![]() ![]() I have an FAQ, so if it’s not covered there, let me know. ![]() If you have any other questions or want me to tag something, please leave me a message. Also, I strive to make this place a safe space and will tag for organization, triggers, squicks, etc and for blacklisting, if you blacklist. If you want to change the language, click here. has been translated based on your browsers language setting. Discover and Share the best GIFs on Tenor. All visual NSFW stuff is posted on a sideblog. yu yu hakusho Memes & GIFs Kurama and Hiei 650 views, 4 upvotes Keiko 450 views, 3 upvotes Yusukes Spirit Gun 1,154 views, 5 upvotes, 5 comments. The perfect Yusuke Toguro Yusuke Vs Toguro Animated GIF for your conversation. Support Me By: Blog Policies & Credits Icon Credit: Raz.Īny NSFW stuff will be tagged. The perfect Yusuke Thumbs Up Ok Animated GIF for your conversation. Yusuke relaxed as he snuggled against her body, his frenzied breath slowing and become more even. The dark room simmered down and became comfortable. Yusuke leaned on her, resting his head at the top of her glistening chest. 11/8 Updated the Fic List and moved the Ko-Fi linkĪbout The (mostly) fan creations blog of a fellow lurker with a following of fandoms and a smattering of other stuff. Keiko slid down from the wall and spread out on the floor, panting, her torn skirt sticking to her legs. ![]()
0 Comments
9/1/2023 0 Comments Install monit centos 6.3![]() ![]() Once you have a working Monit control file, simply start Monit from the console, like so: $ monit If there was an error, Monit will print an error message to the console, including the line number in the control file from where the error was found. ![]() For instance, $ monit -c /var/monit/monitrcīefore Monit is started the first time, you can test the control file for syntax errors: $ monit -t You can also specify the control file directly by using the -c command-line switch to monit. If this file does not exist, Monit will try /etc/monitrc and a few other places. The default location for monitrc is ~/.monitrc. The behaviour of Monit is controlled by command-line options and a run control file, monitrc, the syntax of which we describe in a later section. This means that you can use Monit to perform any type of check you can write a script for.įinally, Monit can be used to monitor general system resources on localhost such as overall CPU usage, Memory and System Load. Monit can be used to test programs or scripts at certain times, much like cron, but in addition, you can test the exit value of a program and perform an action or send an alert if the exit value indicates an error. Even if a protocol is not supported you can still test the server because you can configure Monit to send any data and test the response from the server. Network test can be performed on a protocol level Monit has built-in tests for the main Internet protocols, such as HTTP, SMTP etc. TCP, UDP and Unix Domain Sockets are supported. Monit can monitor network connections to various servers, either on localhost or on remote hosts. This is also useful for security reasons - you can monitor the md5 or sha1 checksum of files that should not change and get an alert or perform an action if they should change. Monit can monitor these items for changes, such as timestamps changes, checksum changes or size changes. You can also use Monit to monitor files, directories and filesystems on localhost. Monit can also monitor process characteristics, such as how much memory or cpu cycles a process is using. if a DoS attack is in progress) Monit can stop or restart apache and send you an alert message. if sendmail is not running, monit can start sendmail again automatically or if apache is using too many resources (e.g. In contrast to many other monitoring systems, Monit can act if an error situation should occur, e.g. ![]() For instance sendmail, sshd, apache and mysql. Monit is particularly useful for monitoring daemon processes, such as those started at system boot time. You can use Monit to monitor daemon processes or similar programs running on localhost. Monit provides a HTTP(S) interface and you may use a browser to access the Monit program. Monit can perform various TCP/IP network checks, protocol checks and can utilise SSL for such checks. Monit logs to syslog or to its own log file and notifies you about error conditions via customisable alert messages. Monit is controlled via an easy to configure control file based on a free-format, token-oriented syntax. You can use Monit to monitor files, directories and filesystems for changes, such as timestamps changes, checksum changes or size changes. Monit can start a process if it does not run, restart a process if it does not respond and stop a process if it uses too much resources. Monit conducts automatic maintenance and repair and can execute meaningful causal actions in error