![]() You can be pretty sure of having the newest version most of the time. However since Google are now settling into a regular pattern of weekly updates for the Linux build, all you need to do is run the updater once a week. The only thing I can't automate is to make it check for new updates that's still way over my head, I'm sorry to say. Works nicely, too.!Īs mentioned below in my reply to Barry, the script contents are there if anyone's curious. Puppy's Chrome-portable now has its own, included updater script. I'm looking into producing some form of updater for the portables very early stages yet, though, but I'll keep y'all informed if it ever materialises.ĮDIT:- Well, that didn't take as long to figure out as I feared it might. You'll have to be satisfied with that, guys. This being the case, I'll be producing an initial version of each release, and a mid-point one. Well, I'm sorry, but I point-blank refuse to spend all my time doing nothing but browser updates I do have a life, and other stuff that demands my time. This was not unexpected, as it was announced all the way back in April that this would become standard practice from Chrome 94 onwards. Google are now spewing out updates every few days as part of their "Accelerated update programme". Chrome 95 has now landed, so here's the Puppy-portable version of v.54. Any issues/ problems/feedback, drop me a line. You can find the new version at the main link in post #1. No changes to the packaging, either I've settled on a format I'm happy with now, and for the foreseeable future, that's how it's going to stay. I'm often reading on the blog about how new versions of Chrome keep breaking functionality for Windows users, but none of this stuff ever really seems to affect us here in Puppyland.for which I'm grateful! Nothing of note to report this time Google are just refining & trying to make Chrome better, as always. You can read all about them here, as usual :. ![]() The usual crop of security 'fixes' - 19 of them, on this occasion - has been taken care of. Chrome v94 has just been promoted to the stable channel, so here's the Puppy 'portable' version of v.54. ![]()
0 Comments
![]() ![]() Each volume within an APFS container can have its own APFS format-APFS, APFS (Encrypted), APFS (Case-sensitive), or APFS (Case-sensitive, Encrypted). Disk Map Analyzer is a great application that can help you to clean junk files from your disk and reclaim valuable space. You can easily add or delete volumes in APFS containers. For example, folders named “Homework” and “HOMEWORK” are two different folders. You can adjust the app to show more than just file size: the heatmap can be coded to file age, last change, and more. Its boxy, heat-map style display, though, is a surprisingly effective way to visualize blocks of data on your disk. ![]() You can also use this menu to start going through recovered files by type, and you can even review a lost partition specifically. A longtime fixture for Mac disk management, Grand Perspective might look a little outdated. Let Disk Drill complete its scanning process. For example, folders named “Homework” and “HOMEWORK” are two different folders.ĪPFS (Case-sensitive, Encrypted): Uses the APFS format, is case-sensitive to file and folder names, and encrypts the volume. Open Disk Drill and select the problematic USB, SD card, or drive. Choose this option if you don’t need an encrypted or case-sensitive format.ĪPFS (Encrypted): Uses the APFS format and encrypts the volume.ĪPFS (Case-sensitive): Uses the APFS format and is case-sensitive to file and folder names. Each volume uses only part of the overall container, so the available space is the total size of the container, minus the size of all the volumes in the container.Ĭhoose one of the following APFS formats for Mac computers using macOS 10.13 or later.ĪPFS: Uses the APFS format. If desired, you can specify reserve and quota sizes for each volume. When a single APFS container has multiple volumes, the container’s free space is shared and is automatically allocated to any of the individual volumes as needed. macOS 10.13 or later supports APFS for both bootable and data volumes.ĪPFS allocates disk space within a container (partition) on demand. While APFS is optimized for the Flash/SSD storage used in recent Mac computers, it can also be used with older systems with traditional hard disk drives (HDD) and external, direct-attached storage. And beneath each disk you should see any containers and volumes on that disk.Apple File System (APFS), the default file system for Mac computers using macOS 10.13 or later, features strong encryption, space sharing, snapshots, fast directory sizing, and improved file system fundamentals. The sidebar in Disk Utility should now show each available disk or other storage device, beginning with your startup disk. When the drive is mapped, it appears on the desktop as a mounted drive or under Locations in a Finder window. Enter the path for the network drive and select Connect. ![]() Select the user, then click Next and enter their administrator password.