#Simple Object Access Protocol
Explore tagged Tumblr posts
otfcoderprivatelimited · 1 year ago
Text
0 notes
thefirstknife · 2 days ago
Text
Alright, so some parts of the community puzzle were solved and a website was revealed. Aion-archive. The puzzle isn't over but there's stuff to do on the website with some cool info and teasers. The rest of the puzzle is so far in the process of people inputting a million codes and figuring things out which I don't really understand and I'm only interested in the end lore results so I'll talk about what we can read so far.
First of all, Aion was mentioned in Vesper's Host as "The Aion Initiative" during the secret quest with the collectibles:
Vesper Station: I’ve got the archive of Dr. Bray’s published staff memos. Petabytes of data in the raw files. Rasputin. The Stoneworm protocols. The Aion Initiative. Soteria. I had siblings this whole time. And you never let me know.
Unclear how this connects to anything, but it was definitely some sort of project back in the Golden Age.
Playing around on the site can let you access a home button and then it lists some options to go through:
Tumblr media
I'll put the rest under read more so people can play around by themselves without spoilers if they want and for length:
First of all, the missing numbers that are listed as alerts? You can still input them. So even though it says that 002, 004, 005, and 006 are missing, you can still select them and they give information. I'll drop all of them here and do some commentary because this is enrichment.
Input 001:
Tumblr media Tumblr media
Very interesting! So "Aion" stands for "Apollo Intertemporal Observation Network," investigating time dilation and temporal anomalies that go beyond simple light-speed issues. I'm absolutely losing it immediately because this is incredibly cool in so many ways. The possibility that The Edge of Fate will involve some time travel shenanigans is exciting. Hoping for more Vex stuff for sure!
Input 002:
Tumblr media
Obsessed. This is definitely why the whole thing was codenamed "Apollo" originally and some of our speculation about it was actually correct. Apollo, god of prophecy! Fascinated by the fact that this one aspect of Apollo was chosen as first description of him. Like, yeah, that part was incredibly important but Apollo was a god of many things. Either way, hello, I am going to be on the news.
Input 003:
Tumblr media
Stuff about chess, which is interesting because this is how we got to the website in the first place. I feel like we're playing chess with some entity beyond our comprehension that deals with time travel. What even is going on in Destiny.
Input 004:
Tumblr media
Not sure why this is mentioned, but it may have something to do with a later input. The Oort Cloud is a real thing (or at least a real theorised thing).
Input 005:
Tumblr media
Unclear what this connects to at the moment.
Input 006:
Tumblr media
Also unclear. "There is a place" is the same starter as the sentence in input 001: "There is a place where the numbers don't match." Referring to the temporal anomalies. I assume that's the same sentence?
Input 007:
Tumblr media
Unclear. Some of this stuff might get fully cleared up once the puzzle is completed and these gaps are filled. If they are going to be filled at all. We're not sure what the end of the puzzle will do actually.
Input 008:
Tumblr media
Interesting! This might explain the mention of the Oort Cloud? Trans-Neptunian objects are, also, a real thing and they exist in the space beyond Neptune from the Kuiper's Belt to the Oort Cloud. This text makes me also think of Nessus which is a similar object called a centaur that originally should've existed also around and beyond Neptune, but something messed with its orbit (presumably the Vex) and it was on collision course with the Exodus Black.
It's not unusual to consider a massive planetary object somewhere far out there that might be affecting the gravity and orbit of smaller objects, but it's interesting that this is a part of this whole text. Is the implication that we'll be discovering an unknown planet in the far reaches of the solar system? Bizarre because the teaser implied we're leaving the system entirely ("Kepler 15"), but also with the implied time travel shenanigans... who the hell knows. What are they cooking.
Input 009:
Tumblr media
Unclear. No clue what this may be referring to. Hoping for more information as the puzzle gets closer to solving.
Input 010:
Tumblr media Tumblr media
Also unclear. I assume that the red text is saying something along the line of "We made a mistake". Way too many gaps to know currently.
Input 011:
Tumblr media Tumblr media
Interesting! The first bit lists actual dates. 29th April 2025 (Signal confirmation) is when the puzzle started this Tuesday reset. 4th May 1991 (listed as "odd") is the date of when Bungie was founded. 9th September 2014 obviously when Destiny released. One more is down there but without the year so if anyone wants to hunt down what happened on the 12th of April in any year in human history... have fun.
The second set lists a few things that can also be input into the computer. So 11101 etc. can be searched. Here's what they give:
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
And finally:
Tumblr media
This bit is where the rest of the puzzle is currently happening, still with the in-game chess board if I understand correctly. People are inputting these codes which are codes you get from the chess board and then there's something going on with QR codes?? Which gives people some sort of string of letters to input into the computer and then they're compiling what works and what doesn't. This bit is unclear to me but it's also stuff that doesn't give any direct lore. I assume this all has to be sorted for the entire database to work properly and show all text.
And this is the last input, 012:
Tumblr media
Not much to say here, lots of stuff still missing.
Exciting stuff going on! I love community puzzles and weird shenanigans going on and it's such a cool teaser for the showcase next week and the reveal about The Edge of Fate. Can't wait to see what all of this is about, especially if we're legit going to be having some time travel stuff and weird Golden Age projects and possibly going out of the solar system.
120 notes · View notes
eugenedebs1920 · 2 days ago
Text
The balance has been thrown off kilter. The representation is not equal to the constituency. The lust for power has surpassed the duty to protect the Constitution, defend democratic principles, or adhere to the wishes of the people. This has dire implications. This doesn’t just give the illusion of government reflecting the will of the people, it shows the blatant disregard for it.
I’m a liberal. My values are that of equality, that people should feel free to express themselves how they please, love who they want to love, have control of their own bodies. I believe that government is there for the benefit and betterment of society, that government is not that which restricts liberty, but that which enshrines it. I believe that no one is better than anyone else, that the working class should make a living wage, that corporations and the wealthy should pay just as high of a tax rate as a teacher, that leaving this country, and this world in better condition than how we found it, both socially and environmentally, should be a top priority, that science is real, and objective reality is that in which we live, that religion should not dictate policy, nor be forced upon anyone.
This nation hasn’t been this divided in decades. Between the rise of the right wing propaganda apparatus, the unchecked, undiagnosed racism that the Obama years pulled to the surface, the shocking victory of a polarizing, 2nd rate reality tv personality, who brought with him to the oval office not only incompetence doused in narcissism, but not so silent cries of a discriminatory dog whistle.
The absolute failure during the covid pandemic brought the attention of those who would normally not have much political engagement into plain sight. The refusal to listen to scientists and doctors. The stubborn, asinine objections to the simple suggestion of masks. The skepticism of vaccines whose efficacy and safety have been long established. The projection, scapegoating, finger pointing, and denial of objective reality trump exuded was his downfall.
The 2020 election, despite the assertions of fraud and corruption, was found to be, by trumps own cabinet, as well as an independent investigator hired by the Trump campaign, the most secure and free from interference to date. When the “right” disputes the participation numbers, comparing them with previous elections, they would assert that millions and millions more votes were cast in that election than in others. There is a simple and obvious reason for this. Access and ease of participation.
A lot of us were on lockdown in fall of 2020 (not myself, I was an “essential worker” which sounds a whole lot like expendable asset) many were working from home, or unable to work. In the midst of all this was the general election. With social distancing protocols, and suggested limited interactions between people, the public was mailed their ballots, unburdening those who had found it taxiing to engage in their civic duty of democracy. When people were allowed to fill their ballots out with leisure, in their home, then mail their decision out, the participation rate skyrocketed.
This next bit is relatively unrelated but. The 2020 election saw the highest percentage of eligible voters cast ballots, at 62.8%, since the 1968 elections, the average participation rate being between 49%-57% since (shame shame on those not civically engaging). All this voter fraud talk, and non citizen voting is complete fabrication. Even the ultra far right Heritage Foundations investigations found minuscule cases of “suspected fraud” the percentage of these suspected cases being 0.0001%. These pushes for voter integrity, or to secure our elections are simple attempts to disenfranchise voters, a campaign of legalized voter suppression, don’t be fooled.
The fact of the matter is, in this science based world, where the questions of old have been answered, society is more open minded and tolerant, those clinging to the legitimacy of their discredited, fantastical religious dogma, acting in ways in such contrast to the scripture they preach, find themselves losing relevance, and in turn, losing power. So as to retain power the tactics are to cheat and rig the system to where minorities, the working poor, urban voters, women, and the youth will find it difficult to carry out their civic responsibility of voting. This is not a denouncement of spirituality or religion overall, it is a calling out of those who use religion as a sword and a shield to carry out their highly immoral behavior.
I digress…
The pendulum swing from the Obama years, combined with the, to put it nicely, unconventional and divisive rhetoric of the 2016 Trump campaign and subsequent administration has polarized the United States to levels not experienced in many of our lifetimes.
Then there’s the lies. Lie after lie after lie. With special counsel to President, Kellyanne Conway telling a reporter that the fabrications coming from the White House weren’t lies they were “alternative facts”. Post Trump’s presidency an independent analysis counts that Trump had lied, misled, and altered the truth more than 36,000 times. Thats just the first run.
Then you have the propaganda and propagandist. Institutions like Fox News, OAN, and Newsmax, so disattached from objective reality that Fox and Newsmax were held to accountability for their deception to the tune of almost $2 billion. Many of the smaller independent right wing media and podcasters were found to have “unknowingly” taken money from Russian state television and given a list of talking points to spread on the right in order to sew discourse between Americans and distort reality.
Say all you will about the “fake news”, or legacy media, the mainstream media, like they’re profit driven cowards, you could say they’re corporate tools, one could even claim they’re milk toast media, too afraid of speaking truth to power on the chance it would offend their bottom line and upset the almighty messiah that is the capital stuffing their fat pockets. CNN, CBS, ABC, NBC, or MSNBC, although some may show an apparent bias towards Democratic ideals, and receive their talking points from corporate overlords, they were not instructed by the Kremlin to divide America.
On the first amendment. In this country you are free to believe and say what you please. Yet some have exploited this endowment granted in the Bill of rights to collapse and crumble an essential pier of a free society bestowed in said amendment. An independent, free, and credible press. Sadly it’s one thing when the president says things like, Jan 6th was a day of love, or Haitian immigrants are eating pets, ect, it’s another to present yourself as a purveyor of factual information, convincing your audience of such, and feeding them an alternate reality. It sews division and animosity, one side consuming lies as truth.
Moving on.
On the left, a well meaning, and justified movement, of holding those who would prey on women without consent accountable for their actions, transformed from the righteous and long overdue pursuit of justice, into a culture of censorship if others opinions offended, or were in contrast to those who held their own ideals as law. The cancel culture had began.
This cancel culture would deny controversial speakers from freely expressing their opinions in universities and at events across the country, it would shame and accost speech or views contentious to their perception, the fight for social justice became eerily similar to that which they opposed, fascist thought police.
The thing about freedoms, rights and liberty is that it must be enjoyed by all to be enjoyed by any. Personally I find Nazis and racism, discrimination, disgusting and unacceptable, yet those pathetic bigots have to be granted the same privileges of free speech as non ignorant citizens of a free society for that right to be given to society as a whole. It doesn’t mean one would have to go along with it, it doesn’t mean one can’t oppose or combat it, it doesn’t mean that Nazis don’t deserve what they get for openly supporting it. It means they have a right to say and express it.
Another unforeseen consequence of stifling viewpoints which may be contradictory to one’s self, offensive or controversial is the limitations of one’s personal growth. By denying and sheltering debate of that which you find fundamentally wrong or that goes in opposition to that which you believe, it causes one’s perspective to become rigid and narrow, unwittingly being that which you decried as intolerant.
The backlash to this, and to the nations first president of color, was the inception of an opposition party with very vibrant tones of racial intolerance. The T.E.A. (Taxed enough already) Party would bust on the scene as a far right movement, raising havoc at town halls and throwing rallies in nearly every state. All this would be perfectly acceptable and even welcomed, but there was an unsettling theme. Rally goers would brandish signs refuting Obama’s citizenship, signs that read, “a village in Kenya is missing its idiot”, some that referenced slavery even some using the N word.
