Modern script of romeo and juliet

Still Star-Crossed

2015.10.25 10:48 Tentinator Still Star-Crossed

A drama about the 16th-century intrigue, treachery and romances of the Montagues and Capulets following the tragic end of young lovers Romeo and Juliet.
[link]


2010.02.09 03:34 josefjohann Philosophy of Language

[link]


2011.08.17 13:55 Bringing the web out of 2007 since 2013.

/frontend is a subreddit for front end web developers who want to move the web forward or want to learn how. If you're looking to find or share the latest and greatest tips, links, thoughts, and discussions on the world of front web development, this is the place to do it.
[link]


2024.06.01 14:02 guiltyofnothing “DEI is the new fascism” “Just so you know, I read most of post modernism general theories.” /r/silenthill reacts to a redesigned female character model in the Silent Hill 2 remake

The Context:

Silent Hill 2 is a 2001 psychological horror video game from Konami. A trailer was recently revealed for a remake of the game, with updated graphics and gameplay.
Angela Orosco is a character in Silent Hill 2. She is 19 years old, suicidal, and implied to be the victim of sexual assault by her father.
With the release of the trailer for the remake, some have noted changes to character designs and models — specially Angela’s.
Our drama begins when a user posts a screenshot of a reply to a tweet. The original tweet includes Angela’s redesigned model and a “non-woke” edited version. The reply tweet points out that the character is a 19 year-old sexual abuse victim.
Our drama spans over two threads as the new trailer and changes have sparked debate in the sub.

The Drama, Pt. 1

One user objects that the character isn’t real:
She's not real
so ?
So that's not a picture of a 19 year old abuse victim. The outrage isn't based on reality
it IS the picture of a 19 year old abuse victim FROM silent hill, just because she isn’t real doesn’t mean she doesn’t signify or carry a message from the real world
Silent Hill isn't real. The events in Silent Hill 2 never happened
[Continued:]
u really are close minded.. sexual abuse and people dying from diseases, depression, etc does happen irl
I never said that doesn't happen in real life. I said angela sn't real, silent Hill isn't real, and all the events that take place in silent hill 2 are a work of fiction, it's made up, it never happened.
Sure, but that's no reason to justify people reacting like they are. One cannot argue 'None of it's real' while also arguing 'these characters are important to me' or 'I want to invest in this series/game' because the point of the game is for you to immerse and invest in it. You're meant to care about the characters intrinsically, and not about 'what they do for you'. It's absolutely fine to be upset if some 15 year old idiot 'consoomer' whose first thought when he becomes upset about how a female in the game looks responds with "You want my money~! I am your demographic!" makes such an ignorant, room-temperature IQ take like this, and it's fine to let them know why.
I didn't say these characters are important to me. Real people who exist are important to me. People who get emotional about other people having opinions on made up characters must have some deeper issues. This is a subreddit for discussing a video game series, it's not Doctor Phil.
You don't seem to understand the concept of context very well
[Continued:]
The context is that you and some others don't like anything I've said because it hurt your feelings. I understand the context that you are implying, but I want you to find a way to say it before I go on
[…]
It's story telling, dude.
I say this with relief, but most people have not expirienced sexual abuse. Obviously, this is a good thing. However, it's pretty clear these days that empathy for people who have isn't wide-spread. The point of storytelling is broadening horizons, through different perspectives. It should not just be about catering to the audience.
Storytelling is that means of spreading empathy. There is value to the experience it has to share, and regardless of if Angela is real, the experiences she's there to portray are not without inspiration sourced in reality. If your argument is "She's not real. It's not real. Why care?" then you don't get the point of the whole of storytelling. Not just games, like, all of storytelling.
I just want to draw you attention to the OP's post, the original commenter in the image said nothing about SA, it's not mentioned instead the OP brings it up as a shield to prevent any criticism of the characters redesign. That's manipulation, and only an idiot wouldn't see it.
But what about word choice?
Calling someone a “fucking worm” is just as childish as the post they’re criticizing
if someone doesn't want to be called a worm they shouldn't act like a worm. even the engagement bait excuse doesn't work, it's gross behavior.
I would never call someone a disgusting worm but that’s just me 👌
lol ok snowflake
Boo hoo
it's very noble of you to come to the defense of some insane misogynist on twitter
No calling someone a worm is objectively hilarious tbh
”Vulnerable beauty”:
She was still the poster girl for the original SH2. Yes she was a sexual abuse victim but there was a certain vulnerable beauty to her that Team Silent/Konami wanted to convey in that iconic knife closeup shot as well as using her face for the actual cover art of the game.
"abuse victim"
"certain vulnerable beauty"
You actually wrote those two things together mate. Get therapy.
a lot of people who apparently have played and think they like silent hill 2 completely lack the maturity to handle any of the themes of the game apparently. angela's attractiveness should not be part of the discourse around her character at all.
A base level of attractiveness is relevant for almost all characters except Eddie. Thats the uncomfortable truth of human nature.
Attractiveness enhances a character’s charm. It enhances melancholic and profound musical performances, it enhances melancholic and profound movies. See Mazzy Star. See 500 Days of Summer. It wouldn’t have been the same if those musical artists and actors had unappealing annoying faces.
just because you are too shallow to empathize with people you don’t find attractive doesn’t mean everyone’s brain is broken in the same way man.
[Continued:]
This isn’t about me. This is about human nature. Look at the top YouTube comments on a Mazzy Star performance. They are praising her visual beauty. And we all know it feeds into the tenderness of the song. Nobody goes “Wtf is wrong with you- her face has nothing to do with the artistic value of the song!!!” You might call it shallow but it’s nothing to be faulted for. We are human.
Angela’s story is melancholic and profound. But Konami wouldn’t have made her the cover art had she been morbidly obese with a pudgy unappealing face. Nor would we SH2 fans hang the game poster of her on our walls if she was morbidly obese with a pudgy unappealing face. That knife pose shot wouldn’t have been nearly as iconic.
Saying all this stuff is very not PC. But there’s a difference between being bothered by the truth and refusing to accept it as the truth.
[…]
You misunderstand the term “vulnerable beauty”. You’re thinking about it negatively in terms of being taken advantage of. It’s not that. Im talking about tenderness and sorrow that is enhanced by natural beauty- and vice versa.
Go on YouTube and look at all the musical performances of songs about melancholy/ vulnerability/tenderness played by legendary artists. Like “fade into you” by Mazzy Star. The top YouTube comments are full of praises on her natural beauty. We know that aesthetic beauty enhances the artistry and vice versa.
Human nature tends to gravitate toward certain types of faces. It wouldn’t be the same if she had a derpy face. There is a reason why Konami decided to use Angela’s face as the cover art for the original SH2 game. Because her vulnerable beauty is a key component of her character. And her character is a key component of the game.
Even for James. The artistic value would be diminished if James had an ugly douchey and generally unlikeable face.

The Drama, Pt. 2

In a second thread, it is confirmed that this is the character’s final design.
DEI is blamed:
i vision apparently given by a DEI consultancy group named Hit Detection.
Holy shit you people treat DEI like it’s the fucking boogeyman. You realize that most games hire DEI consultancy, and they’re not some evil org pulling the strings changing the game, they almost always just check the game to ensure there isn’t any content that will unintentionally offend people?
It’s not some crazy scheme, it’s literally just checking that the writing has the intended response. It’s proofreading.
Because it is. Go actually read the ideology they are based of. DEI is the new fascism
Jesus, you have no idea what fascism means.
Just use pornhub man, this isn't something to go to war for lmao
You know, I was gonna debate you and use logic and sense, but the moment you threw out “facism” because it’s the buzzword of the day, I knew I’d be trying to debate someone with the IQ of a single cell amoeba
Insult to the single-cell amoebas tbh
Sure. Insult the person and not the argument.
Just so you know, I read most of post modernism general theories. It is amazing how it resembles fascism but just much better worded.
So, if you feel so insulted maybe go actually read the texts about DEI,instead of going hating on people.
[Continued:]
They insulted your argument too though. It's just the same basic rhetoric that everyone who thinks this way speaks. It's like you all subscribe to the same newsletter and read the weekly approved script. It's tiring and a waste of everyone's time, including yours.
Dudes never had an original thought in his life, if he didn't just parrot what the other incels say he wouldn't speak at all and the world would be all the better for it.
[…]
Or you could stop being incel
You didn't make an argumeny. You basically said "DEI is fascist go look it up". I looked it up ages ago when all these gamer dudes started scaremongering and it was the biggest non-issue I've ever seen. Like the whole SBI thing that got debunked fucking instantly. Outrage youtubers just found their new target to farm clicks, that's all.
User from kotakuinaction probably gonna link Jordan Petterson video if you ask for links
[…]
Just say the n word, man. We all know what you mean
Yup. People can stick their heads in the dirt and pretend these firms don't affect character designs but it is what it is.
Oh boy. Fuck DEI. Those people came to ruin games. The same way they ruined the other media.
There are allegations of gaslighting:
I cant with so many people gaslighting themselves into liking this design, OR the horrendous voice acting. So many of you guys are in pure copium mode right now, Just like with the trainwreck that is SH short message. This game looks worse and worse every time they show more of it, and everyone sticking up for the hideous character design and pretending the game looks good only because some of you compare it to the miniscule ps2 era gameplay of the OG isn't going to change how crap this remake's vision is. As someone who encourages people to take risks when it comes to remakes and reboots, I will be open minded. But it’s not looking good.
This sub is deleting any comments or posts that even slightly suggest there is something weird with how she looks. Her face does not look like a normal 19 year old girls and if you think it does your on some of that high dose copium.
People on the sub won't take any form of criticism, they'll just downvote you to doom. Her face is rather uncanny imo. I feel like they could've done it better
I don't mind being down voted. I've expressed my opinion and anyone who disagrees is welcome to express theres. What I do find amusing is the "you're just an incel" cope. These are supposed to be people against sexualization but make fun of other people's sex lives. But this is Reddit, so I'm not expecting anything better.
Comparisons are made:
I agree. If they feel inspired by Quagmire from Family Guy, then they should stick to their vision.
Bait used to be believable
I swear Silent Hill “fans” have to be the most obnoxious, I kinda see why we got nothing for such a long time.
Make Genshin fans look almost sane.
Denial used to be believable. Hit Detection worked on this game and that explains a lot.
”Hideous”:
She looks hideous. Can't believe this is what Blooper is doing.
Trust me brother you absolutely look worse than her
Yet you don't know what he or she looks like.
Stand on business and post yourself then lil bro
Sad to see people lack the critical thinking to critique this game. Blooper gave this woman a man jaw and it looks downright ugly. How does a character model from 2001 look better than one from 2024? Goes to show how much team silent cared about their game while blooper is just trying to make a quick buck.

The Flairs:

submitted by guiltyofnothing to SubredditDrama [link] [comments]


2024.06.01 13:15 Energyc99 How to set non-unique NPC's weight?

I'm working on a mod that can change the weight of any NPC, but all the methods I've found only modify unique NPCs, and those non-unique NPCs don't change in appearance even though their weight value is modified.
At first, I searched for mods that could modify the weight of NPCs and found this one:
https://www.nexusmods.com/skyrimspecialedition/mods/101511
One of the key Papyrus codes is:
akTargetRef.SetWeight(newWeight) akTarget.UpdateWeight(NeckDelta) akTarget.QueueNiNodeUpdate()
It successfully modifies the weight of unique NPCs, but not non-unique NPCs. I used the “More Informative Console” mod to look at the non-unique NPCs and their weight values were not modified either.
I then used the setnpcweight 0 console command to change the weight of the NPCs and the weight of the unique NPCs was successfully changed, but the weight values of the non-unique NPCs were changed with no change in appearance. I then used the `disalbe` and `enable` commands, and the weight values of the non-unique NPCs were still modified, and the appearance was still unchanged.
Then again, I modify the NPC's weight using this simplified C++ code from the skse plugin below:
RE::TESNPC* npc; RE::Actor* actor; npc->weight = 0; actor->DoReset3D(true);
It successfully modifies the weight of the unique NPC, while the appearance of the non-unique NPC remains unchanged, only the weight value is modified.

modlist

  1. "DLC: HearthFires"
  2. "DLC: Dragonborn"
  3. "DLC: Dawnguard"
  4. "Address Library for SKSE Plugins"
  5. "SSE Display Tweaks"
  6. "Unofficial Skyrim Special Edition Patch"
  7. "Backported Extended ESL Support"
  8. "JContainers"
  9. "NetScriptFramework"
  10. "PapyrusUtil SE - Scripting Utility Functions"
  11. "Fuz Ro D"
  12. "FNIS Behavior"
  13. "FNIS Creature Pack"
  14. "XP32 Maximum Skeleton Special Extended"
  15. "CBPC - Physics with Collisions"
  16. "RaceCompatibility with fixes"
  17. "RaceMenu"
  18. "SkyUI"
  19. "SkyUI SE - Flashing Savegames Fix"
  20. "MCM Helper"
  21. "UIExtensions"
  22. "Particle Patch for ENB"
  23. "BodySlide and Outfit Studio"
  24. "Faster HDT-SMP"
  25. "SSE Engine Fixes (skse64 plugin)"
  26. "AddItemMenuSE"
  27. "Modern Brawl Bug Fix"
  28. "powerofthree's Tweaks"
  29. "More Informative Console"
  30. "ConsolePlusPlus"
  31. "Caliente's Beautiful Bodies Enhancer -CBBE-"
  32. "CBBE 3BA"
  33. "Fair Skin Complexion"
  34. "Weight Slider Spells"
submitted by Energyc99 to skyrimmods [link] [comments]


2024.06.01 12:42 gahd95 How often are you in need of local administrator accounts on workstations?

Hi,
So quite a general question. We are contemplating implementing WDAC once our new modern workplace setup is complete, essentially just a rework of our autopilot and intune setup to streamline everything.
 
generally the idea would be that there is no local administrator accounts on any work stations and all software should be intsalled/uninstall through the company portal and all scripts needs to be signed and so on. The Microsoft consultants tells us that with such an implementation best practice is to not have any local administrator accounts as they could be used for priviledge escalation.
 
I just cannot grasp a world without a local administrator account to bypass some of the security we have. I still do handle some high level tickets, and i quite often need to use local administrator to change a setting, make a registry change, remove some software folders or whatever solves an issue. I know our support is using theirs a lot.
Currently we have a seperate account each, being pushed out using Intune identity protection and even if the credentials would be hijacked on a machine, the machines are isolated so they would not be able to connect to another workstation in the network with the credentials and they could not use the credentials for anything on our servers or cloud envrionment either. They would not be able to access anything cached either, since all our other credentials have no rights on the workstations, so we are not using them on those. I have a hard time seeting how getting rid of something like this is best practice.
 
If we knew that 99.9% of our devices needed to run 100% the same exact setup it might make sense, then we would just initiate and autopilot reset whenver there was a slight issue (however that takes longer than just deleting a corrupted file or changing some dumb setting etc).
But we have around 130 locations, and pretty much each location has their own tweaks, if not completely different software and/or needs. It is doable, but if we have an issue with some odd Bulgarian software suddenly stops working and kills production and the vendor sends us a hotfix, then we would have to make a package, test it and add it to Intune and wait hours for the package to deploy, instead of just quickly installing it on the affected machines.
 
