act

More fun with IFS Fractals

I have been playing with some iterated function systems again. These images were built using two affine transformations, one being a rotation through 20 degree composed a scaling of 90% and the second is a general affine transformation chosen at random. Some of the best of these results I have attached here. I have added...




act

Estimating The Fractal Dimension of the Spiders of Mars

Above is an image of “dry ice spiders” on Mars. Every spring the Sun warms up the Martian south polar icecap and causes jets of carbon-dioxide gas to erupt through the icecap. These jets carrying dark sand into the air and spraying it for hundreds of feet around each jet forming these wonderful spider-like structures....




act

The Practice of Letting Go

By Leo Babauta Most of our stresses and frustrations come from our unwillingness to let go. Hear me out: think about something you’re stressing about, or someone you’re frustrated about. What thought do you have about that person or situation that causes the frustration? It’s often an invisible thought, that we don’t realize we have, […]

The post The Practice of Letting Go appeared first on zen habits.



  • Mindfulness & Mastery
  • Resiliency & Change

act

The Practice of Examining Our Beliefs

By Leo Babauta There’s a practice that I find to be really valuable, and I call it “Examining Beliefs.” If you regularly engage with this, it will transform you. Let’s say there’s something you want to do but you feel stuck — maybe you’re procrastinating a lot, maybe you’re stuck in an old habit. The […]

The post The Practice of Examining Our Beliefs appeared first on zen habits.



  • Mindfulness & Mastery

act

5 Stoic & Zen Practices That I Believe In

By Leo Babauta I believe in finding powerful practices for transformation wherever we can find them. And the Stoic philosophers Epictetus, Marcus Aurelius, Seneca are huge inspirations for me. I’ve found there to be a huge overlap between Stoicism and Zen Buddhism, even if there are also some key differences. The overlap between Zen & […]

The post 5 Stoic & Zen Practices That I Believe In appeared first on zen habits.



  • Mindfulness & Mastery

act

16.2: Can We Just Buy Out J.K. Rowling? (Reaction Pod)

The internet went crazy today when a rumor seemed to break through about the always-destined Harry Potter television show — specifically that while no series is actually in the works, WB is now officially shopping for writers and pitches for an HBO Max event. We did a quick-and-dirty reaction pod with our three hosts and our good friend Proma Khosla, a longtime LeakyCon staffer and Mashable entertainment reporter, to break down the news, what it means for the franchise, and what the fandom does now. 

Basically, we decided the fandom just needs to get a trillion dollars together and buy the franchise from JKR. 

You can follow Proma on Twitter at @promawhatup  and read her Mashable articles here!

~*~

Don't forget to follow us on @pottercast on Twitter and @pottercastpod on Instagram!

Join our patreon! patreon.com/pottercast - Now, you can also join our Discord community there!

You can also buy PotterCast-related merch at mischiefmerch.com!






act

A Practical Guide to Understanding Anxiety and Managing It Effectively

Anxiety is something most of us are familiar with in one way or another. It can feel like a storm inside your mind, making even simple things feel overwhelming. Anxiety disorders are more common than ever, and while they can feel insurmountable, the right understanding and tools can make all the difference. In this article, ... Read more

The post A Practical Guide to Understanding Anxiety and Managing It Effectively appeared first on LifeHack.




act

Empathy in Action: Techniques to Strengthen Relationships and Well-being

Empathy is one of those quiet superpowers that can reshape our lives for the better. It isn’t flashy, but it has an impact everywhere—from our closest relationships to the way we interact at work, and even how we perceive our broader society. For example, consider a parent who takes the time to understand their child’s ... Read more

The post Empathy in Action: Techniques to Strengthen Relationships and Well-being appeared first on LifeHack.






act

Old age doesn’t come alone a case study on the impact of the ageing population on a Scottish local authority’s care at home service.