situations. Monit is a utility for managing and monitoring processes, programs, files, directories and filesystems on a Unix system. Monit - utility for monitoring services on a Unix system SYNOPSIS SYSTEM AND PER-PROCESS FILEDESCRIPTORS TEST.Write: bytes per second (physical storage).Read: bytes per second (physical storage).Setting a mail server for alert delivery. ![]() 9/1/2023 0 Comments British slang funny![]() ![]() While American slang has become nearly universal with the influx of TV shows, films, and other media filling the screens of a significant majority of the media-viewing global population, there is so much more available once you dig beneath the surface of British slang terms and can discover some real gems beneath the surface. See also: tosser.British slang is a niche of its own, evolving and transforming and adapting from city to city and from year to year, just as the English language itself has done. As a verb, can also mean very inebriated ("I was absolutely wankered"). Wanker – n., masturbator despicable person. Can also be used as a verb to mean hit ("Watch me while I twat him") or inebriated ("I was twatted"). Synonym for either penis or "someone from St Just", depending who you ask.Ĥ7. Taking the piss/Mick/Michael – taking liberties, making fun of. Swine – noun, person to be regarded with contempt/envy. Used in a bewildering variety of constructions, including gobshite, shitehawk, and Steve Coogan's Paul Calf catchphrase, "bag o' shite".Ĥ3. Mild, unless of course preceded by a strong intensifier, as in Steve Jones' line: "What a fucking rotter."Ĥ1. Rotter – n., person to be regarded with contempt/envy. Poxy – adj., riddled with pox crappy, third-rate. Immortalised in the '80s BBC sitcom Only Fools and Horses. Pissed off – angry, synonym for the US "pissed". Minging – adj., foul, disgusting, worthless. Minger – n., a very unattractive person or thing. Knob, knobend, knobhead, knobber – n., a stupid, irritating person, usually a man. Gordon Bennett – n., variant on "Gorblimey!" and the profane outburst "Jesus Christ!" Derives from the Victorian publisher and playboy James Gordon Bennett Jr. Git – n., someone who has just beaten you at pool, stolen your spouse, bought the last pasty in the shop, got the job you wanted, or in some other way won one over on you. ![]() Feck – milder Irish variant of fuck that caught on in the UK thanks to the '90s sitcom Father Ted.Ģ3. Dickhead – n., a stupid, irritating person, usually a man. Use with care, unless writing a piece based on East End gangsterisms.Ģ0. Can be used as an adjective in the related word cuntish. Strong, but much less offensive than in the US. Cunt – n., vagina an unpleasant or stupid person. As a verb, means to screw up drastically. Chav – n., working-class person with an urban sporty style. A cack-handed execution will often lead to a cock-up. Cad – n., untrustworthy person to be regarded with contempt/envy. Also used as an exclamation of annoyance ("bugger!") as a milder variant of "fuck" in the phrases "bugger off" and "bugger all" and, in the phrase, "playing silly buggers", to act the fool. ![]() As a verb, can mean to sodomise to ruin ("You've buggered that up!") or to tire. someone who practises buggery) jerk silly fool. Used to mean rubbish or nonsense, as in the exclamation of disbelief "Bollocks!" and the album title Never Mind the Bollocks, Here's the Sex Pistols in phrases such as "the dog's bollocks" to mean something definitive and perfect and, in the related word bollocking, a dressing-down ("I gave the useless fool a bollocking"). Blooming – adj., basically a very mild, somewhat archaic form of "bloody". Bloody – adv., intensifier, popularly used in the phrase "Bloody hell!" Very common, medium strength.ĩ. Blighter – n., person or thing to be regarded with contempt/envy. Thought to derive from the phrase "God blind me!" Terribly mild. Blimey, blimey O'Reilly, cor blimey, gorblimey – n., expression of astonishment. Bint – n., derogatory synonym for woman appropriated from the Arabic word for daughter or girl. Very mild, yet apparently originated as rhyming slang for "Berkeley hunt".ĥ. (Only write as "bell end" if referring to the end of an actual bell.) Medium strength. Bell, bellend – n., head of a penis fool. ![]() Bastard – n., illegitimate child or mongrel objectionable fellow, probably one who has won one over on you unpleasant situation ("I'm having a bastard of a morning!"). Can also be used to mean bothered ("Can't be arsed") or acting the fool ("Stop arsing about!"). Arse, arsehole – n., variants of ass and asshole. ![]() 9/1/2023 0 Comments Crystal method drag queen![]() Gained alongside Killing Frenzy by landing fatal blows, Bloodrage similarly provides two buffs boosting the Carcha's healing rate and melee damage by 1.75% per stack. Every kill the Carcha lands refreshes Killing Frenzy's timer, but does not extend it. On landing a fatal blow, the Carcha gains the Killing Frenzy buff for 10 seconds which boosts movement speed and makes the Carcha immune to stuns for the duration. Provides both the Killing Frenzy and Bloodrage buffs on fatal blows.Īpplied passively with every bite attack the Carcha lands, similar to a Giga's Gnashed effect, but does not induce bleeding instead reducing healing the victim receives from any source. Can be aimed to the left or right to spin clockwise or counter-clockwise respectively.