How do you run your setup? What is best practice in your opinion? Are local administrator access a thing of the past?
submitted by gahd95 to sysadmin [link] [comments]


2024.06.01 12:39 jjdewit NordVPN.com Review

NordVPN.com is a leading Virtual Private Network (VPN) service provider, founded in 2012 by four friends who shared a passion for internet freedom and security. Since its inception, NordVPN.com has grown to become one of the most popular and trusted VPN services globally, with over 14 million users worldwide.
Early Years (2012-2014)
NordVPN.com's journey began in 2012, when four friends, including CEO and co-founder, Tomasz Fornal, came together to address the growing concerns about online privacy and security. The founders, all with a background in computer science and engineering, recognized the need for a reliable and secure VPN service that could protect users' online activities from prying eyes.
In the early years, NordVPN.com focused on developing its core technology and building a strong team of experts. The company's early success was fueled by word-of-mouth referrals and positive reviews from satisfied customers.
Expansion and Growth (2015-2018)
As NordVPN.com's popularity grew, the company expanded its operations to accommodate the increasing demand. In 2015, NordVPN.com launched its mobile apps for Android and iOS devices, making it easier for users to access the service on-the-go. The company also expanded its server network, increasing the number of servers from 100 to over 5,000, covering more than 60 countries worldwide.
In 2017, NordVPN.com introduced its innovative feature, "Obfuscated Servers," which allowed users to bypass internet censorship and access blocked websites and services. This feature further solidified NordVPN.com's position as a leader in the VPN industry.
Mission and Values
At the heart of NordVPN.com's mission is a commitment to protecting users' online freedom and security. The company's mission is to provide a secure and reliable VPN service that empowers users to take control of their online activities. NordVPN.com's values are built around three core principles:
1. Privacy: NordVPN.com is committed to protecting users' privacy and ensuring that their online activities remain confidential.
2. Security: The company prioritizes the security of its users' data, using advanced encryption and security protocols to safeguard against cyber threats.
3. Transparency: NordVPN.com is transparent about its operations, providing users with clear information about its services, policies, and practices.
Awards and Recognition
NordVPN.com has received numerous awards and recognition for its commitment to online security and privacy. Some notable awards include:
· PCMag Editors' Choice: NordVPN.com has been recognized as a PCMag Editors' Choice for its exceptional performance and features.
· Top VPN Service: NordVPN.com has been rated as one of the top VPN services by various reputable sources, including CNET, Wirecutter, and Tom's Guide.
· Trustworthy VPN: NordVPN.com has been recognized as a trustworthy VPN service by organizations such as the Electronic Frontier Foundation (EFF) and the Open Technology Fund.
Conclusion
NordVPN.com's company history is a testament to the power of innovation, determination, and a commitment to protecting online freedom and security. From its humble beginnings to its current status as a leading VPN service provider, NordVPN.com has consistently demonstrated its dedication to providing a secure and reliable VPN service to users worldwide. As the company continues to evolve and adapt to the ever-changing online landscape, its mission remains steadfast: to empower users to take control of their online activities and protect their online privacy and security.

Features and Benefits

As one of the most popular and highly-regarded Virtual Private Network (VPN) providers, NordVPN.com offers a comprehensive suite of features and benefits that cater to the diverse needs of its users. In this chapter, we will delve into the various features and benefits that set NordVPN.com apart from its competitors, highlighting its strengths and advantages.
Security and Encryption
NordVPN.com's primary concern is the security and privacy of its users. To achieve this, the service employs a robust encryption protocol, utilizing the AES-256 cipher, which is widely regarded as the most secure encryption standard available. This ensures that all data transmitted through the VPN is protected from prying eyes, making it virtually impossible for hackers or eavesdroppers to intercept and decode the information.
Server Network and Locations
NordVPN.com boasts an extensive network of over 5,000 servers across 60 countries, providing users with unparalleled access to global content and ensuring a seamless online experience. This extensive network allows users to bypass geo-restrictions, access region-specific content, and maintain a secure connection regardless of their location.
Server Selection and Filtering
NordVPN.com's intuitive server selection feature enables users to choose from a variety of options, including:
1. P2P Servers: Designed specifically for peer-to-peer file sharing, these servers ensure a fast and secure connection for users engaging in file-sharing activities.
2. Double VPN: This feature encrypts data twice, providing an additional layer of security and anonymity.
3. Obfuscated Servers: These servers disguise VPN traffic, making it difficult for ISPs and governments to detect VPN usage.
4. Onion Over VPN: This feature combines the anonymity of the Tor network with the security of NordVPN.com's encryption.
Additional Features
NordVPN.com's comprehensive feature set includes:
1. Kill Switch: Automatically disconnects the user from the internet in the event of a dropped VPN connection, ensuring that sensitive data remains protected.
2. Split Tunneling: Allows users to choose which applications or services use the VPN, while keeping others outside the encrypted tunnel.
3. IPv6 Leak Protection: Prevents IPv6 traffic from leaking outside the VPN, ensuring that users' online activities remain private.
4. DNS Leak Protection: Blocks DNS requests from leaking outside the VPN, preventing DNS queries from being intercepted.
Benefits
The combination of NordVPN.com's features and benefits provides users with a comprehensive online security solution, offering numerous advantages, including:
1. Unparalleled Security: NordVPN.com's robust encryption and secure protocols ensure that users' online activities remain private and secure.
2. Global Access: With over 5,000 servers across 60 countries, users can access global content, bypass geo-restrictions, and maintain a secure connection.
3. Anonymity: NordVPN.com's obfuscated servers and onion over VPN feature provide users with an additional layer of anonymity, making it difficult for ISPs and governments to detect VPN usage.
4. Ease of Use: NordVPN.com's user-friendly interface and intuitive features make it easy for users to set up and customize their VPN experience.
5. Customer Support: NordVPN.com's dedicated customer support team is available 24/7 to assist users with any questions or concerns.
In conclusion, NordVPN.com's comprehensive feature set and benefits provide users with a robust online security solution, catering to the diverse needs of its users. By leveraging its extensive network, robust encryption, and intuitive features, NordVPN.com has established itself as a leader in the VPN industry, offering users unparalleled security, anonymity, and global access.

Encryption and Protocols

In today's digital age, online security and privacy are more crucial than ever. With the increasing number of cyberattacks, data breaches, and surveillance, it is essential to have robust encryption methods and protocols in place to protect sensitive information. NordVPN.com, a leading Virtual Private Network (VPN) service, takes online security seriously and employs cutting-edge encryption methods and protocols to safeguard its users' data. In this chapter, we will delve into the encryption methods and protocols used by NordVPN.com to ensure the confidentiality, integrity, and authenticity of user data.
Encryption Methods
NordVPN.com uses the Advanced Encryption Standard (AES) with a 256-bit key size to encrypt user data. AES is a widely used and highly effective encryption algorithm that is considered to be unbreakable. The 256-bit key size ensures that even the most powerful computers would take an impractically long time to crack the encryption, making it virtually unbreakable.
Protocols
NordVPN.com supports multiple VPN protocols, each with its strengths and weaknesses. The choice of protocol depends on the user's specific needs and the type of device being used. The most commonly used protocols are:
1. OpenVPN: OpenVPN is a widely used and highly secure protocol that is known for its stability and reliability. It is a popular choice among VPN users due to its ability to bypass firewalls and provide fast and secure connections.
2. IKEv2/IPSec: IKEv2/IPSec is a more recent protocol that is gaining popularity due to its ability to provide fast and secure connections. It is a widely supported protocol that is compatible with a wide range of devices and operating systems.
3. L2TP/IPSec: L2TP/IPSec is a protocol that is commonly used for remote access VPNs. It is a secure protocol that provides strong encryption and is widely supported by most devices and operating systems.
Key Exchange and Authentication
NordVPN.com uses the Diffie-Hellman key exchange algorithm to establish a shared secret key between the user's device and the VPN server. This algorithm ensures that the shared secret key is not compromised during transmission.
NordVPN.com also uses the SHA-256 hash function to authenticate the user's device and the VPN server. This ensures that the user's device and the VPN server are who they claim to be, preventing man-in-the-middle attacks.
Additional Security Measures
In addition to the encryption methods and protocols mentioned above, NordVPN.com employs several additional security measures to ensure the security and integrity of user data. These measures include:
1. 256-bit SSL/TLS encryption: NordVPN.com uses 256-bit SSL/TLS encryption to encrypt data transmitted between the user's device and the VPN server.
2. DNS leak protection: NordVPN.com's DNS leak protection ensures that DNS requests are routed through the VPN server, preventing DNS leaks and ensuring that user data remains private.
3. Kill switch: NordVPN.com's kill switch feature automatically terminates the internet connection if the VPN connection is lost, preventing data leaks and ensuring that user data remains secure.
4. Split tunneling: NordVPN.com's split tunneling feature allows users to select which applications and data are routed through the VPN, ensuring that sensitive data remains private and secure.
Conclusion
In conclusion, NordVPN.com's encryption methods and protocols provide a robust and secure way to protect user data. With the use of AES encryption, multiple VPN protocols, and additional security measures, NordVPN.com ensures that user data remains confidential, integrity is maintained, and authenticity is ensured. As the digital landscape continues to evolve, it is essential to stay ahead of the curve and employ the latest encryption methods and protocols to ensure the security and integrity of user data.

Server Locations and Availability

NordVPN.com is a leading virtual private network (VPN) provider that offers a vast network of servers across the globe. In this chapter, we will delve into the details of NordVPN.com's server locations and availability, exploring the benefits and features that make it an attractive option for users seeking secure and reliable online connections.
Overview of NordVPN.com's Server Network
NordVPN.com's server network spans over 60 countries, with more than 5,000 servers strategically located across the globe. This extensive network allows users to access a wide range of geographic locations, ensuring that they can bypass geo-restrictions and access content from anywhere in the world.
Server Locations
NordVPN.com's server locations are strategically placed in major cities and metropolitan areas, ensuring that users have access to a reliable and fast connection. Some of the key locations include:
1. North America: United States, Canada, Mexico, and Brazil
2. Europe: Germany, France, United Kingdom, Spain, Italy, and more
3. Asia-Pacific: Japan, South Korea, China, Australia, and Singapore
4. South America: Brazil, Argentina, Chile, and Peru
5. Africa: South Africa, Egypt, and Morocco
6. Middle East: Israel, Turkey, and the United Arab Emirates
Server Types
NordVPN.com offers a range of server types to cater to different user needs and preferences. These include:
1. Regular Servers: General-purpose servers for everyday browsing and streaming
2. Streaming Servers: Optimized for streaming popular services like Netflix, Hulu, and Amazon Prime
3. P2P Servers: Designed for peer-to-peer file sharing and torrenting
4. Double VPN Servers: Encrypt data twice for added security and anonymity
5. Obfuscated Servers: Conceal VPN traffic to evade detection by ISPs and governments
Server Availability
NordVPN.com's servers are available 24/7, ensuring that users can connect and access the internet at any time. The company's infrastructure is designed to handle a high volume of traffic, ensuring that users can maintain a stable and fast connection even during peak usage periods.
Server Maintenance and Updates
NordVPN.com's server network is regularly updated and maintained to ensure optimal performance and security. The company's team of experts continuously monitors server performance, identifying and addressing any issues that may arise. This ensures that users can rely on a stable and secure connection at all times.
Conclusion
NordVPN.com's extensive network of servers and availability make it an attractive option for users seeking a reliable and secure VPN connection. With servers located across the globe, users can access a wide range of geographic locations and bypass geo-restrictions. The company's commitment to server maintenance and updates ensures that users can rely on a stable and fast connection at all times. In the next chapter, we will explore the benefits and features of NordVPN.com's encryption and security protocols.

No-Logs Policy

As a leading Virtual Private Network (VPN) provider, NordVPN.com takes the privacy and security of its users very seriously. One of the key features that sets us apart from other VPN providers is our strict no-logs policy. In this chapter, we will delve into the details of our no-logs policy, its implications, and what it means for our users.
What is a No-Logs Policy?
A no-logs policy is a commitment by a VPN provider to not collect or store any user data, including browsing history, search queries, or any other personal information. This means that NordVPN.com does not collect or store any data about our users' online activities, including:
· Browsing history
· Search queries
· Downloaded files
· Online purchases
· Email communications
· Any other personal information
How Does NordVPN.com's No-Logs Policy Work?
NordVPN.com's no-logs policy is designed to ensure that our users' online activities remain private and secure. Here's how it works:
1. No Data Collection: NordVPN.com does not collect any data about our users' online activities. We do not collect IP addresses, browsing history, or any other personal information.
2. No Data Storage: We do not store any data about our users' online activities. This means that we do not retain any records of our users' browsing history, search queries, or any other personal information.
3. No Data Sharing: We do not share any data about our users' online activities with third parties, including governments, law enforcement agencies, or other organizations.
Implications of NordVPN.com's No-Logs Policy
NordVPN.com's no-logs policy has several implications for our users:
1. Enhanced Privacy: Our no-logs policy ensures that our users' online activities remain private and secure. We do not collect or store any data about our users' online activities, which means that our users' online activities are not tracked or monitored.
2. Increased Security: Our no-logs policy also ensures that our users' online activities are more secure. Since we do not collect or store any data about our users' online activities, it is more difficult for hackers or other malicious actors to access our users' personal information.
3. Compliance with Data Protection Regulations: Our no-logs policy ensures that we comply with data protection regulations, such as the General Data Protection Regulation (GDPR) in the European Union. By not collecting or storing any data about our users' online activities, we are able to comply with these regulations and ensure that our users' personal information is protected.
Benefits of NordVPN.com's No-Logs Policy
NordVPN.com's no-logs policy offers several benefits to our users:
1. Enhanced Privacy: Our no-logs policy ensures that our users' online activities remain private and secure. We do not collect or store any data about our users' online activities, which means that our users' online activities are not tracked or monitored.
2. Increased Security: Our no-logs policy also ensures that our users' online activities are more secure. Since we do not collect or store any data about our users' online activities, it is more difficult for hackers or other malicious actors to access our users' personal information.
3. Compliance with Data Protection Regulations: Our no-logs policy ensures that we comply with data protection regulations, such as the General Data Protection Regulation (GDPR) in the European Union. By not collecting or storing any data about our users' online activities, we are able to comply with these regulations and ensure that our users' personal information is protected.
Conclusion
In conclusion, NordVPN.com's no-logs policy is a commitment to protecting our users' privacy and security. By not collecting or storing any data about our users' online activities, we are able to ensure that our users' online activities remain private and secure. Our no-logs policy is designed to ensure that our users' personal information is protected and that we comply with data protection regulations.

Speed Tests and Results

In this chapter, we will delve into the speed tests conducted to evaluate the performance of our system. We will describe the methodology used, the results obtained, and the implications of the findings.
Methodology
To conduct the speed tests, we employed a standardized protocol to ensure consistency and accuracy. The tests were performed on a controlled environment with minimal external factors that could influence the results. The tests were conducted using a high-performance computing device with a quad-core processor and 16 GB of RAM.
The tests were designed to simulate real-world scenarios, including:
1. File Transfer: We transferred a large file (1 GB) from the server to a client machine to evaluate the speed of data transfer.
2. Webpage Loading: We loaded a complex webpage with multiple resources (images, scripts, and stylesheets) to evaluate the speed of webpage loading.
3. Database Query: We executed a complex database query to evaluate the speed of data retrieval.
Results
The results of the speed tests are presented in the following tables and graphs:
File Transfer Results
Transfer MethodTime (seconds)Speed (MB/s) FTP30.1233.33 SFTP25.6739.12 HTTP20.4549.12
Webpage Loading Results
ResourceLoad Time (seconds)Size (KB) Images2.12100 Scripts1.8550 Stylesheets1.4520 Total5.42170
Database Query Results
QueryExecution Time (seconds)Data Retrieved (MB) Simple Query0.8510 Complex Query2.1250 Aggregate Query1.4520
Discussion and Implications
The results of the speed tests demonstrate the performance of our system in various scenarios. The file transfer results show that the system can transfer large files efficiently, with the fastest transfer method being SFTP. The webpage loading results indicate that the system can load complex webpages quickly, with the images being the slowest to load. The database query results demonstrate the system's ability to execute complex queries efficiently, with the aggregate query being the fastest.
The implications of these results are significant. They demonstrate the system's ability to handle real-world scenarios, such as file transfer, webpage loading, and database queries. The results also highlight the importance of optimizing system performance, as even small improvements can have a significant impact on overall system efficiency.
Conclusion
In conclusion, the speed tests conducted demonstrate the performance of our system in various scenarios. The results provide valuable insights into the system's capabilities and limitations, highlighting areas for improvement and optimization. The implications of the results are significant, demonstrating the system's ability to handle real-world scenarios and highlighting the importance of optimizing system performance.

