higher degree of violence involved in these arrests, as usually the type of person that's being arrested for murder isn't likely to go without a fight, nor would they like to spend their lives in prison. Ignoring these facts is tantamount to delusion.
Almost all studies that conclude that black people are killed disproportionately fail to factor in crime rates into their models, whether on purpose to reach a desired conclusion or via a poor scientific process. Those are very relevant statistics that cannot be ignored when discussing police interactions with black people, nor can they be discarded in studies, as they help to explain why there is a disparity between the black population and arrests/deaths. Many who like to dismiss these figures do so by doing what they always do, and cry "racism", whether it's the mere use of these statistics or in the very core of every single arrest that makes up the data.
But simply hand-waving away the reason that there are so many violent interactions between the black community and the police due to "racism" is disingenuous and deliberate. The reasons behind those crime rates and why the black community is plagued by crime are extraordinarily complicated, and very well may contain elements of race and racism reaching back decades (such as the Welfare system and Jim Crow laws), but that’s an entirely separate conversation for another day unrelated to the premise of "police brutality towards blacks". The fact of the matter is, the black community has and will continue to have problems with overwhelming violence without real intervention, and its these problems that lead to further violent interactions with police.
Keeping the aforementioned statistics in mind, each year, American cops kill more white people, both in raw numbers and when adjusted for crime rates, than black people (note: the study has since been retracted due to public inference, however, the data included remains valid, even more studies with similar findings below). Only roughly .009% of all arrests ended with a civilian death regardless of race, and for every 10 deadly weapon assaults on a police officer there was as a result of 1 fatal police shooting, or in other words, even in encounters with deadly weapons police will only fatally shoot about 10% of the time. In fact, research done by the National Police Research Platform, only roughly 27% of those 680,000+ officers report ever even firing their gun on duty (which doesn't specifically entail actually shooting someone either, just the fact that they've shot their weapon). And yet the narrative of blood thirsty police persists.
Contrary to the black lives matter narrative, the police have much more to fear from black males than black males have to fear from the police.In 2015, black civil-rights commissioner Peter Kirsanow famously defended the police by acknowledging that a police officer is roughly 18.5x more likely to be killed by a black male than an unarmed black male is to be killed by a police officer, a number that's been repeated ad nauseam and is roughly supported by statistics year after year (it lowers to roughly 2.5x more likely for a cop to be killed by armed black males than the reverse). Factually, black males have made up nearly 50 percent of all cop-killers over the last decade even though they are only 6-7% of the overall population.
White people make up roughly over 50% of known race homicide victims, with caucasians representing roughly 76% of the total US population. Black people were 45% of known race homicide victims, but only 13% of the population. Which means the homicide rate for blacks was 3.5x their percentage of the US population, making them over five times as likely to be homicide victims.
According to a Bureau of Justice Statistics 2018 study, 15.3% of violent crimes against whites were committed by blacks for a total of 547,948 crimes, with violent black offenders being 1.8x their percent of the population. In contrast, whites committed 10.6% of violent crimes against blacks for a total of 59,777 crimes, making up 0.8x their percentage of the population. But of violent crime against black people, 70% of the time the offender was reported by the victim themselves as black, which is supportive of the epidemic of black-on-black violence increasing across the country. The offender to victim ratio shows that violent incidents involving black offenders (22%) was twice the percentage of black victims (11%).
Hate crime statistics actually show that in recent years, anti-black incidents overall fell to a recent record low share of all hate crime, while anti-white and other races have seen increases in hate crime towards them. Meanwhile hate crimes committed by black offenders continues to increase year over year, reaching a high of 24% of all reported hate crimes despite making up only 14% of the population. In major cities such as New York, black perpetrators make up the majority of hate crimes towards Jewish and LGBT people, again, despite the narrative that says black people are society's current victims of discrimination.
People need to stop acting like, just because they’re black, they’ll die if they interact with the cops or that white people are targeting black people with racism and hatred. Of course in a country of hundreds of millions of people there is going to be anti-black racism. But it certainly isn't to the degree in which activists like to perpetuate, such as it being a public health crisis. Statistics simply do not reflect any reality in which this absurdity is true, unless a concentrated effort is put into disqualifying and discounting data that opposes the narrative. If anything, the crime data, statistics on police shootings and the general modern societal zeitgeist would suggest an active and ongoing discrimination against whites. But hey, that's another topic for another day isn't it.
The questions that decent human beings need to seriously ask themselves in regards to police is, are you committing crimes? Are you going to resist if the cops try to arrest you? I would hope not for both of those questions. In 2020, there's no excuse for that level of ignorance. Therefore, your chances of dying at the hands of the police are virtually zero. But, the best part is, even if you are committing crimes and resisting arrest, your chances of dying at the hands of the police are still virtually zero, regardless of your skin color or particular demographic.That's the statistical fact. No matter how many slogans are chanted or how many times ACAB is gratified onto buildings, it doesn't suddenly mean the police are out to kill anyone.
The gaslighting from the media and the blm supporters claim that the violent actions of a "few" rioters do not represent most of the "peaceful group" (a courtesy not extended to the legitimately mostly peaceful police). The left-leaning Armed Conflict Location & Event Data Project reports that in the summer of 2020 alone (not including the continued riots in September) there were 7,750+ demonstrations related to blm. Of those, over 1000 included some sort of assault on police and/or bystanders, arson or looting but yet were not declared riots.
Over 570 of those "peaceful protests" in 220 locations turned violent to the degree that they were declared riots. That's 570+ "mostly peaceful protests" barely covered by mainstream news, that seemingly most supporters of blm refuse to acknowledge even occurred, which included an estimated $2 billion dollars in damages (most of which isn't covered by insurance, done to local family businesses, many black owned), along with a few dozen related fatalities (including targeted, accidental and incidental, more to follow below) and countless incidents of arson, looting and assault against bystanders and police. ACLED also stated that of those demonstrations, only 5% of them have been met with force by police, which is obviously roughly the same percentage of "protests" that become violent riots.
Only of course the media and blm supporters would like you to believe that police (by way of "fascist" Trump) are arresting and attacking "peaceful protesters utilizing their 'freedom of speech'", which couldn't be further from the truth. The freedom of speech was designed to protect people from those who think violence is the solution to democratic problems. Inciting violence was written in as an exception to the amendment, in part so that people couldn't use strength against others to assert beliefs. There's legal and historical precedence for proper "freedom of speech" and "freedom to protest", and nobody should care about the personal interpretations of rioters and terrorists on those fundamental freedoms.
And yet here we are, in a society where the mainstream media, an extraordinarily vocal minority of citizens, multinational billion dollar businesses donating hundreds of millions to the cause that partially goes to fund rioters' bail from jail after arrests (multiple criminals who then went on to commit other murders), celebrities and sports teams are all siding with blm over blatantly false lies and misinformation. All the while supporting the notion that black people are being "oppressed and victimized". None of their opinions on equality, inclusive ideologies and the freedom of speech, actually extends to the mostly peaceful police officers, towards white people, or any other demographic that condemns these actions (such as the increasing number of liberals leaving the party #WalkAway, or the various minority groups now increasingly supporting Trump). People need to forgo emotional arguments for rational analysis, stop confusing correlation with causation, and understand the impact of confounding variables and their own bias in these discussions.
Because what is happening is society and the Regressive Left is fostering an environment based on hate in the name of acceptance, including the willful return of Segregation, Affirmative Action and identity politics based on race, the demand for reparations (despite the Welfare system predominately geared towards blacks, having spent $22 TRILLION in the past 50 years towards poverty, costing 3 times as much as all of America's wars since the Revolution), special considerations in academia (like lowered admission standards or testing requirements, even though more money is spent on additional education funding for black students than any other race, and racial quotas hurting Asian Americans), the desire to rid society of capitalism (while hypocritically selling copious amounts of branded merchandise), two parent households (which has now quietly been removed due to criticism) and the abolishment of police and prisons. Democrats and blm leaders have continually called for public violence, including attacks on police and white folks, with the demonization of white people as a sub-human race and as racist demons.
Compound this with the contrasting fact that nearly 80% of the black community not only disagrees with the notion of defunding the police, but a significant portion would like to see either the same amount or more police presence in their neighborhoods. As anyone who grew up in a crime ridden black community knows (such as myself), a lack of policing only hurts the people that soft-bellied liberals claim to want to help. If any of the organizations and rioters actually cared about black lives mattering, then they would be focusing on the real tragedies occurring within their own communities. Such as the uncontrolled black-on-black violence, drug use and absentee fathers, and not whatever viral case makes the news in order to further the political agenda. The black community that actually deals with the rampant violence and gangs realize that defunding police is tantamount to forfeiting their lives and the lives of loved ones.
If the two tenants of the blm and antifa supporters are based on "systemic racism" and "police brutality" and both are built on misinformation and lies, then what are all of the riots, looting, arson and murder actually for? Why as a society have we both allowed and endorsed these horrific actions to the point of normalcy? Why is it so difficult for liberals to disavow the actual closest things our generation has seen to Nazism?
Why does the violence inspired by the "blm cause" not count as extremism other than social bias of the people who believe in it (despite glaringly obvious examples that say otherwise)? Defenders would like to argue that just because these killers and anarchists believed in the blm narrative, doesn't mean they have killed all those cops or Trump supporters specifically for blm. And just because people aren't card carrying members of antifa, then obviously they aren't rioting specifically for antifa...it's all just a magical coincidence that they buy their branded t-shirts and wave their affiliated flags.
But yet, if an individual police officer happens to kill a black man in the line of duty, that's somehow representative of all officers and "systemic racism" according to these same groups. We wouldn't excuse this type of behavior if it had been done in the name of ISIS. We wouldn't judge an act of terrorism on whether or not it's followers actually traveled to Syria before stabbing someone in the throat. Like logical, intelligent human beings we would determine their guilt via their extremist beliefs and horrific actions, which at this point is undeniable despite the feverish attempts to deny virtually all of it (a relatively small list compared to all incidents of blm and antifa inspired attacks to follow).
When we have such divergent attitudes in the way the very cultures and people of various races approach life, are we still feigning surprise that there's a difference in terms of wealth, crime, education, economic or job status between races? Eventually we need to be honest and look at how people actually behave and how society functions, instead of playing pretend and arguing about microagressions and white fragility.
Allowing this toxic blm rhetoric continue in this state for political reasons is entirely the opposite of being respectful of other views and is a direct attack on democracy. The sheer unfathomable damage done for this "cause" will go down in history as one of the worst decisions our society has ever inflicted upon itself perpetuated by the willful ideological delusion of one political side and its ever increasingly unstable base. If there are any blm supporters still reading this, I implore you to reconsider your stance. You can be against racism and support the real black community without endorsing the hate and lies of the blm organization. There is no requirement to martyr violent criminals just because they died while being black.
Please. If you're honestly trying to do what's best for society and the real black families adversely affected, ensure you're not on the wrong side of history while doing it.
****
Edit: Please feel free to copy and paste this information where you see fit, I know not everyone interested in these conversations wants to do the leg-work and a lot of the discussions revert back to the same topics (crime rates, demographics, studies, etc). And rather than "own" a stupid Reddit post, I would rather see more people discussing the realities of this situation with the most concrete information.
****
2019 Study from Michigan State University and the University of Maryland via the Proceedings of the National Academy of Sciences concluded: "We find no evidence of anti-Black or anti-Hispanic disparities across shootings, and White officers are not more likely to shoot minority civilians than non-White officers. Instead, race-specific crime strongly predicts civilian race. This suggests that increasing diversity among officers by itself is unlikely to reduce racial disparity in police shootings" and "Examination of National Violent Death Reporting System data shows racial differences across types of fatal shootings. Black civilians fatally shot by police (relative to White civilians) are more likely to be unarmed and less likely to pose an immediate threat to officers. In contrast, White civilians (relative to Black civilians) are nearly three times more likely to be fatally shot by police when the incident is related to mental-health concerns and are seven times more likely to commit 'suicide by cop'".
Bonus points: the Vice President of Research & Innovation at Michigan was forced to resign partially due to his contrary findings that stated there was no racism in police shootings, which was among his other "racist science" that some faculty and students found offensive.
2018 Study from Michigan State and Arizona State University concluded: "When adjusting for crime, we find no systematic evidence of anti-Black disparities in fatal shootings, fatal shootings of unarmed citizens, or fatal shootings involving misidentification of harmless objects. Multiverse analyses showed only one significant anti-Black disparity of 144 possible tests. Exposure to police given crime rate differences likely accounts for the higher per capita rate of fatal police shootings for Blacks, at least when analyzing all shootings. For unarmed shootings or misidentification shootings, data are too uncertain to be conclusive."
2016 Study from Washington State University via American Society of Criminology concluded: "We found that, despite clear evidence of implicit bias against Black suspects, officers were slower to shoot armed Black suspects than armed White suspects, and they were less likely to shoot unarmed Black suspects than unarmed White suspects. These findings challenge the assumption that implicit racial bias affects police behavior in deadly encounters with Black suspects."
2016 Study from Harvard via the National Bureau of Economic Research concluded: "On the most extreme use of force – officer-involved shootings – we find no racial differences in either the raw data or when contextual factors are taken into account. We argue that the patterns in the data are consistent with a model in which police officers are utility maximizers, a fraction of which have a preference for discrimination, who incur relatively high expected costs of officer-involved shootings."
2018 Follow-up Study from Harvard via the National Bureau of Economic Research concluded: "In stark contrast, Fryer (forthcoming) finds that, conditional on a police interaction, there are no racial differences in OIS on either the extensive or intensive margins. Using data from Houston, Texas – where I have both OIS and a randomly chosen set of interactions with police where lethal force may have been justified but was not used – I find, after controlling for suspect demographics, officer demographics, encounter characteristics, suspect weapon and year fixed effects, that blacks are 27.4 percent less likely to be shot at by police relative to non-black, non-Hispanics. Investigating the intensive margin – who shoots first in an encounter with police or how many bullets were discharged in the endeavor – there are no detectable racial differences."
2018 Study from Rutgars University and Kookmin University and Purdue College concluded: "This article aims to answer this question: are white police officers more likely to use lethal force on minority suspects or people of a specific race? To answer this question, the authors construct a data set of all confirmed uses of lethal force by police officers in the United States in 2014 and 2015. They find that although minority suspects are disproportionately killed by police, white officers appear to be no more likely to use lethal force against minorities than nonwhite officers"
2016 Study from the Pacific Institute of Research and Evaluation, Curtin University, University of Columbia found: "On average, an estimated 34 people were killed or medically treated for injury by law enforcement per 10 000 stops/arrests. That ratio is surprisingly consistent by race/ethnicity. Blacks have high arrest and stop rates, and per capita are much more likely than whites to die at the hands of police. However, when blacks are stopped or arrested, they are no more likely than whites to be injured or die during that incident.Consistent with our findings, simulation studies find police are no more likely to fire on unarmed blacks than unarmed whites, and high rates of black speeding citations per capita result from high violation rates. A systematic review identified 10 studies that found suspect race/ethnicity did not predict use of force or its escalation. However, one study found blacks were more likely than whites to face force during compliance checks. The PPCS survey also found that blacks were more likely to experience physical force and to perceive the threat of force during a stop, although few respondents actually were injured by the force applied. The large majority of incidents that those stopped perceived as undue force was stops where officers shouted at or threatened people, presumably to deter resistance."
submitted by JohnAaronson to ProtectAndServe [link] [comments]