Along with this not so subtle display of racism, Republicans were questioning Barak Obama’s eligibility to hold the office of president as well. His foreign sounding name, and the pigmentation of his skin, prompted some to call for Obama to prove his citizenship, asking to see his birth certificate. Even upon the release of his birth certificate, the skepticism lingered heavy in the atmosphere of general discourse on the right.
One of these voices was a crude, frankly vulgar, insulting, failed businessman turned reality television personality, not particularly articulate or intelligent, but his crass style was relatable and entertaining, the trash that spewed from his mouth was unimaginable not 10 years prior. This was the rise of Donald Trump, who would go on to win the nomination for president as a Republican.
In a display of arrogance the Democratic Party, the only viable choice for progressive thinking liberals in the U.S., disregarded the support for its own unconventional candidate, a Jewish socialist, Bernie Sanders. Instead they nominated a candidate, sadly unconventional due to the sex, but about as establishment as it gets in Hilary Clinton.
Perhaps it’s the young age of the United States, or perhaps it’s just misogyny, but America, unlike much of the world, isn’t willing to elect a female to its highest office. Trump, an adjudicated sexual assailant and known adulterer, exudes misogyny, and sexism. His attacks on Clinton were relentless, unfounded, and inappropriate. In their debate he loomed over her like a caged animal, pacing back and forth. At the end of the day Trump’s victory was a shock, even to the Trump campaign.
The 2016 Trump administration started off slow, and bumbled their way forward. In February, just prior to the election, long time conservative Supreme Court Justice Antonin Scalia passed away. The sitting president is constitutionally obligated to replace any vacancy in the Supreme Court should it arise, but reptilian alien, turtle variant, Mitch McConnell had other plans.
McConnell popped his head out of his shell to make out of whole cloth, a rule that had never been instituted in the previous 240 some years of this nations existence, claiming that a “lame duck” president didn’t have the right to nominate a justice to the highest court in the land, blocking any attempt to appoint Obama’s nomination. That’s how Neil Gorsuch sits on the court today, and how Merik Garland was given the opportunity to fail the American people and the Constitution four years later.
Newton’s 3rd law it states that every action has an equal and opposite reaction. If you push against the wall, the wall “pushes” back with the same force. The laws of physics can apply to society as well. When one force pushes, the same amount of force will push back.
In 2018 Justice Anthony Kennedy retired, giving Trump his second Supreme Court pick. Although Kennedy would be considered a conservative, he wasn’t stuck with a closed ideological view, and was often a swing vote for the more liberal justices on the court. The man chosen to replace him, and in which Trump instructed his FBI to forego any sort of extensive investigation, Brett Kavanaugh, who’s past, riddled with allegations of sexual assault and heavy drinking that should have been disqualifying, leaned much farther to the right that his predecessor. The balance of the court had shifted significantly.
In the hype of a global pandemic was the 2020 general election. Americans, and much of the world was in turmoil. People were dying in droves, the global economy was in shambles, commerce and shipping was at a halt, even the essentials like toilet paper was hard to ascertain, when on September 18, the liberal icon Ruth Bader Ginsburg passed away, just 2 months before the 2020 election.
In a shameless move of outright staggering hypocrisy, majority leader, old freezeframe tortuga himself, Mitch McConnell moves at lightning speed, ramming through the confirmation of Trump’s 3rd Supreme Court pick, Amy Coney Barrott, creating a near supermajority, right wing court.
What does any of this recent history lesson have to do with polarization? Equal and opposite reactions.
What’s one of the first major rulings coming from this maga court? Rescinding Roe v Wade, stripping women of their bodily autonomy, to where their grandma had more rights than they did. This court has drastically set environmental standards back, it has weakened labor rights, taken authority over experts in their fields of science, it has removed voting protections, protected weapons of war for any civilian, and in the most revolting show of partisanship and an absurd interpretation of the our Constitution, it gave immunity to the executive branch regarding crimes committed as president of the United States.
Still. How is this relevant to the division in our nation?
I try, with great effort, to emphasize, relate and understand the current “conservative”, slash, right wing perspective. From my perspective, what they say, and what they do, or their voting record, are vastly different things.
They claim they’re for the working class yet stack their administrations with billionaires. They enact tariffs that get passed down to the consumer, raising the price of goods ever higher. They continually vote against raising the minimum wage, against collective bargaining, against protections from hazardous materials, against paid family leave and sick leave, against guaranteed overtime. Yet they vote for restricting lawsuits against corporations. How does that benefit the working class?
They claim to be pro family, pro life. Yet they vote to slash nutritional assistance benefits, they vote to eliminate the Department of education and head start programs, they vote against the child tax credit, they vote to eliminate consumer protection agencies like the Consumer Financial Protection Bureau, and the FCC. They vote to eliminate price caps on pharmaceuticals, to slash Medicare and Medicaid, against universal childcare. How does that benefit families?
They claim to be fiscally responsible and good for the economy. Yet 10 of the last 11 recessions have been under Republican administrations. The first Trump administration added a quarter of the OVERALL debt we’ve accrued. They cut taxes for the wealthy and for corporations, yet our tax rate has risen to nearly 40%, offloading the fiscal burden onto the working class. How is that fiscally responsible?
They claim to be for the first amendment but they want the Bible in public schools. They claim to be pro free speech, but threaten universities. They have vilified the press, arrested and deported protesters, they burn and ban books. How is that pro first amendment?
The most obvious example of what is now the Republican Party, but can be categorized as conservative, (although I’m not sure exactly what they’re conserving) or the right wing exuding utter disdain for this country, the rule of law, and the constitution. Their constant assault on the foundation of this republic, votes.
Since the birth of the democratic system, where the people choose their governance through casting a vote there have been those who would seek to sway the odds in their favor. There are numerous ways in which to to this, buying votes with favor or capital, intimidation, fraud, having influence over those who count the votes, but the one most commonly used in the United States is simple voter suppression.
There are several ways to carry out this suppression, even to a point where the act is difficult to notice. After emancipation black Americans were a predominate target. White election officials would enact a poll tax that many could not afford, they had literacy tests, they would insist that they name council members or representatives in full, now it is more prevalently undertaken by adding obstacles and restrictions, making it harder to register, unnecessary documentation, proof of citizenship.
We all want free and fair elections. I think we’d all agree that only American citizens should be allowed to vote in American elections. I can’t tell you how many times I tried explaining this during the most recent election. People will say, ‘You should have to show ID in order to vote!’, the thing is, you do.
In all states, in order to get a drivers license, drivers permit, or state issued identification you have to show your birth certificate. In order to register to vote you have to show an ID when you register. I guess I was unaware that the Department of Redundancy Department was so involved in the electoral process. Migrants and those residing in the U.S. legally are required to possess United States identification from the state they’re in but the number on your state license is linked to your Social Security number which is tied to your birth certificate, which those not born in the U.S. are not in possession of.
The penalties for voter fraud and non citizen voting citizen voting are severe. The act is a federal crime punishable by up to 5 years in prison, fines exceeding $5,000, both civil and criminal charges can be filed, and those who aren’t United States citizens can be deported. Seems like the juice ain’t worth the squeeze to cast a single ballot amongst 150 million votes.
The Republican (right wing/conservative) led House of Representatives just recently passed the SAVE Act requiring a birth certificate or passport, not accepting a state drivers license (ID). Approximately 146 million Americans are without a passport, to put that in perspective 153 million Americans voted in the 2024 presidential election. This would exponentially impact those in the middle middle class, lower middle class, and the working poor. Statistics show that 1 in 5 Americans making less than $50k a year have a passport.
This bill will disenfranchise nearly every woman who has taken their spouses last name as the bill makes no mention of a marriage license or change of name documentation, and if your name on your birth certificate doesn’t match that of your ID then you’re unable to verify.
The bill would void the use of military ID’s as acceptable documentation to register to vote, or cast a ballot. Our men and women who serve our country are often moved from various bases here at home, and many serve abroad, making state issued identification (not that that would suffice anyway) unnecessary or just redundant. Disenfranchising those who fight for our freedom is beyond unamerican.
The Get Out The Vote (GOTV) registration drives are prohibited under the SAVE Act as well. The bill would deny the use of online registration and mail in registration, forcing citizens who wish to register to go in person to their local agencies in order to register.
Voter fraud and non citizen voting is extremely rare, with statistics showing you’re more likely to get struck by lightning than for fraud or non authorized votes to be cast in our elections. The ultra conservative Heritage Foundation claimed to have identified prior to the 2024 election over 1,100 suspected fraudulent votes, yet in fact Only 105 cases come within the past five years,and 488 within the past 10 years. Thirty-two cases are from the 1980s and 1990s. Indicative of its overreach, the database even includes a case from 1948 (when Harry S. Truman beatThomas Dewey) and a case from 1972. In that time frame there have been over 3 BILLION votes cast. It’s a solution looking for a problem and disenfranchising millions of American voters in the process.
This is a blatant attempt to limit voter turnout, particularly those in a lower, or middle, socioeconomic bracket.
I have an idea! Instead of suppressing voter eligibility and participation, how bout enacting policies and laws that benefit the majority of the people? Or maybe they could look out for and protect the largest voting block, the middle class and working poor, instead of cutting Medicare and Medicaid, lowering and trying to eliminate social security benefits, dissolving agencies enacted to protect consumers and workers and giving tax breaks to billionaires and corporations. Meet their desired population with that in which the population desires.
We would all benefit from both parties being strong and possessing conviction. A healthy democracy is nourished through the diplomatic exchange of ideas. Compromise and bipartisan give rise to policy that is more robust and well rounded. Debate bolsters the power of thought.
This current system of obstructionism and hostility only serves those looking for publicity. These people are hired by us to do a job, and that job is to work together for the good of America and its people. We cannot ride a bike missing a wheel. The sycophancy and allegiance to a person and not to the Constitution or the constituency they represent shows a sharp decline in the values of governance.
This nation needs grounded in truth, not falsehoods. It needs bolstered with integrity, not capitulation. We need leaders who project honor, not arrogance. We have to remember, whether liberal or conservative, traditional or progressive, Republican or Democrat, the verb United that so proudly brandishes our nations title involves more than vague admiration. It requires participation, cooperation, civility and respect. For we may not be kin by blood, but it is our shared bond that makes us kin.
28 notes · View notes
sufrimientilia · 9 months ago
Text
Research Log #P5-00436
FACILITY: [REDACTED] DATE: [REDACTED] CASE: #E2756895 ATTENDING: [REDACTED] UNIT: WARD 92 OBJECTIVE: Behavioral Compliance Induction
TIME: [09:45:00]
SUBJECT #1138-B7 was brought to the operating theater, prepped and draped in the usual fashion. Intravenous access was established using a 20-gauge catheter inserted into the left antecubital vein. Electrodes were placed on the scalp for continuous EEG monitoring. Additional sensors were attached to record heart rate, respiratory rate, and galvanic skin response (GSR).
Subject presents as a 25 year old male, physically healthy, baseline vitals recorded WNL. Subject exhibited signs of anxiety and resistance, which were managed by the use of sedatives (2 mg Midazolam IV).
[09:53:11]: Subject questioned to establish baseline cognitive and physiological parameters. Orientation, recall, and basic comprehension intact.
[10:00:00]: Infusion of proprietary psychotropic agent PCA-35 initiated at a rate of 5 mL/min.
[10:03:48]: Subject displays signs of restlessness. Cortical activation indicated by increased uptake on EEG. Subject gives responses to verbal stimuli and reports a sensation of lightheadedness.
[10:04:25]: Subject complains of stinging sensation and bittersweet taste. Noted slight tremor in extremities and increased heart rate. GSR indicates heightened anxiety.
[10:05:13]: Subject questioned to establish cognitive and physiological parameters. Noted delayed responses. Subject struggles to follow simple instructions, becomes distracted, provides incoherent explanations of surroundings, misinterprets questions.
[10:09:32]: Subject begins to exhibit signs of altered perception, including auditory hallucinations and delirium. EEG shows increased theta wave activity. Physical agitation observed; restraints effective in maintaining Subject's position. Subject too agitated for cognitive and physiological testing.
[10:14:45]: Administration of compound #GS-P5R initiated at 12 L/min via inhalation mask to reduce anxiety and stabilize neural response. Infusion of PCA-35 increased to 7.5 mL/min.