įrom the utilities window in macOS Recovery, select Disk Utility and click Continue.Ĭhoose View > Show All Devices (if available) from the menu bar or toolbar in Disk Utility. Select Go in the menu bar at the top of the screen and choose Connect to Server. You may be asked to select a user you know the password for. Intel processor: Turn on your Mac, then immediately press and hold these two keys until you see an Apple logo or other image: Command (⌘) and R. You can map it from the command line (cmd. Click the gear icon labeled Options, then click Continue. Select a location where Disk Drill will save the backup file. Then, select the faulty drive (if it’s your system drive, select APPLE SSD) and click Create backup. On the left sidebar, click Byte-to-byte Backup. However, if your Mac doesn't start up all the way, or you want to repair the disk your Mac starts up from, open Disk Utility from macOS Recovery:ĭetermine whether you're using a Mac with Apple silicon, then follow the appropriate steps:Īpple silicon: Turn on your Mac and continue to press and hold the power button until you see the startup options window. Launch Disk Drill (Finder > Applications). In general, you can just open Disk Utility from the Utilities folder of your Applications folder. Before proceeding, make sure that you have a current backup of your Mac, in case you need to recover damaged files or Disk Utility finds errors that it can't repair. Most Apple Mac hard disks are GUID formatted, but if you want to change your external hard drives partition table, heres how to do that: Step 1. ![]() ![]() As such, Health Insurance contributes a significant part of the patient's costs in these institutions. Private Health Groups in Portugal (Only groups with Private Hospitals Management are mentioned here) All these private hospitals are part of the medical care providers networks in most of the private health systems mentioned above. Other Worldwide Health Options for expats in Portugal: Santander sells SafeCare Health Insurances.Ībanca sells Victoria Seguros Health Insurances.Īllianz PT is parte of Allianz Worldwide Care.Īllianz Worldwide Care (AWC) offers international health and life insurance for expatriates. Saude Prime is part of Future Healthcare PHS Network for selling health insurance and health plans. Insurance Companies: Victoria/SMA Group, SaudePrime, SafeCare +34.000 Doctors, +82 Hospitals, +1272 Examination & Treatment Centers/Dental Clínics Private Healthcare Network: Future Healthcare Montepio sells Lusitânia Seguros Insurances. Insurance Companies: Tranquilidade, Generali, GNB, MGEN, NSeguros, Lusitânia, Una, Logo, RealVida. MilleniumBCP and Bankinter sells Médis Insurances. Médis is part of the Ageas Insurances Portugal. Insurance Companies: Ageas, Ocidental, Liberty, Zurich, Mapfre, Credito Agrícola + 13.000 Doctors, +90 Hospitals, 8000 Examination & Treatment Centers/Dental Clínics Multicare is part of the Fidelidade Insurance Company.ĬGD, BancoCTT and EuroBIC sell Multicare Insurances. Private Healthcare Network: Multicare FidelidadeĬGD (Caixa Geral de Depósitos) Bank, BancoCTT Bank, EuroBIC Bank. Here it is a brief summary of each PHS network. In Portugal, the main Private Healthcare System - PHS networks are: (Sorted by portuguese market share, 2020) 1st Multicare (Fidelidade) 2nd Médis (Ageas Group) 3rd Advance Care (Tranquilidade/Generali Group) 4th Future Healthcare 5th Allianz Care Even if you've settled in a tiny village in the portuguese countryside, a larger network can mean a shorter drive to your doctor's office or private hospital/clinic. This means you'll have access to high-quality healthcare services in most cities. Each PHS network covers all medical specialties and most of municipalities/"concelhos" in mainland Portugal, but also in the Azores and Madeira islands. Agreements / "Acordos", "Convenções" Each PHS Network in Portugal provides agreements and partnerships with private hospitals, medical clinics and doctors all over the country. ![]() You also have the option of commercial insurance agents spread throughout the country. Sales channels, Trading partners / "Agentes comerciais" Banking system is a widely common channel for the insurances distribution, and Health Insurances in particular. For each one, you can carry out a cost simulation based on your age & medical requirements. are considered in most of the available health insurances. ![]() A wide range of facilities such as 24/7 medical assistance, online appointments with