2020.09.24 03:57 Coco-P Burning Stars, Falling Skies - Chapter 17 - Making History

Previous Chapter - At The Threshold First Next Chapter - Reclamation
I have a discord!
There are audio/youtube versions of some chapters now!
- - - - - -
“I don’t want to keep lying for your Threedak,” Dormah hissed at her as she packed her diagnostic equipment into its carrying satchel. “Your daughters have clearly noticed that something is amiss, and now they’re turning to me. I won’t speak to them without your permission, but they deserve to know.”
“Dormah,” Threedak chuckled as she stood up from her couch. “I think you’re the only Dhajtel to refer to me by my name in over a decade. It’s always Mother, Grandmother or Empress. I do have to say that your impertinence is refreshing, the bowing and scraping grows old after a while.”
“Maybe I’ll start deferring to you when you actually take your health seriously,” Dormah snorted, snapping the latches on the satchel shut before slinging it over her shoulder. “This isn’t a game we’re playing here. Your daughters have the right to know.”
“They’ll just worry,” Threedak answered with a sigh. “There’s already just so much going on between the Maxist insurrection and the invader outpost. If I tell them they’d just fret over me rather than focus on the starvok at the empire’s door. I will not let some minor pains of the flesh become a distraction from our purpose and destiny.”
“Threedak,” Dormah put a grasper on her shoulder as she tried to step by the doctor. “They do worry. Bekai has been asking me more and more pointed questions about your health since yesterday, and Dahlass even brought something up. You know they’re almost out of their minds if Dahlass is mentioning it.”
Threedak stopped. The grasper on her shoulder weighed heavily on her. Thoughts swirled through her head. The past fifty or so years had been like walking a tightrope through a hurricane. Kahtash, Bekai, Dahlass, and in her own way Pinrakt provided her with the support she needed to keep their fledgling society on course, even during the darkest of times. It didn’t seem fair to dump more worries into their graspers now, when the empire faced its greatest test. But, Dormah was right. Her daughters worried and it wasn’t fair for her to keep them in the dark.
“How much longer do I have?” She asked the doctor quietly, turning her head slightly so that Dormah’s muzzle filled her view.
“It’s hard to say,” Dormah sighed. “It’s metastasized and spread through the entirety of your lungs. You’ve probably noticed an increased difficulty with breathing. That’s only going to get worse until-”
The communicator around Threedak’s neck chirped, interrupting Dormah. Frowning, she picked the small metal box up in a grasper and checked the sender.
“We have to go Dormah,” Threedak opened the door to her quarters. “Kahtash’s fleet is nearing the enemy outpost and she wants to speak to me before battle.”
She moved to exit the room but stopped. Turning to face Dormah once more, she continued. “I’ll call the girls to me and tell them once Kahtash comes back from the battle. Don’t worry about me old friend. I’ve survived too many years for this body to give out on me now. There’s still a bit of fight left in me yet.”
Dormah simply stood in her chambers, her muzzle set into a line and shaking her head as Threedak departed. Threedak sighed. They’d been over this argument so many times it made her head spin. She could stretch her life out further if she retired from public duty. Relaxed and sought treatment.
But that wouldn’t be her. Threedak’s life was one of motion. Every move had two planned after it as she pulled her race kicking and screaming toward its destiny. Dormah wanted her to retire, but to Threedak that would be just as much of a death as the one that awaited her if she kept working.
She cleared her face of the worries and indecision that dogged her just before entering Meridian Station’s command center. Bekai and Pinrakt were already waiting for her, standing next to the holographic display. Dahlass was still on Dhaj, reorganizing in the aftermath of the raid on the Maxist compound. She would participate via her own communication hub.
The entire battle and all of their reactions would be recorded for posterity. Pinrakt’s editors would be splicing it together into a vid drama for the masses. Part history and part propaganda, the vids would be the empire’s official response to the Maxist claims regarding the invaders. True, some of the fringe Dhajtel might think that the vid was doctored, but without an organized response from the Maxist propaganda wing, their numbers would be limited.
“Mother,” Bekai inclined her head to Threedak as she approached the holographic display. “We’ve received a signal from Kahtash’s communication officer. They’re ready to put you on fleetwide on ten seconds notice. Right now the fleet is just waiting for your address.”
“Very well,” Threedak replied, stepping in front of the cameras that would broadcast a three dimensional image of herself to the battlefleet and governmental offices all across the empire.
“This is Meridian Station,” Bekai said after pressing the transmit button. “Empress Threedak will begin transmitting in ten seconds.”
She stood as tall as her slight stature would let her on four legs and tried to ignore the bustle of the Dhajtel operating equipment behind her. She didn’t often speak to all of her people. Rather, she had become an almost mythological figure working behind the scenes to ensure the empire’s growth and success. Even if she was unpracticed as a public speaker, the memories of Jon Reaves and Franklin Mitchell were there to guide her. Her eyelids closed for a second as she mentally leaned on both of them, absorbing their thoughts and advice.
Then the light next to the camera turned green and Threedak’s eyes snapped open.
“Women of the Navy,” Threedak squared herself toward the camera, trying to look as formal as possible. “My name is Threedak and you may know me as the Empress of the Dhajtel. Others amongst you know me as their mother, grandmother or great grandmother. Whatever our relation, I am speaking to you from a place of immense gratitude.”
“As you know, everything we have created on Dhaj is transitory,” she continued, a grasper waving at the planet beneath her feet. “Our race’s legacy has always been the stars themselves. Any civilization tied to just one planet could disappear in the nictation of a membrane. Only by expanding our empire to multiple worlds can we give our daughters room to grow and the security they will need to join us.”
“Even before we touched the stars we knew that the Dhajtel were not alone,” Threedak’s voice lowered as her neck pouches swelled, the instinctive response of a Dhajtel responding to a challenge. “The galaxy is a vast and dangerous place. From Humanity we have inherited knowledge and purpose, a birthright like no other. We have also inherited their enemies. The invaders.”
“Everything we have built is in their shadows,” her voice vibrated as the pouches thrummed. “From the first day we smelted iron and fashioned it into a crude blade, we knew that the invaders were that blade’s eventual goal. We assumed we would have centuries. Our world is so far from Earth that we would have time to expand the empire and build up our forces before we encountered the invaders.”
“We were wrong,” Threedak’s voice quieted. Her eyes glistened with unshed moisture. “I never bothered to ask where the invader fleet that shot down the arks went. I never even thought that it still might be in the system, licking its wounds. Captain Laksheer due to that oversight. Sacrificed herself so that tens of thousands of your sisters and daughters might escape to Dhaj and live.”
“We were wrong,” her voice swelled, a bass thrum that almost rattled the equipment in the command center. “But we were not unprepared. Even before we expanded our solar colonies, we built up the navy to expel just such a threat.”
“Today,” her breath began to burn in her throat from the prolonged speech but Threedak continued regardless. “I envy all of you. You are taking up my mantle to avenge Captain Laksheer and protect our race. The enemy is vicious and well armed. Not all of you will survive the coming conflict, but the rest will return victorious with blood wetting your teeth and a song in your hearts.”
“Marshal Kahtash,” Threedak fought with her entire being to avoid coughing as the air burned and rasped through her lungs like sandpaper. “Though the stars may burn and the sky may fall, you will lead my daughters to victory. I would tell you to make me proud, but you already have. All of you have. Commence the operation, you have command.”
With a chop of Threedak’s grasper, Bekai pressed the button that terminated the transmission. Immediately, Threedak doubled over coughing, her entire torso shaking as her lungs spasmed in agony. Pinrakt stepped forward, extending her grasper toward Threedak only for Threedak to shoo her away.
“There will be time to talk of this when Kahtash returns,” Threedak ground out, furtively checking the grasper that had been over her mouth for blood. This time, there was none. “For now, edit my weakness out of the stream. To the people, I am a symbol. They can’t hear any word of this.”
The room swam around Threedak as she struggled to pull enough air into her aching lungs. If Dormah were nearby and they weren’t in public, the doctor could provide her with a facemask pumping pure cool oxygen to soothe her ravaged pulmonary system. Today, that wasn’t an option. The people needed their symbol standing tall and strong as they triumphed over their hated foes. For the moment, infirmity wasn’t an option.
After the delay enforce on their communications by light speed transmission, Kahtash’s image appeared on the holographic display, most of her body hidden behind the environmental suit designed to keep her alive in the event of sudden depressurization. Through the suit’s facemask, Threedak could see the resolve in her daughter’s face, highlighted by her dark orange markings. She slammed her armored forearm to the chest of her suit in clattering salute.
“The Empress has given her order,” Kahtash replied, steel in her voice. “Turn on active sensors so we can see what we’re dealing with. It’s time to pay back the invaders that butchered Captain Laksheer in kind. We might have been unable to collect her body for her daughters, but we WILL end this threat to our people today and we will do it in memory of her sacrifice.”
Beyond Kahtash, the bridge erupted into cheers. A far cry from the uneasy silence filling the command center as most of the staff looked at her worriedly. Threedak refused to let their worry trouble her. Kahtash was on the cusp of history, in a mere hour or so she would be the first being, Dhajtel or Human to defeat the invaders. Admittedly, the fleets the humans encountered dwarfed the handful of run down torchships Kahtash would be facing today. Still, even a lopsided win would be good for morale.
The data from the active sensor ping came back, and Threedak let out a sigh of relief. There were only five invader torchships around the moon. The only information the active sensors added to their scouting report was the moderate industrialization of the moon. Small craft periodically flew to and from the planetoid, likely carrying goods and materials. They were building something.
Threedak frowned. Whatever the invaders were building, it wasn’t done yet. The constant flow of cargo ships told her that. What worried her was the amount of time the invaders had to build whatever it was. She didn’t know when this particular moon was colonized, but the invaders had likely been in system since Ashley Koenig’s shuttle crashed into the great desert. That was a long time to build something that wasn’t yet working.
On screen, the great green oval representing the two kilometer bulk of the Empress Threedak surged forward surrounded by the six green triangles of her torchship companions. The time for indecision and worrying was over. If the invaders had built something capable of tipping the balance on the moon, Kahtash would find out shortly. For now, there was nothing to do but wait as the great warships burned toward the enemy base.
- - - - - -
Previous Chapter - At The Threshold First Next Chapter - Reclamation
submitted by Coco-P to HFY [link] [comments]


2020.09.24 03:55 grass_skirt Another one for the Critical Buddhism bucket

You may have heard about Critical Buddhism, from eg the. zen wiki on the subject.
https://www.reddit.com/zen/wiki/critical_buddhism#wiki_an_overview_of_critical_.5Bdogen.5D_buddhism
For contrast, here's my simplified take on the Critical Buddhism issue vs. secular academic Buddhist studies.
The Critical Buddhists take a normative approach to Buddhist studies. They see a fundamental contradiction between the teachings of anatman and emptiness on the one hand, and the teachings of tathagatagarbha and Buddhanature on the other. Claiming there was an historical corruption of late Mahayana Buddhism by quasi-theistic heresies, they seek to excise all of late Mahayana from true Buddhism. This means delegitimising sutras such as the Lankavatara sutra and the Mahaparinirvana sutra, and by extension Zen.
This is an intra-Buddhist dispute. Among Buddhists, these Critical Buddhists are a select minority. Contrary to claims sometimes made in this forum, they do not speak for Buddhists in general; theirs is not considered an authoritative definition of Buddhism. Among Mahayana Buddhists, it is generally accepted that the tathagatagarbha teachings are not in real conflict with the teachings on anatman / emptiness. The Lankavatara sutra, for example, goes into exhaustive detail to distinguish the tathagatagarbha from the non-Buddhist atman teachings. As you may know, the earliest Zen patriarchs were at one point lumped together as the Lankavatara School, before later given the label "Zen Lineage".
Secular academic Buddhist studies, at least as it is taught in the West, speaks from outside the Buddhist tradition. It aims to be descriptive rather than normative. (This is the key distinction made by Peter Gregory. His coupling of this with Buddhist anti-substantialism being a minor side-point.) The real issue there is that contemporary secular academia -- at least in disciplines like history, anthropology or cultural criticism -- tends to be resolutely anti-essentialist in all endeavours. (Or tries to be). Buddhist studies academics in the West don't write as Buddhists, but rather about Buddhists. Their project is not, ultimately, one of defining what Buddhism ought to be, just what it is or has been in any given context.
To that end, it is quite possible in secular academia to define a provisionally coherent "Buddhism" that takes into account the whole spectrum of its forms past and present. Outside of (maybe) philosophy, however, that is rarely a useful question to tackle. More productive work concerns itself with illuminating different historical phases of Buddhist teachings and practice, different canonical or sectarian standards, with particular attention to phenomena which have been obscured by the normative projects of various contemporary living traditions. Those living traditions themselves tend to be more varied than their own apologetics assume.
Outside of the Japanese Critical Buddhists, a few hard-line anti-Mahayana sectarians, and maybe some people on zen, no one seriously argues that "Zen is not Buddhism". Of course, there is Zen Buddhism and there is non-Zen Buddhism; that is not a serious point of dispute either. In the same way, there is Tiantai Buddhism and non-Tiantai Buddhism, Vajrayana Buddhism and non-Vajrayana Buddhism etc. Specialist scholars will nevertheless interrogate the essentialist conceits of these categories, taken as historical or philosophical categories. Outside of self-identification as one or other school, and once we really zoom in on the basis for these categorisations, it is always possible to show overlaps or fuzzy areas between different claims of sectarian identity. Much as Buddhists have argued with regard to the atman, or self, all conventional labels fall apart with enough sustained scrutiny. That doesn't hinder the production of conventional truths, including academic data: it is actually the necessary condition for their possibility.
submitted by grass_skirt to zen [link] [comments]


