#courtesy of Source Code (2011)?
Explore tagged Tumblr posts
Text
20241208 cherik dream
>Prison. Charles strikes a deal with Erik: he gets protection, Erik gets sex
>"Charles, Charles. Are you okay?"
Charles becomes aware of his surroundings again. He and Erik are wearing suits, meeting with a therapist for couple therapy.
List of things Charles's mind is total blank about:
— they are in their suburb home — Erik is his husband — they have a daughter, Jean — his life up until this point — generally whatever the fuck is going on — who he is
>Erik is worried, naturally. His husband doesn't seem to know shit all of a sudden.
>Charles investigates the situation while keeping on the facade
>He discovers that
— the life with Erik is a projection — but they are real — their physical bodies are in a research facility that does experiment on mutants — Charles somehow finds a way to interfere with the projection but fails halfway — He tries to do it again
Sorry guys, no ending since i woke up 😂
25 notes
·
View notes
Text
POLICE REPORT: Stolen SUV Car set on fire from a Street Kiddie Beggar Suspect on both charges in Tacloban City
(via DYPR-TV's PRTV 12: Tacloban / with reports from Sylvia Abadingo)
TACLOBAN, LEYTE -- An afternoon fire broke out in flames after a suspected male street beggar kid, committing vehicle arson and attempted monetary theft from a stolen car in Balyuan Park, Magsaysay Boulevard, Tacloban City, Leyte on Saturday (September 23rd, 2023 at 1:55pm -- Tacloban local time) after he couldn't get any collected money inside the car by force.
(CONTRIBUTED SCREENGRAB COURTESY: PRTV Tacloban / Arangkada Singko-Trenta)
Den (not an actual real name) set a stolen car on fire, fueling himself with a childhood anger because the money went inside this said stolen car. It was locked for safety reasons, but it was too late shortly after, where he decides to burn a stolen vehicle by taking out a cardboard box and lighter before 2pm.
In a radio interview between PRTV 12: Tacloban and DYTG-FM 103.1mhz's Radyo Bandera: Sweet FM Tacloban, the Tacloban City Police Office (TCPO) recently impounded a Chevrolet Captiva SUV (Sports Utility Vehicle), which located in the Custody Impounding Area of Highway Patrol Group (HPG), also parked the same aforesaid location.
HPG 8 Regional Chief and Police Colonel named Christine S. Tan, the confirmed stolen vehicle in 2011 partially recovered at first in mid-October 2013, where some violation notices sent 3 times to the car owner, but it is no longer available after one previous adult suspect in Tacloban City revoked his driver's license for unknown reasons: “Ito po ay isang ninakaw na sasakyan o stolen vehicle, pabalik noong 2011 at nai-recover noong Oktubre 13, 2013 -- kung na inform ng tatlong beses yung may ari nito, pero record shows na hindi nag ipagbigay-alam yung may ari sa inuhin na sinend ng opisina namin”, PCol. Tan said in Tagalog dialect.
(CONTRIBUTED PHOTO COURTESY: TCPO PNP)
Because of the vehicle arson incident that happened, the HPG 8 talked to the mayor's office named Alfred Romualdez, where they found someone to move to the said Custody Impounding Area, which has 5 cars at present, so that it will no longer be the same incident as of this posted time: “Nakipag-ugnayan na kami sa Office of the City Mayor at may nakita na po kaming area kung saan ililipat yung ating mga impounded vehicles and for the record, wala pa ganitong nangyari na ninakaw o kinuhanan ng parte ng sasakyan dito, except po sa isang batang ito” he added.
At least PHP50,000 (approximately U$D900) worth of damages, but there is no official report that was currently receiving before the aforementioned incident for this past weekend.
While contacting a local Taclobanon doctor to understand the mental health of a child, he was taken into custody at the City Social Welfare and Development Office (CSWDO). Using the Revised Penal Code in Articles #310, 324 and 325, Den officially charges the suspected street beggar kid as liable between vehicle arson crimes and Qualified Theft when he later reaches an adulthood age limit. Additional charges will later follow as needed after turning himself either 18 or 21 years old.
The bad parenting of Den ends here in prison for children, leaving the world is watching for an absolute shameful arson kid.
CONTRIBUTED PHOTO COURTESY: TCPO via FB PHOTO BACKGROUND PROVIDED BY: Tegna
SOURCE: *https://www.facebook.com/prtvtaclobanofficial/videos/643892434478216/ [Referenced News Item via Arangkada Singko Trenta - Sep262023] *https://www.facebook.com/61550353648375/posts/122135806904011788/ [Referenced FB News Article via DYTG-FM 103.1mhz's RBSFM: Tacloban] *https://www.facebook.com/100093455906474/posts/185299297928599/ [Referenced FB Mini News Article via Leyte Files News Bureau] and *https://www.facebook.com/100083205664846/posts/300339882749532/ [Referenced FB Mini News Article via Balitang Mayorgueño]
-- OneNETnews Team
#regional news#police report#stolen vehicle#arson#street beggar kid#beggar#kiddie#awareness#tacloban#leyte#OneNETnews
0 notes
Text
FLASHBack: Week 105 - Animator vs. Animation
Today on FLASHBack, we're going to get a little meta. Over the last two years, we've looked at roughly over six-hundred fifty Animations by various Flash Artists, but have only rarely taken the step back to look at the Animation process itself. So that's exactly what we're going to do, but not in the conventional way. Instead, we're going to be looking at a series of Flash Animations that takes its cues from the Looney Tunes classic Duck Amuck, in which a cartoon character ends up getting into a fight with the animator who's bringing them to life. And also touch upon intellectual property theft by a notorious content aggregator website along the way. On 3 June 2006, Alan "noogai" Becker uploaded Animator vs. Animation to Newgrounds. The next day, it was Frontpaged and took Daily 2nd Place, and by the end of the week it was the Weekly Users' Choice and the Review Crew Pick. The animation was of a stick figure "victim" being drawn in Flash, only to be tormented by the animator until the stick figure's selection box gets broken, letting him escape across Flash's user interface to take hold of the various drawing tools to defend himself. Five days later on 8 June 2006, the same Flash was uploaded to Albino Blacksheep. It was from there that the website eBaum's World ripped the Flash file to upload to their own site a day later. eBaum's had a bad reputation for stealing independent creators' viral content and hosting it on their own site without permission or compensation, even going so far as to strip credits and source watermarks from the content before uploading it to their own site. This is what they had done with Albino Blacksheep's authorized copy of Animator vs. Animation, but what eBaum's didn't know was that in addition to the visible "hosted at albinoblacksheep.com" that they removed, there was other tracking code embedded in the Flash that meant they'd been caught red-handed.
On 12 June 2006, the siterunner of Albino Blacksheep made a statement about the content theft. eBaum's World then approached Alan directly with an offer of $250 to buy the permission to continue to host the Flash on their site (as well as naming him the "winner" of a nebulous "Best Flash" contest that had a prize of an additional $1000). However, this money came with a price: Becker had to submit a statement for eBaum's to post, making it look like he was clearing them of blame. Alan, who was 17 at the time, and from a family that was not well off, had initially taken the money, but then sent it back, demanding that his Flash and the "Statement" he'd made be taken down. In a post made by Albino Blacksheep on 23 June 2006, it was pointed out that the statement had been pre-scripted by eBaum's to carefully sidestep the fact that while they had contacted Alan ahead of time asking to be able to host his animation, he'd told them no, and so they went and stole his file anyways. That post included an apology to the Flash community from Becker for falling into eBaum's trap. The animation and the statement were removed from eBaum's on 26 June 2006. After receiving funding from Atom Films, Becker would revisit the concept with Animator vs. Animation 2, posted to Newgrounds on 15 Mar 2007. It took the same slate of awards as the first, with the exception of being the Daily Feature instead of Daily 2nd Place. This time around the stick figure isn't labeled "victim" but instead "Chosen One" (possibly a Matrix reference). He immediately breaks out of his selection box on his own, and begins breaking the Flash user interface with fireballs. This time around The Animator has prepared an arsenal of weapons in Flash's library of animatable "Symbol" objects, including a SPNKR rocket launcher from Halo. However, the Chosen one breaks though Flash to get to the Windows XP desktop beneath (complete with the Bliss wallpaper). There he battles with the fox from the Firefox icon and the Stick Figure from the AOL Instant Messenger Icon. Finally, he's contained by an Avast Antivirus Scan (though alas, Avast's language settings were on plain English, and not he infinitely more fun "Pirate" setting). The animation ends with The Chosen One having been tamed and being used as a Pop-Up Blocker. Later, this animation would get a Live Orchestral Score courtesy of Joe-Pietro Abela, who used it for his Masters project at the Berklee College of Music. On 6 August 2011, Alan would upload the third chapter in the series to Newgrounds, where it again took the quadfecta of top awards. In this installment, The Chosen One breaks free of his enslavement as a Pop-Up Blocker, to again spread havoc throughout The Animator's computer. This time around the battle ranges across such iconic windows software as Microsoft Word, Solitaire, & Minesweeper. Clippy the Office Assistant proves to be a formidable foe, but eventually, The Animator has to open up Flash to draw a new red stick figure to be "The Dark Lord", coding him to go after The Chosen One. In the end however, the two team up and end up causing a Blue Screen of Death on The Animator's computer. It would be another three years before Becker would put Animator vs. Animation IV on Newgrounds, 2 October 2014, to the usual maximum acclaim. For this chapter, Alan had turned to Kickstarter to get support for production, raising $11,280 in donations. With that funding, he expanded the scope of the series, by not just showing what was happening on the computer screen, but also incorporating real world video of himself as The Animator. The Chosen One has a Second Coming, and when The Animator discovers this, the ensuing battle ranges from Facebook to The Animator's iPhone, and then back onto the computer via Dropbox. In his process of containing The Second Coming, The Animator realizes that The Second Coming is better at animating than he is, and strikes a bargain with him, allowing his continued existence in return for tutoring. After that, Alan would begin doing spinoffs, such as Animation vs. Minecraft and Animation vs. YouTube, where his stick figures would begin having adventures outside the context of Adobe Flash and interactions with The Animator. These would then be followed up with Animation vs League of Legends, Animation vs Pokemon, and Animation vs Super Mario Bros. However, in between those spinoff episodes, he would continue to produce the occasional short animation for the main Animator vs. Animation series, and on 5 Dec 2020, he compiled those shorts into Animator vs. Animation V, which was uploaded to YouTube on 5 December 2020. That's all for FLASHBack this week. Next week, THE END.
#radwolf76FLASHBack#Adobe Flash#Flash Animation#mid 2000s#late 2000s#early 2010s#mid 2010s#early 2020s#early web#Newgrounds#Albino Blacksheep#Alan Becker#noogai#noogai3#Animator vs. Animation#ebaumsworld#content theft#duck amuck#Joe-Pietro Abela#bliss wallpaper#aol instant messenger#firefox#avast antivirus#solitare#minesweeper#ms word#office assistant#Clippy#It looks like you're trying to kill a stick figure. Would you like help?
2 notes
·
View notes
Text
Important libraries for data science and Machine learning.
Python has more than 137,000 libraries which is help in various ways.In the data age where data is looks like the oil or electricity .In coming days companies are requires more skilled full data scientist , Machine Learning engineer, deep learning engineer, to avail insights by processing massive data sets.
Python libraries for different data science task:
Python Libraries for Data Collection
Beautiful Soup
Scrapy
Selenium
Python Libraries for Data Cleaning and Manipulation
Pandas
PyOD
NumPy
Spacy
Python Libraries for Data Visualization
Matplotlib
Seaborn
Bokeh
Python Libraries for Modeling
Scikit-learn
TensorFlow
PyTorch
Python Libraries for Model Interpretability
Lime
H2O
Python Libraries for Audio Processing
Librosa
Madmom
pyAudioAnalysis
Python Libraries for Image Processing
OpenCV-Python
Scikit-image
Pillow
Python Libraries for Database
Psycopg
SQLAlchemy
Python Libraries for Deployment
Flask
Django
Best Framework for Machine Learning:
1. Tensorflow :
If you are working or interested about Machine Learning, then you might have heard about this famous Open Source library known as Tensorflow. It was developed at Google by Brain Team. Almost all Google’s Applications use Tensorflow for Machine Learning. If you are using Google photos or Google voice search then indirectly you are using the models built using Tensorflow.
Tensorflow is just a computational framework for expressing algorithms involving large number of Tensor operations, since Neural networks can be expressed as computational graphs they can be implemented using Tensorflow as a series of operations on Tensors. Tensors are N-dimensional matrices which represents our Data.
2. Keras :
Keras is one of the coolest Machine learning library. If you are a beginner in Machine Learning then I suggest you to use Keras. It provides a easier way to express Neural networks. It also provides some of the utilities for processing datasets, compiling models, evaluating results, visualization of graphs and many more.
Keras internally uses either Tensorflow or Theano as backend. Some other pouplar neural network frameworks like CNTK can also be used. If you are using Tensorflow as backend then you can refer to the Tensorflow architecture diagram shown in Tensorflow section of this article. Keras is slow when compared to other libraries because it constructs a computational graph using the backend infrastructure and then uses it to perform operations. Keras models are portable (HDF5 models) and Keras provides many preprocessed datasets and pretrained models like Inception, SqueezeNet, Mnist, VGG, ResNet etc
3.Theano :
Theano is a computational framework for computing multidimensional arrays. Theano is similar to Tensorflow , but Theano is not as efficient as Tensorflow because of it’s inability to suit into production environments. Theano can be used on a prallel or distributed environments just like Tensorflow.
4.APACHE SPARK:
Spark is an open source cluster-computing framework originally developed at Berkeley’s lab and was initially released on 26th of May 2014, It is majorly written in Scala, Java, Python and R. though produced in Berkery’s lab at University of California it was later donated to Apache Software Foundation.