Server Performance and Optimization

As a leading Virtual Private Network (VPN) provider, NordVPN.com takes pride in its commitment to delivering exceptional server performance and optimization techniques. In this chapter, we will delve into the intricacies of NordVPN.com's server performance and optimization strategies, providing insights into the measures taken to ensure seamless and secure connections for our users.
Overview of Server Performance
Server performance is a critical aspect of any VPN service, as it directly impacts the user experience. NordVPN.com's server infrastructure is designed to provide fast, reliable, and secure connections. Our servers are strategically located across the globe, ensuring that users can connect to a nearby server and enjoy uninterrupted browsing, streaming, and online activities.
Server Architecture
NordVPN.com's server architecture is built on a robust and scalable infrastructure, comprising:
1. Server Hardware: Our servers are equipped with high-performance hardware, including Intel Xeon processors, SSD storage, and ample RAM. This ensures that our servers can handle a large number of concurrent connections without compromising performance.
2. Operating System: Our servers run on a custom-built Linux distribution, optimized for VPN performance and security.
3. Network Architecture: Our network architecture is designed to provide high-speed connections, with multiple uplinks and redundant connections to ensure maximum uptime and availability.
Optimization Techniques
To ensure optimal server performance, NordVPN.com employs a range of optimization techniques, including:
1. Load Balancing: Our load balancing algorithm distributes incoming traffic across multiple servers, ensuring that no single server becomes overwhelmed and that connections are maintained.
2. Caching: We utilize caching mechanisms to reduce the load on our servers and improve response times.
3. Content Delivery Network (CDN): Our CDN ensures that frequently accessed content is stored closer to users, reducing latency and improving overall performance.
4. Server Clustering: Our server clustering technology allows us to group multiple servers together, enabling us to scale our infrastructure more efficiently and provide better performance.
5. Traffic Shaping: We employ traffic shaping techniques to optimize network traffic, ensuring that critical packets are prioritized and delivered efficiently.
Security Measures
NordVPN.com takes the security of our users' data extremely seriously. To ensure the integrity of our servers, we implement the following security measures:
1. Encryption: All data transmitted between our servers and users is encrypted using AES-256, ensuring that sensitive information remains protected.
2. Firewall Configuration: Our firewalls are configured to block unauthorized access and prevent potential security threats.
3. Regular Security Audits: We conduct regular security audits to identify and address potential vulnerabilities.
4. Server Hardening: Our servers are hardened to prevent unauthorized access and minimize the attack surface.
Monitoring and Maintenance
To ensure the optimal performance and security of our servers, we implement the following monitoring and maintenance strategies:
1. Real-time Monitoring: We continuously monitor our servers' performance and security in real-time, enabling us to respond quickly to any issues.
2. Regular Maintenance: Our servers undergo regular maintenance, including updates, patches, and backups to ensure maximum uptime and availability.
3. Quality Assurance: We conduct regular quality assurance tests to ensure that our servers meet our high standards for performance and security.
Conclusion
In conclusion, NordVPN.com's server performance and optimization techniques are designed to provide users with a seamless and secure online experience. By leveraging cutting-edge technology and implementing robust security measures, we ensure that our users can trust our service to protect their online activities. As we continue to innovate and improve our infrastructure, we remain committed to delivering the best possible experience for our users.

User Interface and Design

NordVPN.com.com's user interface and design play a crucial role in providing an exceptional user experience. A well-designed interface can make a significant difference in user engagement, satisfaction, and ultimately, the overall success of the product. In this chapter, we will delve into the details of NordVPN.com's user interface and design, exploring its features, functionality, and effectiveness.
Overview of the User Interface
NordVPN.com's user interface is clean, intuitive, and easy to navigate. The main window is divided into three sections: the navigation menu, the connection status, and the settings panel. The navigation menu provides quick access to various features, such as connecting to a VPN server, checking the connection status, and accessing the settings. The connection status section displays real-time information about the VPN connection, including the server location, speed, and encryption protocol. The settings panel allows users to customize their VPN experience, including selecting a VPN protocol, setting up kill switches, and configuring advanced settings.
Design Principles
NordVPN.com's design is guided by several principles that aim to create a seamless and enjoyable user experience. These principles include:
1. Simplicity: The interface is designed to be simple and easy to understand, with clear and concise language used throughout.
2. Consistency: The design is consistent throughout the application, with similar elements and layouts used throughout.
3. Intuitiveness: The interface is designed to be intuitive, with clear and obvious navigation and functionality.
4. Accessibility: The design is accessible to users with disabilities, with features such as high contrast mode and screen reader support.
5. Aesthetics: The design is visually appealing, with a clean and modern aesthetic that is easy on the eyes.
Key Features
NordVPN.com's user interface includes several key features that enhance the user experience. These features include:
1. Server Selection: The interface allows users to select from over 5,000 servers in 60 countries, with options to filter by country, city, or server load.
2. Connection Status: The interface displays real-time information about the VPN connection, including the server location, speed, and encryption protocol.
3. Kill Switch: The interface includes a kill switch that automatically disconnects the user from the internet if the VPN connection is lost.
4. Speed Test: The interface includes a built-in speed test that allows users to test their internet speed and compare it to the VPN speed.
5. Settings Panel: The interface includes a settings panel that allows users to customize their VPN experience, including selecting a VPN protocol, setting up kill switches, and configuring advanced settings.
Effectiveness
NordVPN.com's user interface and design are highly effective in providing an exceptional user experience. The clean and intuitive design makes it easy for users to navigate and use the application, while the features and functionality provide a high level of customization and control. The interface is also highly responsive and fast, making it easy to use on a variety of devices and platforms.
Conclusion
In conclusion, NordVPN.com's user interface and design are critical components of the application's overall success. The clean and intuitive design, combined with the features and functionality, provide an exceptional user experience that sets NordVPN.com apart from other VPN providers. By understanding the design principles and key features of NordVPN.com's user interface, users can better appreciate the attention to detail and commitment to user experience that has gone into creating this exceptional application.

submitted by jjdewit to easyvpn [link] [comments]


2024.06.01 11:02 HaseebIdrees Best Chatbot Ai - Support Board For Customer interaction Php Script

Chat bot ai is a PHP script that helps you automate your customers’ communication with artificial intelligence-driven chatbots and a chat system integrated with the most-used platforms. Seamlessly connect OpenAI (ChatGPT) and Google to unlock powerful AI features. The supported messaging channels include Facebook Messenger, WhatsApp, Instagram, Telegram, and more. Some features require purchasing additional apps.
Are you looking for a "Chat bot " for your business, then you are in the right place.
Codeslook.com is a largest marketing place website that provides php script ,WordPress theme ,website design and mobile apps.
No need to pay thousands of dollars to hire developers to build your "Chat bot website " .that customer interaction
Here! check the
✔️ Open Ai ✔️ ChatGPT ✔️ Open Ai and Google Ai Integration ✔️ Omnichannel ✔️ SaaS ✔️ Awesome Chat ✔️ Chat Support ✔️ Rich Messages & Surveys ✔️ Registaration and Login ✔️ Multilingual and RTL ✔️ Notifications

Modern Admin Area

✔️ Manage Conversations ✔️ Saved Replies ✔️ Customers Insights ✔️ Message Editior ✔️ Manage Users ✔️ Find, Sort and Filter
submitted by HaseebIdrees to u/HaseebIdrees [link] [comments]


2024.06.01 09:26 Successful-Bread-347 Stefan Kuhne - September, 1984

I'm a fan of Stefan Kuhne being our DJ. If you look through the playlists, most other DJs on NDR played much more vanilla rock, but he played some really interesting stuff & unknown bands. Paul Baskerville said the song was probably played on Stefan's show, and Lydia says he was one of Darius's favorite DJs. Also, Stefan Kuhne has a lipsmack ( https://voca.ro/11vngk28itsz ) that matches the TMMS Lipsmack: https://voca.ro/18WHHutcEVjf pretty closely.
If TMS was played in September, 1984 then there are 4 times that month that Stefan was the DJ - Sept 7, 14, 21 and 28 (all Fridays).
I've gone through all those shows below in some detail and also prepared a YouTube playlist for each show. What is interesting is that every one of Stefan's shows that month was recorded pretty heavily by Darius or Lydia across many tapes. They definitely liked and recorded his stuff. I like Sep 28 because a lot of songs on the N01 tape that has our best copy of TMS were played on that date. But there are a few songs that haven't ever been located from Sept 21 as well that are worth digging in to :
Unknown songs from Sept 21:
Twist Noir is completely different style from what I've found and I can only find female lead singer. Example: https://www.youtube.com/watch?v=Q9FoOTwuSKQ
The Painless Dirties also pretty different singing style - https://www.youtube.com/watch?v=kzerrlOcKds
Anyway, I'm putting some info about all his shows from Sept. 1984 here. Perhaps someone else can see something here. Otherwise, enjoy listening to the playlists for each date and let me know if TMS might have fit well in any of the shows.

Songs Played on 1984-09-07

YouTube Playlist for this date: https://www.youtube.com/watch_videos?video_ids=iY96bEZTSTc,IJNxp78gG48,fXEkaUokqnM,4UkoCtCEhVU,N0azFHAhGLw,1_dE3Fmyesg,7NdpUGW8ru4,h7Jovvl7GJQ,xcc0V-W6L0I,ZIOw2NJn8yM,GJ6rSrYSAbg,t6cU9opuO74,LXeN2vLoG5o
  1. Malcolm McLaren - One Fine Day / Madam Butterfly
  2. The Mighty Wah! - Weekends
  3. DCL Locomotive - King Midas in Reverse
  4. Aztec Camera - Still On Fire
  5. Romeo Void - Just Too Easy
  6. Me & The Heat - Where Has My Heart Gone
  7. The Associates - Waiting For the Loveboat
  8. Bronski Beat - Why?
  9. Akabu - Watch Yourself
  10. Stockholm Monsters - Decalogue
  11. John Cale - Waiting for My Man
  12. John Cale - Heartbreak Hotel
  13. Me & The Heat - Got to Get Away
Unknown songs: NIL

Songs from 1984-09-07 on Tapes

  1. Aztec Camera - Still On Fire
    • Appears on tapes: BASF 03 A, N12 A, N14 B
  2. The Mighty Wah! - Weekends
    • Appears on tapes: N14 B, BASF 17 B
  3. Romeo Void - Just Too Easy
    • Appears on tape: N14 B
  4. Me & The Heat - Where Has My Heart Gone
    • Appears on tape: N14 B
  5. Stockholm Monsters - Decalogue
    • Appears on tape: N14 B

Songs Played on 1984-09-14

YouTube playlist for this date: https://www.youtube.com/watch_videos?video_ids=tX48dvm9A0Q,RoX9r8Nl1bs,X9E2gCsgd_Q,5DGcB7u2DxI,sV9CbKFmiKY,NaOge9TT1JA,DBUxj8G7OOQ,b8QpelhH0rQ,qEbCVTWPYmU,n9fcmDhcHxk,GNSN85YIX3M,xcc0V-W6L0I,gRUtvk6XGTY,SFx0MZBQfXA,zN3q8cF_5mo
  1. The Senate - Original Sin
  2. Virna Lindt - Swedish Modern
  3. Virna Lindt - Beat the System
  4. Bill Nelson - Hard Facts From the Fiction Department
  5. The Residents - It's a Man's Man's Man's World
  6. The Wolfgang Press - Respect
  7. Bill Nelson - Acceleration
  8. The Cult - Go West
  9. Carlos Person - Komtur
  10. General Public - Tenderness
  11. The Beauty Contest - City Lights
  12. Psychic TV - Just Drifting (& Midnight Version)
  13. Psychic TV - Godstar
Unknown songs: NIL

Songs from 1984-09-14 on Tapes

  1. The Cult - Go West
    • Appears on tape: N10 A
  2. General Public - Tenderness
    • Appears on tapes: N10 A, N15 A
  3. The Beauty Contest - City Lights
    • Appears on tape: N10 A
  4. The Wolfgang Press - Respect
    • Appears on tape: N10 A

Songs Played on 1984-09-21

YouTube playlist for this date: https://www.youtube.com/watch_videos?video_ids=4bbJDFxUAu8,iOd1lu_lo18,-v_iYGnUeRw,_3OhiFdB4lA,vQQ2YSuVGS4,Q9FoOTwuSKQ,Q9FoOTwuSKQ,guR_miTjiyM,vQQ2YSuVGS4,jirphzoneSs,xcc0V-W6L0I,gL8WdjkPhdM
  1. The Fleshtones - American Beat '84
  2. The Bangles - Dover Beach
  3. Flesh For Lulu - Restless
  4. The Damned - Thanks For the Night
  5. The Painless Dirties - Modern Love
  6. Twist Noir - The Same
  7. Twist Noir - Loving a Bitch
  8. Asmodi Bizarr - Loup Garou
  9. The Painless Dirties - She Loves Me Forever
  10. Orange Juice - Bridge
  11. Akabu - Watch Yourself
  12. Heaven 17 - And That's No Lie
Unknown songs:
Songs from 1984-09-21 on Tapes
  1. Flesh For Lulu - Restless
    • Appears on tapes: N12 A, N17 B
  2. The Painless Dirties - Modern Love
    • Appears on tape: N12 A
  3. Orange Juice - Bridge
    • Appears on tape: N12 A
  4. Heaven 17 - And That's No Lie
    • Appears on tape: N01 B

Songs Played on 1984-09-28

Playlist for this date: https://www.youtube.com/watch_videos?video_ids=CmZQj3CC-EM,5KRzzIdNrwA,vyUwAhiIeOs,OguHIyNNblM,6MLijS6Cstk,W05vlVc9I_c,myzNWd-Pp2g,lsudnQc0tTg,fV8lr7q1vHE,Gre3RwTjRho,A4aKy2JyIqs,xcc0V
  1. Folk Devils - Art Ghetto
  2. The Beauty Contest - The Beast
  3. Me & The Heat - Old Cultures Dying
  4. Anne Clark - Our Darkness
  5. Joolz - War of Attrition
  6. Everything But The Girl - Native Land
  7. Death in June - She Said Destroy
  8. Screaming Dead - Serenade of Suicide
  9. Play Dead - No Motive
  10. The Gun Club - Watermelon Man
  11. The Gun Club - Eternally is Here
  12. Akabu - Watch Yourself
  13. The Cult - Go West
  14. Portion Control - Refugee
  15. Palais Schaumburg - Easy Go
  16. Heaven 17 - Flamedown
Unknown songs: NIL

Songs from 1984-09-28 on Tapes

  1. Everything But The Girl - Native Land
    • Appears on tape: BASF 03 B
  2. Palais Schaumburg - Easy Go
    • Appears on tapes: BASF 03 B, N12 B, BASF 28 B
  3. Death In June - She Said Destroy
    • Appears on tape: N01 A
  4. The Gun Club - Watermelon Man
    • Appears on tape: N01 A
  5. Screaming Dead - Serenade Of Suicide
    • Appears on tapes: BASF 03 B, N01 A
submitted by Successful-Bread-347 to TheMysteriousSong [link] [comments]


2024.06.01 07:01 algosoft Mastering Modern Tech with Noida's Leading Node JS Experts

This JavaScript runtime environment has revolutionized the way we build and scale network applications, enabling real-time data-intensive solutions that are both efficient and scalable. At the forefront of this revolution are the Node JS development company in Noida, a city quickly becoming a global tech hub.
https://www.algosoft.co/blog/mastering-modern-tech-with-noidas-leading-node-js-experts
submitted by algosoft to u/algosoft [link] [comments]


2024.06.01 05:17 Katib-At-Tajjid My story (reposted with updates)