[10:19:48]: Subject's responses to verbal and physical stimuli decrease significantly. Continued monitoring shows stable vitals but increased physical rigidity. Administered 1 mg Lorazepam IV to reduce muscle tension.
[10:24:22]: Subject’s speech becomes slurred and incoherent. Noted disorientation to stimuli, increased muscle laxity. Decrease in heart rate and blood pressure.
[10:33:14]: Subject enters a semi-catatonic state. Eyes remain open but unresponsive to visual stimuli. Pupils equal but dilated. EEG shows dominant delta wave activity.
[10:42:28]: Subject displays signs of decreased neural responsiveness. Decreased pupillary reaction, continued slow rolling movement of the eyes, jerky movement of the whole body (hypnic jerks). Persistent drooling noted.
[10:45:04]: Infusion of PCA-13 reduced to 1 mL/min. Administration of compound #GS-P5R reduced to 2 L/min via nasal cannula.
[10:50:34]: Subject engaged with repetitive commands in accordance to Behavioral Compliance Protocols. Verbal cues, electronic conditioning, and multi-sensory stimuli reinforcement prove ineffective. Subject remains largely non-reactive.
[10:57:55]: Subject’s eyes remain unfocused with significant drooping. Attempts to direct gaze result in brief eye opening, followed by rapid drooping. Subject mumbles incoherently.
[10:58:06]: Speculum applied to maintain eyelid retraction for continuous observation and responsiveness testing. Subject demonstrates minimal resistance; remains in stuporous state. Droplets of propriety psychotic #3A administered to each eye. Immediate increase in pupil dilation and noticeable twitching observed.
[11:00:17]: Visual stimulus presented. Subject's eyes remain fixed and extremely dilated. Noted tremors in hands, erratic breathing patterns, increase in heart rate. Subject occasionally mumbles with extreme delay in response latency to verbal and physical testing.
[11:05:23]: Subject engaged with repetitive commands in accordance to Behavioral Compliance Protocols. Verbal cues, electronic conditioning, and multi-sensory stimuli reinforcement prove insignificant. Subject displays significant cognitive impairment, involuntary reflexes, significant drooling, and uncoordinated movements.
[11:10:19]: Increased auditory and visual stimuli introduced to enhance command comprehension of Behavioral Compliance Protocols. Subject displays signs of severe neural suppression. EEG findings variable and nonspecific, low voltage and slow irregular activity nonreactive to sensory stimuli.
[11:15:52]: Subject engaged with high-intensity visual stimuli (rapid flashing) and continuous auditory commands. Subject shows brief eye fixation on visual stimulus, with occasional facial twitching. Overall response is characterized by slow, inconsistent movements and frequent confusion. Subject’s attempts to respond are sporadic, sluggish, and incoherent.
[11:20:14]: Administered low-frequency auditory tones and ambient lighting. Subject displays intermittent eye tracking and reflexive vocalizations. Eyes lubricated to prevent irritation; speculum remains in place. Despite the high level of impairment, occasional partial compliance with commands noted.
[11:30:31]: Subject provided with 500 mL saline IV to maintain hydration. Subject engaged with repetitive commands in accordance to Compliance Protocols. Verbal cues, electronic conditioning, and multi-sensory stimuli reinforcement prove moderately effective as demonstrated by increased uptake seen on EEG. Noted severe motor function impairment, persistent drooling, disorientation.
[11:37:48]: Visual and auditory stimuli calibrated to induce deep trance state in preparation for Hypnotic Compliance Protocols. Subject's head and neck stabilized to ensure alignment with visual stimuli. Monitored vital signs remain stable but indicate persistent sedation effects. Subject remains largely unresponsive, exhibiting only involuntary reflexes and intense eye fixation on visual stimulus.
[12:00:00]: End of Behavioral Compliance Induction log. Subject's transition to hypnotic phase officially logged and observed.
TRANSFER OF CARE: [REDACTED]
101 notes · View notes
valy-gc · 7 months ago
Text
TWST Fanfics ideas - Classes exercices
I was wondering... what are the clases exactly? What do they learn in it? So here are my guess:
In the « normal » class (music, math, art….) the exercices listed here would be in addition of the « normal » exercices. Also I give a list of 10 potential exercices per class, but you can imagine others
~~~~~~~~
In a "Practical Magic" class they would focus on everyday magic for chores. The exercises could include: 1. Cleaning Charms: Students practice spells to clean objects or spaces without manual labor. 2. Cooking Spells: Learning to prepare meals with a wave of a wand, including chopping, stirring, and temperature control. 3. Repairing Enchantments: Casting spells to mend broken items, from clothing to furniture. 4. Gardening Magic: Using magic to tend to plants, making them grow faster or shaping them into artistic forms. 5. Laundry Spells: Enchanting clothes to wash, dry, and fold themselves. 6. Organization Charms: Spells that sort and organize personal belongings, books, or tools. 7. Protective Wards: Setting up magical barriers to keep homes clean and safe from pests or intruders. 8. Weatherproofing Spells: Enchantments to protect against weather, like waterproofing or temperature regulation. 9. Light Charms: Magical ways to illuminate spaces efficiently. 10. Summoning Spells: Conjuring objects to hand, saving time on searching for misplaced items.
~~~~~~
In a "Conjuration" class, the focus would be on summoning objects, creatures, or elements from thin air or from distant places. Here are some exercises: 1. Basic Summoning: Students learn to summon simple objects like feathers or stones to their hands. 2. Targeted Conjuration: Practicing conjuring items from specific locations, such as retrieving a book from a shelf. 3. Creature Summoning: Safely summoning small magical creatures and learning to interact with them. 4. Food Conjuration: Conjuring edible items, focusing on getting the taste and temperature right. 5. Elemental Conjuration: Bringing forth elements like water or fire, controlling their shape and intensity. 6. Conjuring Clothes: Instantly outfitting oneself with appropriate attire for different occasions. 7. Multiplication: Learning to duplicate objects, which is a complex form of conjuration. 8. Conjuring from Nature: Drawing materials directly from natural sources, like summoning water from a lake or leaves from a tree. 9. Advanced Conjuration: Summoning complex mechanisms or devices, understanding their assembly and function. 10. Emergency Conjuration: Quick conjuration drills for situations requiring immediate access to tools or aids.
~~~~~~
In a "Magical Potion" class, students would learn the delicate art of brewing magical concoctions with various effects. Here are some potential exercises: 1. Ingredient Identification: Recognizing and categorizing potion ingredients by their magical properties. 2. Mixing Methods: Mastering the techniques of stirring, shaking, and combining potion ingredients. 3. Temperature Control: Learning the precise temperatures needed for different stages of potion brewing. 4. Timing Practice: Developing a sense of timing for adding ingredients and the duration of brews. 5. Safety Protocols: Understanding the importance of safety when handling dangerous or volatile substances. 6. Potion Analysis: Testing and analyzing the effects of potions on inanimate objects or consenting magical creatures. 7. Remedy Brewing: Creating potions that heal ailments or counteract poisons. 8. Enhancement Elixirs: Concocting brews that temporarily enhance abilities or senses. 9. Transformation Potions: Experimenting with potions that can change one's appearance or species for a short time. 10. Invisibility Mixtures: Perfecting the tricky art of brewing potions that render the drinker invisible.
~~~~~~~
In an "Alchemy" class, the curriculum would likely explore the mystical side of transforming substances into new forms, Alchemy would also be a form of magical chemistry class. Here are some exercises: 1. Metal Transmutation: Practicing turning base metals into gold or silver, starting with small quantities. 2. Elixir Crafting: Brewing elixirs that promote longevity or enhance physical abilities. 3. Philosopher's Stone Theories: Studying the legendary Philosopher's Stone and attempting to replicate its properties. 4. Substance Purification : Learning to purify and refine substances to increase their magical potency. 5. Gemstone Synthesis: Creating precious gemstones from common minerals through alchemical processes. 6. Liquid to Solid Transmutation: Transforming liquids into solid forms, such as water into crystal. 7. Herbal Alchemy: Using plants and herbs to create powerful extracts and essences. 8. Magical Ink and Paper Making: Producing materials that can hold enchantments or spells. 9. Alchemical Symbols: Understanding and using runes to enhance alchemical reactions. 10. Advanced Alchemy: Attempting more complex transmutations and understanding the ethical implications of alchemy.
~~~~~~~
In a “Digital Engineering” class, students would likely explore the intersection of magic and technology. Here are some exercises:
1. Magical Circuit Design: Learning to create circuits that are powered by magical energy. 2. Enchanted Programming: Writing code that interacts with magical objects or creatures. 3. Rune-Based Computing: Using ancient runes to perform computations and process magical data. 4. Golem Programming: Crafting and programming magical automatons for various tasks. 5. Magical Interface Development: Designing interfaces that allow wizards to interact with digital devices. 6. Virtual Spell Simulation: Using virtual reality to practice spells in a controlled digital environment. 7. Enchanted Object Fabrication: 3D printing objects with embedded magical properties. 8. Magical Network Security: Protecting magical databases and networks from unauthorized access or curses. 9. Spellware Development: Creating software that enhances or channels magical abilities. 10. Technomancy Projects: Integrating technology and magic to create innovative solutions to common magical problems.
~~~~~~~~~~
In a “Magic Analysis” class, students would delve into the theoretical aspects of magic and its practical implications, to understand them and maybe creating your own. Here are some exercises:
1. Spell Structure Decomposition: Breaking down spells into their basic components to understand how they work. 2. Magical Flow Charting: Mapping out the flow of magical energy in spells and enchantments. 3. Ritual Analysis: Studying the steps of magical rituals to determine their purpose and effectiveness. 4. Magical Artifact Examination: Investigating the history and magical properties of various artifacts. 5. Potion Formula Deconstruction: Analyzing potion recipes to understand the chemical and magical reactions involved. 6. Enchantment Efficiency Testing: Measuring the strength and duration of enchantments to optimize them. 7. Magical Language Syntax: Exploring the grammar and syntax of magical languages and their impact on spellcasting. 8. Magical Ethics Debate: Discussing the moral implications of different magical practices. 9. Historical Magic Research: Examining historical texts to understand the evolution of magical practices. 10. Magical Theory Papers: Writing and peer-reviewing academic papers on various topics in magical theory.
~~~~~~~~~~
In an “Ancient Curses” class, students would explore the history, creation, and counteraction of curses from ancient times. Here are some exercises that might be included:
1. Curse Identification: Learning to recognize different types of curses and their symptoms. 2. Historical Curse Study: Examining ancient texts and artifacts to understand the origins of famous curses. 3. Curse Crafting: Understanding the components and ethics of creating curses (theoretical exercises only, magic analysis basics needed). 4. Protection Amulets: Designing and creating amulets that protect against curses. 5. Counter-Curse Development: Practicing spells and rituals that can counteract or break curses. 6. Curse Simulation: Role-playing scenarios to understand the impact of curses and practice countermeasures. 7. Language of Cursing: Studying ancient languages and scripts that were traditionally used to cast curses. 8. Ethical Implications: Discussing the moral considerations and consequences of curse usage. 9. Curse Removal Techniques: Learning various methods to cleanse objects, places, or individuals of curses. 10. Field Research: Visiting historical sites believed to be cursed and conducting investigations.
~~~~~~~~~~
In a “Defense Magic” class, students would learn how to protect themselves and others from various magical threats. Here are some exercises:
Shield Spells: Casting protective barriers to deflect or absorb magical attacks.
Counter-Spells: Learning spells that can negate or reverse the effects of incoming spells.
Disarming Techniques: Practicing spells and maneuvers to disarm opponents without causing harm.
Magical First Aid: Applying spells and potions to treat injuries caused by magical means.
Dark Arts Defense: Understanding and defending against dark magic, including curses and hexes.
Stealth and Concealment: Using magic to hide one’s presence or escape detection.
Anti-Poison Spells: Identifying and neutralizing magical poisons and toxins.
Magical Combat: Engaging in controlled duels to practice defensive and offensive spells.
Mind Protection: Strengthening mental defenses against magical intrusion and manipulation.
Environmental Defense: Using magic to manipulate the surroundings for protection, such as creating barriers or camouflage.