Spark core is basically the foundation for this project, This is complicated too, but instead of worrying about Numpy arrays it lets you work with its own Spark RDD data structures, which anyone in knowledge with big data would understand its uses. As a user, we could also work with Spark SQL data frames. With all these features it creates dense and sparks feature label vectors for you thus carrying away much complexity to feed to ML algorithms.
5. CAFFE:
Caffe is an open source framework under a BSD license. CAFFE(Convolutional Architecture for Fast Feature Embedding) is a deep learning tool which was developed by UC Berkeley, this framework is mainly written in CPP. It supports many different types of architectures for deep learning focusing mainly on image classification and segmentation. It supports almost all major schemes and is fully connected neural network designs, it offers GPU as well as CPU based acceleration as well like TensorFlow.
CAFFE is mainly used in the academic research projects and to design startups Prototypes. Even Yahoo has integrated caffe with Apache Spark to create CaffeOnSpark, another great deep learning framework.
6.PyTorch.
Torch is also a machine learning open source library, a proper scientific computing framework. Its makers brag it as easiest ML framework, though its complexity is relatively simple which comes from its scripting language interface from Lua programming language interface. There are just numbers(no int, short or double) in it which are not categorized further like in any other language. So its ease many operations and functions. Torch is used by Facebook AI Research Group, IBM, Yandex and the Idiap Research Institute, it has recently extended its use for Android and iOS.
7.Scikit-learn
Scikit-Learn is a very powerful free to use Python library for ML that is widely used in Building models. It is founded and built on foundations of many other libraries namely SciPy, Numpy and matplotlib, it is also one of the most efficient tool for statistical modeling techniques namely classification, regression, clustering.
Scikit-Learn comes with features like supervised & unsupervised learning algorithms and even cross-validation. Scikit-learn is largely written in Python, with some core algorithms written in Cython to achieve performance. Support vector machines are implemented by a Cython wrapper around LIBSVM.
Below is a list of frameworks for machine learning engineers:
Apache Singa is a general distributed deep learning platform for training big deep learning models over large datasets. It is designed with an intuitive programming model based on the layer abstraction. A variety of popular deep learning models are supported, namely feed-forward models including convolutional neural networks (CNN), energy models like restricted Boltzmann machine (RBM), and recurrent neural networks (RNN). Many built-in layers are provided for users.
Amazon Machine Learning is a service that makes it easy for developers of all skill levels to use machine learning technology. Amazon Machine Learning provides visualization tools and wizards that guide you through the process of creating machine learning (ML) models without having to learn complex ML algorithms and technology. It connects to data stored in Amazon S3, Redshift, or RDS, and can run binary classification, multiclass categorization, or regression on said data to create a model.
Azure ML Studio allows Microsoft Azure users to create and train models, then turn them into APIs that can be consumed by other services. Users get up to 10GB of storage per account for model data, although you can also connect your own Azure storage to the service for larger models. A wide range of algorithms are available, courtesy of both Microsoft and third parties. You don’t even need an account to try out the service; you can log in anonymously and use Azure ML Studio for up to eight hours.
Caffe is a deep learning framework made with expression, speed, and modularity in mind. It is developed by the Berkeley Vision and Learning Center (BVLC) and by community contributors. Yangqing Jia created the project during his PhD at UC Berkeley. Caffe is released under the BSD 2-Clause license. Models and optimization are defined by configuration without hard-coding & user can switch between CPU and GPU. Speed makes Caffe perfect for research experiments and industry deployment. Caffe can process over 60M images per day with a single NVIDIA K40 GPU.
H2O makes it possible for anyone to easily apply math and predictive analytics to solve today’s most challenging business problems. It intelligently combines unique features not currently found in other machine learning platforms including: Best of Breed Open Source Technology, Easy-to-use WebUI and Familiar Interfaces, Data Agnostic Support for all Common Database and File Types. With H2O, you can work with your existing languages and tools. Further, you can extend the platform seamlessly into your Hadoop environments.
Massive Online Analysis (MOA) is the most popular open source framework for data stream mining, with a very active growing community. It includes a collection of machine learning algorithms (classification, regression, clustering, outlier detection, concept drift detection and recommender systems) and tools for evaluation. Related to the WEKA project, MOA is also written in Java, while scaling to more demanding problems.
MLlib (Spark) is Apache Spark’s machine learning library. Its goal is to make practical machine learning scalable and easy. It consists of common learning algorithms and utilities, including classification, regression, clustering, collaborative filtering, dimensionality reduction, as well as lower-level optimization primitives and higher-level pipeline APIs.
mlpack, a C++-based machine learning library originally rolled out in 2011 and designed for “scalability, speed, and ease-of-use,” according to the library’s creators. Implementing mlpack can be done through a cache of command-line executables for quick-and-dirty, “black box” operations, or with a C++ API for more sophisticated work. Mlpack provides these algorithms as simple command-line programs and C++ classes which can then be integrated into larger-scale machine learning solutions.
Pattern is a web mining module for the Python programming language. It has tools for data mining (Google, Twitter and Wikipedia API, a web crawler, a HTML DOM parser), natural language processing (part-of-speech taggers, n-gram search, sentiment analysis, WordNet), machine learning (vector space model, clustering, SVM), network analysis and visualization.
Scikit-Learn leverages Python’s breadth by building on top of several existing Python packages — NumPy, SciPy, and matplotlib — for math and science work. The resulting libraries can be used either for interactive “workbench” applications or be embedded into other software and reused. The kit is available under a BSD license, so it’s fully open and reusable. Scikit-learn includes tools for many of the standard machine-learning tasks (such as clustering, classification, regression, etc.). And since scikit-learn is developed by a large community of developers and machine-learning experts, promising new techniques tend to be included in fairly short order.
Shogun is among the oldest, most venerable of machine learning libraries, Shogun was created in 1999 and written in C++, but isn’t limited to working in C++. Thanks to the SWIG library, Shogun can be used transparently in such languages and environments: as Java, Python, C#, Ruby, R, Lua, Octave, and Matlab. Shogun is designed for unified large-scale learning for a broad range of feature types and learning settings, like classification, regression, or explorative data analysis.
TensorFlow is an open source software library for numerical computation using data flow graphs. TensorFlow implements what are called data flow graphs, where batches of data (“tensors”) can be processed by a series of algorithms described by a graph. The movements of the data through the system are called “flows” — hence, the name. Graphs can be assembled with C++ or Python and can be processed on CPUs or GPUs.
Theano is a Python library that lets you to define, optimize, and evaluate mathematical expressions, especially ones with multi-dimensional arrays (numpy.ndarray). Using Theano it is possible to attain speeds rivaling hand-crafted C implementations for problems involving large amounts of data. It was written at the LISA lab to support rapid development of efficient machine learning algorithms. Theano is named after the Greek mathematician, who may have been Pythagoras’ wife. Theano is released under a BSD license.
Torch is a scientific computing framework with wide support for machine learning algorithms that puts GPUs first. It is easy to use and efficient, thanks to an easy and fast scripting language, LuaJIT, and an underlying C/CUDA implementation. The goal of Torch is to have maximum flexibility and speed in building your scientific algorithms while making the process extremely simple. Torch comes with a large ecosystem of community-driven packages in machine learning, computer vision, signal processing, parallel processing, image, video, audio and networking among others, and builds on top of the Lua community.
Veles is a distributed platform for deep-learning applications, and it’s written in C++, although it uses Python to perform automation and coordination between nodes. Datasets can be analyzed and automatically normalized before being fed to the cluster, and a REST API allows the trained model to be used in production immediately. It focuses on performance and flexibility. It has little hard-coded entities and enables training of all the widely recognized topologies, such as fully connected nets, convolutional nets, recurent nets etc.
1 note
·
View note
Text
GLOBAL EBS ANYTIME NOW, DEBT CEILING DEFAULT, WAR ESCALATION BETWEEN NATO & RUSSIA, BIDEN DRUG SHORTAGE, FLUORIDE LOWERS IQ, BELGIUM SATANIC CASTLE, TIMELINE OF EVENTS, WRAY CONTEMPT OF CONGRESS, PREP FOR NO INTERNET/POWER/ FOOD SHORTAGES/WATER, TALIBAN AMASSING EQUIP ALONG IRAN BORDER, CHINA CUT OFF PENTAGON GCR/JUDY BYINGTON UPDATE, GESARA/NESARA AND MORE.
Your support is greatly appreciated!
Here is my STRIPE link:
https://buy.stripe.com/28o9EyeHJ6wQ5KE5km
NOTE: please adjust QUANTITY to change donation amount. Also, it says “pay Truth and News” at top; that’s me. 👍
Thank you so much!
FOR CURRENT DEFCON LEVELS VISIT:
https://www.defconlevel.com/news.php
Nuremberg Code PDF:
https://media.tghn.org/medialibrary/2011/04/BMJ_No_7070_Volume_313_The_Nuremberg_Code.pd
Vaccine Vaers Data from CDC finder:
https://wonder.cdc.gov/controller/datarequest/D8
Telegram (channel ID in videos)
All Judy Byington reports: https://operationdisclosureofficial.com/2022/10/27/restored-republic-via-a-gcr-as-of-october-27-2022/
GREAT CHANNEL AND A Link to be saved by our Lord Jesus Christ:
http://www.xtremerealitycheck.com/getsaved.html
Link to AMERICAS FRONTLINE DOCTORS website for information about jab, masks, CV, research, data and LEGAL FORMS AND INFORMATION FOR EMPLOYERS, SCHOOLS, MILITARY ETC IN VIOLATION OF NUREMBERG CODE.
https://americasfrontlinedoctors.org/legal/vaccines-the-law/
Please see telegram channels posted in the video:
Richard citizen journalist
Nancy drew on Facebook & telegram
(Q) The Storm Rider
Tribunals for justice
JFKJrIsQ
Dismantling the Cabal
Whiplash347
Santa surfing
Project VERITAS (telegram & www.projectveritas.com)
The Charlie Ward show (bitchute)
Mad liberals (YouTube)
The United spot (YouTube)
@WW3INFO
Ildonaldo Trumpo
Stew peters
Red voice media
Infowars
Lars Von Retriever on youtube
App: piñata farms
Reese Report. &. Banned video
RT NEWS
WHITE HATS TELEGRAM CHANNEL
VT INTELL Courtesy of Commander Thor
MOD TELEGRAM
***ALL TIC TOK LINKS EMBEDDED IN VIDEO.
KAREN KINGSTON SUB STACK
LINK: https://karenkingston.substack.com/
COMMANDER VALIANT THOR ON TELEGRAM LINK:
https://t.me/vvt369
WE THE PEOPLE NEWS ON TELEGRAM:
https://t.me/we_the_people_NEWZ
A SPECIAL THANK YOU TO THE LIGHT BEINGS FOR ASSISTING HUMANITY IN THIS WAR AGAINST THE EVIL CABAL. WE KNOW YOU HAVE SACRIFICED MUCH AND AT TIMES YOUR LIVES HAVE BEEN LOST. WE WANT YOU TO KNOW OUR PRAYERS AND CONDOLENCES ARE WITH YOU AND THOSE LOST. WE SEND YOU LOVE, LIGHT AND PEACE AND HOPE THAT ONE DAY WE WILL MEET YOU AND BEABLE TO GIVE YOU OUR MESSAGE OF THANKS, LOVE AND APPRECIATION IN PERSON. MAY GOD BLESS YOU AND ALL BEINGS OF LOVE AND LIGHT HELPING TO RID THE WORLD OF THIS EVIL DARKNESS.
NOTE: COMMANDER THOR CAN RELAY MSGS TO THE LIGHT BEINGS AND RETRIEVE MSGS, AND IF ANYONE HAS QUESTIONS OR THOUGHTS, PLEASE ASK HIM AND HE WILL ANSWER IF HE CAN.
GENE DECODE ON RUMBLE: https://rumble.com/user/RealGeneDecode
SUDDEN DEATH EPIDEMIC TUCKER CARLSON. https://beforeitsnews.com/opinion-conservative/2023/02/tucker-carlson-today-sudden-death-epidemic-a-must-video-3655806.html
TODAYS SOURCES
https://operationdisclosureofficial.com/wp-content/uploads/2023/05/Restored-Republic-via-a-GCR-5-31-2023.docx
https://halturnerradioshow.com/index.php/en
https://realrawnews.com/2021/06/upcoming-military-tribunals-revision-3/
https://www.eyedropmedia.com/videos
0 notes
Text
Activists are Designing Mesh Networks to Deploy During Civil Unrest
Imagine waking up and checking your phone after several evenings of mass demonstrations. You try scrolling through your Twitter feed, but it won’t load. You turn your router off and on to no avail. You try texting a friend to complain, but the message fails to send. Frustrated, you walk outside. People scattered along the sidewalk look as disoriented and confused as you feel—except for police officers and the National Guard, who are forcefully telling everyone to immediately return to their homes over a loudspeaker.
Currently, most of us would have no choice but to retreat into isolation in such a situation. But organizers and programmers with the Mycelium Mesh Project are hoping to provide a solution by designing a decentralized, off-grid mesh network for text communications that could be deployed quickly during government-induced blackouts or natural disasters.
“The network that we all use will work pretty much fine in 99.9% of the cases. But then when it doesn't, it's a real big problem,” Marlon Kautz, an organizer and developer with the project, told Motherboard. “The authorities' control over our communications infrastructure can just completely determine what is politically possible in a situation where the future is really up for grabs, where people are making a move to change things in a serious and radical way.”
Mesh networks, a form of intranet distributed across various nodes rather than a central internet provider, have the potential to decrease our collective reliance on telecommunication conglomerates like Spectrum and Verizon. Nonprofits, like NYC Mesh, are increasingly offering relatively affordable internet alternatives by installing mesh nodes at people’s homes, which then connect to “supernodes” and the internet at large. One such network was set up at an encampment outside city hall in New York City, during the height of last summer's protests against police violence.
During a civil unrest situation, government operatives could theoretically disconnect established commercial mesh networks by raiding activists' homes and destroying their nodes or super nodes. The Mycelium Mesh Project is addressing this potential weak link by developing a system that could be deployed at a moment’s notice in non-locations, such as on abandoned buildings, tree tops, electric boxes and utility poles.

