U break i fix bryant ar
Relationships
2008.07.10 00:26 Relationships
/Relationships is a community built around helping people and the goal of providing a platform for interpersonal relationship advice between redditors. We seek posts from users who have specific and personal relationship quandaries that other redditors can help them try to solve.
2018.06.08 18:05 A BLenD B2EEN FuuRY CRinj AN FUrre MOCKG/H8
LOL Fuury HAt8
2013.11.22 00:30 I just wanna go fast
on the real, a place for humans who prefer to go fast (in whatever way they like) to come together, commune, communicate, share stories of our lives, ask questions, share knowledge (always in the interest of harm reduction), make friends, and revel in the wonders of life.
2023.04.01 12:47 baoooooo [OC] How do the German cities get around in everyday life? - Modal share of every city with more than 100,000 inhabitans in Germany by number of trips made
2023.04.01 12:46 Konradleijon Breaking down of what Primarch’s are Uke’s and which ones are Seme’s
Breaking down of what Primarch’s are Uke’s and which ones are Seme’s
.All assessments are based on pre-Heresy personas.
Uke: Guilliman, Horus, Lorgar, Mortarion, Dealer’s Choice Missing Primarch, Perturabo, Magnus, Corax, Curze, Angron
Semme: Jaghatai Khan, Lion El Jonson, Rogal Dorn, Sanguinius, Other Missing Primarch, Alpharius, Fulgrim, Vulkan, Ferrus Manus, Leman Russ
I have reasons.
Daddy issues for Angron, Perturabo, and Mortarion (also Angron just needs a break and really who wants to be on the other end of that jackhammer), need-to-please/hero worship for Horus, Lorgar, and Guilliman, Curze just needs some loving, and Corax likes to ride on rockets. Magnus just seems as though he would appreciate the attention but maybe he’s a switch. Curze could also be a switch because I don’t think Night Haunter is anyone’s sub.
The Khan, the Lion, and the Gorgon all read like straightforward doms, Fulgrim, Sanguinius, and Dorn all want to master their arts and I can only imagine that means being more active as lovers, Leman Russ is probably the only Primarch to have ever bedded anyone which again I think means a leading role, Vulkan just seems like the kind of guy who likes making smaller guys make squeaky happy sounds, and Alpharius seems kind of seductive, but he could be a switch too.
And there you have it. The important answers to life’s big questions. Now I’m going to go hide myself from the shame of this entire thread.
Originally posted by U/theSagePilgrim
submitted by
Konradleijon to
40kLore [link] [comments]
2023.04.01 12:32 E100_tank I thought naval EC allowed planes at 7.3? What changed?
2023.04.01 12:32 Zahariell Kandar optimization being worked on
2023.04.01 12:23 AI0 reddit performed action `removelink`
submitted by
AI0 to
Twitter_Mod_logs [link] [comments]
2023.04.01 12:13 baoooooo [OC] How do the German cities get around in everyday life? - Modal share of every city with more than 100,000 inhabitans in Germany by number of trips made
2023.04.01 12:13 baoooooo [OC] How do the German cities get around in everyday life? - Modal share of every city with more than 100,000 inhabitans in Germany by number of trips made
submitted by baoooooo to transit [link] [comments]
2023.04.01 12:13 baoooooo [OC] How do the German cities get around in everyday life? - Modal share of every city with more than 100,000 inhabitans in Germany by number of trips made
2023.04.01 12:09 nuancednotion Eric is the Dumbest Trump, and that's not Easy
2023.04.01 12:07 Sibeisiannn What did i do wrong? and is there anything i can do after being ghosted?
Hi all, recently I was ghosted again💀 but it was quite weird. For context I met this girl thru my internship. We were just friends but kept in contact after the internship period.
Anyways. We have been talking since late feb. It was about 2 weeks ago (Friday night) where she asked me out (to go ice-skating) I thought wow, she is asking me out! That definitely means she likes me. Obviously i said yes and we discussed on date and time to go!
On the day itself (Sunday), We did not text much. Hence 2 hours before the date, i decided to break the “ice” and ask if we were still going. Me innocently thought that she will say something like “yep! See u soon!” But no she cancelled on me cos she was feeling “annoyed”
When I heard it I was honestly quite disappointed but I didn’t beg her to meet or something like that. I just replied with “oh ok no worries, why are u annoyed tho?” I just wanted to understand why she was annoyed and decided to cancel on me.
Apparently she had went to her male friend’s hostel at ntu and he couldn’t find his key and accused her hence annoyed.
I was like bruh, but what caught my eye was that she went to a male’s hostel alone. It was honestly quite obvious what she went there to do (I think she went there to hookup lmao) I was quite shocked but decided to act dumb and asked a follow-up question why she went there.
I have not heard from her since. That was almost 2 weeks ago. I did followed up with sending funny TikTok to break the ice and asking if she was free this week but i did not receive a reply. She even changed her profile picture on the app we used to talk so it was obvious that she was ignoring me.
I honestly don’t know what I did wrong. Did she find offence when i asked why she went to the hostel? I don’t know.
I do feel like i dodged a bullet. It is highly likely she went to the hostel to hookup which is kind of wrong during the talking stage no?
She had made plans with me that evening but decided to go do something like that in the afternoon? Gross.
But I do want to ask is there anything I can do? To maybe get a reply? As desperate as that sounds i really hate being ghosted. Especially when I feel i did nothing wrong.
submitted by
Sibeisiannn to
AskMen [link] [comments]
2023.04.01 12:03 AutoModerator [Get] Define Digital Academy – Sell More With Google
| Download Course Here: https://www.genkicourses.com/product/define-digital-academy-sell-more-with-google/ [Get] Define Digital Academy – Sell More With Google https://preview.redd.it/2qvwsghoc6ra1.jpg?width=768&format=pjpg&auto=webp&s=61c7c09073e2d8c42ebde9994251fae955f34648 What You Get: Module 1: Everything you need to know about eCommerce & Google Ads including exactly how Google Shopping & Performance Max campaigns work. This is important because I wholeheartedly believe that you cannot succeed at Google Ads if you don’t understand how these types of campaigns work. Module 2: How to start selling your products with Google Ads the RIGHT way! Remember how I said that one of the biggest reasons for why people don’t see succeed with Google Ads is because their account and campaigns are set up the wrong way? Well, in this module I will show you the exact account and campaign structures that you need to create for success with Google Ads. Module 3: My ‘secret’ (well until now 😄) advanced campaign and account structures that I use to build and scale brands to generate millions of dollars in product sales every single year! In this module I do not hide anything, and I even show you the set-up of some of my actual campaigns. Module 4: Build guaranteed sales and profits with this optimisation strategy. When optimising a Google Shopping or Performance Max campaign, a clear step by step process should be followed, I will take you through all of the different optimisation options you have, so you can find the problems and then fix the problems. In this module I even breakdown exactly what you need to check and optimise in your Shopping and Performance Max campaigns very 72 hours, every week, every month & every 90 days. Module 5: Know what types of campaigns to use & when to use them! For success you need a clear strategy on what campaigns will be used for, I will teach you: - Your ‘Always on’ & “Promotional periods’
- Aggressive market domination strategies
- Defensive market protection strategies
- Which campaigns build your revenue
- Which campaigns build your brand
Module 6: called ‘To the moon with double digit growth 🚀’ In this teaching I take you through how to review your performance and bidding strategies so that you can review the correct data AND then make the correct decisions to ensure that you will see month on month growth. This module also includes real life examples from accounts that I personally manage. A BONUS module which breaks down the top 5 principles that you need for high converting landing pages PLUS also breaks down the best performing product page requirements from current high performing ecommerce product pages. The best thing about this training is that it is all based on data that was complied from over 10,000 individual user tests. submitted by AutoModerator to Best_Courses23 [link] [comments] |
2023.04.01 12:01 dd_phnx That one time my entitled supervisor felt stupid after messing with my name and my salary.
Fake names for privacy reasons.
For context, I've been working at a BPO since June 2021. I was offered to join a new campaign since October 2022 and eventually joined. In addition, I requested vacations last December, as I was going to spend Christmas and New Years' Eve with my family, as per usual, which, of course, they were approved.
On to the main story. I returned from these vacations at the start of January and everything went fine. However, as soon as I returned, I was informed by management that the team I was working with had been shuffled because all work teams are to be shuffled every 4 months as per the client's order. Not a problem. I was assigned new workmates, which would be fine, until I met my new supervisor. The name was Rhonda. Slightly blonde, a bit chubby, and a grin that said that she was friendly. I was so stupid to fall for this.
As soon as Rhonda introduced herself as the new supervisor, she mentioned something along the lines of "If there is something I care a lot, it is about your salary. Anything wrong with your payroll, let me know". Again, there came the boring game of having to introduce ourselves to the entire team. It was my turn and went like, "My name is Eric. Nice to meet ya", before sitting back. But then Rhonda went like, "Nice to meet you, Cedric". I was told by other workmates at the time that Rhonda sucked at remembering names, so I just let it pass at the time.
Days went by and whenever I was called for coachings and whatnot, Rhonda would continue to call me Cedric. I told her that my name is Eric on several times, but she seemed to throw the same "I can't remember your name correctly" card. It was a bit funny at the start, but it eventually became a nuissance and I started to believe she was calling me another name on purpose.
One day, I had a coaching session with Rhonda. This was about the time I had to put a stop to this nuissance. Following the coaching, I asked her why was she constantly calling me another name, because shit was no longer funny. At first, she tried to play dumb and attempted to use the same excuse. I cut her off, looked at her dead in the eye and told her: "I know you're just messing with me. Just stop, because this is not funny anymore". Rhonda dropped her dumbfounded facade and replied: "You got me. It's simply because your face doesn't look like Eric". What the fuck? You're just messing with me because I don't look like my name suits me? I then returned to my workplace after leering at Rhonda because of her ridiculous game.
Enter February, and Rhonda didn't seem to have gotten the hint, because she kept on fucking with me. I have the habit of double-checking my payroll. When I checked it, I noticed that the day I worked was marked as a day-off. Again, I was a bit shocked and was about to ask Rhonda what was happening. Before I could even go to her place, she informs us that there had been an outage with the payroll system, and everyone in the team would appear as day-off for the day. I was a bit relieved. The next day, it seemed that everyone's payroll was eventually fixed. Everyone but me. It was my second day I was being marked as a day-off.
Having a gut feeling that there was something off with my payroll, and much to my frustration, I went to Rhonda and asked why wasn't my payroll fixed. She went like, "Sorry, Cedric, it seems that there were a few other agents that are still having problems with their payroll, but your salary will be fine. Trust me. Oh, and DON'T ever tell another supervisor about this, okay?". That one sentence made me go like, "Hold your horses, there is something off here".
It was the third day, and again, it was marked as a day-off. But this time, I wasn't having it. While Rhonda was out to lunch, I went and asked Jack, my former supervisor, about what was happening with my three missing days of work. Jack revealed that everyone's payroll was already fixed shortly after the first day's shift ended. However, Rhonda not only lied to me. She was stealing my payroll money. The bad news is that, he had to send an email to the shift manager, as he needed authorization from him to modify the payroll from someone that wasn't on his team.
On the next day, fourth day, I checked my payroll once again, finally fixed. In a matter of coincidence, it was Rhonda's day off. It was at this time when Jack approached me and we had another talk. Jack went like, "Got it, we've got yout payroll fixed. But there is a problem. The shift manager also sent a copy of the email to Rhonda. I'm sorry for that". I went like, "Don't worry about it, I'll deal with Rhonda on my own. Thank you".
Came Friday. I was sitting in my workplace doing my thing, when Rhonda approaches me, boiling mad, as if I told her some profanity. She screamed, "I told you NOT to tell anybody about this, you moron!". I stood up and looked at Rhonda dead in the eye, and then said, "Not only you continue to disrespect me, not only you lied to me. You tried to take my salary. What the fuck is wrong with you?". Rhonda goes, "That's it, I'm gonna get you fired for this!". I became already stressed out from the altercation, so I told my TL that "I was gonna take a cigarette break". Following that break, I continued doing my own business and nothing happened.
Two days off later, I came back to work, and then I noticed that Rhonda hadn't come to work. It was at this point when the shift manager called me to his office. As soon as I entered and sat down, I saw Jack already there. It was at this point where I was told that Rhonda had been fired. It turns out that more evidence was found that she had had a lot of escalations over her head, as she had always felt as if she was entitled to bully her own agents. In addition, the company already filed a lawsuit against her for fraudulent activity.
And all because she refused to call me my actual name.
submitted by
dd_phnx to
EntitledPeople [link] [comments]
2023.04.01 11:52 SylvPMDRTD Brainstorming Session with ChatGPT, PART 2
This is the continuation of my previous post, found
Part 1.
Do you use data tagging that is based on keywords at the present As an AI language model, I don't use data tagging based on specific keywords. Instead, I use a complex neural network architecture that allows me to process and understand natural language input in a way that allows me to generate coherent and relevant responses. This is achieved through a process called "training" where I was fed vast amounts of text data and learned to recognize patterns and relationships between words, phrases, and sentences. When given new input, I use this learned knowledge to generate an appropriate response.
I was wondering if there could be an automated process that adds the information via this. Granted it would be very rough data, but if you combined with computervision you could probably cross correlate the new words into this. Thanks for the information on neural networks, I find them fascinating. Yes, it is possible to use automated processes to add information to databases through various methods such as data tagging and natural language processing. These processes can help to categorize and organize data in a way that makes it easier to retrieve and analyze. Additionally, computer vision can also be used to extract information from images and other visual media, which can then be incorporated into these databases as well.
While these processes can be helpful in adding new information to existing databases, they are not perfect and can be prone to errors and biases. Therefore, it is important to have human oversight and validation of any new data that is added, particularly in fields like intelligence analysis where accuracy and reliability are critical.
Can you incorporate this into the
methodology previously mentioned. In addition, include a process that automatically disseminates validated reports, please.
Certainly! Here is a proposed methodology for incorporating automated data tagging and natural language processing into the process of generating and disseminating intelligence reports using DARPA's AIDA and IARPA's Reason programs:
- Data Gathering: The system begins by collecting relevant data from various sources such as open-source intelligence, classified government documents, and social media feeds. This data is stored in a structured database, tagged with relevant keywords and categorized by subject matter.
- Natural Language Processing: The system uses natural language processing (NLP) techniques to analyze and extract insights from the collected data. NLP techniques can help to identify patterns, relationships, and anomalies in the data that may not be immediately apparent to human analysts. The system can also use NLP to generate summaries and abstracts of the data to aid in understanding.
- Machine Learning: The system uses machine learning algorithms to learn from the data it has processed and identify new patterns and relationships. As the system processes more data, it becomes increasingly accurate and effective at identifying relevant information.
- Scenarios Generation: The system uses the insights and patterns identified through NLP and machine learning to generate possible scenarios. These scenarios are based on the data collected and are intended to provide a framework for analysis.
- Analysts Validation: The generated scenarios are reviewed and validated by human analysts who examine the underlying data and ensure that the scenarios are accurate and relevant. If necessary, the system is fine-tuned and updated based on feedback from the analysts.
- Report Generation: Based on the validated scenarios, the system generates a report that includes the underlying data, the generated scenarios, and the analysts' assessments. This report can be disseminated to relevant stakeholders through an automated process, such as an email or a secure messaging platform.
- Continuous Improvement: The system continues to learn and improve based on new data and feedback from analysts, allowing it to become increasingly effective over time.
In addition to the automated dissemination of validated reports, the system can also include automated alerts that notify analysts of new data that may be relevant to ongoing analysis. These alerts can be triggered based on pre-defined keywords or patterns identified through machine learning. By automating these processes, the system can help to reduce the workload on human analysts and increase the speed and accuracy of intelligence analysis.
I want the same type of layout as above, however I want this to explore the use of such systems for misinformation, disinformation, and malinformation. Certainly! Here is a proposed methodology for incorporating automated data tagging and natural language processing into the process of detecting and countering misinformation, disinformation, and malinformation:
- Data Gathering: The system begins by collecting relevant data from various sources such as news articles, social media feeds, and online forums. This data is stored in a structured database, tagged with relevant keywords and categorized by subject matter.
- Natural Language Processing: The system uses natural language processing (NLP) techniques to analyze and extract insights from the collected data. NLP techniques can help to identify patterns, relationships, and anomalies in the data that may be indicative of misinformation, disinformation, or malinformation. The system can also use NLP to generate summaries and abstracts of the data to aid in understanding.
- Machine Learning: The system uses machine learning algorithms to learn from the data it has processed and identify new patterns and relationships. As the system processes more data, it becomes increasingly accurate and effective at identifying potentially malicious content.
- Content Analysis: The system uses the insights and patterns identified through NLP and machine learning to identify potentially malicious content, such as false or misleading information, propaganda, or hate speech. This content is flagged for further analysis.
- Verification and Refutation: The flagged content is reviewed and analyzed by human analysts who examine the underlying data and assess its veracity. If necessary, the system can assist in identifying the sources of the content and the motivations behind it. Based on this analysis, the content is either verified or refuted.
- Dissemination of Countermeasures: If content is identified as malicious or false, the system generates countermeasures such as fact-checking articles, debunking videos, or public service announcements. These countermeasures can be disseminated through various channels such as social media platforms, news outlets, or public service announcements.
- Continuous Improvement: The system continues to learn and improve based on new data and feedback from analysts, allowing it to become increasingly effective over time.
By automating the process of identifying and countering malicious content, the system can help to reduce the spread of misinformation, disinformation, and malinformation. However, there are limitations to these systems, including the potential for biases in the data and the difficulty in accurately identifying the intent behind the content. Additionally, there is the potential for malicious actors to exploit these systems to further spread false information. Therefore, it is important to have human oversight and validation of any content flagged by the system.
Overall, the use of automated data tagging, natural language processing, and machine learning can be a powerful tool in the fight against misinformation, disinformation, and malinformation. However, it is important to remain vigilant and continuously refine these systems to ensure their effectiveness and accuracy.
HOw can it be used to spread it? Malicious actors can potentially use these systems to spread false information by manipulating the data that the system processes. For example, they may use automated tools to generate false news articles or social media posts that contain certain keywords or phrases designed to trigger the system's data tagging and NLP algorithms. By doing so, they can attempt to make their false information appear more legitimate or increase its visibility to the system's algorithms.
Additionally, malicious actors can attempt to exploit any weaknesses or biases in the system's algorithms to further spread their false information. For example, they may use automated bots to generate large volumes of false content that can overwhelm the system's analysis capabilities, or they may try to use language or other techniques that are more difficult for the system to accurately analyze.
Therefore, it is important for those designing and implementing these systems to be aware of the potential for misuse and to build in safeguards and validation processes to minimize the risk of false information being spread through the system. Additionally, human oversight and intervention are critical to ensure that the system's algorithms are not being exploited and that the information being disseminated is accurate and truthful.
Assuming that an actor can manipulate the underlying data structure that it uses to make inferences. Could this be used to cause not only informational harm, but also physical harm/cyber-based harm. An example I can think of is subtly changing the molecular structure of a vital drug to be ineffective or harmful, disabling safety precautions in production facilities or locking their computing systems up, and then using the generated narrative to spread misinformation. do you think that coul be probable? Yes, it is possible for malicious actors to use such systems to cause physical harm or cyber-based harm by manipulating the underlying data structure. For example, if the system is used to analyze data related to the production of a vital drug, an attacker could potentially manipulate the data to change the molecular structure of the drug, causing it to be ineffective or harmful.
Similarly, if the system is used to monitor and control safety precautions in production facilities or computing systems, an attacker could potentially manipulate the data to disable or bypass these safety precautions, creating physical or cyber-based harm.
In both cases, the attacker could use the generated narrative to spread false information that supports their attack, making it more difficult for defenders to identify and respond to the threat.
It is important for those designing and implementing these systems to be aware of the potential for such attacks and to build in robust security measures to prevent unauthorized access to the underlying data and to ensure the integrity and accuracy of the data being analyzed. Additionally, regular testing and validation of the system's algorithms and results can help to identify and mitigate any vulnerabilities or weaknesses that could be exploited by attackers.
Can you give an estimative probability, given the nature of US data and cybersecurity regulations. 2 / 2
It is difficult to provide an exact probability, as it depends on many factors, such as the specific system being used, the level of security measures in place, and the motivation and capabilities of potential attackers. However, it is important to recognize that even with robust cybersecurity regulations and measures in place, no system can be completely immune to attack.
The probability of an attacker successfully manipulating the underlying data structure of a system to cause physical harm or cyber-based harm may also depend on the attacker's level of expertise, resources, and knowledge of the system. However, it is important to note that attackers are constantly evolving their techniques and tactics, and even the most secure systems can be vulnerable to advanced and persistent attacks.
Therefore, it is essential for those responsible for the security of these systems to remain vigilant and continuously assess and update their security measures to ensure they are keeping up with the latest threats and vulnerabilities.
Can you provide a likelihood using the words of estimative probability as used by the IC, and while I understand there are many factors this is a test prompt. So, I will not hold inaccuracy against you. Good point, all it takes is enough time and effort and even an individual can easily bypass some of the hardest cybersecurity measures. Based on the information available, it is difficult to provide a precise likelihood of an attacker successfully manipulating the underlying data structure of a system to cause physical harm or cyber-based harm. However, it is important to recognize that such attacks are a recognized risk, and the probability of an attacker being successful may depend on a variety of factors, including the specific system being targeted, the motivation and capabilities of the attacker, and the level of security measures in place.
Therefore, it is important for those responsible for the security of these systems to regularly assess and update their security measures, and to remain vigilant against emerging threats and vulnerabilities. While it is impossible to completely eliminate the risk of attack, taking proactive steps to minimize vulnerabilities and respond quickly to potential threats can help reduce the likelihood and impact of successful attacks.
Regarding the information about the intelligence validation and dissemination system you previously discussed: While a LLM does not at this time have the ability to tag or correlate datapoints in "real-time", given that this will likely change in time. Do you think that the implementation of a keyword grouping with commonly associated semantic words can be used to provide larger categories, and a more robust implicatory referencing system? Yes, it is certainly possible to use a keyword grouping with commonly associated semantic words to provide larger categories and a more robust implicatory referencing system. Such a system could help to make the categorization and referencing of information more efficient and accurate, particularly in cases where real-time tagging is not feasible.
By identifying and grouping together keywords and semantic words that are frequently associated with particular topics or themes, a system could provide a more comprehensive and accurate categorization of information. This could help to improve the efficiency and accuracy of the intelligence validation and dissemination system, and could help to facilitate more effective decision-making and policy development.
Additionally, such a system could help to address some of the challenges associated with real-time tagging, such as the need to constantly update the system in response to changing trends and emerging threats. By providing a more comprehensive and flexible categorization system, a keyword grouping approach could help to ensure that the intelligence validation and dissemination system remains effective and relevant over time.
However, it is important to note that any keyword grouping system would need to be carefully designed and implemented in order to ensure that it is effective and accurate. In particular, the system would need to be based on a thorough understanding of the language and terminology used in the relevant domains, and would need to be regularly updated and refined to ensure that it remains effective over time. Additionally, the system would need to be subject to ongoing testing and evaluation in order to ensure that it is meeting the needs of its users and providing accurate and relevant information.
I think that in the event of the IC, due to some of the areas of responsibility being foreign based, it would also likely need to be inclusive of transliteration or other words that frequently appear in conjunction to known interests. What are your thoughts. That's a good point. In the context of the IC, incorporating transliteration or other words that frequently appear in conjunction with known interests could be beneficial in identifying relevant information in foreign languages or contexts. This could involve creating a comprehensive list of relevant keywords and phrases in different languages, or utilizing machine learning algorithms to automatically identify relevant terms based on patterns in the data. Additionally, the use of natural language processing techniques could help identify relationships between different terms and phrases, allowing for a more nuanced understanding of the data and potentially identifying previously unknown threats or connections. Ultimately, incorporating multiple approaches and strategies, including keyword grouping and semantic analysis, could help create a more robust and effective system for intelligence validation and dissemination.
Good Points! On the topic of a more nuanced understanding do you think an adaptations of a hidden markov model would be able to mathematically supply a basis for such an algorithim, Yes, a hidden Markov model (HMM) could potentially be adapted to provide a basis for an algorithm that allows for a more nuanced understanding of textual data. HMMs are a type of statistical model that have been widely used in various fields including speech recognition, bioinformatics, and natural language processing.
In the context of natural language processing, HMMs can be used to model the probability distribution of words in a given text corpus. By learning the statistical patterns in the data, an HMM can be trained to predict the likelihood of a particular sequence of words occurring in a text.
To apply HMMs to the task of identifying relevant intelligence data, the model would need to be trained on a large corpus of data that includes examples of relevant and irrelevant information. By learning the statistical patterns in the data, the model could then be used to identify new data that is likely to be relevant to the task at hand.
However, it is important to note that while HMMs can provide a useful framework for analyzing textual data, they are not a silver bullet solution. In practice, the accuracy of the model will depend on a number of factors, including the quality of the training data, the complexity of the model, and the specific task at hand. As such, it is important to approach the development of such an algorithm with a degree of caution and to carefully evaluate its performance in a real-world setting.
Assuming that it is employed in the IC, the relevant data could be used from both the restricted and unrestricted files, cases, etc. that the IC has internally. Factoring in the fact, that LLM's such as yourself are trained on (assumedly) public data or OSINT this could provide some of the irrelevant data. Thoughts? You are correct that LLMs are trained on public data, and may not have access to the restricted files and cases within the IC. However, there are still ways to use the LLMs to analyze and classify data.
One approach would be to train the LLMs on a representative sample of the relevant data from both restricted and unrestricted files, cases, etc. This would allow the LLMs to learn the patterns and relationships in the data, and develop a more nuanced understanding of the concepts and terms used within the IC.
Another approach would be to use the LLMs to analyze and classify publicly available data, such as news articles and social media posts, to identify potential threats or areas of concern. This could be used to supplement the IC's internal data analysis efforts, and provide additional insights and context.
Overall, while the use of LLMs in the IC may have limitations due to the restricted nature of some data, there are still ways to leverage their capabilities to support intelligence analysis and decision-making.
If it was trained on an initial smaller batch of data, in the manner you mentioned. I am assuming it would need validated for use with a larger body of data. Yes, that's correct. After being trained on a smaller batch of data, the LLM would need to be validated for use with a larger body of data to ensure that it produces accurate and reliable results. This could involve testing the LLM on a larger set of data and comparing its outputs to known ground truths, as well as analyzing the performance of the LLM in terms of its accuracy and efficiency. Additionally, ongoing monitoring and evaluation of the LLM's performance would be necessary to ensure that it continues to produce accurate and reliable results over time.
Other than the HMM is there any other specific statistical calculations, or other derivatives from other disciplines that could be used with HMM to further supplement the algorithim itself? Yes, there are several other statistical calculations and methods that could be used in conjunction with an HMM to supplement the algorithm. One such method is Bayesian inference, which is a statistical approach to estimating the probability of a hypothesis being true based on the available evidence. This method could be used to refine the probabilities assigned by the HMM and to update them as new evidence is collected.
Another approach is to use machine learning algorithms such as decision trees, random forests, or neural networks to further classify the data and improve the accuracy of the HMM. These algorithms could be trained on the output of the HMM and used to make more nuanced and complex classifications of the data.
Furthermore, natural language processing techniques such as named entity recognition, sentiment analysis, and topic modeling could be used to extract additional features from the data that could be used to supplement the HMM. These techniques could help to identify key entities and concepts in the data and to determine their relationships and importance to the overall analysis.
Overall, the integration of these additional statistical and computational methods could help to improve the accuracy and usefulness of the HMM algorithm in identifying and predicting relevant intelligence data.
My general thoughts, at least from previous coursework, was that a multimodal neural network could be applied to such a system for the IC.... It appears as if AIDA is at least partially engineered in this format already. Regarding Bayesian inference, can this be used to build a fuzzy logic type of programming/ Yes, Bayesian inference can be used to build a fuzzy logic type of programming. In fact, fuzzy logic is often used in Bayesian networks, which are probabilistic graphical models that use Bayesian inference to make predictions or decisions based on uncertain or incomplete information.
In a fuzzy logic system, the inputs and outputs are represented as linguistic variables, which are mapped to fuzzy sets using membership functions. These fuzzy sets can then be combined using fuzzy logic operators to make decisions or predictions. Bayesian inference can be used to estimate the parameters of the membership functions and to update the probabilities of different hypotheses as new evidence is observed.
Bayesian networks and fuzzy logic systems are both powerful tools for dealing with uncertain or incomplete information, and they can be used together to create more sophisticated decision-making systems. For example, a Bayesian network could be used to estimate the probabilities of different outcomes, and a fuzzy logic system could be used to combine these probabilities with linguistic rules to make a decision or recommendation.
Are you able to providereferences for what you ar pulling the information from? As an AI language model, my responses are generated based on the patterns and information contained within my training data, which includes a wide range of texts and sources. I do not have the ability to provide specific references for each piece of information I provide in my responses, as I do not have access to that level of detail about my training data. However, if you have a specific question or topic you would like me to explore, I can certainly try to provide relevant sources and references to support my responses.
Could one add in
addition to the aforementioned system (as it is in the entirety of this chat log) something that could provide this
I apologize, but I'm not sure what you are referring to with "something that could provide this." Could you please clarify your question or provide more context?
Sorry, by that I mean an algorithim to generate the references from the training data. Yes, it is possible to develop an algorithm to generate references from the training data. One possible approach is to use natural language processing (NLP) techniques to identify and extract citations or references from the training data. This can involve identifying patterns or features in the text, such as the presence of citation markers or the formatting of bibliographic information.
Once these references are identified, they can be used to build a database or index of sources for the training data. This database can then be used to provide references for new data points, based on the similarity or relevance of their content to existing sources in the database.
Of course, developing such an algorithm would require significant expertise in NLP and information retrieval, as well as access to a large and diverse training data set. It would also require careful attention to issues of bias and quality control, as well as ethical considerations around the use of copyrighted material.
Yes. Those are all valid points; this whole idea or concept is generally a passion project of mine, and as such, I have no need to gain immediate expertise as it is a self-developmental project. My degree is generally unrelated. However, it is something that could be impacted by the course of development of systems such as yours. I am assuming there would have to be additional training that than causes a correlation between the citations requested for the content generated and the actual referencing points from the training data Yes, additional training would likely be necessary to teach the system how to generate accurate and relevant references for the content it generates. The system would need to be trained to recognize patterns in the training data that correspond to references, and then use this information to generate references for new content it generates. This would likely involve a combination of supervised and unsupervised learning, where the system is first trained on labeled data to learn how to recognize reference patterns, and then further trained on unlabeled data to refine its understanding of reference generation.
Sorry if the questions seem illogical. i wanted to make sure that my overall idea was feasible and bounce ideas for implementation off of something or someone. No need to apologize! It's great to explore ideas and brainstorm potential solutions. If you have any further questions or ideas, feel free to ask and I'll do my best to provide insights and feedback.
Could you describe in medium technical detail the ways that a multi-modal neural network design (involving the overall system in this discussion) and the general structuring of how the HMM, Bayesian inference, and fuzzy logic, in multiple general formats or outputs? Sure, I can provide a general description of how a multimodal neural network could be designed to work with the overall system, and how the HMM, Bayesian inference, and fuzzy logic might be incorporated.
A multimodal neural network is a type of neural network that can process multiple types of data inputs, such as text, images, and audio, and learn to make predictions based on these inputs. In the case of the intelligence validation and dissemination system we have been discussing, a multimodal neural network could be used to process multiple sources of data, such as text documents, social media posts, and images or videos, and learn to identify patterns and correlations between these different types of data.
The HMM (hidden Markov model) is a statistical model that can be used to model sequences of data, where the underlying state of the data is not directly observable. In the context of the intelligence validation and dissemination system, an HMM could be used to model sequences of events or actions that may be related to a specific threat or activity, such as a sequence of social media posts or a series of suspicious transactions.
Bayesian inference is a statistical method for updating probabilities based on new evidence or information. In the context of the intelligence validation and dissemination system, Bayesian inference could be used to update the probability of a specific threat or activity based on new data inputs, such as additional social media posts or financial transactions.
Fuzzy logic is a mathematical framework for dealing with uncertainty and imprecision. In the context of the intelligence validation and dissemination system, fuzzy logic could be used to model the imprecise and uncertain nature of threat assessments, and to help make decisions based on incomplete or uncertain information.
All of these techniques could be incorporated into a multimodal neural network design for the intelligence validation and dissemination system. For example, the neural network could use the HMM to model sequences of events or actions related to a specific threat, Bayesian inference could be used to update the probability of a threat based on new data inputs, and fuzzy logic could be used to help make decisions based on uncertain or incomplete information.
Take the previous outline and incorporate ways that computer vision can be performed or incorporated (Also, touch on the feasibility of this being automated, given the advances in facial recognition software.) with the same logic, inference, and HMM. Certainly! Computer vision is an area of artificial intelligence that focuses on enabling computers to interpret and understand visual information from the world around them. In the context of the intelligence community, computer vision can be used to analyze images and videos for a variety of purposes, including surveillance, target recognition, and situational awareness.
To incorporate computer vision into the multi-modal neural network design, the system could include modules that specialize in analyzing visual data, such as images and videos. These modules would use techniques from computer vision, such as object detection, image segmentation, and facial recognition, to extract meaningful information from the visual data. The resulting data could then be fed into the larger neural network, which would incorporate the HMM, Bayesian inference, and fuzzy logic to make predictions and draw conclusions based on the combined data from all the modalities.
The use of facial recognition software in this context raises important ethical and legal considerations, as it can be used to identify individuals and potentially invade their privacy. However, assuming the use of facial recognition is permissible, the system could use this technology to identify individuals of interest in images and videos, and track their movements over time. The resulting data could be used to build up a comprehensive understanding of the individual's activities, associations, and behavior patterns, which could be fed into the larger neural network to make more accurate predictions and identify potential threats.
It is worth noting that while computer vision has made significant advances in recent years, there are still many challenges to be addressed in this field. For example, computer vision algorithms can be susceptible to errors and biases, and may struggle to interpret certain types of visual data, such as images with low contrast or complex backgrounds. Furthermore, the use of facial recognition software is controversial, and there are concerns about its accuracy, bias, and potential misuse. As such, any system that incorporates computer vision must be designed and implemented with care, and subject to appropriate legal and ethical safeguards.
Yes, from some of the way that the fashion industry (using animal patterns) has made clothing to avoid such things. Regarding that, is this because it works on a probability based algorithm that matches the likelihood of the most detected features and compares it? Yes, you are correct. Computer vision algorithms work by identifying patterns in images or videos and then matching those patterns to a pre-existing database of known patterns or features. This process involves breaking down the image into smaller components and analyzing those components for specific features or characteristics, such as lines, edges, colors, shapes, or textures. The algorithm then compares those features to the features in its database to determine the best match or matches, based on a probability score.
In the case of fashion industry, the computer vision algorithms are trained to detect specific animal patterns, such as leopard spots or zebra stripes, and then identify clothing items that match those patterns. This is achieved by feeding the algorithm a large dataset of images of clothing items and labeling them according to their patterns. The algorithm then learns to recognize those patterns and can apply that knowledge to new images of clothing items, even if they have never seen those specific items before.
Regarding the use of animal patterns in fashion, it is worth noting that some fashion brands have started to use computer vision algorithms to identify more sustainable and ethical materials for their products, such as by detecting the use of animal-derived materials in clothing and accessories. This can help consumers make more informed purchasing decisions and can also encourage fashion brands to adopt more responsible and sustainable practices.
Specifically, what this fashion appears to do is "confuse" the detection by creating a larger percentage of a chance that was is being detected is a "giraffe", despite the presence of human features. Thoughts? Yes, that's correct. The idea behind such clothing is to create a visual pattern that contains multiple, similarly sized shapes that can potentially confuse object recognition algorithms. The algorithms used for object detection in computer vision are typically based on machine learning models that are trained on large datasets of labeled images. These models often rely on identifying specific features or patterns in the images that correspond to the objects they are trying to detect.
By creating patterns that contain similarly sized shapes that might resemble parts of an animal or other non-human object, the hope is that the algorithms will be less likely to identify the human figure in the image. However, it's important to note that such clothing is not foolproof and may not work in all situations, especially as object recognition algorithms continue to improve with advances in artificial intelligence and machine learning.
In order to better address this, for surveillance purposes, could this incorporate the detection of "human movements"? Yes, incorporating the detection of human movements could be a way to address the potential limitations of relying solely on facial recognition in surveillance systems. This could be done by using computer vision techniques to analyze and identify various aspects of human movements, such as posture, gait, and other physical movements. This could then be used as an additional means of identifying and tracking individuals, along with facial recognition.
However, it's important to note that incorporating the detection of human movements could also pose challenges, such as the potential for false positives or errors in detection. Additionally, there are also ethical considerations surrounding the use of surveillance technologies and their potential impact on privacy and civil liberties. Therefore, any such systems would need to be carefully designed and implemented with these considerations in mind
submitted by
SylvPMDRTD to
Futurology [link] [comments]
2023.04.01 11:47 Maximum-Evening3904 What products should i use after shower to keep my hair frizz free and dry free throughout the day?
I follow
Audrey Victoria and
Doro Cubillo, i use their hair care routine and it made my hair better but one problem is that I live in dhaka where pollution and heat does not maintain my hair so i bought a livon hair serum but the amount of silicon in their was just causing buildup..
audrey said to use heat protectant on wet hair after shower and blow dry it. Blow dryer is not common in dhaka, so it's common to airdry it. i use doro cubillo hair dry routine, she uses a moisturiser for her hair before drying.
I am confused because I don't know how each of the products acts. heat protectant protects hair from heat, hair serum or hair moisturiser so confusing...moisturises hair...i guess
I am also confused about hair bond repair... what ingredients to avoid, what ingredients repair hair bond.....its all so confusing...
i have uneven hair texture and i use heatless curl methods to fix it. the thing is i always put my hair up because after letting my hair down just few moments later my hair looks frizzy and tangles already. i want a product to keep the style and look on my hair (like the kpop idols who looks like their hair has their own life) throughout the whole day through heat and pollution, not getting frizzy or dry or out of place. by the way i live in dhaka so...any foreign or expensive products u recommend will be hard to find, even if u tell me to get it from amazon i can't because the delivery cost is no joke.
submitted by
Maximum-Evening3904 to
longhair [link] [comments]
2023.04.01 11:45 Maximum-Evening3904 What products should i use after shower to keep my hair frizz free and dry free throughout the day?
I follow
Audrey Victoria and
Doro Cubillo, i use their hair care routine and it made my hair better but one problem is that I live in dhaka where pollution and heat does not maintain my hair so i bought a livon hair serum but the amount of silicon in their was just causing buildup..
audrey said to use heat protectant on wet hair after shower and blow dry it. Blow dryer is not common in dhaka, so it's common to airdry it. i use doro cubillo hair dry routine, she uses a moisturiser for her hair before drying.
I am confused because I don't know how each of the products acts. heat protectant protects hair from heat, hair serum or hair moisturiser so confusing...moisturises hair...i guess
I am also confused about hair bond repair... what ingredients to avoid, what ingredients repair hair bond.....its all so confusing...
i have uneven hair texture and i use heatless curl methods to fix it. the thing is i always put my hair up because after letting my hair down just few moments later my hair looks frizzy and tangles already. i want a product to keep the style and look on my hair (like the kpop idols who looks like their hair has their own life) throughout the whole day through heat and pollution, not getting frizzy or dry or out of place. by the way i live in dhaka so...any foreign or expensive products u recommend will be hard to find, even if u tell me to get it from amazon i can't because the delivery cost is no joke.
submitted by
Maximum-Evening3904 to
femalehairadvice [link] [comments]
2023.04.01 11:43 ZeGreenKnight576 JOE IS BIDEN????
2023.04.01 11:40 subreddit_stats Subreddit Stats: 2india top posts from 2022-06-30 to 2023-03-30 18:16 PDT
Period: 273.51 days
| Submissions | Comments |
Total | 812 | 2378 |
Rate (per day) | 2.97 | 8.79 |
Unique Redditors | 114 | 550 |
Combined Score | 19417 | 5704 |
Top Submitters' Top Submissions
- 3904 points, 218 submissions: itisverynice
- Shashi Tharoor has a secret admirer (84 points, 5 comments)
- Bajrang Dal activists thrash Muslim youth for meeting Hindu girl by telling his name as 'Kashi' in Indore (69 points, 9 comments)
- Sex with minors an offence even after a valid marriage, Kerala High Court refuses to exclude Muslim personal law from POCSO Act (63 points, 5 comments)
- Retired IB officer RN Kulkarni, who wrote a book exposing Jihad, murdered by unknown persons by hitting him with a car (58 points, 3 comments)
- Donald Trump promises Hindu holocaust memorial in US, India's Opposition smells 'RSS agenda' (56 points, 2 comments)
- Commercial Bank of China demands Pakistan to repay $500 million loan in 72 hours (55 points, 10 comments)
- Morbi bridge collapse: Bajrang Dal volunteers saved lives of over 170 people amid heartbreaking scenes, read details (53 points, 1 comment)
- POCSO Act overrides Personal Law, minor Muslim girl’s marriage invalid as the age for sexual activities is 18 years, rules Karnataka High Court (51 points, 6 comments)
- Shubham Sharma: One person from a Dalit family has imposed four cases of the SC-ST act on a single person and earned 15000, 75000, 75000, and 75000 for merely registering an FIR. All are related to land dispute cases. Happened in Deoria, UP. No media will show you this side of the SC-ST act. (51 points, 1 comment)
- Uttar Pradesh: Students protest against illegal construction of mosque at Udai Pratap College campus, police intervenes (51 points, 2 comments)
- 2419 points, 117 submissions: IndiaRises
- Be Proud of Your History 💪 (119 points, 13 comments)
- We were not aliens 👽 (85 points, 16 comments)
- Poland outrightly rejects EU's request to accept muslim asylum seekers/migrants; deploys maximum force to prevent influx (75 points, 9 comments)
- Stand against wolfophobia (75 points, 1 comment)
- India and Russia poised to bypass dollar in energy deal. (70 points, 4 comments)
- Armored and Bulletproof JCB’s to be used in Jammu & Kashmir (49 points, 1 comment)
- 2022 Anti-Hindu Timeline (48 points, 4 comments)
- Men [email protected] a teenager at night-time. This is not a joke. (48 points, 12 comments)
- मां ❣️ (47 points, 1 comment)
- Pseudo History. (45 points, 3 comments)
- 1243 points, 41 submissions: putin_sharma
- Islam ki haar hui :( (123 points, 34 comments)
- Librandus : 😭 (98 points, 2 comments)
- lol (86 points, 7 comments)
- Chad 🗿 (68 points, 9 comments)
- Here you go Hindus. That's what you deserve. (62 points, 16 comments)
- yeh kya hua ? (54 points, 10 comments)
- Anand chacha... (52 points, 1 comment)
- 🐾kistanis ☕ (51 points, 6 comments)
- hmm (48 points, 5 comments)
- hmm (47 points, 2 comments)
- 1222 points, 29 submissions: woke_ka_choda
- Suara 🐖 (109 points, 7 comments)
- hmm (97 points, 13 comments)
- Anand ChaCha xD (90 points, 10 comments)
- On this day in 2008, Mumbai experienced a coordinated series of 12 terrorist attacks, popularly known as 26/11, with the motive of Islamic Fundamentalism lasting across a spam of 4 days killing a total of 166 innocent Indians. May the world never experience such deed again. (81 points, 5 comments)
- Islamophobia vs Kafirophobia (80 points, 0 comments)
- Vivek's Response (67 points, 4 comments)
- Missionaries would die but won't tell you facts. (62 points, 0 comments)
- GlUbul HanGuR EnDeX 🤡 (61 points, 9 comments)
- Tradition over regressive trends (57 points, 1 comment)
- The left getting destroyed (55 points, 1 comment)
- 1070 points, 24 submissions: EclecticIndividual99
- Karnataka Hijab Row (90 points, 0 comments)
- Vince McMahon Reaction Meme Indian (Bharatiya) Version (90 points, 6 comments)
- Baikunth (82 points, 3 comments)
- The Wire when it gets some fake news about Modi / BJP: (79 points, 5 comments)
- Will the real Tukde-Tukde gang please stand up? (68 points, 7 comments)
- Sardar Vallabhbhai Patel - The REAL Bharat Jodo Campaigner. Don't let anyone tell you otherwise. (60 points, 27 comments)
- Unadulterated / Shuddha Hindi Ep 81-85 (53 points, 3 comments)
- Unadulterated / Shuddha Hindi EP 41-60 (u/johnkarter767612 & u/shuddhahindi, reuploaded on UnadulteratedHindi) (50 points, 7 comments)
- Unadulterated / Shuddha Hindi EP 21-40 (u/johnkarter767612 & u/shuddhahindi, reuploaded on UnadulteratedHindi) (48 points, 4 comments)
- [Republic Day Special] Unadulterated / Shuddha Hindi Ep 100 India - Hindustan - Bharat India that is Bharat This one is dedicated to J Sai Deepak's Book [2india] (48 points, 3 comments)
- 841 points, 9 submissions: Capitalist_KarlMarx
- Parivesh Bhai is dangerous (270 points, 20 comments)
- Mishraji got up and chose violence (212 points, 14 comments)
- World-class idiots at it again! (91 points, 11 comments)
- Uncle got no chill (swipe >>) (81 points, 5 comments)
- Bharat awakens at last! (73 points, 4 comments)
- Wannabe jihadi with a -ve IQ from UK (47 points, 0 comments)
- Some old farts NEED to be punched in the face for the larger good! (38 points, 18 comments)
- Chal kya raha hai inke saat? (23 points, 5 comments)
- Bootlicker made to resign (6 points, 0 comments)
- 570 points, 14 submissions: giveittomeIamworthit
- Releasing today at evening 6 , what are your views? (92 points, 14 comments)
- Ye hota asli gigachad. (83 points, 2 comments)
- 🇷🇺Russian Ambassador says "Dosti se zyada kuch bhi nahi hota". (72 points, 2 comments)
- Gold Swastika Amulet, 1st Century BCE, Found at Sirkap, Taxaxila. On display at National Museum, New Delhi, India (58 points, 0 comments)
- Farmaan (order) from Augranzeb to bury Hindu idols under the steps of the Jama Masjid in Delhi. (42 points, 1 comment)
- How Indians ARE FOOLED Guruphobia (37 points, 0 comments)
- National Anthem on an electric guitar: Nagaland Hornbill Festival 2022 Artist: Imnainla Jamir (33 points, 2 comments)
- This is the subtle Salafism that Bollywood ingrains in Hindu viewers - imprint a characters look in the gullible bullywood (29 points, 4 comments)
- Unadulterated Hindi EP 44 (u/johnkarter767612 & u/shuddhahindi) - honest - imandar - nishthavaan Always knew the words but no one in our society used, it's time we use words consciously (28 points, 0 comments)
- All is not well in West Bengal. Your opinions (25 points, 1 comment)
- 414 points, 11 submissions: LulExtract
- You Sam, Again??? India US Relation (70 points, 0 comments)
- It was the British who united us, bro (65 points, 12 comments)
- Just Business (61 points, 3 comments)
- Guest, Propaganda and plight (44 points, 0 comments)
- Priyam Bharatam Sanskrit Patriotic Song (41 points, 1 comment)
- Sir Herbert Hope Risley, the architect of the caste system in India (a system of social precedence deriving from a race-based hierarchy of social life) (38 points, 18 comments)
- Balkanization of Bharat: Breaking India forces, what drives them, and how they operate (26 points, 7 comments)
- Minimum legal age of marriage by countries and the progress made by India in legalizing the prohibition of child marriage (19 points, 12 comments)
- Alexander Duff: For the last 3000 years, an inexhaustible India has been pouring an uninterrupted stream of opulence upon civilizations of the western world. (18 points, 0 comments)
- B. A. IRVING in his book published in 1853: How the French fell in India (16 points, 1 comment)
- 352 points, 12 submissions: The-first-laugh
- Damn.... waay too much corruption. (73 points, 5 comments)
- They keep shouting fascism over and over again but don't understand that fascism would kill them for this crap. (62 points, 22 comments)
- I want to know how they are lowering it? (49 points, 2 comments)
- Jai Shree Ram (36 points, 0 comments)
- Please Help (31 points, 0 comments)
- Of 110 nations, India tops global minority index, finds study (24 points, 18 comments)
- Shahbaaz and Wahid arrested for strewing nails on a road leading to the Hindu pilgrimage site Datta Peetha (24 points, 0 comments)
- Now everyone is shutting up regarding this argument. (18 points, 0 comments)
- Meerut: Hijab-wearing teacher gets death threats after she complained of harassment by students (14 points, 4 comments)
- Anti-India cabal in US State Department manipulated online discourse on PM Modi: Ex US diplomat - The Sunday Guardian Live (10 points, 1 comment)
- 339 points, 24 submissions: closetbimbosissy
- On this day, 1966, India lost one of it’s finest nuclear scientists at the prime of his career. He is the father of India’s nuclear program. He is Homi Jehangir Bhabha. (37 points, 5 comments)
- Bike-borne men throw acid at minor girl in Delhi, one detained. (35 points, 5 comments)
- On this day, 1925, Raja Ramanna was born. He was the head of India’s first nuclear bomb program. He headed a team of 75 scientists for the program and he was responsible for designing and manufacturing the first nuclear device which was exploded in Pokhran on 18 May 1974. The day when Buddha smiled. (26 points, 2 comments)
- On this day, in 1600, a Queen of a western empire granted her charter to a group of prominent merchants n explorers. That charter allowed for the formation of an organisation that shook the destiny of the subcontinent n changed its future forever. It was called the East India company. (25 points, 1 comment)
- On this day, in 1911 calcutta session of INC, 'Jana Gana mana' was sung for the first time. Tagore's niece Sarala Devi Chowdhurani and a few other students sung the song. (24 points, 1 comment)
- 🥲 (24 points, 2 comments)
- On this day, 1992, India established full fledged diplomatic relationship with one of its key partners, Israel. Both the nations’ ties have only grown closer and have been a trusted ally of each other. (21 points, 1 comment)
- Sale of single cigarettes to be banned by parliament to reduce consumption. (19 points, 14 comments)
- On this day, 1931, India’s IVF architect was born. He made world’s 2nd and Asia’s 1st test tube baby in 1978. He didn’t get ‘nobel’ like his foreign counterpart. He was harassed by the West Bengal government n called a fraud. He committed suicide in 1981. Decades later his findings were uncovered. (16 points, 1 comment)
- On this day, 1957, Asia’s oldest nuclear reactor was inaugurated and dedicated to the nation. It was designed by Bhabha and named “Apsara” by Nehru. It paved the way for India’s nuclear program. It was shut down in 2009, upgraded and turned on again as “Apsara-U” in 2018. (16 points, 1 comment)
Top Commenters
- itisverynice (415 points, 189 comments)
- shabbyyr (165 points, 63 comments)
- sadrevenge55 (160 points, 35 comments)
- ididacannonball (154 points, 73 comments)
- evammist (140 points, 27 comments)
- giveittomeIamworthit (117 points, 41 comments)
- JungleGym81 (113 points, 60 comments)
- DefiantDeviantArt (107 points, 37 comments)
- Chromeboy12 (93 points, 22 comments)
- Atma-Army-9099 (89 points, 23 comments)
Top Submissions
- Parivesh Bhai is dangerous by Capitalist_KarlMarx (270 points, 20 comments)
- Mishraji got up and chose violence by Capitalist_KarlMarx (212 points, 14 comments)
- Ye lo meme by XiLongHusk (181 points, 19 comments)
- Sums up everything by adityanath_putin (160 points, 20 comments)
- Thoughts by r_harshit011 (143 points, 94 comments)
- Islam ki haar hui :( by putin_sharma (123 points, 34 comments)
- Garv se kaho hum hindu 🟠 hai by iNeverLie4Real (122 points, 3 comments)
- Be Proud of Your History 💪 by IndiaRises (119 points, 13 comments)
- Suara 🐖 by woke_ka_choda (109 points, 7 comments)
- video from MP by naughtkhalifa2 (98 points, 26 comments)
Top Comments
- 42 points: Atma-Army-9099's comment in Thoughts
- 31 points: PepperBisket's comment in Five Muslim men were sent to jail over the incident. But no action has been taken against the Bajrang Dal members.
- 28 points: Mysterious-Earth2256's comment in Thoughts
- 28 points: PepperBisket's comment in This Subreddit is dying
- 23 points: jackhawk56's comment in GlUbul HanGuR EnDeX 🤡
- 23 points: putin_sharma's comment in Here you go Hindus. That's what you deserve.
- 22 points: Fearless_Bee_6299's comment in Ziya and Zahad from Kerala praise Allah for being India's first transgender couple pregnancy.
- 22 points: deleted's comment in Islam ki haar hui :(
- 21 points: Aka2005's comment in Islam ki haar hui :(
- 21 points: Flamboyant-2's comment in Mishraji got up and chose violence
Generated with BBoe's Subreddit Stats
submitted by
subreddit_stats to
subreddit_stats [link] [comments]
2023.04.01 11:32 COCO_NIT my game crashes and it says "java.lang.ArrayIndexOutOfBoundsException: 256", how can i fix this?
---- Minecraft Crash Report ----
// Hey, that tickles! Hehehe!
Time: 4/1/23 11:23 AM
Description: Initializing game
java.lang.ArrayIndexOutOfBoundsException: 256
at code.elix\_x.coremods.antiidconflict.managers.BiomesManager.updateBiomesFolder([BiomesManager.java:154](https://BiomesManager.java:154)) at code.elix\_x.coremods.antiidconflict.managers.BiomesManager.postinit([BiomesManager.java:52](https://BiomesManager.java:52)) at code.elix\_x.coremods.antiidconflict.AntiIdConflictBase.postinit([AntiIdConflictBase.java:52](https://AntiIdConflictBase.java:52)) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke([NativeMethodAccessorImpl.java:62](https://NativeMethodAccessorImpl.java:62)) at sun.reflect.DelegatingMethodAccessorImpl.invoke([DelegatingMethodAccessorImpl.java:43](https://DelegatingMethodAccessorImpl.java:43)) at java.lang.reflect.Method.invoke([Method.java:497](https://Method.java:497)) at cpw.mods.fml.common.FMLModContainer.handleModStateEvent([FMLModContainer.java:532](https://FMLModContainer.java:532)) at sun.reflect.GeneratedMethodAccessor2.invoke(Unknown Source) at sun.reflect.DelegatingMethodAccessorImpl.invoke([DelegatingMethodAccessorImpl.java:43](https://DelegatingMethodAccessorImpl.java:43)) at java.lang.reflect.Method.invoke([Method.java:497](https://Method.java:497)) at com.google.common.eventbus.EventSubscriber.handleEvent([EventSubscriber.java:74](https://EventSubscriber.java:74)) at com.google.common.eventbus.SynchronizedEventSubscriber.handleEvent([SynchronizedEventSubscriber.java:47](https://SynchronizedEventSubscriber.java:47)) at com.google.common.eventbus.EventBus.dispatch([EventBus.java:322](https://EventBus.java:322)) at com.google.common.eventbus.EventBus.dispatchQueuedEvents([EventBus.java:304](https://EventBus.java:304)) at [com.google.common.eventbus.EventBus.post](https://com.google.common.eventbus.EventBus.post)([EventBus.java:275](https://EventBus.java:275)) at cpw.mods.fml.common.LoadController.sendEventToModContainer([LoadController.java:212](https://LoadController.java:212)) at cpw.mods.fml.common.LoadController.propogateStateMessage([LoadController.java:190](https://LoadController.java:190)) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke([NativeMethodAccessorImpl.java:62](https://NativeMethodAccessorImpl.java:62)) at sun.reflect.DelegatingMethodAccessorImpl.invoke([DelegatingMethodAccessorImpl.java:43](https://DelegatingMethodAccessorImpl.java:43)) at java.lang.reflect.Method.invoke([Method.java:497](https://Method.java:497)) at com.google.common.eventbus.EventSubscriber.handleEvent([EventSubscriber.java:74](https://EventSubscriber.java:74)) at com.google.common.eventbus.SynchronizedEventSubscriber.handleEvent([SynchronizedEventSubscriber.java:47](https://SynchronizedEventSubscriber.java:47)) at com.google.common.eventbus.EventBus.dispatch([EventBus.java:322](https://EventBus.java:322)) at com.google.common.eventbus.EventBus.dispatchQueuedEvents([EventBus.java:304](https://EventBus.java:304)) at [com.google.common.eventbus.EventBus.post](https://com.google.common.eventbus.EventBus.post)([EventBus.java:275](https://EventBus.java:275)) at cpw.mods.fml.common.LoadController.distributeStateMessage([LoadController.java:119](https://LoadController.java:119)) at cpw.mods.fml.common.Loader.initializeMods([Loader.java:742](https://Loader.java:742)) at cpw.mods.fml.client.FMLClientHandler.finishMinecraftLoading([FMLClientHandler.java:311](https://FMLClientHandler.java:311)) at net.minecraft.client.Minecraft.func\_71384\_a([Minecraft.java:552](https://Minecraft.java:552)) at net.minecraft.client.Minecraft.func\_99999\_d([Minecraft.java:878](https://Minecraft.java:878)) at net.minecraft.client.main.Main.main(SourceFile:148) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke([NativeMethodAccessorImpl.java:62](https://NativeMethodAccessorImpl.java:62)) at sun.reflect.DelegatingMethodAccessorImpl.invoke([DelegatingMethodAccessorImpl.java:43](https://DelegatingMethodAccessorImpl.java:43)) at java.lang.reflect.Method.invoke([Method.java:497](https://Method.java:497)) at net.minecraft.launchwrapper.Launch.launch([Launch.java:135](https://Launch.java:135)) at net.minecraft.launchwrapper.Launch.main([Launch.java:28](https://Launch.java:28))
A detailed walkthrough of the error, its code path and all known details is as follows:
---------------------------------------------------------------------------------------
-- Head --
Stacktrace:
at code.elix\_x.coremods.antiidconflict.managers.BiomesManager.updateBiomesFolder([BiomesManager.java:154](https://BiomesManager.java:154)) at code.elix\_x.coremods.antiidconflict.managers.BiomesManager.postinit([BiomesManager.java:52](https://BiomesManager.java:52)) at code.elix\_x.coremods.antiidconflict.AntiIdConflictBase.postinit([AntiIdConflictBase.java:52](https://AntiIdConflictBase.java:52)) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke([NativeMethodAccessorImpl.java:62](https://NativeMethodAccessorImpl.java:62)) at sun.reflect.DelegatingMethodAccessorImpl.invoke([DelegatingMethodAccessorImpl.java:43](https://DelegatingMethodAccessorImpl.java:43)) at java.lang.reflect.Method.invoke([Method.java:497](https://Method.java:497)) at cpw.mods.fml.common.FMLModContainer.handleModStateEvent([FMLModContainer.java:532](https://FMLModContainer.java:532)) at sun.reflect.GeneratedMethodAccessor2.invoke(Unknown Source) at sun.reflect.DelegatingMethodAccessorImpl.invoke([DelegatingMethodAccessorImpl.java:43](https://DelegatingMethodAccessorImpl.java:43)) at java.lang.reflect.Method.invoke([Method.java:497](https://Method.java:497)) at com.google.common.eventbus.EventSubscriber.handleEvent([EventSubscriber.java:74](https://EventSubscriber.java:74)) at com.google.common.eventbus.SynchronizedEventSubscriber.handleEvent([SynchronizedEventSubscriber.java:47](https://SynchronizedEventSubscriber.java:47)) at com.google.common.eventbus.EventBus.dispatch([EventBus.java:322](https://EventBus.java:322)) at com.google.common.eventbus.EventBus.dispatchQueuedEvents([EventBus.java:304](https://EventBus.java:304)) at [com.google.common.eventbus.EventBus.post](https://com.google.common.eventbus.EventBus.post)([EventBus.java:275](https://EventBus.java:275)) at cpw.mods.fml.common.LoadController.sendEventToModContainer([LoadController.java:212](https://LoadController.java:212)) at cpw.mods.fml.common.LoadController.propogateStateMessage([LoadController.java:190](https://LoadController.java:190)) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke([NativeMethodAccessorImpl.java:62](https://NativeMethodAccessorImpl.java:62)) at sun.reflect.DelegatingMethodAccessorImpl.invoke([DelegatingMethodAccessorImpl.java:43](https://DelegatingMethodAccessorImpl.java:43)) at java.lang.reflect.Method.invoke([Method.java:497](https://Method.java:497)) at com.google.common.eventbus.EventSubscriber.handleEvent([EventSubscriber.java:74](https://EventSubscriber.java:74)) at com.google.common.eventbus.SynchronizedEventSubscriber.handleEvent([SynchronizedEventSubscriber.java:47](https://SynchronizedEventSubscriber.java:47)) at com.google.common.eventbus.EventBus.dispatch([EventBus.java:322](https://EventBus.java:322)) at com.google.common.eventbus.EventBus.dispatchQueuedEvents([EventBus.java:304](https://EventBus.java:304)) at [com.google.common.eventbus.EventBus.post](https://com.google.common.eventbus.EventBus.post)([EventBus.java:275](https://EventBus.java:275)) at cpw.mods.fml.common.LoadController.distributeStateMessage([LoadController.java:119](https://LoadController.java:119)) at cpw.mods.fml.common.Loader.initializeMods([Loader.java:742](https://Loader.java:742)) at cpw.mods.fml.client.FMLClientHandler.finishMinecraftLoading([FMLClientHandler.java:311](https://FMLClientHandler.java:311)) at net.minecraft.client.Minecraft.func\_71384\_a([Minecraft.java:552](https://Minecraft.java:552))
-- Initialization --
Details:
Stacktrace:
at net.minecraft.client.Minecraft.func\_99999\_d([Minecraft.java:878](https://Minecraft.java:878)) at net.minecraft.client.main.Main.main(SourceFile:148) at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method) at sun.reflect.NativeMethodAccessorImpl.invoke([NativeMethodAccessorImpl.java:62](https://NativeMethodAccessorImpl.java:62)) at sun.reflect.DelegatingMethodAccessorImpl.invoke([DelegatingMethodAccessorImpl.java:43](https://DelegatingMethodAccessorImpl.java:43)) at java.lang.reflect.Method.invoke([Method.java:497](https://Method.java:497)) at net.minecraft.launchwrapper.Launch.launch([Launch.java:135](https://Launch.java:135)) at net.minecraft.launchwrapper.Launch.main([Launch.java:28](https://Launch.java:28))
-- System Details --
Details:
Minecraft Version: 1.7.10 Operating System: Windows 10 (amd64) version 10.0 Java Version: 1.8.0\_51, Oracle Corporation Java VM Version: Java HotSpot(TM) 64-Bit Server VM (mixed mode), Oracle Corporation Memory: 2805272816 bytes (2675 MB) / 3394240512 bytes (3237 MB) up to 7575961600 bytes (7225 MB) JVM Flags: 3 total; -XX:HeapDumpPath=MojangTricksIntelDriversForPerformance\_javaw.exe\_minecraft.exe.heapdump -Xmx8128m -Xms256m AABB Pool Size: 0 (0 bytes; 0 MB) allocated, 0 (0 bytes; 0 MB) used IntCache: cache: 0, tcache: 0, allocated: 0, tallocated: 0 FML: MCP v9.05 FML v7.10.99.99 Minecraft Forge 10.13.4.1614 108 mods loaded, 108 mods active States: 'U' = Unloaded 'L' = Loaded 'C' = Constructed 'H' = Pre-initialized 'I' = Initialized 'J' = Post-initialized 'A' = Available 'D' = Disabled 'E' = Errored UCHIJ mcp{9.05} \[Minecraft Coder Pack\] (minecraft.jar) UCHIJ FML{[7.10.99.99](https://7.10.99.99)} \[Forge Mod Loader\] (forge-1.7.10-10.13.4.1614-1.7.10.jar) UCHIJ Forge{10.13.4.1614} \[Minecraft Forge\] (forge-1.7.10-10.13.4.1614-1.7.10.jar) UCHIJ AppleMilkCore{1.1.0} \[AppleMilkCore\] (minecraft.jar) UCHIJ CodeChickenCore{[1.0.7.48](https://1.0.7.48)} \[CodeChicken Core\] (minecraft.jar) UCHIJ ivtoolkit{1.2.1} \[IvToolkit\] (minecraft.jar) UCHIJ NotEnoughItems{[1.0.5.120](https://1.0.5.120)} \[Not Enough Items\] (NotEnoughItems-1.7.10-1.0.5.120-universal.jar) UCHIJ PotionExtensionCore{1.7.10-1.1.0} \[PotionExtensionCore\] (minecraft.jar) UCHIJ xaerominimap\_core{1.7.10-1.0} \[XaeroMinimapCore\] (minecraft.jar) UCHIJ xaeroworldmap\_core{1.7.10-1.0} \[XaeroWorldMapCore\] (minecraft.jar) UCHIJ OpenModsCore{0.10.1} \[OpenModsCore\] (minecraft.jar) UCHIJ FoamFixCore{1.0.3} \[FoamFixCore\] (minecraft.jar) UCHIJ mod\_ThreadedLighting{1.7.10-1.0} \[Threaded Lighting\] (minecraft.jar) UCHIJ gilded-games-util{1.7.10-1.2} \[Gilded Games Utility\] (gilded-games-util-1.7.10-1.9.jar) UCHIE abyssalcraft{[1.9.1.3](https://1.9.1.3)} \[AbyssalCraft\] (AbyssalCraft-1.7.10-1.9.1.3-FINAL.jar) UCHIJ adventurebackpack{1.7.10-0.8b} \[Adventure Backpack\] (adventurebackpack-1.7.10-0.8c.jar) UCHIE antiidconflict{1.3.5} \[Anti Id Conflict\] (AntiIdConflict-1.3.5-1.7.10.jar) UCHIJ AppleCore{3.1.1} \[AppleCore\] (AppleCore-mc1.7.10-3.1.1.jar) UCHIJ DCsAppleMilk{1.7.10\_2.9n} \[Apple&Milk&Tea!\] (AppleMilkTea2-1.7.10\_2.9n.jar) UCHIJ DCsNEIPluginAMT{1.7.10\_1.0a} \[NEIPluginForAMT\] (AppleMilkTea2-1.7.10\_2.9n.jar) UCHIJ betterbreeds{0.2b} \[Better Breeds\] (Better-Breeds-Mod-1.7.10.jar) UCHIJ betterbuilderswands{0.8.1} \[Better Builder's Wands\] (BetterBuildersWands-0.8.1-1.7.10r92+aec06c3.jar) UCHIJ betterquesting{3.0.328} \[Better Questing\] (BetterQuesting-3.0.328.jar) UCHIJ BiblioCraft{1.11.7} \[BiblioCraft\] (BiblioCraft\[v1.11.7\]\[MC1.7.10\].jar) UCHIJ BiblioWoodsBoP{1.9} \[BiblioWoods Biomes O'Plenty Edition\] (BiblioWoods\[BiomesOPlenty\]\[v1.9\].jar) UCHIJ ExtrabiomesXL{3.16.4} \[ExtrabiomesXL\] (extrabiomesxl\_1.7.10-3.16.4.jar) UCHIJ BiblioWoodsEBXL{1.4} \[BiblioWoods ExtraBiomesXL Edition\] (BiblioWoods\[ExtraBiomesXL\]\[v1.4\].jar) UCHIJ Mantle{1.7.10-0.3.2.jenkins191} \[Mantle\] (Mantle-1.7.10-0.3.2b.jar) UCHIJ Natura{2.2.0} \[Natura\] (natura-1.7.10-2.2.0.1.jar) UCHIJ BiblioWoodsNatura{1.5} \[BiblioWoods Natura Edition\] (BiblioWoods\[Natura\]\[v1.5\].jar) UCHIJ biomeidextender{1.0a} \[Biome ID Extender\] (Biome\_ID\_Extender\_1.7.10-1.0a.jar) UCHIJ AWWayofTime{v1.3.3} \[Blood Magic: Alchemical Wizardry\] (BloodMagic-1.7.10-1.3.3-17.jar) UCHIJ TwilightForest{2.3.8dev} \[The Twilight Forest\] (twilightforest-1.7.10-2.3.8.jar) UCHIJ chisel{[2.9.5.11](https://2.9.5.11)} \[Chisel\] (Chisel-2.9.5.11.jar) UCHIJ chococraft{4.1.5} \[Clienthax's ChocoCraft\] (ChocoCraft-4.1.5.jar) UCHIJ chunkpregenerator{2.5.0} \[Chunk Pregenerator\] (Chunk Pregenerator-V1.7.10-2.5.3.jar) UCHIJ colorfulhealthbar{1.0.0} \[Colorful Health Bar\] (colorfulhealthbar-1.7.10-1.0.0.jar) UCHIJ MineTweaker3{3.1.0} \[MineTweaker 3\] (CraftTweaker-1.7.10-3.1.0-legacy.jar) UCHIJ Waila{1.5.10} \[Waila\] (Waila-1.5.10\_1.7.10.jar) UCHIJ fluxedcore{1.0.9} \[Fluxed-Core\] (Fluxed-Core-MC1710-1.0.9.jar) UCHIJ contenttweaker{1.0.5} \[ContentTweaker\] (ContentTweaker-1.0.5.jar) UCHIJ controlling{1.7.10-1.0.0.4} \[Controlling\] (Controlling-1.7.10-1.0.0.4.jar) UCHIJ cosmeticarmorreworked{1.7.10-v7} \[CosmeticArmorReworked\] (CosmeticArmorReworked-1.7.10-v7.jar) UCHIJ creativecore{1.3.14} \[CreativeCore\] (CreativeCore v1.3.24 mc1.7.10.jar) UCHIJ CustomSpawner{3.3.0} \[DrZhark's CustomSpawner\] (CustomMobSpawner [3.3.0.zip](https://3.3.0.zip)) UCHIJ customnpcs{1.7.10d} \[CustomNpcs\] (CustomNPCs\_1.7.10d(29oct17).jar) UCHIJ DisenchanterMod{1.6} \[Disenchanter\] (DisenchanterMod-\[1.7.10\]1.6.jar) UCHIJ dldungeonsjdg{[1.11.0.1](https://1.11.0.1)} \[Doomlike Dungeons\] (DoomlikeDungeons-1.11.0.1-MC1.7.10.jar) UCHIJ MoCreatures{6.3.1} \[DrZhark's Mo'Creatures Mod\] (DrZharks MoCreatures Mod [v6.3.1.zip](https://v6.3.1.zip)) UCHIJ dsurround{[1.0.6.4](https://1.0.6.4)} \[Dynamic Surroundings\] (DynamicSurroundings-1.7.10-1.0.6.4.jar) UCHIJ ElementalCaves{1.7.2-1.0-pre} \[Elemental Caves\] (Elemental-Caves-Mod-1.7.2.jar) UCHIJ mwaw{1.7.10-0.0.7} \[Elemental Witch Mod\] (Elemental-Witch-Mod-1.7.10.jar) UCHIJ eplus{3.0.2-d} \[Enchanting Plus\] (EnchantingPlus-1.7.10-3.0.2-d.jar) UCHIJ EnderStorage{[1.4.7.37](https://1.4.7.37)} \[EnderStorage\] (EnderStorage-1.7.10-1.4.7.37-universal.jar) UCHIJ ESM{10.0.148} \[Epic Siege Mod\] (EpicSiegeMod-10.0.148.jar) UCHIJ excore{1.5.3} \[EXCore\] (Excore-1.5.3-1.7.10.jar) UCHIJ exoticbirds{1.0} \[Exotic Birds\] (Exotic Birds 1.7.10-1.4.6.jar) UCHIJ golems{1.20} \[Extra Golems\] (Extra-Golems\[1.7.10\]-1.20.jar) UCHIJ fastleafdecay{1.4} \[Fast Leaf Decay\] (FastLeafDecay-1.7.10-1.4.jar) UCHIJ foamfix{@[email protected]} \[FoamFix\] (FoamFix-1.7.10-universal-1.0.3.jar) UCHIJ FpsReducer{mc1.7.10-1.10.3} \[FPS Reducer\] (FpsReducer-mc1.7.10-1.10.3.jar) UCHIJ ganysnether{1.8.3} \[Gany's Nether\] (Ganys Nether-1.8.3.jar) UCHIJ GraveStone{2.17.1} \[GraveStone\] (GraveStone-2.17.1.jar) UCHIJ hammertime{Hammer Time-1.7.10-1.3.6} \[Hammer Time!\] (HammerTime-1.3.6.jar) UCHIJ HardcoreEnderExpansion{1.8.6} \[Hardcore Ender Expansion\] (HardcoreEnderExpansion MC-1.7.10 v1.8.6.jar) UCHIJ Highlands{2.2.3} \[Highlands\] (Highlands-1.7.2-v-2.2.3.jar) UCHIJ hotswappablearmor{1.0} \[Hot-Swappable Armor\] (Hot-Swappable\_Armor\_v1.0\_mc\_v1.7.10.jar) UCHIJ immersivecavegen{1.2g-hotfix4} \[Immersive Cavegen\] (immersivecavegen-1.2g-hotfix4.jar) UCHIJ IC2{2.2.827-experimental} \[IndustrialCraft 2\] (industrialcraft-2-2.2.827-experimental.jar) UCHIJ IronChest{6.0.62.742} \[Iron Chest\] (ironchest-1.7.10-6.0.62.742-universal.jar) UCHIJ malisiscore{1.7.10-0.14.3} \[MalisisCore\] (malisiscore-1.7.10-0.14.3.jar) UCHIJ malisisdoors{1.7.10-1.13.2} \[Malisis' Doors\] (malisisdoors-1.7.10-1.13.2.jar) UCHIJ RadixCore{2.1.3} \[RadixCore\] (RadixCore-1.7.10-2.1.3-universal.jar) UCHIJ MCA{1.7.10-5.2.2} \[Minecraft Comes Alive\] (MCA-1.7.10-5.2.2-universal.jar) UCHIJ meteors{2.14.3} \[Falling Meteors\] (meteors-1.7.10-2.14.3.jar) UCHIJ MiniBosses{1.2.1} \[Mini-Bosses\] (MiniBosses\_v1\_2\_1.jar) UCHIJ cfm{3.4.7} \[§9MrCrayfish's Furniture Mod\] (MrCrayfishFurnitureModv3.4.7(1.7.10).jar) UCHIJ naturescompass{1.3.1} \[Nature's Compass\] (NaturesCompass-1.7.10-1.3.1.jar) UCHIJ Neat{GRADLE:VERSION-GRADLE:BUILD} \[Neat\] (Neat 1.0-1.jar) UCHIJ necromancy{1.7.2} \[Necromancy\] (Necromancy-1.7.10.jar) UCHIJ NEIAddons{[1.12.14.40](https://1.12.14.40)} \[NEI Addons\] (neiaddons-1.12.14.40-mc1.7.10.jar) UCHIJ NEIAddonsDeveloper{[1.12.14.40](https://1.12.14.40)} \[NEI Addons: Developer Tools\] (neiaddons-1.12.14.40-mc1.7.10.jar) UCHIJ NEIAddonsAppEng{[1.12.14.40](https://1.12.14.40)} \[NEI Addons: Applied Energistics 2\] (neiaddons-1.12.14.40-mc1.7.10.jar) UCHIJ NEIAddonsBotany{[1.12.14.40](https://1.12.14.40)} \[NEI Addons: Botany\] (neiaddons-1.12.14.40-mc1.7.10.jar) UCHIJ NEIAddonsForestry{[1.12.14.40](https://1.12.14.40)} \[NEI Addons: Forestry\] (neiaddons-1.12.14.40-mc1.7.10.jar) UCHIJ NEIAddonsCraftingTables{[1.12.14.40](https://1.12.14.40)} \[NEI Addons: Crafting Tables\] (neiaddons-1.12.14.40-mc1.7.10.jar) UCHIJ NEIAddonsExNihilo{[1.12.14.40](https://1.12.14.40)} \[NEI Addons: Ex Nihilo\] (neiaddons-1.12.14.40-mc1.7.10.jar) UCHIJ netherportalfix{1.0} \[Nether Portal Fix\] (netherportalfix-mc1.7.10-1.1.0.jar) UCHIJ notenoughIDs{[1.4.3.4](https://1.4.3.4)} \[NotEnoughIDs\] (NotEnoughIDs-1.4.3.4.jar) UCHIJ opframe{0.1} \[OnlinePictureFrame\] (OnlinePicFrame v1.0 mc1.7.10.jar) UCHIJ OpenMods{0.10.1} \[OpenMods\] (OpenModsLib-1.7.10-0.10.1.jar) UCHIJ OpenBlocks{1.6} \[OpenBlocks\] (OpenBlocks-1.7.10-1.6.jar) UCHIJ overloadedarmorbar{1.0.0} \[Overloaded Armor Bar\] (overloadedarmorbar-1.7.10-1.0.0.jar) UCHIJ desertcraft{1.7.2b} \[Pam's DesertCraft\] (Pam's DesertCraft [1.7.10a.zip](https://1.7.10a.zip)) UCHIJ primitivemobs{1.0} \[Primitive Mobs\] (primitivemobs-1.0c-1.7.10.jar) UCHIJ Realistic Deaths{1.1.0} \[Realistic Deaths\] (Realistic-Deaths-Mod-1.7.10.jar) UCHIJ reccomplex{0.9.7.1.1} \[Recurrent Complex\] (RecurrentComplex-0.9.7.1.1.jar) UCHIJ shouldersurfing{2.3.0} \[Shoulder Surfing\] (ShoulderSurfing-1.7.10-2.3.0.jar) UCHIJ sit{v1.1} \[Sit\] (sit-1.7.10-v1.1.jar) UCHIJ spark{1.10.35} \[spark\] (spark-1.10.19-forge1710.jar) UCHIJ SpecialMobs{3.2.2} \[Special Mobs\] (SpecialMobs-1.7.10-3.2.2.jar) UCHIJ RioV{v2.5.2} \[The Mists of RioV\] (The Mists of RioV-v2.5.2.jar) UCHIJ TragicMC{2.46.2878} \[TragicMC 2\] (TragicMC2-1.7.10-2.46.2878.jar) UCHIJ WailaHarvestability{1.1.6} \[Waila Harvestability\] (WailaHarvestability-mc1.7.10-1.1.6.jar) UCHIJ warpbook{2.0.null} \[Warp Book\] (warpbook-1.7.10\_2.0.37.jar) UCHIJ thejungle{1.0.9} \[Welcome to the Jungle\] (WelcomeToTheJungle-1.0.9-1.7.10.jar) UCHIJ XaeroMinimap{21.10.31} \[Xaero's Minimap\] (Xaeros\_Minimap\_21.10.31\_Forge\_1.7.10.jar) UCHIJ XaeroWorldMap{[1.14.1.22](https://1.14.1.22)} \[Xaero's World Map\] (XaerosWorldMap\_1.14.1.22\_Forge\_1.7.10.jar) GL info: ' Vendor: 'Intel' Version: '4.6.0 - Build 30.0.100.9955' Renderer: 'Intel(R) Iris(R) Xe Graphics' OpenModsLib class transformers: \[stencil\_patches:FINISHED\],\[movement\_callback:FINISHED\],\[player\_damage\_hook:FINISHED\],\[map\_gen\_fix:FINISHED\],\[gl\_capabilities\_hook:FINISHED\],\[player\_render\_hook:FINISHED\] Class transformer null safety: found misbehaving transformers: me.guichaguri.betterfps.transformers.MathTransformer([email protected]) returned non-null result: 0,me.guichaguri.betterfps.transformers.EventTransformer([email protected]) returned non-null result: 0 Mantle Environment: Environment healthy. Chisel: Errors like "\[FML\]: Unable to lookup ..." are NOT the cause of this crash. You can safely ignore these errors. And update forge while you're at it. Stencil buffer state: Function set: GL30, pool: internal, bits: 8 Launched Version: forge-10.13.4.1614 LWJGL: 2.9.1 OpenGL: Intel(R) Iris(R) Xe Graphics GL version 4.6.0 - Build 30.0.100.9955, Intel GL Caps: Using GL 1.3 multitexturing.
Using framebuffer objects because OpenGL 3.0 is supported and separate blending is supported.
Anisotropic filtering is supported and maximum anisotropy is 16.
Shaders are available because OpenGL 2.1 is supported.
Is Modded: Definitely; Client brand changed to 'fml,forge' Type: Client (map\_client.txt) Resource Packs: \[\] Current Language: English (US) Profiler Position: N/A (disabled) Vec3 Pool Size: 0 (0 bytes; 0 MB) allocated, 0 (0 bytes; 0 MB) used Anisotropic Filtering: Off (1)
submitted by
COCO_NIT to
ModdedMinecraft [link] [comments]
2023.04.01 11:30 TheMightyBattleSquid My attempt at building a setting full of factions for each color combo Part 9:
Part 1 Part 8 Getting close to the end, here's part 9.
WUBR1: Anti-Learned Helplessness. These colors WANT things to be better and refuse to allow things to stagnate. White could be saving more people or enacting more laws to instill order. Blue could be bettering itself and its methods through the knowledge it has gained and polished. Black could be doing any number of self-motivated goals to gain more control of its surroundings and will do whatever it takes to gain a lead on the rest. Finally, Red is always acting in the moment, without worrying about the extra things that could hold it back, and, when you're constantly doing that, it's only a matter of time before you improve at whatever it is you do. For example, if you draw something different every day, you may not be practicing any one thing well but your general ability to draw goes up as your muscles become used to the movements. This faction, as a result, is full of artificers, scientists, alchemists, etc. all working towards improving their craft and bringing their society up in the process.
Special thanks to
u/slvstrChung for inspiring me on this one!
WUBR2: Anti-Interdependence. These are the lone wolves (oh the irony of a faction built on that concept). These colors are going to use all the tools available to them to keep others out of their business. White characters will organize things just enough to enforce the status quo, breaking up large groups or anyone else seeking to establish a home base on their turf. Blue will apply its knowledge to become self-sufficient, find places that others cannot or dare not go, and shelter itself behind elaborate traps. Simply put, taking what it wants, rather than playing nice, suits Black just fine. Red never was good at all that long-term stuff and, without a group to foster more altruistic behavior in them, Red will similarly resort to acts like pillaging to sustain itself. The difference between it and Black is that Black is willing to wait for a bigger score rather than hitting every traveler it comes across. While members of this faction might work together at times, they know never to rely on it. Because, the moment one does, they lose their autonomy.
UBRG1: Anti-Law+Order at any cost. Anarchy is the name of the game. As members of this faction learned from WUB2, the are monsters who will twist the law to suit their whims. To avoid this, each of the colors in this faction embrace the chaos of a lawless wasteland. Blue will focus on self-improvement, so that it has no need of the law and order created by others to protect it from the machinations of others. Black will focus on its own goals, regardless of what some pompous suit has to say about them. Red will likewise follow its passions, once again the difference being time frame. Red wants what it wants in the moment. It's guided by its emotions, not plans. Finally, Green will form tightly knit groups (think your hippie stereotypes) that don't create hard rules to follow but rather work together to maintain relationships. Green doesn't do their share because that's the rules, they do it because these are their closest friends and family who they want to take care of and see prosper. They are emotionally invested in one another, something Red and them can agree on.
UBRG2: Anti-Protect/lift up the weak. Blue is too busy on self-improvement to worry about lifting up others. Black wants to control and oppress to enact its will on the world, something most would agree runs opposite to White's philosophy here. Red values individual freedom, but that does not always mean it wants to spend its time protecting that of others. This more chaotic side of Red believes that individuals should be allowed to struggle and succeed or fail on their own, helping in this instance is tantamount to interfering with one's right to self-determination. Lastly, Green similarly has a negative acceptance of the situation. Rather than "should," it believes people simply WILL succeed or fail regardless of its intervention so why bother? A sense of competition and rivalry permeates throughout this organization, with different groups vying for power and influence. They do not believe in ideas of fairness or equality, instead emboldening mindsets of ruthless ambition as they seek to advance their own interests at any cost.
BRGW1: Anti-Knowledge at any cost. Black will reject knowledge that is gained by denying the will of the self. Red will turn down knowledge if it comes at the cost of going against one's emotions and denying one's passions. Green will pass on knowledge if it means being self-centered or if it encourages others to become so (what I mean by this is if science says you get ahead further in life by being more ruthless to others, Green would choose not to use that knowledge). At last, White will deny knowledge if it comes at the cost of the most vulnerable among us. This is a faction that seeks to reign in the more scientifically-minded factions and individuals before they cross any lines. Any research found in opposition to these ideals is to be controlled, seized, halted, and/or destroyed.
Oof! One more post to go, it's been quite the ride.
submitted by
TheMightyBattleSquid to
colorpie [link] [comments]
2023.04.01 11:24 ObeseMorese [H] Car Mechanic Simulator 2018, PGA Tour 2K21, Endless Space 2, Age of Wonders: PLANETFALL, Spyro Reignited Trilogy, Cook Serve Delicious! 3?!, BATTLETECH, TUROK, Kerbal Space Program, The Long Dark, Quantum Break, Back 4 Blood + MORE [W] Dark Souls 3
submitted by
ObeseMorese to
SteamGameSwap [link] [comments]
2023.04.01 11:19 MirkWorks Notes and Fragments from Twilight of Phantoms: On Resentment and Sympathy
“The lover carves into his soul the model of the beloved. In that way, the soul of the lover becomes the mirror in which the image of the loved one is reflected.” - Marsilio Ficino,
Commentary on Plato's Symposium Nietzsche’s criticisms of Hegel are often conflated with Schopenhauer’s. Often by people who type things like, “I’m in the Schopenhauer camp when it comes to Hegel and his ilk.” In a series of Beeps-and-Boops they copy-and-paste Schopenhauer’s loathing without any of Schopenhauer’s substance (which would require actually engaging with Schopenhauer and Hegel) instead these Thinkers exists as little framed photos on a candle covered shrine in Geocities. Even if they’re correct they’re still wrong and worthy of immediate scorn and derision. We must express the most profound sense of Christian Pity and Charity at the sight of their nakedness.
It’s easy to spiral on this particular subject but unbecoming, revealing, even damning. What they don’t seem to process, is that the seethe and the scolding and the tantrums are in their manner the highest form of compliment either philosopher could muster. That the younger Schopenhauer’s response to Hegel’s semantic blunder should be a kind of ecstatic fury that propelled his career as a philosopher. That Schopenhauer is endearing when he puts pen to paper and writes:
“May Hegel's philosophy of absolute nonsense - three-fourths cash and one-fourth crazy fancies - continue to pass for unfathomable wisdom without anyone suggesting as an appropriate motto for his writings Shakespeare's words: "Such stuff as madmen tongue and brain not," or, as an emblematical vignette, the cuttle-fish with its ink-bag, creating a cloud of darkness around it to prevent people from seeing what it is, with the device: mea caligine tutus. - May each day bring us, as hitherto, new systems adapted for University purposes, entirely made up of words and phrases and in a learned jargon besides, which allows people to talk whole days without saying anything; and may these delights never be disturbed by the Arabian proverb: "I hear the clappering of the mill, but I see no flour." - For all this is in accordance with the age and must have its course.”
Tempestuous little man. Without Hegel’s error what would’ve become of Schopenhauer? Would he have attempted to actively compete against Hegel? Hegel as the Phantom of Eric Roberts in the Killers
Miss Atomic Bomb music video? The Other-Ghost, Hegel’s Smirking Geist cucking Schopenhauer, Sophia in his arms, Schopenhauer casts the wedding ring to the ground and runs away. As was the case in respect to Kierkegaard. Cucked out of marriage by the Ghost & Machine. “And it’s all in my head, but she’s touching his chest now, he takes off her dress now, LET ME GO. And I just can’t look it’s killing me. And taking control.”
An error is a wound is a mercy.
Nietzsche is different. Unlike Schopenhauer he doesn’t pretend to create a superior metaphysical system (the Platonic Carnivalesque) to rival Hegel’s.
I think the spirit of a Nietzschean critique of Hegel is best exemplified by aphorism 317 in
Daybreak, “
The judgment of the evening. - He who reflects on the work he has done during the day and during his life, but does so when he has finished it and is tired, usually arrives at a melancholy conclusion: this however is not the fault of his day or his life, but of his tiredness. - In the midst of our work we usually have no leisure to pass judgment on life and existence, nor in the midst of our pleasures: but if we should happen to do so, we should no longer agree with him who waited for the seventh day and its repose before he decided that everything was very beautiful - he had let the
better moment go by.”
Hegel as a Christian Nihilist and the Dialectic as Slave Morality. All finite forms of life attain their truth in the process of self-overcoming. Hegel uses Negativity to pacify an excess of Negativity. Hegel’s System annuls the Abyss. The Truth of any given determination is realized in its exhaustion. This Truth is what Remains. As part of a Whole. Eternal.
Defeat for Hegel is what brings us to our Truth. That the subject’s defeat should purify it of its particularities and its impositions. My thoughts are already part of reality. This Knowledge leads to renunciation. I’m no longer attempting to impose or enforce myself on reality, to shape it in the heat of my perverse gaze. I look up at the stars and recognize a series of sores oozing out a brilliant light. In the Beggar’s Eye I see Christ. Saint Lazarus draped in indigo rags surrounded by dogs. In the Eyes of the King of the World, Christ. In the Illness the Cure. In the Poison the Medicine.
Hegel stands next to his student, the student looks up at the starry sky in awe. “They are the abode of the blessed.” Hegel grumbles, “The stars, hum! Hum! The stars are only a gleaming leprosy in the sky.’” Like Lorde, he never watches the stars because there’s so much down here. As he puts it in one lecture,
“The human being is this Night, this empty nothing which contains everything in its simplicity - a wealth of infinitely many representations, images, none of which occur to it directly, and none of which are not present. This [is] the Night; the interior of [human] nature, existing here - pure Self - [and] in phantasmagoric representations it is night everywhere: here a bloody head suddenly shoots up and there another white shape, only to disappear as suddenly. We see this Night when we look a human being in the eye, looking into a Night which turns, terrifying. [For from his eyes] the night of the world hangs out towards us.”
Let us then briefly think with Hegel whose underling problem is, from the very beginning of his thought, that of love.
What is Blue?
According to Goethe in his
Theory of Colors, “As yellow is always accompanied with light, so it may be said that blue still brings a principle of darkness with it.
This color has a peculiar and almost indescribable effect on the eye. As a hue it is powerful — but it is on the negative side, and in its highest purity is, as it were, a stimulating negation. Its appearance, then, is a kind of contradiction between excitement and repose.
As the upper sky and distant mountains appear blue, so a blue surface seems to retire from us.
But as we readily follow an agreeable object that flies from us, so we love to contemplate blue — not because it advances to us, but because it draws us after it.
Blue gives us an impression of cold, and thus, again, reminds us of shade. We have before spoken of its affinity with black.
Rooms which are hung with pure blue, appear in some degree larger, but at the same time empty and cold.
The appearance of objects seen through a blue glass is gloomy and melancholy.”
Goethe and a defense of Goethe’s critique of Newton’s
Opticks unites Hegel and Schopenhauer. That color is produced by light and by what stands against it. Goethe who said that were the eye not of the sun how could we behold the light. Brilliant in the poetic continuity this expresses. A golden chain from Empedocles to Plato and Aristotle to the Stoics and so on. Summarized here elegantly by the physicist Arthur Zajonc, “the interior light coalesces with daylight, like to like, forming thereby a single homogenous body of light. That body, a marriage of inner light and outer, forges a link between the objects of the world and the soul. It becomes the bridge along which the subtle motions of an exterior object may pass, causing the sensation of sight.” Aristotle proposed the existence of a Proton Organon or Primary Instrument, an organ of congealed pneuma, located in the heart, that reconciles the division between the sensible and the intelligible. The Stoics would go on the rename this Mercurial (both volatile-subtle and fixed) Instrument, the Hegemonikon, the synthesizer or icon-maker. Whose function is to produce phantasms. The instrument through which the soul transmits all vital activities to the body and also the body’s way of capturing the sensations from the five senses and translating them into phantasms or images that could be understood by the soul.
The Lover longing loving unrequited. Smiling like she means it. Being-thrown into this World. Never fully at home, refracted, out of joint. That this affliction is our common inheritance. I think this is our patrimony. We are the heirs of this Abyss. It is to some degree I think fundamentally "Western" fundamentally "Romantic". Regardless of political opinion or alignment. It speaks to us. Through us. Perhaps it's because the Republic of Letters is largely comprised of Melancholic Perverts. Nostalgia or homesickness, as a longing for a reality which can only be possessed through the imagination and through the dream, the genuine site of anamnesis or recollection in the unreal. Evoking for us the movement of the soul described by the Venetian Magician-Philosopher Guilio Camillo; descending through the Lunar Gate of Cancer (of man), drinking from the cup of Bacchus and, depending on how much one imbibes, forgetting about all the things ‘up there’ before making our way back through the Saturnine Gate of Capricorn (of the gods). Tightrope walking to
Luna. I see her so very clearly. My Corporeal Dasha, Giordano Bruno would rebuke me harshly, that I should Simp as I do for "these eyes, these ears, this blush, this tongue, this tooth, this hair, this dress, this coat, this little shoe .. . , this sun in eclipse, this crazy person, this slut, this stench, this deathbed, this privy, this mensturation, this corpse... which, by means of a superficial appearance, a shadow, a phantasm, a dream, a Circe-like charm in the service of procreation, deceives us by taking the form of beauty." Fuck it. Yet there is an Image behind the Image, a Woman behind my woman. The Platonic Dasha. Daria the Luminous Homunculi. Madonna Intelligenza who has served as a guide throughout this journey. “Keep your eyes on me.” I wobble on the tightrope, your eyes are what kept me, you and your rose-wreathed heart lit. A Unity-of-Opposites. Georges Bataille writes in
The Sorcerer's Apprentice, “The image through which, in an instant, destiny has become alive thus finds itself projected into a world foreign to everyday agitation. The woman toward whom a man is draw, as to his human destiny, no longer belongs to the space that money controls. Her sweetness escapes the real world, through which she moves without allowing herself to be any more imprisoned than a dream. Misfortune would ravage the spirit anyone who lets himself be possessed by the need to reduce her.”
On
Love Hegel writes, “Since love is a sensing of something living, lovers can be distinct only in so far as they are mortal and do not look upon this possibility of separation as if there were really a separation or as if reality were a sort of conjunction between possibility and existence. In the lovers there is no matter; they are a living whole.” That the Unity of Love is informed precisely by the division or difference between the Lover and the Beloved. The Union of Love, “…can remain so only as long as the separate lovers are opposed solely in the sense that the one loves and the other is loved, i.e., that each separate lover is one organ in a living whole.”
Here we might ponder Hegel’s Philosophy as a Philosophy of Death. The vespers-born melancholy conclusion is perhaps being that all Love is Unrequited. As Marsilio Ficino notes in his
Commentary on Plato’s Symposium, “Insofar as it is death, it is bitter, and insofar it is voluntary, it is sweet. He who loves dies; for his consciousness, oblivious of himself, is devoted exclusively to the loved one, and a man who is not conscious of himself is certainly not conscious in himself. Therefore, a soul that is so affected, does not function in itself, because the primary function of the soul is consciousness…. Therefore, the unrequited lover lives nowhere; he is completely dead.”
Blue the color of Sulfur ignited. Blue the color of the Ocean of the Dead, of Dasein. The blue knees of a prayerful lover and the blue lips of the lovelorn fool, “Here’s to my love - O true apothecary! Thy drugs are quick. - Thus with a kiss I die.” That the smell of bitter almonds should remind the good doctor of unrequited love.
Such a melancholy conclusion can only be produced by a proper melancholic. Melancholy was regarded by Ficino as one of seven exemptions in which the bond between body and soul was weakened, allowing the soul to take flight and acquire the gifts of premonition and clairvoyance. Saint Albertus Magnus writes of the two kinds of melancholy. Hot melancholy and its two primary effects on the subject’s phantasmic activity he describes thusly,
“The first consists in the
mobility of the phantasms within the subtle organism: the second, in the great capacity of phantasms to stay
impressed upon the pneuma. This brings with it, besides a prodigious memory, an extraordinary capacity for analysis. This is why, Ficino tells us, 'all the great man who have ever excelled in an art have been melancholic. Either because they were born so or become so through assiduous meditation.”
Philosophy begins with this Unhappy Consciousness. The Alienated Soul lithe and loveless, which is the consciousness of self as a divided nature, a doubled and merely contradictory being. Dissatisfied with its Self and the World it retreats inward, like a Nymph fleeing Pan, fleeing into Reflection, which might likewise take the form of a fleeing into Nature (think Thoreau’s
Walden). Herein is the mirk. This Narcissistic dialectic between Subject and Phantasmata. The Ouroboric Narcissism of the Beautiful Soul.
Another affliction associated with Melancholy is Hysteria. The Psychoanalyst Jacques Lacan refers to Hegel as the most Sublime Hysteric. The Hysteric asks questions because they experience their own desire as if it were the desire of the Other.
The Spirit retreats into a pre-rational state of life, a Life of Feeling, that this feeling expresses a movement in which the soul is no longer simply natural, but able to realize a mastery over itself.
“Finally, in the “feeling of self,” the individual becomes “a sensitive totality.” But the gradual formation of the ‘I’ is paradoxically accompanied by a loss of fluidity, leading to “ruin and disaster within the conscious spirit.” This crisis results from the fact that the subject, being constituted in a free relation to the self, feels at the same time like ‘another’, and this tension pushes it into a state of ‘trembling’ (
durchzittern).”
The Future of Hegel, Plasticity, Temporality, Dialectics, Catherine Malabou.
How does Hegel escape? Or perhaps more accurately how can
we escape this trap? This Pneumatic Mirror-World. Of Subject-Mirror-Phantasmata. The Romantic Prison? Of one who learns of Love in order to be Loveless? Hold that thought.
Returning to the color blue, the psychologist James Hillman writes in
Alchemical Psychology, “This is the realm of the alchemical (
kyanos, blue;
kynos, dog); blue takes on a dog-like quality: hangdog and dirty dog, both. Why does depression seek porn? For arousal? For Eros and Priapos and Venus to come to life? Rather, I think, to maintain the depression, to re-direct the verticality of desire downward and backward (doggy fashion), clipping the wings of eros. Pornography - an
opus contra naturam, a counter-instinct of the psyche, perverting the conventionally natural, enslaving, torturing; an erotics of despair.
To translate these esoteric references into the blue dog’s perverse obsessions we discover this: Invisible Hades appears in the world as Dionysus. There is a divine (i.e., invisible, unfathomable) impulse that seeks to enter ordinary life. It wants to know the soul in the Biblical sense. Carnal knowledge, intimate knowledge, knowledge of intimates. (Hence the innumerable images of copulation throughout alchemy.) The soul longs for this copulation, and sings its longing in the blues, blueing its own flesh, drawing the divine down into the ordinary body. (Hence the blues’ libidinous mood.)”