![]() I’m going to say something even more controversial, but true that the obfuscated thing these two prior comments are really noting is a degradation that has been obscured in distracting color or design language changes. ![]() I am sure they feel JetBrains' CLion biting at their heels! ![]() IntelliSense was mind-blowing in C++ and force multiplier that was unmatched for many, many years. For years, it absolutely dominated C++ IDEs. Last point to mix big IDEs with C++: Visual Studio (as much as a cringe writing anything positive about Microsoft) is a phenom platform. In 2022, are there any serious alternatives besides a Titanic-sized IDE for enormous complex codebases? I don't see any that average developers (myself) will use. But whatever, get a 5GHz machine, give IntelliJ 16GB of RAM and let it run. ![]() Plus, we use lots of binary libraries (compiled native code), which seems to trigger indexing on each restart. The indexing is much slower and less accurate. More anecdata: One of my current projects is Python 3+. Yes, I do agree: When you are forced to invalidate your indexes, the next restart is painful. The initial Apache Maven download of dependent JARs plus indexing might take one hour or so. Some anecdata, three times in my career, I have worked on massive 1M+ line of code Java projects - single repo. (Leave aside C++ as it is so insanely context dependent, but LLVM has made amazing work of it.) However, for /more/ strictly-typed languages like C, C#, Java, Scala, it is much easier to write a very fast, accurate index. Can you give a real world example of slow indexing? If you work in a /more/ dynamic language like Python, Perl, Ruby, JavaScript, it is very difficult to write a fast, accurate indexer. To be fair, good UX designers exist, but everytime I hear about ux-designers near any of my products I get a little scared :-) Now tell me: is this thing going to administer my private mails? 2 factor verification? (Yes, Google often use their mail app for that.) etc etc.Īt this point it is utterly meaningless: the only correct thing to do with such a vague prompt is to say no until an explanation has been given.īut I can surely imagine UX developers patting themselves and each others on the back for such a brilliant simple design. Something along the lines of "Change in app administration will you allow to administer Gmail Your data will be administered." It might not be fair to group the UX designers of Jetbrains with every other UX designer.īut it is a giant problem that the industry has been "simplifying" everything so mindlessly for so many years that today my iOS device gave me a legitimate prompt that just didn't contain enough information to decide about at all. "This is just some incompetent designer pushing their agenda on us, breaking my workflow because something something trends" - go touch grass.Īnd finally, just to be clear: no, there are no animations - everything is instant. The spacing between the list items is the same according to a designer on Slack. The Project view actually looses some vertical space, but only because the font size is bigger (Which you can change obviously). "More Whitespace" - The vertical space from the top of the screen to the editor is the exact same. "The toolbar has less icons now" - It's customisable, you can put whatever you want in there. "Monochrome icons" - Only the toolbar icons are monochrome, everything else still uses coloured icons. Breadcrumbs in the Statusbar save some space and look much cleanerĪlso, many of the complaints that I've seen in this thread are either wrong or exaggerated: ![]() Showing the git branch next to the title makes it so much easier to understand where I am, when I work with multiple projects and branches. The shaded tool window background nicely separates them from the editor Gutters are now much better at highlighting local changes, while also being less visually obtrusive. Seriously, HN? This is the quality that you reward with hundreds of points? Unlike the author, I happen to have used this UI for the past five months and it solves many of my longstanding gripes with IntelliJ: ![]() 9/1/2023 0 Comments Windows hibernate![]() I cannot find a description of it after a quick look but it seems self evident how it is supposed to work.