Hello, and assalaamu alaikum all,
I am Damon Stengel. I am posting my story because it will have a significant impact and it will help many who are doubting or hidden ex-Ahmadis among both born and convert Ahmadis.
I am a former convert to Ahmadiyya and I was very passionate in Tabligh. I want to share with you all my story.
I was once a very fanatical and fundamentalist Ahmadi. I would call ex and doubting Ahmadis cowards and munafiqs for speaking out against Jammat. All that changed with the past years. This is the story of my secret ex-conversion. This is the story of how I reclaimed my true self once more:
After I joined the Jammat in my late teens, I was excited. I felt I finally found the truth I've been searching for all my life. I was getting, what I thought were frequent true dreams. I frequently read books so I can debate and refute opponents.
Gradually, and growing older, I slowly ran into a problem: There were some references that seemed to go against Mirza Sahib and it was causing me to doubt. I convinced myself that I can find answers for these allegations because it is true, some objections to Jammat are complete lies (not realizing at the time not all are lies).
I increased my reading of literature, but some of the doctrines of Jammat seemed to conflict with the doctrines of traditional Islam like the seal of Prophethood. Reading Aik Ghalati Ka Azala seemed to clear up my confusion but it began to turn into cognitive dissonance.
I nearly left Jammat in 2019 because I began to embrace my more skeptical side again, but it took a phone call by my mentor to stay with the simple words: "Did Huzoor ever lie once?"
with no Nida audio at the time, I had to say "No.", And then, I had a revival of blind faith, diving deeply into religious fundamentalism of the Ahmadi kind. I was ready to by way of Majazi (pun intended) to throw hands with anyone that spoke out against Jammat or those who are hidden ex Ahmadis. I fed lies to myself that I did find the truth, it was just me hanging out in the company of skeptics so I chose to hang out with fundies on Twitter.
Because I felt this was the truth. These was the lies I constantly told myself. I told myself I am the Prodigal Ahmadi convert and man, did I take Tabligh to the extreme just like Razi does. I can definitely see why some of you may have thought I was a Jammat plant sent after ex Ahmadis
I remember I made a really long article years ago saying converts already explored the world and therefore they're better than ex Ahmadis because they went into the world whereas converts were already in the world, but found the "truth".
How wrong I was! Because as I grew in more knowledge of Ahmadi literature, I also began reading a lot of secular and non-Ahmadi Islamic literature as well.
I consistently found the stuff I've read to not match up with the teachings of Jammat or that there were so many contradictions, I couldn't answer allegations. Part of it was because I didn't know Urdu, and my Arabic was sloppy.
So I began gradually learning Urdu and improving my Arabic. After becoming married, my Urdu improved a lot. a family member from my in laws gave me a hand in pronunciation of Urdu letters and words. I would say Ghora (horse) was the most difficult but I can just barely do it slightly better than a born Ahmadi raised here in American. I picked up on basic Urdu really quick. So it helped me with reading some literature.
I improved my Arabic as well. That's when I realized Jammat was purposely mistranslating some passages such as Haqiqatul Wahi on Majazi prophethood.
Once I asked Razi why we don't have a good translation on a Quranic verse and the Arabic says differently, and he indirectly called me arrogant and accused me of knowing Arabic better than Huzoor so I chose to keep quiet. I started questioning again later
When a Bhai came out to me as an ex Ahmadi, I ran to Razi. Razi told me to cut him off and I did. I continued in my religious fundamentalist phase and then I cut out all the ex Ahmadis in obedience to Jammat saying to not hang out with them.
And I would delete my social media and then come back with new account and make articles refuting allegations. Yet, deep down, that cognitive dissonance I mentioned earlier continued to increase. I studied logic and fallacies to try to help myself, and i slowly realized Ahmadi arguments are ridiculous and Razi is very manipulative in his Tabligh.
Then, Mohammad Abr Razack showed me a different side to Muslim Dawah and he seemed like a very decent man, even if I may not have agreed with him on everything. same with talking with Sohail Ahmed, Reason On Faith, his mannerisms definitely resembled that of an Ahmadi Muslim, socially.
I continue and continued. The homeopathy and other social media controversies rocked my faith as Kashif Bhai can attest. whenever Kashif Bhai would confront me on these things, I would avoid.
when I first started seeing Kashif Bhais posts on homeopathy, I chose to ignore it. but then I saw the backlash of the fundamentalist Ahmadis. I tried to reason with one in that they shouldn't be harsh with Kashif Bhai but I got rebuffed and accused of being a coward and so I chose to retreat and not participate.
wasn't really until a year later, I somewhat got a bit more vocal about my fundamentalism on homeopathy but even then I wasn't directly confrontational. only that me and Kashif Bhai butted heads a lot in DMs, and that's when he told me some stories of his treatment by some figures in Jammat. I chose to ignore at the time.
still, I got married and I had my kid. After another bout on social media, I took a year long break.
I left to focus on family but also because my identity crisis was at an all time high, and my own behaviors were causing problems in my marriage. There was also a point i thought of suicide because I had two conflicting realities and identities (Ahmadi-fused me vs. the real me) in my head. I eventually started seeing a therapist for unaddressed childhood trauma and that changed everything about my perspective on life. I learned new techniques to manage emotions and my relationships.
I returned to social media with newfound empathy for others and I intended to be the perfect Ahmadi. That's when I approached a couple ex Ahmadi brothers I used to talk to before they left and patched things up. I even patched things with Bashir Shah (even if I still don't always agree with his approach).
Little did I know, it would be the end of me being Ahmadi.
When I saw Craig Considine's post about pro Palestinian protesters and accusing them of BS rhetoric, I got mad and so did a buddy of mine from Texas. He published a blog against Craig and I posted it to social media. That's how Craig was able to get a hold of it.
He disassociated himself from Ahmadis and many tried to reason with him and others called him out. I fought with a buddy of mine who kept blindly defending Craig because "Huzoor loves him" (that Muslun guy I had an exchange with today lmao; i called him Batalvi Sahib haha for his religious fanaticism).
Slowly, I realized Huzoor may be misguided.
I spoke with my old ex Ahmadi friend more and more and I spoke with his cousin as well. Both of them I looked up to as role models in my early years of Ahmadiyyat (and I still see them as such) and was sad to hear both of them leaving but with my newfound empathy of seeing good in others from therapy, I knew they both are still great people.
What made me disown Qadiani Khilafat was after reading the Shahatul-Quran or testimony of the holy Quran by Mirza Ghulam Ahmad. It presented a very different picture of Khilafat and he said it's eternal and will last until the day of Judgement. That contradicts Jammat doctrine of him declaring prophethood in 1901 and then , contradicts the supposed doctrine from the Wassiyat that Khilafat will be established after his demise.
I told my friend about it and he told me to look at the Lahori versions of Correction of an error and the will. I saw for myself the numerous references where Mirza sahib did not claim prophethood but only by way of metaphor. He was a saint claimant. Nothing more and that it was Khalifatul Masih II that invented the doctrine that his father was a prophet
I began questioning why we say "alayhi salaam" after the title of promised Messiah, as if he's on the same rank as previous prophets before Rasulullah (saw).
Knowing this as well as previous controversies regarding the 200 million Ahmadis thing in 2001, and then reading the Khilafah nabuwwah minhaj Hadith in depth (which Qadianis use to promote their propaganda), I knew their Khilafat was false.
Then, I finally had the courage to look up the transcript of Masroor's call with Nida Sahiba and I was disgusted. I've read the entire script of that call. Having studied psychology and psychiatry on and off for years, I remember there was a part of the transcript I've read in both English and Urdu where Huzoor told his niece that she should've screamed when one of the people she was accusing raped her.
She thoroughly debunked Huzoor and said that therapists say that everyone has a different trauma response and her trauma response was freezing. Which is true because adrenaline is our evolutionary survival instinct. It is either fight or flight. Many rape victims freeze for safety reasons lest they escalate the situation further. I felt that was very ignorant of Huzoor to say those messed up things to her, and I was happy I disowned the Caliphate because so many convert brothers went up to me to ask about it for years, and I gave unsatisfactory answers or made up excuses. Now I know the truth.
let me make it clear: Some have countered that Nida couldn't prove her case to the courts. however, I would refer them to articles that say we need to change the way courts view rape victims: https://www.uml.edu/news/stories/2019/sexual_assault_research.aspx
"Morabito says more resources, public education and policies that encourage prosecutors to bring cases to trial are needed, although it may take time to change public opinion.
“Maybe if more of these cases were tried, we’d break down those myths and see more of what sexual assault cases really involve,” she says."
anyways,
I continued to believe in Mirza sahib but held the Lahori position, but I began to question his claim itself. I read about the fabrication of Daru-Qutni and I realized it's actually technically a dishonor to orthodox Islam to quote a fabrication that disrespects the scholars who proved fake Hadiths are not to be used.
my two ex Ahmadi friends continued to share with me their skepticisms in order to show me the falsehood of Mirza sahib. When one of them showed me proof that the red drops revelation happened in a bathroom, I without question, disowned Mirza sahib as well.
I felt relief. As if a heavy weight and burden was lifted off my shoulders after nearly 10 years. The whole reason I was Ahmadi for so long was due to my ego. I didn't want to admit I was duped. I didn't want to admit I converted out of youthful naivety.
when I first started meeting with the Ahmadis, my gut instinct when I originally hung out with the Ahmadis was to read all of Mirza Sahib's literature and then make a decision, but a Murabbi told me if I keep waiting, I'll go to hell. So I made the decision in haste and did bait. Never did I admit this in any of my stories
I've always had a skeptical side of me and I embrace it fully now. this is why my conversion to non-denominational Islam isn't really complete either because I have no intentions in trading one religious dogma for another. I have chosen to embrace my old agnostic atheism once more.
actually, these views of mine were always such for years. unconsciously, I was always an agnostic, but I just chose to not consciously acknowledge it. yet, I'm free at last, my story is very similar to many other ex Ahmadis and doubting/questioning Ahmadis in here.
I'm gonna tell you guys straight up, my soul left jammat a long time ago. I only just admitted it to myself a few weeks ago, and I embraced the true me.
I realized in a sense (even though it was my own choice and free will out of a false passion) that Jammat indirectly used me for their propaganda. I wanted to imitate Razi and be in the same league as him, and damn straight, I sure am in the same league as them from both the perspectives of Ahmadis and those who disagree with them.
Many ex and more open-minded Ahmadis (such as Kashif Bhai) called (indirectly) me ignorant of the facts, naive, head-in-sand, and a product of religious indoctrination. I realized how right they are. I fell for the same cult vibe just as the one I grew up in-Pentecostal Christianity.
Now, the very person that was heavy against ex-Ahmadis and questioning Ahmadis online for years and said he's better than them, has found the truth, is now himself, an ex-Ahmadi because he grew in emotional intelligence and empathy for others.
It's ironic. Both convert Ahmadis and ex Ahmadis have so much in common in regards to opposition. I, out of all people should've understood the most of why ex and doubting Ahmadis think the way they do. But now I truly understand.
Viewing myself as the "Savior and Prodigal Convert Ahmadi" for people who doubt and it was definitely taxing on my mental health. It was just pure ego. Nothing more.
I thought I could "save" other Ahmadis, but I couldn't even "save" myself.
Except I saved myself from religious indoctrination and possible insanity
You can lose friends and family n stuff, but if you lose yourself, that's the worst feeling ever. Ngl
These are my views summarized:
In essence, my views are very similar to my views from before entering the Jammat, in that, I believed all religions had the same amount of gods, same amount of prophets and same amount of books, as if God(s) were in a competition with Him/themselves.
That's my view on this world again, and if anything, history has repeatedly shown religious dogma causes stagnation in communities. openness to other views and perspective and intermixing is key, and I just dislike how Jammat and the nizam say we need to get back to "the core teachings" or "don't worry about what others are doing. focus on yourself and your connection to Allah and Khilafat.", this completely ignores the reality of the problems in Jammat like the rape scandals, rampant and judgemental Desi culture of excessive gossip and defaming, stagnation in the education of its members (being the former Nizam Taleem of MKA Baltimore), most converts leaving after converting because they found no love in the social structure of Jammat or it's too dogmatic, no one is enthusiastic about Tabligh or Taleem, Jammat encourages calling people and "being their friend", but people see through the B.S. behind that. Jammat has grown stagnant and refuses to hold themselves accountable for fear of a ruined reputation despite the fact this philosophy ruins their reputation further. it sounds to me as if Jammat is like an insecure narcissistic man who never takes responsibility for his wrongs and always blames the other person.
Ameer Sahib always lectures the people of Jammat in the Jalsas of how sad he is about the bad tarbiyyat of Ahmadis or those not joining the Wassiyat scheme (and I speak as a former Moosi, so no one can lecture me here), but he only presents himself as someone judgemental and not someone that speaks with humility. it seems it's just another speech about low turnout. maybe instead of lecturing everyone, might be better to reform the institution from ground up? perhaps Musleh Maud's system no longer works in this era. or that it needs great reforms to better progress the community. there is too much of a social hierarchy in this institution and it's filled with those who have no real understanding of the struggles of Ahmadi youth.
don't get me started on the Noah's ark rhetoric and how Jammat presents it. Everytime I would ever read that book or listen to excerpts in speeches or zoom calls, I'd feel guilty and like a peace of trash. especially with Masroor Sahib saying a nuclear war is upon us soon. I feel this is a cult because more chanda is being demanded. more guilt tripping is being made to gaslight members into blindly following. I saw a child cry in their parent's arms upon hearing what Masroor Sahib said about "World War III is here." why would you expose a child to that??? that's terrible mental torture and I felt bad for them.
That's all I got for now.
Everything else has been explained here:
https://x.com/LAhmadi25/status/1796569889802768775?t=RAQ9GWfQObLXIsY0tSN_8w&s=19
Sincerely,
Damon Stengel, The Ex-Ahmadi Convert
submitted by Katib-At-Tajjid to islam_ahmadiyya [link] [comments]


2024.06.01 04:22 Gyro_Armadillo US concerned over West Philippine Sea; aid hike eyed

US concerned over West Philippine Sea; aid hike eyed
SINGAPORE—The Philippines will do “whatever it takes to protect our sovereign home,” President Marcos said at the Shangri-La Dialogue here on Friday as the United States expressed concern over China’s recent order to detain “trespassers” in the West Philippine Sea (WPS) even if it is against international law.
Speaking at the forum organized by the Institute for Strategic Studies, the President said that Philippine claims in the South China Sea “are derived not from imagination, but from international law.”
“Unlike others, we have submitted our assertions to rigorous legal scrutiny by the world’s leading jurists,” Marcos said.
“We will never allow anyone to detach it from the totality of the maritime domain that renders our nation whole.”
He told world leaders, top defense and security officials present at the forum that the Philippines and like-minded nations are “the owners of the narratives of our regional community.”
The President conceded that China’s influence in the region “is permanent.”
“At the same time, the stabilizing presence of America is crucial to regional peace. It is never a choice. Both countries are important,” he said. “Thus, we reject any attempt to deny our strategic agencies, especially by forces that seek to subordinate our interests to theirs.”
Increase in military financing
Marcos made the remarks hours after US Sen. Christopher Coons said in Makati City that the US Congress is looking to increase foreign military financing (FMF) to the Philippines from $40 million to $500 million.
“There is widespread concern about the increased level of aggressiveness by the [People’s Republic of China] in how they have responded to fisherfolk just simply trying to continue to access historic locations that are within the Philippine exclusive economic zone,” Coons told the state-run Philippine News Agency (PNA) at a Makati hotel on Friday.
“You may have picked up that our politics are somewhat divided … but this is something that is broadly agreed on a bipartisan basis in the Senate and the House,” the PNA quoted Coons as saying.
Coons said the US Congress passed last month an appropriation of $2 billion for FMF in the Indo-Pacific region and the Philippines was “second core priority” next to Taiwan in the supplemental aid package
At the same time, Armed Forces of the Philippine chief Gen. Romeo Brawner, who was also in Singapore, said Admiral Samuel Paparo, recently named commander of the US Indo-Pacific Command, also expressed to him concerns over China’s actions.
“Well, both our countries are concerned about it,” Brawner told reporters on the sidelines of the forum, ahead of the President’s keynote address.
Common US position
Brawner did not mention the FMF facility and did not elaborate on what he discussed with Paparo, except to say the meeting “went very well with the United States.”
Also on Friday, US Defense Secretary Lloyd Austin met for the first time with China’s Minister of National Defense, Admiral Dong Jun, on the sidelines of the regional defense forum.
The US Department of Defense said in a statement that Austin told Dong that the United States would “continue to fly, sail and operate—safely and responsibly—wherever international law allows.”
On the other hand, Coons, a member of the foreign relations and appropriations committees, revealed the hike in FMF after a visit to Taiwan with other members of a US congressional delegation.
He said talks were underway “to make sure that there’s an understanding of what sorts of systems, on what timeline” and how the financing would contribute to the AFP’s modernization.
submitted by Gyro_Armadillo to Philippines [link] [comments]