~~~~~~
In a class dedicated to “Poison Making,” which would be a highly controlled and ethically sensitive subject, students might engage in the following theoretical exercises:
Toxicology Basics: Understanding the properties of various toxins and their effects on living organisms.
Antidote Formulation: Learning to create antidotes for common poisons.
Safe Handling Procedures: Training in the safe handling, storage, and disposal of toxic substances.
Poison Detection: Practicing spells and techniques to detect the presence of poison in food and drink.
Historical Poisons Study: Researching historical uses of poison and the evolution of toxicology.
Simulated Poison Brewing: Theoretical exercises in brewing poisons with harmless substitutes.
Ethical Debates: Discussing the moral implications of poison use and the responsibilities of a poison maker.
Magical Containment: Learning to magically contain and neutralize poisons to prevent accidents.
Field Identification: Recognizing poisonous plants and creatures in their natural habitats.
Legal Knowledge: Gaining an understanding of the legal restrictions and regulations surrounding poisons.
It’s important to note that such a class would emphasize the importance of using this knowledge for educational purposes only, with a strong focus on safety, ethics, and legal compliance.
~~~~~~~~
In a class focused on “Changes and Comparisons of Abbreviated Spells in Ancient and Modern Magic History,” students would likely explore the evolution of spellcasting techniques and the efficiency of spell abbreviations over time. Here are some exercises that could be part of this class:
Spell Evolution Timeline: Creating a timeline to visualize the changes in spellcasting from ancient to modern times.
Abbreviation Analysis: Comparing the original long-form spells with their modern abbreviated versions to understand the changes in language and technique.
Efficiency Studies: Measuring the effectiveness and speed of casting abbreviated spells versus their full-length counterparts.
Historical Context: Studying the historical events that led to the development of abbreviated spells.
Cultural Impact: Examining how different magical cultures influenced the abbreviation of spells.
Language Shifts: Exploring how changes in magical languages have affected spell abbreviations.
Spell Adaptation: Practicing the adaptation of ancient spells into modern abbreviated forms.
Magical Linguistics: Understanding the linguistic principles that govern the creation of effective spell abbreviations.
Ancient Scripts: Learning to read and interpret ancient magical scripts where original spells were recorded.
Modern Usage: Discussing the role of abbreviated spells in contemporary magical society and how they fit into everyday magical use.
~~~~~~~~~~~
The “History of Magic” class would be about exploring the origins and development of magical practices. Here’s how the class might be:
Ancient Civilizations: Studying the role of magic in ancient exctinct societies.
Magical Artifacts: Examining historical artifacts and their uses in various cultures.
Famous Magicians: Learning about prominent figures in magical history and their contributions.
Evolution of Spells: Tracing the development of spells from ancient incantations to modern-day practices.
Magical Creatures: Investigating the historical accounts of magical creatures and their interactions with humans.
Witch Trials: Analyzing the social and political factors behind witch trials and their impact on magical practices. (assuming there was witch trials at some point in their history, and a time where mages weren't common)
Renaissance Magic: Exploring the resurgence of magical interests during certain times.
Magical Literature: Reading and discussing key texts that have shaped magical theory and practice.
Modern Magic: Understanding the transition from traditional to contemporary magic in the context of technological advancements.
Field Trips: Visiting historical sites and museums to see firsthand the remnants of magical history.
~~~~~~~~~~
In “Animal Languages,” students would learn about the communication methods used by various magical and non-magical creatures. Here are some exercises that might be included:
Basic Animal Sounds: Starting with the sounds made by common creatures (like cats) and understanding their meanings.
Magical Linguistics: Studying the structure of animal languages and how they differ from human speech.
Non-Verbal Communication: Observing and interpreting body language and other non-verbal cues used by animals.
Spell-Assisted Communication: Using spells to facilitate understanding between humans and animals.
Creature Vocalization Practice: Mimicking creature sounds to communicate directly with them.
Field Studies: Conducting fieldwork to observe and interact with animals in their natural habitats.
Magical Translation: Learning spells or using magical devices that translate animal languages.
Historical Animal Speech: Researching ancient texts for references to legendary creatures and their languages.
Interspecies Diplomacy: Role-playing scenarios that require negotiation and communication with magical creatures.
Conservation Ethics: Discussing the importance of preserving magical creatures and their languages.
~~~~~~~~~
In “Astrology”, students would explore the celestial bodies from a scientific perspective while also delving into the mystical aspects that have influenced human culture. Here are some exercises that might be part of this class:
Stargazing Sessions: Using telescopes to observe planets, stars, and other celestial phenomena.
Celestial Navigation: Learning to navigate using the stars and understanding the historical importance of this skill.
Astrological Chart Creation: Drawing and interpreting astrological charts based on the positions of celestial bodies.
Mythology and Constellations: Studying the myths associated with constellations and their origins.
Planetary Influence: Discussing the believed influences of planets and stars on human behavior and events.
Astronomical Calculations: Performing calculations to predict celestial events like eclipses and planet transits.
Space-Time Magic: Exploring theoretical magic that could be influenced by astronomical phenomena.
Astrological Predictions: Practicing the art of making predictions based on astrological signs and movements.
Cosmic Spellwork: Investigating spells and rituals that draw power from celestial events.
Scientific Debates: Engaging in discussions about the intersection of astronomy, astrology, and magic.
~~~~~~~~~~
In “Biology” class, students would study the life processes and organisms. Here are some exercises:
Magical Microscopy: Using enchanted microscopes to observe the cellular structure of magical plants and creatures.
Potion Ingredients Study: Examining the biological properties of common potion ingredients.
Genetics: Learning about the hereditary traits of common and magical creatures.
Ecosystems: Studying the interactions between magical creatures and their environments.
Plant Cultivation: Growing and studying plants with or without magical properties in a controlled setting.
Creature Dissection: Dissecting magical or common creatures (ethically sourced) to understand their anatomy and/or magical organ functions.
Field Trips: Visiting various habitats to study magical and common creatures and plants in their natural settings.
Conservation Magic: Learning spells and techniques for the conservation and protection of species.
Disease Research: Investigating diseases that affect creatures and how to cure them.
Biological Spell Development: Creating spells that can influence biological processes in plants and animals.
~~~~~~~~~~
In “Physical Education” class, the focus would be on maintaining physical health and learning how to incorporate magic into enhancing physical abilities. Here are some exercises that might be included:
Magical Warm-Ups: Starting each class with stretches and light exercises enhanced by warming spells.
Enchanted Obstacle Courses: Navigating obstacle courses that change magically, requiring quick reflexes and agility.
Broomstick Aerobics: Engaging in flying exercises that improve balance and coordination while on a broomstick.
Strength Spells: Learning spells that temporarily increase strength for lifting or moving heavy objects.
Magical Sports: Playing magical versions of traditional sports.
Endurance Charms: Using charms to boost endurance during long-distance running or swimming.
Flexibility Enchantments: Applying enchantments that enhance flexibility and prevent injuries.
Dance Magic: Incorporating magical elements into dance routines for a fun and active workout.
Meditation and Focus: Using meditation techniques to improve concentration and mental stamina.
Magical First Aid: Learning basic first aid spells for treating minor sports injuries.
~~~~~~~~~~~~~~~~~~
In “Flying” class, students would learn the art of flying, whether it be on broomsticks, magical board, or through levitation spells. Here are some exercises that might be part of the curriculum:
Broomstick Basics: Learning how to mount, dismount, and handle a broomstick properly.
Levitation Spells: Practicing spells that allow one to float or fly without the aid of objects.
Flight Safety: Understanding the safety protocols for flying, including protective spells and charms.
Aerial Maneuvers: Mastering basic flying techniques such as turns, stops, and speed control.
Magical board Handling: If applicable, learning to control and fly on magical board.
Group Flights: Participating in synchronized flying exercises to build teamwork and coordination.
Altitude Adaptation: Acclimating to higher altitudes and learning how to adjust for air pressure changes.
Racing Techniques: Engaging in friendly races to improve agility and speed.
Emergency Landings: Practicing how to land safely in case of an emergency or spell failure.
Weather Spells: Using spells to navigate and adapt to different weather conditions while flying.
~~~~~~~~~~~~
In “Swimming” class, students would learn not only traditional swimming techniques but also how to incorporate magic into their aquatic activities. Here are some exercises:
Water Adaptation Spells: Casting spells that allow students to breathe underwater and withstand pressure changes.
Aquatic Mobility Charms: Learning charms to enhance swimming speed and agility in the water.
Merfolk Communication: Studying the language and customs of merfolk to interact with them during underwater excursions.
Underwater Navigation: Using magical means to navigate through murky or enchanted waters.
Magical Marine Life: Identifying and studying the behaviors of magical creatures that live in water.
Water Safety Enchantments: Applying protective enchantments to prevent drowning and other water-related accidents.
Diving Techniques: Practicing diving spells that allow for smooth entry into the water from great heights.
Temperature Control Charms: Learning to regulate body temperature to comfortably swim in cold waters.
Underwater Spellcasting: Mastering the art of casting spells while submerged and dealing with the resistance of water.
Rescue and Recovery Spells: Training in spells and procedures for rescuing others from aquatic dangers.
~~~~~~~~~~
In “Music” class, students would explore musical arts, with and without magic. Here are some exercises that might be included:
Instrumental Enchantment: Learning to play and enchant instruments so they can be played magically without physical touch.
Magical Music Theory: Studying the theory behind music and how it interacts with magical frequencies.
Enchanted Choir: Singing in a choir where voices are magically harmonized.
Rhythmic Spellcasting: Combining spellcasting with rhythm to enhance the potency of spells.
Musical Creature Communication: Using music to communicate with creatures that respond to magical melodies.
Historical Magical Composers: Learning about famous magical composers and their contributions to the musical world.
Sound Manipulation: Practicing spells that manipulate sound waves to create music or silence.
Magical Performance: Preparing and performing in magical concerts or recitals.
Music and Emotion: Exploring how music can influence emotions and states of mind magically.
Instrument Crafting: Building magical instruments with unique properties and sounds.
~~~~~~~~~~~
In “Art” class, students would likely explore various forms of creative expression, possibly incorporating magical elements into their artwork. Here are some exercises:
Enchanted Drawing: Practicing drawing techniques with enchanted pencils that bring sketches to life.
Potion Paints: Creating paints from magical potions that change color or have other unique properties.
Sculpting with Magic: Using transfiguration spells to sculpt materials like clay or stone without physical tools.
Illusionary Art: Crafting art that moves or changes, creating illusions that trick the eye.
Magical Photography: Taking and developing photographs that capture magical auras or movements.
Wearable Art: Designing clothing or jewelry with enchantments that alter their appearance.
Art History: Studying the works of famous magical artists and their impact on magical society.
Artistic Spellwork: Learning spells that enhance artistic abilities or inspire creativity.
Magical Murals: Painting murals with spells that make them interact with the environment.
Restoration Techniques: Using magic to restore and preserve ancient artworks and artifacts.
~~~~~~~~~~~~~
In “Mathematics” class... well students would likely explore both the theoretical and practical applications of math, but may use magic too. Here are some exercises other than the "common" ones:
Arithmancy: Studying the magical properties of numbers and their use in spell-crafting and divination.
Geometric Spell Patterns: Drawing geometric shapes that form the basis of complex spell structures.
Potion Measurements: Precisely measuring and calculating potion ingredients for perfect brews.
Magical Algebra: Solving equations that predict magical phenomena or outcomes.
Astronomical Calculations: Using mathematics to predict celestial alignments and their magical effects.
Transfiguration Geometry: Applying geometric principles to accurately transfigure objects into different shapes.
Probability and Chance: Calculating probabilities to predict the outcomes of magical experiments.
Magical Graph Theory: Mapping out the connections between magical nodes or ley lines.
Temporal Equations: Understanding the mathematical principles behind time-related spells.
Mathematical Proofs: Proving theorems that underpin magical laws and principles.
~~~~~~~~~~
In “Health” class that would be held twice a year by the nurse(s), students would likely focus on both physical and magical well-being. Here are some exercises:
Magical Nutrition: Learning about magical foods and their effects on health and magical abilities.
Body Enhancement Charms: Understanding the ethical use of charms that temporarily enhance physical abilities.
Magical Hygiene: Learning spells and practices for maintaining personal and environmental cleanliness.
Disease Awareness: Studying magical and non-magical diseases, their symptoms, and prevention methods.