This research was undertaken by Stuart Fordyce as part of an MSc in Integrated Service Improvement (Health and Social Care) at the University of Edinburgh. It considers the impact of a rapidly ageing population on a Scottish local authority and its attempt to shift the focus to a more contemporary service provision. The aim is to explore what factors are inhibiting the effectiveness of enablement. Using a case study approach the research explored whether: (i) enablement is wholly effective in addressing the increase in current service demands; (ii) the approach adopted by the local authority is undermined as services are now over extended and are attempting to address competing objectives, and; (iii) the paradigmatic change across the sector in the future will materialise if organisations cannot create the capacity and infrastructure to enable change to occur




act

Leading change in supervison: messages from practice

This report describes the rationale, process and learning from a project led by IRISS which explored the topic of supervision with a group of six partners from across the social services sector. The purpose of this report is to share the learning gathered through the project to provide some evidence, inspiration, and pointers for those interested in improving supervision. Key points from the report can be used to prompt reflection and discussion with teams, to review current supervision practice and to help plan improvements.




act

Harnessing knowledge for innovative and cost-effective practice: the role of the intermediary

Explores how the Institute for Research and Innovation in Social Services (IRISS) promotes the delivery of cost effective social services in Scotland that will support the achievement of positive outcomes for people accessing support. It identifies a number of principles that underpin the work of IRISS and suggests how these facilitate innovative evidence-informed practice. The approach to evidence-informed practice comprises four pillars of activity. The first pillar focuses on improving awareness and access to evidence and is exemplified by the Learning Exchange, the IRISS Insights series, and audio and video recording. The second pillar refers to strengthening the evidence base and is discussed in the context of work on self-directed support. Improving skills and confidence to use evidence forms the third pillar and is represented by work on data visualisation and peer support for self-evaluation. The final pillar is embedding evidence in organisations, through co-production, creating spaces to test and challenge evidence, and through the development of evidence-based products. Supporting people to share knowledge, learn from each other and to collectively produce new knowledge and solutions is an innovative approach but also one which should be cost-effective. Pre-print. Published in Evidence and Policy, 2014 (10)4 as Embedding research into practice through innovation and creativity: a case study from social services




act

Impact of antiretroviral therapy on liver disease progression and mortality in patients co-infected with HIV and hepatitis C: systematic review and meta-analysis

Systematic review produced by the EPPI-Centre in 2015.This systematic review aimed to evaluate the effect of HAART and ARV monotherapy on liver disease progression and liver-related mortality in individuals co-infected with HIV and hepatitis C, including in patients with haemophilia.




act

Self-neglect policy and practice: building an evidence base for adult social care

Report 69 published by the Social Care Institute for Excellence (SCIE) in November 2014. This research, commissioned by the Department of Health (DH), set out to identify what could be learned about current policy and practice in self-neglect, experienced as a highly challenging aspect of contemporary adult social care.




act

Mental Capacity Act (MCA) resource

This report shows commissioners and providers of care how to embed the principles of the Mental Capacity Act (MCA) into care and support planning across the board.




act

Leading the Care Act

Social Care Institute for Excellence (SCIE) Report 72 from SCIE Roundtable held on 5 March 2015. This roundtable session explored the kind of leadership required to make the Care Act a success.




act

Technology changing lives: how technology can support the goals of the Care Act

Social Care Institute for Excellence (SCIE) Report 73 from SCIE roundtable discussion held on 26 March 2015. This report considers the potential of technology to transform how health and social care services are delivered.




act

Sharing practice to improve outcomes for care leavers. Evaluation report on an inter-authority learning exchange

Evaluation report for the inter-authority learning exchange between Shetland Islands, Falkirk and Glasgow Councils throughcare and aftercare teams. In February 2014 a member of the Throughcare and Aftercare team from Shetland, spent two weeks in each host authority as a means of developing and sharing practice, experience and learning. The report describes the planning process, in-situ experience, and post-exchange learning of participants, it also report highlights the positive learning outcomes and benefits achieved for all participating local authorities. The report identifies ideas for future applications of such a learning and practice exchange model to improve practice for looked after young people and care leavers.




act

Actually, The Democratic Party is Hitler

"The Blue Team is protected by the sheer audacity of their betrayal of Americans. For most, their approach is literally beyond belief." — Bret Weinstein




act

Who Is Actually the Weirdest Character on ‘It’s Always Sunny in Philadelphia’?