2024.06.01 03:50 abjinternational 01-06-2024, don't miss out on Udemy Free Courses! Act fast, as coupons may expire, allowing you to access the courses for free

JavaScript OOP: Mastering Modern Object-Oriented Programming
https://freewebcart.com/javascript-oop-mastering-modern-object-oriented-programming/
How to become a Successful Software Programming Developer
https://freewebcart.com/how-to-become-a-successful-software-programming-develope
Design & Develop Unique Customer Value / Selling Proposition
https://freewebcart.com/design-develop-unique-customer-value-selling-proposition/
Master in Product Design & Development and Prototyping
https://freewebcart.com/master-in-product-design-development-and-prototyping/
Practical Fundamental Equity, Shares & Stock Analysis
https://freewebcart.com/practical-fundamental-equity-shares-stock-analysis/
Become a Successful IT Product Manager / Product Owner
https://freewebcart.com/become-a-successful-it-product-manager-product-owne
Master in Brand Strategy and Brand Management
https://freewebcart.com/master-in-brand-strategy-and-brand-management/
New Big, Small & Tiny Business Ideas Generation & Selection
https://freewebcart.com/new-big-small-tiny-business-ideas-generation-selection/
Master in Talent Acquisition by Skilled Interview Taking
https://freewebcart.com/master-in-talent-acquisition-by-skilled-interview-taking/
Excellence in Leadership- Effective Strategies for a Leader
https://freewebcart.com/excellence-in-leadership-effective-strategies-for-a-leade
Mastering Complexity in Problem Solving and Decision Making
https://freewebcart.com/mastering-complexity-in-problem-solving-and-decision-making/
Freelance Mastery with SmartPhone 3D Logo Design
https://freewebcart.com/freelance-mastery-with-smartphone-3d-logo-design/
Book Cover Design Training with Canva - Beginner to Pro
https://freewebcart.com/book-cover-design-training-with-canva-beginner-to-pro/
Complete Google Slides Course - Create Stunning Slides
https://freewebcart.com/complete-google-slides-course-create-stunning-slides/
GoF Design Patterns - Complete Course with Java Examples
https://freewebcart.com/gof-design-patterns-complete-course-with-java-examples/
SDET C#: Test Automation From Scratch - Detailed Guide
https://freewebcart.com/sdet-c-test-automation-from-scratch-detailed-guide/
Mastering English Idioms: Essential for ESL Communication
https://freewebcart.com/mastering-english-idioms-essential-for-esl-communication/
Campus Placements & Corporate Relations Excellence
https://freewebcart.com/campus-placements-corporate-relations-excellence/
Functional Programming + Lambdas, Method References, Streams
https://freewebcart.com/functional-programming-lambdas-method-references-streams/
Project Management with ChatGPT: Complete Guide
https://freewebcart.com/project-management-with-chatgpt-complete-guide/
Master Any Language with ChatGPT: Boost Your Language Skills
https://freewebcart.com/master-any-language-with-chatgpt-boost-your-language-skills/
Kotler's Strategic Marketing Management Case Examples
https://freewebcart.com/kotlers-strategic-marketing-management-case-examples/
Guesstimates & Business Consulting Case Analysis Excellence
https://freewebcart.com/guesstimates-business-consulting-case-analysis-excellence/
Master in Digital, Internet and Social Media Marketing
https://freewebcart.com/master-in-digital-internet-and-social-media-marketing/
Master in Digital Transformation Strategy & Digitalization
https://freewebcart.com/master-in-digital-transformation-strategy-digitalization/
Master in Product and Brand Management- FMCG, FMCD etc.
https://freewebcart.com/master-in-product-and-brand-management-fmcg-fmcd-etc/
Excellence in Problem Solving and Critical Thinking Skills
https://freewebcart.com/excellence-in-problem-solving-and-critical-thinking-skills/
How to make right career choices & choosing one for success
https://freewebcart.com/how-to-make-right-career-choices-choosing-one-for-success/
Mini MBA in Product Development and Management
https://freewebcart.com/mini-mba-in-product-development-and-management/
Master in End to End Solutions Design and Development
https://freewebcart.com/master-in-end-to-end-solutions-design-and-development/
Master in Systems Thinking
https://freewebcart.com/master-in-systems-thinking/
Professional Certificate in Marketing and Advertising
https://freewebcart.com/professional-certificate-in-marketing-and-advertising/
Professional Diploma in Administration Management
https://freewebcart.com/professional-diploma-in-administration-management/
Research Methodologies in Strategy and Product Development
https://freewebcart.com/research-methodologies-in-strategy-and-product-development/
Executive Diploma in Human Resources Strategy
https://freewebcart.com/executive-diploma-in-human-resources-strategy/
Professional Certificate of Executive Business Assistant
https://freewebcart.com/professional-certificate-of-executive-business-assistant/
Unity tutorial from scratch till infinity
https://freewebcart.com/unity-tutorial-from-scratch-till-infinity/
Professional Certificate in Procurement and Purchasing
https://freewebcart.com/professional-certificate-in-procurement-and-purchasing/
Chief Executive Officer (CEO) Program
https://freewebcart.com/chief-executive-officer-ceo-program/
Professional Certificate of Secretary
https://freewebcart.com/professional-certificate-of-secretary/
Professional Certificate: Digital Business & Unit Economics
https://freewebcart.com/professional-certificate-digital-business-unit-economics/
Excel Certification Exam Preparation: 4 Practice Tests 2024
https://freewebcart.com/excel-certification-exam-preparation-4-practice-tests-2024/
Professional Certificate of Agile and Scrum Business Analyst
https://freewebcart.com/professional-certificate-of-agile-and-scrum-business-analyst/
Mastering Online Electronics Shopping: Buy Smart, Save Big
https://freewebcart.com/mastering-online-electronics-shopping-buy-smart-save-big/
Mergers & Acquisitions Professional Certificate
https://freewebcart.com/mergers-acquisitions-professional-certificate/
Mind Power - Change Your Thought Process To Change Your Life
https://freewebcart.com/mind-power-change-your-thought-process-to-change-your-life/
Professional Certificate in Customer Experience Management
https://freewebcart.com/professional-certificate-in-customer-experience-management/
Discover a Goldmine of Ideas: Your Ultimate Guide
https://freewebcart.com/discover-a-goldmine-of-ideas-your-ultimate-guide/
Google Ads And Tiktok Ads Crash Course (Hindi/ Urdu)
https://freewebcart.com/google-ads-and-tiktok-ads-crash-course-hindi-urdu/
Register Company in UK Get paypal & Stripe Business Hindi
https://freewebcart.com/register-company-in-uk-get-paypal-stripe-business-hindi/
Configuración y Optimizacion de tu Página de Facebook 2023
https://freewebcart.com/configuracion-y-optimizacion-de-tu-pagina-de-facebook-2023/
Component Projects to Review Sensors & Internet of Thing IOT
https://freewebcart.com/component-projects-to-review-sensors-internet-of-thing-iot/
UML: The Most Complete Guide with Real-Life Examples
https://freewebcart.com/uml-the-most-complete-guide-with-real-life-examples/
Java Collections Framework + Generics, Lambdas & Stream API
https://freewebcart.com/java-collections-framework-generics-lambdas-stream-api/
NGINX, Apache, SSL Encryption - Certification Course
https://freewebcart.com/nginx-apache-ssl-encryption-certification-course/
Install NGINX, PHP, MySQL, SSL & WordPress on Ubuntu
https://freewebcart.com/install-nginx-php-mysql-ssl-wordpress-on-ubuntu/
TensorFlow Proficiency Exam: Hands-On Practice Questions
https://freewebcart.com/tensorflow-proficiency-exam-hands-on-practice-questions/
Beginners Bootcamp HTML CSS Coding for Website Development
https://freewebcart.com/beginners-bootcamp-html-css-coding-for-website-development/
AWS and Linode: The Ultimate Guide to Cloud Computing [IaaS]
https://freewebcart.com/aws-and-linode-the-ultimate-guide-to-cloud-computing-iaas/
Linode: Foundations of Web Server Security
https://freewebcart.com/linode-foundations-of-web-server-security/
Microsoft Excel 2024: Beginner to Excel Pro in only 6 hours
https://freewebcart.com/microsoft-excel-2024-beginner-to-excel-pro-in-only-6-hours/
Adobe Photoshop Course from Basic to Advacned for Graphics
https://freewebcart.com/adobe-photoshop-course-from-basic-to-advacned-for-graphics/
Pro Mastering Excel For Beginners
https://freewebcart.com/pro-mastering-excel-for-beginners/
Python Programming Beyond The Basics & Intermediate Training
https://freewebcart.com/python-programming-beyond-the-basics-intermediate-training/
The Python Programming A-Z Definitive Diploma
https://freewebcart.com/the-python-programming-a-z-definitive-diploma/
Oracle Primavera P6: Essentials Training for Project Success
https://freewebcart.com/oracle-primavera-p6-essentials-training-for-project-success/
The Python Developer Essentials Immersive Bootcamp for 2024
https://freewebcart.com/the-python-developer-essentials-immersive-bootcamp-for-2024/
Primavera P6 Unveiled: Step-by-Step Beginner's Training
https://freewebcart.com/primavera-p6-unveiled-step-by-step-beginners-training/
The Python Programming For Everyone Immersive Training
https://freewebcart.com/the-python-programming-for-everyone-immersive-training/
Intermediate Python Immersive Training Boost your career
https://freewebcart.com/intermediate-python-immersive-training-boost-your-caree
Adobe Photoshop CC for Photo Editing and Image Retouching
https://freewebcart.com/adobe-photoshop-cc-for-photo-editing-and-image-retouching/
Learn T-Shirt Design with Adobe Illustrator
https://freewebcart.com/learn-t-shirt-design-with-adobe-illustrato
Learn Blockchain and Cryptocurrency from Beginning
https://freewebcart.com/learn-blockchain-and-cryptocurrency-from-beginning/
Executive Diploma in Strategic Management
https://freewebcart.com/executive-diploma-in-strategic-management/
The Complete Motivation Course: Motivation for Your Success
https://freewebcart.com/the-complete-motivation-course-motivation-for-your-success/
The Complete Telecommuting Course - Remote Work - Work Life
https://freewebcart.com/the-complete-telecommuting-course-remote-work-work-life/
Personal Finance Education, Planning, Investing & Management
https://freewebcart.com/personal-finance-education-planning-investing-management/
The Complete Proofreading Course: Editing and Proofreading
https://freewebcart.com/the-complete-proofreading-course-editing-and-proofreading/
The Complete Nonverbal Communication Course - Body Language
https://freewebcart.com/the-complete-nonverbal-communication-course-body-language/
The Complete One Hour Perfect Posture Habits Course
https://freewebcart.com/the-complete-one-hour-perfect-posture-habits-course/
Master in Business Development and B2B Sales & Marketing
https://freewebcart.com/master-in-business-development-and-b2b-sales-marketing/
Residential Rental Property Tax Preparation 2022-2023
https://freewebcart.com/residential-rental-property-tax-preparation-2022-2023/
Public Speaking for Parents – Teach Your Kids to Present 1Hr
https://freewebcart.com/public-speaking-for-parents-teach-your-kids-to-present-1h
QBO-Class Tracking, Projects, Location Tracking, Tags, & Job
https://freewebcart.com/qbo-class-tracking-projects-location-tracking-tags-job/
Mindset for Success and Happiness - Complete Mindset Course
https://freewebcart.com/mindset-for-success-and-happiness-complete-mindset-course/
Mastering Ecommerce Accounting with QuickBooks Online
https://freewebcart.com/mastering-ecommerce-accounting-with-quickbooks-online/
Real Estate Investment & Finance
https://freewebcart.com/real-estate-investment-finance/
submitted by abjinternational to FreeUdemyCoupons [link] [comments]


2024.06.01 03:50 abjinternational 01-06-2024, don't miss out on Udemy Free Courses! Act fast, as coupons may expire, allowing you to access the courses for free