doctors, access to specialists and exams, annual health checkups, access to second medical opinion, price reduction (for consultations, exams, treatments, operations and hospitalisation). and establishes agreements with the existing PHS networks in Portugal. Each Insurance Company provides its Health Insurance solutions by targeting market segments and insurance coverages: Individual, Family, Dental, Senior. ![]() In addition to the National Healthcare System: you also have the option of the Private Healthcare System (PHS). ![]() ![]() ![]() A non rotating black hole’s horizon appears to be spherical on the surface with a radius which is similar to the Schwarzschild while a spinning black hole has a distorted horizon that makes the equator to swell due to its rotation (Parker 30). For example, incase the sun is substituted with a black hole that has a similar weight it subsequently affects its rotational behavior (Rau 23). Theoretically speaking, a sufficiently compressed mass will become a black hole.Ī black hole on the other hand is believed not to be a cosmic vacuum cleaner. Its surface is called the event horizon which happens to be its border. This in essence tells us where the name black hole came from. This is the main reason that explains why there is no information received or found from this region. Singularity is therefore an area in which the force of gravity happens to be stronger in such a manner that nothing can escape away from it including light. Its eventual collapse to a point of zero volume and an immeasurable density leads to a creation of singularity. A general theory that has been put forward suggests that the content found in a black hole is usually compressed to a point that it is usually called the singularity point (Luminet 295). Black holes will collapse on their own due to the fact that it has no outward forces that are opposing it. if a heavy stone falls on the ground it leaves behind a huge man hole. Therefore, it is argued that if a larger and massive star explodes, it might possibly leave behind a massive burned out stellar remnant e.g. This is to say that an object with a high gravitational field that has a high velocity is more likely to surpass the speed of light (Parker 25). This means that they can go into the future or the past years.īlack holes are simply said to be the evolutionary endpoints of stars that happen to be 10-15 times massive to the sun. Movies from Hollywood portray black holes as time physical entrances to tunnels that if one goes through, he can either move back or fourth in years. Several myths have been generated in many attempts to try and explain what a black hole is and Hollywood is at the forefront of it. This explains the origin of the name, Black hole. This implies that they are able to attract and pull anything including light at a very high speed. ![]() From far enough away, their gravitational effects are just like those of other objects of the same mass.Black holes are space zones in the universe that are dark in nature and possess natural forces of attraction that have a very high gravity. They don’t provide shortcuts between different points in space, or portals to other dimensions or universes.Ĭosmic vacuum cleaners. This effect, called gravitational lensing, can be used to find isolated black holes that are otherwise invisible. Massive objects like black holes can bend and distort light from more distant objects. Scientists can detect some of these by the ripples’ effect on detectors. When very massive objects accelerate through space, they create ripples in the fabric of space-time called gravitational waves. Astronomers tracked the orbits of several stars near the center of the Milky Way to prove it houses a supermassive black hole, a discovery that won the 2020 Nobel Prize. Scientists primarily detect and study them based on how they affect their surroundings:īlack holes can be surrounded by rings of gas and dust, called accretion disks, that emit light across many wavelengths, including X-rays.Ī supermassive black hole’s intense gravity can cause stars to orbit around it in a particular way. Credit: NASA's Goddard Space Flight Center/Conceptual Image Labīlack holes don’t emit or reflect light, making them effectively invisible to telescopes. A bright jet of particles erupts from near the black hole, with another unseen on the opposite side. The black hole is surrounded by a bright accretion disk and a darker ring of gas and dust. This illustration shows the supermassive black hole at the center of a type of active galaxy called a blazar. ![]() ![]() In younger dengue patients (median age range 3–25 years), sST2 levels were found to be elevated and was associated with disease severity in the acute phase of disease. Interestingly, sST2 has been demonstrated to