2020.09.24 02:59 SPAC_Time East Stone Acquisition Corporation announces business combination with "UFin" ESSC ESSCR ESSCR

This is one of the strangest filings I have seen announcing a business combination. Hopefully, they will hire a translator and issue a press release to clear things up.
"On September 21, 2020, East Stone Acquisition Corporation, a British Virgin Islands business company (“East Stone”), entered into a Business Combination Agreement (the “Business Combination Agreement”) with Ufin Holdings Limited, a Cayman Islands limited liability company ( “Ufin”), Ufin Tek Limited (upon execution of a joinder thereto), a to-be-formed British Virgin Islands company (“Pubco”), Ufin Mergerco Limited (upon execution of a joinder thereto), a to-be-formed British Virgin Islands company and a wholly-owned subsidiary of Pubco (“Merger Sub”), Sherman Xiaoma Lu, an individual, in the capacity as the Purchaser Representative thereunder, Yingkui Liu, in the capacity as the Seller Representative thereunder, and Ufin Investment Limited, a British Virgin Islands limited liability company and the sole holder of Ufin’s outstanding capital shares (the “Seller”)."
https://www.sec.gov/Archives/edgadata/1760683/000121390020028087/ea127243-8k_eaststoneacq.htm
Nowhere does it say what the name of the company is, or what their business is. It just says East Stone Acquisition Corporation is merging with some entities named Ufin, two of which are "to be formed".
A Google search turns up no information on any of the Ufin entities, other than pointing to this SEC filing.
Included in the 8-K is a copy of the " Business Combination Agreement, dated as of September 21, 2020". Inside that, it says:
" WHEREAS, the Company, directly and indirectly through its subsidiaries, engages in the business of providing technical and financial services in China to small office and home office operating in life insurance and property insurance sales, and small businesses in digital sales of on-line education, and to individual in personal lending; "
and
" WHEREAS, the Company is a holding company for (i) Ufin Hong Kong Limited, a business company incorporated in Hong Kong, the Special Administrative Region of China, which is a holding company for Nanjing Ufin Shuke Technology Group Limited (南京优飞数科科技集团有限公司), a Wholly Foreign-Owned Enterprise registered in Nanjing, PRC in accordance with the Laws of the PRC, which in turn owns 100% of the issued and outstanding equity interests in (a) Beijing Ufin Credit Technology Limited (北京优飞金信数字科技有限公司), a registered company in Beijing, China, (b) Nanjing Ufin Insurance Technology Limited (南京优飞保科信息技术有限公司), a registered company in Nanjing, China and (c) Nanjing Ufin Data Technology Limited ( 南京优数信息技术有限公司), a registered company in Nanjing, PRC;"
So, obviously this is some kind of US listing for a Chinese financial company. Frankly I don't know what the hell they are doing filing SEC documents in Chinese! Unbelievable!
submitted by SPAC_Time to SPACs [link] [comments]