JavaScript OOP: Mastering Modern Object-Oriented Programming
https://freewebcart.com/javascript-oop-mastering-modern-object-oriented-programming/
How to become a Successful Software Programming Developer
https://freewebcart.com/how-to-become-a-successful-software-programming-develope
Design & Develop Unique Customer Value / Selling Proposition
https://freewebcart.com/design-develop-unique-customer-value-selling-proposition/
Master in Product Design & Development and Prototyping
https://freewebcart.com/master-in-product-design-development-and-prototyping/
Practical Fundamental Equity, Shares & Stock Analysis
https://freewebcart.com/practical-fundamental-equity-shares-stock-analysis/
Become a Successful IT Product Manager / Product Owner
https://freewebcart.com/become-a-successful-it-product-manager-product-owne
Master in Brand Strategy and Brand Management
https://freewebcart.com/master-in-brand-strategy-and-brand-management/
New Big, Small & Tiny Business Ideas Generation & Selection
https://freewebcart.com/new-big-small-tiny-business-ideas-generation-selection/
Master in Talent Acquisition by Skilled Interview Taking
https://freewebcart.com/master-in-talent-acquisition-by-skilled-interview-taking/
Excellence in Leadership- Effective Strategies for a Leader
https://freewebcart.com/excellence-in-leadership-effective-strategies-for-a-leade
Mastering Complexity in Problem Solving and Decision Making
https://freewebcart.com/mastering-complexity-in-problem-solving-and-decision-making/
Freelance Mastery with SmartPhone 3D Logo Design
https://freewebcart.com/freelance-mastery-with-smartphone-3d-logo-design/
Book Cover Design Training with Canva - Beginner to Pro
https://freewebcart.com/book-cover-design-training-with-canva-beginner-to-pro/
Complete Google Slides Course - Create Stunning Slides
https://freewebcart.com/complete-google-slides-course-create-stunning-slides/
GoF Design Patterns - Complete Course with Java Examples
https://freewebcart.com/gof-design-patterns-complete-course-with-java-examples/
SDET C#: Test Automation From Scratch - Detailed Guide
https://freewebcart.com/sdet-c-test-automation-from-scratch-detailed-guide/
Mastering English Idioms: Essential for ESL Communication
https://freewebcart.com/mastering-english-idioms-essential-for-esl-communication/
Campus Placements & Corporate Relations Excellence
https://freewebcart.com/campus-placements-corporate-relations-excellence/
Functional Programming + Lambdas, Method References, Streams
https://freewebcart.com/functional-programming-lambdas-method-references-streams/
Project Management with ChatGPT: Complete Guide
https://freewebcart.com/project-management-with-chatgpt-complete-guide/
Master Any Language with ChatGPT: Boost Your Language Skills
https://freewebcart.com/master-any-language-with-chatgpt-boost-your-language-skills/
Kotler's Strategic Marketing Management Case Examples
https://freewebcart.com/kotlers-strategic-marketing-management-case-examples/
Guesstimates & Business Consulting Case Analysis Excellence
https://freewebcart.com/guesstimates-business-consulting-case-analysis-excellence/
Master in Digital, Internet and Social Media Marketing
https://freewebcart.com/master-in-digital-internet-and-social-media-marketing/
Master in Digital Transformation Strategy & Digitalization
https://freewebcart.com/master-in-digital-transformation-strategy-digitalization/
Master in Product and Brand Management- FMCG, FMCD etc.
https://freewebcart.com/master-in-product-and-brand-management-fmcg-fmcd-etc/
Excellence in Problem Solving and Critical Thinking Skills
https://freewebcart.com/excellence-in-problem-solving-and-critical-thinking-skills/
How to make right career choices & choosing one for success
https://freewebcart.com/how-to-make-right-career-choices-choosing-one-for-success/
Mini MBA in Product Development and Management
https://freewebcart.com/mini-mba-in-product-development-and-management/
Master in End to End Solutions Design and Development
https://freewebcart.com/master-in-end-to-end-solutions-design-and-development/
Master in Systems Thinking
https://freewebcart.com/master-in-systems-thinking/
Professional Certificate in Marketing and Advertising
https://freewebcart.com/professional-certificate-in-marketing-and-advertising/
Professional Diploma in Administration Management
https://freewebcart.com/professional-diploma-in-administration-management/
Research Methodologies in Strategy and Product Development
https://freewebcart.com/research-methodologies-in-strategy-and-product-development/
Executive Diploma in Human Resources Strategy
https://freewebcart.com/executive-diploma-in-human-resources-strategy/
Professional Certificate of Executive Business Assistant
https://freewebcart.com/professional-certificate-of-executive-business-assistant/
Unity tutorial from scratch till infinity
https://freewebcart.com/unity-tutorial-from-scratch-till-infinity/
Professional Certificate in Procurement and Purchasing
https://freewebcart.com/professional-certificate-in-procurement-and-purchasing/
Chief Executive Officer (CEO) Program
https://freewebcart.com/chief-executive-officer-ceo-program/
Professional Certificate of Secretary
https://freewebcart.com/professional-certificate-of-secretary/
Professional Certificate: Digital Business & Unit Economics
https://freewebcart.com/professional-certificate-digital-business-unit-economics/
Excel Certification Exam Preparation: 4 Practice Tests 2024
https://freewebcart.com/excel-certification-exam-preparation-4-practice-tests-2024/
Professional Certificate of Agile and Scrum Business Analyst
https://freewebcart.com/professional-certificate-of-agile-and-scrum-business-analyst/
Mastering Online Electronics Shopping: Buy Smart, Save Big
https://freewebcart.com/mastering-online-electronics-shopping-buy-smart-save-big/
Mergers & Acquisitions Professional Certificate
https://freewebcart.com/mergers-acquisitions-professional-certificate/
Mind Power - Change Your Thought Process To Change Your Life
https://freewebcart.com/mind-power-change-your-thought-process-to-change-your-life/
Professional Certificate in Customer Experience Management
https://freewebcart.com/professional-certificate-in-customer-experience-management/
Discover a Goldmine of Ideas: Your Ultimate Guide
https://freewebcart.com/discover-a-goldmine-of-ideas-your-ultimate-guide/
Google Ads And Tiktok Ads Crash Course (Hindi/ Urdu)
https://freewebcart.com/google-ads-and-tiktok-ads-crash-course-hindi-urdu/
Register Company in UK Get paypal & Stripe Business Hindi
https://freewebcart.com/register-company-in-uk-get-paypal-stripe-business-hindi/
Configuración y Optimizacion de tu Página de Facebook 2023
https://freewebcart.com/configuracion-y-optimizacion-de-tu-pagina-de-facebook-2023/
Component Projects to Review Sensors & Internet of Thing IOT
https://freewebcart.com/component-projects-to-review-sensors-internet-of-thing-iot/
UML: The Most Complete Guide with Real-Life Examples
https://freewebcart.com/uml-the-most-complete-guide-with-real-life-examples/
Java Collections Framework + Generics, Lambdas & Stream API
https://freewebcart.com/java-collections-framework-generics-lambdas-stream-api/
NGINX, Apache, SSL Encryption - Certification Course
https://freewebcart.com/nginx-apache-ssl-encryption-certification-course/
Install NGINX, PHP, MySQL, SSL & WordPress on Ubuntu
https://freewebcart.com/install-nginx-php-mysql-ssl-wordpress-on-ubuntu/
TensorFlow Proficiency Exam: Hands-On Practice Questions
https://freewebcart.com/tensorflow-proficiency-exam-hands-on-practice-questions/
Beginners Bootcamp HTML CSS Coding for Website Development
https://freewebcart.com/beginners-bootcamp-html-css-coding-for-website-development/
AWS and Linode: The Ultimate Guide to Cloud Computing [IaaS]
https://freewebcart.com/aws-and-linode-the-ultimate-guide-to-cloud-computing-iaas/
Linode: Foundations of Web Server Security
https://freewebcart.com/linode-foundations-of-web-server-security/
Microsoft Excel 2024: Beginner to Excel Pro in only 6 hours
https://freewebcart.com/microsoft-excel-2024-beginner-to-excel-pro-in-only-6-hours/
Adobe Photoshop Course from Basic to Advacned for Graphics
https://freewebcart.com/adobe-photoshop-course-from-basic-to-advacned-for-graphics/
Pro Mastering Excel For Beginners
https://freewebcart.com/pro-mastering-excel-for-beginners/
Python Programming Beyond The Basics & Intermediate Training
https://freewebcart.com/python-programming-beyond-the-basics-intermediate-training/
The Python Programming A-Z Definitive Diploma
https://freewebcart.com/the-python-programming-a-z-definitive-diploma/
Oracle Primavera P6: Essentials Training for Project Success
https://freewebcart.com/oracle-primavera-p6-essentials-training-for-project-success/
The Python Developer Essentials Immersive Bootcamp for 2024
https://freewebcart.com/the-python-developer-essentials-immersive-bootcamp-for-2024/
Primavera P6 Unveiled: Step-by-Step Beginner's Training
https://freewebcart.com/primavera-p6-unveiled-step-by-step-beginners-training/
The Python Programming For Everyone Immersive Training
https://freewebcart.com/the-python-programming-for-everyone-immersive-training/
Intermediate Python Immersive Training Boost your career
https://freewebcart.com/intermediate-python-immersive-training-boost-your-caree
Adobe Photoshop CC for Photo Editing and Image Retouching
https://freewebcart.com/adobe-photoshop-cc-for-photo-editing-and-image-retouching/
Learn T-Shirt Design with Adobe Illustrator
https://freewebcart.com/learn-t-shirt-design-with-adobe-illustrato
Learn Blockchain and Cryptocurrency from Beginning
https://freewebcart.com/learn-blockchain-and-cryptocurrency-from-beginning/
Executive Diploma in Strategic Management
https://freewebcart.com/executive-diploma-in-strategic-management/
The Complete Motivation Course: Motivation for Your Success
https://freewebcart.com/the-complete-motivation-course-motivation-for-your-success/
The Complete Telecommuting Course - Remote Work - Work Life
https://freewebcart.com/the-complete-telecommuting-course-remote-work-work-life/
Personal Finance Education, Planning, Investing & Management
https://freewebcart.com/personal-finance-education-planning-investing-management/
The Complete Proofreading Course: Editing and Proofreading
https://freewebcart.com/the-complete-proofreading-course-editing-and-proofreading/
The Complete Nonverbal Communication Course - Body Language
https://freewebcart.com/the-complete-nonverbal-communication-course-body-language/
The Complete One Hour Perfect Posture Habits Course
https://freewebcart.com/the-complete-one-hour-perfect-posture-habits-course/
Master in Business Development and B2B Sales & Marketing
https://freewebcart.com/master-in-business-development-and-b2b-sales-marketing/
Residential Rental Property Tax Preparation 2022-2023
https://freewebcart.com/residential-rental-property-tax-preparation-2022-2023/
Public Speaking for Parents – Teach Your Kids to Present 1Hr
https://freewebcart.com/public-speaking-for-parents-teach-your-kids-to-present-1h
QBO-Class Tracking, Projects, Location Tracking, Tags, & Job
https://freewebcart.com/qbo-class-tracking-projects-location-tracking-tags-job/
Mindset for Success and Happiness - Complete Mindset Course
https://freewebcart.com/mindset-for-success-and-happiness-complete-mindset-course/
Mastering Ecommerce Accounting with QuickBooks Online
https://freewebcart.com/mastering-ecommerce-accounting-with-quickbooks-online/
Real Estate Investment & Finance
https://freewebcart.com/real-estate-investment-finance/
submitted by abjinternational to udemyfreebies [link] [comments]


2024.06.01 03:17 citapics My Feature Script ‘Deathwish In A Bottle’ Scored an 8/10 on The Blacklist

hey all - just wanted to come and share this cool news, my screenplay ‘Deathwish In A Bottle’ scored an 8/10 on The Blacklist today.
this is my first time getting an evaluation from The Blacklist, and I am pretty pumped about it.
I am 20 now. I started working on this script when I was a senior in high school at 17, then, ‘DWIAB’ started life as a short script. after I graduated from high school, I started to turn it into a feature at 18. from July ‘22 to April ‘23, I wrote this script into a 115p screenplay, then I just let it sit for a long time - in February 2024, at 19, I decided to return to the script, and give it a page-one rewrite. I condensed it from 115p to 99p and that was the last time I touched it. final draft that I turned into The Blacklist for an evaluation.
TITLE: ‘DEATHWISH IN A BOTTLE’
LOGLINE: After Bryan, an anxiety-riddled, parentally burdened teenager stumbles upon this powerful wish-maker, his selfish actions plague the local high school - causing widespread paranoia across his hometown, Brewster.
OVERALL - 8/10
PREMISE - 8/10
PLOT - 8/10
CHARACTER - 8/10
DIALOGUE - 7/10
SETTING - 7/10
Era: Modern
Genre: Horror, Supernatural Thriller
Logline: A teenager finds a magic lamp that grants him wishes - at the cost of a human life.
Strengths
"Deathwish in a Bottle" is a fascinating, frightening script about what happens when ultimate power is placed in the hands of someone without ultimate wisdom. The high concept is simple but intriguing, and the script does some very entertaining things with it. A key to the story's success is Bryan himself, a complex, morally conflicted antihero. It doesn't take long for Bryan to realize the power he possesses and the consequences, and we are on the edge of our seats, engaged in seeing how this will turn out. The "Superman Returns" motif is interesting and well-integrated. While not everyone will get that the protagonist's name is likely a reference to Bryan Singer's underrated adaptation of Jerry Siegel and Joe Shuster's character, the more obvious references are effective. Of particular interest is the poignant memory Bryan's father reciting the iconic fatheson speech Jor-El said to young Superman and later Superman to Jason. It's possibly the most stirring scene in the script.
Weaknesses
The tone is inconsistent, sometimes wildly so, and this can get to be a distraction. This is a scary story, and there is tragedy and pathos. Yet we're not always sure how seriously we should take what, from scene to scene. Sometimes it's a problem within a single scene. This is no more evident than in Bryan's session with Doctor Ottman. Ottman has an important point to make about guilt and trying to do better, and it's a serious message Bryan has to hear. Yet for his example, Doctor Ottman cites Jason Lee's Earl Hickey as a real person he a actually knew himself. Those familiar with "My Name is Earl" might find this a bizarre choice, and it would take them out of what would otherwise be one of the script's most dramatic scenes. Sam Parker is barely a character in his own right. If he was introduced and developed more before his death, then it would have much more impact. Even if Bryan himself doesn't have a relationship with Sam, the audience still could.
Prospects
"Deathwish in a Bottle" is a fascinating and original script that does something original and unexpected with the wish-granting trope. The script has horror, comedy, and drama, and while the tone isn't always balanced, the genre blend is intriguing and a hook in itself. The script features, for some reason, a Silent Bob cameo. This isn't really necessary, but if Kevin Smith actually agreed to it, that might be some interesting word of mouth. Bryan is an complex antihero who always has our attention. This could be a breakout role for the right young actor.
here’s a link to the blacklist page: https://blcklst.com/scripts/156781
Thank You! I encourage everyone to write!
submitted by citapics to Screenwriting [link] [comments]


2024.06.01 03:03 CertainJump1784 Reposting Yandere Types to Reddit (PART 1)

A yandere sees everyone surrounding the guy as if they're going after the guy, be it male or female, and she will actually attack people to get what she wants, in some cases gorily so, in other cases just name-calling or hiding their possessions somewhere or whatever.
Many yandere are introduced as looking normal and cute. Lovable. Extremely sympathetic. But that's often because they're only shown interacting with their love interest. Once a third characters gets into the equation she starts showing her true colors. That is, an yandere character starts crazy, she doesn't go crazy, she was crazy from the beginning but nobody knew.
Note that the above isn't necessarily true. Some yandere are undeniably nuts from the start. Why a yandere has become insane can vary: she might be a broken victim of some horrible event, or she might simply have a natural inclination to become a serial killer. In any case, as long as she has a mentally sick kind of love she's a yandere.
(the most common type of yandere is violent and jealous, but there are other types of yandere written further below)

Yandere Word Meaning

The yan in the word yandere ヤンデレ comes from the verb yanderu 病んでる which means "to be sick (mentally)." This is slightly different from the verb yamu 病む which means "to be sick (generally)," despite yanderu 病んでる being also considered a contraction of the verb yamu in the te-iru form yandeiru 病んでいる.
A somewhat related word is the word koiyamai 恋病, meaning "lovesick" and written with the kanji for love (koi 恋) and sickness (yamai 病)Word Meaning

Yangire ヤンギレ

A yangire ヤンギレ character is an yandere devoid of love and filled with rage. Which is some pretty bad combination considering the yan of yandere means "mentally sick." So now you have someone who is mentally sick and that has snapped.
A common type of yangire character is the one that has gone through some sort of trauma and then snaps and goes on a killing spree after getting triggered. Generally speaking, yangire characters have no faith left for the world so they don't care much about killing or getting killed. They just want to watch the world burn.
As one would expect, a yangire character doesn't necessarily have a romantic interest (Please Remember that they doesn't necessarily involves love and romance means that IT IS JUST OPTIONAL CHARACTERISTICS because Yangires could have things to do with love or romance at all. This is a notes from me).
A yandere would have one, and would go around killing everyone around her lover in a very jelly genocide, but a yangire is a strong independent character who needs no romantic interest in order to start a massacre. Anyway, yangire characters are pretty much crazy and crazy violent. All you need to know is that they are crazier than yandere characters and that ought to say a lot.