By Carly Tennes Published: November 10th, 2024




act

5 Everyday Workers Who Turned Into Action Heroes at Their Jobs

By Ryan Menezes Published: November 11th, 2024




act

5 Real-Life Hermits Who Had It Exactly Right

By Eli Yudin Published: November 12th, 2024




act

Hasbro flashes back to the 90s with The Last Command action figure set

Hasbro has produced a 4-figure set for a 21-year old Timothy Zahn Star Wars books and it DOESN'T feature Thrawn?





act

Tesseract home has views of the mountain and city

The spirit of sustainability and being eco-friendly is all about using what's already there. Use a piece of land the way it is, without hanging it to suit the needs of a building. In the spirit of reclaiming wood, repurposing furniture and making use of everything the Tesseract was created. This home is a beautiful reboot of a former bachelor pad turned beautiful multi-person home. It's warm, inviting and modern.[...]




act

These countries are facing the biggest health impacts

Medical Aid, a South African insurance comparison website, investigated the effects of environmental issues like poor water quality, pollution, sanitation and chemical exposure on the health of citizens in 103 countries around the world. The information is summarized in a report titled, "Climate Health: Where in the World is Climate Change Impacting Health the Most?"[...]




act

What are 3D-printed meats and are they actually sustainable?

3D-printed foods are a growing component of the additive manufacturing industry. Within this realm, 3D-printed meat is gaining speed. Like other 3D-printed objects, edible material is extruded in layers to produce a variety of meat products, including ground meat, burger patties, sausages and kebabs. Nowadays, with advances in additive manufacturing, the ability to 3D print foods is becoming more widely accessible, cost-effective and eco-friendly. [...]




act

Did you know these surprising solar panel facts?

Solar panels are by far the best applicable technology for converting solar energy to usable electricity today. With the sun available to us around the year, it is only reasonable to consider taping its energy for domestic use. Even so, the currently available photovoltaic solar cell technology is still not as efficient as desired. The cells used in most solar panels have an efficiency of about 15% to 20%. This means that only about 20% of the sun rays that reach the panel are converted to electricity.[...]




act

A Connecticut home with a green roof and minimal site impact

Meeting the challenge to gently place a home into a valley below the access road and adjacent to a scenic river, Weston Residence is both a primary residence and an award-winning example of minimal site impact architectural design. [...]





act

Stop LUCR-3 Attacks: Learn Key Identity Security Tactics in This Expert Webinar

Did you know that advanced threat actors can infiltrate the identity systems of major organizations and extract sensitive data within days? It’s a chilling reality, becoming more common and concerning by the day. These attackers exploit vulnerabilities in SaaS and cloud environments, using compromised identities to move laterally within networks, causing widespread damage. Cybersecurity and IT




act

Cyber Threats That Could Impact the Retail Industry This Holiday Season (and What to Do About It)

As the holiday season approaches, retail businesses are gearing up for their annual surge in online (and in-store) traffic. Unfortunately, this increase in activity also attracts cybercriminals looking to exploit vulnerabilities for their gain.  Imperva, a Thales company, recently published its annual holiday shopping cybersecurity guide. Data from the Imperva Threat Research team’s




act

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Oct 28 - Nov 03)

This week was a total digital dumpster fire! Hackers were like, "Let's cause some chaos!" and went after everything from our browsers to those fancy cameras that zoom and spin. (You know, the ones they use in spy movies? ????️‍♀️) We're talking password-stealing bots, sneaky extensions that spy on you, and even cloud-hacking ninjas! ???? It's enough to make you want to chuck your phone in the ocean.




act

Google Warns of Actively Exploited CVE-2024-43093 Vulnerability in Android System

Google has warned that a security flaw impacting its Android operating system has come under active exploitation in the wild. The vulnerability, tracked as CVE-2024-43093, has been described as a privilege escalation flaw in the Android Framework component that could result in unauthorized access to "Android/data," "Android/obb," and "Android/sandbox" directories, and their respective




act

Malware Campaign Uses Ethereum Smart Contracts to Control npm Typosquat Packages

An ongoing campaign is targeting npm developers with hundreds of typosquat versions of their legitimate counterparts in an attempt to trick them into running cross-platform malware. The attack is notable for utilizing Ethereum smart contracts for command-and-control (C2) server address distribution, according to independent findings from Checkmarx, Phylum, and Socket published over the past few




act

Google Cloud to Enforce Multi-Factor Authentication by 2025 for All Users

Google's cloud division has announced that it will enforce mandatory multi-factor authentication (MFA) for all users by the end of 2025 as part of its efforts to improve account security. "We will be implementing mandatory MFA for Google Cloud in a phased approach that will roll out to all users worldwide during 2025," Mayank Upadhyay, vice president of engineering and distinguished engineer at




act

CISA Alerts to Active Exploitation of Critical Palo Alto Networks Vulnerability

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks Expedition to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The vulnerability, tracked as CVE-2024-5910 (CVSS score: 9.3), concerns a case of missing authentication in the Expedition migration tool that




act

THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 04 - Nov 10)

⚠️ Imagine this: the very tools you trust to protect you online—your two-factor authentication, your car’s tech system, even your security software—turned into silent allies for hackers. Sounds like a scene from a thriller, right? Yet, in 2024, this isn’t fiction; it’s the new cyber reality. Today’s attackers have become so sophisticated that they’re using our trusted tools as secret pathways,




act

Microsoft Fixes 90 New Flaws, Including Actively Exploited NTLM and Task Scheduler Bugs

Microsoft on Tuesday revealed that two security flaws impacting Windows NT LAN Manager (NTLM) and Task Scheduler have come under active exploitation in the wild. The security vulnerabilities are among the 90 security bugs the tech giant addressed as part of its Patch Tuesday update for November 2024. Of the 90 flaws, four are rated Critical, 85 are rated Important, and one is rated Moderate in




act

THE LAW AND THE FACTS ARE ON OUR SIDE, BUT WE SHOULD BE USING EMOTION, TOO

Historically, both law and facts are on the gun owners’ side of the “gun control” debate, and the Other Side had relied largely on emotion.  I respectfully submit that emotion is something our side should play to, as well. I made that point recently at the 2024 Gun Rights Policy Conference in San Diego last […]





act

Username Over 52 Characters with No Password says Okta







act

20 years of The Practice of System and Network Administration!

Twenty years ago the first edition of The Practice of System and Network Administration shipped! Since then there has been a 2nd and 3rd edition (2006 and 2014), plus a sequel book The Practice of Cloud System Administration, and many printings. (see the timeline here)

When we started the project we had no idea if it would be a success. There was a real chance it could be a flop. Many people told us that our proposal was illogical: How could you have a book about system administration that is vendor agnostic and talks about process and people instead of specific tools and operating systems? Well, to be honest, we took a deep breath and started writing anyway. It took 2+ years but in Sept/Oct 2001 the book finally shipped!

Instead of a flop, the reaction we got was very positive! It has sold tens of thousands of copies. Many universities have used the book and its future editions as text books. It received the Usenix LISA Outstanding Achievement Award. One DevOps pundit told me she considers it to be "the first devops book" which was quite humbling.

When I visited Google in 2004 (a year before I considered joining) I was told everyone in the "systems operations" team was given a copy on their first day. The person giving me a tour then took me to a supply closet with 30 copies awaiting to be distributed to new hires.

However the real satisfaction comes from how it has helped others. Fans have related many heartwarming stories. Many fans have told us they felt like reading the book was a turning point in their life, that the book "turned me into a professional system administrator".

To thank our readers, our publisher is offering a special deal: 45% off the latest editions now until Oct 31, 2021 What? You still have the 2nd edition and haven't seen the dozens of chapters of new material in the 3rd edition? Or maybe you haven't heard of our Cloud book? Now is your chance to get the 3rd edition or the cloud sequel!

Thank you to everyone that gave us feedback on the early drafts! Thank you to all our readers! This book changed our lives and we hope it changed yours too!

P.S. We would love to hear from you! Please post a comment with reflections on the book.




act

Princeton research activity hits new milestone

National survey highlights vibrancy and growth of campus research