2020.09.24 02:51 Lord_Clefspear Ahperaitores - Pt 1 of 2

I've been a lurker on this sub for a long time now, and finally decided I might as well contribute. First really public creative writing, though I have been doing short stories of various forms for years for my own private amusement. Criticism is welcome, so be brutal :)
---
GALACTIC UNCOVERY NETWORK SPECIAL:
SECRETS OF THE HUMAN GHOST SOLDIERS
Invisible soldiers of supernatural skill.
Deadly hunters of sentient prey.
Ancient orders of silent warriors
For hundreds of standard-cycles, a secret and elite order of swift and stealthy killers have dominated the warrior culture of Human Terra from the shadows.
[Dr. Glop’Ga’Mar, xenohistorian and bestselling author: “Imagine an enemy that you can’t see, you can’t hear, you can’t smell, and that can kill you from more than a kilometer away.”]
These mysterious fighting units adhere to their own traditions and codes, fighting for the fractious nation-states of Terra with deadly weapons, and deadlier skill.
[Sreana the Melodious, former staff member of the Galactic Federation Embassy to Terra: “You never saw one of them unless it wanted you to. One could walk right up behind you and you’d never even know it.”]
Now, for the first time on pan galactic networking, we take you inside the strange and secretive world of these elite human warriors. With expert analysis, stunning holographic depictions, and actual first-hand historical accounts, we’ll uncover the fascinating story of…
The human Ahperaitores!
==Review posted by Dr. Glar’Ren’Gep, Deen of Multicultural Studies at Capital University
0.1 / 12
“Horribly commercialized sensationalist, over exaggerated tripe! How can you have an entire ‘documentary’ on the subject of a human historical topic and not have a single human interviewee?”
---
[[Galactic Standard Timecode 2201-13/50-8/10-145AF, Geosincronous orbit over GB-0068a, Edgaila Expanse]]
Medical Officer First Grade Mimiala’Vol keyed the door signal and stood at attention. Almost immediately, the door chimed and opened. An unusually prompt response; command officers usually let their subordinates wait at least half a minute. Mimiala’Vol entered, stood before the Ship Commander’s desk and saluted.
“Medical Officer Mimiala’Vol reporting as ordered, Commander,” she snapped off in perfect protocol GalCom
“Have a seat, Medical Officer,” Shop’s Commander Dakverna’Gel said, promptly closing his terminal window, granting Vol his complete attention.
That only reinforced Vol’s worry. Whatever this meeting was about was critically urgent, and “urgent” never translated to “good,” especially in situations like the one they were all in at the moment.
The Darkalan Navy Strike Frigate Righteous Path, along with a joint fleet of nearly a dozen Federation warships were currently blockading an M-class moon. Below them, well-armed and well dug in, was a cabal of pirates. They had hostages and were demanding ransom money. These sorts of hostage situations had become depressingly common in the Edgaila Expanse in recent cycles, usually ending in the ransoms being paid through local star-nation authorities without the Federation as a whole ever even getting involved. This sort of response was new. Something about this was different.
Vol took the offered seat, her uniform rustling over her ruddy scales, and attended as the Ship Commander got right to the point.
“You’ve been selected for a detached assignment,” he said. “You’ll need ground combat kit, your field medical pack, and anything else you’d bring as a battlefield medic.”
“Sir,” Vol said, “Will I be briefed on arrival?”
“You most likely will, but I want to tell you myself what you’re being dragged into,” Dakverna’Gel said. “A rescue mission is being staged. You’re on it.”
“May I ask why, sir?” Vol ventured.
“Why the rescue mission, or why you?”
“Well, both, now that you’ve mentioned it,” Vol replied frankly.
The ship commander gave vent to a heavy sigh that crackled his thick scales and spoke of harried, sleepless days.
“To the first...I expect you to keep this information confidential. We’ve gone to great lengths to keep the identity of the hostage under wraps.”
Vol twitched at that. Not hostages. Hostage. Singular.
The commander caught it. “Yes, they’ve only got one down there. They only need one when his name happens to be Tekliena’Ker. Yes, of those Teklienas. He’s the son of the great Tekliena’Sol, who has had his teeth on the back of the Darkalan parliament’s neck ever since the Anoijan bulk freighter his son was taking his post-graduation sabbatical with got ransacked by pirates and the young scion got kidnapped. In turn, parliament’s had its jaws on the neck of Federation Navy Command. Thus, the sudden resolve that we’re not letting these scum get away with their mischief any longer. The decision was made very early that we were going to get the boy back and bring his captors to justice. The problem has been ensuring his safety.”
“So, a daring rescue plan?” Vol asked.
“Exactly,” said the commander. “They know now that they are only safe as long as they hold the hostage, so they don’t intend to give him up for anything short of guarantees that we can’t give. So we need to go get him. The problem is that an assault on their compound may result in the boy’s death. So, the humans have volunteered to do something different.”
“The humans, sir?” Vol said quizzically. “I thought they only had one ship in orbit with the taskforce, and a small corvette at that. What could they hope to contribute to a rescue attempt?”
The commander gave her a level, evaluating stare.
“What do you know about Ahperaitores, medical officer?”
Vol’s jaws clicked shut in utter shock.
“The- The humans...sent Ahperaitores? Here?”
Of course, she had heard of them. Everyone had. The humans’ legendary elite warrior orders had their hands in the very foundations of the Federation. The humans were a reclusive, shadowy power in the Federation Council, and individually, they were marginally below average as fighters, or at least that was the image they themselves presented - they were a notoriously deceptive species. But the legends of the Ahperaitors were second only to higher mythology in tone.
“They did. And for the love of the Primordial, when you meet them do not mention that ridiculous Uncovering Network documentary or anything you may have heard in it.”
“Meet them?” Vol asked, her protocol slipping.
“They’re sending a team in to extract the hostage,” the commander said. “You’ve been selected to accompany them. Parliament signed off on letting the humans recover one of our nationals for us, but only on the condition that we have one of our own on the mission. The reasons are more than politics. The humans aren’t trained in Darkala medicine and the hostage may require emergency medical care on sight. In addition, having a fellow Darkalan face will help keep the boy calm and cooperative. You have the distinctly unlucky honor of being the most senior Darkalan medical officer on hand that is trained as a field combat medic and certified in trauma-victim handling. Therefore, you will be on hanger deck 2 in thirty minutes with your kit and courage.”
“I...I understand, sir.” Vol said.
“I hope you do, young woman. I truly hope you do.” The old officer’s gaze fell into the middle distance. “I’ve seen Ahperaitores before. I’ve seen them in action. Trust me, medical officer; the legends are wrong in so many ways...but they are deserved.”
---
When the task force had arrived in orbit above GB-0068a, it had comprised a single Anoijan frigate that had tracked the pirates’ craft from their disabled and looted bulk freighter. Soon after they had determined the nature of the pirate stronghold on the surface of the otherwise uninhabited moon, a joint Federation flotilla was dispatched. In total, there were now two Anoijan Nimar the Vigorous class frigates, three Nshii Violent class war barks, two Marlaq Glip’Gen’Lars class light cruisers, and an entire four Darkalan Praetorian class strike cruisers. These last were particularly impressive specimens, measuring the better part of two kilometers at the keel, slabbed in indomitable armor, bristling in high yield x-ray laser canons, and heavy bellied with hanger bays loaded with dropships.
Next to these gathered behemoths of martial steal, it was easy to miss the human corvette. It was dark, seeming to fade into the background space around it. Its shape was sinuous and lithe, like a hunting beast tight-packed with corded weapon-muscle. But even for all that, its mere hundred-and-thirty meter length and barely visible form made it seem so unassuming and...well, tiny next to the other ships in the task force.
The human ship (Vol had learned its name was the Gallipoli, which didn’t translate, so she assumed it was a historical name.) may have been small, but it’s interior space seemed to be so cramped and utilitarian that it made up for it. Partially that could be explained by biology. Humans were smaller and needed less space. But even for them, the narrow corridors and low overheads seemed like they would be claustrophobic. It didn’t even have an enclosed hanger deck. Vol’s shuttle from the Righteous Path had to dock with an external airlock. She was then escorted by a terse, professional human through the cramped corridors of the Gallipoli, wrestling her kit-case along behind her, trying not to decapitate herself on the overhead and practically doubling over entirely to fit through hatchways, all while human crew ratings darted from side to side making room.
The terse, professional human left her at a door labeled in blocky human runes that she couldn’t read, but matched the blocky human runes she couldn’t read on her orders, so she reached for a door signal that wasn’t there. She grumbled and set her kit-case down, contorting her hunched frame around to examine the hatch, looking for the controls. That was about the point where the door clanged and swung inwards of its own accord.
Inside was a human in very different garb than she’d seen the crew wearing. Rather than a dark blue-grey jumpsuit, this one was wearing a black top that left her arms bare and pants in an eye-baffling pattern of greens and dark browns. She looked Vol up and down with those wickedly sharp eyes that all humans seemed to have, appearing to dissect and analyze everything about her in the space of a breath. Then she turned and shouted something back into the compartment in human with a barking, authoritative voice before speaking to Vol in fluent, if oddly accented GalCom.
“Well, get in here and stop clogging the hall.”
Vol scrabbled up her kit-case and hauled it and herself through the hatchway. She tried to be careful so as not to trample the much smaller human woman, but she seemed to slither out of her way on her own. Inside the compartment, the overhead lifted a good several centimeters. It still scratched the top of her crest, but Vol gave a rapturous hiss as her spine was finally allowed to straighten. Looking around her, Vol saw a group of four or five humans, all in non-uniform garb, all in very different standards of grooming than she had ever seen on human military officers, and all looking at her.