Types of Yandere

In the west, yandere is basically always associated with the jealous, violent type of yandere, which is the most common. However, given that the word just means "mentally sick and in love," there are other types of yandere which would be recognized only in the Japanese speaking community.
Because they're just Japanese nouns followed by the suffix gata 型, meaning "model," as in "[car] model." So where one would say "a XXX-ing yandere" in English to say what the yandere does, in Japanese there's a noun for that, so it becomes XXX-gata yandere, "yandere of type XXX."
A single yandere can (and normally will) fit in multiple of these types at a time. In particular, Yuno Gasai fits a dozen of them, which is why she's an ideal example of yandere.
All types of yandere can be male or female, straight, gay, lesbian, etc. but the descriptions below assume a female yandere and that "you" are their male victim love interest;
Anyway, here's the list: (sorted by degree of insanity, ascending, see diagram)

mugai-gata 無害型

Harmless type.
"As long as he's happy, I'm happy."
The most harmless type of yandere, the one where she's fallen in love in an unhealthy, obsessive way, but she doesn't do anything insane about it. She'll try hard to become your girl, but won't harm anybody in the way. If you get a girlfriend, she won't attack you two, she'll be happy you found happiness, and maybe still have hope that you choose her in the end.

kanchigai-gata 勘違い型

Wrong idea type.
"He gave me an eraser... this must mean he loves me!"
She gets the wrong idea when you do something in order to match her expectations. If you say you don't love her, she'll think you're lying because of you don't want to hurt her or something. If you do something out of kindness to her, she'll think it's out of love. And so on.

shuuchaku-gata 執着型

Obsession type.
"I sent you 50 messages, why didn't you answer? Where were you? What were you doing?"
Tries to learn everything about you. Personal info, hobbies, routine, etc. Sends regular messages to check on you, asks why you haven't answered if you didn't, wants to know what you're doing always. All the time. And, if possible, walks around with you all the time too.
The obsession type doesn't necessarily want to monopolize you. She'll let you hang around with friends, etc. but wants to know everything you do. She probably wants to go with you, too. If she can't go somewhere with you, she might stalk you.
If she learns a girl is too close to you, she might attack.

sutookaa-gata ストーカー型

Stalker type.
Follows you around, often without you knowing. May be in broad daylight or at night, when you're walking alone on the streets. Maybe even online. A girl of this type is also often of the obsessive type.

dokusen-gata 独占型

Monopoly type. (This is the most common type.)
"Who is that person you were talking to?"
She wants to monopolize you. Will ask who you talk to and hang with, in extreme cases won't let you be with anyone else, not even your friends. This type of behavior is unfortunately common in real life. It displays insecurities and lack of trust in the relationship which might develop into much worse yandere behavior.

ison-gata 依存型

Dependence type. ("dependence" as in addiction, alcohol dependence, chemical, etc.)
"No, don't leave me! Please! I can't live without you!"
Can't live without you. Begs you to not leave hethrow her away. Says she will die if you go away. May lose will to do anything if you aren't watching. If you do leave, she might go full crazy and end up doing something crazy like going on a murderous rampage or something.

touei-gata 投影型

Projection type.
"You're just like him"
After her former love turned out to be a completely different person than she loved, or got a girlfriend, or died, or something like that, and she can no longer stay with him, she searched for someone who was just like what her love was, and she found you.
This type of of yandere is very innocent at first, but if she's given power to dominate her new beloved, she might end up trying to make him more and more like what her old interest was. For example, wearing the same things, doing the same things, etc.
Sometimes, she might project her ideal lover not on someone else but on same guy. That is, she might say "you are not him, he does this," to you even though you actually are him and you don't do "this."

shoushitsu-gata 消失型

Disappearance type. (This has nothing to do with Haruhi Suzumiya)
"He will never love someone like me... why exist?"
She loves you, maybe you know that, maybe you don't, but unknown this gives her a crushing depression. She think you'll never love her and she has no chance, but she can't stop her unhealthy feelings of love. She thinks you're too good for her, or that she's too worthless for you. This makes her slowly fade away, disappear from your life. Until she completely disappears forever (kills herself).
This is an atypical yandere since it has so little effect on other characters' lives.

shuumatsu-gata 終末型

Final type. ("final" as in "the end," not as in "final form" or "final fantasy" whatever that final means)
"I don't need a world where he doesn't exist."
After learning you died, she loses purposes in life. The world for her was you, and you're now gone. What this results vary. Most of the time, she becomes broken emotionally, as expected. She might also kill herself. Or, sometimes, she might become a terrorist and destroy the world that let you die, or just go on revenge serial killing or something."

DV-gata DV型

Domestic Violence type.
"It hurts? That's your fault! Next time learn your lesson and stop looking at other girls!"
When jealous, feeling ignored, etc. uses violence against you. She'll beat you and say it's your fault. This can be either discharging pent-up rage through violence and you just happen to be her favorite punching bag, or deliberately punishing you for doing something she didn't like.
Both cases, unfortunately, are also common in real life.

bouryoku-gata 暴力型

Violence type.
Another name for the "domestic violence" type above. She "uses violence" (bouryoku wo furu 暴力をふる) toward you.

sokubaku-gata 束縛型

Restraints type.
"Let`s stay together forever! You'll never leave my side, not ever again!"
She wants to be with you always, and always, and always, AND ALWAYS, AND ALWAYS. And that means she'll probably kidnap you and lock you into her house so you're forced to stay with her.
There are variations, some lighter, some worse, but the general idea is that she wants you two to be inseparable.

mousou-gata 妄想型

Delusion type.
Similar to the "wrong idea" type above, but far worse. When her insane love is unrequited (for obvious reasons), and you start literally running away from the crazy bitch, she'll think it's because you're embarrassed, and not because you don't want her. Her love distorts the reality she perceives. She sees a bunch of delusions instead.
The delusion type may also be in denial something unpleasant happened. She'll just forget it happened. Her memories may also be replaced with delusions: she'll remember you being extremely nice to her when you were indifferent, you saying you liked her before you even met, or other girls rubbing themselves on you like cheap sluts when all they did was saying "good morning.

jishou-gata 自傷型

Self-harm type.
"Hey... look at me... look at me... look, there's so much blood coming out..."
She harms herself, cutting wrists, etc. in order to get your attention. This often happens when she's ignored. The "dependence" type might evolve into this if she is abandoned.
There are two sub-types to this.
First, the one where she harms herself in secret and has you notice her injuries, then she says "it's nothing to worry about" hoping you worry about it more. This is usually something light like a knee bruise, etc.
Second, the one where she harms herself in your face as a way to say "I'll kill myself if you leave me," forcing you to stay by her side by guilt.

haijo-gata 排除型

Removal type.
"You don't need other people. You have me."
She will remove from your life everyone she thinks you don't need. Which means everyone else. This can include things like excluding your contacts and messages to even murdering everybody who approaches.
This type of yandere has two sub-types:
First, the one that removes people secretly. She sees you hanging with a girl, the next day that girl has mysteriously disappeared. You, a main character, are probably as clueless as a sheet of sudoku in blank about this incident, and the next several incidents like it.
Second, the one that removes people openly. This also ranges from removing messages to killing people. She might be expecting you agree with her, "yeah, you're right, I don't need other people," or she might just want to show you what she's capable of.

shinjuu-gata 心中型

Double Suicide Type
"Let's die together!"
Why be always together in life if you can be forever together for all eternity? This type of yandere will propose what no sane person would: let's die!
Sadly, suicide pacts are a thing. Double suicide, lovers' suicide, too, is a thing. One of the most famous pieces ever, Romeo & Juliet, (spoilers) sort of ended up in a double suicide.
One thing different in an yandere double suicide is that, often, you don't really want to suicide. It's more like she wants you both dead and she'll kill you then herself. Although there are also actual consensual attempted double suicides involving yandere.

jiko-gisei-gata 自己犠牲型

Self-Sacrifice type.
"If it's for you I wouldn't mind dying!"
She'd make any sacrifice for you, as long as it means getting you to love her. She doesn't even mind dying for you or fighting bloody battles, sustaining multiple injuries, etc. as long as it means staying with you.
Unlike the self-harm type, the self-sacrifice type isn't seeking attention with her suicidal behavior. Instead, she wants to make herself useful and support the one she loves.
This is easier to visualize in anime where fighting monsters, etc. is normal. However, this kind of sickness also exists in real life. Some people do sacrifice themselves for a beloved one in an extremely unhealthy and unrewarding way, just because they "love" them.

suuhai-gata 崇拝型

Worship type.
"I'll do anything for you! I'll even kill for you! Please use me however you want!"
She worships you and will do anything for you. Sometimes even without you asking. And more: she doesn't even mind if you love her or not, or what will happen to her. Killing, dying, committing crimes, losing respect of others, she'll do anything it means providing support to your infinite greatness.
This is one of the least-harmful type of yandere since she would never do anything to harm you and will never be in your way. Nonetheless, it's also one of the most depressing types; it makes you feel sorry for the yandere, who thinks of herself less like a person and more like a tool who might get thrown away if she's not useful enough.
The difference between the "worship" type and the "self-sacrifice" type is that the "worship" type is also like the "disappearance" type. The "self-sacrifice" type wants to be useful so she can be loved, the "worship" type doesn't mind if she is not loved back, in fact, she probably thinks she is not worth being loved by the delusive greatness she considers you.
She wouldn't, for example, attack your girlfriend or other girls out of jealousy, but she might attack a girl approaching you because she thinks the girl is stepping out of her boundaries and being presumptuous by daring talk to your greatness without proper respect.

choukyou-gata 調教型

Training type.
"Say you love me... come on, say it. Say you love me. SAY YOU LOVE ME! Good boy! Here's your reward."
(the word choukyou was once only about "training [animals]" or "breaking [animals]." In modern times, it's also used in BDSM contexts, "[master] training [slave]." It has nothing to do with training for sports.)
She'll break you into loving her. Sometimes using torture, a punishment/reward system, brainwashing, etc. This probably involves you getting kidnapped and forced into it, although there might be more subtle ways to accomplish this.

koritsu yuudou-gata 孤立誘導型

Loneliness Induction type.
"Shhh... it's ok. I'm here. You don't need anyone else. You can just count on me."
She will make, induce, you to feel or be alone. By spreading malicious rumors about you that make others alienate you, by murdering your friends and family, etc. Then she'll jump in and present herself as the only one you can count on when you're most fragile mentally and in need of company.
Inducing things that don't make you feel lonely but give some sort of mental damage, trauma, also count as this type. Conversely, if your friends and family get killed on their own and you're alone but she had nothing to do with it, it's not the same thing since she didn't induce it, although an yandere might abuse your condition to get closer to you.
This type is similar to the "dependence" type, except it's not the yandere that's to become dependent on you, it's you that's to become dependent on the yandere.

kyouki-gata 猟奇型

Bizarre-Seeking Type.
"I love you, so... can you give me your fingernails? I want them so I can always have a part of you with me!"
Undeniably the worst type of yandere, she will murder you, and not by accident, not by jealousy, not by revenge. She will murder you because she loves you. And then she'll keep your rotting corpse on bed or preserved inside a glass because there's no way she'd throw you away.
In a sense sane people are better off not even trying to understand, the bizarre-seeking type of yandere is purely insane, mad way beyond explanation.
The word kyouki, used in the type's name, is normally associated with disturbing imagery involving gore, blood and worse stuff. It's also related to "grotesque" art, guro グロ, which's dubbed "pornography involving gore" despite the fact nobody in their sane mind can figure out how the fuck can someone even "fap to this."
Likewise, nobody in their sane mind can relate to the grotesque love of bizarre-seeking yandere. Ranging from murder, mutilation, and maybe something ever worse us mere mortals can't even begin to imagine, their bizarre displays of love can only be summed up by: "what the actual fuck?"

References : https://www.japanesewithanime.com/2016/07/tsundere-kuudere-yandere-meaning.html

submitted by CertainJump1784 to yandere [link] [comments]


2024.06.01 02:22 EnPa55ant Trying to apply for a new job. Thoughts on my resume?

Trying to apply for a new job. Thoughts on my resume? submitted by EnPa55ant to jobs [link] [comments]


2024.06.01 00:43 KoaladeVil Shows in April 2025

I just made a post the other day about going New York/Boston this summer and I have that all planned out now! But now I am tempted to take a trip in the spring with all the new shows coming. I probably wouldn’t go until mid April though and I worry about some of the shows not being there. The shows I am interested in seeing are: Tammy Faye (tickets go through the end of March), Gypsy (tickets available in April), Old friends (should be there in April) and Romeo + Juliet (tickets go through January). Do you think that Tammy and Faye and R+J will make it to April?
submitted by KoaladeVil to Broadway [link] [comments]


2024.06.01 00:38 smartybrome List of FREE and Best Selling Discounted Courses

Udemy Free Courses for 01 June 2024

Note : Coupons might expire anytime, so enroll as soon as possible to get the courses for FREE.
GET MORE FREE ONLINE COURSES WITH CERTIFICATE – CLICK HERE
submitted by smartybrome to udemyfreeebies [link] [comments]


2024.06.01 00:36 smartybrome List of FREE and Best Selling Discounted Courses

Udemy Free Courses for 01 June 2024

Note : Coupons might expire anytime, so enroll as soon as possible to get the courses for FREE.
GET MORE FREE ONLINE COURSES WITH CERTIFICATE – CLICK HERE
submitted by smartybrome to udemyfreebies [link] [comments]


2024.05.31 23:28 tempmailgenerator Creating Directories in Python with Enhanced Flexibility

Effortless Directory Management in Python

In the realm of file system operations, Python stands out for its ease and efficiency, particularly when it comes to directory management. The task of creating a directory, especially when the parent directories may not exist, is a common scenario faced by developers. This operation, while seemingly straightforward, involves considerations regarding the file system's structure and the handling of potential errors. Python's standard library offers tools that make this task not only possible but also remarkably simple. Understanding these tools is crucial for developers looking to manage file systems effectively, ensuring that their applications can interact with and manipulate the file system seamlessly.
The ability to create directories dynamically allows for more flexible and robust applications. Whether you're developing a complex software system that requires generating logs in a structured manner, or a simple script that organizes files by date, Python's approach to directory creation is both powerful and user-friendly. By leveraging Python's built-in modules, developers can ensure that their code remains clean and efficient, avoiding common pitfalls associated with file system operations. This introduction will explore the methodologies and best practices for creating directories in Python, highlighting the importance of understanding the underlying mechanisms that make Python a top choice for developers worldwide.
Command Description
os.makedirs() Creates a directory at the specified path. Allows for the creation of missing parent directories.
Pathlib.Path.mkdir() Offers a higher-level, object-oriented approach to directory creation. Also supports creating missing parent directories.

Deep Dive into Directory Creation with Python

In the vast expanse of file system operations, Python shines brightly with its straightforward and powerful capabilities, particularly in the realm of directory creation. The necessity to create a directory, and often to ensure the existence of its parent directories, is a frequent requirement in many programming tasks. This is crucial in scenarios where the software needs to save output files, logs, or other data in a structured file system hierarchy. Python's standard library, through modules like os and pathlib, provides robust solutions that abstract away the complexities involved in such file system interactions. The os.makedirs() function, for instance, not only creates the target directory but also all missing parent directories in the specified path, if necessary. This eliminates the need for manual checks and directory creation loops, thereby simplifying the code and reducing the potential for errors.
The pathlib module, introduced in Python 3.4, further enhances directory creation with its object-oriented approach. Utilizing Path.mkdir(), developers can achieve the same functionality as os.makedirs() but with an interface that many find more intuitive and pythonic. Path.mkdir() allows for the creation of a directory and, optionally, all its parent directories with simple method calls and parameters. This not only makes the code more readable but also aligns with modern Python practices that emphasize simplicity and efficiency. Whether automating data organization, setting up new project structures, or managing application logs, understanding and utilizing these tools effectively can significantly enhance a developer's productivity and the reliability of their applications.

Using os module to Create Directories

Python example
import os path = "path/to/directory" os.makedirs(path, exist_ok=True) 

Using pathlib to Create Directories

Python demonstration
from pathlib import Path path = Path("path/to/directory") path.mkdir(parents=True, exist_ok=True) 

Insights into Python Directory Management

Managing directories in Python is a fundamental aspect of file system operations, critical for developers who need to organize data, configure project structures, or manage logs. Python's built-in libraries, such as os and pathlib, offer powerful tools that simplify these tasks. The ability to automatically create all necessary parent directories when creating a new directory streamlines development processes and reduces the chance for errors. This functionality is essential for developing applications that need to operate across different operating systems and environments, where directory structures might vary significantly.
The introduction of the pathlib module in Python 3.4 marked a significant improvement in how developers interact with the file system. It provided an object-oriented interface to file system paths, making it more intuitive to work with directories and files. This is particularly beneficial in complex projects where readability and maintainability of the code are paramount. Moreover, Python's approach to directory management, with its emphasis on simplicity and efficiency, aligns with the language's overall philosophy. It allows developers to focus more on implementing functionality rather than dealing with the intricacies of file system manipulation.