A volunteer affixes a mesh networking node to a light pole. Photo courtesy of the Mycelium Mesh Project
Nodes would be cheap, run independently of the power grid, and could be produced with materials that can be obtained locally. So far, the collective has successfully sent and received text messages across thirteen miles during field testing around Atlanta, Georgia with nodes powered by rechargeable batteries harvested from disposable vapes.
The scenario they are prepping for is less far-fetched than it may initially seem. In 2011, the Bay Area Rapid Transit System (BART) police shut down wireless service for three hours to disrupt protests against the agency’s murder of Oscar Grant and Charles Hill. In 2016, Water Protectors at Standing Rock claimed that their cell phone signals frequently disappeared and had difficulties with livestreams and uploading videos and other posts to social media. In February of this year, Myanmar’s military dictatorship shut down telecommunications and Wi-Fi across most of the country during its coup d’état. Connections can also become unreliable due to less nefarious reasons, such as when networks become congested during mass events like protests and music festivals.
“This internet shutdown doesn't happen in a situation where everything is going well,” a Burmese human rights activist in Myanmar told Wired UK. “They are cracking down on the protests, killing civilians. You live in fear that something can happen to you at night. And you think: if there is no internet, you cannot talk to your friends or colleagues about what is happening.” Since 2019, 45 countries have shut down the internet 239 times, according to the internet research firm Top10VPN.
During the Black liberation uprisings in the U.S. last summer, the government chose not to shut down communication networks. Instead it seemed to strategically gather intel with stingrays and dirtboxes, which collect data from cell phones en masse. But Kautz says a shutdown could happen next time.