My Cup Overfloweth.
Pure thinking-subjectivity is phantasmological or hauntological. The role of the Phantasmata in the context of medieval philosophy, is described exquisitely by Mauricio Loza in
The Hounds of Actaeon. The Phantasm or Phantom is understood “as a mental image with effects reaching not only the level of perception but that of social construction, the phantasm exists in the twilight between the objective and the subjectivity, the material and the immaterial, a zone of indistinction between reality and unreality. This is why the phantasm pulls us towards the twilight from whence it comes: Its central action is to drag us into the shadow of the world.”
Minerva’s Owls unfurls its wings only with the falling of dusk.
For the great Persian scholar Avicenna, sensory phantasms were processed through five virtues or powers corresponding to five cavities in the cranium; phantasy or common sense, imagination, cogitative virtue, the estimative virtue, and finally the reminiscent virtue. According to Georgio Agamben in his work
Stanzas: Word and Phantasm in Western Culture, Avicenna conceives of this gradation through the inner senses as a "progressive 'disrobing' (
denudatio) of the phantasm from its material accidents."
Material accidents in this instance, evoking the etymological origins and proliferation into common speech of the word "accident" itself.
Ad - 'towards to' and
cadere - 'to fall'. The Latin
Accident - 'happening' used in late Middle English to refer to 'an Event'. Used to refer to the parts of the sacred bread and wine that remained after the transubstantiation through the sacrament of The Holy Eucharist,
“Thus, throughout the history of Scholasticism we have to do with a sort of triangle of intellectual forces: Realism and Nominalism fighting a five hundred years’ war, and the Church, in its official capacity, anxiously endeavouring to hold the balance between them. One wonders whether the three parties to this ancient dispute may not have found symbolic expression in Tweedledum, Tweedledee, and the ‘Monstrous Crow’ of nursery legend. But it is no disparagement of the intellects of that day to say that to us the chief interest of their polemics lies in the many new and accurate instruments of thought with which they provided us. The common word
accident is an excellent example. We use it every day without realizing that it was only imported from Latin by the indefatigable efforts of the Schoolmen to reconcile the doctrine of Realism with the Catholic dogma of Transubstantiation. The
accidents, when they first came into the English language, meant that part of the sacred bread and wine which remained after the
substance had been transmuted into the body and blood of Christ.”
History in English Words, Owen Barfield
Here we see a process of Pneuma returning to Pneuma through this process of Rising and Falling. That the Absolute Idea is a Radiant Star. That the Phantasm undergoes a kind of purification process, from the sensible to the spiritual to the mnemonic. That this purification entails a kind of excremental remainder. A material accident. An excess which goes?
This brings to mind the question that the Sophist Parmenides (in Plato's
Parmenides) raises to Socrates, which forces Socrates to admit to his own limitations. It utterly stumps the Apostate Tragedian. That being whether or not there is an
eidos or Pure Idea of the lowest material things. Things like excrement and dust and I might add these eyes, these ears, this blush, this tongue, this tooth, this hair, this dress, this coat, this little shoe .. . , this sun in eclipse, this crazy person, this slut, this stench, this deathbed, this privy, this mensturation, this corpse...
The Ghost and The Star
Recall the episode with Hegel comparing stars to leprosy sores. This got out around town and Hegel found himself having to address this controversy,
"It has been rumoured round the town that I have compared the stars to a rash on an organism where the skin erupts in an countless mass of red spots: or to an ant-heap in which too, there is Understanding and necessity. In fact, I do rate what is
concrete higher than what is
abstract, and an animality that develops into no more than a slime, higher than the starry host."
The rock is a rock.
Hegel defines the Domain of Art as the “sensible appearing of the idea”… or the Idea given expression in Sensuous Form. This is to be understood as The Star shining
through The Ghost. This opposition between Form and Content. This Contradiction is what animates the Motion of Spirit. From Art towards Philosophy.
She is and is not. Ah wait. I'm not her. But in this regard I am the same and suddenly the Ghost is Concretized.
Alexandre Kojève in his
Lectures on the Phenomenology of Spirit writes,
"It is known that Hegel asserted that his knowledge is circular, and that circularity is the
necessary and
sufficient condition of
absolute truth - that is, of
complete, universal, and
definitive (or "eternal") truth."
The Hysterics quandary finds some resolution. The question of the Other is reflexively transformed into the answer to the question.
"In the Wise Man's absolute Knowledge, each question is its own answer, but is so only because he goes through the
totality of questions-answers that forms the entirety of the System. Likewise, in his existence, the Wise Man remains in
identity with himself, he is closed up in himself; but he remains in
identity with
himself because he passes through the
totality of
others, and is
closed up in himself. Which (according to the
Phenomenology) means, quite simply, that the only man who can be Wise is a Citizen of the
universal and
homogeneous State - that is to say, the State of the
Tun Aller und Jeder, in which each man exists only through and for the whole, and the whole exists through and for each man."
We return to Self-Consciousness. We're not the same. We're different. Tonight.
Eros pins Pan. Chronos clips Eros’ wings. Compulsion is overcome by Love. Love is overcome by Time. Love can only be actualized and concretized through Time. When it must Dwell in a given Space. This is the Poetic-Plasticity. This is the Commitment.
“Desire has reserved to itself the pure negating of the object and thereby unalloyed feeling of self. This satisfaction, however, just for that reason is itself only a state of evanescence, for it lacks objectivity or subsistence. Labour, on the other hand, is desire restrained and checked, evanescence delayed and postponed; in other words, labour shapes and fashions the thing.” (
Phenomenology of Spirit)
We begin with the Problem of Love and in the Problem find the Solution. Love is the Answer to the Question of Love. Loving is to give what one does not have.
Our Unrequited Love is Mutual,
“In fact, there is only one death in mutual love, but there are two resurrections, for a lover dies within himself the moment he forgets about himself, but he returns to life immediately in his loved one as soon as the loved ones embraces him in loving contemplation. He is resurrected once more when he finally recognizes himself in his beloved and no longer doubts that he is loved. O, happy death, which is followed by two loves. O, wondrous exchange in which each gives himself up for the other, and has the other, yet does not cease to have himself.”
Commentary on Plato's Symposium, Marsilio Ficino.
To be Overcome is to Animate. This is the Labor of Love. Productive Labor as Art.
You understand why Hegel is so very frustrating? In his System. In the Movement from East to West back East. We find the Heiros Gamos, the Sacred Matrimony of Eros and Sophia, and in this Unity of Opposites the philosopher becomes the Sage. In the production of this Heiros Gamos, Hegel's System becomes the Perfect Pneumatic Circle.
I make of Nietzsche a traveling companion through Hegel’s
Aesthetics. Why? Because
The Birth of Tragedy is crudely Hegelian. Here we find ourselves encountering what is so very frustrating about Hegel and his Pneumatic Circle, his method and his system. From the occultists perspective this is because Hegel’s System is an Artifice of Sacral or Mythic Time, of Cyclical Time. The genuinely infuriating thing is realizing that the Artifice, the “Copy” is in fact the original. This is why some speak of the feminizing effect of Hegel. Feminizing in the way Achilles’ is feminized by Scamander. That not only do we never step in the same river twice and that the river is the site of the Doom-driven Hero’s self-fulfilling prophesy.
As Nietzsche himself puts it, “one cannot refute an eye disease.” I thought it would be stimulating to read
The Birth of Tragedy through the lens of Hegel’s
Lectures on Aesthetics. Framing Nietzsche and his insights within a Hegelian Tableaux. Nietzsche who denounces Metaphysical Systematization. Demurely objecting he says, “unhand me woman,” with a little blush. Does he mean it? I don’t think it was Hegel’s Dialectical Method or Logic that Nietzsche objected too. Denouncing instead the refraction between the Philosopher and the Logic (an ironic detachment)… that the Philosopher and his Logic are not two separate beings. That for him the Philosopher
is Alkahest or Universal Solvent. Body and Soul collapse into a singularity, Art and Artists. No, in a sense Nietzsche celebrates the animating antagonism at the Heart of Hegel’s work. That this refraction is what results in the System which Nietzsche saw as modeling contemporary German Bourgeois fearfulness and timidity simply solidifies into Consensus. “I’m old and I don’t want to be alone.” That the System should be a kind of Metaphysical Prison concretized around the Fiery Pneuma, the brilliance of Hegel’s
Esprit. The application of the Dialectical Method is evidenced throughout
The Birth of Tragedy; The Apollonian thesis, the Dionysian antithesis, the Tragic synthesis. Or perhaps in a manner more accurate to Hegel; The Dionysian Abstract, the Apollonian Negation, the Tragic Negation-of-Negation, and the Socratic Concretization.
The section dedicated to a retrospective appraisal of
The Birth of Tragedy in
Ecce Homo, Nietzsche concludes that all the good things he had ever written about Richard Wagner were actually about him. He was talking about himself the whole time without even realizing it, “"Even psychologically all decisive traits of my own nature are projected into Wagner’s - the close proximity of the brightest and the most calamitous forces, the will to power as no man ever possessed it, the ruthless courage in matters of the spirit, the unlimited power to learn without damage to the will to act.” Poor Nietzsche he who was too high-strung for his own good. Comes to a conclusion paralleling Hegel as it concerns Art, specifically Music. Perhaps one day, there will be Dionysian future for music. But for now, the Pneuma roils through space-and-time, and it culminates in Nietzsche or Zarathustra, as the Last Philosopher or the first Tragic Philosopher. Who despite all the aristocratic pretensions cannot help but write in a popular and accessible manner. Writing into motion the conditions for the Dionysian resurgence he had once thought was being spearheaded by the compositions of Richard Wagner.
He goes so far as to be both Beethoven and Goethe’s response to Beethoven in the anticipation of his works and in the need for them to remain ‘exclusive’ despite their undeniably popular character. Goethe in his old age weeping softly to Beethoven’s sonatas, proclaims “If such music were performed by a large orchestra, it would destroy everything around it.”
The stylish and inspirited Vitalism of Nietzsche’s ruminations is Pneumatic. A red dot in the center of a dark blue sphere.
Dialectics reveals an Infinite Spiral. The Circle divided by a straight-line. Containing the spiral. The straight-line breaks through the circle. Above and Below. Revealing three other spheres. Above the configuration one spiral. Beneath it two spirals; one winding up and the other winding down. On a Hegelian theological note. God the Father and God the Holy Spirit proceed from God the Son. “In the beginning was the Word, and the Word was with God, and the Word was God.” John 1:1.
Here we might locate the Traumatic Temporality of Christianity. The introduction of History. Time as Chronos. With God the Son. Without the historical personage of Jesus Christ, there wouldn’t be a Trinitarian Unity and Division. From God the Son proceeds God the Father and God the Holy Spirit. In this wound we are brought to an awareness of another Time. A Timeless-Time or a Time sans History. “In the Beginning was the Word, and the Word was
with God, and the Word
was God,” a time in which God the Father, God the Son, God the Holy Spirit had always been. The Triune God. Whether or not, in this Aionic Time, God the Holy Spirit proceeds from God the Father or from God the Father and God the Son, is the division between East and West.
This Times overlap and nowhere is this more evident than in the anachronisms or perhaps more accurately, the Archeo-modernity, of the romantic painting. Or perhaps further still, in the Ethiopian depiction of Christ, in the Korean depiction of Christ, and in the Italian depiction of Christ. Black Jesus, Asian Jesus, and European Jesus.
As that obscure note by Nietzsche produced by Gilles Deleuze in his work
Nietzsche and Philosophy goes, “Universal chaos which excluded all purposeful activity does not contradict the idea of the cycle; for this idea is only an irrational necessity.” Here we see Nietzsche approaching something akin to the Infinite Dialectic realized and developed in Mao Zedong’s contributions to Dialectical and Historical Materialism. As Mao writes in
On Contradiction, “The universality or absoluteness of contradiction has a twofold meaning. One is that contradiction exists in the process of development of all things, and the other is that in the process of development of each thing a movement of opposites exists from beginning to end.”
The stylish and inspirited Vitalism of Nietzsche’s ruminations is Pneumatic. Being Pneumatic it is Phantasmic. Here we locate the Girardian critique of Nietzsche. As Nietzsche proclaims in
Ecce Homo that everything his was praising Wagner for is in fact praise he was unconsciously directing at himself, at his values or innate dignities, the obverse is true. For Nietzsche every great philosophical work is a confessional, an involuntary and unconscious autobiography. He invents the Overman and by extension the Last Man. Will to Power and Ressentiment. One cannot exist without the other and in Nietzsche they collapse into a singularity (a point worth keeping in mind when we eventually venture into Deleuze and his Anti-Hegelianism). The Last Philosopher. In sum Girard’s contention is that in the production of these Phantasmata, Nietzsche ends up offering to his audience another Scapegoat. The Man of Ressentiment and the Slave Morality. Obviously within Nietzsche the potential for this is treated triumphantly. Nietzsche refuses to have his Poetic Revelry stifled by timorous considerations. That stupid people might read his works and take it as an excuse to persecute Christians or to locate the Man of Ressentiment in their political adversaries. That they might completely forget the contradictions inherent to the very office of “Tragic Philosopher” and how the Vagabond and the Prophet are a singular figure, hybrid and lovelorn and glorious. “If I had power I’d know how to immediately and brutally exercise it.” None of this concerns Nietzsche. People will misinterpret you regardless. Still the points are well worth reflecting on and prove stimulating as we move from the Symbolic-Classical to the Classical-Romantic.
submitted by
MirkWorks to
u/MirkWorks [link] [comments]
2023.04.01 11:12 Rexymus i need to learn how to fall down
Last sparing (kickboxing )a guy with 15+ years of experience as expected whipped the floor with me. But when he did the sweep on the back leg and push on my shoulders I hit my back first literally on the spine first now I think I must pause for a bit since I have trouble even moving my neck fast and rly hurts in the middle of the back. Stupid kind of pain idk how to explain it better. My question is did anyone had similar experience how did he fix it fast and how do you learn to fall but not break anything or bottom line stay paralyzed
submitted by
Rexymus to
martialarts [link] [comments]