FAQs on Python Directory Creation

  1. Question: Can Python create directories on any operating system?
  2. Answer: Yes, Python's directory management functions are cross-platform, working on Windows, Linux, and macOS.
  3. Question: What happens if the directory already exists?
  4. Answer: Using os.makedirs() with exist_ok=True or Path.mkdir() with parents=True, exist_ok=True prevents raising an error if the directory exists.
  5. Question: Is it possible to create a directory with specific permissions?
  6. Answer: Yes, both os.makedirs() and Path.mkdir() allow setting permissions with the mode parameter.
  7. Question: How do I delete a directory with Python?
  8. Answer: Use os.rmdir() for empty directories or shutil.rmtree() for non-empty directories.
  9. Question: Can I create a temporary directory with Python?
  10. Answer: Yes, the tempfile module provides a TemporaryDirectory() context manager for this purpose.
  11. Question: How does Python handle directory creation failures?
  12. Answer: Python will raise an exception, such as FileExistsError or PermissionError, depending on the cause of the failure.
  13. Question: Is it necessary to import external libraries to manage directories in Python?
  14. Answer: No, Python's standard library includes all necessary functions for directory management.
  15. Question: How do I check if a directory exists before creating it?
  16. Answer: Use os.path.exists() or Path.exists() to check the existence of a directory.
  17. Question: Can I create directories recursively?
  18. Answer: Yes, both os.makedirs() and Path.mkdir() support recursive directory creation.

Mastering Directory Operations in Python

In conclusion, Python's comprehensive standard library provides developers with efficient and straightforward tools for directory creation and management. The os and pathlib modules, in particular, offer powerful functions that can handle even the most complex file system tasks with ease. Whether you're a novice programmer learning the basics of file operations or an experienced developer working on a large-scale project, Python's directory management capabilities are designed to meet your needs. These features not only enhance productivity but also contribute to cleaner, more maintainable code. As file system operations are a fundamental part of almost all programming projects, mastering these capabilities in Python will undoubtedly be a valuable skill in any developer's toolkit.
https://www.tempmail.us.com/en/mkdicreating-directories-in-python-with-enhanced-flexibility
submitted by tempmailgenerator to MailDevNetwork [link] [comments]


2024.05.31 21:58 Present_Position9222 React: A Balanced Look at its Strengths and Weaknesses

React is a JavaScript library created by Facebook and is a library and tool for building user interface components based on JavaScript. Although React is a library rather than a language, it is widely used in web development. This library first appeared in May 2013 and is now one of the most popular front-end libraries for web development.
React is open source and aims to simplify the complex process of building interactive user interfaces. Imagine a user interface that React builds as a collection of components, each responsible for the output of a small piece is a reusable piece of HTML code.
It is also a declarative and component-based library that allows developers to build reusable UI components and follows a Virtual DOM (Document Object Model) approach that optimizes rendering performance by minimizing DOM updates. React is fast and works well with other tools and libraries. We use React in different parts of our website
B. What does React Js do?
Typically, you request a webpage by typing its URL into your web browser. Your browser then sends a request for that webpage, which your browser renders. If you click a link on that webpage to go to another page on the website, a new request is sent to the server to get that new page. This back-and-forth loading pattern between your browser (the client) and the server continues for every new page or resource you try to access on a website. This typical approach to loading websites works just fine, but consider a very data-driven website. The back and forth loading of the full webpage would be redundant and
create a poor user experience. Additionally, when data changes in a traditional JavaScript application, it requires manual DOM manipulation to reflect these changes. You must identify which data changed and update the DOM to reflect those changes, resulting in a full page reload.
React takes a different approach by letting you build what’s known as a single-page application (SPA). A single-page application loads only a single HTML document on the first request. Then, it updates the specific portion, content, or body of the webpage that needs updating using JavaScript. This pattern is known as client-side routing because the client doesn’t have to reload the full webpage to get a new page each time a user makes a new request. Instead, React intercepts the request and only fetches and changes the sections that need changing without having to trigger a full page reload. This approach results in better performance and a more dynamic user experience. React relies on a virtual DOM, which is a copy of the actual DOM. React’s virtual DOM is immediately reloaded to reflect this new change whenever there is a change in the data state. After which, React compares the virtual DOM to the actual DOM to figure out what exactly has changed. React then figures out the least expensive way to patch the actual DOM with that update without rendering the actual DOM. As a result, React’s components and UIs very quickly reflect the changes since you don’t have to reload an entire page every time something updates.
react.js C. Why React
React’s popularity today has eclipsed that of all other front-end development frameworks. Here is why:
· Easy creation of dynamic applications: React makes it easier to create dynamic web applications because it requires less coding and offers more functionality, as opposed to JavaScript, where coding often gets complex very quickly.
· Improved performance: React uses Virtual DOM, thereby creating web applications faster. Virtual DOM compares the components’ previous states and updates only the items in the Real DOM that were changed, instead of updating all of the components again, as conventional web applications do.
· Reusable components: Components are the building blocks of any React application, and a single app usually consists of multiple components. These components have their logic and controls, and they can be reused throughout the application, which in turn dramatically reduces the application’s development time.
· Unidirectional data flow: React follows a unidirectional data flow. This means that when designing a React app, developers often nest child components within parent components. Since the data flows in a single direction, it becomes easier to debug errors and know where a problem occurs in an application at the moment in question.
· Small learning curve: React is easy to learn, as it mostly combines basic HTML and JavaScript concepts with some beneficial additions. Still, as is the case with other tools and frameworks, you have to spend some time to get a proper understanding of React’s library.
· It can be used for the development of both web and mobile apps: We already know that React is used for the development of web applications, but that’s not all it can do. There is a framework called React Native, derived from React itself, that is hugely popular and is used for creating beautiful mobile applications. So, in reality, React can be used for making both web and mobile applications.
· Dedicated tools for easy debugging: Facebook has released a Chrome extension that can be used to debug React applications. This makes the process of debugging React web applications faster and easier.
· The above reasons more than justify the popularity of the React library and why it is being adopted by a large number of organizations and businesses. Now let’s familiarize ourselves with React’s features.
D. React Js Advantages
React JS is actively maintained by Meta and a community of skilled developers and companies. It is known to be fast, scalable, simple, and highly advantageous to be used to create large web applications where we can change data without reloading the page. In this article, we will talk about its various advantages.
D.1 Effortless Maintenance
Creating large applications with multiple integrations is a complex task; however, maintaining it with changing business requirements can be more complicated and expensive. But you don’t need to worry, as React JS got your back with its modular and flexible architecture, leading to modernizing each component independently without affecting others. In addition, objects defined for a particular element can be reassigned to other components to reduce the developer’s effort. As a result, less time is consumed in modernization, code is maintained, and all this is performed economically.
D.2 Fast Rendering
Handling high-volume user data and updating the application simultaneously is every enterprise’s primary business and technical goal. React JS comprises the in-built functionality of virtual DOM, making the rendering faster and enhancing the overall user experience. In addition, it makes the application lightweight, leading to boost performance and productivity. Moreover, it leverages the developers tobuild cutting-edge applications without considering state transitions, making the development timeline shorter. Also, Virtual DOM’s in-memory tree representation of real DOM makes the process sprightly accelerated between the call and display functions.
D.3 Search Engine Friendly
Every service-providing organization wants its website to display at the top of list of the search engines to reach the target audience. For this purpose, search engine optimization is performed. Many websites cannot reach the top search pages, as JavaScript pages are complex to read and rank across search engines. But, the Virtual DOM feature of ReactJS renders the application more accurate and returns the web app as a typical web page. Due to this, search bots are able to crawl through the React JS website and effortlessly analyze the relevance and rank the website on the search engine.
D.4 Reliable Development Tools
Having authentic tools for crafting and debugging an application is an essential requirement of software creation. Furthermore, it aids both the development team and users in integrating and utilizing forefront features. Developers can access several developments, designing, and debugging tools freely over the internet to fabricate React JS application development. They can also seamlessly add extensions of these tools to their Google Chrome and Firefox browsers. As a result, the development team can inspect hierarchies as they generate in Virtual DOM, and it also enables them to isolate and extend the functionality of a particular component.
D.5 Redux Facility
Redux helps to effortlessly store and manage the different states of large and complex applications for providing a seamless experience to the end user. Hence, it is one of the most desirable elements found in React JS. The primary purpose of Redux is to enable other elements to access different transition states without creating a bottleneck, interacting with the child module, and utilizing a callback. Additionally, it makes code debugging and testing easy and improves server rendering.
D.6 Offers Mobile Application Development
React JS is probably seen as a library for building websites and web apps, but it has been upgraded to be considered for creating native mobile applications in recent years. The phrase “learn once, write, anywhere” purely blends with the feature of React JS, as it allows to use same code structure and components for innovating mobile apps development. The applications crafted using React JS can be installed, configured, and utilized on Android and iOS devices. In addition, its multi-platform compatibility aids organizations in building a relationship with their users diversified across different operating systems. With this open-source library, you will be capable of extending your digital presence from desktops to mobile devices.
D.7 Stable and Streamline Code
Having a fault-tolerant front end is the requirement of every organization, and you can entirely depend upon React JS to accomplish this development goal. The React JS application holds the code for each unit independently, aiding developers in performing unit tests on every component and precisely patching potential loopholes. Additionally, with a streamlined code structure, any software development company finds it easier to reinforce the business solution and adjoin features according to current business requirements. Moreover, the stability of React JS refers to flawlessly integrating any change and smoothly running it on users’ devices, reducing the probability of system crashes and clearing the barriers in the road to migrate the system to a newer version.
D.8 Ample Community Support
If we compare React JS with any other open-source JavaScript library, its community is immensely growing, and thousands of people contribute to it daily. Around 1200 contributions are made to the React JS repository with new templates and resolved code queries every day. You can quickly resolve the difficulties during development and even use pre-developed templates to shorten the time-to-market. Additionally, Facebook Inc. actively contributes to the React JS GitHub repository, ensuring the integration of only legitimate modifications and prevention of malicious codes.
D.9 Comes with JSX
JSX is an optional extended feature of React JS used for creating components for the application. The main objective of these tailored elements is to make code simple and leaner for large enterprise-graded solutions. While writing code, you will benefit from it as it displays more errors, exceptions, and warning messages, which you can handle in the initial phases and guarantee the delivery of a quality product. Moreover, it helps the developers by providing a better insight into the working of the user interface inside the JavaScript code.
D.10 Component Re-usability
Components are the most creative way of building an application from scratch and then upgrading it to a futuristic, cutting-edge business solution. React JS provides the architecture and ecosystem to build business software based on components and reuse each component multiple times. Also, experts can utilize a particular module built for a web application for a mobile application. With this, efforts are reduced, the timeline is minimized, and it directly affects the cost to minimal for software development. In addition, it allows you to use the most optimized components in different applications to make them more appealing with a consistent look.
Visit our website! https://yedastegol.com/
submitted by Present_Position9222 to u/Present_Position9222 [link] [comments]


2024.05.31 21:58 T1mbuk1 Expanding Upon An Idea: Nerdy Tabletop RPGs

Decided to share this here for Biblaridion to see, since someone told me I should speak with him about it first.
There is a fanfic by Alex P. Veres(SilverPaladin1985 on DeviantArt, APV1985 on Fandom, and Alexpv22 on Fanfiction.net) known as Dungeons, Dragons, and Dames. It was originally separate from the Gal Pals continuity he created until my involvement with his life and fanfics somehow led to incorporation into the story. I remember the original dialogue from the first chapter: Lucy pointing out that she doesn't remember Huggins giving Lincoln or any other student(s) assignments to do over the summer. Later versions from the incorporation, thanks to me if I recall correctly, involve LJ being the one to point it out, and Ramirez being the principal. Whatever the case, it's a homage to an episode of The Fairly OddParents with Tom Sawyer in it. And I would rather want nothing to do with that series these days, for several reasons.
Maybe there could be a crossover RP dedicated to and inspired somewhat by DD&D, about a campaign regarding Dungeons & Dragons. I'm thinking like the other RP ideas(LH/CG characters, those four alt sisters from "Future Sisters at the Loud House" by Roy "TheAmazingPeanuts" Roddy on DeviantArt, modern animated Disney characters, (maybe) the Mako trio by Wrecker, (maybe) the Kraekkarians, (maybe) the AoS(Shadows of Love, Blood Brothers, and Power of Water), various OCs, my TTS characters, etc.) (though I'm choosing to keep several animated shows like Seth MacFarlane's shows, those by Butch Hartman, those by Matt Groening, and so forth off the list).
For the RPG game, it could be D&D, or it could be something similar. Biblaridion was working on a world for a tabletop RPG before deciding on a unifying storyline. He distracted himself from that story with the worldbuilding, which he would later distract himself from with the conlanging, creating Thandian. I'll flesh them out some other time for those unfamiliar.
I'm thinking of adding conlangs into whatever conworld those characters' campaign could take place, to add realism, despite the existing fantasy elements. Compared to the usage of Olde English(and/or other ancient dialects of the language), Elvish, Dwarvish, and other fantasy languages from Tolkien's legendarium and other worldbuilding projects that are similar to D&D, (and maybe Latin and/or Celtic languages), even in Alex's fanfic, I'm thinking of creating a few protolangs from scratch, then evolving them into families, and creating scripts the speakers would've devised themselves. I have some ideas.
  1. A protolang mixing Proto-Indo-European with Proto-Taqva-miir.
  2. An idea that would mix Proto-Thirean with Proto-Sino-Tibetan(whichever reconstruction would most suffice).
  3. A mix of Basque with Ilothwii.
  4. A protolang that mixes Proto-Oqolaawak with either Proto-Kra-Dai or Proto-Hmong-Mien.
  5. A mix of Proto-Japonic with the ancestor of another naturalistic conlang, or a slightly modified version of Proto-Japonic.
  6. Something with only three vowels: a, i, u (Perhaps a mix of something(maybe Ts'ap'u-K'ama) with Proto-Semitic or Proto-Afroasiatic.)
I still need to do a lot of planning, like a map, though I could mix a map of what the Europeans thought of the world looking like during the time of Old English with a map of the Refugium, overlap territorial outlines, and then expand from there. It needs to be a typical world map most suitable for tabletop RPGs. Maybe then I could figure out which areas for the speakers of each protolang to inhabit before spreading out. As of now, this idea is still a work in progress.
submitted by T1mbuk1 to biblaridion [link] [comments]


2024.05.31 19:57 Watchtvland [US] [Selling] [ Trade] Arrow, Vestron, Vinegar Syndrome, Blu Rays

https://imgur.com/a/r4rDfCn
Trying this instead of eBay. I have 100% positive feedback with 667 transactions. I can give you my username if you like and I can respond in a message on eBay for proof.
Also, bought from jdbuddha1976, Schsm213, zdmetal, waiting on delivery to get some credits.
Payment via PayPal G&S + $5 Shipping Media
All slips may have shelf wear, the ones noted as Worn have the most wear. If you would like more pictures, please let me know. No digital codes if sealed, codes may be expired.
All Blu Rays below - Trade for 4K or sell price next to each item.
I also have 4K Slipcovers, but do not know how to price them. Anyone has a site or an average fair price per slip? Thanks
submitted by Watchtvland to MediaSwap [link] [comments]


2024.05.31 18:14 Flaky_State_865 Android without battery - I have given up, can you help me?

Hello everyone,
I have found this cool app called Octoprint4Android by feelfreelinux, which let's you control your 3D printer over your Android phone (https://github.com/feelfreelinux/octo4a). Since I have an old Galaxy S7 edge lying around I tryed it out and it worked! Really cool!
Now here's the problem: How do I simultaneously charge the phone & connect it via OTG to my 3D-printer? Or even better get rid of the battery all together and power it via constant power source.
What sounds so easy, is in fact not since modern smartphones determine the battery level during startup by measuring the voltage once and then track the battery level by integrating the drawn current. Hence the battery percentage drops when powering the device over a constant voltage source.
At this point, I just don't know how to power my phone constantly without the battery. It seems like this should be straight-forward, but for some strange reason the OEMs try really hard to keep you from doing it. Do you have any advice?
submitted by Flaky_State_865 to XDA_developers [link] [comments]


http://rodzice.org/