Volunteers program mesh network nodes, which can be deployed anywhere to enable communication during an internet blackout
The Communications Act of 1934 allows the president to shut down or take control of “any facility or station for wire communication” in the US. And while civil liberties groups like the ACLU and EFF have argued shutoffs violate the First Amendment, there is no legal precedent stating they are strictly off-limits. “It is the backstop, it is the joker, it is the ace card and there are more than enough examples to demonstrate that the state will do this kind of thing if they need it to maintain control,” Kautz said.
The Mycelium Mesh Project is still in its relatively early stages of development. Messages aren’t encrypted—a necessary feature for activists—and the model isn’t ready for long-range use. But developers are hopeful that their open-source model will promote cooperation amongst like-minded coders.
“This is anti-capitalist work, which is non-commercial. We are not trying to start a business,” Kautz explained. “We're explicitly trying to take advantage of open source type concepts. So not not only do we want the code that we're developing to be open source, but our entire production model will be.”
Activists are Designing Mesh Networks to Deploy During Civil Unrest syndicated from https://triviaqaweb.wordpress.com/feed/
0 notes
Text
IT’S A MAD WORLD
Image courtesy MAD Magazine
As a teenager in the 1970s, I’d save up my allowance so I could go to MPH Bookstore on Hill Street, singapore to get my monthly copy of MAD Magazine. It was not cheap, I assure you, since it had to be shipped from the USA and converted to singapore dollars, which was 1 usd to 3 then. Also, a few die-hard readers believed MAD when they announced one fine day that “MAD is lowering its price.” What they did really was to move the price tag from the top, to the bottom of the magazine cover. That’s MAD for you. I was attracted to its unconventional parody and artwork. Literary and artistic rebels they were.
MAD was founded after the 2nd World War in New York. It was a time when American power and prestige were unquestioned. A time which also allowed for creative experimentation within many industries, especially publishing. Because of MAD’s “method” or courage to forge critical thinking and to lampoon conventional culture and wisdom, the founder, William Gaines and the editors, Harvey Kurtzman and Al Feldstein came under intense scrutiny during the Senate Subcommittee hearings of the 1950s (1). The publishers came up with a Comics Code, a form of self-censorship, to forestall punitive legislation from the U.S. Congress. The Code was only abandoned in 2011 (2). MAD survived the period. And thrived. As an aside, the Gaines Family was also intimately involved with DC Comics, where the superheroes came to be (3).
William Gaines and his editors brought in a group of wacky and creative folks during its formative years to make MAD Magazine a success. These included Don Martin and Sergio Aragones. Both were brilliant artists.
Publishing in America is protected by the First Amendment to the U.S. Constitution :
“The First Amendment guarantees freedoms concerning religion, expression, assembly, and the right to petition. It forbids Congress from both promoting one religion over others and also restricting an individual’s religious practices. It guarantees freedom of expression by prohibiting Congress from restricting the press or the rights of individuals to speak freely. It also guarantees the right of citizens to assemble peaceably and to petition their government.” (4)
Publishing is free speech. Without this, MAD Magazine and many publications in America would never be and I, a teen then, would never have been the happy beneficiary of so many wonderful and educational literature. Free speech and creativity are twins in the pod. We must not go backwards to the practice of the burning of the books in ancient China or its current form - targeting critics through self-serving and dubious legislation. This is reminiscent of the Nuremberg Laws and then the Holocaust by Nazi Germany where Jews, Roma, homosexuals and others deemed inferior, or just different, were targeted for destruction (5). Intolerance breeds isolation of the victims and ultimately, their control and elimination. Every authoritarian regime is an intolerant ruling class of bullies. We the People must never allow ourselves to be led by these insecure and small minds. The U.S. Global Magnitsky Act, (6) which authorizes the U.S. Government to sanction international state actors who are corrupt and or violate human rights, including free speech, is a positive step in this direction, and towards an open global society. This law is a dictator’s nightmare.
It’s a MAD world. Thank Goodness.
In the Spirit of David Cornelius Singh
David’s father
Email : [email protected]
https://thinktosee.tumblr.com/
Sources/References
1. https://comicsalliance.com/tribute-william-m-gaines/
2. http://cbldf.org/comics-code-history-the-seal-of-approval/
3. https://www.dccomics.com/characters
4. https://www.law.cornell.edu/constitution/first_amendment
5. http://digitalcommons.lmu.edu/cgi/viewcontent.cgi?article=1729&context=ilr
6. https://www.govtrack.us/congress/bills/114/s284
0 notes
Text
artist profiles
last updated 19032020
profile 9: ansel adams
what was f64 group?
f64 was a group of 7 photographers from the bay area. they were founded in the 20th century. all the photographer’s work can be characterized having a large emphasis on focus and framing. the group wanted to promote a more modern aesthetic based on naturally formed objects.
who was he?
ansel adams was an american photographer and conservationist known for his work in landscape and environmental photography. he is a founding member of the f64 group. he is known for his black and white photographs of the american west.
examples of his work:

ansel adams' "clearing winter storm," taken in yosemite national park around 1937. (courtesy museum of fine arts, boston)

ansel adams' photograph of "the tetons and snake river, grand teton national park, wyoming," taken in 1942. (courtesy museum of fine arts, boston)
source: https://www.artsy.net/artist/ansel-adams
profile 8: robert capa
what made life magazine so special?
life magazine was very special as it was around to document the biggest events in the summer of 1945 including the bombings of nagasaki and hiroshima and hitler’s suicide. they covered topics the american public was more interested in. the magazine did multiple photo essays on america, like post-war american life etc.
who was he?
robert capa is a hungarian-born american war photographer and photojournalist. he is famous for photographing five major wars: the spanish civil war, the second sino-japanese war, world war II, the 1948 arab-israeli and first indochina war. he is famous for also being the only civilian photographer on omaha beach on d-day. in 1947 he was awarded the medal of freedom by president eisenhower.
examples of his work:

american soldiers carrying wounded soldier on stretcher, along road to naples

soldier carrying boy during farewell parade for the international brigades, b barcelona
source: https://www.icp.org/browse/archive/constituents/robert-capa?all/all/all/all/0
profile 7: henri cartier-bresson
who was he?
henri cartier-bresson is a french painter, photographer and director. he is best known for his street photography. bresson often describes his photography as “decisive moments”, the moment where everything fell into place.
examples of his work

henri cartier bresson, child holding two bottles of wine. rue mouffetard

japan. tokyo. a farewell service for the late actor Danjuro held on November 13th 1965 at the aoyama Funeral Hall (according to shinto rites). 1965. copyright: henri cartier-bresson / magnum photos.
source: https://www.icp.org/browse/archive/constituents/henri-cartier-bresson?all/all/all/all/0
profile 6: tim hetherington
who is he?
time hetherington was a british photojournalist, director and author known for his documentary film restrepo. majority of his work was based in west africa and the middle east. he won the world press photo of the year for a photograph from the korangal valley. he tragically died in 2011 in libya. at the time he was documenting the 2011 libyan civil war. it’s unclear whether he was killed by a mortar shell or an rpg round.
examples of his work

Mohamed Conteh (14) received a sentence of three years' imprisonment or the payment of 150,000 leones (approximately €30). He was accused of possessing a package of marijuana. Without family to help, he will have to serve his sentence. Freetown, Sierra Leone, West Africa, 5 February 2010.

perspective paragraph (photo above) from the child’s perspective: the bombs had just gone off. i was looking for my dad amidst the chaos, people were running all around me while i stood there motionless. finally my dad spotted me and pulled me to safety. suddenly a foreign man walked over to my father and i. he wore weird clothing and didn’t look like he was from here, my dad did not seem afraid of him but i feel scared.
profile 5 : richard avedon
who is he?
richard avedon was a photographer who was born in nyc in 1923. his interest in photography began at a young age. he was named poet laureate of nyc high schools. avedon seved as photographers mate second class in the us merchant marine in wwii. after two years, he left the merchant marine to work as a professional photographer creating fashion images and studying at the design laboratory of the new school for social research. when he was 22 he began working as a freelance photographer. he worked primarily for harpers bazaar, he later became the principal photographer for harpers bazaar. in 1965, avedon quit the magazine after he faced criticism for using models of color. he later worked for vogue for more than twenty years. then in 1992. avedon became the first staff photographer at the new yorker.
examples of his work

black and white photography portrait : audrey hepburn by richard avedon

black and white photography portrait : marilyn monroe by richard avedon
perspective paragraph (black and white photography portrait : audrey hepburn) from hepburn’s perspective: I was standing in the middle of a cold and mostly empty studio. richard walked around fixing the lights, in order to get the right angle he proclaimed. he finally walked over and silently handed me the mirror. I looked at him in curiosity, what did he want me to do with the mirror. without asking, he gestured for me to look at the mirror, moving behind me to take the photo.
profile 4 : joni sternbach

who is she?
joni sternbach is a new yorker who earned a bfa in phtography at the school of visual arts and holds an ma from nyu. she uses early photographic processes and film. her work focuses mainly on human relationships with water. her art is showcased is many parts of the world including the national portrait gallery in london. she is an influential photographer as she applies early process techniques to modern settings.
examples of her work

the future by joni sternbach

lone surfer by joni sternbach
these photos show the distinct relationship humans have with water. in the future photo the emphasis is placed on the seven surfers in the photo. it showcases the various different types of surfers in santa barbra. in the lone surfer photo the emphasis is placed on the lone surfer in the ocean.
sources
http://jonisternbach.com/about/
profile 3: edward steichen