Ĭlick on the battery symbol in the Taskbar/Ĭhange Plan Settings - of the relevant power plan/ There seems to be a Sleep->Hibernate timer. It still uses some power to maintain the RAM for sleep mode. It Sleeps AND saves the state to a hibernate file so that if power is lost it will seamlessly recover. On a laptop this is really just a potential battery flattener. I was delighted when it did BIOS stuff then Windows boot but came up quite swiftly with all the apps open. The power light was NOT gently pulsing as it does when in Sleep mode and I feared it had crashed out of sleep mode. I opened my Laptop after the weekend when I am sure I had put it to sleep - essentially I wanted to test how much battery Sleep used, it had seemed quite modest. Hybrid sleep is typically turned on by default on desktop computersĪnd off by default on laptops. ![]() When hybrid sleep is turned on, putting yourĬomputer into sleep automatically puts your computer into hybrid That way, if a power failure occurs, Windows can restore your ![]() Is a combination of sleep and hibernate it puts any open documentsĪnd programs in memory and on your hard disk and then puts yourĬomputer into a low-power state so that you can quickly resume your Hybrid sleep is designed primarily for desktop computers. (The command powercfg /a gives you a list of actually supported power states regarding your system.)įrom article Difference Between Sleep, Hybrid Sleep, Hibernation in Windows 10/8/7 While it is still possible to setup Windows to go into a strictly sleep or a strictly hibernation mode, by default Windows 10 sleep mode is set as Hybrid Sleep on desktop computers if supported by the system. Yes, that is exactly what Windows is using in your case. So does Windows 10 use a combination of hibernation and sleep instead ![]() 9/1/2023 0 Comments Virtual scribe services![]() Document a scribe’s HIPAA training certificate before onboarding. But if the service supplies scribes who will work exclusively on your healthcare organization’s EHR and no ePHI is transmitted to the service provider, then only the individual scribe would be required to sign a BAA. If a scribe service provider uses proprietary software to connect with the physician or receives ePHI at any point, the scribe service provider must sign a BAA to ensure that its platform is HIPAA-compliant. Require the business associate to use appropriate safeguards to prevent a use or disclosure of ePHI other than as allowed by the contract.State that the business associate will not use or further disclose the ePHI other than as permitted or required by contract or by law. ![]() ![]() Contain a description of the permitted and required uses of ePHI.Therefore, healthcare providers must have either the scribe service provider or each individual scribe sign a BAA before granting access to any ePHI. At a minimum, the BAA should: HIPAA requires that a CE have a Business Associate Agreement (BAA) in place with any BA that has access to ePHI. Obtain a Business Associate Agreement with the scribe or the scribe service. If a scribe service claims it is HIPAA-compliant but provides no details on how it maintains compliance, it may be unwise to use that service without first receiving satisfactory assurances that it will adequately safeguard your patients’ ePHI. Review the scribe service’s website to see what, if any, measures the vendor has implemented to comply with HIPAA. Virtual Scribe HIPAA Compliance Tips Determine the steps the scribe service has taken to become HIPAA compliant. Healthcare organizations can use the following risk management tips when selecting a virtual medical scribe to reduce their chances of being penalized for a scribe’s HIPAA violation and to reduce liability exposures. In addition to HIPAA concerns, healthcare organizations also should be aware of the unique liability risks that virtual medical scribes may pose. Before choosing a service, it is important to understand the level of supervision that will be required and the tasks that scribes can and can’t perform. However, CEs also can be penalized for a BA’s HIPAA violations if it is determined that the CE failed to duly vet or monitor the BA. To avoid such HIPAA risks, it is imperative that healthcare organizations confirm before hiring that the scribe or scribe service has implemented adequate safeguards to protect ePHI. That means virtual scribes, like any other BA, can face penalties if they fail to implement adequate administrative, physical and technical safeguards as required by the HIPAA Security Rule. HIPAA and Liability Risks Associated with Virtual Medical Scribesīecause virtual medical scribes qualify as a business associate (BA) of a covered entity (CE), virtual scribes are required to adequately safeguard ePHI under HIPAA. This article highlights the potential HIPAA and cybersecurity liability risks associated with employing virtual medical scribes and outlines the measures healthcare organizations can take to mitigate such risks. ![]() While many healthcare organizations still use traditional medical scribes who accompany the physician, some organizations now are employing virtual medical scribes who observe physicians remotely.