Vol blinked twice, not sure what to do or say. Were these the Ahperaitores? The didn’t look bigger or stronger than any other human she’d seen, but then she’d never seen very many humans at all. Nobody she knew had…
“The Captain's through there,” the female interrupted Vol’s thoughts.
Vol followed the human’s gesture to another open hatch and, leaving her kit-case in the larger compartment, ducked through. It was a smaller compartment, an officer’s readyroom. The human inside didn’t come up to Vol’s shoulder, a handbreadth under two meters, and he had the same slender, sinewy build that all humans had. He had dark skin, and his hair shaved. Vol wasn’t practiced at differentiating human facial features, but his eyes were hard and intent as he studied a data tablet. Those eyes snapped to Vol like a targeting system locking as she ducked through the open hatch.
“I take it you’re the Darkalan liaison,” the human said. He soluted Vol in Darkalan fashion, raising his left arm with the back of the hand facing her, the traditional sign of one armed warrior to another. Vol returned the solute automatically, surprised to see it coming from a human.
“I’m Captain Troy Whitmin. Captain’s the rank, everything else is name. I lead Ops-Team-9. You are?”
“Sir, Medical Officer First Grade Mimiala’Vol,” Vol rattled off in perfect protocol GalCom.
“Can I assume you know why you’re here?” he said.
“Sir, I was told we were to attempt a rescue, and that I was to be responsible for the hostage’s immediate care on site.”
Whitmin grunted, a not-dissatisfied sound. “You’ll get the detailed mission-plan brief with the rest of the squad. Have you brought everything you think you’ll need for your role?”
“My kit-case is in the other room sir.”
“I’ll have to inspect it before we drop.”
Vol tried to keep her crest from bristling. “I assure you sir, my equipment is in perfect order.”
“I don’t doubt that for a second, Medical Officer,” Whitmin said in a placating tone. “The Darkalan Navy keeps excellent soldiers. But this is standard procedure for us with joint operations. We simply like to be...careful when working with other organizations and species.”
“‘We’ meaning Ahperaitores, Captain?” Vol said, blaming the edge of the question on her still cooling chollar and immediately kicking herself for it.
Whitmin gave her a neutral sort of smirk.
“Let me guess,” he said. “Uncovering Network?”
Vol’s crest went slack in chagrin. “I apologize, Sir, I meant no offence.”
“Oh, none taken,” he said. “Just for future reference, galactic media seems to think that that word is some kind of official organizational name. It’s not. The GalCom translation is ‘operators.’ It’s really just a...sort of job title for soldiers in special operations units like this.”
“So there’s more than one kind of Ahp- of...special forces unit?” Vol asked. This was the first time she’d ever heard of a human volunteering information about their species’ inner workings.
“Several, and plenty of them are represented back there,” Whitmin said, gesturing to the room behind Vol. “Here, let me introduce you.”
Vol backed out to make room for Whitmin to follow her into the larger room, where the other humans were busying themselves with all sorts of equipment and weaponry. He made a sharp whistling sound that stabbed through the air and brought the room to stillness. Vol thought they would have come to attention for their commanding officer, but they seemed not to care for the formality. Weren’t human warriors supposed to be professional?
“You’ve all met our darkalan liaison,” Whitmin said and turned to her. “Do you prefer to go by your clan-name or your given honorific, medical officer?”
“Vol is fine,” she said, thinking informality was the proper tack here.
“Very well, Vol it is. We’ll probably assign you a callsign for radio communications later.” Whitmin started pointing to each of the humans in the room, starting with the female that had opened the hatch for her.
“That’s Chief Master Sergeant Mary Spears, callsign White-Rabbit, Yoo-Tee-Enn Sow-Kom by way of the Special Space Service. She’s the chief Enn-See-Oh which makes her second in command.”
The female, Spears, was smaller than the males. Vol found that an odd thought, female darkalans generally standing head and shoulders over their male counterparts. She had coppery skin and sun-bleached looking hair shaved short on one side of her head, and several artistic pigmentation marks on her arms and neck. Vol wondered if they were like darkalan scar-etchings or something else. Her eyes were an electric-looking blue.
“Second ta God, the Cap means,” she said, and Vol again noticed a lilting note in her accent that hadn’t been there in Whitmins flat inflection.
“The big one behind her is Sergeant Gordon Paulski, callsign Roadkill” Whitmin continued, indicating the male with palish skin and what Vol thought might have passed for a bulky frame...for a human. His hair was middle-brown, long enough that he had tied it back into a tail, and accompanied by a second growth of hair curling from his upper lip down the sides of his mouth.
“Paulski’s our designated marksman, trained in the Mar-Sok Scout Snipers, but he was from Tennessee before that, so it was more of a finishing-school to teach him not to eat with his fingers and to walk upright instead of on all fours.”
Paulski called something in human with a rolling drawl and a smile. It must have been something impolitic, because Spears jammed her elbow into his midsection. Paulski didn’t seem to notice.
The captain ignored what would have been a flagrant breach of military protocol in a darkalan outfit and moved on to “Technical Sergeant Hao Yiran, callsign Box-Man. Hao’s our PeeJay. PeeJay is…”
“An acronym for a human term,” provided the last of the group, a short-ish male with short black hair and slanted eyes. He was even shorter than the others, but thickly built, which made him seem almost like a juvenile to Vol. “translated, it essentially means ‘jumping rescue soldier.’ I’m our medical specialist.”
“That,” said Whitmin. “I’ll make sure he gets you a crash course in the basics in case of emergencies, but you won’t be expected to pull medic duty on any of us. Your job is the hostage. And on that note, Spears, pull up the blackboard. Major Pike just sent me the surface survey and I want you and our liaison’s input on our infil route.”
—-
The next hour or so was spent with the two leaders in congress over what the humans called the “Blackboard.” It was a holographic display table with an interactive map of the pirates’ base of operations and the surrounding area. Vol was a little disconcerted at the level of detail it showed. If what she was seeing was accurate, the Gallipoli had sensors powerful enough to render details down to the square meter, penetrate soil, rock and artificial structures, and even estimate the positions of biological activity by heat signature.
The two humans intermittently peppered Vol with questions about the hostage. What was the physical description of the boy? Did he have any identifying markings? How old was he? How tall? How heavy? What was the average body temperature range for a darkalan male his age and condition? What sort of injuries could they expect him to have sustained? She answered these as fully as she could with her limited information. She provided the identification records her superiors had given her, rattled off the most pertinent medical information she had, she even opened her kit case to show the humans what sort of equipment she would be bringing.
When she did, all of the humans had an immediate reaction to her armor.
“Top,” said Paulski, voicing what appeared to be a shared sentiment among the humans, “I’m thinkin that’s gonna be big frikkin problem.”
“I know, Roadkill,” said the Captain. “I expected this might come up.”
Vol didn’t see what the issue was. Her armor was, in point of fact immaculate. Not only that, but it was one of the latest marks of darkalan infantry plate produced. It layered ablative plating, exoskeletal support struts, and a multi-cell battery core powering a shoulder-mounted anti-personal railgun. Very few examples of infantry combat hardware could exceed its performance short of a Praetorian Cavalry powered armor rig.
“You expected what might come up, Captain Whitmin?” Vol said. “Quite bluntly, I don’t know what’s wrong.”
Instead of answering her directly, Whitmin addressed the room as a whole. “You’ve all been briefed on darkalan ground-war tactics. Heavy plate and powered armor. Big, loud, heavy, even more than normal for Federation member species. We got lucky though, this is one of the more compact patterns I’ve seen. Darkalan officers traditionally paint their armor in their personal arms and colors though.”
“And our liaison officer’s colors,” Spears interjected, “are about as hi-viz as a bloody landing strip.”
“Hi-viz?” Vol said, unsure how this could have offended the humans.
“Clean white and sky-blue tend to stand out visually in a green jungle at night,” said Hao. “This mission is going to require stealth.”
“And you believe that my armor will be too visible,” Vol said. “Do you propose I leave it behind?”
“Not necessarily,” said Whitmin. “If you’ll consent to it, there’s something we can do about it. We can have one of us take it down to the bay and spray-paint over it. I’ll take personal responsibility for restoring it to original condition or replacing it after the mission.”
Vol’s immediate reaction was to deny that she had heard such an insulting suggestion. She was proud of her colors. She had worked hard for the right to wear them, and maintained them diligently for all her cycles as an officer. How could this human suggest she simply paint over them?
But, she thought*, he knows what they mean. He understands darkalan culture and tradition, and respects it enough to make his proposal right at his own expense. He wouldn’t do any of this if he didn’t have a very good reason, whatever it is.*
Grudgingly, Vol nodded ascent. “Very well. But please be careful that it’s reversible when we are done.”
“Thank you, medical officer,” said Whitmin. “Roadkill, take the medical officer’s armor down to the bay and get to work.”
“One hillbilly jarhead camo job comin up, Top,” said the hairy-faced human, liberally peppering the sentence with awkward human words Vol had no context for.
—-
The whole team gathered around the blackboard some time later. The captain and chief master sergeant -“Top” and “Chief '' as Vol had learned the ranks were abbreviated- painstaking layed out OpsTeam9’s plan of insertion. The Gallipoli would make atmospheric entry on the far side of the moon in daylight, then fly across the terminator to deposit the team two and a half kilometers from the pirate base in the dead of night. Vol had imagined that the stealth obsessed human operators would have some sort of tiny shuttle or orbital drop pod rather than bringing their whole ship into the atmosphere, but Whitmin answered her query with “If they have anything down there that can see the Gallipoli, they deserve to shoot her down.”