what is photo-secession?
photo secession is the first major group of photographers who worked to have photography recognized as a fine art. this group of photographers was led by alfred stieglitz and also included edward stiechen, clarence h. white, gertrude käsbier, and alvin langdon coburn. these photographers was orignally a part of the camera club of new york, they then left and pursued picotrialism. pictorialism is an approach to photography that has emphasis on the beauty of subject matter, composition and other fine art features verus photojournalism.
who was he?
edward steichen was a very influential figure in the photo-secession movement. steichen came to the united states in 1881. he originally worked in lithography before switching to photography in 1896. he became a naturalized citizen in 1900. after he exhibited his work in the chicago salon, alfred stieglitz discovered his work. steichen did art in paris on and off between 1900 and 1922. he cofounded the photo-secession in 1902. during world war one, he did aerial photography for the army. he then renounced painting and adopted a modernist style. he was chief photographer for condé nast from 1923 to 1938. in 1945 he became the director of the united states naval photographic institute, he oversaw combat photography and organized various exhibitions. he was the director of photography at the museum of modern art from 1947 to 1962. steichen received numerous awards and his work has been showcased in numerous exhibitions and museums. he is an important photographer as he was one of the major photographers leading the photo-secssion movement.
examples of his work

marilyn monroe by edward steichen

moonlight by edward steichen
these two photos show his contribution of photography. in the marilyn monroe photo, monroe is positioned in a way to emphasize her beauty, while the lighting showcases her sharp facial figures. in the moonlight photo, steichen uses lighting to give the photo a dramatic edge and tone.
sources
https://www.icp.org/browse/archive/constituents/edward-steichen?all/all/all/all/0
profile 2 : jacob riis

who was he?
jacob riis was one of the first photographers who used his work for social reform. riis immigrated to the united states from denmark in 1870. while working for the new york tribune, he started an exposé on the conditions in the lower east side of manhattan. he used his work to advocate for the reform of the impoverished areas of new york. his work helped establish the tenement house commission, a commission that raised building code while banning the construction of dark & poorly ventilated tenement buildings. his arguably most famous body of work is how the other half lives, an documentation of the slums of new york. after his death, his work was largely forgotten until the museum of the city of new york did a retrospective exhibition of his work in 1947.
examples of his work


this photos display the living conditions of the poor in its rawest form. riis does not back away from the horror of their living conditions, he contradicts the typical sentimental photography of the time.
sources
https://www.icp.org/browse/archive/constituents/jacob-riis?all/all/all/all/0
profile 1 : lewis hine

who was he?
lewis hine was born on september 26th, 1874 in oshkosh, wisconsin. in 1901, he was appointed as a nature study & geography educator and the a photographer for the ethnical culture school in new york. he later became a freelance photographer for the national child labor committee (nclc). he used his work as an investigative photojournalist to showcase children working under extreme conditions. he often used different disguises to avoid being caught, as most factory owners were against social reform. his work helped create laws that strictly prohibit child labor.
examples of his work


these two photos show the dangerous conditions often young children would work for little to no money. hine shows the exploitation these children are exposed to. his photos horrified the public enough for the people to take action to stop child labor
sources
http://iphf.org/inductees/lewis-hine/
0 notes
Text
Social Media is no Longer an Esoteric Environment
I recently was accorded an opportunity to watch an eye opening film titled “The Circle”, starring Emma Watson and Tom Hanks, courtesy of Cape Peninsula University of Technology’s Media Department. I would describe this film as a cyber-horror which sort of predicts a future where your personal identity would be tied to your online social profile.
Indeed, social media is no longer an esoteric environment. White, et. all (2011) says that the ease of use and intuitive interfaces of social media technologies make it convenient to use these technologies. It requires minimum or zero training for any person to begin using it, which thus discards the esoteric persona of social media. Very large social worlds have been created where it does not seem like there are barriers to communicate. The environmental sector has also embraced social media rapidly and wholeheartedly (Dosemagen, 2016). People now refer to their social media streams as primary sources and news and information.
“The Circle” is sub-titled by the phrase, “Knowing is good; knowing everything is better”. Certainly, this phrase would not work for me. The demarcation lines of my physical world and those of my digital world are marked vividly. I like to keep my private life private because it is after all private. I would not want for anyone to pry on my personal and private life as seen in the film. Even Ty from the film explains to Mae that when he built the Circle’s surveillance, he had not meant for it to be used in the manner that it was being used. He says, “I didn't create this. This isn't what I had in mind. Things at the Circle, they need to change. Everything's recorded, seen, broadcast, stored and analysed here. They can use it however they see fit, no matter what it costs.” Now, you wouldn’t want to have all your personal information fall onto the wrong hands.
The balance between a person’s social and professional persona needs to be clearly fortified by ethics. Ethics must never be flaunted. In an ambitious drive, we tend to compromise ourselves. The outcome of such is often devastating. Professionals within the digital space need to adhere to professional codes. The digital world implicitly reduces humanity to sinister technologies, and often find yourself overwhelmed and tend to be a conniver in a bid to make yourself digitally relevant. If as professionals, we are to stay true to who we really are and not oversell ourselves or compromise ethics, surely the web would be a different environment which would be believable.
1 note
·
View note
Link
Artists: G.B. Jones, Paul P.
Venue: Cooper Cole, Toronto
Exhibition Title: Temple of Friendship
Date: August 26 – October 3, 2020
Click here to view slideshow
Full gallery of images, press release and link available after the jump.
Images:
Images courtesy of Cooper Cole, Toronto
Press Release:
Cooper Cole is pleased to present Temple of Friendship, an exhibition of collaborative work by G.B. Jones and Paul P.
In their independent practices, both Jones and P. are well recognized as drafts-people who appropriate and reposition figurative images from queer history. Devoted to the act of archiving, as both a tool and a creative conceit, they have, over the past 18 years, assembled an oeuvre of collaborative cut-and-paste collages from their copious image banks. The exhibition is titled after Natalie Barney’s so-named Neoclassical folly situated in her Paris courtyard, in which she hosted a salon for the queer demimonde in the years before the First World War.
Jones and P. are interested in ungovernable sexualities and genders, and in the history of aesthetics forged by those who were compelled to communicate and represent themselves through innuendo and codes. While their collages dwell on the queer lineage of coded language in aesthetics and attitudes, they also posit the violent and retaliatory potential of these protagonists, utilizing images and references relating to riots in Toronto precipitated by police violence: in particular, those around the bathhouse raids in 1980, and during the G20 summit in 2010. Jones and P.’s mesh of uneasy images illustrate the immemorial (and still applicable) arc of their protagonists, whether anonymous and symbolic, infamous or famous. Out of the hostile climate of youth, their inchoate anger and longing drives them underground to places where pathos and wonder mix, after which they emerge self-aware and defiant; shocking, dazzling, confusing. Symbols of invention within a world of manipulation.
Temple of Friendship follows Born Yesterday, Jones and P.’s solo exhibition at Participant Inc., New York, in 2017.
G.B. Jones (b. 1965 Bowmanville, Ontario, Canada) has acquired international acclaim for her super-8 films, zines, and proto-Riot Grrrl band Fifth Column. Active since the early 1980s, her works are milestones in independent film, publishing, and art rock, respectively, and primary sources for what later became known as Queercore. Concurrently, Jones has always been a dedicated visual artist best known for all-female reprises of Tom of Finland’s drawings. By a simple twist, hers are images of liberation freed of the fascist tendencies at work in gay male culture. Her solo exhibitions include Cooper Cole, Toronto, 2018; Tom Of Finland, G.B. Jones, Daniel Buchholz, Cologne, 1993; Feature, New York, 1991. Her work has been included in numerous group exhibitions including: Art After Stonewall, Grey Art Gallery and Leslie-Lohman Museum, New York, 2019; Coming to Power: 25 Years of Sexually X-Plicit Art by Women, Maccarone, New York, 2016; This Will Have Been: Art, Love and Politics in the 1990s, Museum of Contemporary Art, 2012; Coming To Power: 25 Years Of Sexually X-plicit Art By Women, David Zwirner, New York, curated by Ellen Kantor, 1993. Jones lives and works in Toronto, Ontario, Canada.
Paul P. (b. 1977, Canada), who first came to attention in the early 2000s, has developed a wide- ranging practice centered on a series of drawings and paintings of young men appropriated from pre-AIDS gay erotica. His solo exhibitions include Morena di Luna/Maureen Paley, Hove, UK (2020); Queer Thoughts, New York, USA (2019); Lulu, Mexico City, Mexico (2019); Scrap Metal, Toronto, Canada (2015); and The Power Plant, Toronto, Canada (2007). His group exhibitions include Whitney Biennial, Whitney Museum of American Art, New York (2014); Les paris sont ouverts, Freud Museum, London (2011); and Compass in Hand, Museum of Modern Art, New York (2009). P.’s work is in the collections of the National Gallery of Canada, the Museum of Modern Art New York, the Los Angeles County Museum of Art, the Hammer Museum, the Brooklyn Museum, the San Francisco Museum of Modern Art, the Art Gallery of Ontario, and the Whitney Museum, among others.
Paul P. wishes to acknowledge the generous support of the Ontario Arts Council.
Link: G.B. Jones, Paul P. at Cooper Cole
The post G.B. Jones, Paul P. at Cooper Cole first appeared on Contemporary Art Daily.
from Contemporary Art Daily https://bit.ly/2R6Hkj3
1 note
·
View note
Text
Photograph courtesy of Yoox via WWD
Launching tomorrow, the collection features 10 pieces that can be worn by everyone.
By Maddison Glendinning
Date June 17, 2020
icon-facebook icon-twitter
This year marks the 20th anniversary of e-commerce platform Yoox, and to celebrate, British designer JW Anderson has designed an exclusive genderless capsule collection for the site.
The capsule is made up of 10 pieces, including ready-to-wear items, handbags and footwear. The designs were inspired by archival pieces and themes from the designer’s previous collections. Speaking to WWD about the gender-fluid collection, Anderson – who was worked with Yoox since 2011 – said, “I remember when Yoox first approached us about doing something for their 20th anniversary and I thought it would be interesting to do something that looked at things we have in the past at JW Anderson. We really looked at what we thought would make sense for the capsule and created some asymmetric pieces, a shirt dress and a skirt, and a patchwork trench coat. Patchwork is a recurring JW Anderson code and I think the colour palette feels very British in a way and Britishness is part of our DNA.”
A neutral striped hoodie is sure to catch the attention of loungewear lovers – or those who are planning their return-to-work wardrobes and want comfort to be key after months of working from home – whilst the silk shirting will work for any and every occasion. The slip-on backless loafer is an excellent piece of transition footwear, too.
The JW Anderson genderless capsule collection for Yoox launches on June 18.
icon-facebook icon-twitter
!function(f,b,e,v,n,t,s) {if(f.fbq)return;n=f.fbq=function(){n.callMethod? n.callMethod.apply(n,arguments):n.queue.push(arguments)}; if(!f._fbq)f._fbq=n;n.push=n;n.loaded=!0;n.version='2.0'; n.queue=[];t=b.createElement(e);t.async=!0; t.src=v;s=b.getElementsByTagName(e)[0]; s.parentNode.insertBefore(t,s)}(window,document,'script', 'https://connect.facebook.net/en_US/fbevents.js'); fbq('init', '1124567250995889'); fbq('track', 'PageView');
Source link
JW Anderson Designs Genderless Capsule Collection for Yoox Photograph courtesy of Yoox via WWDLaunching tomorrow, the collection features 10 pieces that can be worn by everyone.
0 notes
Text
Fragment aus den geheimnisvollen Manuskript. Reproduktion von Honey&Wax
To English Version.
Die Jagd auf seltene Bücher ist spannender als eine Schatzsuche. Bücher sind merkwürdig und launisch; sie erzählen ihre Geschichten auf eine raffinierte, weise und witzige Art, ganz anders als so ein weiterer glänzender Diamant.
Niemand weiß das besser als Heather O’Donnell, eine Buchhändlerin, Forscherin und – lassen Sie es mich so nennen: Buchjägerin. 2011 gründete sie Honey & Wax Booksellers in Brooklyn. Und einige Jahre später eröffnete sie zusammen mit Rebecca Romney einen Honey & Wax Book Collecting Prize, um vor allem junge Frauen für das Entdecken seltener Bücher zu begeistern und zu motivieren
Wir ermutigen aufstrebende Sammler, den Büchern, die sie faszinieren, Aufmerksamkeit zu schenken, auch wenn sie noch nicht sicher sind, warum. Was sehen Sie, was andere nicht sehen? Wenn Sie eine Theorie über die Geschichten haben, die Ihre Sammlung erzählen könnte, und die Neugierde, herauszufinden, ob Sie Recht haben, sind Sie ein echter Sammler im Werden. (Quelle)
Seltsames Manuskript.
Gefundene Manuskripte von unbekannten Autoren haben immer eine Enigma inne. Weder wissen wir, wer der Autor war; noch, was den Autor motiviert hat. In bestimmten Fällen ist es gar schwer zu erklären, worum es in dem Manuskript eigentlich geht.
Die Geschichte ist voller solcher Entdeckungen – wie das Voynich-Manuskript, das Œuvre von Charles A.A. Dellschau, der Codex Seraphinianus. Nun, der letztere ist von einem italienischen zeitgenössischen Künstler, Luigi Serafini, gemacht worden.
Voynich Manuscript (Source: beinecke.library.yale.edu) // Charles Dellschau Collages (Stephan Romano Gallery) // Codex Seraphinianus
Über Dellschau als Autor wissen wir (auch nach den umfangreichen Recherchen) fast nichts. Noch weniger wissen wir über das Voynich-Manuskript, das zur Sammlung der Beinecke Rare Book & Manuscript Library der Yale University gehört, wo übrigens Heather O’Donnell als kuratorische Assistentin arbeitete.
Vor einiger Zeit stieß sie auf ein geheimnisvolles Manuskript. Es bestand aus 106 losen Blättern, die fast 7000 kleine Farbabbildungen eines unbekannten Künstlers enthielten und mit den Jahren 1940-1946 datiert waren. Sie kaufte dieses Manuskript von einem deutschen Buchhändler, der es in Zürich erworben hatte.
Gegenwärtig trägt das Manuskript den Codenamen “Europa Redux“.
https://twitter.com/honeyandwaxbks/status/1232796112324612096
Auf der Suche nach Hilfe, um die Botschaften zu entziffern und den Autor zu identifizieren, eröffnete sie ein Instagram-Konto:
https://www.instagram.com/europaredux/
Versteckte Botschaften? Psychiatrie? Mysterien?
Trotz einer beträchtlichen Anzahl von Zeichnungen wird kein Motiv wiederholt. Aber wir können einige Kategorien beobachten:
View this post on Instagram
Thanks to everyone who’s been writing! Some suggestions on the language: a Romansch dialect, Schwyzerdütsch, or an auxslang like Volapük or Esperanto. Or some kind of anagram play. Linguists: operators are standing by.
A post shared by @ europaredux on Feb 26, 2020 at 6:43pm PST
Menschen, die etwas tun
Straßenansichten
Industrielle Motive
Landschaften
Abstrakte Kunst
Es gibt viele bühnenähnliche Dekorationen:
View this post on Instagram
A puzzle?
A post shared by @ europaredux on Feb 26, 2020 at 1:36pm PST
Aber die wohl rätselhaftesten Teile sind all diese “Unterschriften” (falls das überhaupt solche sind): in einer unbekannten Sprache, die manchmal an Schwiizerdütsch, manchmal an Esperanto und andere reale und fiktive Sprachen erinnert.
Courtesy Honey&Wax Books
LEBSEAN, OHI AHI, KAMPH eh, O’ruh – sie klingen wie verzerrte Begriffe oder dadaistisch zerstückelte Wörter. KAMPH eh wie Kämpfer, Ruh in O’ruh?
Im Gegenteil, man emtdeckt auch vorhandene – oder angeblich verständliche – Wörter:
Courtesy Honey&Wax Books
KOMPTOIR ist ein Schweizer Begriff für “Zähltisch”. AKTI ist ein leicht verzerrtes Wort “AKTE” (oder “AKTENTASCHE”), das “Aktentasche” bedeutet. GRAND MACAZINE sieht aus wie GRAND MAGAZINE – ist es ein Zeitungsverlagsgebäude? Tages-Anzeiger?
In den Instagramm-Kommentaren zum teilen Besucher ihre Ideen und Hypothesen über Sprache und Bedeutung.
Courtesy Honey&Wax Books
Piliz bedeutet auf Deutsch Pilz / Signo könnte ein Zeichen bedeuten / in Torri kann man das deutsche Wort Tor (Tor) erkennen, wie Stefan Mesch bemerkt.
Courtesy Honey&Wax Books
Ringbahnpoesie teilt auch einige Ideen dazu:
“Steno rhi” klingt wie “Stein am Rhein“, ein kleines historisches Städtchen im Nordosten der Schweiz, und die Architektur sieht tatsächlich so aus wie die hier abgebildeten Häuser. “Nibeli” ist ein altes schweizerdeutsches Wort für ein mürrisches Gesicht, wie es gezeichnet wird.
Wenn wir das STENO RHI mit Ansichten der Stadt “Stein am Rhein” vergleichen, gibt es in der Tat viele architektonische Ähnlichkeiten:
https://twitter.com/MySwitzerland_d/status/1110421143155077127 Auch könnten wir KLENO TRIP als “Kleiner Ausflug“, einen “kurzen, spontanen Spaziergang“, verstehen.
Korneli – Maiswand? (nicht British Cornwall, sondern nur Wall of Corn):
“”Wales” leitet sich ab von dem proto-germanischen Wort Walhaz, das “romanisierter Ausländer” bedeutet; über Old English welisċ, wælisċ, wilisċ, was “Romano-British” bedeutet; bis hin zum modernen englischen Walisisch. Dieselbe Etymologie gilt für Cornwall und für Wallonien in Belgien.” (Wikipedia)
Und wir haben auch Wallis in einem anderen Bild:
View this post on Instagram
I know not everyone in Switzerland is in a sanitarium . . . but maybe this is some kind of therapeutic exercise?
A post shared by @ europaredux on Feb 26, 2020 at 1:45pm PST
Ist es Rätoromanisch? Oder Französisch? Wisst Ihr noch, in Faust I:
Das Püppchen geknetet und zugericht’t, Wie’s lehret manche welsche Geschicht‘.
Wo “welsche Geschicht” auf die frivolen Französischen Romane zurückzuführen sei.
Manchmal scheint die alternative Realität mit unserer zu verschmelzen, wenn wir dies sehen:
View this post on Instagram
A name I know, an image I don’t.
A post shared by @ europaredux on Mar 1, 2020 at 10:53am PST
Auch bei aller Kenntnis des weltberühmten Namens kann ich das Motiv immer noch nicht nachvollziehen.
Einige Bilder mit abstrakten, aber präzisen Formen und frischen Farben ähneln russischen Konstruktivisten und Suprematisten wie Kasimir Malevič oder auch Dadaisten und Kubisten wie Tristan Tzara und Fernand Léger:
V.l.n.r.: Europa Redux (Honey&Wax Books) // Rechts: “Suprematismus” von Kasimir Malevič, 1915 // Tzara&Leger, La Face Interíeure, 1953
Heather O’Donnell vermutet, es könnte eine “Art und Weise sein, eine Besessenheit zu verarbeiten”, Kunst als Therapie.
Ich habe diese Bilder mit einer KI-generierten Kunst verglichen (die auf einer riesigen Kunstbilddatenbank trainiert und während kontinuierlicher Iterationen erstellt wurde). Hier ist ein Beispiel, das ich kürzlich mit Hilfe von StyleGAN2 erreicht habe:
View this post on Instagram
AI generated art. #StyleGAN2
A post shared by Merzmensch (@merzmensch_kosmopol) on Feb 27, 2020 at 2:17pm PST
In den Kommentaren schrieb Heather O’Donnell eine interessante Beobachtung:
Es gibt ein Gefühl, als ob das Europa-Manuskript durch einen Algorithmus erzeugt zu werden scheint, die Ideen immer wieder durcharbeitet, ohne sie jemals exakt zu duplizieren. Der Händler, von dem ich es gekauft habe, glaubte, dass es das Werk eines Geisteskranken mit einer Form von der Zwangsstörung sei.
Was ist nun Europa Redux?
Wir können nur raten, ob es sich um eine echte Sprache oder um einen Code handelt. Vergessen Sie nicht – das Manuskript wurde angeblich während des Zweiten Weltkriegs in der Schweiz erstellt. In jenen dunklen Tagen wurde die Schweiz wieder ein Exilziel für Flüchtlinge (wie während des Ersten Weltkriegs), aber die friedliche Atmosphäre war mit verschiedenen pro-nazistischen Bewegungen in der Schweiz trügerisch.
Haben Sie eine Vermutung, worum es hier geht?
Verfolgen Sie die Geschichte von Europa Redux auf Instagram.
Ich bin genauso fasziniert (und ratlos) wie Sie.
Europa Redux. Fall: Ungelöst. To English Version. Die Jagd auf seltene Bücher ist spannender als eine Schatzsuche. Bücher sind merkwürdig und launisch; sie erzählen ihre Geschichten auf eine raffinierte, weise und witzige Art, ganz anders als so ein weiterer glänzender Diamant.
0 notes
Text
Sonos Makes It Clear: You No Longer Own The Things You Buy
$300 smart hubs that are suddenly bricked when the manufacturer is sold. Video game consoles that mysteriously lose features after you bring them home. Books or films you purchase that you suddenly and inexplicably lose the ability to access. Printers that don't print without an ink subscription.
In the modern internet era, it’s increasingly clear that consumers no longer actually own the things we buy. Instead, we’re shelling out big bucks for products that can easily lose features or worse—stop working entirely on the whim of a corporation.
The latest example comes courtesy of Sonos, which this week informed customers in an email that it would no longer be supporting certain speaker systems. In the email, the company says that certain “legacy” systems will stop receiving security and software updates starting in May.
“Legacy products were introduced between 2005 and 2011 and, given the age of the technology, do not have enough memory or processing power to sustain future innovation,” the company’s email claims. Users that have shelled out hundreds or thousands of dollars for smart speakers that still work didn’t take the news particularly well.
In a blog post, Sonos says owners of these legacy systems have two options: they can simply keep using the products, understanding they won’t receive new features, bug fixes, or software and security updates. Or users can trade in the older gear while nabbing a 30 percent discount on the purchase of a new Sonos system.
The first option potentially opens customers up to security headaches in an era where internet of things devices are routinely hacked. Sonos’ second option, its trade-in program launched last October, came under fire just last month for being wasteful.
Users who trade in older Sonos systems immediately get a 30 percent discount—but their older hardware immediately enters a 21 day countdown before being put in “recycle mode.” Products in recycle mode can’t be re-used or repurposed without Sonos’ permission—a wasteful outcome for a program Sonos claims was designed to minimize environmental impact.
Nathan Proctor, the head of USPIRG's Right to Repair Campaign, told Motherboard that Sonos’ decision to leave consumers between a rock and a hard place is emblematic of a tech industry in which sustainability, security, and consumer rights are often distant afterthoughts.