Īlthough the cost benefits and flexible schedules of virtual medical scribes are attractive to many healthcare organizations, some may wonder whether such benefits are outweighed by the potential HIPAA and liability risks that might arise from granting a virtual scribe access to their patients’ EHR, which contains electronic Protected Health Information (ePHI). ![]() Traditionally, medical scribes would physically accompany physicians to their appointments to document the patient’s records. Using a medical scribe can significantly reduce the amount of time a physician spends documenting a patient’s electronic health record (EHR). Medical scribes are professionals who document patient encounters and physician dictation into a patient’s medical records. Consider conducting regular cybersecurity training for all medical scribes hired.Train all healthcare providers on how to use the medical scribes’ services effectively and appropriately.Ensure that your healthcare practice has an up-to-date Business Associate policy or consider implementing MagMutual’s sample policy.Healthcare organizations must know how to utilize them appropriately to minimize liability. Although virtual medical scribes offers healthcare providers many benefits, this shift comes with challenges and risks. The push to develop electronic health records and more detailed patient documentation has led to the use of virtual medical scribes. ![]() ![]() ![]() Postulate 5: If two points lie in a plane, then the line joining them lies in that plane.Postulate 4: Through any three noncollinear points, there is exactly one plane.Postulate 3: Through any two points, there is exactly one line.Postulate 2: A plane contains at least three noncollinear points.Postulate 1: A line contains at least two points.Listed below are six postulates and the theorems that can be proven from these postulates. A theorem is a true statement that can be proven. Summary of Coordinate Geometry FormulasĪ postulate is a statement that is assumed true without proof.Slopes: Parallel and Perpendicular Lines.Similar Triangles: Perimeters and Areas.Proportional Parts of Similar Triangles.Formulas: Perimeter, Circumference, Area.Proving that Figures Are Parallelograms.Triangle Inequalities: Sides and Angles.Special Features of Isosceles Triangles.Classifying Triangles by Sides or Angles.Lines: Intersecting, Perpendicular, Parallel.The author’s relationship with his father changes from one of dependence to one of independence. The author feels sad and empty after the death of his father.Ģ. How does the author’s relationship with his father change after the death?ġ. How does the author feel about the death of his father?Ģ. If two lines intersect a third line in such a way that the sum of the inner angles on one side is less than two right angles, then the two lines will eventually meet on that side. Thus, the line segment AB can be extended indefinitely in a straight line. Since BC is a line segment, it will continue to be a line segment when extended. We will use the construction method of proof.ĭraw a line segment BC perpendicular to AB. To prove: A line segment can be extended indefinitely in a straight line Euclid’s Postulate No 4Ī straight line segment can be extended indefinitely in a straight line. Given a line and a point not on the line, there exists one and only one line through the point that is parallel to the given line. In other words, if you have a line that goes from one point to another, and you keep going that line, the two angles at the end of the line (not the line itself, but the angles at the endpoints of the line) will add up to 180 degrees. If a line segment joining two points is extended, the sum of the two interior angles on the extended line is two right angles. Euclid’s Postulate No 1Ī straight line can be drawn from any point to any other point. If two lines are parallel, then the angles between them are always the same. ![]() A right angle is an angle of 90 degrees.Ħ. A plane is a flat surface that extends in all directions.Ĥ. A line is a straight path between two points.ģ. Plane geometry is the foundation for all other types of geometry, including spherical geometry, which deals with shapes that exist in three-dimensional space, and hyperbolic geometry, which deals with shapes that exist in four or more dimensions. The fifth and final postulate states that if a shape can be constructed using the first four postulates, then it is possible to draw a line through any two points in the shape that is perpendicular to the line connecting the points.