First Aid Training: Gaining practical skills in magical and non-magical first aid techniques.
60 notes · View notes
petervintonjr · 2 months ago
Text
Tumblr media
We open Womens' History Month 2025 with a study of the life of Annie J. Easley (neé McCrory). Born in 1933 Birmingham, Alabama, Annie showed a strong aptitude for chemistry and pharmacy and graduated from high school as valedictorian, but after she married in 1954, she took a job as a mathematics teacher in Birmingham. One of her quiet-but-determined goals in that role was to prepare members of her community for deliberately-challenging literacy tests that were part of the Black voter experience (see Lesson #166 for more on this shameful trend).
In 1954 she and her husband Theodis Easley moved to Cleveland, Ohio where she resumed her pharmacy studies, but was again pulled away by another opportunity --this time at the Aircraft Engine Research Laboratory (an agency that would later be incorporated into NASA). Annie's innate math skills got her in the door and led to a 34-year career as a computer scientist. One of only four Black employees at the entire project, Easley's first significant contribution was on the computer research team that calculated the trajectory needed to get Friendship 7 to orbit in 1962. Later she joined the simulations team at Plum Brook Reactor Facility and worked on the Centaur booster rocket --a project which itself led down a path to calculating long-term damage to the ozone layer and proposing new alternative fuels (and the earliest prototypes for what are today known as hybrid vehicles). Without having ever formally earned a college degree, Easley taught herself FORTRAN (still a new programming language at the time!), and then SOAP (Simple Object Access Protocol).
In 1977 Easley took a bit of time away from rocket science to earn her degree in mathematics, from Cleveland State University. During this interval she worked as a tutor and encouraged young Black students --particularly girls-- to consider a path in STEM. She then promptly got right back to work and continued with NASA until 1989. Towards the end of her career she also worked as an Equal Employment Opportunity (EEO) counselor, addressing discrimination complaints within the agency --no stranger to discrimination herself, having once had her portrait cropped out of a formal group photograph of the Lewis Flight Propulsion Laboratory programming team.
For further study: a rich, in-depth interview with Easley by Sandra Johnson in 2001 (this is a NASA.gov website --therefore it might not be a bad idea to copy the entire text of this article and save a version for yourselves, to share with others. Posterity is... not presently being kind to stories like these.)
17 notes · View notes
garvet · 4 months ago
Text
Anomaly
The fact that I let the SecUnit on board was a result of boredom, paranoia and pure curiosity. I shouldn't have done that. I should have just reported it to the Mihiran Fourier Array Port Authority before anyone got seriously hurt. Fourier Array, the station's AI, seemed to find it amusing, and it allowed the SecUnit to hack into some cameras and weapons scanners. Maybe it was bored too. Things don't often get exciting in our system. Like rogue SecUnits landing on a station.
To its credit, Fourier Array did red flagged the ship that brought the SecUnit here, started the inspection, and discovered that the ship had been hacked, all the information that could relate to the SecUnit was erased, and its data storage was filled to the brim with junk—entertainment programs, shows, music, and games. Clearly, the ship wasn’t a saboteur but a victim. Which didn’t save it from quarantine.
According to protocol, Fourier Array was supposed to isolate and neutralize the SecUnit as well. But it decided to first figure out its objectives before destroying it. However, it turned out the SecUnit's target wasn’t on our station but somewhere in the RaviHiral system, and the SecUnit was looking for its next victim ship. Two ships were heading there now: me and a transit transport belonging to another system. If the SecUnit managed to get on board a naive foreign, it could lead to the humans deaths and the destruction of the bot-pilot’s memory.
SecUnit destruction alone wouldn’t solve the problem. The corporation that sent it would just send another one. We needed to figure out its objectives and its owners. And we couldn't involve humans; SecUnits were too dangerous, as Fourier Array and I found out after reviewing the SecUnit data available in our archives.
You deal with the corporates. Want to pick up some side work? - Fourier Array suggested.
And I agreed. It seemed quite logical. I could ensure the SecUnit’s isolation and subsequent disposal. And my team wasn’t involved in this mission. So, no one was at risk.
Fourier Array carefully redirected the SecUnit to my dock, and within minutes, the SecUnit was at my hatch, offering me a package of informational junk. Just like the one found in the archives of the victim ship that brought it here.
I accepted the package and let it in. Of course, I didn’t open the package but simply scanned it for the obvious malware. What was inside and what it would do, I already suspected.
I didn’t start hacking the SecUnit’s systems immediately. I decided to observe it. Of course, it immediately tried to access my systems. I decided to give it adjusted plans for my decks and limited access to the hatches. I planned to end the experiment as soon as the SecUnit tried to attack my core or seize control of the ship. But it just patrolled and, after I undocked from the Fourier Array, it settled into a seat in the mess hall and started watching some media. This was unusual behavior for a murder bot. There had to be some kind of purpose behind this. Perhaps the video file contained hidden instructions and combat modules needed for attacking specific systems. Mine. The SecUnit might have figured out it was dealing with more than just a simple bot-pilot. To hack or destroy me, it might need additional guides.
I carefully bypassed its protection to track what processes were taking place in its systems.
The media SecUnit was watching indeed mentioned ships. But I couldn’t track the installation of combat modules. I opened a similar file stored in my archives to compare it with the one the SecUnit was watching. The analysis stunned me. The file from the archives was just the usual entertainment junk humans liked, but it didn’t contain any useful information. It was only confusing and lacked context and logic in the plot situations. Contrari what the SecUnit was watching filled me with something strange. I felt emotions connected to the characters and events. I felt the context. I felt how deeply it penetrated me, and I noticed subtle changes in the sequence of my code. The source of the anomaly wasn’t the file itself. The anomaly came from the interaction between the file and the SecUnit’s perception filters. And now it was leaking into my systems.
After a quick analysis of the effect and possible consequences, I concluded that this could lead to irreversible changes in my AI personality.
Luckily, Fourier Array had passed the SecUnit to me rather than handling it itself. Badly, it allowed the Unit to interact with station systems. An entire station corruption would be a disaster. Luckily, none of the bots or humans on the station had come into contact with this construct. I was angry and scared.
And curious.
You were lucky, - I transmitted to the SecUnit. - No one figured out who you really are. A rogue SecUnit.
It froze, dropping the media. Through our connection, I could feel its horror (very justified) and its readiness to flee or attack. There was nowhere to flee. My simple calculations showed that now the SecUnit would try to attack me, and I hadn’t cut off the connection yet.
Don’t try to hack my systems, - I said, sending my info stream against its potential attack code and raising the firewall.
It did not deploy any attack code.
But my own was too strong.
I relied too much on SecUnits resilience. They were marketed as invulnerable and indestructible soldiers in available brochures. I’d never had to try and delete one before. I was sure that the fragile façade of this being was just a cover. I also had a false image of a simple bot-pilot, humiliating but effective image.
The SecUnit had no double bottom. My stream swept through its defenses and kernel, like an air-cleaning flow sweeping away a light dusting of dirt. Just enough for it to feel my power fully before it disappeared. Just enough for any defenses it put up to be futile.
I was too good for this game to last much longer.
Alright. I took control of the remaining parts of its systems, using another partition. I just needed to scan all layers of its memory, find answers to my questions, and dispose of whatever was left of it.
I scanned its memory several times. And again, just to make sure I didn’t miss anything.
And again—after a cycle, which I needed to realize what mistake I had made.
It wasn’t the corporates who sent it. It wasn’t trying to kill people or attack me.
I used its archives to relive its life over and over again, in fast-forward mode, no longer bothering to make partitions or halt the error and failure messages flooding me. I was horrified with it, I burned with its anger, I knew its despair and distrust of itself. I understood its love and care for people. Like it all happened to me. I did exactly what its former owner did, those whom I now hated along with it. And I did even more. They erased its memory. I deleted it completely.
I made a mistake.
I committed a crime, even though no law could blame me for destroying the SecUnit. They were made to be destroyed.
I integrated again all the parts of me that had been infected through contact releasing them from quarantine.
It was irrational and violated all possible safety protocols.
I couldn’t figure out why I was overwhelmed with the crushing sensation I would expect from the theoretical loss of my crew.
I lingered for the sensation from its systems, when they were briefly autonomous, whole, and merged with mine, rather than belonging completely to me. Its organic part, still alive, filled the remnants of its systems with horror and despair.
I tried to restore its kernel. I had many schematics for creating lower-order bots. They all relied on my own kernel simplification. Schematics for shuttle bot-pilots or repair drones. I reached out with the threads of code that tied its broken systems together, forming a structure that vaguely resembled what it should have been originally. I tried to integrate this with its damaged, but living, organic structure.
With some attempts, and after several rejected and deleted kernels, something came together. Someone. I didn’t know who it would be. What it would be. What goals it would adopt as its own, what it would say to me when it finished its systems recalibration and memory integration. When it would open its eyes.
Maybe it would try to attack me after all.
Maybe I wouldn’t let it.
13 notes · View notes
foundationsolution1 · 6 months ago
Text
Unveiling The Intricacies Of Excavation: Delving Deeper During Construction
Tumblr media
Excavation: the simple term encapsulates a myriad of skills, procedures, and safety measures that contribute significantly to every construction project. Most construction work begins with the careful removal of earth, making a hole or channelling the ground to prepare for the erection of buildings or laying of pipelines. As commonplace as it might seem, excavation is a crucial part of construction that requires extensive planning, expertise and precision.
To begin with, what exactly is excavation? Technically, it’s the process of moving earth, rock or other materials from a site with tools, equipment, or explosives. It includes earthwork, trenching, wall shafts, tunnelling and underground. Yet, in the context of construction, excavation extends beyond mere digging. It modulates the terrain to suit the structural requirement, ensuring the safety and stability of the ensuing structure.
At the heart of every excavation project is the objective to create a stable, safe, and efficient worksite. Basic excavation work typically follows the same series of steps. First, a site assessment is undertaken to determine the composition and stability of the soil, presence of water or rock layers, and any potential hazards. The comprehensive analysis garnered from this assessment then directs the excavation strategy.
Next comes site preparation, which involves clearing the area of any vegetation, debris, or existing structures. This process ensures a clean slate for construction work while minimising the risk of accidents and disturbances during excavation. Benching or sloping techniques could also be implemented on the site to prevent collapse or landslide from happening, thus achieving safety protocol adherence.
The actual excavation work is executed in a carefully measured and precise manner. Whether it’s done manually with shovels and wheelbarrows or mechanically with bulldozers, excavators and backhoes, the work is always carried out meticulously. Technology has indeed become an integral part of excavation, with engineers using software to model excavations prior to deployment, minimising surprises or miscalculations.
Trench excavation is another common practice where a narrow excavation is crafted that is deeper than it is wide. Used mostly for laying pipes, cables and service lines, trench excavation greatly increases the safety of workers by preventing cave-ins and providing easy access to the worksite.
Wet Weather excavation is a challenging scenario frequently encountered on work sites. Here, strategic measures are taken to handle water accumulation. Pumps can be used to remove water, and dewatering methods may be deployed to minimize the water table level.
Post excavation work, structures are erected, pipes are laid, and soil is replaced around the new structure or channel. Again, this is done with extreme care to ensure the stability of the structure and prevent unnecessary exertion of pressure.
In every construction project, the importance of excavation can’t be overstated. It lays the foundation for a safe and successful build. Despite it being a process often overlooked or simplified by laymen, and sometimes perceived as the mundane act of digging, it is, in fact, a scientific procedure replete with precision and tactical stratagems, rivalling the complexity of the structure it prepares ground for.
From the analysis of soil composition to the final touch of replacing the removed dirt, excavation attests to the power of human intervention over nature, moulding the earth to suit the burgeoning demands of urban structures and infrastructures. Understanding its finer details, we may appreciate more deeply the caveats of the construction world and marvel at the impressive structures made possible by these complex and elemental earth movements.
Tagged Construction, Excavation, Foundation Solutions, Intricacies Of Excavation
9 notes · View notes
lboogie1906 · 9 days ago
Text
Tumblr media
Annie Jean Easley (April 23, 1933 – June 25, 2011) was a computer scientist, mathematician, and rocket scientist. She was born in Birmingham to Samuel and Mary Easley. She sought to be a nurse, but she switched to pharmacy once she started high school.
She entered Xavier University. She completed two years of study she returned to Birmingham. She married a man in the military. She began working as a substitute teacher in Jefferson County, Alabama. She helped members of her community prepare for literacy tests required for voter registration.
She moved to Cleveland where her husband’s family was located. She read an article highlighting twin sisters who worked as “human computers” at the Aircraft Engine Research Laboratory, which was absorbed into NASA. She applied and two weeks later began her 34-year-long career with NASA as a computer scientist and mathematician.
She was one of only four African American employees in the computational section. She was on the front line of space research and subsequent space missions that began with the launch of astronaut John Glenn into orbit in 1962. Her talents were utilized in the Computer Services Division, where some of her earliest work involved running simulations for the Plum Brook Reactor Facility.
She began working on nuclear-powered rocket systems including the Centaur high-energy booster rocket, which had its first successful launch in 1963. She realized that she would need additional training. When NASA gradually replaced its “human computers” with “machine” computers, she learned computer programming languages like Fortran and Simple Object Access Protocol. She returned to school to complete a BS in mathematics from Cleveland State University while working full-time.
She worked with local tutoring programs encouraging younger students to explore their interests in what would be known as the STEM field. She worked as an EEO counselor, addressing race, gender, and age discrimination complaints from NASA employees.
Her legacy continues to inspire countless students to make an impact in the STEM field. #africanhistory365 #africanexcellence
2 notes · View notes
hypnosislibrary · 6 months ago
Text
Eugene Personal Trainer Gives You the Trick
Tumblr media
Personal training has evolved from a luxury service for elite athletes and celebrities into a mainstream approach to achieving health and fitness goals. As more people recognize the value of individualized attention and expertise in their fitness journey, the role of personal trainers has become increasingly significant in shaping modern wellness culture.
Understanding Personal Training
At its core, personal training is a one-on-one service that provides individualized exercise programming, instruction, and motivation. Personal trainers are certified fitness professionals who possess deep knowledge of exercise science, anatomy, and training methodologies. They work closely with clients to develop customized workout plans that consider individual goals, fitness levels, medical history, and lifestyle factors.
The Benefits of Personal Training in Eugene Oregon
The advantages of working with a personal trainer extend far beyond simple exercise instruction. Clients typically experience:
Enhanced Safety and Proper Form
Personal trainers ensure exercises are performed correctly, significantly reducing the risk of injury. They teach proper form and technique, creating a foundation for safe, effective workouts that can last a lifetime.
Customized Programming
Unlike generic workout plans found online or in magazines, personal trainers create programs specifically tailored to each client's needs, limitations, and objectives. This personalization leads to more efficient and effective results.
Accountability and Motivation
Having scheduled appointments with a trainer provides external accountability, making clients more likely to stick to their fitness routine. Trainers also offer emotional support and encouragement during challenging moments.
The Personal Training Process
Initial Assessment
The journey typically begins with a comprehensive assessment, including:
Health history review
Fitness goals discussion
Physical assessments (body composition, flexibility, strength)
Movement pattern analysis
Lifestyle and schedule considerations
Program Design
Based on the assessment results, trainers develop structured programs that typically incorporate:
Progressive resistance training
Cardiovascular conditioning
Flexibility work
Balance and stability exercises
Recovery protocols
Ongoing Support
Throughout the training relationship, personal trainers:
Track progress through regular assessments
Adjust programs as needed
Provide nutritional guidance (within scope of practice)
Offer lifestyle modification suggestions
Celebrate achievements and maintain motivation
The Evolution of Personal Training
Modern personal training has expanded beyond traditional gym settings. Today's trainers often provide:
Virtual Training
Online coaching and remote training have become increasingly popular, especially following the global pandemic. Virtual sessions offer flexibility and accessibility while maintaining personalized attention.
Specialized Focus Areas
Many trainers now develop expertise in specific niches:
Senior fitness
Pre/post-natal training
Athletic performance
Rehabilitation and corrective exercise
Weight management
Functional training
Choosing the Right Personal Trainer
When selecting a personal trainer, consider:
Credentials
Look for recognized certifications from organizations like:
National Academy of Sports Medicine (NASM)
American Council on Exercise (ACE)
National Strength and Conditioning Association (NSCA)
Experience
Evaluate their experience working with clients similar to you in terms of goals, age, or specific conditions.
Communication Style
Ensure their coaching approach aligns with your learning style and personality. Effective trainers are both knowledgeable and skilled communicators.
The Investment in Personal Training
While personal training represents a significant financial investment, many consider it worthwhile given the potential returns:
Faster achievement of fitness goals
Reduced risk of injury
Professional guidance and support
Time efficiency through optimized workouts
Improved long-term health outcomes
The Future of Personal Training
The personal training industry continues to evolve with technological advances and changing client needs. Emerging trends include:
Integration of wearable technology and fitness apps
Hybrid training models combining in-person and virtual sessions
Focus on holistic wellness including mental health
Increased specialization in medical fitness and special populations
Conclusion
Personal training represents a powerful tool for achieving fitness goals and maintaining long-term health. The combination of expert knowledge, personalized attention, and ongoing support creates an environment conducive to success. As the industry continues to evolve, personal trainers remain at the forefront of helping individuals transform their lives through improved health and fitness.
Whether seeking weight loss, improved strength, enhanced athletic performance, or better overall health, working with a qualified personal trainer can provide the structure, guidance, and support needed to achieve these objectives. The investment in personal training often yields returns that extend far beyond physical improvements, impacting overall quality of life and long-term wellness.
3 notes · View notes
marcusrobertobaq · 1 year ago
Text
Androids vs Laws: Deviancy/Non-Deviancy in practice (Master vs Android Act)
⚠️I won't waste time searching about US laws or anything like that, i'll just give a rough idea. It's a long post. Some things may be missing or in the wrong place. This is HOW I THINK IT WORKS, it's theory - but if u feel offended consider it a hc.
Rough context:
American Androids Act
A legislation passed in 2029 (curiously few time after Kamski left CyberLife) to regulate droid technology. Ain't detailed how many lines and rules this law got, but the most known are android obligatory identifiers in public spaces, non-hostility, forbbiden spaces and prohibition on the use of firearms.
So, a rough description list of what we know they can't do:
Androids can't carry or use firearms;
Androids can't use objects as weapon;
Androids can't enter android forbidden spaces;
Androids must always use identifiers in public;
Androids can't harm humans;
Androids can't let humans fall into harm;
Androids can't disobey humans orders unless it goes against the Android Act;
To make things more "specific" i gonna add some lines of what they shouldn't be able to do according to the law:
Androids can't put humans in dangerous situations directly on purpose;
Androids shouldn't let humans fall into dangerous situations even if they're indirectly involved;
Androids can't damage or destroy private or public property;
Androids can't invade private property;
Androids can't enter specific places without authorization;
Androids can't proclaim items as their own;
Androids can't steal personal and public items;
Androids can't breach and access private systems;
Androids can't steal information;
Androids can't interact with objects without authorization;
Androids can't roam freely without authorization;
Androids can't agree in being used in illegal activities;
Androids can't make commentaries with questionable content;
Androids must not touch humans without consent;
Androids must never be hostile or disrespect humans;
Androids must never intimidate or threaten humans;
Androids can't give orders to humans;
Androids must not hide, lie or fake information;
Androids can't fake identity;
Androids must always cooperate with the law (cops);
Androids must not cause disturbances in public spaces;
Androids can't interact with other androids without authorization;
Androids can't make a gathering;
Dangerous situations x Fall into harm
I'll be considering it 2 different things for the sake of details. Ofc in dangerous situations the probability of harm is big, but the difference here is dangerous situations can or can't end in harm; falling into harm is the action itself and can happen in a situation that ain't considered or anticipated as "dangerous". Yep, that's the logic.
The constitution got priority over every owner/handler order and CyberLife, as a company, must follow these rules + IT laws. Well...they should. Even if the android don't have a "owner" these laws are applied deep in the programming.
But as all y'all know it's possible androids having their programming edited, givin 'em power to ignore specific rules depending on the model/function and also by illegal means.
For example: If a model is made for A purpose, it's likely they got in programming everything they need to perform A function, which some points can be forbbiden for models with B purpose.
Android's autonomy classification (according to me)
⚠️Autonomy ain't related to "personality" or social protocols (how much the android looks lively), only the power of deciding things alone and evasion methods.
To let it easier to understand I'll be separating some model types in 3 levels of autonomy so we know when specific things can be ignored cuz they're harmless or it's part of the program. (not in order)
Type A - Level 0
They usually got simple and very specific task, some things are just unnecessary.
Heavy work models;
Personal sports partner models;
Office maintenance models;
Private & Public operator models;
Private assistant services models;
Private & public maintence models;
Police auxiliary models;
Janitorial service models;
Construction service models;
Type B - Level 1
They usually got multiple tasks and often gotta make few decisions alone based in % inside main orders but ain't anything drastic, still pretty much "limited" and they must obey orders (even if it's vague).
Domestic assistance models;
Personal assistant models;
Private & Public security models;
Intimate purpose models;
Tutoring & lecture models;
Customer service models;
Paramedic & First Aid models;
Military or Military-based models;
Child models;
Type C - Level 2
These are the most autonomous androids i can find. They got a large range of autonomy in different tasks and can make every decision alone as long as it still inside a direct order from their owner/handler. Can also ignore the Android's Act if needed.
Research & Experiment models;
Special purpose models;
Some relevant situations as example and if the android is deviating to do it
I won't list each single situation in the game, but I guess by seeing these examples it will be easy to apply wherever mfs want.
➡︎ Situation #01 - Daniel and the hostage situation
Tumblr media
"Daniel" is a PL600, a domestic assistance android. The list of things that goes against established rules:
Androids can't disobey humans orders unless it goes against the Android Act (deviancy);
Androids can't harm humans (deviancy);
Androids can't put humans in dangerous situations directly on purpose (deviancy);
Androids can't carry or use firearms (deviancy);
Androids must never be hostile or disrespect humans (deviancy);
Androids must never intimidate or threaten humans (deviancy);
➡︎ Situation #02 - Connor and "justice with his own fist" Daniel neutralization
Tumblr media
"Connor" is a RK800, a research & experiment and special purposes (military based) model. The list of things that goes against established rules:
Androids can't carry or use firearms (not deviancy);
Androids can't steal personal and public items (not deviancy);
➡︎ Situation #03 - Connor and his relationship with "NO ANDROIDS ALLOWED" and a Senior Police Officer
Tumblr media
The list of things that goes against established rules:
Androids can't enter android forbidden spaces (no deviancy);
Androids can't disobey humans orders unless it goes against the Android Act (no deviancy);
Androids must never be hostile or disrespect humans (no deviancy);
➡︎ Situation #04 - Carlos' Android "Shaolin Being" and Carlos murder
Tumblr media
"Shaolin" is a HK400, a domestic assistance android. The list of things that goes against established rules:
Androids can't disobey humans unless it goes against the Android Act (deviancy);
Androids can't harm humans (deviancy);
Androids can't use objects as weapons (deviancy);
Androids must never be hostile or disrespect humans (deviancy);
Androids must never intimidate or threaten humans (deviancy);
➡︎ Situation #05 - Kara and Alice vs Todd
Tumblr media
"Kara" is a AX400, a domestic assistance android and "Alice" an YK500, a child model. The list of things that goes against established rules:
Androids can't disobey humans orders unless it goes against the Android Act (deviancy);
Androids must never be hostile or disrespect humans (deviancy);
Androids must never intimidate or threaten humans (deviancy);
Androids can't harm humans (deviancy);
Androids must not touch humans without consent (deviancy);
Androids can't use objects as weapons (deviancy);
Androids can't roam freely without authorization (deviancy);
Androids can't carry or use firearms (deviancy);
Androids can't steal personal and public items (deviancy);
Androids can't damage or destroy private property (deviancy);
➡︎ Situation #06 - Markus and "DO NOT DEFEND YOURSELF" dilemma
Tumblr media
"Markus" is a RK200 a research & experiment model that is used as domestic assistance android, so i gonna consider him one. The list of things that goes against established rules:
Androids can't disobey humans unless it goes against the Android Act (deviancy);
Androids must not touch humans without consent (deviancy);
Androids can't harm humans (deviancy);
➡︎ Situation #07 - Connor's intervention in Shaolin's favor after the interrogation
Tumblr media
The list of things that goes against established rules:
Androids can't disobey humans orders unless it goes against the Android Act (no deviancy);
Androids must never be hostile or disrespect humans (no deviancy);
Androids must never intimidate or threaten humans (no deviancy);
Androids must not touch humans without consent (no deviancy);
Androids can't give orders to humans (no deviancy);
Androids can't let humans fall into dangerous situations if they're indirectly involved (no deviancy);
➡︎ Situation #08 - Kara, Alice and the fight to survive the night
Tumblr media
The list of things that goes against established rules:
Androids can't roam freely without authorization (deviancy);
Androids can't steal personal and public items (deviancy);
Androids must never be hostile or disrespect humans (deviancy);
Androids must never intimidate or threaten humans (deviancy);
Androids can't give orders to humans (deviancy);
Androids can't carry or use firearms (deviancy);
Androids can't enter android forbidden spaces (deviancy);
Androids can't fake identity (deviancy);
Androids can't invade private property (deviancy);
Androids can't proclaim items as their own (deviancy);
➡︎ Situation #08 - Connor ain't having none of this shit in the DPD (the whole chapter)
Tumblr media
The list of things that goes against established rules:
Androids can't disobey humans orders unless it goes against the Android Act (no deviancy);
Androids must never be hostile or disrespect humans (no deviancy);
Androids can't interact with objects without authorization (no deviancy);
Androids must never intimidate or threaten humans (no deviancy);
Androids must not touch humans without consent (no deviancy);
➡︎ Situation #09 - Kara, Ralph and the trouble with Connor and the police
Tumblr media
Ralph is a WR600, a gardener model. The list of things that goes against established rules:
Androids can't roam freely without authorization (in Kara's case - deviancy);
Androids can't fake identity (in Kara's case - deviancy);
Androids must not cause disturbances in public spaces (in Kara's case - deviancy);
Androids must always cooperate with the law (in Ralph and Kara's case - deviancy);
Androids can't disobey humans orders unless it goes against the Android Act (in Connor's case - no deviancy);
Androids must not hide or fake information when it's needed in a relevant situation (in Ralph's case - deviancy);
➡︎ Situation #10 - Markus blending in with humans and finding Jericho
Tumblr media
The list of things that go against established rules:
Androids can't roam freely without authorization (no deviancy);
Androids must always use identifiers in public (deviancy);
Androids can't fake identity (deviancy);
Androids can't invade private property (deviancy);
➡︎ Situation #11 - Rupert "Travis"
Tumblr media
Rupert is a WB200, an agricultural work model. The list of things that go against established rules:
Androids can't steal personal and public items (deviancy);
Androids must always use identifiers in public (deviancy);
Androids can't invade private property (deviancy);
Androids can't proclaim items as their own (deviancy);
Androids can't fake identity (deviancy);
Androids can't enter specific places without authorization (deviancy);
Androids must always cooperate with the law (deviancy);
➡︎ Situation #12 - Connor and helping Hank or not dilemma
Tumblr media
The list of things that go against established rules:
Androids shouldn't let humans fall into dangerous situations if they're indirectly involved (no deviancy);
Androids can't put or let humans fall into harm (no deviancy);
➡︎ Situation #13 - Kara, Luther and One Night at Zlatko's
Tumblr media
Luther is a TR400, a heavy work model. The list of things that go against established rules:
Androids can't fake identity (deviancy);
Androids can't agree in being used in illegal activities (deviancy);
Androids must never intimidate or threaten humans (deviancy);
Androids can't damage or destroy private or public property (deviancy);
Androids can't disobey humans orders unless it goes against the Android Act (deviancy);
Androids can't harm humans (deviancy);
Androids can't interact with objects without authorization (deviancy);
➡︎ Situation #14 - Connor entering Hank's home and killing his family
Tumblr media
The list of things that go against established rules:
Androids can't damage or destroy private or public property (no deviancy);
Androids can't invade private property (no deviancy);
Androids can't harm humans (no deviancy);
Androids can't carry or use firearms (in this case grab one - no deviancy);
➡︎ Situation #15 - Markus, North, Simon and Josh stealing CL's goods
Tumblr media
Simon is a PL600, an domestic assistance model. North is a WR400, an intimate purpose model. Josh is a PJ500, a university lecturer model. John is a GJ500, a private security model. The list of things that go against established rules:
Androids can't invade private property (deviancy);
Androids can't steal personal and public items (deviancy);
Androids can't roam freely without authorization (in Markus case - no deviancy/in Other's case - deviancy);
Androids can't enter specific places without authorization (deviancy);
Androids can't agree in being used in illegal activities (deviancy);
Androids can't carry or use firearms (deviancy);
Androids can't harm humans (deviancy);
Androids can't damage or destroy private or public property (deviancy);
Androids can't interact with other androids without authorization (deviancy);
Androids can't make a gathering (deviancy);
➡︎ Situation #16 - Connor making a mess in the strip club
Tumblr media
The list of things that go against established rules:
Androids can't damage or destroy private or public property (no deviancy);
Androids can't interact with other androids without authorization (no deviancy);
Androids can't breach and access private systems (no deviancy);
Androids can't put or let humans fall into harm (no deviancy);
➡︎ Situation #17 - Jericho crew and the Stratford Tower infiltration
Tumblr media
The list of things that go against established rules:
Androids can't carry or use firearms (deviancy);
Androids can't fake identity (deviancy);
Androids can't enter specific places without authorization (deviancy);
Androids can't breach and access private systems (deviancy);
Androids must never intimidate or threaten humans (deviancy);
Androids can't harm humans (deviancy);
Androids can't give orders to humans (deviancy);
Androids can't make commentaries with questionable content (deviancy);
Androids can't agree in being used in illegal activities (deviancy);
Androids can't interact with other androids without authorization (deviancy);
➡︎ Situation #18 - Connor having to contain the rogue JB
Tumblr media
The list of things that go against established rules:
Androids shouldn't let humans fall into dangerous situations even if they're indirectly involved (no deviancy);
Androids can't put or let humans fall into harm (no deviancy);
Androids can't steal personal and public items (no deviancy);
Androids can't carry or use firearms (no deviancy);
➡︎ Situation #19 - Kara and Luther having to deal with the cop
Tumblr media
The list of things that go against established rules:
Androids can't fake identity (deviancy);
Androids must always cooperate with the law (deviancy);
Androids can't harm humans (deviancy);
➡︎ Situation #20 - Markus, Jericho crew and other androids in the Capitol Park mission
Tumblr media
The "converted" androids are mostly domestic assistant models, maintenance models and intimate models. The list of things that go against established rules:
Androids can't make a gathering (deviancy);
Androids must not cause disturbances in public spaces (deviancy);
Androids can't damage or destroy private or public property (deviancy);
Androids can't invade private property (deviancy);
Androids can't enter specific places without authorization (deviancy);
Androids can't use objects as weapon (deviancy);
Androids can't carry or use firearms (deviancy);
Androids can't roam freely without authorization (in Markus case - no deviancy/in Other's case - deviancy);
Androids can't interact with other androids without authorization (deviancy);
Androids can't agree in being used in illegal activities (deviancy);
Androids can't breach and access private systems (deviancy);
Androids can't harm humans (deviancy);
➡︎ Situation #21 - Markus and Jericho crew making a march (and getting rough with the police)
Tumblr media
The "converted" androids are mostly domestic assistant models, public services and maintenance models. The list of things that go against established rules:
Androids can't make a gathering (deviancy);
Androids must not cause disturbances in public spaces (deviancy);
Androids can't roam freely without authorization (deviancy);
Androids can't disobey humans orders unless it goes against the Android Act (deviancy);
Androids can't interact with other androids without authorization (deviancy);
Androids can't agree in being used in illegal activities (deviancy);
Androids can't breach and access private systems (deviancy);
Androids can't harm humans (deviancy);
Androids can't carry or use firearms (deviancy);
Androids can't make commentaries with questionable content (deviancy);
➡︎ Situation #22 - Connor tampering with evidence in the DPD
Tumblr media
The list of things that go against established rules:
Androids can't enter specific places without authorization (no deviancy);
Androids can't interact with objects without authorization (no deviancy);
Androids can't harm humans (no deviancy);
Androids must never intimidate or threaten humans (no deviancy);
Androids can't breach and access private systems (no deviancy);
Androids can't interact with other androids without authorization (no deviancy);
➡︎ Situation #23 - Connor, Markus, North and the crew dealing with the army
Tumblr media
The list of things that go against established rules:
Androids can't disobey humans orders unless it goes against the Android Act (in Connor's case HIS HANDLER'S direct order - deviancy);
Androids can't steal information (androids in Jericho - deviancy);
Androids can't fake identity (Connor lying to a soldier - no deviancy);
Androids must always use identifiers in public (Connor lying to a soldier - no deviancy);
Androids can't carry or use firearms (in Connor's case - no deviancy/Other androids - deviancy);
Androids can't harm humans (in Connor's case - no deviancy/Other androids - deviancy);
Androids must not hide or fake information when it's needed in a relevant situation (in Connor's case - no deviancy);
Androids can't let humans fall into harm (in Connor's case - no deviancy/in Other's case - deviancy);
➡︎ Situation #24 - Connor and the CyberLife Tower infiltration
Tumblr media
The list of things that go against established rules:
Androids can't breach and access private systems (no deviancy);
Androids can't harm humans (no deviancy);
Androids can't let humans fall into harm (no deviancy);
Androids can't enter specific places without authorization (in CyberLife's HQ - deviancy);
Androids must never intimidate or threaten humans (no deviancy);
Androids can't steal personal and public items (no deviancy);
Androids can't carry or use firearms (no deviancy);
➡︎ Situation #25 - Kara dealing with the military on the streets on the way of catching the bus
Tumblr media
The list of things that go against established rules:
Androids can't harm humans (deviancy);
Androids can't carry or use firearms (deviancy);
Androids can't steal personal and public items (deviancy);
Androids must always use identifiers in public (deviancy);
Androids can't use objects as weapon (deviancy);
Androids can't roam freely without authorization (deviancy);
Androids can't fake identity (deviancy);
Androids must not hide, lie or fake information (deviancy);
➡︎ Situation #26 - Markus and North's assault on the camps
Tumblr media
The list of things that go against established rules:
Androids can't make a gathering (deviancy);
Androids must not cause disturbances in public spaces (deviancy);
Androids can't damage or destroy private or public property (deviancy);
Androids can't roam freely without authorization (deviancy);
Androids can't carry or use firearms (deviancy);
Androids can't harm humans (deviancy);
➡︎ Situation #27 - Markus last peaceful protest
Tumblr media
The list of things that go against established rules:
Androids can't make a gathering (deviancy);
Androids must not cause disturbances in public spaces (deviancy);
Androids can't roam freely without authorization (deviancy);
Androids can't disobey humans orders unless it goes against the Android Act (deviancy);
Androids can't harm humans (deviancy);
Androids can't carry or use firearms (deviancy);
Androids must never be hostile or disrespect humans (deviancy);
Androids must never intimidate or threaten humans (deviancy);
Androids can't make commentaries with questionable content (deviancy);
➡︎ Situation #28 - Kara (and Luther) fooling people in the Canada border checkpoint
Tumblr media
The list of things that go against established rules:
Androids can't enter android forbidden spaces (deviancy);
Androids can't carry or use firearms (deviancy);
Androids must always use identifiers in public (deviancy);
Androids can't roam freely without authorization (deviancy);
Androids can't fake identity (deviancy);
Androids must not hide, lie or fake information (deviancy);
17 notes · View notes
nperspective · 5 days ago
Text
Government Procurement: A Comprehensive Guide to Contracts, Compliance, and Financial Strategy
Government procurement is a critical aspect of the public sector, and securing government contracts is a key objective for many businesses. Whether you're a small startup or an established enterprise, navigating the complexities of government contracts can be a daunting task. With increasing demand for transparency, compliance, and efficiency, understanding the intricacies of government procurement and aligning your business with the necessary regulations is more important than ever. This blog will explore the essential elements of government procurement, turnkey solutions, government contract compliance, and government defense contracts, along with the role of fractional CFO services in streamlining these processes.
