Best Binary Options Signals Provider (Free & Premium ...

The Shoulders of Orion- Ch. 1: First Contact

Space-time rippled as the Horns of Glory snapped into real space. The normally smooth transition from FTL subspace travel back to the laws of relativity was instead dangerously jarring, as the inertial dampeners struggled to hold the innards of the massive warship in their proper places. After straining mightily for the briefest of moments, they failed, throwing Admiral Halon Va and the rest of his bridge crew violently into their restraining harnesses. The ship shuddered under the immense stress, then settled, drifting silently through space on minimal power.
“Tactical, get me a status report for the fleet on screen now. I want updates the instant ships jump in.” The Admiral’s voice was still firm and authoritative; it was taking every last shred of resolve he had to keep it that way. “Lieutenant Roshin, put a detail together and work with medical. I’m sure that re-entry caused more than a few extra injuries. Get as many of the crew patched up and ready for emergency action as fast as you can. I want a full casualty report as soon as possible. And if you find Science Officer Lentith and he’s still alive, send him to the bridge immediately.”
Admiral Va settled back into his command chair, drawing creaking sounds from the over-stressed frame as it absorbed the weight of his massive form. The bridge was completely silent now, the command crew entirely focused on the tasks at hand. Or they were too afraid to say anything; Va couldn’t be sure. He was thankful for their silence, though. He didn’t have any answers for them about his failure.
Keying in a few commands on the command panel at his station, the damage report for his ship popped up, the bridge lights flickering from the extra power draw. The Horns of Glory floated before him in hologram form. Long and slender, the ship was over two kilometers from bow to stern. At least, it had been a few hours ago. The forward 20 percent of the holographic ship was flashing red, indicating heavy damage. This was inaccurate, however, as the forward 20 percent of the ship simply wasn’t there anymore. The graceful lines and carefully crafted angles of the ship's armor were an unrecognizable slagged mess, and deep gouges had been cut into the inner decks all over the ship. Whole sections were missing amidships, two of the main reactors were offline, all the primary weapon batteries had been completely destroyed, and most of the critical systems were barely functioning. It was a miracle that she had survived the jump. That morning, Horns of Glory had been the greatest feat of Arien’Ra engineering, and it was now a barely functioning hulk.
And it had all happened under my command, thought Va.
He had no time to wallow in his failures, however, as at that moment tactical finally reconnected to the fleet command systems. The hologram of Horns of Glory quickly scaled down, appearing as a small, flashing, red point of light floating in loose formation with several other points of light. Most of them were flashing red as well. A constant stream of data and various reports scrolled down the right side of the hologram, listing in no uncertain terms the doom that Va had subjected his command to.
If Va had thought that the bridge was quiet before, it was nothing compared to the complete stillness that now settled over them. No one so much as moved a muscle, as they all sat in stunned silence, reading the reports. Occasionally, the hologram would flash, and a new point of light would join the formation, adding more data to the pile spelling out their damnation. After 30 ticks, new points of light had stopped appearing. Admiral Halon Va had lost over 60 percent of his fleet, and not a single other dreadnaught had survived the slaughter. His defeat was total, and the Federation navy was crippled.




Science Officer Beredarin Lentith had been the first member of his family not to enroll in command school in eight generations. They had been some of the finest members of the fleet the Vorqual race had ever contributed to the Federation. His brothers and sisters had all enrolled, which meant that as far as he was concerned, his family had more than fulfilled their duty to the Federation. Military life wasn’t for him, anyway; he wanted to explore. The Federation had been around for over 3000 years, and there were still vast swathes of the galaxy that they knew nothing about. They were still encountering new species every few hundred or so years, and there was nothing he wouldn’t give to find the next one. That had been the dream that directed him away from the military and into academia. The odds of actually finding a new race were so small, though. There were still at least 200,000,000 unexplored systems in the galaxy. There just wasn’t time to visit them all...
He snapped out of his reverie as he stepped over the body, or rather, what was left of the body, of a Zelnassi marine. Most of it was just a green stain on the corridor wall at this point, though there had been enough of the chitinous armored torso to partially obstruct his path. The young lieutenant quickly continued on towards the bridge.
If he was being honest with himself, becoming an expert on the area of unexplored space directly between the Federation and it’s largest military rival wasn’t the smartest of ideas. Between his family reputation and his unique knowledge base, he was just asking to get pressed into service.
Which was exactly what had happened immediately upon the recent outbreak of hostilities.
And now here he was stepping over corpses, marveling at the fact that he had somehow survived this long. He still couldn’t believe the insanity of the Dominion forces. Boarding an enemy ship MID-COMBAT. It was like something out of a youngling’s tale from before space travel. It was pure madness, but there were the bodies to prove that it had happened. He gingerly stepped around the remains of yet another Zelnassi.
The signs of battle continued all the way to the bridge, where he found security forces still holding quickly fortified positions around the bridge entrance. There were more Zelnassi bodies at their feet. Berendarin shuddered. He had been closer to death than he thought.
He quickly pushed those thoughts out of his mind. He could only imagine why he was needed on the bridge so urgently.
The door slid open, and Lentith walked into a completely silent room. Admiral Va was slouched at his command station, his enormous arm propped up on the chair arm and supporting his massive, horned head. Lentith didn’t even know that Arien’Ra COULD slouch. Nevermind that the fastidious Admiral could or would ever do such a thing. Maybe things were somehow worse than he thought. No one seemed to notice him enter, so he announced himself to the Admiral.
Though he didn’t shout, his voice echoed in the deathly silent room, startling most of the bridge command. Two of the other Vorqual officers swore, and the tiny Jezren manning the com station let out a high pitched sound somewhere between a squeak and chirp. Berendarin would have found it quite funny if the situation wasn’t so dire.
Admiral Va immediately snapped back to being the hulk of muscle and horn that imposed his will on a room just by being in it. His booming voice only added to his authority.
“Science Officer Lentith. I’m glad to see you’re still alive. Are you seriously injured?”
Berendarin had almost forgotten that he had walked the entire way to the bridge holding a bandage to his head just above his left eye. The drop out of subspace hadn’t been kind to him. He pulled the bandage away, revealing a dark orange stain on the bandage and a crack in the bone plate above his eye.
“I’m fine, sir, just one of the outer plates, and the bleeding has already stopped.”
“Good. Commander Vortith is currently overseeing the emergency repairs. Take his seat. You are going to help me find a way back home.”
“Sir? I’m sorry I don’t understand. Why don’t we just go back the way we came?”
“That’s not possible. Most of our supply ships and tenders were destroyed when that third wave of Dominion ships hit our flank. Almost all of our pre-prepared fuel reserves are gone. On top of that, some of our ships are so damaged that they don’t have another long jump in them. And if we run into any enemy ships, the whole rest of the fleet is done for. We barely qualify as a fighting force in the state we’re in.”
“Is it really that bad?”
“It’s worse, but we don’t have time to get into the details. You’re the expert on this section of the galaxy. I need you to find the fleet a hiding hole. Somewhere away from the known jump routes through the Spur. Any system where we can use the few miners we have left to scavenge up some fuel, and get some critical repairs done while we’re at it. And from there either wait for reinforcements or get ourselves patched up enough to limp home. Wherever it is, it needs to be close. I’m not leaving any ships behind because they can’t make the jump.”
“Oh. Just that?” The lieutenant knew that Arien’Ra were strict herbivores, but with the look that the Admiral shot him, he couldn’t help but think about the fact that his head would easily fit into that giant, molar filled mouth.
“And away from any known pirate hideaways. Like I said, our fleet can’t take any more fighting. And find it quickly. It won’t be long before the Dominion fleet locates us.”
“I. Uh. Sure. I’ll see what I can find.”
Berendarin shrank into the commander’s chair next to the enormous Arien’Ra, desperately wishing he had been more professional. If he had acted like a proper soldier, it might soften the blow of telling the Admiral that what he wanted was next to impossible. If he had a few weeks, he might be able to find something. So much of the Spur was still un-surveyed. The odds of there being anything useful to the Admiral in the databases was absurdly low, and there was even less of a chance he’d be able to find it in time for the information to matter. He began pouring through his notes anyway. It was better than waiting around to die, which, if the situation was as dire as the Admiral made it sound, was the only other option.
He spent the next hour lost in his notes, finding nothing, while the bridge crew went about piecing the ship and the fleet back together. The young scientist had all but given up on the Admiral’s impossible request when a raucous cheer went up from everyone on the command deck.
“Sir,” The coms officer called out, “The Consul’s Pride just dropped out of subspace and is hailing us, sir.
The main communication screen lit up, and Berendarin Lentith looked to see the face of his oldest sister on screen, strapped into the captain’s chair of her dreadnaught. He let out a sigh of relief; Baraquen was his favorite sibling. Her uniform was drenched in a deep orange blood stain at the shoulder, and she was covered in what looked like flecks of green gore from a Xelnassi. The artificial gravity was clearly malfunctioning, as the captain’s restraining harness was the only thing keeping her from floating around her bridge. But the bone plates of her jaw were turned as always into her calm, self assured smile
“My apologies for the delay in joining you, Admiral Va. We had some… guests shut down our drive mid jump. We had to deal with them before we rejoined the fleet. I assume there is a plan to get us back to federation space?”
“It’s good to see you in one piece, Captain Lentith,” the Admiral responded. He was barely able to keep the relief from his voice. “And there is indeed a plan.”
Berendarin returned to his research as the two ranking officers in the fleet went over the details of their current predicament. He was glad his sister had survived, and not just because they were close. It would have been a terrible blow to the whole family to have lost not only their future matriarch, but the ship she commanded as well. A member of his family had been commanding that dreadnaught uninterrupted for the last 5 generations. Military service had never appealed to Berendarin, but his family history was certainly still important.
And then the solution to the current problem hit him like a driver round. He let out a gasp and tore into his notes with a fervor. Both Admiral Va and his sister’s projection turned to look at him, but he didn’t notice. After a few seconds of curious silence from the rest of the onlookers, Berendarin practically jumped out of his seat.
“Admiral, I think I’ve got something that will work.” The young Lieutenant punched a few commands into his datapad, and a set of stellar coordinates popped up on the navigation terminal. “It’s a main sequence star, about 500 light years from us, fairly close to the edge of the Spur. It’s not anywhere near any established jump routes. The Consul’s Pride made me think of it.” He nodded towards his sister’s face on the ship's screen. “Our great, great grandsire took the Consul’s Pride through the system on her shakedown run a little over 300 cycles ago. Chased a band of Qorthi slavers out of the system. The outer four planets are all gas giants. If we can’t find Helium 3 there, I don’t know where else we should look.”
On screen, Captain Lentith looked impressed, but Admiral Va clearly didn’t seem too sure. “We’re supposed to be going away from Dominion forces, not into them. What were the Qorthi doing there?”
“There are also four rocky inner worlds in the system, Sir, according to reports from the encounter. Apparently, the third planet is a Class 7 Deathworld, and the Qorthi were running some experiments on the primitive lifeforms there. They were caught completely by surprise by the Consul’s Pride, and it was the first time that she fired her weapons in anger. I can’t find any reports of Dominion ships in that section of the Spur since.” There was a long pause before Va responded.
“Good work, Lieutenant. I knew my trust in you wasn’t misplaced.” Admiral Va replied, before turning to the rest of the bridge and booming “Coms! Tactical! Get those coordinates to every ship in the fleet. I want every ship we have left formed up and ready to jump as soon as possible. Any captain who feels that his drives can’t make the jump is to focus all repair efforts on getting their drives functioning immediately. I will transfer repair crews from less damaged ships to more damaged ships if that means we jump even a tick earlier. Get to it everyone. I’m not losing any more of my fleet today.”




The four revolution long jump to Science Officer Lentith’s newfound sanctuary had done wonders for Halon Va’s mental state. The initial shock of his fleet's terrible defeat had worn off, and he had been able to focus on what came next. Repair crews were able to stabilize most of his ship's core systems, and he was no longer worried about the life support systems cutting out and killing the rest of his crew. There had also been time for him to visit with the wounded. To thank them for their sacrifices. He had expected it to be an act of contrition, maybe even a chance to start begging for forgiveness. But there had been no anger in his crew, and no blame hung on his horns. Most had just been relieved that he had survived, and had expressed as much. He would be forever grateful to them for that.
Most importantly, the four revolutions in hyperspace had given the admiral time to really think about what had gone wrong in the nebula. He had barely rested in the preceding four revolutions, spending every scrap of spare time in his office, pouring over records from the battle. That’s where he found himself now, tucked behind his massive ceramic and titanium alloy desk of Tellarim design. It had been custom made for him upon his promotion to this command, a gift from the high admirals and the council. It was the only luxury that Va allowed in his office. The rest of Va’s space he kept strictly utilitarian. There were no trophies adorning his walls, as was customary for other members of his species. The plain bulkheads of his office were instead lined entirely with screens, and each of them were now filled with footage and reports from the battle, running on loop.
Va soaked it all in. The more he watched, the more a singular conclusion crystallized in his mind. He had done everything right; he was sure of that now. 1000 years of doctrine and theory for fighting the Dominion had gone into his preparation for that battle, and he had followed it to the letter. And he had been winning. Then that attack on his flank by the Zelnassi had blown all of that out of the airlock. Something significant had changed in the way the Dominion fought...
Commander Vortith’s voice rang out over the com system. ”Admiral Va, we’ll be transitioning back to real space in moments.”
“Thank you. I’ll be there shortly. And get Science Officer Lentith to the bridge. I want him nearby just in case. He’s the only one who has any idea of where we are.” The Admiral pulled himself from his desk. He would have to leave the rest of his analysis for later. There was just enough time for him to reach the bridge and settle into his command chair before the Horns of Glory snapped back to real space. This time, the inertial dampeners held.
“Tactical, status report.”
“All ships accounted for, Admiral. Though the Consul’s Pride, several cruisers, and three of our escorts are all reporting massive failures in their Drive Cores. They won’t be jumping anywhere anytime soon.”
“Wonderful.” Va wasn’t sure if he meant that sarcastically or not. “Get scans up and running and deploy the pickets that aren’t crippled in a standard scouting formation. How close are we to the nearest gas giant?”
“We’re approximately half a light tick from the system’s innermost gas giant, sir.”
“Excellent. Deploy the rest of the fleet. Put us in a high orbit around the planet in a defensive formation, and get our miners working immediately. Once our orbit is stable, I want every hand, paw and hoof in the fleet working on repairs.”
“Yes sir.”
Admiral Va settled into his command chair for a long shift.
It would be a drawn out, boring process to refuel the ships. With his fleet limping along, and only two functioning miners, it would take far longer than it should. After all the chaos of the last few revolutions, boring would be a welcome change of pace. Va started to relax, sinking into his chair’s acceleration padding. His fleet and his crews were finally safe. The first priority would be to get one of the subspace beacons repaired and to get word back to the Federation that the fleet still existed. And hopefully call for aid. He was sure to be stripped of his rank as soon as contact was made, but hopefully he would avoid a Tribunal. That was an unpleasant prospect…
“Sir, we have unidentified ship signatures appearing from around the planet we’re approaching.”
Va had never heard panic in the voice of his young sensors officer before, but it was certainly there now. Va understood the sentiment, though. He found it difficult to keep the panic from his own voice as he started issuing orders
“Bring the fleet up to combat status immediately. How many ships are there?”
“I’m showing 35 individual signatures. All approaching us at combat speed and still accelerating. At current speeds, they will intercept us in just over 30 ticks, sir.”
“I want details as soon as you have them, Lieutenant. Size, make, estimated firepower. Who they are. And keep scanning the system. Find out where they came from.” The panic had partially subsided for Va. 35 unknowns was not too terrible a threat. He still had almost 240 warships under his command. Still, if there was a way to avoid combat, he had to try. His fleet couldn’t suffer any more losses. “Coms, any attempt by these unknown ships to contact us?”
“I”m not sure, sir,” the diminutive Jezren at the coms replied. “There’s nothing on standard communications channels. The ships are transmitting something, but I can’t figure out what it is.”
“Admiral,” the Lieutenant at the sensors station called out. “I think I might have an idea of where these ships came from. Preliminary scans show there is extensive urbanization on the third and fourth planets, as well as what appear to be habitation sized artificial satellites around the second and sixth planets. One of the moons of the gas giant we’re approaching shows signs of habitation as well. All of them are emitting significant signal pollution. This system clearly already belongs to someone, and they’re broadcasting everywhere.”
Halon Va, High Admiral of the Combined Federation Fleets, turned, slowly and with as much composure as he could muster, to face the young science officer seated to his left. Berendarin sat, mouth agape, staring transfixed at the sensor readouts in front of him. Va had never seen a Vorqual more confused in his life. “I want answers, Officer Lentith.”
“I… I don’t.. This doesn’t make any sense,” the young science officer stammered. “There shouldn’t be anything here.”
“Admiral,” The comms officer cut in, “The signal that we’re picking up from the unknown ships is definitely some kind of communication. I managed to put together audio from it.”
“Play it,” commanded Va. A series of short, guttural, and completely unintelligible sounds came over the speakers in reply. There was a short pause before the sounds repeated themselves again. “Coms, what was that?”
“No idea, sir, but it’s being transmitted on loop. If it is intended as a communication, our translators have no idea what to do with it.”
“Admiral.” The voice came from Va’s left, and was barely audible. Va turned yet again to look at the young science officer. His gaze was locked on the tactical readout, and there something in his eyes that Va couldn’t recognize. A mixture of pure terror and something else. Was it wonder? The young Vorqual’s voice was still barely above a whisper when he continued to address the admiral: “I think we should run the transmission through First Contact Protocols.”