The landing of the ship was unusual, for some reason, but the humans were reluctant to explain what else they may have done to get to the surface. She thought she heard someone use the term “hay-low jump” but had no idea what that could mean.
From the landing point, the team had several optional routes on foot to the compound. They all seemed like long treks to Vol, but she supposed that couldn’t be helped given the need for the Gallipoli to avoid detection. Once at the compound, Hao, Spears, and Vol would make entry while Paulski and Whitmin provided cover. The humans had a reasonably good guess as to what room the boy, or The Package, as they called him, was being held in, and the guard compliment around the area.
All in all, it seemed as though the humans might know more about the pirate compound than the pirates themselves did. Military intelligence this detailed and in-depth was almost unheard of in the Darkalan Navy. Vol had always heard that the humans were a tricksy and shrewd - some said “underhanded” - people, but she had always thought most of the stories were xenophobic or exoticist exaggeration. She was beginning to suspect that there might be something to them
“Are there any questions?” Whitmin asked.
Hao raised his hand and received an acknowledging nod from the commanding officer.
“What kind of enemy armament do we expect on-site?” he asked.
“Intel says mostly civilian grade small arms” Spears put in. “Mostly low yield laser and pellet drivers. They’ve been in considerable money for a while though, so a few of them may have splurged on something fancier. The spook analysissies think atleast a few of them are lugging around plasma or similar directed energy guns. Probably Kim’ra 7s. In any case, we don’t have any sign of anything crew-served or vehicle mounted. These guys board ships for a living, they don’t need technicals.”
“Rules of engagement?” asked Paulski.
“If it’s carrying a weapon, it’s fair game,” said Whitmin. “But Ess-Oh-Pee for an extraction; we stay quiet and undetected until we have the package in hand, longer if at all possible. It’s a rescue, not a raid.”
“Will that be possible?” asked Vol. “Getting all the way into the compound without anyone noticing?”
“Trust me,” said Whitmin, “We are the best there is at what we do, and we do it often. Follow our lead, do exactly as my people tell you, and we’ll walk into Hell, snuff all the fires, steal all the brimstone, and be long gone before the Devil even knows we’re there.”
---
When the briefing was done, Vol and the humans of OpsTeam9 moved through the cramped, narrow corridors of the Gallipoli, crew scattering out of their way, to the Bay. The Bay, as it turned out, was the closest thing the Gallipoli had to a proper hangar deck. It was about the size of a civilian vehicle garage, and walled in lockers, retaining nets, and anchor points. One wall was obviously some sort of airlock door. A pallet of military cargo was strapped down in the center of the space, along with Vol’s kitcase.
The humans wasted no time opening lockers and preparing themselves with the gear and clothing within. They apparently were not bothered by mores of modesty or nudity taboos, simply stripping down to change into their battle gear. Vol mentally shrugged, reasoned that they weren’t darkalan, and took the opportunity to indulge her curiosity.
Almost universally, the humans had at least a few of the body-art markings Spears displayed, along with scars of a multitude of severity and origins. Under their clothing, the humans’ forms seemed even more slender and lithe, long muscles visible through their smooth skin as they moved. Vol thought they looked unnatural. Slithery. Creepy. She heard the sound of metal clacking on the floor, and turned to see Spears shuck off her baggy trousers to reveal light sucking matte black metal. Her right leg ended a few centimeters down the thigh, replaced by a spindly looking, but remarkably articulated prosthetic.
“What happened?” Vol asked, medical curiosity overriding social carefulness.
“A difference of opinion,” the human replied, “between me foot and a landmine as ta the rightful occupant of a certain bit of ground. The landmine won.”
“Does it cause you complications in your duties?”
“Not after the surgery,” Spears shrugged. “Other than socially, that is. I’ve got kids that think I’m a navy clerk. Mite hard ta explain how Mommy got her leg exploded off from behind a desk.”
“You have a family? Children?” Vol asked.
“We’ve all got family.”
“And you lie to them about what you do.”
“Only the little ones,” said Spears. “They aren’t really old enough to understand. Not old enough to ken what it means that me job is to go out into the pitch black places where the monsters live and try to shoot the monsters in the face.”
The humans were donning clothing colored in greys, blacks, and other drab colors in a bizarre, eye-baffling pattern that seemed to blend together in odd ways. Flexible boots, equipment harnesses, and gloves went on over this. And finally, the only armor they seemed to possess, vests uniquely rigged for each human to carry equipment and pouches particular to their roles and preferences, along with helmets featuring large optical devices.
“Do you not wear any more armor than that?”
“Not much point,” replied Hao, sinching a strap on a leg-mounted pouch. “Humans keep all of their vital organs in the upper torso and head. Damage to other parts of the body usually won’t kill us outright. Anything that will kill a human instantly from a hit to a limb was going to kill him regardless of what he was wearing. Besides, the best armor is not getting hit in the first place, and that’s easier with as little weight as possible.”
“You mean to tell me,” Vol said with incredulity, “that you can dodge laser fire?”
“He means that if we do our jobs right,” cut in Paulski, proffering Vol’s kitcase, “We don’t have to dodge anything.”
Vol took the proffered case, set it down and opened it. Inside was all of her equipment, but Vol barely recognized it. Instead of the gleaming white and pale blue, Vol saw drab greens and dark tones of brown and black, patched together in a splotchy, mottled pattern. She picked up the left vambrace, examining it from every angle.
“It was a bit of a rush job,” said Paulski. “Only so much I can do with spray paint and a few hours, but it’ll last ‘til the end of the mission. Ain’t nothin’ I can do ‘bout yer size though, so move carefully and...I dunno, think small I guess.”
Vol thanked the human for his work, though it made her crest prickle, and proceeded with her own preparation. Darkalan battleplate wasn’t all cloth and straps the way the human “armor” seemed to be. It was good, solid stuff of metal, clasp-seals, and powered servos. Each piece slotted into its neighbors as tight as a crustacean's plated shell. It was reliable, dependable, powerful. When Vol finally sealed her helmet and powered it up, the familiar darkalan script of the heads up display made her feel like she’d awakened a tiny bit of home in this alien world she’d found herself in. She closed her eyes and took a deep breath of the helmet filtered air.
When she opened them, the humans were arming, checking and slinging weapons. It was well known that humans traditionally favored hand-held small arms rather than armor mounted weapons. It seemed odd, a species with technology far ahead of most Federation member nations clinging to archaic weapon forms. It was even rumored that, even though their regular infantry had a reliable laser rifle platform, the Ahperaitores still used solid kinetic guns. And unless she missed her guess, the magazines they were feeding into their pouches were indeed solid slugs. Vol had enough respect for interspecies military security not to pry too deeply into the details, but having been trained in the use of the rail-cannon, kinetic projectiles were a choice she could respect.
The rest of the time in the bay was occupied with strange little rituals. Each of the humans paired off. One would bounce up and down on their toes, while the other observed, then they would switch. A “jump-test” Whitmin explained, to make sure that there were no loose objects that could rattle or otherwise give away one’s position by sound. Not that Vol thought there was any reason. The humans were disconcertingly silent as is, unless they were speaking. He invited Vol to participate, and she obliged, her metal sabatons clanging on the metal deck. At Least nothing was loose.
Next, the humans all passed around a tin of “warface”, which turned out to be a sort of greenish-brown paste. They smeared this on their faces and necks, painting themselves mottled green like barbarian tribal warriors putting on war paint.
Paulski and Hao traded small devices, common civilian media players, then parted to opposite ends of the bay. When Vol asked Spears, the human woman told her that Pauski and Hao were of different nationalities on Terra, nationalities that were culturally very different and historically rivals. Spears said that ever since they had been assigned to the same squad, they had argued the merits of their own culture’s musical styles. Eventually, they had developed the habit of trading samples of their homelands’ traditional music before the start of every mission. Apparently, neither one would yet admit to the other that he really did enjoy what his teammate had shown him.
The most solemn, to Vol’s eyes, were the parchments. Each of the human soldiers produced from somewhere a folded paper packet with a line of human runes on one side. Each one, including Whitmin, took their paper and handed it to the commander of the Gallipoli, who had come to the bay seemingly for the sole purpose of receiving these packets. The commander spoke in low tones with Whitmin, then took his leave.
Whitmin gathered the attention of his team as the commander disappeared towards the bridge.
“We’re starting our entry run,” he said. “Planetfall in twenty. Any problems speak now or forever hold your peace.”
No one spoke up, so the captain continued. “One last thing: the votes are in, and our special guest Medical Officer Mimiala’Vol has been patched into the team coms net with the callsign ‘Snake-Doctor.’ Welcome to Ess-Eff country, Snake-Doc.”
A round of raucoutry and human cheering went up, and Vol felt a dozen hard impacts on her pauldrons as her new companions clapped her shoulders in congratulation. As though the simple radio callsign were some sort of initiation- a new battle name like the warrior tribes of old.
As the humans settled, a new seriousness fell over them, not a grimness, more of an eager resolve. The captain ordered the air-lock opened. The team piled into the cargo airlock, and were sealed inside.
End of Part 1
Part 2 may be found here
submitted by Lord_Clefspear to HFY [link] [comments]


2020.09.24 00:16 lawschool33 John K. Davis: "We face a growing array of problems that involve technology: nuclear weapons, climate change, the possibility that AI will get out of control, the effect of automation on employment, targeted fake news.... It seems we’re becoming more powerful but not more wise."

https://www.pairagraph.com/dialogue/354c72095d2f42dab92bf42726d785ff
John K. Davis: "We face a growing array of problems that involve technology directly or indirectly. To name just a few: nuclear weapons, climate change induced by fossil fuels, the possibility that AI will get out of control, the effect of automation on employment, using bots and targeted fake news to influence elections, deepfake software, data and privacy concerns in general and, in particular, the capacity of facial-recognition software to create a surveillance state (like China).
These problems came to light during the last few decades, and several of them within the last 20 years. Some of these problems have older antecedents, but the newer versions are worse. Climate change, for example, has been underway since the 19th century, but it didn’t have a noticeable effect until the latter half of the 20th century. War has always been destructive, but nothing like what nuclear weapons make possible.
So these problems are new, dependent on technology, and getting worse.... the core problem is that we’re becoming more powerful but not more wise. The growing gap between our technological power and our wisdom is the ultimate cause of all these problems. We are clever enough to create problems we aren’t wise enough to avoid."
Jason Crawford: "Dr. Davis lists some real and important technological risks. However, to answer the question, “is technology making things better?” we need to assess the benefits of technology as well—including the risks that technology has reduced.
The world of just a few hundred years ago was a terrible place to live. The average person got along on about $3/day—well below the poverty line. Homes had no toilets, running water, refrigerators, or electricity. Famine was common. Today, technology and industrialization have provided us with abundant food, clothes, and other goods; and well-lit, sanitary homes.
And despite the risks created by technology, it has also saved us from many risks. Infectious disease, from smallpox to tuberculosis to pneumonia, was once rampant, killing half of children before the age of five, and life expectancy at birth was around 30 years. Germs were finally brought under control through sanitation, vaccines, and antibiotics. Large swaths of cities burned to the ground before fire safety technology, such as London in 1666 or Chicago in 1871. Extremes of cold and heat were more deadly before good internal heating and air conditioning. Even floods, hurricanes and earthquakes kill fewer people than in the past, owing to better buildings and infrastructure, and a more robust food supply.
When technology does create new risks, it is usually new technology that counters them."
submitted by lawschool33 to Ethics [link] [comments]


2020.09.24 00:15 lawschool33 John K. Davis: "We face a growing array of problems that involve technology: nuclear weapons, climate change, the possibility that AI will get out of control, the effect of automation on employment, targeted fake news.... It seems we’re becoming more powerful but not more wise."

https://www.pairagraph.com/dialogue/354c72095d2f42dab92bf42726d785ff
John K. Davis: "We face a growing array of problems that involve technology directly or indirectly. To name just a few: nuclear weapons, climate change induced by fossil fuels, the possibility that AI will get out of control, the effect of automation on employment, using bots and targeted fake news to influence elections, deepfake software, data and privacy concerns in general and, in particular, the capacity of facial-recognition software to create a surveillance state (like China).
These problems came to light during the last few decades, and several of them within the last 20 years. Some of these problems have older antecedents, but the newer versions are worse. Climate change, for example, has been underway since the 19th century, but it didn’t have a noticeable effect until the latter half of the 20th century. War has always been destructive, but nothing like what nuclear weapons make possible.
So these problems are new, dependent on technology, and getting worse.... the core problem is that we’re becoming more powerful but not more wise. The growing gap between our technological power and our wisdom is the ultimate cause of all these problems. We are clever enough to create problems we aren’t wise enough to avoid."
Jason Crawford: "Dr. Davis lists some real and important technological risks. However, to answer the question, “is technology making things better?” we need to assess the benefits of technology as well—including the risks that technology has reduced.
The world of just a few hundred years ago was a terrible place to live. The average person got along on about $3/day—well below the poverty line. Homes had no toilets, running water, refrigerators, or electricity. Famine was common. Today, technology and industrialization have provided us with abundant food, clothes, and other goods; and well-lit, sanitary homes.
And despite the risks created by technology, it has also saved us from many risks. Infectious disease, from smallpox to tuberculosis to pneumonia, was once rampant, killing half of children before the age of five, and life expectancy at birth was around 30 years. Germs were finally brought under control through sanitation, vaccines, and antibiotics. Large swaths of cities burned to the ground before fire safety technology, such as London in 1666 or Chicago in 1871. Extremes of cold and heat were more deadly before good internal heating and air conditioning. Even floods, hurricanes and earthquakes kill fewer people than in the past, owing to better buildings and infrastructure, and a more robust food supply.
When technology does create new risks, it is usually new technology that counters them."
submitted by lawschool33 to chomsky [link] [comments]