“This is an epidemic problem,” Proctor said, noting that having millions of unsupported and unpatched devices connected to the internet poses significant security risks for an internet of things sector already widely criticized for being a privacy and security dumpster fire.
Proctor said forced obsolescence also not only incentives the public to discard perfectly good hardware, products now effectively have expiration dates that consumers aren’t being clearly informed of at the time of purchase.
“There needs to be some transparency around obsolescence,” Proctor said. “There should be some imagination put into what these devices can be used for when they can’t be connected all the time to the internet. I think that there's some responsibility for manufacturers to have a plan—and not just zombie devices.”
Some companies, like Samsung, have toyed with efforts to root and repurpose older smartphones. Others, like defunct fitness tracking company Pebble, released their source code to the public, helping create a community of users who gave the hardware a second wind.
But by and large, most companies are far more interested in hyping and selling the next round of products than spending money to make sure older customers remain happy.
“This is something that these companies are just neglecting,” Proctor said. “Sonos is like the opening salvo. There will probably be a wave of these things that happen over the next couple years. And eventually, people are going to start being really upset about it.”
Security experts like Bruce Schneier have long argued that the internet of things is a broken market that creates both visible and “invisible pollution”—such as when your dated IOT camera is hacked and incorporated into a distributed denial of service attack. Ultimately, Schneier has warned, an attack will be severe enough to wake the broader public up to the threat.
Until then, a scattered coalition is trying to build a framework that respects sustainability, security, and consumer privacy. Consumer Reports, for example, has been working on an open source standard that would incorporate security and privacy concerns into all product reviews, letting consumers avoid bad actors before attaching new devices to the internet.
But by and large, most companies and governments remain apathetic to the threat.
“This is a chance now to come up with a system that doesn’t cause massive planetary damage in exchange for disposable stuff,” Proctor said.
Sonos Makes It Clear: You No Longer Own The Things You Buy syndicated from https://triviaqaweb.wordpress.com/feed/
0 notes
Text
This slideshow requires JavaScript.
Dated: 17.10.2019
How to avail Concessional Customs Duty Certificate for Solar Projects in India
In reference to this Ministry’s OM No. 30/20/2011-12/NSM dated 26th November, 2015 regarding procedure for routing the Bill of Material by the Solar Power Developers (SPDs) for approving Bill of Material and issue of Concessional Customs Duty Certificate (CCDCs) and Excise Duty Exemption Certificates (EDECs) for availing duty concession/exemption on the procurement of items/material/components required for initial setting up of solar power generation projects or facility.
The new procedure for submission of total Bill of Material for issuing Concessional Customs Duty Certificate (CCDCs) & Excise Duty Exemption Certificates (EDECs) and recommendation of State Nodal Agencies after verification of installation of the projects is under:
The Solar Project Developers shall prepare the total Bill of Material (BoM) in the Ministry portal in four blocks namely Solar Block, Power Block, Power Evacuation Block and Measuring Instruments Block and submit along with supporting documents, self – certification and Affidavits etc., (as per checklist)
Developer shall get the total Bill of Material (BoM) scrutinized by chartered Engineer
Developer shall submit the application of total Bill of Material (BoM) directly to Ministry of New and Renewable Energy
The application shall be scrutinized in the Ministry with help of standardized Bill of Material for Solar Photovoltaic Projects and on case to case basis for Solar Thermal projects
The BoM application shall be approved by the Ministry if the requirement of material is less than or equal to material requirement for Standard BoM
The Developer shall generate certificates and submit to MNRE along with supporting documents for issuing certificates
After the Project is completed Developer shall submit the reconciliation report to Chartered Engineers for verification of material consumed with two months
Developer shall submit the Reconciliation Report to concerned State Nodal Agencies or to some experts or any Agencies authorized by MNRE who shall submit recommendation to MNRE after physical verification of the project if the project is more than 1.0 MW capacity, for smaller project paper verification is enough
The Developer/ EPC contractor will not be given approval of Bill of Material (BoM) and any certificate for existing or any other future project if these organizations failed to submit the Reconciliation Report within two months of date of commissioning
Process of applying, approving of Bill of Material (BOM) & issuing of certificates & submission of reconciliation reports for issuing CCDC for initial setup of Solar Energy Projects
Developer access web portal 164.100.194
Developer enters initial information and applies for incentives
Developer Receives Username and password from system on registered email
Developer logs in the system and fills in details of the projects
Developer enters Bill of Material and finalises
Developer enter details of project and finalises
Developer takes the physical copies of BOM and relevant papers such as for Charter Engineer for certification
Developer uploads singed copy of BOM & other papers such as Drawings, Clearances obtained, PPAs etc
Developer uploads the signed copy of BOM along with statutory clearances
Submits the application
The application is examined in the Ministry
MNRE sends email to Developer regarding Deficiencies
Developer uploads the required Documents
The BOM is approved
Developer prepares certificate as per the consignment uploads relevant P.O.s High sea sale agreements etc and sends to MNRE for verification
The certificate details in proposed certificates and details on the vouchers are verified and send back to Developer as verified
Developer prints out certificates and signs physical copy
Developer brings copy to MNRE for signature
Certificates is physically signed and is issued
Developer collects signed certificate from MNRE
Developer uploads signed copy in the system
Developer produces certificate to Customs office for calculation of duty
Customs officer verifies certificates by with entering verification code in portal
Developer takes certificates as per requirement subjected to maximum quantity approved in BOM
Developer commissions the project
Developer prepares reconciliation report from the portal
Developer gets Reconciliation report verified by Chartered Engineer
Developer takes Chartered Engineer to site for inspection for project of 1.0 MW capacity and above
Developer uploads reconciliation report in portal and submits hard copy in MNRE
Submission of Reconciliation report is entered in the system by MNRE
Regarding any query in respect of creation of user id or any other query related to Custom/Excise duty exemption certificate, user may send a mail to us at [email protected]
Download the Important Scheme related Documents Here
MNRE Guidelines-ccms
Office OM 16thSept-MNRE CCDC
For facilitation in obtaining necessary clearances for Solar Projects please contact undersigned
Courtesy:
M/s S.J. EXIM Services- Q-Freight Team Contact Person: Ravi Shekhar Jha
Mob: +91-9999005379
Web: www.sjeximtech.com / www.q-freight.com
Email: [email protected] / [email protected]
Disclaimer: Please refer to official sources before effecting a decision
Availing Concessional Customs Duty Certificate for Solar Projects in India Dated: 17.10.2019 How to avail Concessional Customs Duty Certificate for Solar Projects in India In reference to this Ministry’s OM No.
0 notes
Link
Daniel Levine Contributor While the software revolution started out slowly, over the past few years it’s exploded and the fastest-growing segment to-date has been the shift towards software as a service or SaaS. SaaS has dramatically lowered the intrinsic total cost of ownership for adopting software, solved scaling challenges and taken away the burden of issues with local hardware. In short, it has allowed a business to focus primarily on just that — its business — while simultaneously reducing the burden of IT operations. Today, SaaS adoption is increasingly ubiquitous. According to IDG’s 2018 Cloud Computing Survey, 73% of organizations have at least one application or a portion of their computing infrastructure already in the cloud. While this software explosion has created a whole range of downstream impacts, it has also caused software developers to become more and more valuable. The increasing value of developers has meant that, like traditional SaaS buyers before them, they also better intuit the value of their time and increasingly prefer businesses that can help alleviate the hassles of procurement, integration, management, and operations. Developer needs to address those hassles are specialized. They are looking to deeply integrate products into their own applications and to do so, they need access to an Application Programming Interface, or API. Best practices for API onboarding include technical documentation, examples, and sandbox environments to test. APIs tend to also offer metered billing upfront. For these and other reasons, APIs are a distinct subset of SaaS. For fast-moving developers building on a global-scale, APIs are no longer a stop-gap to the future—they’re a critical part of their strategy. Why would you dedicate precious resources to recreating something in-house that’s done better elsewhere when you can instead focus your efforts on creating a differentiated product? Thanks to this mindset shift, APIs are on track to create another SaaS-sized impact across all industries and at a much faster pace. By exposing often complex services as simplified code, API-first products are far more extensible, easier for customers to integrate into, and have the ability to foster a greater community around potential use cases. Graphics courtesy of Accel Billion-dollar businesses building APIs Whether you realize it or not, chances are that your favorite consumer and enterprise apps—Uber, Airbnb, PayPal, and countless more—have a number of third-party APIs and developer services running in the background. Just like most modern enterprises have invested in SaaS technologies for all the above reasons, many of today’s multi-billion dollar companies have built their businesses on the backs of these scalable developer services that let them abstract everything from SMS and email to payments, location-based data, search and more. Simultaneously, the entrepreneurs behind these API-first companies like Twilio, Segment, Scale and many others are building sustainable, independent—and big—businesses. Valued today at over $22 billion, Stripe is the biggest independent API-first company. Stripe took off because of its initial laser-focus on the developer experience setting up and taking payments. It was even initially known as /dev/payments! Stripe spent extra time building the right, idiomatic SDKs for each language platform and beautiful documentation. But it wasn’t just those things, they rebuilt an entire business process around being API-first. Companies using Stripe didn’t need to fill out a PDF and set up a separate merchant account before getting started. Once sign-up was complete, users could immediately test the API with a sandbox and integrate it directly into their application. Even pricing was different. Stripe chose to simplify pricing dramatically by starting with a single, simple price for all cards and not breaking out cards by type even though the costs for AmEx cards versus Visa can differ. Stripe also did away with a monthly minimum fee that competitors had. Many competitors used the monthly minimum to offset the high cost of support for new customers who weren’t necessarily processing payments yet. Stripe flipped that on its head. Developers integrate Stripe earlier than they integrated payments before, and while it costs Stripe a lot in setup and support costs, it pays off in brand and loyalty. Checkr is another excellent example of an API-first company vastly simplifying a massive yet slow-moving industry. Very little had changed over the last few decades in how businesses ran background checks on their employees and contractors, involving manual paperwork and the help of 3rd party services that spent days verifying an individual. Checkr’s API gives companies immediate access to a variety of disparate verification sources and allows these companies to plug Checkr into their existing on-boarding and HR workflows. It’s used today by more than 10,000 businesses including Uber, Instacart, Zenefits and more. Like Checkr and Stripe, Plaid provides a similar value prop to applications in need of banking data and connections, abstracting away banking relationships and complexities brought upon by a lack of tech in a category dominated by hundred-year-old banks. Plaid has shown an incredible ramp these past three years, from closing a $12 million Series A in 2015 to reaching a valuation over $2.5 billion this year. Today the company is fueling an entire generation of financial applications, all on the back of their well-built API. Graphics courtesy of Accel Then and now Accel’s first API investment was in Braintree, a mobile and web payment systems for e-commerce companies, in 2011. Braintree eventually sold to, and became an integral part of, PayPal as it spun out from eBay and grew to be worth more than $100 billion. Unsurprisingly, it was shortly thereafter that our team decided to it was time to go big on the category. By the end of 2014 we had led the Series As in Segment and Checkr and followed those investments with our first APX conference in 2015. Plaid, Segment, Auth0, and Checkr had only raised Seed or Series A financings! And we are even more excited and bullish on the space. To convey just how much API-first businesses have grown in such a short period of time, we thought it would be useful perspective to share some metrics over the past five years, which we’ve broken out in the two visuals included above in this article. While SaaS may have pioneered the idea that the best way to do business isn’t to actually build everything in-house, today we’re seeing APIs amplify this theme. At Accel, we firmly believe that APIs are the next big SaaS wave — having as much if not more impact as its predecessor thanks to developers at today’s fastest-growing startups and their preference for API-first products. We’ve actively continued to invest in the space (in companies like, Scale, mentioned above). And much like how a robust ecosystem developed around SaaS, we believe that one will continue to develop around APIs. Given the amount of progress that has happened in just a few short years, Accel is hosting our second APX conference to once again bring together this remarkable community and continue to facilitate discussion and innovation. Graphics courtesy of Accel
0 notes
Link
China’s Center for Information and Industry Development has released its latest rankings of 35 crypto projects that were evaluated over the past two months. While several top positions remain unchanged, Bitcoin has climbed up the overall ranking.
Also read: Indian Supreme Court Postpones Crypto Case at Government’s Request
New Rankings From China
The Center for Information and Industry Development (CCID), under China’s Ministry of Industry and Information Technology, released the 12th update of its crypto project rankings Thursday. The number of projects evaluated was unchanged from the previous rankings published in March. The center also announced that starting this month the rankings will be adjusted every two months instead of monthly.
In addition to the overall ranking, the CCID published three others based on basic technology, applicability, and creativity sub-categories. EOS tops the list overall, followed by Tron, and Ethereum. The center started ranking Tron in February, debuting at number two overall and has remained at that position ever since. BTC now ranks 12th, up three places from the 15th place in the previous ranking. BCH has also improved, currently occupying the 29th spot overall, up from the 31st place previously.
“The results show that the world’s three major Dapp platforms — EOS, Tron, and Ethereum — remain ranked in the top three, [and] the scores are 148.5, 144.1 and 136.6,” the CCID wrote.
The center describes itself as “a first-class scientific research institution directly under the administration of the Ministry of Industry and Information Technology of China.” The first crypto ranking was released in May last year. The assessment is carried out by the CCID (Qingdao) blockchain research institute, an entity established by the CCID, in collaboration with multiple organizations such as the CCID think tank and the China Software Evaluation Center. “The result of this assessment will allow the CCID group to provide better technical consulting services for government agencies, business enterprises, research institutes, and technology developers,” the center previously explained.
Sub-Rankings
The overall ranking is based on the total index scores of 35 crypto projects. The total index of each crypto project is the weighted average of its three sub-indices: the basic technology index, the applicability index, and the creativity index. The basic technology sub-index accounts for 64% of the total index, while the applicability sub-index accounts for 20% and the creativity index 16%.
“The basic technology sub-index mainly assesses the level of technical realization of the public chain,” the center described, adding that the key areas evaluated under this category “include the function, performance, safety and decentralization of the public chain.” The top five crypto projects in this category are EOS, Tron, Steem, Bitshares, and Gxchain.
The creativity sub-index “focuses on continuous innovation in the public chain, including developer size, code updates, and code impact,” the center detailed. In this category, the top five crypto projects are Bitcoin, Ethereum, Lisk, EOS and Tron.
The applicability sub-index “mainly evaluates the comprehensive level of public chain support for practical applications,” the center continued. “The assessment includes four aspects: node deployment, wallet application, development support and application implementation.” For this category, the top five crypto projects are Ethereum, Neo, Nebulas, Tron, and Ontology, which are unchanged from the previous ranking for this sub-category. “However, the data shows that the applicability indices of only 11 of the 35 public chains have increased, and the overall index has declined compared to the previous period,” the CCID noted.
What do you think of these rankings? Let us know in the comments section below.
Images courtesy of Shutterstock and the CCID.
Are you feeling lucky? Visit our official Bitcoin casino where you can play BCH slots, BCH poker, and many more BCH games. Every game has a progressive Bitcoin Cash jackpot to be won!
Tags in this story
Bitcoin, Blockchain, BTC, CCID, China, crypto, Cryptocurrencies, Cryptocurrency, Digital Currency, Ethereum, projects, Rankings, tron, Virtual Currency
Kevin Helms
A student of Austrian Economics, Kevin found Bitcoin in 2011 and has been an evangelist ever since. His interests lie in Bitcoin security, open-source systems, network effects and the intersection between economics and cryptography.
(function(d, s, id) { var js, fjs = d.getElementsByTagName(s)[0]; if (d.getElementById(id)) return; js = d.createElement(s); js.id = id; js.src = 'https://connect.facebook.net/en_US/sdk.js#xfbml=1&version=v3.2'; fjs.parentNode.insertBefore(js, fjs); }(document, 'script', 'facebook-jssdk'));
0 notes