Captain Benjamin Alvarez-León slammed against his restraining harness as the USCS Aurora started it’s decel burn. He had pushed the engines on the outdated cruiser to their limits, and the ship groaned in protest as it started counteracting his rather zealous acceleration orders. He hoped that his mad scramble with his small squadron of outdated ships had been an overreaction. The alternative was something he’d rather not think about.
All Ben had was the reserves; the rest of the fleet was on maneuvers at Sirius. The Admiralty had wanted to test the new, fully modernized fleet’s maneuvering abilities in the gravwell of a binary system. And, in their infinite wisdom, they decided they needed ALL of the new fleet assets, leaving nothing in Sol except for the handful of cruisers and escorts that couldn’t match the capabilities of the modern ships.
A handful of cruisers and escorts that were now hurtling towards more than 200 unknown contacts.
It was the unknown part of all of this that was unnerving Ben. There were no familiar energy signatures. No familiar scan data. No IFF. No signals coming off the contacts of any kind for that matter. Two of the contacts were too big to even be ships. If it wasn’t for the fact that they were moving towards Jupiter in formation, Ben wouldn’t even think they WERE ships.
“So what do you think, Alexi?” Ben asked, turning towards his second in command. “You and the rest of the bridge crew are always making inane bets. Have you whipped up an over-under for what we’re throwing ourselves at yet?”
“Haven’t had time,” came the quick reply from Ben’s right. The short, stocky man from Vladivostok was missing his trademark joviality. “Though, my money is on them being Ithacan, sir.”
Ben bristled at Alexi calling him sir. They’d been friends for twenty years, damnit, and had been practically joined at the hip since going through the Academy together. Outranking him still felt a little off. Now was hardly the time to worry about formalities, though.
“What makes you think they're from Ithaca?”
“It’s the only thing that makes sense. The locals have been getting increasingly radical, and Ithaca is the only sector where reports of piracy have been increasing.”
“Yeah, I could see a rebellion coming from Ithaca,” Ben added slowly, turning over that scenario in his head. “But there’s no way they could swing something of this magnitude. There aren’t even any shipyards in the sector. And even if there were, there’s no way they could keep the construction of over two hundred ships a secret.”
Alexi could only offer him a shrug in response.
It was at that moment that the coms station informed him there was a transmission incoming from the unidentified ships. Ben instructed the ensign to play it, and the bridge was suddenly filled with a stream of grotesque bleating noises and strange grunts, with the occasional recognizable syllable interspersed throughout the transmission. Ben thought he picked out ‘dentify’ from the mess, but he wasn’t sure. There was a long moment of silence on the bridge.
“What the hell was that?”
When no one had any answers for him, Ben tapped his command console and recorded a new message to broadcast.
“This is Captain Alvarez of the USCS Aurora. Unidentified ships, please clarify. Your transmission is badly garbled. We did not receive your identification. You are still trespassing in Commonwealth space and are on an unauthorized course towards Jupiter. Begin decelerating immediately and re-identify yourselves.”
He wouldn’t admit it to the crew, but Ben was profoundly unsettled. Something was deeply, deeply wrong about this whole situation. Not only was he vastly outnumbered by these things, but they were unwilling to communicate properly. He was almost believing this whole thing was some kind of bizarre prank.
“How much longer before we can get a decent visual on these things?
“Any moment now, sir.”
A new transmission arrived just then, and Ben had it played back immediately. This time, instead of almost bovine bleats and grunts, the sounds coming over the speakers were mostly intelligible. Or, they would have been, if any of the syllables were in the right order. It was almost like a toddler was rattling off all of his new favorite sounds, spitting them out in a random order and not knowing how they went together. There were still a few heavy grunts sprinkled in, just for good measure.
Before Ben could process this new joke of a transmission, the contacts finally started slowing. In a matter of moments, the strange wall of contacts was hanging lazily in Jupiter’s orbit, barely moving fast enough to keep their orbit from decaying. They were still in perfect formation.
“Huh. Well, I guess that’s something.”
With nothing to do but sit back and wait as his ship closed the distance, Ben tried to relax and began running over all of the possibilities in his mind of what the new contacts could be. He came up with nothing. Well, nothing feasible, anyway. He took a series of long, calming breaths, trying to clear his mind and focus. This was no time for his imagination to be running wild. But he couldn’t shake the feeling that logic was failing him. Something was off. Something…
“Captain, bringing visual of the unknown contacts up on screen now.”
Ben actually felt his jaw drop. Every contact on his display was clearly a ship. Most were long and spindly, wrapped in layers of some kind of highly reflective armor; a fleet of crystalline arrows hanging in the darkness. The two largest contacts, which Ben had just moments ago thought were too big to be ships, were large enough on the screen for him to clearly see details. In addition to their immense size and strange armor, both ships were dotted with what were clearly weapons platforms, though what kind, Ben couldn’t tell.
Noticeably, almost all of the ships on his screen were heavily damaged. Chunks were missing from some ships, and most had deep lines gouged into their hulls. Any form of decorative paint or markings had been burned away. Something had put these ships through absolute hell. But still, the damage could not take away entirely from the elegance of the ship’s designs. They were graceful and sleek, completely different from anything Ben had ever seen before.
It was all so different. So strange. So very, very… Alien.
Despite every effort he had made to avoid the word, it finally forced itself to form inside Ben’s mind, and forced him to acknowledge the reality that legitimate, extra-Solar life was hanging in the darkness in front of him. It forced him to acknowledge the screams he had been suppressing in the back of his mind. The screams of his imagination crying out in glorious triumph over reality. And with those screams came a deluge of accompanying thoughts and emotions.
He was a child again, staring up at the stars above Armstrong and wondering what else, and who else, was out there. He was a teen again, signing his name to the Academy enrollment paperwork, determined to get out there between the stars and see the galaxy himself. He was a young officer again, screaming and pleading with the Admiralty to at least consider a modern First Contact scenario. He was sitting in his command chair now, hurtling towards honest-to-god aliens, all of his dreams made manifest in an instant. He was overwhelmed. He was terrified.
And he had never imagined that he could feel such elation.
It was the young warrant officer at the coms that snapped Ben out of his reverie. “Sir, the contacts are hailing us on all standard channels, requesting a video feed.” She sounded very, very nervous.
Ben immediately stood up, straightening his uniform as best he could. “If they’re anything less than genocidal monsters, I’m going to offer them aid and repairs. As long as they’re peaceful, there’s no reason not to extend them the full hospitality of humanity.”
“Ben,” Alexi asked, clearly choosing his words carefully, “Are you sure that’s the… Wisest course of action? How will the Admiralty respond to Goddamned alien ships docking at Hephaestus?”
“Alexi, in the 250 years the Commonwealth has existed, the First Contact protocols haven’t been updated since the charter was signed. No one has cared. This has been nothing but a fantasy for most people. I am NOT letting this opportunity get away. Every child that has ever looked up at the stars and wondered finally got an answer, and I will not waste this moment. We’re making friends, the Admiralty and the government be damned.”
“You do realize you’re potentially deciding the fate of our entire species on a whim, right?”
“Is there someone else you’d prefer to have making this call?”
Alexi, apparently deciding that there was not, stood up and straightened his uniform, standing next to his friend as he ordered the connection of the video feed. The channel connected, and the human bridge crew found themselves looking at the bridge of a ship crewed by not one, but three alien races.
The largest alien in the center of the screen opened its mouth to speak. This time, instead of bleats and grunts, a choppy, mechanical voice that didn’t sync up to the alien at all proclaimed from the bridge speakers in broken, stuttering English: “I. Am Admiral. Halon. Va. Of the Federation of. Sentient Races. Greetings and. Welcome. To the. Galaxy.”
Ben couldn’t suppress his smile.
“On behalf of the United Solar Commonwealth, and all of Humanity, greetings, and welcome to Sol. Your ships look like they’ve had a bad time on your way here. If there’s any way we could aid with your repairs, we’d be happy to help.”




Slave 782 slammed his right appendage onto the control console hard enough to rupture his outer membrane and smear ichor over the panel. It had been four days since the battle in the nebula, and with the latest round of reports, he finally had to admit that the rest of the Federation fleet had escaped him.
It was a minor frustration, all things considered, but the escape prevented this from being a total victory. Still, he had proven his worth to his owners in this battle, and his experiments with the Zelnassi had paid dividends beyond his wildest imagination. He had earned a command today, and with every success in that command, his ability to bargain for his people's freedom only increased. For what he would be asking, it might take the total defeat of the Federation to earn that kind of leverage. Also frustrating, but not a task that he couldn’t handle. It would be a long war, he was sure, but like his owners, he was patient.
He would earn his freedom, even if it meant reducing the entire Federation to glass.


Author Wiki
Series Wiki
NEXT
submitted by STATICinMOTION to HFY [link] [comments]

Forex Signals Reddit: top providers review (part 1)

Forex Signals Reddit: top providers review (part 1)

Forex Signals - TOP Best Services. Checked!

To invest in the financial markets, we must acquire good tools that help us carry out our operations in the best possible way. In this sense, we always talk about the importance of brokers, however, signal systems must also be taken into account.
The platforms that offer signals to invest in forex provide us with alerts that will help us in a significant way to be able to carry out successful operations.
For this reason, we are going to tell you about the importance of these alerts in relation to the trading we carry out, because, without a doubt, this type of system will provide us with very good information to invest at the right time and in the best assets in the different markets. financial
Within this context, we will focus on Forex signals, since it is the most important market in the world, since in it, multiple transactions are carried out on a daily basis, hence the importance of having an alert system that offers us all the necessary data to invest in currencies.
Also, as we all already know, cryptocurrencies have become a very popular alternative to investing in traditional currencies. Therefore, some trading services/tools have emerged that help us to carry out successful operations in this particular market.
In the following points, we will detail everything you need to know to start operating in the financial markets using trading signals: what are signals, how do they work, because they are a very powerful help, etc. Let's go there!

What are Forex Trading Signals?

https://preview.redd.it/vjdnt1qrpny51.jpg?width=640&format=pjpg&auto=webp&s=bc541fc996701e5b4dd940abed610b59456a5625
Before explaining the importance of Forex signals, let's start by making a small note so that we know what exactly these alerts are.
Thus, we will know that the signals on the currency market are received by traders to know all the information that concerns Forex, both for assets and for the market itself.
These alerts allow us to know the movements that occur in the Forex market and the changes that occur in the different currency pairs. But the great advantage that this type of system gives us is that they provide us with the necessary information, to know when is the right time to carry out our investments.
In other words, through these signals, we will know the opportunities that are presented in the market and we will be able to carry out operations that can become quite profitable.
Profitability is precisely another of the fundamental aspects that must be taken into account when we talk about Forex signals since the vast majority of these alerts offer fairly reliable data on assets. Similarly, these signals can also provide us with recommendations or advice to make our operations more successful.

»Purpose: predict movements to carry out Profitable Operations

In short, Forex signal systems aim to predict the behavior that the different assets that are in the market will present and this is achieved thanks to new technologies, the creation of specialized software, and of course, the work of financial experts.
In addition, it must also be borne in mind that the reliability of these alerts largely lies in the fact that they are prepared by financial professionals. So they turn out to be a perfect tool so that our investments can bring us a greater number of benefits.

The best signal services today

We are going to tell you about the 3 main alert system services that we currently have on the market. There are many more, but I can assure these are not scams and are reliable. Of course, not 100% of trades will be a winner, so please make sure you apply proper money management and risk management system.

1. 1000pipbuilder (top choice)

Fast track your success and follow the high-performance Forex signals from 1000pip Builder. These Forex signals are rated 5 stars on Investing.com, so you can follow every signal with confidence. All signals are sent by a professional trader with over 10 years investment experience. This is a unique opportunity to see with your own eyes how a professional Forex trader trades the markets.
The 1000pip Builder Membership is ordinarily a signal service for Forex trading. You will get all the facts you need to successfully comply with the trading signals, set your stop loss and take earnings as well as additional techniques and techniques!
You will get easy to use trading indicators for Forex Trades, including your entry, stop loss and take profit. Overall, the earnings target per months is 350 Pips, depending on your funding this can be a high profit per month! (In fact, there is by no means a guarantee, but the past months had been all between 600 – 1000 Pips).
>>>Know more about 1000pipbuilder
Your 1000pip builder membership gives you all in hand you want to start trading Forex with success. Read the directions and wait for the first signals. You can trade them inside your demo account first, so you can take a look at the performance before you make investments real money!
Features:
  • Free Trial
  • Forex signals sent by email and SMS
  • Entry price, take profit and stop loss provided
  • Suitable for all time zones (signals sent over 24 hours)
  • MyFXBook verified performance
  • 10 years of investment experience
  • Target 300-400 pips per month
Pricing:
https://preview.redd.it/zjc10xx6ony51.png?width=668&format=png&auto=webp&s=9b0eac95f8b584dc0cdb62503e851d7036c0232b
VISIT 1000ipbuilder here

2. DDMarkets

Digital Derivatives Markets (DDMarkets) have been providing trade alert offerings since May 2014 - fully documenting their change ideas in an open and transparent manner.
September 2020 performance report for DD Markets.
Their manner is simple: carry out extensive research, share their evaluation and then deliver a trading sign when triggered. Once issued, daily updates on the trade are despatched to members via email.
It's essential to note that DDMarkets do not tolerate floating in an open drawdown in an effort to earnings at any cost - a common method used by less professional providers to 'fudge' performance statistics.
Verified Statistics: Not independently verified.
Price: plans from $74.40 per month.
Year Founded: 2014
Suitable for Beginners: Yes, (includes handy to follow trade analysis)
VISIT
-------

3. JKonFX

If you are looking or a forex signal service with a reliable (and profitable) music record you can't go previous Joel Kruger and the team at JKonFX.
Trading performance file for JKonFX.
Joel has delivered a reputable +59.18% journal performance for 2016, imparting real-time technical and fundamental insights, in an extremely obvious manner, to their 30,000+ subscriber base. Considered a low-frequency trader, alerts are only a small phase of the overall JKonFX subscription. If you're searching for hundreds of signals, you may want to consider other options.
Verified Statistics: Not independently verified.
Price: plans from $30 per month.
Year Founded: 2014
Suitable for Beginners: Yes, (includes convenient to follow videos updates).
VISIT

The importance of signals to invest in Forex

Once we have known what Forex signals are, we must comment on the importance of these alerts in relation to our operations.
As we have already told you in the previous paragraph, having a system of signals to be able to invest is quite advantageous, since, through these alerts, we will obtain quality information so that our operations end up being a true success.

»Use of signals for beginners and experts

In this sense, we have to say that one of the main advantages of Forex signals is that they can be used by both beginners and trading professionals.
As many as others can benefit from using a trading signal system because the more information and resources we have in our hands. The greater probability of success we will have. Let's see how beginners and experts can take advantage of alerts:
  • Beginners: for inexperienced these alerts become even more important since they will thus have an additional tool that will guide them to carry out all operations in the Forex market.
  • Professionals: In the same way, professionals are also recommended to make use of these alerts, so they have adequate information to continue bringing their investments to fruition.
Now that we know that both beginners and experts can use forex signals to invest, let's see what other advantages they have.

»Trading automation

When we dedicate ourselves to working in the financial world, none of us can spend 24 hours in front of the computer waiting to perform the perfect operation, it is impossible.
That is why Forex signals are important, because, in order to carry out our investments, all we will have to do is wait for those signals to arrive, be attentive to all the alerts we receive, and thus, operate at the right time according to the opportunities that have arisen.
It is fantastic to have a tool like this one that makes our work easier in this regard.

»Carry out profitable Forex operations

These signals are also important, because the vast majority of them are usually quite profitable, for this reason, we must get an alert system that provides us with accurate information so that our operations can bring us great benefits.
But in addition, these Forex signals have an added value and that is that they are very easy to understand, therefore, we will have a very useful tool at hand that will not be complicated and will end up being a very beneficial weapon for us.

»Decision support analysis

A system of currency market signals is also very important because it will help us to make our subsequent decisions.
We cannot forget that, to carry out any type of operation in this market, previously, we must meditate well and know the exact moment when we will know that our investments are going to bring us profits .
Therefore, all the information provided by these alerts will be a fantastic basis for future operations that we are going to carry out.

»Trading Signals made by professionals

Finally, we have to recall the idea that these signals are made by the best professionals. Financial experts who know perfectly how to analyze the movements that occur in the market and changes in prices.
Hence the importance of alerts, since they are very reliable and are presented as a necessary tool to operate in Forex and that our operations are as profitable as possible.

What should a signal provider be like?

https://preview.redd.it/j0ne51jypny51.png?width=640&format=png&auto=webp&s=5578ff4c42bd63d5b6950fc6401a5be94b97aa7f
As you have seen, Forex signal systems are really important for our operations to bring us many benefits. For this reason, at present, there are multiple platforms that offer us these financial services so that investing in currencies is very simple and fast.
Before telling you about the main services that we currently have available in the market, it is recommended that you know what are the main characteristics that a good signal provider should have, so that, at the time of your choice, you are clear that you have selected one of the best systems.

»Must send us information on the main currency pairs

In this sense, one of the first things we have to comment on is that a good signal provider, at a minimum, must send us alerts that offer us information about the 6 main currencies, in this case, we refer to the euro, dollar, The pound, the yen, the Swiss franc, and the Canadian dollar.
Of course, the data you provide us will be related to the pairs that make up all these currencies. Although we can also find systems that offer us information about other minorities, but as we have said, at a minimum, we must know these 6.

»Trading tools to operate better

Likewise, signal providers must also provide us with a large number of tools so that we can learn more about the Forex market.
We refer, for example, to technical analysis above all, which will help us to develop our own strategies to be able to operate in this market.
These analyzes are always prepared by professionals and study, mainly, the assets that we have available to invest.

»Different Forex signals reception channels

They must also make available to us different ways through which they will send us the Forex signals, the usual thing is that we can acquire them through the platform's website, or by a text message and even through our email.
In addition, it is recommended that the signal system we choose sends us a large number of alerts throughout the day, in order to have a wide range of possibilities.

»Free account and customer service

Other aspects that we must take into account to choose a good signal provider is whether we have the option of receiving, for a limited time, alerts for free or the profitability of the signals they emit to us.
Similarly, a final aspect that we must emphasize is that a good signal system must also have excellent customer service, which is available to us 24 hours a day and that we can contact them at through an email, a phone number, or a live chat, for greater immediacy.
Well, having said all this, in our last section we are going to tell you which are the best services currently on the market. That is, the most suitable Forex signal platforms to be able to work with them and carry out good operations. In this case, we will talk about ForexPro Signals, 365 Signals and Binary Signals.

Forex Signals Reddit: conclusion

To be able to invest properly in the Forex market, it is convenient that we get a signal system that provides us with all the necessary information about this market. It must be remembered that Forex is a very volatile market and therefore, many movements tend to occur quickly.
Asset prices can change in a matter of seconds, hence the importance of having a system that helps us analyze the market and thus know, what is the right time for us to start operating.
Therefore, although there are currently many signal systems that can offer us good services, the three that we have mentioned above are the ones that are best valued by users, which is why they are the best signal providers that we can choose to carry out. our investments.
Most of these alerts are quite profitable and in addition, these systems usually emit a large number of signals per day with full guarantees. For all this, SignalsForexPro, Signals365, or SignalsBinary are presented as fundamental tools so that we can obtain a greater number of benefits when we carry out our operations in the currency market.
submitted by kayakero to makemoneyforexreddit [link] [comments]

Video Encoding in Simple Terms

Video Encoding in Simple Terms
Nowadays, it is difficult to imagine a field of human activity, in which, in one way or another, digital video has not entered. We watch it on TV, mobile devices, and stationary computers; we record it with digital cameras ourselves, or we encounter it on the roads (unpleasant, but true), in stores, hospitals, schools and universities, and in industrial enterprises of various profiles. As a consequence, words and terms that are directly related to the digital representation of video information are becoming more firmly and widely embedded in our lives. From time to time, questions arise in this area. What are the differences between various devices or programs that we use to encode/ decode digital video data, and what do they do? Which of these devices/ programs are better or worse, and in which aspects? What do all these endless MPEG-2, H.264 / AVC, VP9, H.265 / HEVC, etc. mean? Let’s try to understand.

A very brief historical reference

The first generally accepted video compression standard MPEG-2 was finally adopted in 1996, after which a rapid development of digital satellite television began. The next standard was MPEG-4 part 10 (H.264 / AVC), which provides twice the degree of video data compression. It was adopted in 2003, which led to the development of DVB-T/ C systems, Internet TV and the emergence of a variety of video sharing and video communication services. From 2010 to 2013, the Joint Collaborative Team on Video Coding (JCT-VC) was intensively working to create the next video compression standard, which was called High Efficient Video Coding (HEVC) by the developers; it ensured the following twofold increase in the compression ratio of digital video data. This standard was approved in 2013. That same year, the VP9 standard, developed by Google, was adopted, which was supposed to not yield to HEVC in its degree of video data compression.

Basic stages of video encoding

There are a few simple ideas at the core of algorithms for video data compression. If we take some part of an image (in the MPEG-2 and AVC standards this part is called a macroblock), then there is a big possibility that, near this segment in this frame or in neighboring frames, there will be a segment containing a similar image, which differs little in pixel intensity values. Thus, to transmit information about the image in the current segment, it is enough to only transfer its difference from the previously encoded similar segment. The process of finding similar segments among previously encoded images is called Prediction. A set of difference values that determine the difference between the current segment and the found prediction is called the Residual. Here we can distinguish two main types of prediction. In the first one, the Prediction values represent a set of linear combinations of pixels adjacent to the current image segment on the left and on the top. This type of prediction is called Intra Prediction. In the second one, linear combinations of pixels of similar image segments from previously encoded frames are used as prediction (these frames are called Reference). This type of prediction is called Inter Prediction. To restore the image of the current segment, encoded with Inter prediction, when decoding, it is necessary to have information about not only the Residual, but also the frame number, where a similar segment is located, and the coordinates of this segment.
Residual values obtained during prediction obviously contain, on average, less information than the original image and, therefore, require a fewer quantity of bits for image transmission. To further increase the degree of compression of video data in video coding systems, some spectral transformation is used. Typically, this is Fourier cosine transform. Such transformation allows us to select the fundamental harmonics in two-dimensional Residual signal. Such a selection is made at the next stage of coding — quantization. The sequence of quantized spectral coefficients contains a small number of main, large values. The remaining values are very likely to be zero. As a result, the amount of information contained in quantized spectral coefficients is significantly (dozens of times) lower than in the original image.
In the next stage of coding, the obtained set of quantized spectral coefficients, accompanied by the information necessary for performing prediction when decoding, is subjected to entropy coding. The bottom line here is to align the most common values of the encoded stream with the shortest codeword (containing the smallest number of bits). The best compression ratio (close to theoretically achievable) at this stage is provided by arithmetic coding algorithms, which are mainly used in modern video compression systems.
From the above, the main factors affecting the effectiveness of a particular video compression system become apparent. First of all, these are, of course, the factors that determine the effectiveness of the Intra and Inter Predictions. The second set of factors is related to the orthogonal transformation and quantization, which selects the fundamental harmonics in the Residual signal. The third one is determined by the volume and compactness of the representation of additional information accompanying Residual and necessary for making predictions, that is, calculating Prediction, in the decoder. Finally, the fourth set has the factors that determine the effectiveness of the final stage- entropy coding.
Let’s illustrate some possible options (far from all) of the implementation of the coding stages listed above, on the example of H.264 / AVC and HEVC.

AVC Standard

In the AVC standard, the basic structural unit of the image is a macroblock — a square area of 16x16 pixels (Figure 1). When searching for the best possible prediction, the encoder can select one of several options of partitioning each macroblock. With Intra-prediction, there are three options: perform a prediction for the entire block as a whole, break the macroblock into four square blocks of 8x8 size, or into 16 blocks with a size of 4x4 pixels, and perform a prediction for each such block independently. The number of possible options of macroblock partitioning under Inter-prediction is much richer (Figure 1), which provides adaptation of the size and position of the predicted blocks to the position and shape of the object boundaries moving in the video frame.
Fig 1. Macroblocks in AVC and possible partitioning when using Inter-Prediction.
In AVC, pixel values from the column to the left of the predicted block and the row of pixels immediately above it are used for Intra prediction (Figure 2). For blocks of sizes 4x4 and 8x8, 9 methods of prediction are used. In a prediction called DC, all calculated pixels have a single value equal to the arithmetic average of the “neighbor pixels” highlighted in Fig. 2 with a bold line. In other modes, “angular” prediction is performed. In this case, the values of the “neighbor pixels” are placed inside the predicted block in the directions indicated in Fig. 2.
In the event that the predicted pixel gets between “neighbor pixels”, when moving in a given direction, an interpolated value is used for the prediction. For blocks with a size of 16x16 pixels, 4 methods of prediction are used. One of them is the DC-prediction, which was already reviewed. The other two correspond to the “angular” methods, with the directions of prediction 0 and 1. Finally, the fourth — Plane-prediction: the values of the predicted pixels are determined by the equation of the plane. The angular coefficients of the equation are determined by the values of the “neighboring pixels”.
Fig 2. “Neighboring pixels” and angular modes of Intra-Prediction in AVC
Inter- Prediction in AVC can be implemented in one of two ways. Each of these options determines the type of macroblock (P or B). As a prediction of pixel values in P-blocks (Predictive-blocks), the values of pixels from the area located on the previously coded (reference) image, are used. Reference images are not deleted from the RAM buffer, containing decoded frames (decoded picture buffer, or DPB), as long as they are needed for Inter-prediction. A reference list is created in the DPB from the indexes of these images.
The encoder signals to the decoder about the number of the reference image in the list and about the offset of the area used for prediction, with respect to the position of predicted block (this displacement is called motion vector). The offset can be determined with an accuracy of ¼ pixel. In case of prediction with non-integer offset, interpolation is performed. Different blocks in one image can be predicted by areas located on different reference images.
In the second option of Inter Prediction, prediction of the B-block pixel values (bi-predictive block), two reference images are used; their indexes are placed in two lists (list0 and list1) in the DPB. The two indexes of reference images in the lists and two offsets, that determine positions of reference areas, are transmitted to the decoder. The B-block pixel values are calculated as a linear combination of pixel values from the reference areas. For non-integer offsets, interpolation of reference image is used.
As already mentioned, after predicting the values of the encoded block and calculating the Residual signal, the next coding step is spectral transformation. In AVC, there are several options for orthogonal transformations of the Residual signal. When Intra-prediction of a whole macroblock with a size of 16x16 is implemented, the residual signal is divided into 4x4 pixel blocks; each of them is subjected to an integer analog of discrete two-dimensional 4x4 cosine Fourier transform.
The resulting spectral components, corresponding to zero frequency (DC) in each block, are then subjected to additional orthogonal Walsh-Hadamard transform. With Inter-prediction, the Residual signal is divided into blocks of 4x4 pixels or 8x8 pixels. Each block is then subjected to a 4x4 or 8x8 (respectively) two-dimensional discrete cosine Fourier Transform (DCT, from Discrete Cosine Transform).
In the next step, spectral coefficients are subjected to the quantization procedure. This leads to a decrease in bit capacity of digits representing the spectral sample values, and to a significant increase in the number of samples having zero values. These effects provide compression, i.e. reduce the number and bit capacity of digits representing the encoded image. The reverse side of quantization is the distortion of the encoded image. It is clear that the larger the quantization step, the greater is the compression ratio, but also the distortion is greater.
The final stage of encoding in AVC is entropy coding, implemented by the algorithms of Context Adaptive Binary Arithmetic Coding. This stage provides additional compression of video data without distortion in the encoded image.

Ten years later. HEVC standard: what’s new?

The new H.265/HEVC standard is the development of methods and algorithms for compressing video data embedded in H.264/AVC. Let’s briefly review the main differences.
An analog of a macroblock in HEVC is the Coding Unit (CU). Within each block, areas for calculation of Prediction are selected — Prediction Unit (PU). Each CU also specifies the limits within which the areas for calculating the discrete orthogonal transformation from the residual signal are selected. These areas are called the Transform Unit (TU).
The main distinguishing feature of HEVC here is that the split of a video frame into CU is conducted adaptively, so that it is possible to adjust the CU boundaries to the boundaries of objects on the image (Figure 3). Such adaptability allows to achieve an exceptionally high quality of prediction and, as a consequence, a low level of the residual signal.
An undoubted advantage of such an adaptive approach to frame division into blocks is also an extremely compact description of the partition structure. For the entire video sequence, the maximum and minimum possible CU sizes are set (for example, 64x64 is the maximum possible CU, 8x8 is the minimum). The entire frame is covered with the maximum possible CUs, left to right, top-to-bottom.
It is obvious that, for such coverage, transmission of any information is not required. If partition is required within any CU, then this is indicated by a single flag (Split Flag). If this flag is set to 1, then this CU is divided into 4 CUs (with a maximum CU size of 64x64, after partitioning we get 4 CUs of size 32x32 each).
For each of the CUs received, a Split Flag value of 0 or 1 can, in turn, be transmitted. In the latter case, this CU is again divided into 4 CUs of smaller size. The process continues recursively until the Split Flag of all received CUs is equal to 0 or until the minimum possible CU size is reached. Inserted CUs thus form a quad tree (Coding Tree Units, CTU). As already mentioned, within each CU, areas for calculating prediction- Prediction Units (PU) are selected. With Intra Prediction, the CU area can coincide with the PU (2Nx2N mode) or it can be divided into 4 square PUs of twice smaller size (NxN mode, available only for CU of minimum size). With Inter Prediction, there are eight possible options for partitioning each CU into PUs (Figure 3).
Fig.3 Video frame partitioning into CUs is conducted adaptively
The idea of spatial prediction in HEVC remained the same as in AVC. Linear combinations of neighboring pixel values, adjacent to the block on the left and above, are used as predicted sample values in the PU block. However, the set of methods for spatial prediction in HEVC has become significantly richer. In addition to Planar (analogue to Plane in AVC) and DC methods, each PU can be predicted by one of the 33 ways of “angular” prediction. That is, the number of ways, in which the values are calculated by “neighbor”-pixels, is increased by 4 times.
Fig. 4. Possible partitioning of the Coding Unit into Prediction Units with the spatial (Intra) and temporary (Inter) CU prediction modes
We can point out two main differences of Inter- prediction between HEVC and AVC. Firstly, HEVC uses better interpolation filters (with a longer impulse response) when calculating reference images with non-integer offset. The second difference concerns the way the information about the reference area, required by the decoder for performing the prediction, is presented. In HEVC, a “merge mode” is introduced, where different PUs, with the same offsets of reference areas, are combined. For the entire combined area, information about motion (motion vector) is transmitted in the stream once, which allows a significant reduction in the amount of information transmitted.
In HEVC, the size of the discrete two-dimensional transformation, to which the Residual signal is subjected, is determined by the size of the square area called the Transform Unit (TU). Each CU is the root of the TU quad tree. Thus, the TU of the upper level coincides with the CU. The root TU can be divided into 4 parts of half the size, each of which, in turn, is a TU and can be further divided.
The size of discrete transformation is determined by the TU size of the lower level. In HEVC, transforms for blocks of 4 sizes are defined: 4x4, 8x8, 16x16, and 32x32. These transformations are integer analogs of the discrete two-dimensional Fourier cosine transform of corresponding size. For size 4x4 TU with Intra-prediction, there is also a separate discrete transformation, which is an integer analogue of the discrete sine Fourier transform.
The ideas of the procedure of quantizing spectral coefficients of Residual signal, and also entropy coding in AVC and in HEVC, are practically identical.
Let’s note one more point which was not mentioned before. The quality of decoded images and the degree of video data compression are influenced significantly by post-filtering, which decoded images with Inter-prediction undergo before they are placed in the DPB.
In AVC, there is one kind of such filtering — deblocking filter. Application of this filter reduces the block effect resulting from quantization of spectral coefficients after orthogonal transformation of Residual signal.
In HEVC, a similar deblocking filter is used. Besides, an additional non-linear filtering procedure called the Sample Adaptive Offset (SAO) exists. Based on the analysis of pixel value distribution during encoding, a table of corrective offsets, added to the values of a part of CU pixels during decoding, is determined.
In HEVC, the size of the discrete two-dimensional transformation, to which the Residual signal is subjected, is determined by the size of the square area called the Transform Unit (TU). Each CU is the quad-tree of TU’s. Thus, the TU of the upper level coincides with the CU. The root TU can be divided into 4 parts of half the size, each of which, in turn, is a TU and can be further divided.
The size of discrete transformation is determined by the TU size of the lower level. There are four transform block sizes in HEVC: 4x4, 8x8, 16x16, and 32x32. These transforms are discrete two-dimensional Fourier cosine transform of corresponding size. For 4x4 Intra-predicted blocks, could be used another discrete transform — sine Fourier transform.
The quantization of spectral coefficients of residual signal, and entropy coding in AVC and in HEVC, are almost identical.
Let’s note one more point which was not mentioned before. The quality of decoded images, hence the degree of video data compression, is influenced significantly by post-filtering, which applied on decoded Inter-predicted images before they are placed in the DPB.
In AVC, there is one kind of such filtering — deblocking filter. It masking blocking artifacts effect originating from spectral coefficients quantization after orthogonal transformation of residual signal.
In HEVC, a similar deblocking filter is used. Besides, an additional non-linear filtering procedure called the Sample Adaptive Offset (SAO) exists. Sample level correction is based either on local neighborhood or on the intensity level of sample itself. Table of sample level corrections, added to the values of a part of CU pixels during decoding, is determined.

And what is the result?

Figures 4–7 show the results of encoding of several high-resolution (HD) video sequences by two encoders. One of the encoders compresses the video data in the H.265/HEVC standard (marked as HM on all the graphs), and the second one is in the H.264/AVC standard.
Fig. 5. Encoding results of the video sequence Aspen (1920x1080 30 frames per second)
Fig. 6. Encoding results of the video sequence BlueSky (1920x1080 25 frames per second)
Fig. 7. Encoding results of the video sequence PeopleOnStreet (1920x1080 30 frames per second)
Fig. 8. Encoding results of the video sequence Traffic (1920x1080 30 frames per second)
Coding was performed at different quantization values of spectral coefficients, hence with different levels of video image distortion. The results are presented in Bitrate (mbps) — PSNR(dB) coordinates. PSNR values characterize the degree of distortion.
On average, it can be stated that the PSNR range below 36 dB corresponds to a high level of distortion, i.e. low quality video images. The range of 36 to 40 dB corresponds to the average quality. With PSNR values above 40 dB, we can call it a high video quality.
We can roughly estimate the compression ratio provided by the encoding systems. In the medium quality area, the bit rate provided by the HEVC encoder is about 1.5 times less than the bit rate of the AVC encoder. Bitrate of an uncompressed video stream is easily determined as the product of the number of pixels in each video frame (1920 x 1080) by the number of bits required to represent each pixel (8 + 2 + 2 = 12), and the number of frames per second (30).
As a result, we get about 750 Mbps. It can be seen from the graphs that, in the area of average quality, the AVC encoder provides a bit rate of about 10–12 Mbit/s. Thus, the degree of video information compression is about 60–75 times. As already mentioned, the HEVC encoder provides compression ratio 1.5 times higher.

About the author

Oleg Ponomarev, 16 years in video encoding and signal digital processing, expert in Statistical Radiophysics, Radio waves propagation. Assistant Professor, PhD at Tomsk State University, Radiophysics department. Head of Elecard Research Lab.
submitted by VideoCompressionGuru to u/VideoCompressionGuru [link] [comments]

Cryptosoft Review 2020-Is it a Scam?

Cryptosoft Review 2020-Is it a Scam?

Most f the reviews we tend to have come back across reveal that the Cryptp soft platform is easy to
Their client service is very efficient. We did a live check and confirmed that they respond at intervals a moment. Moreover, they are available 24/7.
The Cryptp soft app is secure. They need all the mandatory measures in place to make sure data privacy.
The Cryptp soft System is considered by several among the most effective robots within the market nowadays. We have a tendency to realize this robot to perform virtually the same with Bitcoin Rush, another top bitcoin robot. Read the review of Bitcoin Rush for more data?
Cryptp soft registration method is straightforward, easy, and secure. You only want but 10 minutes to form an account and begin trading. Cryptp soft is a absolutely auto bot and is so accessible to everyone.

https://preview.redd.it/giu6kclgfnn51.jpg?width=1280&format=pjpg&auto=webp&s=f605d84ba2174f831ca825dbaffddf061b3a55b5
You do not want to perceive trading lingo to use Immediate Edge. The following steps can get you started with this robot.
STEP ONE: Fill the Signup type

Visit the Cryptp soft home page and register your name, phone number, and email in the provided kind. You will be asked to verify your phone variety via a text code and email through a link. CryptoVibes will ascertain that the Cryptp soft registration process is secure.

Their web site is SSL secured to confirm that hackers cannot steal personal information submitted through it. Cryptp soft cyber safety policy states that they're GDPR adherent. This suggests that they handle your knowledge with strict privacy.
STEP TWO: Get matched with a broker

The Cryptp soft Software then matches you with one in every of their partner brokers. The role of the broker is to receive deposits and facilitate transactions. We have a tendency to have determined that Cryptp soft only partners with regulated brokers.

With a regulated broker, they guarantee that your cash is safe. Reputable regulators such as the FCA, FSB, ASIC, and CySEC need brokers to segregate deposits and submit periodic reports on deposit usage.
You wold like a deposit of a minimum of $250 to trade with Immediate Edge. Do not confuse this quantity with the value of the robot. Cryptp soft does not need any license fee. The house owners of this robot build money by charging a small commission on the profits generated through the app
Deposits with Cryptp soft should be created through Wire Transfer, Visa, and MasterCard. It takes a few seconds for a deposit to reflect in an exceedingly trader’s account. Cryptp soft does not charge any deposit fees.
The Cryptp soft does provide a demo account to help traders familiarize themselves with its web-trader. CryptoVibes recommends that you are doing demo trading before going to live to trade. Please note that the demo is for demonstrative purposes solely.
The results you receive on the platform are primarily based on historical information and could therefore not mirror what you'll get in live trading.
The Cryptp soft live trader comes with features to help you outline the amount of risk you are willing to require per trade. You wish to go through the demo account to familiarize with these features. As mentioned severally in this review, you do not want specialized skills to use this robot.
Live trading with Cryptp soft involves determining the quantity of capital you plan to risk per trade and clicking the live button. Scan our review of Bitcoin Trader for one more straightforward to use the robot.
*Remember all trading risks and you shouldn’t risk more then you'll be able to afford to lose.
How to get the most out of Cryptp soft App
We have identified the following tips as paramount in guaranteeing that you make the most of Immediate Edge.
Begin with a deposit of $250 – Given the level of risk involved in trading with Immediate Edge, you should start with a tiny investment.
Follow crypto market news – You need to determine the type of reports that drives volatility high and capitalize on them. Cryptp soft claims to form the foremost profits throughout high market volatility.
Trade for eight hours per day – In keeping with Immediate Edge, trading for at least eight hours per day can help maximize profits. Cryptp soft is entirely auto, and hence you'll be able to leave the robot running as you continue together with your daily errands. You are doing not want more than twenty minutes per day to observe your account.
Close trading sessions at the tip of the day – Leaving open positions overnight is doubtless to translate to losses since the markets can change considerably overnight. It is better to shut sessions even if in the negative and start trading again the subsequent day. With a correct risk management strategy, there is no would like to fret concerning periodic losses.
Following our review we tend to realize Cryptp soft to be legit. But, traders ought to take additional caution, provided that this bot comes at a degree of risk. Whereas the app claims it's potential to form profits of up to 50percent per day, you'll be able to additionally lose the complete deposit inside seconds. This is often not sudden for a high-frequency trading robot.
We recommend that you just apply the required risk management measures. As a rule of thumb don't risk more than 10percent of your trading capital per trade. Also, never trade with an amount you cannot afford to lose. It is prudent to start small and add cash as you get conversant with the various features on the platform.
Recently, a brand new trading software was added to the bitcoin investment trade. This software is termed Cryptp soft and it is allegedly created by a corporation or organization called the International Council for Bitcoin.
There is additionally a letter out there on their web site that has been signed by someone named David. This person claims to own earned over 1,000,000 as a results of investing in bitcoins. What’s very shocking concerning this letter is that David claims to have earned that huge quantity in just one trade. If we have a tendency to place it in simple words, David became a millionaire overnight.
We tend to highly doubt that a trading system that has been launched recently will have such potential. To verify the main points of this software and to determine its legitimacy, we have a tendency to conducted our own research and investigation.
Cryptp soft is a bitcoin trading software that’s meant to assist newbie traders get involved in Cryptocurrency trading with less risk than ancient investment opportunities. Cryptp soft software was created by The International Council For Bitcoin who is PRO Bitcoin trader Group behind the Cryptp soft software. Notice out all concerning Cryptp soft software by The International Council For Bitcoin.
Cryptp soft Software may be a nice development by a famous, well established and experienced bitcoin trader Investors with a viewpoint to enable traders to perform different tasks with ease and convenience.

https://preview.redd.it/uuh85yghfnn51.png?width=1238&format=png&auto=webp&s=d0558e6e123114b6624d5a724b3b9b5983e717e1
Cryptp soft Software is essentially a Binary choices trading software that is designed to assist traders win and predict the Binary options trend of their respective choices. Cryptp soft APP works as a code to urge financial success, shows traders how they'll make money on-line, helps them to find different ways in which to induce huge returns on their investment. The Cryptp soft Trading Software additionally provides analyses of Market conditions so that traders will recognize what ought to be their next step. Cryptp soft System gives secret cryptocurrency ways that ultimately help binary traders to create thousands of greenbacks solely for some bucks.
Several individuals can say that Cryptocurrency Trading may be a risky business and tend to remain faraway from it. But from my expertise, high volatility means HIGH RETURN OF INVESTMENT in Crypto Market. But this can be where the Cryptp soft comes into play, the mathematical algorithm used by Cryptp soft Software takes the guesswork out choosing a winning profitable trade. You don’t must be an expert. Like I said earlier, I actually have personally tested the Cryptp soft and found the success rate is about ninety sevenpercent. I don’t apprehend concerning you, but a ninety seven% probability of earning a profitable trade is TERRIBLY GOOD! I’ve never come across something like this trading software before. Keep reading, below are my Cryptp soft results for the past week or so…
Watch over the Shoulder of a Professional Each Day and you'll be able to learn as you trade.
Averaging 97% Winning Weeks With Cryptp soft which suggests that more potential profits for you
Cryptp soft Software Are Fully Transparent
No previous experience with binary choices trading required
Web-based mostly, no need for downloads, additionally works on phones, tablets
You'll be able to Even Watch Cryptp soft Signals From Your Phone (iPhone Users — Photon Browser)
If you are ready to begin making cash online with an on the spot edge, there has never been a better chance than currently. If you enjoy surfing the web for countless hours trying for the next Trading Method Secrets, never being able to urge centered, being overloaded with conflicting information, and not creating cash on-line, you ought to probably leave this page right now and get back to that Cryptp soft System strategy
Cryptp soft bot could be a new cryptocurrency trading invention that comes with options that create this software stand out among others. It is conjointly an automatic trading platform that uses a smart program algorithm to detect favorable trading opportunities. It acts on its own or waits for a prompt command from the user depending on the software’s settings. But what makes this software unique and a favorite to individuals is what we have a tendency to shall unveil in this review.
There have been lots of unverified claims of how totally different cryptocurrency software have helped several people to make massive profits leading to Scam individuals. However, it's pertinent for cryptocurrency traders to verify if a particular trading software may be a scam or legit, which is also ?
After subjecting the features of the Cryptp soft bot software to a series of tests, the software isn't a scam however legit. The Cryptp soft bot is believed to have successful rate of 85%, that is a lot of than the 80percent benchmark for average software. The Cryptp soft bot has helped cryptocurrency traders to make sensible profits, which has been documented as testimonies on the software’s website.
Trading on the platform is straightforward and might not require experience. We had to verify the simplicity of the software, and we tend to discovered that the software is easy to navigate. The demo trading feature of the software makes it potential for brand new users to hold out trading activities in an exceedingly simulated atmosphere while not having to risk their investment. This any gives credence to the legitimacy of the software because it ensures that new users get accustomed to the features of the software before continuing to measure to trade
As earlier stated, the Cryptp soft bot could be a high-tech program software that comes with exceptional options that makes it among the simplest cryptocurrency trading software in the blockchain market. The outstanding features of the Cryptp soft bot embody the subsequent:
https://www.cryptoerapro.com/cryptosoft/

http://www.cryptoerapro.com/

https://twitter.com/cryptoerapro

https://www.instagram.com/cryptoerapro/

https://www.pinterest.co.uk/cryptoerapro/
submitted by cryptoerapro to u/cryptoerapro [link] [comments]

[PI] The last surviving logs of the crew of the I.S.S. Conan, a space cruiser that was sent to investigate a particular celestial anomaly near the Conflictus Solar System.

Had great fun writing this. I'm still flexing my muscles on writing as well as on English grammar (I'm non native English). Would love to see what you think of it.
Original prompt: https://www.reddit.com/WritingPrompts/comments/hp76pb/wp_the_last_surviving_logs_of_the_crew_of_the_iss/
------------------------------------------------------------------------------------------------------------------------------------------
8 days 4 hrs to event
“You’re sure this is genuine?”
Abel looked Myogi straight into her light brown eyes, searching for any trace of doubt she had concerning the message. His voice being the only notable sound apart from the soft hum of the ship’s life support system. They were on the bridge of the I.S.S. Conan. A place designed for function not aesthetic, able to hold six of the small cruiser’s crew of eight. Currently, only four people were present.
She returned his stare unwavering.
The front of the oval shaped bridge held the navigation consoles and the main screen for displaying whatever it was that was important. This was Ahmed’s station, the I.S.S. Conan’s first helmsman, though at the moment Gerald, his junior, was operating it. Tactical was to the right manned by Karl the ship's chief engineer. Communication was to the left, until recently manned by the ship’s XO commander Myogi Shizu. Command was where Abel and Myogi were standing now, at the center of the bridge.
Only twenty-eight? Way too young!
Abel remembered his first impression when he and Myogi first met, just over two years ago. But she showed him his doubts were unfounded by taking command of the ship and its crew. Oh, he tested her, of course. But she passed all his challenges with flying colours. And with every success, Abel's respect for this young woman had grown.
“It’s genuine, sir!” Her strong voice showed not even a hint of uncertainty. “The quantum encryption seal has been verified and the origin of the message has been established as coming from sector HQ at Jewel-4.”
Abel read the flash message again.
To: Cmdr. H.P.F. Abel, I.S.S. Conan From: I.S.S. Sector HQ, Tantalus Sector, Jewel-4 Priority: High You are to set course immediately to the Conflictus System, Heagon Sector. Investigate anomaly at coordinates 298-8876-98. Report on 8 hour intervals upon arrival. Yours sincerely, Commodore Aginov Tantalus Sector Admiral 
She wouldn’t screw up such a simple thing as this. After all their time together, Abel was certain commander Myogi Sizu was among the best of XO’s he ever served with. He feared the moment she would leave his ship to take on her own command.
"Besides,” she added, “who could possibly be interested in creating a fake ISS message? I mean, it’s not that there are any aliens out there trying to trick us."
Abel smiled. Two centuries of interstellar space flight, but mankind had yet to come across other intelligent life. Let alone lifeforms that deliberately tried to divert a small cruiser to an unknown location.
Abel activated the navigation computer and entered their new destination. A holographic representation of the Heagon sector appeared. It was a small sector, with few stars and zero colonies or outposts. Barely interesting. He added the I.S.S. Conan’s current location and suddenly whistled with surprise.
“That will take us a week to get there.”
“Should I plot the course, sir?” Myogi asked.
Abel nodded.
“Yes. And inform the crew about our new orders. I’m going to request confirmation on this.”
***
1 day 9 hrs to event
Confirmation came within twenty-four hours. Now, with less than eight hours travel time left to their destination, Abel noticed how much the tension on board his ship had increased. Of course, any new mission brings a given amount of stress. But patrolling between colonies and occasionally inspecting civilian transports for contraband was hardly a dangerous task. This time it felt different.
“You should eat, sir,” Myogi said.
Abel looked at his still untouched plate containing his evening dinner. A small piece of fried chicken, some flavored potatoes and carrots.
“I’m not hungry.”
They were dining alone. The rest of the crew was either being on station or resting. Myogi had already finished her meal and had used most of their time together to bring him up to date with the crew status. Most of her time was spent on regular issues, like Dylan who was angry at Karl for having been scowled at during the latest drill or Gerald complaining that Sorland, as acting chief security, inspected his cabin without him knowing. Of more pressing concern were the details of the sour relation between Karl and Ahmed. Each of their disputes seemed to be about something rather trivial. As a result Myogi now concluded that the ship's medical officer, young Irene Caldwell, was at the heart of their enmity.
“Only two weeks fresh on board and she is already driving our most senior crewmen crazy. I really should talk to her about this.” She concluded.
Abel wasn’t listening. And halfway through her report Myogi must have realised she was having a monologue.
“You’re not listening, are you sir?”
He nodded.
“The ship is in excellent condition, sir. Nothing can go wrong. We'll go in, scan whatever it is we find there, and get out. In a week's time we'll be drinking cocktails on the beach of Lake Pelmac in the Feynman colony, enjoying our shore leave.”
She tried hard to let her voice sound relaxed, like there was nothing wrong. But with two years of close collaboration Abel immediately noticed the tiny aberrations in her usually clear voice.
So you feel it too?
Again he started reflecting how much, as a senior officer, Myogi had grown over the last two years. She would be leaving soon, he now was sure of it.
“My grandfather was captain of the Xerxes during the pacification of the Tantalus sector, when they were fighting the pirates,” Abel started. “That was a real war! He once told me that when you are in command for a long enough period, you start to develop a sort of sixth sense for when danger lurks. I always thought he said it to boast his stories a bit.”
Abel looked his XO directly in her eyes.
“Now I’m not so sure anymore. Ever since I got that damn confirmation back from HQ I feel terrified.”
“Trust your team, captain.” Myogi’s slender fingers touched his hand briefly, reassuring him. Then she gathered her plate and cutlery and got up. Just before leaving she added:
“Now finish your plate, sir!”
“Yes, ma'am,” Abel laughed.
***
26 hrs to event
They should have added more room to the bridge.
The thought popped up as he watched his entire crew of seven in the confined space. They were fully operational now, with Ahmed and Gerard at the helm as well as Karl and Dylan at the tactical stations. Sorland was making himself useful by manning communications. That left Myogi and Irene who were just standing idle to his right side. Abel could understand everyone wanted to see firsthand why they were sent to this remote location in space, though he suspected that Irene’s motivation was less about curiosity and more about ascertaining her own safety.
Give her a break, she just left the academy.
"Visual on screen," Ahmed announced. His loud voice broke the silence on board the I.S.S. Conan’s bridge. The main screen went black, then it suddenly showed the outside environment.
Abel watched the image on the screen, a deep black space. But the countless stars usually visible were missing. Instead the black of the image was broken by wide lanes of partially translucent brown. Dust! At the center a large yellow star was visible, shedding a bright corona, and to the right a smaller yet surprisingly bright purple companion could be seen. For a moment it appeared the astro charts had missed classifying Conflictus as a binary star system, then Abel realised the purple companion was the anomaly.
An unsettling knot formed in his stomach.
Ahmed adjusted the I.S.S. Conan’s heading. The purple companion now centered on the screen. As the ship covered more of the remaining distance, it slowly enlarged into a pulsating blob of gas roughly measuring a thousand kilometers in diameter. A fascinating view, Abel found. And one like he never had seen before.
“Wow. That looks weird,” Myogi said, her voice filled with wonder.
Abel nodded in agreement. As they approached the image of the anomaly was filled with more details. The gas cloud was packed with dancing streaks of purple running like lightning criss cross. The sight was beautiful yet disturbing.
Abel felt the knot in his stomach grow a little tighter.
“Sorland, report to HQ that we have arrived as planned at our destination. And—”
At that moment the ship’s main computer activated the alarm, preventing Abel from finishing his second order. The direct image of the anomaly on the main screen was replaced with a simplified tactical view. Moments later Dylan’s voice boomed in the confined space of the bridge.
“Contact..contact..contact..!! Bearing zero-three-nine. Range two-point-eight.”
Practiced drills kicked in. Abel and Myogi immediately sat down in their seats and buckled up. Karl activated the ship's weapon systems, linking it with whatever it was Dylan's sensors had located, while Gerald powered up the ship's emergency thrusters. Irene remained standing. Frozen. Her face pale white displaying fear.
Abel fired his commands.
“Full stop! Karl, identification on the contact!”
The reply came almost immediately.
“Contact is orbiting the anomaly at three thousand klicks, sir. No identification, but it’s big.”
So that’s why the computer went berserk!
“Sorland, send that message!” Abel commanded. “Include we have an unidentified contact!” Then he noticed Irene. “And please escort Irene to her cabin.”
Sorland acknowledged. Abel never heard it. His attention had already returned to the main screen.
“Any sign on the EM-band?” he asked.
“Negative, sir!” Karl answered. “Whatever it is, it’s quiet as a rock.”
Why are we here?
Abel started to question his orders as he contemplated the situation. What had Aginov exactly meant by ‘investigate anomaly’? Was HQ aware of the unknown object around of... something else unknown? And what exactly was it he was now meant to investigate?
Again, Abel felt the unsettling knot in his stomach. He looked to the right, at Myogi. Unlike him, the young woman seemed to be at ease, her attention focused on the main screen, radiating self-confidence.
Perhaps I should let her take command!
Feeling his stare, she turned to look at him.
“You’re okay, sir?” she asked.
“Yeah” he lied.
Abel added to it a silent curse. What was wrong with him? He was her captain, not some pitiful old man. He should be the one being self-confident. So why the hell was he still questioning this mission? Abel gestured his XO to come near. As she leaned over to him, he made sure he kept his voice down.
“Commander, I want your assessment on the continuation of this mission.”
Myogi gave him a puzzled look.
“You want to abort the mission, sir?” Like Abel, Myogi too kept her voice down, realising her captain wanted a private confer.
He gave her a short nod in reply.
“I don’t like it. We came to investigate a stellar anomaly. Now we have an unknown contact, possibly hostile.”
“We don’t know if it is hostile, sir.” she said. “Up until now we only know the computer identified something out there and labeled it artificial.”
Abel contemplated her words. She was right of course. The computer had found something out there that simply didn’t match it’s programmed parameters, so it sounded the alarm. Had it been wartime, or had their mission been of a more aggressive posture, any unidentified contact would likely pose a threat. But this mission was neither.
“I still don’t like it,” he said. “You think the computer is wrong?”
“No, sir. We just don’t know what it is. And that’s exactly why we need to investigate it. If we leave, it will take more than a week for another ship to reach this location. By then it might be gone and we will never know.”
A simple and solid rational analysis. Something he had come to expect from her, Abel thought. She was going to be a great captain.
“Sir...,” Myogi hesitated, “you should also take into consideration that admiral Aginov is just waiting for another event to question your ability to command. He did not seem to be happy how you'd dealt with the issue concerning the freighter Leonov.”
The Leonov...
Abel had almost forgotten the incident. He was sure Aginov would cherish the fact if he ignored his orders. And he wouldn't hesitate to court marshal him over it.
“Captain, what are our orders?” Karl’s loud voice interrupted Abel and Myogi’s deliberation. He needed to make a decision. Fast. Abel looked his XO in the eyes. Perhaps it was her time.
“So you want to investigate it, Myogi?” Abel whispered, thinking aloud. He still had his doubts but Myogi was right: ending this mission right here right now would effectively end his career as a flag officer. Besides, toying the idea of putting Myogi in command, if she pulled this off it would flag her as exceptionally talented. He then had a bonus for her file, before forwarding his already written request for promoting her to captain. A soft smile lined his face.
“Very well, commander. You convinced me, for now.”
Abel addressed his crew, still waiting for his orders. “We are going to continue our present course.” Then, following his idea, he added. “Commander Shizu has the conn.”
Whether or not Myogi was surprised by him handing over command of the ship to her, she didn’t show it. With a trained efficiency she directed the crew of the I.S.S. Conan towards the unknown object, ascertaining the ship had always a direct escape route out of danger. Abel watched her with a sense of pride.
***
Abel’s heart missed a beat.
It had taken the I.S.S. Conan ten minutes to cover the distance between the ship and the unknown contact, enabling visual inspection. Abel was standing at the far end of the bridge, accompanied by Sorland. The latter one, having escorted Irene to her cabin, had joined him in witnessing Myogi’s command of the ship. It had made Abel smile. He long since suspected his chief security having an interest in the ship’s XO surpassing only professional.
Now everyone on the bridge froze.
“Fuck!” Karl muttered.
Even Myogi lost her cool. “Oh my god”
Abel remained silent and stared at the main screen. Stunned. On it, something was visible that couldn’t be. The undeniable proof of alien intelligent life, for all on the bridge to see!
He studied the image shown on the screen. A construction, trapezoid in shape, containing three large spheres connected with tubes. A pair of very large solar foils were stretched out on either side. Both shape and style were unlike any spaceship or space station Abel ever had come across.
“Captain?” Myogi looked at him, her eyes searching for any hint he wanted to retake command of the ship. Abel just stared back. She understood, firing a new set of commands that returned activity to the bridge.
“Ahmed, take us in, one hundred klicks. Karl, keep offensive weapons locked on that thing. And keep scanning the EM-band. If they even switch on a single dashboard light I want to know."
You’re doing great, Myogi.
***
To: Cmdr. H.P.F. Abel, I.S.S. Conan From: I.S.S. Sector HQ, Tantalus Sector, Jewel-4 Priority: High +++ this mission is now classified top secret +++ Your preliminary report on the object has been examined. I agree on your initial assessment the object discovered is no longer operational. As to its origin, it is still a mystery. Permission is hereby granted to extent the investigation on the object. The I.S.S. Dealus and I.S.S Galileo have been dispatched to your location and will join you in five days. Yours sincerely, Commodore Aginov Tantalus Sector Admiral 
***
20 hrs to event
They had assembled in the ship’s mess. Like the bridge this room too hadn’t been designed for a full gathering of the crew. With only two tables there was just enough room for half of them to sit down. Abel preferred standing.
It had only been six hours since they had made their discovery. They had spent the time scanning the object for any electrical activity, finding none. Also, a more detailed visual survey had revealed extensive damage on the forward two spheres, whereas the solar foils showed a severe lack of maintenance.
It was dead.
Both Karl and Dylan had agreed on this and, being the ship’s engineers, they were the closest thing Abel had to an expert on ship design. Following their conclusion, Abel and Myogi both agreed the unknown object posed no threat to the I.S.S. Conan and its crew.
Then why am I still worried?
Abel still felt like he was missing something, that something was eluding him. Apart from its origin, if the unknown object was dead, the most important question was: what happened to its crew? And would the answer to that question lead to a reassessment of the object’s threat status? Again he felt uncomfortable.
“Captain? Our new orders?”
Myogi interrupted Abel’s pondering, bringing him back to his current task: informing the crew. He let his eyes wander over the men and women serving on board the I.S.S. Conan. Their faces were displaying a mixture of excitement, worry and, in case of Irene, anxiety. Abel noticed Irene had taken her seat next to Karl, who had put his arm protectively over her shoulder. He also noticed the malicious look Ahmed was giving both of them.
Trouble is brewing..
Whatever it was that was going on between them, it had to stop. Abel made a mental note to schedule a private chat with both of his senior crew members, then started addressing his crew.
“I don’t think I have to explain how much of historical significance our mission has become.” Abel's voice immediately commanded the attention of everyone in the room. “Already the discovery of this unknown object is changing how we view our galaxy.”
And with a grin. “And I’m really glad that the object found is dead as a rock.”
He received a single approving nod from Myogi and a small chuckle from Karl, who recognized his own words being used. The rest of his team remained silent, yet Abel’s small joke did ease the tension.
“An hour ago we received new orders. The I.S.S. Daelus and I.S.S. Galileo are currently enroute to our location. They’ll join us in approximately five days. We are to wait here until they arrive.”
The news caused a visible ripple of relief among his small audience. Abel took a pause. They needed this, he realised.
“In the meantime we have been given permission to extend our survey.”
“What do you suggest, sir?” Karl asked. “We don’t have any survey droids on board.”
Abel nodded. “I know that, Karl. Commander Shizu and I already discussed this. She suggested we should try to board the object.”
***
14 hrs to event
“Approaching… distance… one hundred meters… eighty...”
Abel listened to Myogi’s voice coming in over the speaker. In front of him, on the bridge’s main screen, three tiny figures in space suits were visible, manoeuvring towards the rear sphere of the unknown object. She was one of them, though Abel no longer could be sure which of the figures was her.
Why is it different?
The question suddenly popped up as Abel’s mind involuntarily registered the anomaly, partially visible in the background. The purple streaks no longer seemed to dance randomly through the gas cloud. Instead it appeared as if they were coming from a focal point, it’s exact location blocked from view by the unknown object, as if it had reacted to their presence. Abel felt a sudden chill. Then, shaking his head, he immediately dismissed his absurd thoughts.
You’re seeing ghosts, old man.
Myogi’s voice interrupted his thinking. “There’s damage also visible on this sphere.”
That was new. Already they had ascertained the unknown object had sustained damage on the forward two spheres but due to the position of the I.S.S. Conan and the unknown object, they hadn’t been able to perform a more thorough visual inspection of the most remote sphere.
“Bloody hell...” Karl suddenly interrupted. “Commander, looks like the damage here came from an explosion on the inside.”
Abel signalled Dylan. “Can you switch to Karl’s suit camera?” The assistant engineer nodded and a single moment later the main screen switched to the chief engineer’s camera. A close up view of the hull of the rear sphere became visible. Abel inspected the footage and immediately agreed on Karl’s assessment. A gaping rupture was visible, the inner support structure bending outward. Whatever the cause, it had come from the inside.
Myogi’s voice continued “...there’s some kind of entrance here. It’s spherical, roughly three meters wide. We move in to inspect it.”
“Captain?”
A sudden soft voice behind Abel disturbed his observation on the boarding operation. Annoyed Abel turned, Irene was standing there. Her eyes confused, the trembling of her body betraying great suffering. Then Abel noticed the blood.
“Irene…” he carefully asked “what happened?”
She looked in his eyes. “I’m… so… sorry… captain,” she said. Her voice filled with grief. Then tears started to roll down her cheeks as she collapsed on the floor. Sobbing.
Abel turned, finding Gerald and Dylan looking at Irene, horror stricken. “Where’s Ahmed?” he asked. Both men stayed silent. The shock on their face acknowledging what he already suspected.
Abel turned back to Irene. Seeing her huddled on the floor, hands over her face, crying, he realised the young woman was in no condition to give him any more information. He quickly ordered Gerald to take care of her, then was off into the corridor. A rising urgency manifesting as he searched the crew cabins for his first helmsman. They were all empty. Abel pressed on to the mess, then to sickbay. He found Ahmed lying on the floor, motionless. A light red pool already visible around a large wound across his throat.
Too late!
Abel swore aloud as he looked at the body of his senior officer. Already blaming himself for not having held that chat he had promised himself hours ago. He surveyed the I.S.S. Conan’s sickbay. There were signs of a struggle. The examination table was thrown to a side and a medical pad was lying on the floor, broken. To the left of Ahmed’s corpse a blood covered scalpel was visible. No doubt the weapon used. As he bent over to pick it up, Dylan’s panicking voice screamed over the intercom.
“CAPTAIN TO THE BRIDGE”
It took Abel only twenty seconds to return. As he rushed in on the bridge, he heard Myomi’s alarming voice over the speaker.
“Faster… we’re losing him…” His blood ran cold.
Gerald elucidated. “Suit malfunction. They’re trying to reach the airlock before he runs out of air.” Then with a grave voice he added “I don’t think they’re going to make it.”
“Who?” Abel asked.
“Karl!”
The moment he mentioned Karl, Irene issued a long wailing cry that filled the entire bridge, shattering the last remaining doubts Abel had that both incidents were unrelated.
“NOOO…”
***
12 hrs to event
They made it in time. Barely. But Karl had suffered from massive asphyxiation, rendering him in a deep coma. And with sickbay now being a crime scene Abel had no other option than to move his chief engineer to his cabin. That was where they now had assembled, Sorland now administering whatever first aid he could think of.
“So, she killed him?” Myogi asked.
“Yes.” Abel nodded.
“That bitch.” Myogi fumed, then she was off. Abel watched her go. Moments later Sorland followed her. Abel was about to stop him, then decided against it. With Myogi being so agitated, Sorland was probably the only one capable of restraining her. He looked back at Karl, still lying motionless on his bed. His breathing being heavy but regular. Abel felt tired. There was just too much that had happened. And it didn’t make any sense. Aginov would grill him on this mess. His career was now finished.
***
10 hrs to event
“No, we are not going to try to board it again!”
Abel ignored Myogi standing in front of him. His eyes were looking straight past her, absorbing the image on the main screen. There were more purple streaks visible now in the anomaly, casting a purple haze over the unknown object in front of it.
Loneliness…
Abel suddenly wondered why he was thinking about him feeling alone when Myogi was standing in front of him, yelling at him. He felt agitated.
“The answers we need are found over there!” Myogi’s voice was loud and angry, her right hand pointing to the main screen.
“We wait until the arrival of the I.S.S. Daelus and I.S.S. Galileo.”
Abel now clearly voiced his irritation. He and Myogi had been working together for two years now and they didn’t always agree. Yet he couldn’t remember her ever being so angry. Nor could he remember her being this disrespectful. She paused, still fuming, her lips twitching.
“Admiral Aginov is right.”
Her words struck home. Abel gave his XO an angry look.
“What? What did you say?”
“You’re weak,” she spat, her voice ringing with contempt. “Always trying to hide for danger. If it wasn’t for me you would have headed for the hills.”
Abel no longer hid his anger. “Watch it commander. You’re not captain yet and if you continue like this you will never become one.”
A sudden high pitched scornful laugh from her filled the bridge.
“Captain? You’re not a captain,” she mocked. “You’re a caretaker. Just like my parents. Always finding excuses to hide, to not take risks, to stay a nobody forever.”
“Well, I’m not going to be a nobody.” Myogi walked past him and left the bridge.
“Myogi?” Suddenly his anger was gone. Abel realised his XO was about to do something that, without doubt, would have severe consequences for her. Then he looked at Sorland who, like everyone else on the bridge, had followed their open disagreement with horror.
“Get her back here, Sorland!” Abel commanded. “ Before she does something stupid.”
As Sorland left the bridge, he returned staring at the main screen. The purple haze had grown stronger. It gave him an eerie feeling.
***
Myogi never returned to the bridge. And neither did Sorland. About fifteen minutes after they both left the bridge Dylan reported. “The inner entrance to the airlock has been opened, captain.”
“Fuck!”
Abel sped away, reaching the entrance to the airlock in less than twenty seconds. Myogi and Sorland had already donned their EVA-suit and had already closed the inner airlock door. Abel punched the intercom and yelled.
“Commander! Stop!” His fists pounding on the small window in the steel enforced door.
Myogi just smiled at him as she put on her helmet.
“Sorland! Stop her!” Abel roared.
As he heard his name, the chief security looked at him. His face saddened.
“I’m sorry Hieronymus," he apologised. "I cannot let her go alone.”
Then he too put on his helmet. After they made their final security checks, Sorland depressurised the chamber. One minute later the outside door of the airlock opened and the full force of the anomaly now entered Abel's view taking him by surprise.
Pain…
Watching through the window he saw Myogi turn towards him, smiling, waving, as they both drifted outside in the direction of the unknown object. He watched them go until they were no longer visible. Then he turned away, sank to the floor and started crying.
***
Anger...
He didn't know how long it had been. But while he sat there, his back against the cold steel door protecting him from the relentless vacuum outside, his grief slowly turned into anger. A deep primeval type of anger.
Hate...
"Stupid insolent bitch!"
Abel slowly made his way back to the bridge. As he passed Irene's cabin he noticed the door no longer was locked. Her laughter emanating from the inside, as well as other sounds that left little imagination as to what was going on. Whoever was with her had ignored his order to keep her locked up until she could be trialed.
Revenge…
For a moment Abel considered to intervene, then he continued his way. He would soon trial them all. As he entered the bridge, Gerald rose from his seat, unsure what to do.
"Dylan went to see..." he started.
Abel held up his hand. "Irene! I know." Then he eyes locked with the main screen. The unknown object in full view, the anomaly, the fury it now displayed. Yes! It was reacting to their presence. Abel closed his eyes. He could almost hear it calling...
Kill…
***
3 days 11 hours after event
"We're entering the system now, admiral."
Aginov watched the main screen of the I.S.S. Daelus come alive, uncovering the dust streaked space surrounding Conflictus. At its center a yellow star radiated brightly.
"Any word from commander Abel?" he asked.
"Negative," the young lieutenant, manning the communications station, replied.
“Keep trying” he commanded, his eyes still focused on the main screen in front of him.
"Picking up a single contact." Tactical reported.
"Identifying… it's the I.S.S. Conan, sir."
Aginov exhaled, relieved. "Any other contacts?" he asked. The reply came instantly.
"Negative, sir." Followed by "Nothing on the EM-band, sir. She's dead!"
Aginov's blood ran cold.
***
submitted by darquin to WritingPrompts [link] [comments]

Error loading Python lib

The name of my python script is kled.py
This is the message I used to create it:
pyinstaller kled.py --windowed 
Here is the error message I get when I execute the terminal file located in dist(a folder called kled)(executable terminal file called kled)
[3173] Error loading Python lib '/Users/john/Documents/chill.py/kledfinal/dist/kled/Python': dlopen: dlopen(/Users/john/Documents/chill.py/kledfinal/dist/kled/Python, 10): no suitable image found. Did find: /Users/john/Documents/chill.py/kledfinal/dist/kled/Python: code signature invalid for '/Users/john/Documents/chill.py/kledfinal/dist/kled/Python' 

When I double click the application it has created it appears to open in my dock, and then goes away, nothing actually opens.

Here are the resources I've already looked at but didn't find success from:
https://github.com/pyinstallepyinstalleissues/2150
- I don't understand the solution they found. The two people troubleshooting didn't explain the steps they were taking so I couldn't follow.
https://github.com/pyinstallepyinstalleissues/3499
- This is where I got the idea to change my spec files, because in his pyinstaller command it seems like he has a specific spec file he was trying to use.
https://pyinstaller.readthedocs.io/en/stable/spec-files.html
- I thought maybe I could edit my spec file to include the modules or python version it might be missing, but no other results told me how to properly set up my spec file to do this. I was originally trying to use py2app and if any of you know it, you will know that setup.py basically lets you hand pick all the files and stuff you need. Unfortunately py2app has a huge amount of issues in general so I decided my error wasn't going to get fixed, but pyinstaller seems to have some experts so maybe you guys can help.
https://stackoverflow.com/questions/60678697/error-loading-python-lib-with-pyinstaller-on-macos
- went through the steps and it just didn't work for me. Same outcome where the application doesn't work and the executable terminal file called kled says that it had an Error loading python lib.

RESOURCES YOU MIGHT NEED (idk I'm just guessing but here is some stuff)
my kled.spec file:
# -*- mode: python ; coding: utf-8 -*- block_cipher = None a = Analysis(['kled.py'], pathex=['/Users/john/Documents/chill.py/kledfinal'], binaries=[], datas=[], hiddenimports=[], hookspath=[], runtime_hooks=[], excludes=[], win_no_prefer_redirects=False, win_private_assemblies=False, cipher=block_cipher, noarchive=False) pyz = PYZ(a.pure, a.zipped_data, cipher=block_cipher) exe = EXE(pyz, a.scripts, a.binaries, a.zipfiles, a.datas, [], name='kled', debug=False, bootloader_ignore_signals=False, strip=False, upx=True, upx_exclude=[], runtime_tmpdir=None, console=False ) app = BUNDLE(exe, name='kled.app', icon=None, bundle_identifier=None) 

Python version:
Python 3.8.2

Modules I am trying to use:
pygame time random sys os pickle

MacOS version:
macOS Catalina
Version 10.15.4

My warn-kled.txt file:
This file lists modules PyInstaller was not able to find. This does not necessarily mean this module is required for running you program. Python and Python 3rd-party packages include a lot of conditional or optional modules. For example the module 'ntpath' only exists on Windows, whereas the module 'posixpath' only exists on Posix systems. Types if import: * top-level: imported at the top-level - look at these first * conditional: imported within an if-statement * delayed: imported from within a function * optional: imported within a try-except-statement IMPORTANT: Do NOT post this list to the issue-tracker. Use it as a basis for yourself tracking down the missing module. Thanks! missing module named pyimod03_importers - imported by /Library/Frameworks/Python.framework/Versions/3.8/lib/python3.8/site-packages/PyInstalleloaderthooks/pyi_rth_pkgres.py (top-level) missing module named StringIO - imported by setuptools._vendor.six (conditional), numpy.testing._private.utils (conditional), numpy.lib.utils (delayed, conditional), numpy.lib.format (delayed, conditional), pkg_resources._vendor.six (conditional), py._io.capture (optional) missing module named 'pkg_resources.extern.pyparsing' - imported by pkg_resources._vendor.packaging.markers (top-level), pkg_resources._vendor.packaging.requirements (top-level) missing module named 'win32com.shell' - imported by pkg_resources._vendor.appdirs (conditional, optional) missing module named 'com.sun' - imported by pkg_resources._vendor.appdirs (delayed, conditional, optional) missing module named com - imported by pkg_resources._vendor.appdirs (delayed) missing module named nt - imported by os (delayed, conditional, optional), ntpath (optional), shutil (conditional), pathlib (conditional), ctypes (delayed, conditional) missing module named win32api - imported by distutils.msvccompiler (optional), pkg_resources._vendor.appdirs (delayed, conditional, optional) missing module named win32com - imported by pkg_resources._vendor.appdirs (delayed) missing module named _winreg - imported by platform (delayed, optional), pygame.sysfont (conditional), numpy.distutils.cpuinfo (delayed, conditional, optional), pkg_resources._vendor.appdirs (delayed, conditional), pygments.formatters.img (optional) missing module named winreg - imported by platform (delayed, optional), mimetypes (optional), urllib.request (delayed, conditional, optional), pygame.sysfont (conditional), distutils.msvccompiler (optional), distutils.msvc9compiler (top-level), distutils._msvccompiler (top-level), numpy.distutils.cpuinfo (delayed, conditional, optional), pkg_resources._vendor.appdirs (delayed, conditional), pygments.formatters.img (optional) missing module named netbios - imported by uuid (delayed) missing module named win32wnet - imported by uuid (delayed) missing module named _winapi - imported by encodings (delayed, conditional, optional), subprocess (optional), test.support (delayed, conditional), multiprocessing.connection (optional), multiprocessing.spawn (delayed, conditional), multiprocessing.reduction (conditional), multiprocessing.shared_memory (conditional), multiprocessing.heap (conditional), multiprocessing.popen_spawn_win32 (top-level), asyncio.windows_events (top-level), asyncio.windows_utils (top-level) missing module named msvcrt - imported by subprocess (optional), getpass (optional), test.support (delayed, conditional, optional), multiprocessing.spawn (delayed, conditional), multiprocessing.popen_spawn_win32 (top-level), asyncio.windows_events (top-level), asyncio.windows_utils (top-level), numpy.distutils.mingw32ccompiler (conditional, optional) missing module named urllib.urlretrieve - imported by urllib (conditional, optional), pygments.lexers._php_builtins (conditional, optional) missing module named urllib.FancyURLopener - imported by urllib (conditional, optional), pygments.lexers._sourcemod_builtins (conditional, optional) missing module named urllib.urlopen - imported by urllib (conditional, optional), pygments.lexers._postgres_builtins (conditional, optional), pygments.lexers._lua_builtins (conditional, optional) missing module named urllib.quote - imported by urllib (delayed), py._path.svnwc (delayed) missing module named _frozen_importlib_external - imported by importlib._bootstrap (delayed), importlib (optional), importlib.abc (optional), zipimport (top-level) excluded module named _frozen_importlib - imported by importlib (optional), importlib.abc (optional), zipimport (top-level) missing module named __builtin__ - imported by numpy.core.numerictypes (conditional), numpy.core.numeric (conditional), numpy.lib.function_base (conditional), numpy.lib._iotools (conditional), numpy.ma.core (conditional), numpy.distutils.misc_util (delayed, conditional), numpy (conditional), pkg_resources._vendor.pyparsing (conditional), setuptools._vendor.pyparsing (conditional), py._builtin (conditional), ptyprocess.ptyprocess (optional) missing module named ordereddict - imported by pkg_resources._vendor.pyparsing (optional), setuptools._vendor.pyparsing (optional) missing module named 'org.python' - imported by copy (optional), setuptools.sandbox (conditional), xml.sax (delayed, conditional) missing module named multiprocessing.TimeoutError - imported by multiprocessing (top-level), multiprocessing.pool (top-level) missing module named multiprocessing.get_context - imported by multiprocessing (top-level), multiprocessing.pool (top-level), multiprocessing.managers (top-level), multiprocessing.sharedctypes (top-level) missing module named multiprocessing.set_start_method - imported by multiprocessing (top-level), multiprocessing.spawn (top-level) missing module named multiprocessing.get_start_method - imported by multiprocessing (top-level), multiprocessing.spawn (top-level) missing module named 'java.lang' - imported by platform (delayed, optional), xml.sax._exceptions (conditional) missing module named multiprocessing.BufferTooShort - imported by multiprocessing (top-level), multiprocessing.connection (top-level) missing module named multiprocessing.AuthenticationError - imported by multiprocessing (top-level), multiprocessing.connection (top-level) missing module named _overlapped - imported by asyncio.windows_events (top-level) missing module named asyncio.DefaultEventLoopPolicy - imported by asyncio (delayed, conditional), asyncio.events (delayed, conditional) missing module named win32evtlog - imported by logging.handlers (delayed, optional) missing module named win32evtlogutil - imported by logging.handlers (delayed, optional) missing module named pkg_resources.extern.packaging - imported by pkg_resources.extern (top-level), pkg_resources (top-level) missing module named pkg_resources.extern.appdirs - imported by pkg_resources.extern (top-level), pkg_resources (top-level) missing module named 'pkg_resources.extern.six.moves' - imported by pkg_resources (top-level), pkg_resources._vendor.packaging.requirements (top-level) missing module named pkg_resources.extern.six - imported by pkg_resources.extern (top-level), pkg_resources (top-level), pkg_resources.py31compat (top-level) missing module named vms_lib - imported by platform (delayed, conditional, optional) missing module named java - imported by platform (delayed) missing module named 'multiprocessing.forking' - imported by /Library/Frameworks/Python.framework/Versions/3.8/lib/python3.8/site-packages/PyInstalleloaderthooks/pyi_rth_multiprocessing.py (optional) missing module named org - imported by pickle (optional) missing module named copy_reg - imported by cStringIO (top-level), numpy.core (conditional), pygame (conditional) missing module named 'pygame._view' - imported by pygame (delayed) missing module named OpenGL - imported by pygame (delayed) missing module named numpy.uint32 - imported by numpy (top-level), pygame._numpysurfarray (top-level) missing module named commands - imported by numpy.distutils.cpuinfo (conditional) missing module named setuptools.extern.packaging - imported by setuptools.extern (top-level), setuptools.dist (top-level), setuptools.command.egg_info (top-level) missing module named 'setuptools.extern.six' - imported by setuptools (top-level), setuptools.extension (top-level) missing module named 'setuptools.extern.packaging.specifiers' - imported by setuptools.config (top-level) missing module named 'setuptools.extern.packaging.version' - imported by setuptools.config (top-level), setuptools.msvc (top-level) missing module named setuptools.extern.six.moves.filterfalse - imported by setuptools.extern.six.moves (top-level), setuptools.dist (top-level), setuptools.msvc (top-level) missing module named setuptools.extern.six.moves.filter - imported by setuptools.extern.six.moves (top-level), setuptools.dist (top-level), setuptools.ssl_support (top-level), setuptools.command.py36compat (top-level) missing module named setuptools.extern.ordered_set - imported by setuptools.extern (top-level), setuptools.dist (top-level), setuptools.command.sdist (top-level) missing module named 'setuptools.extern.packaging.utils' - imported by setuptools.wheel (top-level) missing module named 'setuptools.extern.packaging.tags' - imported by setuptools.wheel (top-level) missing module named wincertstore - imported by setuptools.ssl_support (delayed, optional) missing module named 'backports.ssl_match_hostname' - imported by setuptools.ssl_support (optional) missing module named backports - imported by setuptools.ssl_support (optional) missing module named 'setuptools._vendor.six.moves' - imported by 'setuptools._vendor.six.moves' (top-level) missing module named 'setuptools.extern.pyparsing' - imported by setuptools._vendor.packaging.requirements (top-level), setuptools._vendor.packaging.markers (top-level) missing module named setuptools.extern.six.moves.winreg - imported by setuptools.extern.six.moves (conditional), setuptools.msvc (conditional) missing module named setuptools.extern.six.moves.map - imported by setuptools.extern.six.moves (top-level), setuptools.dist (top-level), setuptools.command.easy_install (top-level), setuptools.sandbox (top-level), setuptools.package_index (top-level), setuptools.ssl_support (top-level), setuptools.command.egg_info (top-level), setuptools.namespaces (top-level) runtime module named setuptools.extern.six.moves - imported by setuptools.dist (top-level), configparser (top-level), setuptools.command.easy_install (top-level), setuptools.sandbox (top-level), setuptools.command.setopt (top-level), setuptools.package_index (top-level), setuptools.ssl_support (top-level), setuptools.py33compat (top-level), setuptools.command.egg_info (top-level), setuptools.command.py36compat (top-level), setuptools.namespaces (top-level), setuptools.msvc (top-level), 'setuptools._vendor.six.moves' (top-level) missing module named setuptools.extern.six - imported by setuptools.extern (top-level), setuptools.monkey (top-level), setuptools.dist (top-level), setuptools.extern.six.moves (top-level), setuptools.config (top-level), setuptools.command.easy_install (top-level), setuptools.sandbox (top-level), setuptools.py27compat (top-level), setuptools.package_index (top-level), setuptools.py33compat (top-level), setuptools.wheel (top-level), setuptools.command.egg_info (top-level), setuptools.command.sdist (top-level), setuptools.command.bdist_egg (top-level), setuptools.unicode_utils (top-level), setuptools.installer (top-level), setuptools.command.develop (top-level) missing module named 'numpy_distutils.cpuinfo' - imported by numpy.f2py.diagnose (delayed, conditional, optional) missing module named 'numpy_distutils.fcompiler' - imported by numpy.f2py.diagnose (delayed, conditional, optional) missing module named 'numpy_distutils.command' - imported by numpy.f2py.diagnose (delayed, conditional, optional) missing module named numpy_distutils - imported by numpy.f2py.diagnose (delayed, optional) missing module named __svn_version__ - imported by numpy.f2py.__version__ (optional) missing module named numarray - imported by numpy.distutils.system_info (delayed, conditional, optional) missing module named Numeric - imported by numpy.distutils.system_info (delayed, conditional, optional) missing module named ConfigParser - imported by numpy.distutils.system_info (conditional), numpy.distutils.npy_pkg_config (conditional) missing module named win32con - imported by distutils.msvccompiler (optional) missing module named _dummy_threading - imported by dummy_threading (optional) missing module named twisted - imported by _pytest.unittest (delayed) missing module named zope - imported by _pytest.unittest (delayed) missing module named py.process - imported by py (top-level), py._path.svnurl (top-level) missing module named py.path - imported by py (top-level), py._path.svnurl (top-level), _pytest.doctest (top-level) missing module named apipkg - imported by py (optional) missing module named UserDict - imported by attr._compat (conditional) missing module named chardet - imported by pygments.lexer (delayed, conditional, optional) missing module named ctags - imported by pygments.formatters.html (optional) missing module named PIL - imported by pygments.formatters.img (optional) missing module named 'py.io' - imported by _pytest._io (top-level) missing module named importlib_metadata - imported by pluggy.manager (conditional), _pytest.compat (conditional) missing module named typing_extensions - imported by _pytest.outcomes (conditional), _pytest._code.code (conditional), _pytest._code.source (conditional), _pytest.config.argparsing (conditional), _pytest.runner (conditional), _pytest.main (conditional), _pytest.capture (conditional) missing module named pathlib2 - imported by _pytest.pathlib (conditional) missing module named colorama - imported by py._io.terminalwriter (conditional, optional), _pytest.capture (delayed, conditional, optional) missing module named atomicwrites - imported by _pytest.assertion.rewrite (conditional) missing module named argcomplete - imported by _pytest._argcomplete (conditional, optional) missing module named 'py.builtin' - imported by py._io.terminalwriter (top-level) missing module named compiler - imported by py._code._assertionold (top-level) missing module named 'nose.plugins' - imported by numpy.testing._private.noseclasses (top-level), numpy.testing._private.nosetester (delayed) missing module named scipy - imported by numpy.testing._private.nosetester (delayed, conditional) missing module named 'nose.util' - imported by numpy.testing._private.noseclasses (top-level) missing module named nose - imported by numpy.testing._private.utils (delayed, optional), numpy.testing._private.decorators (delayed), numpy.testing._private.noseclasses (top-level) missing module named psutil - imported by numpy.testing._private.utils (delayed, optional) missing module named numpy.core.number - imported by numpy.core (delayed), numpy.testing._private.utils (delayed) missing module named numpy.core.object_ - imported by numpy.core (top-level), numpy.linalg.linalg (top-level), numpy.testing._private.utils (delayed) missing module named numpy.core.signbit - imported by numpy.core (delayed), numpy.testing._private.utils (delayed) missing module named win32pdh - imported by numpy.testing._private.utils (delayed, conditional) missing module named numpy.core.float32 - imported by numpy.core (top-level), numpy.testing._private.utils (top-level) missing module named numpy.core.intp - imported by numpy.core (top-level), numpy.testing._private.utils (top-level), numpy.linalg.linalg (top-level) missing module named numpy.lib.i0 - imported by numpy.lib (top-level), numpy.dual (top-level) missing module named dummy_thread - imported by numpy.core.arrayprint (conditional, optional) missing module named thread - imported by numpy.core.arrayprint (conditional, optional) missing module named cpickle - imported by numpy.compat.py3k (conditional) missing module named pickle5 - imported by numpy.compat.py3k (conditional, optional) missing module named numpy.core.integer - imported by numpy.core (top-level), numpy.fft.helper (top-level) missing module named numpy.core.sqrt - imported by numpy.core (top-level), numpy.linalg.linalg (top-level), numpy.fft._pocketfft (top-level) missing module named numpy.core.conjugate - imported by numpy.core (top-level), numpy.fft._pocketfft (top-level) missing module named numpy.core.sign - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.divide - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.geterrobj - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.add - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.complexfloating - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.inexact - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.cdouble - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.csingle - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.double - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named numpy.core.single - imported by numpy.core (top-level), numpy.linalg.linalg (top-level) missing module named future_builtins - imported by numpy.lib.npyio (conditional) missing module named urllib2 - imported by numpy.lib._datasource (delayed, conditional) missing module named urlparse - imported by numpy.lib._datasource (delayed, conditional) missing module named numpy.recarray - imported by numpy (top-level), numpy.ma.mrecords (top-level) missing module named numpy.dtype - imported by numpy (top-level), numpy.ma.mrecords (top-level), numpy.ctypeslib (top-level) missing module named numpy.expand_dims - imported by numpy (top-level), numpy.ma.core (top-level) missing module named numpy.array - imported by numpy (top-level), numpy.ma.core (top-level), numpy.ma.extras (top-level), numpy.ma.mrecords (top-level), numpy.ctypeslib (top-level), pygame._numpysurfarray (top-level) missing module named numpy.bool_ - imported by numpy (top-level), numpy.ma.core (top-level), numpy.ma.mrecords (top-level) missing module named numpy.iscomplexobj - imported by numpy (top-level), numpy.ma.core (top-level) missing module named numpy.amin - imported by numpy (top-level), numpy.ma.core (top-level) missing module named numpy.amax - imported by numpy (top-level), numpy.ma.core (top-level) missing module named numpy.ndarray - imported by numpy (top-level), numpy.ma.core (top-level), numpy.ma.extras (top-level), numpy.ma.mrecords (top-level), numpy.ctypeslib (top-level), pygame._numpysurfarray (top-level) missing module named numpy.histogramdd - imported by numpy (delayed), numpy.lib.twodim_base (delayed) missing module named numpy.eye - imported by numpy (delayed), numpy.core.numeric (delayed) missing module named 'pygame.scrap' - imported by pygame (optional) missing module named 'pygame.movie' - imported by pygame (optional) missing module named 'pygame.overlay' - imported by pygame (optional) missing module named Queue - imported by pygame.threads (conditional) missing module named Py25Queue - imported by pygame.threads (conditional) missing module named 'pygame.cdrom' - imported by pygame (conditional, optional) missing module named cStringIO - imported by pygame.compat (conditional) 
submitted by savoiry1 to u/savoiry1 [link] [comments]

I made addressable teleporters

...and I think my setup is a little bit better then the one I saw on the wiki a bit after spending hours doing it. First, pictures:
https://imgur.com/a/4Cdt1uv
I figured I'd share some of my discoveries, and to some of you I'm sure this is nothing new. But maybe someone will find it interesting.
First, what the heck is going on here?
You walk into the main room, you select which color you want each jump to be. RBG are jump selections, and Y is used as a short circuit to end the jump. After making your choices, you stand on the pad and press the button to go to anywhere in the network.
The first selection is boring normal teleporters, they take you to RGB, and if Yellow is selected you will get teleported to the one next to it which only has the yellow uplink. This ends the teleport and you can go about your business.
From this point on, every other signal is a teleport from where the last jump left you. If you select Red, then Blue. You will jump to red, then to blue, using the yellow switch places you next to the blue teleporter to leave the network. The third switch controls where you woulg go from the third one...and so on.
This setup is, in theory, infinitely scalable. After the first jump, each path acts as a binary tree, as there are only two options available - the first one you used is served as uplink, and re-using it will probably cause weird things to happen so we avoid jumps like red->red. Yellow is reserved for ending a jump so you don't need to go all the way to the bottom of the tree. This gives you 3 + (3 * 21) + (3 * 22) options for 3 layers, or 21 with just 3 layers. Adding a new layer is exponential per tree, a 4th layer would give 3 * 23, or 24 more jumps for a total of 45. And so on.
This is pretty much the same as the one on the wiki, you could also infinitely scale theirs by adding more memory and another layer of their pulse generator. It also looks a lot prettier then mine (I tried my best, okay?)
So, onto the discoveries:
So one of the first roadblocks I ran into was I created a race condition where one of my trees worked perfectly fine, but the other didn't. And I could not figure out why. The answer is that all signals fire at once, and while the results are consistent, they weren't predictable. I'm sure someone can figure out how that works. That person is not me. My solution? Just delay that shit. Gates cause a new signal, and thus a delay. So I make one of these guys:
https://i.imgur.com/QKXHdx5.png
The bottom wire carries the initial signal, and the top goes to the next layer in the control scheme. There are other built in delays by virtue of using gates, it seems you need ~4 layers of delay between the second and third signal. (One delay before switches, one for the switches, two after the switches made it work)
This might be obvious at first, but it caused other issues and mandated I separate the wires out.
https://i.imgur.com/OhAA1l8.png
This is a bit before the delay trick, this only really needs to exist in the final signal where you are just passing through the results, but still need a delay: Using a normal delay gate there would send every signal, instead of just the one you want.
This was a godsend in terms of simplifying the root setup. By using yellow as a short circuit, you can simply place a terminating teleporter connected to each other teleporter and as it is immediately next to it, and thus the closest, you will end there. By having only yellow going into it, this exits the network.
Some things I would probably improve now that I've seen some stuff on the guide on the wiki:
That said, I still prefer some things about mine over theirs. Namely, you select all of your options, stand on your teleporter and then it's instant. By using logic gates as a delay, instead of utilizing a bunny-powered engine it requires no waiting on the part of the player. It also means it will continue to function during blood moons, and people with summons that go through walls won't murder it.
Hopefully some people find it interesting, it was a fun project to work on and I will definitely be using this to create a teleporter system when we blow up the current world and make a new one on expert or master.
submitted by Ryuujinx to Terraria [link] [comments]

Part 2: Tools & Info for Sysadmins - Mega List of Tips, Tools, Books, Blogs & More

(continued from part 1)
Unlocker is a tool to help delete those irritating locked files that give you an error message like "cannot delete file" or "access is denied." It helps with killing processes, unloading DLLs, deleting index.dat files, as well as unlocking, deleting, renaming, and moving locked files—typically without requiring a reboot.
IIS Crypto's newest version adds advanced settings; registry backup; new, simpler templates; support for Windows Server 2019 and more. This tool lets you enable or disable protocols, ciphers, hashes and key exchange algorithms on Windows and reorder SSL/TLS cipher suites from IIS, change advanced settings, implement best practices with a single click, create custom templates and test your website. Available in both command line and GUI versions.
RocketDock is an application launcher with a clean interface that lets you drag/drop shortcuts for easy access and minimize windows to the dock. Features running application indicators, multi-monitor support, alpha-blended PNG and ICO icons, auto-hide and popup on mouse over, positioning and layering options. Fully customizable, portable, and compatible with MobyDock, ObjectDock, RK Launcher and Y'z Dock skins. Works even on slower computers and is Unicode compliant. Suggested by lieutenantcigarette: "If you like the dock on MacOS but prefer to use Windows, RocketDock has you covered. A superb and highly customisable dock that you can add your favourites to for easy and elegant access."
Baby FTP Server offers only the basics, but with the power to serve as a foundation for a more-complex server. Features include multi-threading, a real-time server log, support for PASV and non-PASV mode, ability to set permissions for download/upload/rename/delete/create directory. Only allows anonymous connections. Our thanks to FatherPrax for suggesting this one.
Strace is a Linux diagnostic, debugging and instructional userspace tool with a traditional command-line interface. Uses the ptrace kernel feature to monitor and tamper with interactions between processes and the kernel, including system calls, signal deliveries and changes of process state.
exa is a small, fast replacement for ls with more features and better defaults. It uses colors to distinguish file types and metadata, and it recognizes symlinks, extended attributes and Git. All in one single binary. phils_lab describes it as "'ls' on steroids, written in Rust."
rsync is a faster file transfer program for Unix to bring remote files into sync. It sends just the differences in the files across the link, without requiring both sets of files to be present at one of the ends. Suggested by zorinlynx, who adds that "rsync is GODLY for moving data around efficiently. And if an rsync is interrupted, just run it again."
Matter Wiki is a simple WYSIWYG wiki that can help teams store and collaborate. Every article gets filed under a topic, transparently, so you can tell who made what changes to which document and when. Thanks to bciar-iwdc for the recommendation.
LockHunter is a file unlocking tool that enables you to delete files that are being blocked for unknown reasons. Can be useful for fighting malware and other programs that are causing trouble. Deletes files into the recycle bin so you can restore them if necessary. Chucky2401 finds it preferable to Unlocker, "since I am on Windows 7. There are no new updates since July 2017, but the last beta was in June of this year."
aria2 is a lightweight multi-source command-line download utility that supports HTTP/HTTPS, FTP, SFTP, BitTorrent and Metalink. It can be manipulated via built-in JSON-RPC and XML-RPC interfaces. Recommended by jftuga, who appreciates it as a "cross-platform command line downloader (similar to wget or curl), but with the -x option can run a segmented download of a single file to increase throughput."
Free Services
Temp-Mail allows you to receive email at a temporary address that self-destructs after a certain period of time. Outwit all the forums, Wi-Fi owners, websites and blogs that insist you register to use them. Petti-The-Yeti says, "I don't give any company my direct email anymore. If I want to trial something but they ask for an email signup, I just grab a temporary email from here, sign up with it, and wait for the trial link or license info to come through. Then, you just download the file and close the website."
Duck DNS will point a DNS (sub domains of duckdns.org) to an IP of your choice. DDNS is a handy way for you to refer to a serverouter with an easily rememberable name for situations when the server's ip address will likely change. Suggested by xgnarf, who finds it "so much better for the free tier of noip—no 30-day nag to keep your host up."
Joe Sandbox detects and analyzes potential malicious files and URLs on Windows, Android, Mac OS, Linux and iOS for suspicious activities. It performs deep malware analysis and generates comprehensive and detailed reports. The Community Edition of Joe Sandbox Cloud allows you to run a maximum of 6 analyses per month, 3 per day on Windows, Linux and Android with limited analysis output. This one is from dangibbons94, who wanted to "share this cool service ... for malware analysis. I usually use Virus total for URL scanning, but this goes a lot more in depth. I just used basic analysis, which is free and enough for my needs."
Hybrid Analysis is a malware analysis service that detects and analyzes unknown threats for the community. This one was suggested by compupheonix, who adds that it "gets you super detailed reports... it's about the most fleshed out and detailed one I can find."
JustBeamIt is a file-transfer service that allows you to send files of any size via a peer-to-peer streaming model. Simply drag and drop your file and specify the recipient's email address. They will then receive a link that will trigger the download directly from your computer, so the file does not have to be uploaded to the service itself. The link is good for one download and expires after 10 minutes. Thanks to cooljacob204sfw for the recommendation!
ShieldsUP is a quick but powerful internet security checkup and information service. It was created by security researcher Steve Gibson to scan ports and let you know which ones have been opened through your firewalls or NAT routers.
Firefox Send is an encrypted file transfer service that allows you to share files up to 2.5GB from any browser or an Android app. Uses end-to-end encryption to keep data secure and offers security controls you can set. You can determine when your file link expires, the number of downloads, and whether to add a password. Your recipient receives a link to download the file, and they don’t need a Firefox account. This one comes from DePingus, who appreciates the focus on privacy. "They have E2E, expiring links, and a clear privacy policy."
Free DNS is a service where programmers share domain names with one another at no cost. Offers free hosting as well as dynamic DNS, static DNS, subdomain and domain hosting. They can host your domain's DNS as well as allowing you to register hostnames from domains they're hosting already. If you don't have a domain, you can sign up for a free account and create up to 5 subdomains off the domains others have contributed and point these hosts anywhere on the Internet. Thanks to 0x000000000000004C (yes, that's a username) for the suggestion!
ANY.RUN is an interactive malware analysis service for dynamic and static research of the majority of threats in any environment. It can provide a convenient in-depth analysis of new, unidentified malicious objects and help with the investigation of incidents. ImAshtonTurner appreciates it as "a great sandbox tool for viewing malware, etc."
Plik is a scalable, temporary file upload system similar to wetransfer that is written in golang. Thanks go to I_eat_Narwhals for this one!
Free My IP offers free, dynamic DNS. This service comes with no login, no ads, no newsletters, no links to click and no hassle. Kindly suggested by Jack of All Trades.
Mailinator provides free, temporary email inboxes on a receive-only, attachment-free system that requires no sign-up. All @mailinator.com addresses are public, readable and discoverable by anyone at any time—but are automatically deleted after a few hours. Can be a nice option for times when you to give out an address that won't be accessible longterm. Recommended by nachomountain, who's been using it "for years."
Magic Wormhole is a service for sending files directly with no intermediate upload, no web interface and no login. When both parties are online you with the minimal software installed, the wormhole is invoked via command line identifying the file you want to send. The server then provides a speakable, one-time-use password that you give the recipient. When they enter that password in their wormhole console, key exchange occurs and the download begins directly between your computers. rjohnson99 explains, "Magic Wormhole is sort of like JustBeamIt but is open-source and is built on Python. I use it a lot on Linux servers."
EveryCloud's Free Phish is our own, new Phishing Simulator. Once you've filled in the form and logged in, you can choose from lots of email templates (many of which we've coped from what we see in our Email Security business) and landing pages. Run a one-off free phish, then see who clicked or submitted data so you can understand where your organization is vulnerable and act accordingly.
Hardening Guides
CIS Hardening Guides contain the system security benchmarks developed by a global community of cybersecurity experts. Over 140 configuration guidelines are provided to help safeguard systems against threats. Recommended by cyanghost109 "to get a start on looking at hardening your own systems."
Podcasts
Daily Tech News is Tom Merrit's show covering the latest tech issues with some of the top experts in the field. With the focus on daily tech news and analysis, it's a great way to stay current. Thanks to EmoPolarbear for drawing it to our attention.
This Week in Enterprise Tech is a podcast that features IT experts explaining the complicated details of cutting-edge enterprise technology. Join host Lou Maresca on this informative exploration of enterprise solutions, with new episodes recorded every Friday afternoon.
Security Weekly is a podcast where a "bunch of security nerds" get together and talk shop. Topics are greatly varied, and the atmosphere is relaxed and conversational. The show typically tops out at 2 hours, which is perfect for those with a long commute. If you’re fascinated by discussion of deep technical and security-related topics, this may be a nice addition to your podcast repertoire.
Grumpy Old Geeks—What Went Wrong on the Internet and Who's To Blame is a podcast about the internet, technology and geek culture—among other things. The hosts bring their grumpy brand of humor to the "state of the world as they see it" in these roughly hour-long weekly episodes. Recommended by mkaxsnyder, who enjoys it because, "They are a good team that talk about recent and relevant topics from an IT perspective."
The Social-Engineer Podcast is a monthly discussion among the hosts—a group of security experts from SEORG—and a diverse assortment of guests. Topics focus around human behavior and how it affects information security, with new episodes released on the second Monday of every month. Thanks to MrAshRhodes for the suggestion.
The CyberWire podcasts discuss what's happening in cyberspace, providing news and commentary from industry experts. This cyber security-focused news service delivers concise, accessible, and relevant content without the gossip, sensationalism, and the marketing buzz that often distract from the stories that really matter. Appreciation to supermicromainboard for the suggestion.
Malicious Life is a podcast that tells the fascinating—and often unknown—stories of the wildest hacks you can ever imagine. Host Ran Levi, a cybersecurity expert and author, talks with the people who were actually involved to reveal the history of each event in depth. Our appreciation goes to peraphon for the recommendation.
The Broadcast Storm is a podcast for Cisco networking professionals. BluePieceOfPaper suggests it "for people studying for their CCNA/NP. Kevin Wallace is a CCIE Collaboration so he knows his *ishk. Good format for learning too. Most podcasts are about 8-15 mins long and its 'usually' an exam topic. It will be something like "HSPR" but instead of just explaining it super boring like Ben Stein reading a powerpoint, he usually goes into a story about how (insert time in his career) HSPR would have been super useful..."
Software Engineering Radio is a podcast for developers who are looking for an educational resource with original content that isn't recycled from other venues. Consists of conversations on relevant topics with experts from the software engineering world, with new episodes released three to four times per month. a9JDvXLWHumjaC tells us this is "a solid podcast for devs."
Books
System Center 2012 Configuration Manager is a comprehensive technical guide designed to help you optimize Microsoft's Configuration Manager 2012 according to your requirements and then to deploy and use it successfully. This methodical, step-by-step reference covers: the intentions behind the product and its role in the broader System Center product suite; planning, design, and implementation; and details on each of the most-important feature sets. Learn how to leverage the user-centric capabilities to provide anytime/anywhere services & software, while strengthening control and improving compliance.
Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam is a practical guide to network infrastructure. Provides an in-depth view of routers and routing, switching (with Cisco Catalyst and Nexus switches as examples), SOHO VoIP and SOHO wireless access point design and configuration, introduction to IPv6 with configuration examples, telecom technologies in the data-networking world (including T1, DS3, frame relay, and MPLS), security, firewall theory and configuration, ACL and authentication, Quality of Service (QoS), with an emphasis on low-latency queuing (LLQ), IP address allocation, Network Time Protocol (NTP) and device failures.
Beginning the Linux Command Line is your ally in mastering Linux from the keyboard. It is intended for system administrators, software developers, and enthusiastic users who want a guide that will be useful for most distributions—i.e., all items have been checked against Ubuntu, Red Hat and SUSE. Addresses administering users and security and deploying firewalls. Updated to the latest versions of Linux to cover files and directories, including the Btrfs file system and its management and systemd boot procedure and firewall management with firewalld.
Modern Operating Systems, 4th Ed. is written for students taking intro courses on Operating Systems and for those who want an OS reference guide for work. The author, an OS researcher, includes both the latest materials on relevant operating systems as well as current research. The previous edition of Modern Operating Systems received the 2010 McGuffey Longevity Award that recognizes textbooks for excellence over time.
Time Management for System Administrators is a guide for organizing your approach to this challenging role in a way that improves your results. Bestselling author Thomas Limoncelli offers a collection of tips and techniques for navigating the competing goals and concurrent responsibilities that go along with working on large projects while also taking care of individual user's needs. The book focuses on strategies to help with daily tasks that will also allow you to handle the critical situations that inevitably require your attention. You'll learn how to manage interruptions, eliminate time wasters, keep an effective calendar, develop routines and prioritize, stay focused on the task at hand and document/automate to speed processes.
The Practice of System and Network Administration, 3rd Edition introduces beginners to advanced frameworks while serving as a guide to best practices in system administration that is helpful for even the most advanced experts. Organized into four major sections that build from the foundational elements of system administration through improved techniques for upgrades and change management to exploring assorted management topics. Covers the basics and then moves onto the advanced things that can be built on top of those basics to wield real power and execute difficult projects.
Learn Windows PowerShell in a Month of Lunches, Third Edition is designed to teach you PowerShell in a month's worth of 1-hour lessons. This updated edition covers PowerShell features that run on Windows 7, Windows Server 2008 R2 and later, PowerShell v3 and later, and it includes v5 features like PowerShellGet. For PowerShell v3 and up, Windows 7 and Windows Server 2008 R2 and later.
Troubleshooting with the Windows Sysinternals Tools is a guide to the powerful Sysinternals tools for diagnosing and troubleshooting issues. Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis provide a deep understanding of Windows core concepts that aren’t well-documented elsewhere along with details on how to use Sysinternals tools to optimize any Windows system’s reliability, efficiency, performance and security. Includes an explanation of Sysinternals capabilities, details on each major tool, and examples of how the tools can be used to solve real-world cases involving error messages, hangs, sluggishness, malware infections and more.
DNS and BIND, 5th Ed. explains how to work with the Internet's distributed host information database—which is responsible for translating names into addresses, routing mail to its proper destination, and listing phone numbers according to the ENUM standard. Covers BIND 9.3.2 & 8.4.7, the what/how/why of DNS, name servers, MX records, subdividing domains (parenting), DNSSEC, TSIG, troubleshooting and more. PEPCK tells us this is "generally considered the DNS reference book (aside from the RFCs of course!)"
Windows PowerShell in Action, 3rd Ed. is a comprehensive guide to PowerShell. Written by language designer Bruce Payette and MVP Richard Siddaway, this volume gives a great introduction to Powershell, including everyday use cases and detailed examples for more-advanced topics like performance and module architecture. Covers workflows and classes, writing modules and scripts, desired state configuration and programming APIs/pipelines.This edition has been updated for PowerShell v6.
Zero Trust Networks: Building Secure Systems in Untrusted Networks explains the principles behind zero trust architecture, along with what's needed to implement it. Covers the evolution of perimeter-based defenses and how they evolved into the current broken model, case studies of zero trust in production networks on both the client and server side, example configurations for open-source tools that are useful for building a zero trust network and how to migrate from a perimeter-based network to a zero trust network in production. Kindly recommended by jaginfosec.
Tips
Here are a couple handy Windows shortcuts:
Here's a shortcut for a 4-pane explorer in Windows without installing 3rd-party software:
(Keep the win key down for the arrows, and no pauses.) Appreciation goes to ZAFJB for this one.
Our recent tip for a shortcut to get a 4-pane explorer in Windows, triggered this suggestion from SevaraB: "You can do that for an even larger grid of Windows by right-clicking the clock in the taskbar, and clicking 'Show windows side by side' to arrange them neatly. Did this for 4 rows of 6 windows when I had to have a quick 'n' dirty "video wall" of windows monitoring servers at our branches." ZAFJB adds that it actually works when you right-click "anywhere on the taskbar, except application icons or start button."
This tip comes courtesy of shipsass: "When I need to use Windows Explorer but I don't want to take my hands off the keyboard, I press Windows-E to launch Explorer and then Ctrl-L to jump to the address line and type my path. The Ctrl-L trick also works with any web browser, and it's an efficient way of talking less-technical people through instructions when 'browse to [location]' stumps them."
Clear browser history/cookies by pressing CTRL-SHIFT-DELETE on most major browsers. Thanks go to synapticpanda, who adds that this "saves me so much time when troubleshooting web apps where I am playing with the cache and such."
To rename a file with F2, while still editing the name of that file: Hit TAB to tab into the renaming of the next file. Thanks to abeeftaco for this one!
Alt-D is a reliable alternative to Ctrl-L for jumping to the address line in a browser. Thanks for this one go to fencepost_ajm, who explains: "Ctrl-L comes from the browser side as a shortcut for Location, Alt-D from the Windows Explorer side for Directory."
Browser shortcut: When typing a URL that ends with dot com, Ctrl + Enter will place the ".com" and take you to the page. Thanks to wpierre for this one!
This tip comes from anynonus, as something that daily that saves a few clicks: "Running a program with ctrl + shift + enter from start menu will start it as administrator (alt + y will select YES to run as admin) ... my user account is local admin [so] I don't feel like that is unsafe"
Building on our PowerShell resources, we received the following suggestion from halbaradkenafin: aka.ms/pskoans is "a way to learn PowerShell using PowerShell (and Pester). It's really cool and a bunch of folks have high praise for it (including a few teams within MSFT)."
Keyboard shortcut: If you already have an application open, hold ctrl + shift and middle click on the application in your task bar to open another instance as admin. Thanks go to Polymira for this one.
Remote Server Tip: "Critical advice. When testing out network configuration changes, prior to restarting the networking service or rebooting, always create a cron job that will restore your original network configuration and then reboot/restart networking on the machine after 5 minutes. If your config worked, you have enough time to remove it. If it didn't, it will fix itself. This is a beautifully simple solution that I learned from my old mentor at my very first job. I've held on to it for a long time." Thanks go to FrigidNox for the tip!
Websites
Deployment Research is the website of Johan Arwidmark, MS MVP in System Center Cloud and Datacenter Management. It is dedicated to sharing information and guidance around System Center, OS deployment, migration and more. The author shares tips and tricks to help improve the quality of IT Pros’ daily work.
Next of Windows is a website on (mostly) Microsoft-related technology. It's the place where Kent Chen—a computer veteran with many years of field experience—and Jonathan Hu—a web/mobile app developer and self-described "cool geek"—share what they know, what they learn and what they find in the hope of helping others learn and benefit.
High Scalability brings together all the relevant information about building scalable websites in one place. Because building a website with confidence requires a body of knowledge that can be slow to develop, the site focuses on moving visitors along the learning curve at a faster pace.
Information Technology Research Library is a great resource for IT-related research, white papers, reports, case studies, magazines, and eBooks. This library is provided at no charge by TradePub.com. GullibleDetective tells us it offers "free PDF files from a WIIIIIIDE variety of topics, not even just IT. Only caveat: as its a vendor-supported publishing company, you will have to give them a bit of information such as name, email address and possibly a company name. You undoubtedly have the ability to create fake information on this, mind you. The articles range from Excel templates, learning python, powershell, nosql etc. to converged architecture."
SS64 is a web-based reference guide for syntax and examples of the most-common database and OS computing commands. Recommended by Petti-The-Yeti, who adds, "I use this site all the time to look up commands and find examples while I'm building CMD and PS1 scripts."
Phishing and Malware Reporting. This website helps you put a stop to scams by getting fraudulent pages blocked. Easily report phishing webpages so they can be added to blacklists in as little as 15 minutes of your report. "Player024 tells us, "I highly recommend anyone in the industry to bookmark this page...With an average of about 10 minutes of work, I'm usually able to take down the phishing pages we receive thanks to the links posted on that website."
A Slack Channel
Windows Admin Slack is a great drive-by resource for the Windows sysadmin. This team has 33 public channels in total that cover different areas of helpful content on Windows administration.
Blogs
KC's Blog is the place where Microsoft MVP and web developer Kent Chen shares his IT insights and discoveries. The rather large library of posts offer helpful hints, how-tos, resources and news of interest to those in the Windows world.
The Windows Server Daily is the ever-current blog of technologist Katherine Moss, VP of open source & community engagement for StormlightTech. Offers brief daily posts on topics related to Windows server, Windows 10 and Administration.
An Infosec Slideshow
This security training slideshow was created for use during a quarterly infosec class. The content is offered generously by shalafi71, who adds, "Take this as a skeleton and flesh it out on your own. Take an hour or two and research the things I talk about. Tailor this to your own environment and users. Make it relevant to your people. Include corporate stories, include your audience, exclude yourself. This ain't about how smart you are at infosec, and I can't stress this enough, talk about how people can defend themselves. Give them things to look for and action they can take. No one gives a shit about your firewall rules."
Tech Tutorials
Tutorialspoint Library. This large collection of tech tutorials is a great resource for online learning. You'll find nearly 150 high-quality tutorials covering a wide array of languages and topics—from fundamentals to cutting-edge technologies. For example, this Powershell tutorial is designed for those with practical experience handling Windows-based Servers who want to learn how to install and use Windows Server 2012.
The Python Tutorial is a nice introduction to many of Python’s best features, enabling you to read and write Python modules and programs. It offers an understanding of the language's style and prepares you to learn more about the various Python library modules described in 'The Python Standard Library.' Kindly suggested by sharjeelsayed.
SysAdmin Humor
Day in the Life of a SysAdmin Episode 5: Lunch Break is an amusing look at a SysAdmin's attempt to take a brief lunch break. We imagine many of you can relate!
Have a fantastic week and as usual, let me know any comments or suggestions.
u/crispyducks
submitted by crispyducks to sysadmin [link] [comments]

The Binary Signals Binary Strategies - YouTube Price Action Binary Options Signals That Work - YouTube Iq option strategy 2019 Best signal indicator 95% win in ... Binary Options Experts - YouTube NEW 100% WIN BINARY OPTION FREE TRADING SIGNALS - YouTube Binary Options Signals Indicator 100% Free Download! - YouTube

Binary Options Strategies. Here are collected the most accurate and profitable binary options strategies. As always, all systems for binary options trading on this website can be downloaded for free. I hope each of you will find a strategy for yourself here. My Binary Options Signals is a one-stop name for those who are going to start their Binary Options trading. We are working for both newbie and trained professionals. We are a reliable source for the best Binary Option and Forex Community. Our Team of experts is working dedicatedly to guide you for the best Binary Options strategy and to follow the global and local trends in predictions. Your ... That said there are many different types of forex signals systems. While almost all of these services are free, some are better than others. Ideally, you’ll want to use signals that include Stop Loss and Take Profit configurations. If you are just starting out in the forex trading industry, you might want to hone your skills first with a demo account before buying signals. At FX Leaders we ... Binary Options signals are a major requirement for traders to take trading decisions. The signal industry is large and booming one. There are countless signal providers out there, so it becomes really difficult as a trader to make a choice. Binary Signals & Software. Big List of Binary Signal Services and Auto Trading Software. Here you can find a comprehensive list of all the signal services and trading bots out there for binary options trading. Be cautioned, this list includes the good with the bad (for now). Over time we will be checking out these services in-depth and making recommendations for the best ones. In the meantime ... Binary Options Pro Signals delivers binary option trading signals by email or SMS. It offers signals during either the New York or European trading session for 14 highly-liquid and tradable assets ... Binary options trading signals are alerts that are used for trading binary options contracts, which were obtained after carefully analyzing the underlying asset to be traded.. Binary options are not very old and a much sought after method in the modern trading world.Binary options have reached millions of traders worldwide and are said to be a highly effective trading unit.

[index] [23476] [23625] [22492] [5251] [14096] [21795] [21396] [19752] [23311] [19621]

The Binary Signals

Hello everyone!:) My name is Anastasia, but it's too hard to pronounce, that's why you may call me just ANA. I'm a pro trader for more than 2 years already a... Binary Options Experts; Videos; Playlists; Channels; Discussion ; About; Home Trending History Get YouTube Premium Get YouTube TV Best of YouTube Music Sports Gaming Movies TV Shows News Live ... FBS site link - https://fbs.com/?ppu=9447999 https://t.me/forexlifeRv Join my forex trading signal Telegram channel - Help Me To Rich 20000 Subscriber. #mark... Sigup bonus 10% : https://bit.ly/2XQiGHdJoin Affiliate Bonus 45%: https://bit.ly/35Rm75fDownload : inbox💎 Giao dịch: - 24/7 kể cả ngày lễ - Vào lệnh... Do not miss! DEMO ACCOUNT: https://bit.ly/2Lq3NUt You can use this strategy in binary options to win every time but you have to keep following things in mind... One minute strategy to trade price action trading signals. Watch how I use simple trading rules to increase win rate. Get 10x Trading System: https://trading... #Binary #Signals #Options #BinaryTrading #BinaryOptions #BinaryOptionTrading # ... binary options brokers, binary options strategy, the best binary options systems, best binary options, binary opt The Binary Signals.com is a binary options signals service based on manual trading strategies and cutting-edge technology developed by Binary Options experts... Binary Options Signals Indicator Free Download: https://www.altredo.com/altredo-free-download.aspx The BO Indicator is an Meta Trader 4 signal indicator that...

http://arab-binary-option.ondauriacommoide.ml