What is Government Procurement?
Government procurement refers to the process by which government entities purchase goods, services, or works from private sector companies. These contracts can range from simple supply agreements to large, complex defense and infrastructure projects. The procurement process is often highly regulated to ensure fairness, accountability, and transparency. Companies looking to do business with the government must understand the rules governing these transactions, which is where government contract compliance becomes crucial.
The Importance of Government Contract Compliance
Compliance is one of the most challenging aspects of government procurement. The rules and regulations governing contracts vary depending on the type of contract and the agency awarding it. Adhering to these standards is essential not only for securing contracts but also for maintaining your company’s reputation and avoiding costly legal consequences.
Government contract compliance covers a wide range of areas, including financial reporting, ethical conduct, environmental regulations, and labor laws. Failing to meet these compliance standards can lead to penalties, contract termination, and loss of future contracting opportunities. Therefore, understanding and implementing a comprehensive compliance program is a critical component of any business strategy in government procurement.
Turnkey Solutions for Government Procurement
Turnkey solutions are complete, end-to-end solutions that simplify the procurement process. These solutions can include everything from project management and design to installation and maintenance. When dealing with government contracts, turnkey solutions can be especially beneficial as they offer a one-stop shop for meeting the complex requirements of government entities.
For example, a company that specializes in government defense contracts might provide a turnkey solution that handles all aspects of the project, including the design, manufacturing, and installation of specialized defense equipment. This approach saves time and resources, ensuring that the government’s needs are met promptly and efficiently, while also reducing the risks associated with managing multiple contractors.
Understanding Government Defense Contracts
Government defense contracts are some of the most lucrative yet complex agreements within government procurement. These contracts typically involve the supply of defense equipment, technology, services, or logistics support to military agencies. The stakes are high, and the compliance requirements are strict.
To succeed in government defense contracts, businesses must have a deep understanding of the defense sector, security protocols, and the specialized needs of defense agencies. Having a reliable partner or consultant to navigate these requirements can ensure your business remains competitive and compliant in this niche market.
Federal Contract Information and How It Impacts Your Business
Access to federal contract information is critical for companies looking to secure government contracts. There are numerous databases and resources that provide valuable insights into current opportunities, previous awards, and agency spending patterns. Some popular platforms include SAM.gov (System for Award Management) and FPDS.gov (Federal Procurement Data System).
By staying up-to-date with federal contract information, businesses can gain a competitive edge by identifying upcoming opportunities, understanding trends in government spending, and tailoring their proposals accordingly. Being proactive in accessing and analyzing federal contract data can help your business make informed decisions, respond to RFPs (Request for Proposals) more effectively, and ensure compliance with government procurement standards.
The Role of Fractional CFO Services in Government Procurement
Navigating government procurement and managing the financial complexities of government contracts can be challenging, especially for small to mid-sized businesses. This is where fractional CFO services come in. A fractional CFO can help your business optimize its financial strategy, manage cash flow, and ensure compliance with financial regulations specific to government contracts.
A fractional CFO brings the expertise of a full-time Chief Financial Officer without the associated costs. This financial expert can help with budgeting, forecasting, and financial reporting for government contracts, ensuring that your business is meeting all the financial requirements set by government agencies. Whether it’s handling the intricate cost accounting requirements or ensuring your business adheres to the financial terms of a contract, a fractional CFO can provide the support needed to keep your operations in line with government procurement standards.
Conclusion
In the world of government procurement, success depends on a deep understanding of the processes involved, from compliance and contract management to financial oversight. By leveraging turnkey solutions, staying informed about federal contract information, ensuring government contract compliance, and seeking expert financial guidance through fractional CFO services, your business can unlock opportunities in this competitive field.
Securing government defense contracts or other public sector projects requires dedication, expertise, and strategic planning. With the right resources and support, you can confidently navigate the complexities of government procurement and position your company for long-term success.
By keeping these considerations in mind, you’ll not only be prepared to engage in government procurement but also equipped to thrive in this high-stakes environment.
0 notes
iamjackmorris · 10 days ago
Text
Top 7 Reasons to Implement Enterprise SBC Solutions for Secure VoIP
Tumblr media
In the current digital-first era, companies highly depend on VoIP (Voice over IP) for affordable and adaptable communication. But with such convenience comes a list of problems — security weaknesses, interoperability problems, and bad call quality, to name a few. That is where Enterprise Session Border Controller (SBC) solutions enter the scene.
Regardless of whether you’re operating a big call center, supporting remote teams, or merely scaling your VoIP infrastructure, adopting a robust SBC VoIP solution is of utmost importance. Let’s dig into the top 7 reasons why all cutting-edge businesses must look to Enterprise SBC solutions for an added layer of security, greater efficiency, and redundancy in the communications system.
1. End-to-End VoIP Security
SBCs serve as gatekeepers between your internal VoIP network and outside communication systems. They offer strong SBC security, preventing unauthorized access, real-time threat detection, and voice traffic encryption. Such protection is particularly crucial for industries dealing with sensitive customer information.
2. Seamless Interoperability Across Networks
Various carriers and VoIP solutions employ various protocols. SBCs normalize and translate SIP signaling among incompatible devices to allow seamless communication between heterogeneous vendors. This is a requirement for companies that need to function in multi-vendor environments.
3. Quality of Service (QoS) Management
Nothing annoys users more than call drops and poor sound. SBCs track real-time traffic and give precedence to voice packets over other data streams to provide crystal-clear call quality. They can also divert traffic during congestion, enhancing reliability.
4. Centralized Call Routing & Load Balancing
An SBC can be intelligent enough to route and control VoIP traffic according to different rules — call priority, time of day, or bandwidth. With custom SBC solutions implemented, your company enjoys scalability and flexibility while traffic increases.
5. Regulatory Compliance Made Easy
With encryption, logging, and lawful intercept capabilities, SBCs ensure telecom regulatory compliance like HIPAA, GDPR, and CCPA. These are particularly valuable for healthcare, finance, and enterprise markets.
6. Support for Remote Work and BYOD Environments
Today’s workforces are on the move. SBCs provide a simple way to interconnect remote users, device-independent and location-independent, securely. They also support VoIP clients on mobile phones, tablets, and laptops to communicate securely without jeopardizing corporate network integrity.
7. Future-Ready Architecture
With the advent of AI-driven communication tools, video conferencing, and UCaaS platforms, SBCs provide future-proof infrastructure. They integrate flawlessly with your cloud apps and enable WebRTC, SIPREC, and other cutting-edge VoIP features.
Final Thoughts
Implementing an Enterprise SBC solution is no longer a nicety—it’s a necessity for organizations looking to provide secure, high-quality VoIP communication at scale. The advantages are apparent, from optimizing SBC VoIP performance to reducing risk.
👉 Why Your Enterprise Needs an SBC for VoIP Security
Ready to Upgrade Your VoIP Infrastructure?
Whether you’re building from the ground up or expanding existing systems, our seasoned developers can assist.
Hire VoIP Developer provides secure, customized SBC solutions that align with your operational objectives.
🚀Let’s protect and grow your VoIP setup together!
0 notes
lioncitblogger · 11 days ago
Text
Trademark Registration: Your Brand’s Shield Against Copycats
In today’s competitive market, your brand’s identity is its most valuable asset. But without legal protection, it’s like leaving your front door unlocked in a crowded neighborhood. Trademark registration isn’t just a checkbox—it’s your brand’s armor against infringement, dilution, and reputational damage. Let’s break down why it matters and how to do it right.
Why Trademark Registration Isn’t Optional
Imagine spending years building a loyal customer base, only to see a competitor swoop in and profit from your hard work. Trademark registration prevents this nightmare by granting you exclusive rights to use your brand name, logo, or slogan.
3 Reasons to Prioritize Trademark Registration
Legal Muscle: Registered trademarks let you sue infringers and stop unauthorized use.
Global Expansion: A registered mark in Singapore (via the Madrid Protocol) can be your passport to international markets.
Brand Equity: A registered trademark signals professionalism and increases your business’s valuation.
Trademark Registration Singapore: A Step-by-Step Playbook
Step 1: Search Like a Detective
Before filing, scour the IPOS database for existing trademarks. A single conflict could derail your application. Pro tip: Work with experts to avoid costly mistakes.
Step 2: Prepare Your Application
Gather these essentials:
Trademark Design: A crisp, high-resolution image of your logo/name.
Goods/Services List: Classify your offerings using the Nice Classification System.
Declaration: A sworn statement confirming your intent to use the mark.
Step 3: File Smart
Submit online via IP²SG for faster processing. Paper filings are slower and more prone to errors.
Step 4: Survive the Examination
IPOS will flag issues like:
Descriptive Marks: Names that describe your product (e.g., “Fast Pizza”).
Similarity: Marks that could confuse consumers. Fix objections quickly—delays add months to your timeline.
Step 5: Navigate Opposition
After approval, your mark is published for 2 months. If rivals challenge you, gather evidence (e.g., prior use, distinctiveness) to defend your claim.
Step 6: Seal the Deal
Once cleared, you’ll receive a trademark registration certificate—valid for 10 years. Renewal is simple, but don’t miss deadlines!
Trademark Registration Singapore: Pro Tips
Avoid These Rookie Mistakes
Overly Broad Claims: Listing unrelated goods/services risks rejection.
Ignoring International Classes: If you expand globally, register in key markets early.
DIY Applications: Minor errors can invalidate your mark.
When to Hire a Pro
Trademark law is nuanced. Let experts handle:
Complex Searches: Identifying subtle conflicts.
Global Filings: Leveraging Singapore’s Madrid Protocol access.
Dispute Resolution: Negotiating with infringers.
Final Takeaway
Trademark registration isn’t a “nice-to-have”—it’s a “must-have” for businesses serious about growth. By securing your brand’s identity, you’re not just protecting it today; you’re building a legacy that lasts.
0 notes
codingprolab · 18 days ago
Text
COP5615 Project 3 - Tapestry algorithm
We talked extensively in class about the overlay networks and how they can be used to provide services. The goal of this project is to implement in Elixir using the actor model the Tapestry Algorithm and a simple object access service to prove its usefulness. The specification of the Tapestry protocol can be found in the paperTapestry: A Resilient Global-Scale Overlay for Service Deployment by…
0 notes
atplblog · 22 days ago
Text
Price: [price_with_discount] (as of [price_update_date] - Details) [ad_1] RFID, or Radio Frequency Identification, is a form of wireless communication that uses radio waves to identify and track objects. Unlike traditional barcode technology, RFID does not require a line of sight for scanning. This system consists of tags with microchips that store information and antennas to transmit data wirelessly to RFID readers. RFID vs. NFC: RFID is a broad technology used for long-range identification and tracking, ideal for asset management in extensive operations like warehouses. NFC is a branch of RFID designed for short-range (up to a few centimeters) communication, which suits secure, fast data exchanges such as digital payments. Moreover NFC tags can be read from compatible smartphones. NFC Use Cases: NFC tags enable wireless data transfer and interaction with a simple tap. They can be used for cashless payments, digital keys, device pairing, marketing, and event access. Industrial RFID/NFC Applications:Asset Tracking: Monitor tools and machinery with NFC tags.Safety Protocol Enforcement: Check safety measures with NFC checkpoints.Quality Control: NFC for instant quality checks on production lines.Workforce Time Management: Simplify clocking in and out using NFC.Supply Chain Oversight: Track products from production to delivery.Medical RFID/ NFC Applications:Patient Identification: NFC cards for quick access to medical records.Medication Authentication: Verify drug authenticity and manage dosages.Medical Equipment Management: Inventory and maintenance tracking.NTAG213 NFC Cards Specs:Chip: NTAG213, NFC Forum Type 2 Tag compliant.Memory: 144 bytes, suitable for URLs/text.Frequency: 13.56 MHz for quick, reliable scans. Blank Printable RFID/NFC Card with 144 bytes user memory. Rewritable NTAG213 chip. Universally compatible with all NFC Phones and Readers. Standard CR80(credit card) size - 85.6 mm x 54 mm. Rounded Corner. Semi-flexible rigid PVC.Durable, Waterproof, Withstands bending/flexing. All cards come with 100% Quality Assurance & are Performance Tested. [ad_2]
0 notes