2020.09.24 00:00 kirant Covid-19 Update for September 23: 143 new cases, 186 recoveries, 2 deaths

Data is taken from the Covid-19 portal. Dr Hinshaw's next scheduled media availability is tomorrow.
Top line numbers:
Value Current Total
Total cases +143 17,032
Active cases 1,520 (-45)
Cases with "Unknown source" 288 (32.1%) in last 7 days (Change: -13 (-0.2%))
Tests +12,324 (~1.16% positive) 1,242,263
People tested +7,859 950,201 (~220,107/million)
Hospitalizations 59 (+8/+1 based on yesterday's post/portal data) 797 (+13)
ICU 13 (+4/+1 based on yesterday's post/portal data) 148 (+3)
Deaths +2 (1x 70-79, 1x 80+) 260
Recoveries +186 15,252
Spatial distribution of people tested, cases, and deaths:
Zone Active Cases (Change) New People Tested Total New Cases Total New Deaths Total
Calgary 481 (-4) +3,175 381,783 +53 8,513 +1 123
Central 20 (-4) +451 80,037 -1 659 +0 7
Edmonton 821 (+1) +2,485 315,739 +77 4,649 +0 70
North 155 (-33) +1,214 91,910 +16 1,359 +1 35
South 38 (-3) +432 64,004 +0 1,813 +0 25
Unknown 5 (-2) +102 16,728 -2 39 +0 0
Spatial distribution of cases for select cities and regions (cities proper for Calgary and Edmonton):
City/Municipality Total Active Recovered Deaths
Calgary 7146 (+48) 425 (-2) 6611 (+49) 110 (+1)
Edmonton 4118 (+74) 729 (+12) 3322 (+62) 67 (+0)
Brooks 1132 (+0) 6 (+0) 1117 (+0) 9 (+0)
High River county 559 (+0) 2 (+0) 550 (+0) 7 (+0)
Mackenzie county 392 (+1) 23 (-22) 356 (+22) 13 (+1)
Fort McMurray 234 (+9) 45 (+2) 188 (+7) 1 (+0)
Lethbridge 169 (+0) 2 (-2) 165 (+2) 2 (+0)
Red Deer 107 (+0) 8 (-1) 99 (+1) 0
Cardston county 105 (+0) 2 (-1) 98 (+1) 5 (+0)
Grande Prairie 98 (+1) 6 (+0) 90 (+1) 2 (+0)
Medicine Hat 82 (+0) 10 (+1) 70 (-1) 2 (+0)
Wheatland county 74 (+0) 0 (Since Sept 21) 73 (+0) 1 (+0)
Wood Buffalo municipality 65 (+0) 4 (+0) 61 (+0) 0
Warner county 62 (+0) 0 (Since Sept 22) 61 (+0) 1 (+0)
Rest of Alberta 2689 (+10) 258 (-32) 2391 (+42) 40 (+0)
Other Counties/Cities with 10+ active cases (change compared to yesterday, if I have it recorded):
City/County Active
County of Forty Mile No. 8 10 (-1)
County of Grande Prairie No. 1 10
Foothills County 14 (+0)
Sturgeon County 15 (-1)
Sherwood Park 16 (-4)
County of Northern Lights 20 (-5)
Smoky Lake County 24 (-1)
St Albert 30 (-3)
Okotoks (9 active) was removed from this list today
Schools with Outbreaks listed online (2+ cases in last 14 days):
Watch
  • St. Wilfrid Elementary School, Calgary
  • Vimy Ridge, Edmonton
  • Highlands School, Edmonton
  • Austin O'Brien, Edmonton (rose above 2-4 cases today)
2-4 cases
  • Canyon Meadows School, Calgary (added today)
  • Notre Dame High School, Calgary
  • Lester B. Pearson High School, Calgary
  • Henry Wise Wood High School, Calgary
  • Auburn Bay School, Calgary
  • Crescent Heights High School, Calgary
  • Chris Akkerman School, Calgary
  • Saddle Ridge School, Calgary
  • Apostles of Jesus, Calgary
  • Centre High, Edmonton
  • Ross Sheppard High School, Edmonton
  • Holy Trinity, Edmonton
  • Parkview School
  • McNally School, Edmonton
  • Ecole Pere-Lacombe, Edmonton
  • Waverley School, Edmonton
  • Riverbend School, Edmonton (added today)
  • Chinook High School, Lethbridge
  • Richard S Fowler Catholic Junior High School, St Albert
  • Springfield Elementary School, Municipal District Of Peace No. 135
  • Holy Trinity High School, Regional Municipality of Wood Buffalo
  • St. Gabriel School, Regional Municipality Of Wood Buffalo
  • Foothills Composite High School, Okotoks
Current list of regions under "watch" by the province (new in bold):
  • Calgary Lower NE
  • Calgary Upper NE
  • City of Edmonton (as a whole, plus the regions below)
  • Edmonton Abbottsfield
  • Edmonton Castle Downs
  • Edmonton Duggan
  • Edmonton Eastwood
  • Edmonton Jasper Place
  • Edmonton Mill Woods S&E
  • Edmonton Mill Woods West
  • Edmonton NE
  • Edmonton Northgate
  • Edmonton Rutherford
  • Edmonton West Jasper Place
  • Edmonton Woodcroft East
  • County Of Forty Mile No. 8
  • County of Northern Lights
  • Foothills County
  • Mackenzie County
  • Regional Municipality of Wood Buffalo
  • Smoky Lake County
  • Sturgeon County
No regions were removed from the "watch" classification today.
Spatial distribution of hospital usage (change based on yesterday's post):
  • Hospitalization zone are where the patient is receiving care, not zone of residence
Zone Hospitalized ICU
Calgary 32 (+7) 6 (+2)
Edmonton 21 (+3) 5 (+2)
Central 0 (Since Sept 8) 0 (+0)
South 2 (+0) 2 (+0)
North 4 (-2) 0 (+0)
Additional information will be logged below:
  • Calgary Upper NE's active cases: 103 (-1)
  • Edmonton Northeast's active cases: 107 (+0)
  • As per this tweet, Calgary's death was related to the Foothills outbreak and North Zone's is part of a continuing care outbreak
submitted by kirant to alberta [link] [comments]


Online Data Entry Jobs Data Encoder Tutorial For Beginners ... Top 3 Data Cards & Dongles You Can Find Online - YouTube Line Plots for Kids - 2nd and 3rd Grade Math Video - YouTube Free Data Science Online Courses With Certificates ... Online Data Entry Work - Best Tutorial For Beginners - How ... Free Online Data Analytics Course  Educba Certification ... how to use Google spreadsheet for collection of data online Data Science Full Course - Learn Data Science in 10 Hours ... free Business Data Lists Online 👉 Make Money Online For ... Data Entry Jobs Online From Home (Review) - YouTube

Data Online - Oregon Drinking Water Services

  1. Online Data Entry Jobs Data Encoder Tutorial For Beginners ...
  2. Top 3 Data Cards & Dongles You Can Find Online - YouTube
  3. Line Plots for Kids - 2nd and 3rd Grade Math Video - YouTube
  4. Free Data Science Online Courses With Certificates ...
  5. Online Data Entry Work - Best Tutorial For Beginners - How ...
  6. Free Online Data Analytics Course Educba Certification ...
  7. how to use Google spreadsheet for collection of data online
  8. Data Science Full Course - Learn Data Science in 10 Hours ...
  9. free Business Data Lists Online 👉 Make Money Online For ...
  10. Data Entry Jobs Online From Home (Review) - YouTube

GIFT: Learn Freelancing from Premium Courses FREE for 60 Days on Skillshare: https://skl.sh/2QrT1kG In this video, I have shared details of a Data Entry job ... 🔥 Data Science Master Program: https://www.edureka.co/masters-program/data-scientist-certification This Edureka Data Science Full Course video will help you ... Check out the NEW Math Game we made at https://www.MageMath.com/ It is a full video game called Mage Math that helps kids build confidence in math while havi... Free Data Science Online Courses With Certificates Analytics Vidya #datascience #theengineerbhai #freemlcourses Link-https://courses.analyticsvidhya.com/pag... Data Cards - Buy JioFi Data Cards Online at Best Prices in. Buy Portable Wifi Data Cards at India's Best Online Shopping Store. A data card is a removable el... http://www.123marketingtips.com - Data Entry Jobs Online From Home - Having worked online from home over the last 4 years here's some help. No I just wanted ... Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube. Open the link to learn more about free business data lists online you need to visit: https://www.valvesolutions.co/sample-data-lists The video is showing f... #freedataanalyticscourse #educbacourses #educbafreecertification Data Analytics course link:- https://www.educba.com/data-science/courses/free-online-data-an... This video is about DATA ENTRY JOBS for beginners and how to get started to work as DATA ENCODER tutorials for no experience and new to online jobs. =====...