Įuclidean geometry is the basis for plane geometry, which is the study of shapes that exist in a two-dimensional space. The fourth postulate states that a shape can be built by putting together a finite number of points, lines, and angles. The third postulate states that a angle is formed by two lines intersecting at a point, and that the angle is measured by the size of the opening between the lines. The second postulate states that a line is a straight, continuous path between two points. The first postulate states that a point is a location in space with no size or shape. Euclidean geometry is based on a set of five postulates, or basic rules, that can be used to construct geometric shapes and proofs. ![]() ![]() It is the oldest form of geometry, and the most well-known. Elements of Euclidean GeometryĮuclidean geometry is a branch of mathematics focused on the study of points, lines, angles, and shapes in a two-dimensional space. It is named after the Greek mathematician Euclid, who wrote the Elements, a treatise on geometry that is widely considered to be the foundation of the subject. Euclidean geometry is a branch of mathematics that deals with the properties of geometric shapes that are in a flat or two-dimensional space. ![]() 9/1/2023 0 Comments Using garmin mapinstall![]() ![]() You have to go in & manually find & remove the current MapInstall files & folders THEN download & install the older older MapInstall. Problem is, it is easy to remove the current BaseCamp then download & install Base Camp 4.6.2 but reverting to the older MapInstall is a real bugger as just downgrading Base Camp won't remove your current (wonky) MapInstall. There is a problem with the newest BaseCamp upgrade (actually a down grade on functions)- & a BIG problem with the newest Map install, so most of us power users have back graded to the older BaseCamp 4.6.2 & the older MapInstall-4.0.4. If you let the Garmin Express do the install it will probably try to only load part of the country or load only Canada & surrounding.Īlso for the 2020.2 to work in the Z-550 it MUST be named Gmappron on the main drive & as Gmapsupp on the SD card (if it is named something else then the Zumo 550 won't read it). Your Zumo 550 won't hold the entire map on the Zumo main drive so it will have to be split between the main drive & the SD card. If you have MapSource installed then that actually works better to install new maps to older Garmin GPS units. If you actually have the 2020.2 then you might get Mapinstall to load it. Well!, you can keep playing with it but that is a problem at times.įirst, make darn sure that your 2020.2 map is in the C/program data/Garmin/Maps folder. ![]() When I run MapInstall to select map segments to load on the Garmin and the SD card, the drop down for the map ONLY SHOWS 2019.2. Next, I tried to run MapInstall to load the map to my motorcycle GPS, a Zumo 550 with an SD Card. I ran BaseCamp on my PC and the I have two maps the old 2019 map and the new 2020.2 map. The update was successful and the Nuvi has the new map. I used Garmin Express to download the new maps 2020.2 to the Device and Computer. I have done this before and kept notes of my procedure, but I have run into a puzzle. ![]() I am trying to update the lifetime maps in two Garmin GPS devices. ![]() 9/1/2023 0 Comments One twelve trucker lingo![]() The expression 10-4 further spread into popular culture when it was featured in C. Helping to popularize 10-4 in the mainstream was the 1950s TV crime drama Highway Patrol, starring Broderick Crawford, known for starting his conversations on his radio with 10-4. Oh, the ’50s. These handy codes were quickly adopted by others communicating via radio, such as CB (Citizen Band) radio enthusiasts and truckers. 4 was simply chosen to mean “acknowledgement” of a message ( 10-3 meant “stop transmitting” in case you wanted to know). The 10 was used as a placeholder to give the motor-generator time to speed up enough to hear the second part of the code. It took a split second for the motor-generator in the radios to warm up, and so the first syllables of a radio transmission were often lost. The use of the number 10 before all of the codes was another workaround. The ten-codes were invented to communicate information quickly and clearly. For starters, there were limited police radio channels, so officers couldn’t stay on the line too long or else others wouldn’t be able to get through. In the 1930s, radio technology was still relatively new and limited. ![]() ![]() ![]() Ten-Four Day ~ for decades, Oct 4 has been a day to salute radio operators. 10-4 is an affirmative signal: it means “OK.” The ten-codes are credited to Illinois State Police Communications Director Charles Hopper who created them between 1937–40 for use in radio communications among cops. 10-4 is one of the so-called ten-codes, or radio signals, invented by the Association of Public-Safety Communications Officials-International (APCO). ![]() |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |