#Terminal Operating System Integration
Explore tagged Tumblr posts
Text
https://www.acuitilabs.com/port/
#AcuitiPort#Port Billing Solution#BRIM Accelerator for Seaports#Maritime Sector Technology#Acuiti Labs#Invoicing Solution for Ports#Revenue Management at Ports#ERP Integration for Ports#Digital Transformation for Seaports#Automate Port Billing#Terminal Operating System Integration
0 notes
Text
All-Star Moments in Space Communications and Navigation
How do we get information from missions exploring the cosmos back to humans on Earth? Our space communications and navigation networks – the Near Space Network and the Deep Space Network – bring back science and exploration data daily.
Here are a few of our favorite moments from 2024.

1. Hip-Hop to Deep Space
The stars above and on Earth aligned as lyrics from the song “The Rain (Supa Dupa Fly)” by hip-hop artist Missy Elliott were beamed to Venus via NASA’s Deep Space Network. Using a 34-meter (112-foot) wide Deep Space Station 13 (DSS-13) radio dish antenna, located at the network’s Goldstone Deep Space Communications Complex in California, the song was sent at 10:05 a.m. PDT on Friday, July 12 and traveled about 158 million miles from Earth to Venus — the artist’s favorite planet. Coincidentally, the DSS-13 that sent the transmission is also nicknamed Venus!
NASA's PACE mission transmitting data to Earth through NASA's Near Space Network.
2. Lemme Upgrade You
Our Near Space Network, which supports communications for space-based missions within 1.2 million miles of Earth, is constantly enhancing its capabilities to support science and exploration missions. Last year, the network implemented DTN (Delay/Disruption Tolerant Networking), which provides robust protection of data traveling from extreme distances. NASA’s PACE (Plankton, Aerosol, Cloud, ocean Ecosystem) mission is the first operational science mission to leverage the network’s DTN capabilities. Since PACE’s launch, over 17 million bundles of data have been transmitted by the satellite and received by the network’s ground station.

A collage of the pet photos sent over laser links from Earth to LCRD and finally to ILLUMA-T (Integrated LCRD Low Earth Orbit User Modem and Amplifier Terminal) on the International Space Station. Animals submitted include cats, dogs, birds, chickens, cows, snakes, and pigs.
3. Who Doesn’t Love Pets?
Last year, we transmitted hundreds of pet photos and videos to the International Space Station, showcasing how laser communications can send more data at once than traditional methods. Imagery of cherished pets gathered from NASA astronauts and agency employees flowed from the mission ops center to the optical ground stations and then to the in-space Laser Communications Relay Demonstration (LCRD), which relayed the signal to a payload on the space station. This activity demonstrated how laser communications and high-rate DTN can benefit human spaceflight missions.
4K video footage was routed from the PC-12 aircraft to an optical ground station in Cleveland. From there, it was sent over an Earth-based network to NASA’s White Sands Test Facility in Las Cruces, New Mexico. The signals were then sent to NASA’s Laser Communications Relay Demonstration spacecraft and relayed to the ILLUMA-T payload on the International Space Station.
4. Now Streaming
A team of engineers transmitted 4K video footage from an aircraft to the International Space Station and back using laser communication signals. Historically, we have relied on radio waves to send information to and from space. Laser communications use infrared light to transmit 10 to 100 times more data than radio frequency systems. The flight tests were part of an agency initiative to stream high-bandwidth video and other data from deep space, enabling future human missions beyond low-Earth orbit.

The Near Space Network provides missions within 1.2 million miles of Earth with communications and navigation services.
5. New Year, New Relationships
At the very end of 2024, the Near Space Network announced multiple contract awards to enhance the network’s services portfolio. The network, which uses a blend of government and commercial assets to get data to and from spacecraft, will be able to support more missions observing our Earth and exploring the cosmos. These commercial assets, alongside the existing network, will also play a critical role in our Artemis campaign, which calls for long-term exploration of the Moon.

On Monday, Oct. 14, 2024, at 12:06 p.m. EDT, a SpaceX Falcon Heavy rocket carrying NASA’s Europa Clipper spacecraft lifts off from Launch Complex 39A at NASA’s Kennedy Space Center in Florida.
6. 3, 2, 1, Blast Off!
Together, the Near Space Network and the Deep Space Network supported the launch of Europa Clipper. The Near Space Network provided communications and navigation services to SpaceX’s Falcon Heavy rocket, which launched this Jupiter-bound mission into space! After vehicle separation, the Deep Space Network acquired Europa Clipper’s signal and began full mission support. This is another example of how these networks work together seamlessly to ensure critical mission success.

Engineer Adam Gannon works on the development of Cognitive Engine-1 in the Cognitive Communications Lab at NASA’s Glenn Research Center.
7. Make Way for Next-Gen Tech
Our Technology Education Satellite program organizes collaborative missions that pair university students with researchers to evaluate how new technologies work on small satellites, also known as CubeSats. In 2024, cognitive communications technology, designed to enable autonomous space communications systems, was successfully tested in space on the Technology Educational Satellite 11 mission. Autonomous systems use technology reactive to their environment to implement updates during a spaceflight mission without needing human interaction post-launch.

A first: All six radio frequency antennas at the Madrid Deep Space Communication Complex, part of NASA’s Deep Space Network (DSN), carried out a test to receive data from the agency’s Voyager 1 spacecraft at the same time.
8. Six Are Better Than One
On April 20, 2024, all six radio frequency antennas at the Madrid Deep Space Communication Complex, part of our Deep Space Network, carried out a test to receive data from the agency’s Voyager 1 spacecraft at the same time. Combining the antennas’ receiving power, or arraying, lets the network collect the very faint signals from faraway spacecraft.
Here’s to another year connecting Earth and space.
Make sure to follow us on Tumblr for your regular dose of space!
1K notes
·
View notes
Text
ever wonder why spotify/discord/teams desktop apps kind of suck?
i don't do a lot of long form posts but. I realized that so many people aren't aware that a lot of the enshittification of using computers in the past decade or so has a lot to do with embedded webapps becoming so frequently used instead of creating native programs. and boy do i have some thoughts about this.
for those who are not blessed/cursed with computers knowledge Basically most (graphical) programs used to be native programs (ever since we started widely using a graphical interface instead of just a text-based terminal). these are apps that feel like when you open up the settings on your computer, and one of the factors that make windows and mac programs look different (bc they use a different design language!) this was the standard for a long long time - your emails were served to you in a special email application like thunderbird or outlook, your documents were processed in something like microsoft word (again. On your own computer!). same goes for calendars, calculators, spreadsheets, and a whole bunch more - crucially, your computer didn't depend on the internet to do basic things, but being connected to the web was very much an appreciated luxury!
that leads us to the eventual rise of webapps that we are all so painfully familiar with today - gmail dot com/outlook, google docs, google/microsoft calendar, and so on. as html/css/js technology grew beyond just displaying text images and such, it became clear that it could be a lot more convenient to just run programs on some server somewhere, and serve the front end on a web interface for anyone to use. this is really very convenient!!!! it Also means a huge concentration of power (notice how suddenly google is one company providing you the SERVICE) - you're renting instead of owning. which means google is your landlord - the services you use every day are first and foremost means of hitting the year over year profit quota. its a pretty sweet deal to have a free email account in exchange for ads! email accounts used to be paid (simply because the provider had to store your emails somewhere. which takes up storage space which is physical hard drives), but now the standard as of hotmail/yahoo/gmail is to just provide a free service and shove ads in as much as you need to.
webapps can do a lot of things, but they didn't immediately replace software like skype or code editors or music players - software that requires more heavy system interaction or snappy audio/visual responses. in 2013, the electron framework came out - a way of packaging up a bundle of html/css/js into a neat little crossplatform application that could be downloaded and run like any other native application. there were significant upsides to this - web developers could suddenly use their webapp skills to build desktop applications that ran on any computer as long as it could support chrome*! the first applications to be built on electron were the late code editor atom (rest in peace), but soon a whole lot of companies took note! some notable contemporary applications that use electron, or a similar webapp-embedded-in-a-little-chrome as a base are:
microsoft teams
notion
vscode
discord
spotify
anyone! who has paid even a little bit of attention to their computer - especially when using older/budget computers - know just how much having chrome open can slow down your computer (firefox as well to a lesser extent. because its just built better <3)
whenever you have one of these programs open on your computer, it's running in a one-tab chrome browser. there is a whole extra chrome open just to run your discord. if you have discord, spotify, and notion open all at once, along with chrome itself, that's four chromes. needless to say, this uses a LOT of resources to deliver applications that are often much less polished and less integrated with the rest of the operating system. it also means that if you have no internet connection, sometimes the apps straight up do not work, since much of them rely heavily on being connected to their servers, where the heavy lifting is done.
taking this idea to the very furthest is the concept of chromebooks - dinky little laptops that were created to only run a web browser and webapps - simply a vessel to access the google dot com mothership. they have gotten better at running offline android/linux applications, but often the $200 chromebooks that are bought in bulk have almost no processing power of their own - why would you even need it? you have everything you could possibly need in the warm embrace of google!
all in all the average person in the modern age, using computers in the mainstream way, owns very little of their means of computing.
i started this post as a rant about the electron/webapp framework because i think that it sucks and it displaces proper programs. and now ive swiveled into getting pissed off at software services which is in honestly the core issue. and i think things can be better!!!!!!!!!!! but to think about better computing culture one has to imagine living outside of capitalism.
i'm not the one to try to explain permacomputing specifically because there's already wonderful literature ^ but if anything here interested you, read this!!!!!!!!!! there is a beautiful world where computers live for decades and do less but do it well. and you just own it. come frolic with me Okay ? :]
*when i say chrome i technically mean chromium. but functionally it's same thing
462 notes
·
View notes
Text
Grist doesn't have a paywall, so if you want to read this story, just do the click/tap routine on the caption. The story is long, informative and important. I never considered how integrated our food system has to be (and has been) and how destructive trump's approach is.
Excerpt from this Grist story:
Despite its widespread perception, the U.S. Department of Agriculture is involved in much more than farming. The federal agency, established in 1862, is made up of 29 subagencies and offices and just last year was staffed by nearly 100,000 employees. It has an annual budget of hundreds of billions of dollars. Altogether it administers funding, technical support, and regulations for: international trade, food assistance, forest and grasslands management, livestock rearing, global scientific research, economic data, land conservation, rural housing, disaster aid, water management, startup capital, crop insurance, food safety, and plant health.
In just about 100 days, President Donald Trump and Secretary of Agriculture Brooke Rollins have significantly constrained that breadth of work.
Since Trump’s inauguration, the inner workings of the agency have been in a constant state of flux — thousands of staffers were terminated only to be temporarily reinstated; entire programs have been stripped down; and a grant freeze crippled state, regional, and local food systems that rely on federal funding.
What’s more, the USDA has broadly scrapped Biden-era equity and climate resilience scoring criteria from dozens of programs across multiple subagencies by banning language like “people of color” and “climate change,” and tightened eligibility requirements for food benefits. The agency has also announced the cancellation of environmental protections against logging to ramp up timber production, escalated trade tensions with Mexico, eradicated food safety processes like limiting salmonella levels in raw poultry, and begun rolling back worker protections in meat processing plants.
In order to report on the full scope of the downstream impacts of these actions, Grist interviewed farmers, food businesses, and agricultural nonprofits across seven states about what the first 100 days of the administration has looked like for them. Nearly all of them told Grist that the agriculture department’s various funding cuts and decisions, as well as the moves to shrink its workforce capacity, have changed how much trust they have in the agency — and, by extension, the federal government.
Food policy analysts and experts throughout the nation also told Grist that this swift transformation of the USDA is unprecedented.
“Multiple parts of our food systems are now under attack,” said Teon Hayes, a policy analyst at the Center for Law and Social Policy. At the same time, food prices and overall costs of living are continuing to rise. The result, she fears, will be escalating hunger and poverty, which will “come at the expense of Black and brown communities, immigrants, and other historically marginalized groups.”
Elizabeth Lower-Basch, who served on the USDA Equity Commission during the Biden administration, called the decisions made by the USDA in the last 100 days “deeply disheartening” and “unprecedented, even when you compare it to the last Trump administration.”
It is of significant consequence to note that the money being withheld from grant programs isn’t merely not being spent. Experts say the agency is taking support away from local and regional food systems while at the same time showering industrial agricultural operations with billions of dollars, eliminating nutrition safety nets, and rolling back environmental protections. How will this change the fabric of the nation’s food supply?
As Rollins and Trump charge forward in undoing how the federal government has long supported those who grow and sell our food, and climate change continues to deepen inequities and vulnerabilities in that very supply chain, one thing is obvious: The USDA, and the communities that rely on it, won’t look the same once they’re done.
#agriculture#farming#food#department of agriculture#forests#conservation#climate hange#public health#water management#trump
33 notes
·
View notes
Text
🇹🇷🔥 Turkish Air Force - F-4E 2020 Terminator
The F-4E 2020 Terminator represents a significant leap forward in the capabilities of the Turkish Air Force. This comprehensive upgrade enhances the venerable F-4E Phantom II with modern Turkish-made weapons systems, showcasing Türkiye’s commitment to self-reliance and advanced military technology.
Background
With a storied history dating back to the 1960s, the F-4E Phantom II has been a pivotal player on the global stage of air combat. Serving multiple nations and seeing numerous conflicts, the Phantom carved out its place in aviation history as a versatile and rugged aircraft. Türkiye’s decision to upgrade this aircraft stems from a strategic imperative to leverage existing assets while infusing them with cutting-edge technology to maintain relevance in modern aerial warfare. The 2020 Terminator program is the Turkish Air Force’s ambitious initiative to retrofit these fighters with state-of-the-art systems.
Strategic Importance
The ability to exert air superiority and conduct precision strikes is paramount in a region marked by dynamic security challenges. The F-4E 2020 Terminator’s enhanced capabilities contribute significantly to deterrence, and the demonstration of Türkiye’s advancing aerospace industry serves both a strategic and diplomatic purpose.
Upgrade Overview
The 2020 Terminator upgrade, realized by Turkish Aerospace Industries in collaboration with ASELSAN, constitutes a multifaceted improvement over the aircraft’s original design. It touches every aspect of the aircraft’s systems, bringing its avionics, armaments, and electronic warfare systems into the 21st century.
Avionics:
The modernized multi-mode pulse Doppler radar extends the aircraft’s detection range, allowing it to lock onto and engage targets from greater distances. Integrating a Hands-On Throttle-And-Stick (HOTAS) system enhances pilot control, minimizing response time during high-stakes manoeuvres. Color Multifunctional Displays (MFDs) replace outdated gauges, providing pilots with real-time data visualization for improved situational awareness.
Armament:
The Terminator’s weapons suite has been revolutionized with a mixture of Western and indigenous munitions. Long-standing armaments like the AIM-9X Sidewinder are joined by Türkiye’s own precision-guided munitions, such as the SOM cruise missile, capable of striking strategic land and sea targets with formidable accuracy. The UAV-230, a domestic innovation, represents the pinnacle of Türkiye’s missile development, offering supersonic ballistic delivery of a range of warhead types over substantial distances. The BOZOK, MAM-C, MAM-L, and Cirit missiles exemplify Türkiye’s expertise in laser guidance and smart munition technology, enabling the Terminator to engage and defeat a broad spectrum of target profiles with unerring precision.
Electronic Warfare:
To contend with the contemporary battlefield’s electronic warfare environment, the F-4E 2020 Terminator incorporates an advanced Electronic Support Measures (ESM) system for rapid threat identification and an Electronic Countermeasures (ECM) suite to confound hostile tracking systems. Moreover, chaff and flare dispensers have been integrated to provide decoys against incoming missile threats, enhancing the aircraft’s survivability in hostile airspace.
Operational Capability:
The F-4E Phantom II, transformed by these integrated systems, emerges as a multirole platform capable of dominating beyond-visual-range air-to-air engagements and precision ground-attack missions. It can operate in complex electronic warfare environments and deliver various ordnances based on mission requirements, making it a flexible asset in the Türkiye Air Force’s inventory.
Significance:
The F-4E 2020 Terminator project is a hallmark of Türkiye’s aerospace ambition and its push toward defence autonomy. By retrofitting and modernizing its Phantoms, Türkiye maximizes the value of its existing fleet while also establishing a foundation for future indigenous aircraft development projects.
Munitions Details:
The advanced, indigenous Turkish weaponry integrated into the F-4E 2020 Terminator underlines a significant shift toward self-reliance in defence technologies. Each munition type brings unique capabilities that enhance the platform’s lethality:
UAV-230: A domestically-developed ballistic missile, this supersonic weapon delivers high-precision strikes at long ranges, challenging enemy defences with its speed and reduced radar cross-section.
BOZOK: The versatility of this laser-guided munition makes it ideal for engaging both stationary and moving targets with high precision, ideal for close air support.
MAM-C/L: These smart micro munitions are designed for tactical flexibility, allowing for precision targeting in complex engagement scenarios, from anti-armour operations to counter-insurgency roles.
Cirit: A highly accurate laser-guided missile system designed for low collateral damage, Cirit is adept at striking soft and lightly armoured targets with pinpoint accuracy.
SAGE Munitions: TUBITAK SAGE, Türkiye’s leading defence research and development institute, has contributed a range of munitions enhancing the Terminator’s operational capabilities across various domains.
Conclusion:
The upgraded F-4E 2020 Terminator is a testament to Türkiye’s determination to retain a competitive edge in aerospace and defence technologies. The integration of modern avionics, armaments, and electronic warfare capabilities ensures the aircraft’s continued relevance in modern air combat, and its presence in the skies serves as a deterrent in a strategically complex region.
#turkish army#turkish armed forces#turkish air force#turkishnavy#turkish navy#turkish#military#aircraft#air force#fighter jet#aviation#fighter plane#plane#airplane#military aviation#military aircraft#f 4 phantom ii#f 4 phantom#f 4e
130 notes
·
View notes
Text
The Story of KLogs: What happens when an Mechanical Engineer codes
Since i no longer work at Wearhouse Automation Startup (WAS for short) and havnt for many years i feel as though i should recount the tale of the most bonkers program i ever wrote, but we need to establish some background
WAS has its HQ very far away from the big customer site and i worked as a Field Service Engineer (FSE) on site. so i learned early on that if a problem needed to be solved fast, WE had to do it. we never got many updates on what was coming down the pipeline for us or what issues were being worked on. this made us very independent
As such, we got good at reading the robot logs ourselves. it took too much time to send the logs off to HQ for analysis and get back what the problem was. we can read. now GETTING the logs is another thing.
the early robots we cut our teeth on used 2.4 gHz wifi to communicate with FSE's so dumping the logs was as simple as pushing a button in a little application and it would spit out a txt file
later on our robots were upgraded to use a 2.4 mHz xbee radio to communicate with us. which was FUCKING SLOW. and log dumping became a much more tedious process. you had to connect, go to logging mode, and then the robot would vomit all the logs in the past 2 min OR the entirety of its memory bank (only 2 options) into a terminal window. you would then save the terminal window and open it in a text editor to read them. it could take up to 5 min to dump the entire log file and if you didnt dump fast enough, the ACK messages from the control server would fill up the logs and erase the error as the memory overwrote itself.
this missing logs problem was a Big Deal for software who now weren't getting every log from every error so a NEW method of saving logs was devised: the robot would just vomit the log data in real time over a DIFFERENT radio and we would save it to a KQL server. Thanks Daddy Microsoft.
now whats KQL you may be asking. why, its Microsofts very own SQL clone! its Kusto Query Language. never mind that the system uses a SQL database for daily operations. lets use this proprietary Microsoft thing because they are paying us
so yay, problem solved. we now never miss the logs. so how do we read them if they are split up line by line in a database? why with a query of course!
select * from tbLogs where RobotUID = [64CharLongString] and timestamp > [UnixTimeCode]
if this makes no sense to you, CONGRATULATIONS! you found the problem with this setup. Most FSE's were BAD at SQL which meant they didnt read logs anymore. If you do understand what the query is, CONGRATULATIONS! you see why this is Very Stupid.
You could not search by robot name. each robot had some arbitrarily assigned 64 character long string as an identifier and the timestamps were not set to local time. so you had run a lookup query to find the right name and do some time zone math to figure out what part of the logs to read. oh yeah and you had to download KQL to view them. so now we had both SQL and KQL on our computers
NOBODY in the field like this.
But Daddy Microsoft comes to the rescue
see we didnt JUST get KQL with part of that deal. we got the entire Microsoft cloud suite. and some people (like me) had been automating emails and stuff with Power Automate
This is Microsoft Power Automate. its Microsoft's version of Scratch but it has hooks into everything Microsoft. SharePoint, Teams, Outlook, Excel, it can integrate with all of it. i had been using it to send an email once a day with a list of all the robots in maintenance.
this gave me an idea
and i checked
and Power Automate had hooks for KQL
KLogs is actually short for Kusto Logs
I did not know how to program in Power Automate but damn it anything is better then writing KQL queries. so i got to work. and about 2 months later i had a BEHEMOTH of a Power Automate program. it lagged the webpage and many times when i tried to edit something my changes wouldn't take and i would have to click in very specific ways to ensure none of my variables were getting nuked. i dont think this was the intended purpose of Power Automate but this is what it did
the KLogger would watch a list of Teams chats and when someone typed "klogs" or pasted a copy of an ERROR mesage, it would spring into action.
it extracted the robot name from the message and timestamp from teams
it would lookup the name in the database to find the 64 long string UID and the location that robot was assigned too
it would reply to the message in teams saying it found a robot name and was getting logs
it would run a KQL query for the database and get the control system logs then export then into a CSV
it would save the CSV with the a .xls extension into a folder in ShairPoint (it would make a new folder for each day and location if it didnt have one already)
it would send ANOTHER message in teams with a LINK to the file in SharePoint
it would then enter a loop and scour the robot logs looking for the keyword ESTOP to find the error. (it did this because Kusto was SLOWER then the xbee radio and had up to a 10 min delay on syncing)
if it found the error, it would adjust its start and end timestamps to capture it and export the robot logs book-ended from the event by ~ 1 min. if it didnt, it would use the timestamp from when it was triggered +/- 5 min
it saved THOSE logs to SharePoint the same way as before
it would send ANOTHER message in teams with a link to the files
it would then check if the error was 1 of 3 very specific type of error with the camera. if it was it extracted the base64 jpg image saved in KQL as a byte array, do the math to convert it, and save that as a jpg in SharePoint (and link it of course)
and then it would terminate. and if it encountered an error anywhere in all of this, i had logic where it would spit back an error message in Teams as plaintext explaining what step failed and the program would close gracefully
I deployed it without asking anyone at one of the sites that was struggling. i just pointed it at their chat and turned it on. it had a bit of a rocky start (spammed chat) but man did the FSE's LOVE IT.
about 6 months later software deployed their answer to reading the logs: a webpage that acted as a nice GUI to the KQL database. much better then an CSV file
it still needed you to scroll though a big drop-down of robot names and enter a timestamp, but i noticed something. all that did was just change part of the URL and refresh the webpage
SO I MADE KLOGS 2 AND HAD IT GENERATE THE URL FOR YOU AND REPLY TO YOUR MESSAGE WITH IT. (it also still did the control server and jpg stuff). Theres a non-zero chance that klogs was still in use long after i left that job
now i dont recommend anyone use power automate like this. its clunky and weird. i had to make a variable called "Carrage Return" which was a blank text box that i pressed enter one time in because it was incapable of understanding /n or generating a new line in any capacity OTHER then this (thanks support forum).
im also sure this probably is giving the actual programmer people anxiety. imagine working at a company and then some rando you've never seen but only heard about as "the FSE whos really good at root causing stuff", in a department that does not do any coding, managed to, in their spare time, build and release and entire workflow piggybacking on your work without any oversight, code review, or permission.....and everyone liked it
#comet tales#lazee works#power automate#coding#software engineering#it was so funny whenever i visited HQ because i would go “hi my name is LazeeComet” and they would go “OH i've heard SO much about you”
64 notes
·
View notes
Text
INTERNAL AFFAIRS INCIDENT REPORT
DRC Internal Affairs Division
Date: [REDACTED]
Subject: Internal Audit - Quota Breach - Case File [REDACTED]
To: Director [REDACTED]
From: Inspector [REDACTED]
I: Audit Trigger
This audit originated from an anomaly flagged by the Compound Oversight Unit following a routine cross-comparison of mortality curves, biometric telemetry, and average fetal volume expansion across paternity compounds in FEMA Zone 5. Paternity Compound 144, in particular, demonstrated a statistically aberrant rise in surrogate experience [REDACTED] collapse, a condition only observed in gestations over 18 fetuses. While the facility’s internal reports claimed average pregnancies between 8 and 11 embryos per surrogate, biometric logs suggested fetal counts ranging from 18 to 23 embryos per case.
Due to the severity of the physiological strain such numbers would imply—and the lack of official documentation acknowledging it—a Level 2 Integrity Audit was ordered. The Internal Affairs Division performed an unannounced sweep of all surrogate biometric records, insemination logs, and surveillance data from Cycles [REDACTED] to [REDACTED].
What followed revealed not only systemic concealment of lethal overloads but also willful obstruction motivated by personal psychological deviance.
II: Surveillance Analysis
Biometric data recovered from Wards 3B through 7E indicated that surrogates began exhibiting rapid and extreme abdominal distension by Day 11, surpassing known volumetric thresholds typically seen by Day 17. Skin tension diagnostics showed redlining stretch marks and dermal fissures in [REDACTED]% of all recorded subjects. In multiple cases, respiratory compression and full [REDACTED] subluxation—typically observed only after Day 30—were logged as early as Day 19.
“We knew something was off when they were too big to move before the second week. One of them just looked like that blueberry girl from Willy Wonka or some shit. But the logs said 14 embryos, so we assumed it was just edema.” - Employee GS-144-217
Footage recovered showed numerous surrogates experiencing aggressive fetal growth and abdominal distension, with growth rates in Ward 6C indicative of at least 23-25 embryonic masses. Two surrogates suffered multi-organ [REDACTED] before a team from the Compound Oversight Unit could intervene, though all fetuses were successfully delivered via cesarean.
“We knew something when we saw the guys from Ward 2. We were blimps compared to them, and they were twice as far along as us. I mean, I can literally see my belly growing!” Surrogate, later determined to be carrying quattuorvigintuplets (24)
Despite this, the internal logs submitted to the Archive Management Unit recorded all affected surrogates as having a “successful delivery with standard expiration.” The discrepancy was manually edited at terminal station 144-T12-OP47—registered to an Insemination Operations Unit employee named [REDACTED] (Employee ID IO-144-611).
III. Device Failure & Impact
Each MNAIS unit in Ward Blocks 3–7 had suffered [REDACTED] desynchronization following an outdated firmware push. Rather than delivering the standard 8-12-embryo load, units programming applied a multiplier to its quota and began injecting up to 24 fertilized embryos per cycle, with no error code generated.
Employee IO-144-611 discovered this failure within three days but refrained from submitting a maintenance report. He manually edited implantation records to match quota expectations, falsely logging a randomization formula (6–11 embryos per surrogate) across all documentation streams. Employee IO-144-611 then overrode the automatic alert system from the local Postpartum Command, which would ultimately log surrogates giving birth to higher fetal quotas than inseminated with.
His actions delayed DRC response for 41 days, during which:
42 surrogates suffered [REDACTED] rupture before Day 28, [REDACTED] overload, or uterine [REDACTED], necessitating emergency C-sections. No fetal fatalities.
17 surrogates expired mid-labor after undergoing compound [REDACTED] due to displaced [REDACTED], necessitating emergency C-sections. No fetal fatalities.
3 surrogates, against all medical prediction, reached Day 33 and birthed successfully, but ultimately expired post-extraction. No fetal fatalities.
26 surrogates still gestating, average 19 embryos per individual.
IV. Behavioral Profile – Employee IO-144-611
Subject: Employee IO-144-611 Tenure: [REDACTED] Position: Regional Implantation Supervisor Clearance Level: Tier II – Override Authorization Security Clearance: Revoked as of [REDACTED]
Following confrontation and seizure of his local system access logs, Employee IO-144-611 was detained and subjected to a Tier III Psychological Assessment. During this evaluation, the root of the concealment was uncovered.
Psychological Findings:
Employee IO-144-611 exhibited a previously undiagnosed paraphilic fixation classified under Government Code [REDACTED]: Macrophilia, a pathological sexual arousal in response to abnormally large bodies or bodily expansion.
Upon exposure to the visual data of overloaded surrogates—particularly those carrying between 19 and 23 fetuses—Employee IO-144-611 demonstrated elevated oxytocin and dopamine levels, a flushed dermal response, and sustained pupil dilation.
Under questioning, he confessed:
“I couldn’t report it. If I said anything, they’d shut it down, recalibrate the racks, lower the numbers again. You don’t understand. They were… monumental.”
He further admitted to deliberately withholding service requests for malfunctioning implantation equipment, specifically the Multi-Nozzle Accelerated Implantation System (MNAIS) units, which had developed a systemic fault causing them to implant +[REDACTED]% above calibrated embryo counts.
V: Displincary Response
1. Equipment
All MNAIS systems in Paternity Compound 144 were ordered offline for 24 hours.
Software rollback and integrity checks were completed under the supervision of IT Command.
Ward 3B was closed to all personnel below Grade-D rank, and affected surrogates were contained to minimize public awareness.
2. Actions
Psychological Services Command has formally reclassified [REDACTED] Employee IO-144-611 as Class-A Deviant – Mentally Compromised via Paraphilic Obstruction.
Archive Management Unit has censored relevant administrative records.
Public Affairs Division has disseminated a press release to DRC-approved news channels, citing [REDACTED] as the cause of the shutdown for Paternity Compound 144.
Facility Operations Command has transferred any personnel who raised professional or personal concerns about the citation.
[REDACTED] Employee IO-144-611 detained to Isolation Cell 6E.
3. Recommended Process Updates
Expand psychological screening to all Grade C employees and below.
Recommend quarterly psychological deviance evaluations of Grade B employees and below.
Implement full biometric auto-logging for all surrogate embryo counts—disable manual override across zones.
Closing Remarks
Employee IO-144-611's indulgence in personal gratification resulted in unsatisfactory delays to our facility's operation. Proper procedures have been implemented to prevent further disruptions and ensure that fetal quotas are adequately maintained.
[Report prepared by Inspector [REDACTED]]
----------------
Sending...
Sending...
Sending...
Read...
----------------
Date: [REDACTED]
To: Deputy-Director [REDACTED], Security Office
From: Director [REDACTED]
Subject: Internal Audit - Quota Breach - Case File [REDACTED]
Deputy Director,
Following my review of the [REDACTED] file, I would like to register my formal dissatisfaction with how Inspector [REDACTED] handled this matter. While I acknowledge the necessity of enforcing procedural transparency, the inspector’s decision to escalate the MNAIS malfunction as a containment emergency rather than a potential breakthrough reveals a worrying lack of vision.
To put it plainly, the equipment failure at Paternity Compound 144 resulted in spontaneous fetal yields well above the current national minimums, with documented gestations ranging from 18 to 23 embryos—many of which progressed past Day 25 with surprisingly high internal cohesion and containment. Had Inspector [REDACTED] exercised creative initiative, the anomaly could have been reframed as a pilot overcapacity trial rather than triggering a full-blown mechanical audit and unnecessary decommissioning.
Such a rigid interpretation of oversight policy has compromised a unique opportunity for data extraction and jeopardized our ability to scale gestational loads in future cycles. This shortsighted compliance fanaticism is increasingly common in mid-tier personnel and must be corrected.
Accordingly, I recommend that Inspector [REDACTED] receive formal censure and retraining through the Training & Development Unit for failing to recognize the strategic potential embedded in abnormal conditions. Our agency requires flexibility under pressure, not reflexive alarmism.
On a separate but related note, I would like to approve the personnel reassignment request for Employee IO-144-611. Despite his classified psychological profile, his unique enthusiasm may prove operationally useful if adequately directed. I am authorizing his immediate transfer to Site [REDACTED], where he is to assume the role of Supervisory Insemination Officer. In the correct environment, they are an asset and IO-144-611’s tendencies are no longer a liability.
Please liaise with the Facility Director [REDACTED] at Site [REDACTED] to ensure the transfer.
This matter is now considered closed from my office.
Regards,
Director [REDACTED]
#mpreg#mpregkink#malepregnancy#mpregbelly#pregnantman#mpregmorph#mpregcaption#mpregstory#mpregbirth#mpregart#mpregnancy#aimpreg#mpregroleplay#malepregnant#caucasianmpreg
48 notes
·
View notes
Text


Round 2 - Simblr's Saddest, Wettest Meow Meow - Mainline
No. 27 (@literallyjusthereformods) VS. Andre St. Fleur (@armoricaroyalty)
(polls are presented left -> right unless stated otherwise)
Who's sadder? Who's wetter? Read on for more information, and vote with your heart!
What is a ‘Meow Meow’?
(taken from tumblr user @/torturelabyrinth) “The thing about a true poor little meow meow is they have to be 1) downtrodden 2) morally questionable at best 3) deeply and pathetically miserable”
No. 27
Alias: "Livard"
No. 27 was the 27th 'living' instance of the Crane Foundation's modern Quintessence Program. When the breach occurred, 27 took immediate opportunity to leave, using her sharp limbs to grievously wound operatives and other personnel who attempted to obstruct her path of escape. Eleven confirmed aggravated fatalities. An unknown number of fatalities occurring at trample areas and exit pileups. She proceeded to use the slaughter-path of the other breachers as a clear line out of the facility’s underground portion, ascending rapidly to the upper floors where she is believed to have fled the building.
As of right now, 27 is an immune carrier of a new strain of the same pathogen currently causing a cataclysmic outbreak. While typical variants can only infect and alter biological matter, this mutation was observed with the new ability to infect machines during controlled testing.
No. 27 was last spotted wearing the stolen cardigan of Dr. Livard, with a secondary article of clothing tied beneath at the waist. The owner of the second article has not yet been identified.
27 has been reported self-identifying as ‘Livard,’ and has not discarded the nametag attached to the stolen cardigan, despite having no reason to keep it.

27 was created as an experimental binding of biological tissues and cybernetics. Unlike precursors, who were constructed with biological matter on a 75% or higher percent mechanical endoskeleton, 27 was an experimental integration of traditionally classified ‘biological’ and traditionally classified ‘mechanical’ elements on a fundamental level. The use of nanites in her tissues, along with algorithmic adaptations, created a unique combined system challenging the preconceived definitions of the categories.
However, the arise of the new pathogen strain saw 27 strictly confined. 27 was shown to be incredibly observant of those observing her, and an incredibly accurate mimic of their behaviors. She, notably, engaged in a game of rock, paper, scissors with an anonymous researcher after they and their coworker demonstrated the game through the window.
Sentient or not, 27 still falls outside of the Mimic Law, and is legally property of the Crane Foundation. With artificial sentience having already been academically accepted years ago, whether 27’s curiosity is dictated by script or by consciousness is not our concern.
As for the present times, it was assumed 27 would perish shortly after leaving the facility, without the specific needs of her body being met in a controlled environment. Our assumptions were wrong. 27 has been spotted feeding on mechanical devices as if they were prey animals. We can only assume this habit will accelerate the spread of the new pathogen strain, and while we would like to reclaim 27 for study, it might become necessary to terminate her entirely to prevent escalation of the already dire world situation.
Originality Status: 100% Original Property of the Crane Foundation
Additional Notes:
(Attached below is a fabricated 3D model based on the last contained recording of 27. It is merely for visual context. If you are an operative searching for 27, or, in some inexplicable instance, creating a poll (Tom), please use the topmost image as it is the most up-to-date.)

Andre St. Fleur
What makes him a Sad, Wet Meow Meow? Born to royalty but completely temperamentally unsuited for it, Andre is pathetic and sad and weak-willed and a big, giant loser. He's the king of a small and unimportant country, and he simply cannot parent effectively or stop cheating on his wife. Finally forced to decide between his mistress and his wife of nearly 30 years, he became so paralyzed with indecision that he developed a terminal illness instead, saving him from ever having to make up his mind about anything.
Just some additional pictures of Andre moping, crying, and letting his loved ones down </3





I think my boy has the potential to go far, but even if he gets knocked out in the first round...what could be sadder, wetter, or more pathetic than getting immediately eliminated from the "most pathetic" tournament?
17 notes
·
View notes
Text
The Baltic states of Lithuania, Latvia, and Estonia are about to take a historic energy security step on February 9, when they will synchronize their former Soviet electricity systems with the Continental Europe Network (CEN). This will conclude the final chapter of Russia’s involvement in the energy sectors of these frontline European Union (EU) and NATO member states. But the Baltic states and their NATO allies must now work to secure this hard-won energy independence from Russia’s ongoing hybrid attacks on critical energy infrastructure.
Lithuania, Latvia, and Estonia have faced a wide array of Russian coercive energy policy measures arising from their historical dependence on Russian energy supplies and Soviet-era energy infrastructure. These measures included a total economic and energy blockade of Lithuania in 1990 in response to its independence movement, a prompt shutdown of an oil pipeline after Lithuania declined to sell its crude oil refinery to a Russian company in 2006, and long-term politically motivated gas pricing for the Baltics, to name just a few well-known cases.
Having faced the destructive impacts of Russia’s weaponization of energy, the Baltic states have become leaders among European nations in severing ties with Russia’s energy supplies over the past decade. The installation of the liquefied natural gas (LNG) terminal in Klaipėda, Lithuania’s seaport, in late 2014 marked a significant step in this direction. It opened the Baltic gas markets to global LNG suppliers, including those from the United States. This alternative gas supply route enabled the Baltic states to ban all Russian gas imports, both piped and LNG, just two months into Russia’s full-scale war against Ukraine. The Baltic states became the first European countries to take such a principled stance, and they are among those advocating for the rest of the EU members to follow suit by implementing a blanket ban on Russian LNG.
Flipping the switch
The timely diversification of oil and electricity supply routes also allowed the Baltics to stop importing these energy sources from Russia. In terms of electricity, the Baltic states use the interconnectors Estlink 1 and Estlink 2 between Estonia and Finland, Nordbalt between Lithuania and Sweden, and LitPol Link between Lithuania and Poland for power exchanges with Europe. However, the Baltic states’ early market-level integration with their EU neighbors did not mean the immediate end of Russia’s involvement in the their electricity sectors on the system control level.
These are the last days that the Baltic states’ power grids remain a part of the Russian-controlled Integrated Power System/United Power System (IPS/UPS) grid. This effectively means that a dispatch in Moscow is still responsible for maintaining electric frequency stability in the Baltic states—bringing all the risks that such a dependency on Moscow entails. Ukraine and Moldova performed a test desynchronization from the IPS/UPS grid concurrently with the onset of Russia’s invasion of Ukraine in 2022, immediately asking for an emergency synchronization with the European grid, which was granted. Lithuania was aware of the potential need to perform an emergency synchronization, too, and thus had prepared its power grid to function in an isolated mode if needed. On February 8, Lithuania, Latvia, and Estonia will decouple from the Russian-controlled grid and conduct a joint isolated operation test before joining the European grid on February 9.
The planning for the Baltic synchronization with the European grid began as early as 2007, but—due to multiple project phases involving political, regulatory, and infrastructural components in Lithuania, Latvia, Estonia, and Poland—it has only now been finalized. The project was co-financed by the EU, which has allocated more than €1.2 billion from its Connecting Europe Facility. For the EU, the project is as important as it is for the Baltic states: only with Lithuania, Latvia, and Estonia connected to the European grid can the EU achieve its goal of a fully integrated European energy market, in which all uncontrolled third-party impacts on its member states are eliminated.
Securing critical infrastructure
Although Russia will no longer exert direct influence over the energy supply and system control of the Baltic states, Moscow may now focus on targeting their critical energy, communications, and data infrastructure. Since October 2023, at least eleven cables running under the Baltic Sea have been damaged. This includes the underwater Balticconnector gas pipeline between Estonia and Finland; communications cables linking Finland, Germany, Sweden, and Lithuania; and the Estlink 2 power cable between Estonia and Finland. A data cable between Latvia and Sweden has been damaged as recently as January 26. The Lithuanian government is responding with increased military involvement in protecting critical seaborne energy infrastructure under the Baltic Sea amid an attempted sabotage of the NordBalt power cable that connects it to Sweden.
The damage was caused by vessels dragging their anchors on the Baltic Sea’s seabed. Investigations into the circumstances of the damage are still ongoing, but the rapid increase in such incidents and the vessels involved—mostly Russia’s “shadow fleet” oil tankers—raise concerns that the damage was intentional. As a response, NATO has stepped up its presence in the Baltic Sea by launching a new military patrol mission called Baltic Sentry. This mission involves deploying frigates, maritime patrol aircraft, and naval drones to enhance the ability of littoral states to respond to destabilizing acts on their critical infrastructure. The Alliance has also established a Critical Undersea Infrastructure Network to enhance information-sharing and situational awareness and a dedicated Maritime Centre for the Security of Critical Undersea Infrastructure within NATO’s Maritime Command in Northwood, United Kingdom.
Crucial first steps have also been made to increase the protection level of the onshore LitPol Link interconnector between Lithuania and Poland, through which the Baltics are synchronizing with the European grid. Lithuania’s Public Security Service has taken over the protection of several LitPol Link sites from a private security company that had previously been assigned this role. The Baltic states and Poland, fully aware of Russia’s hybrid activities in the region, have also urged the EU to provide financial support for enhancing current security measures for the LitPol Link and other critical energy infrastructure in the region.
It’s a start, but more needs to be done, particularly in the case of Lithuania. With vital interconnectors—LitPol Link in energy and Rail Baltica in transport and military logistics—passing through the country, Lithuania is emerging as a crucial gateway connecting continental Europe to the Baltics, the Nordic region, and even the Arctic.
All these interconnections traverse the narrow land corridor between Lithuania and Poland, known as the Suwałki Gap. This notorious area borders Belarus to the east and Russia’s Kaliningrad exclave to the west.
Russia could attempt to isolate the Baltics from the rest of Europe by obstructing the Suwałki Gap from these territories. Thus, beyond the punctual tactics of strengthening the security of the LitPol Link and, later, the planned additional onshore electricity interconnector between Lithuania and Poland that is reportedly set to run along the Rail Baltica tracks, an approach of a comprehensive protection regime for this vulnerable border area is needed. An increased NATO military presence in Lithuania and regional measures, such as installing the Baltic Defense Line along the Baltic states’ borders with mainland Russia, its Kaliningrad region, and Belarus, are important steps toward a solution.
With the Baltic power systems soon operating in harmony with those in continental Europe, the regional security agenda shifts from concerns over the security of energy supply to the protection of critical energy infrastructure. The Baltic nations and their allies should further enhance their proactive efforts to deter sabotage and secure this strategically vital region.
15 notes
·
View notes
Photo
Life in an Air Raid Shelter in the London Blitz
Crowded and uncomfortable air raid shelters became a feature of the urban landscape across Britain during the Second World War (1939-45) as the bombers of Nazi Germany systematically hit cities from 1940. The London Blitz was a particularly sustained period of bombing which civilians escaped from by diving into private or public shelters when the sirens whined their warning signal.
People sought refuge in the London Underground stations, in purpose-built community shelters, in their cellars, under the stairs, or in refuges in their gardens such as the Anderson shelter. The danger was real, prior to the autumn of 1942, more British civilians were killed in the war than British military personnel.
The Bombing of Britain
Civilians had a lot to put up with even before the bombing started. The blackout was imposed where no non-essential lights were to show at night and so help enemy bombers. There was a real fear that gas bombs would be used, and so everyone was encouraged to carry gas masks. The Phoney War, the period of relative military inactivity in Britain between September 1939 and the spring of 1940, brought a sense of false security, but the German Luftwaffe (air force) would arrive soon enough.
Hundreds of thousands of children were evacuated from cities, including the capital where one million children were shipped out. Youngsters were sent to the safety of the countryside, but the separation from parents and a familiar environment proved traumatic for many. As the historian J. Hale points out: "By January 1940 about half of all children and nine out of ten mothers had returned to their old homes" (27). Despite this, when the bombing started, the official policy of evacuation was continued.
Bombers of the Luftwaffe and the Italian Air Force dropped both explosive and incendiary bombs, the first type to smash through buildings and the second to set the ruins alight. Britain had an integrated air defensive system, the Dowding System, which monitored incoming aircraft and sent out fighters to intercept like the Supermarine Spitfire, but many bombers got through to deliver their deadly loads. In the Battle of Britain, the Luftwaffe aimed to destroy the Royal Air Force (RAF), both in the air and on the ground, while a secondary aim was to terrorize the civilian population. As the Luftwaffe began to lose the battle, so it concentrated more on civilian targets. Most raids were carried out at night since darkness was the best protection for the German bombers against fighters and anti-aircraft guns. The bombers were guided by radar to their targets, but bombing remained highly inaccurate so that even when strategic sites like factories were the target, there was usually great damage to civilian areas.
London was first bombed on 24 August 1940. The bombers were to attack an oil terminal but mistakenly hit the city, thus beginning a tit-for-tat bombing of civilian areas that escalated to unimaginable horrors like the total bombing of Coventry and Hamburg (Operation Gomorrah). The systematic bombing of London began on 7 September 1940 and continued until the middle of May 1941. The British press called this campaign "the Blitz". The East End of the city, where the docks were located, was a particular target. Other cities across Britain were also repeatedly hit. For civilians, not knowing where the bombers would hit next, air raid shelters became essential everywhere.
Continue reading...
30 notes
·
View notes
Text
My biggest question about medical ninjutsu is actually how it works with a person's chakra system. The lore for your chakra system in Naruto is that it's "enmeshed within the body, transporting chakra through the body and each organ as the circulatory system does blood. The system is involved in the creation of chakra itself as well, as every cell and protein in the body are connected to this pathway system by a capillary which draws out the cell's physical energy and is refined into chakra by several organs, notably the heart"
We're even shown what this system looks like around the organs, and stopping the flow of chakra in one part of the body will stop that areas functions
So if your chakra pathway operates the same way as your veins, muscles, blood vessels etc and everyone is born with a different chakra nature, which operates like a blood type, what happens when you need a blood transfusion? Do you have to get blood from somebody with the same nature as you, so if you're a Wind type you can only accept transfusion from other Wind types? If you have an organ transplant how does the new organ get integrated into your chakra system? Is there a higher chance of rejection because of the added chakra system complications? Are organ transplants even possible in this universe outside of whatever the fuck Kakuzu was doing with those hearts? Does medical ninjutsu have to mould itself to match your individual pathways when you're getting healed up?
In real life we have doctors that specialise in certain medical fields, so does the shinobi world have something similar, where one doctor could specialise in emergency medicine and another in family medicine? Do we have neurologists in this universe? Anesthesiology? Are there doctors and surgeons that specialise in the chakra pathways?
What sort of illnesses and diseases exist in this universe? Any chronic or terminal sickness? Are there genetic illnesses, or illnesses that only attack certain chakra types?
These are the questions I have and I know fuckall about the real life medical field so I cannot give answers to any of them but I sure do think about it a lot
29 notes
·
View notes
Text
Log 8.6-ASL/H, by Krrilli (Konith, Xeneath Prime/Xeneath VII, Sector 3 - Segment Alpha, '''-'--''-)
"Hello, carbon-based endoskeletal reader. You know how humanity has developed rudimentary adaptive learning algorithms (which they named artificial intelligence, AIs for short) much before becoming third stage spacefaring species.
As natural to other young races they have greatly integrated it into their technology over the last three centuries. I cannot stress how aberrant it is, but the Confederation allows it, so they have it. Most of their machines and complex systems utilize relatively rudimentary ALAs, ranging between type 3 (input -> built-in answer) and type 5 (can create new answers to new inputs based on built-in answers), but are unable to feel emotions or think. Like all ALAs.
It is however witnessed how humans cling to their adorable behavior of giving personification to objects and this extends to their AIs. I have witnessed myself two humans treating terminals as their own, "cuddling". I don't know if this is their term. a rifle before a training exercise, and even curse a vehicle's bloodline after it failed to pass through obstacles.
In one instance, however, I came to greatly disagree with the Confederation's categorizations of their ALAs. I was covering an Exorith invasion in one of their mining stations and I deeply believe to have witnessed an armored vehicle's cannon (which had failed minutes ago) fire again after a quick prayer from its operator.
Whether this phenomena was my bias, a psychic/methaphysical effect, a new biological matter manipulation trait, a hidden mechanism, ignorance, an unknown function in the machine, or sheer dumb luck is still under study. Close log."
#humans are space oddities#humans are strange#humans are weird#humans are insane#humans are terrifying#writing#creative writing#worldbuilding#sci fi#scifi#science fiction#technology#artificial intelligence
13 notes
·
View notes
Text
Submission 2 for @simblorbo-bracket's sad wet meowmeow competition.
No. 27
Alias: "Livard"
No. 27 was the 27th 'living' instance of the Crane Foundation's modern Quintessence Program. When the breach occurred, 27 took immediate opportunity to leave, using her sharp limbs to grievously wound operatives and other personnel who attempted to obstruct her path of escape. Eleven confirmed aggravated fatalities. An unknown number of fatalities occurring at trample areas and exit pileups. She proceeded to use the slaughter-path of the other breachers as a clear line out of the facility’s underground portion, ascending rapidly to the upper floors where she is believed to have fled the building.
As of right now, 27 is an immune carrier of a new strain of the same pathogen currently causing a cataclysmic outbreak. While typical variants can only infect and alter biological matter, this mutation was observed with the new ability to infect machines during controlled testing.
No. 27 was last spotted wearing the stolen cardigan of Dr. Livard, with a secondary article of clothing tied beneath at the waist. The owner of the second article has not yet been identified.
27 has been reported self-identifying as ‘Livard,’ and has not discarded the nametag attached to the stolen cardigan, despite having no reason to keep it.
27 was created as an experimental binding of biological tissues and cybernetics. Unlike precursors, who were constructed with biological matter on a 75% or higher percent mechanical endoskeleton, 27 was an experimental integration of traditionally classified ‘biological’ and traditionally classified ‘mechanical’ elements on a fundamental level. The use of nanites in her tissues, along with algorithmic adaptations, created a unique combined system challenging the preconceived definitions of the categories.
However, the arise of the new pathogen strain saw 27 strictly confined. 27 was shown to be incredibly observant of those observing her, and an incredibly accurate mimic of their behaviors. She, notably, engaged in a game of rock, paper, scissors with an anonymous researcher after they and their coworker demonstrated the game through the window.
Sentient or not, 27 still falls outside of the Mimic Law, and is legally property of the Crane Foundation. With artificial sentience having already been academically accepted years ago, whether 27’s curiosity is dictated by script or by consciousness is not our concern.
As for the present times, it was assumed 27 would perish shortly after leaving the facility, without the specific needs of her body being met in a controlled environment. Our assumptions were wrong. 27 has been spotted feeding on mechanical devices as if they were prey animals. We can only assume this habit will accelerate the spread of the new pathogen strain, and while we would like to reclaim 27 for study, it might become necessary to terminate her entirely to prevent escalation of the already dire world situation.
Originality Status: 100% Original Property of the Crane Foundation
Additional Notes:
(Attached below is a fabricated 3D model based on the last contained recording of 27. It is merely for visual context. If you are an operative searching for 27, or, in some inexplicable instance, creating a poll (Tom), please use the topmost image as it is the most up-to-date.)

#sims 4#simblr#ts4#my sims#weird sims#sims 4 screenshots#sims community#the sims community#showusyoursims#show us your sims
7 notes
·
View notes
Text
The Talon Roost
Nestled along the rugged shoreline of Puget Sound, just outside the bustling heart of Unity City, Terra, Melissa Hazen and Theodora Marten-Steiner’s home exudes a warmth and intimacy that starkly contrasts with their imposing public personas. Known as “The Talon Roost,” this sprawling lodge combines the rustic charm of traditional log cabin architecture with the subtle integration of cutting-edge technology from Terra’s civilian sector.
The Talon Roost sits perched on a rocky bluff overlooking the Sound, its timbered exterior blending with the surrounding forest. Massive, hand-hewn logs form the structure’s frame, their natural grain and texture preserved to honor the timeless beauty of the Pacific Northwest. The lodge’s roof is made up of a mix of eco-friendly solar tiles and living greenery. Wide wraparound decks extend from the main structure, offering panoramic views of the water and mountains beyond. A series of cascading stairs, lined with ambient lighting, leads down to a private dock where a sleek, automated watercraft rests, flanked by kayaks and a small security boat. At night, the lodge glows warmly, its large windows offering glimpses of life inside—a sharp yet inviting contrast to the quiet wilderness outside.
Entering the Talon Roost feels like stepping into a sanctuary. High vaulted ceilings, supported by massive wooden beams, create a sense of openness, while large floor-to-ceiling windows flood the space with natural light during the day. The interior décor balances modern minimalist design with the cozy aesthetics of a mountain lodge. Neutral tones dominate, accented by vibrant greens and golds—an homage to Melissa’s Jade Falcon heritage. The heart of the lodge, the living room, is anchored by a double-sided fireplace made of locally quarried stone. The hearth radiates warmth, surrounded by plush sofas and armchairs adorned with patterned blankets and throw pillows. Above the fireplace, a holographic display can project serene landscapes or serve as an entertainment hub, though it’s often turned off, leaving the room in serene simplicity. The kitchen combines the rustic appeal of handcrafted cabinetry with state-of-the-art appliances. A long central island, topped with polished stone, doubles as a communal dining space. The open floor plan flows into the dining area, where a custom-built table—crafted from salvaged driftwood—sits beneath an impressive chandelier of crystal and wrought iron. A cozy library, lined with shelves of books and historical texts, offers a quiet retreat for both Melissa and Theodora. A vintage mahogany desk sits at the far end, equipped with a concealed holo-terminal for secure communication and work. Nearby, a comfortable reading nook overlooks the Sound, with a soft chair and a small table perpetually holding a steaming pot of tea. The large, lavish, and highly advanced home theater was Theodora's pet project - it is outfitted with the absolute latest in cutting-edge holographic, trideo, and flat screen projection technology as well as a sound system that cost nearly as much as a light BattleMech.
While The Talon Roost appears traditional, its technology is anything but. Discrete panels throughout the home provide instant access to climate control, security systems, and personal AI assistants. The lodge’s power is supplied by a combination of renewable sources, ensuring self-sufficiency even during extended outages. A secure Star League-era communication hub is integrated into the study, allowing Melissa and Theodora to stay connected with SLDF operations. Beneath the lodge, hidden from view, lies a private hangar with bays large enough for both Melissa’s Highlander and Theodora’s Atlas, as well as the company of security 'Mechs on-site. Advanced automated repair systems and diagnostic tools ensure the 'Mechs are always ready for action. Also included is a multi-functional room utilizing advanced Holotank technology capable of projecting tactical simulations, training environments, or serene natural landscapes for relaxation.
The grounds around the lodge are meticulously curated. A path winds through a grove of ancient cedar trees to a private firepit surrounded by log benches. Nearby, a greenhouse houses a mix of local flora and medicinal plants, along with herbs for Theodora’s favorite recipes. A falconry mew, discreetly tucked into the edge of the property, is home to a small cast of Jade Falcons whom Melissa tends to personally—a connection to her heritage and a calming pastime away from the demands of leadership. The Talon Roost’s atmosphere is one of quiet strength and serenity. For two figures as legendary as Melissa Hazen and Theodora Marten-Steiner, the lodge represents a refuge from the chaos of the Inner Sphere—a place to reconnect with nature, their shared history, and each other. The cozy interiors, paired with the breathtaking natural surroundings, create a space where visitors are immediately put at ease, despite the immense power and influence of its owners. This dichotomy—between public and private life, between war and peace—is what makes The Talon Roost not just a home, but a reflection of the lives Melissa and Theodora have built together.
While The Talon Roost exudes an aura of peace and natural harmony, its security infrastructure rivals that of any high-level military installation. As the personal residence of two high-ranking SLDF officers, it incorporates layers of cutting-edge technology, physical deterrents, and personnel to ensure the safety of its occupants and maintain its strategic utility. The property is surrounded by an invisible perimeter system that utilizes advanced motion detection, thermal imaging, and seismic sensors. Any unauthorized entry triggers both silent and audible alarms, alerting the SLDF garrison stationed nearby. Discrete but highly effective automated turrets, hidden in the rocky outcroppings and among the trees, are equipped with non-lethal crowd control measures and high-powered laser weaponry for more extreme threats. Signature reduction technology derived from Null Signature System technology shields The Talon Roost from all but visual aerial and orbital scans, while a squadron of SLDF-designed surveillance drones patrols the airspace and property boundary. These drones are equipped with stealth tech, high-resolution cameras, and lethal weaponry. Meanwhile, the picturesque firepit near the cedar grove doubles as an emergency bunker entrance, reinforced to withstand even orbital bombardment. Decorative stone statues around the property conceal sensors and emitters capable of deploying small scale energy weapons in emergencies.
The Talon Roost is protected by a small, elite detachment of SLDF Royal Black Watch troops. While their presence is unobtrusive, they are always ready to respond to any threat. The guard detachment includes three Stars of MechWarriors, with their BattleMechs stationed in the Roost's subterranean hangar. A company of infantry, drawn from the Royal Black Watch's commando-trained operatives, patrols the property and acts as a rapid reaction force. All on-site security personnel reside in a concealed bunker built into the cliffside upon which the Roost perches. Security details rotate regularly to maintain optimal readiness and avoid becoming predictable. A concealed, automated command center under the lodge handles all security and monitoring tasks. Operatives stationed here can communicate directly with SLDF High Command and deploy additional resources as needed.
Beneath The Talon Roost lies a complex network of subterranean tunnels, elevators, and passageways that connect the property to critical SLDF and Star League installations in the region. This link allows both Melissa and Theodora to access secure meeting rooms or emergency operations centers without requiring surface travel. A direct maglev transit tunnel leads to both the nearby Tacoma Castle Brian, as well as the SLDF's Citadel inside Unity City itself - rebuilt by the SLDF to once again serve as their High Command complex. The headquarters of the Royal Black Watch, Fort Cameron, is linked to the lodge by another high-speed maglev route. The connection allows Theodora to oversee her regiment's activities or deploy her Atlas in minutes. The lodge is also connected via the maglev-tunnel system directly to the Court of the Star League.
In the event of an overwhelming threat, the lodge’s subterranean systems include a concealed evacuation pod capable of transporting occupants to either the Citadel or Fort Cameron in under five minutes. The lodge also features a last-resort self-destruct mechanism. Activated only by voice authorization from Melissa or Theodora, this system ensures no critical technology or data can fall into enemy hands. In case of a siege, the lodge can deploy automated counter-battery defenses, jamming fields, and active missile interceptors hidden within the terrain.
While The Talon Roost offers warmth, serenity, and a welcoming atmosphere, its hidden security and strategic capabilities reflect the immense responsibilities carried by its owners. This stark juxtaposition mirrors the lives of Melissa Hazen and Theodora Marten-Steiner, who must balance their personal sanctuary with their duties as protectors of humanity’s future. It is a place of respite, but one always ready for the call to action.
7 notes
·
View notes
Text

VX-9 F/A-18F Spotted With Heavy Air-to-Air Load of AIM-174s and AIM-120s
The U.S. Navy is continuing to test the new AIM-174B missile, derived from the SM-6, aboard the Super Hornet, with a VX-9 jet carrying four AIM-174s, three AIM-120s and two AIM-9Xs.
Stefano D'Urso
Super Hornet four AIM-174s
The F/A-18F "Vandy 1" of VX-9 loaded with four CATM-174B, three CATM-120 and two CATM-9X. (Image credit: @point_mugu_skies)
A U.S. Navy F/A-18F Super Hornet of VX-9 “Vampires” was spotted with a heavy air-to-air loadout, which includes four AIM-174Bs, three AIM-120s and two AIM-9Xs, in addition to a targeting pod and an InfraRed Search and Track installed on the external fuel tank. Aviation photographer @point_mugu_skies was one of the few to capture the aircraft in this previously unseen configuration and kindly provided us the images you can see in this article.
The aircraft is the Vampires’ flagship, “Vandy 1”, which sports the black livery applied for the unit’s 30th anniversary to pay tribute to the original one which was used on VX-4 commander’s F-4s and F-14s, also known as “Vandy 1”. The callsign originated from the abbreviation of the unit’s official callsign “Vanderbilt” used at the time.
As The Aviationist has reported in detail in the last few months, the AIM-174B is a Standard Missile (SM) 6 variant developed for the air-to-air role. The SM-6 is the surface-to-air missile designed to be used on Navy ships in conjunction with the Aegis Combat System and also known as the RIM-174 Standard Extended Range Active Missile (ERAM).

The idea of adapting the SM-6 to be air-launched is not new, as the weapon was already seen on a Super Hornet of VX-31 in 2018 and 2021. However, it wasn’t until earlier this year that the testing got a new impulse and operational units were involved.
In fact, after another F/A-18 was spotted in April with an SM-6 under the wing, the weapon then appeared on operational jets assigned to the USS Carl Vinson aircraft carrier during the Rim of The Pacific 2024 (RIMPAC 2024) exercise in July. The heaviest load seen so far included two AIM-174s and two AIM-120s.
The one seen in the latest photo is reportedly the heaviest air-to-air load to date with the new weapon, with the AIM-174 both on the inner and middle wing hardpoints. It’s interesting to note also the presence on the external fuel tank of the ASG-34A IRST, which acts as a complementary sensor to the AN/APG-79 fire control radar in a heavy electronic attack or radar-denied environment.

Another shot of the F/A-18F “Vandy 1” with the heavy air-to-air loadout. (Image credit: @point_mugu_skies)
AIM-174B
As previously explained, the AIM-174 is an air-launched version of the RIM-174 Standard Extended Range Active Missile (ERAM), a crucial element of the US Navy’s air defense strategy. Integrated into the Aegis Combat System, the RIM-174 is primarily designed for long-range anti-air warfare but can also be employed for terminal phase ballistic missile defense and as an anti-ship missile. This year marked the first official combat use of the SM-6, with the Department of Defense confirming that the USS Carney intercepted and destroyed an anti-ship ballistic missile fired by Houthi rebels in the Gulf of Aden on January 30, 2024.
The SM-6 uses the airframe of the SM-2ER Block IV (RIM-156A) missile, upgraded with an active radar homing seeker derived from the AIM-120 AMRAAM air-to-air missile. This missile can reach speeds of up to Mach 3.5 and has a maximum range of 200 nautical miles. To that respect, it’s not clear what the maximum range of the air-launched version could be: despite the lack of a booster, launching it at high speed and altitude would result in significantly greater range compared to the surface-launched variant.
With the induction of the AIM-174B into service, the U.S. Navy joins a number of air arms capable of deploying an extra-long-range beyond-visual-range air-to-air missile (BVRAAM), like the MBDA Meteor, the Russian R-37M and Chinese PL-15 and PL-21. In fact, the AIM-174B enables the U.S. Navy Super Hornets to engage targets at much greater distances than is currently possible with the AIM-120 AMRAAM. Integrated with the E-2D, F-35, and AEGIS within the Naval Integrated Fire Control-Counter Air (NIFC-CA) system, the AIM-174B would extend the Navy’s capability to intercept aerial targets at ranges comparable to (if not greater than) those achieved against naval targets using the baseline SM-6.
In essence, this new missile fills the gap left by the retirement of the AIM-54 Phoenix. The AIM-54 was a long-range air-to-air missile used by the U.S. Navy’s F-14 Tomcat and retired in 2004 alongside the F-14. Known for its impressive range of over 100 nautical miles and multiple-target engagement capability, the AIM-54 left a significant void in long-range engagement capabilities.
While there wasn’t a direct replacement for the AIM-54 Phoenix in terms of range, the U.S. military has been developing advanced air-to-air missiles to enhance its fighter aircraft capabilities. The AIM-260 Joint Advanced Tactical Missile (JATM) is one such development intended to replace the AIM-120 AMRAAM. Although not a direct replacement for the AIM-54 Phoenix, the AIM-260 aims to offer improved range and performance compared to the AIM-120.
SM-6
I

F/A-18E of VFA-192 carrying two air-launched SM-6 missiles (Image credit: @aeros808)
Operationally deployed
The photo of the new weapon during a test flight in April 2024 was reportedly part of the testing that preceded the delivery of the AIM-174B to the squadron likely to carry out Operational Test and Evaluation (OT&E), a testing phase conducted on production, or production representative weapons, to determine whether systems are operationally effective and suitable to support a Full-Rate Production (FRP) decision.
In July, the U.S. Navy acknowledged that the AIM-174 is operationally deployed, likely in Initial Operating Capability (IOC) with the CVW-2 Air Wing’s Super Hornet squadrons aboard the USS Carl Vinson (CVN-70), as reported by Naval News. “The SM-6 Air Launched Configuration (ALC) was developed as part of the SM-6 family of missiles and is operationally deployed in the Navy today,” said a U.S. Navy spokesperson.
While the service acknowledged the existence and the deployment of the weapon, so far only the NAIM-174B inert, CATM-174B captive carry, and DATM-174B ground training variants were seen installed on aircraft. However, the fact that the Navy mentioned the weapon being operationally deployed implies that live variants might also been delivered.
The Navy did not disclose other details about the AIM-174. So far, we know the standard SM-6 missile is about 21 feet (6.4 meters) long and, using persons for scale in some of the few photos available, the AIM-174B seems to be of similar length. According to the stencils visible on the photos of the missile carried by the CVW-2 Super Hornets taking part in RIMPAC, the weapon weighs 1,890 lb ± 14 lb (857 kg ± 6 kg).
Thanks again to @point_mugu_skies for the photos he sent us and make sure to follow him on Instagram for more!
About Stefano D'Urso
Stefano D'Urso is a freelance journalist and contributor to TheAviationist based in Lecce, Italy. A graduate in Industral Engineering he's also studying to achieve a Master Degree in Aerospace Engineering. Electronic Warfare, Loitering Munitions and OSINT techniques applied to the world of military operations and current conflicts are among his areas of expertise.
@TheAviationist .com
16 notes
·
View notes
Text



youtube
CanguRo RidRoid (Ride + Roid) (2018), Future Robotics Technology Center (fuRo), Japan. CanguRo, 'kangaroo' in Italian, is a transforming robot vehicle with an automotive intelligence. "In robot mode, CanguRo operates like a buddy droid in a movie. As a loyal partner, it follows its master in shopping malls, giving help at times. Sometimes it works as a communications terminal, letting its master chat with friends and family members. Even from some distance away, CanguRo comes to its master upon a call from a smartphone or tablet. The fully automatic operation is based on scanSLAM—fuRo’s proprietary SLAM technology. CanguRo is a partner robot that never leaves the side of its master. When the master wishes to travel, CanguRo automatically transforms itself into ride mode. In ride mode, CanguRo supports its master as an integral part of his or her body. As the master leans right and left to make a turn, CanguRo actively transforms its body and leans accordingly. It gives the master a sense of integration, like slalom skiing. CanguRo has a built-in body-sonic system. According to the travel speed, CanguRo generates pulses like heartbeats, transmitted via the saddle to let the rider recognize the current speed by haptics. The steering has a force feedback, which directly transmits the radius of the turn to the rider’s arms. All these sensory functions are implemented to produce a sense of human-machine integration."
9 notes
·
View notes