be a strong, independent predictor of severity and mortality in clinical studies of cardiac failure. Upon inflammatory stimulus, ST2L is released in its soluble isoform (sST2) and acts as a decoy receptor for IL-33 to counterbalance the IL-33/ST2L inflammatory signalling pathway. ![]() Suppression of tumorigenicity-2 (ST2) is a member of the interleukin-1 receptor group and is expressed as a transmembrane ligand (ST2L) on various immunological cells. However, reliable predictive biomarkers of cardiac impairment as predictor of SD are lacking and remains a challenge in the clinical management of febrile dengue patients. Several markers including sickle cell disease (haemoglobin SC and SS), change in haematological parameters (decreased platelets, leucopenia), elevated levels of hepatic enzymes (transaminases, creatine kinase) have been associated with dengue haemorrhagic fever, dengue shock and mortality. While several mechanisms including dysregulated host inflammatory mediators and viral proteins have been hypothesized to mediate dengue shock, the precise mechanism remains unclear. The cause of dengue shock is multifactorial and cardiac impairment in clinical dengue, which may manifest as myocarditis, myocardial impairment and arrhythmias has been proposed to contribute to pathology. Vascular leakage may then lead to severe bleeding, organ-failure and potential fatal circulatory compromise causing shock. ĭengue can be categorised into febrile (days 1–3), critical/defervescence, (days 4–6) and recovery phases (day 7 onwards), and one of the more prominent features of SD (often in the critical phase), is vascular leakage. Dengue is mostly asymptomatic and self-limiting, however, in some patients, severe dengue (SD) may manifest. The global incidence of dengue has risen dramatically, and Asia carries the highest disease burden. Together, this work provides novel evidence on the potential utility of sST2 to predict severe dengue and its associations in dengue-associated cardiac impairment.ĭengue is a vector-borne viral infection endemic in the tropics and sub-tropics regions. We also showed that sST2 levels correlated with lower measurements of cardiac performance, and more importantly, sST2 was observed to be a possible prognostic biomarker of severe dengue. Our work demonstrated sST2 to be significantly raised in dengue participants and levels increase with worse dengue outcomes. In a longitudinal cohort of dengue subjects, we investigated the potential utility of sST2 as a predictive biomarker for severe dengue and explored its associations with dengue-associated cardiac impairment. ![]() ![]() Suppressor of tumorigenicity (ST2) is a member of the interleukin-1 receptor family, and its soluble form (sST2) has been a valuable biomarker in patients with heart failure. The lack of reliable biomarkers for severe dengue poses a challenge in managing febrile dengue patients. ![]() It is mostly self-resolving, but in some patients, severe outcomes such as dengue-associated cardiac impairment may occur. Dengue is a vector-borne viral disease that infects up to 400 million people a year. ![]() ![]() ![]() ![]() VSDC where all new media goes straight into the timeline and you need to manipulate it there. Also, in VSDC you have to pay for the audio waveform although the cost of Pro is really cheap ($20/year and they have links where you can get a lifetime licence for under $40).Īlso, Kdenlive has a more user-friendly way of dealing with all your media as it has a clip monitor screen where you can preview and cut each of your media before adding it to your timeline, vs. VSDC buries its audio volume control as a property of each audio object, so you can mix volume equally capably but need to go into your tracks one by one and play with them. I appreciated having the audio mixer panel which shows all your audio tracks side by side allowing you to adjust and check the volumes against each other. Kdenlive's workflow mimics more closely the pro level video editing software and gives you a prettier interface. Kdenlive has proxy clips, unlike VSDC, so that might speed things up a little. I chose these two options because they take up the least disk space and hardware resources (since my computer specs are respectable but not ideal for video editing). I am currently trying out both Kdenlive and VSDC side by side as a novice aiming to produce simple instructional videos, and they have different pros and cons. It's free and open source, just like Shotcut. If your system cannot support that, Kdenlive is one other alternative to Shotcut that you can try. In general you need at least an i7 CPU, and 16 GB of RAM, as well as a good graphics card. While I appreciate the raw capability of DaVinci Resolve, you do need the hardware to support it (configuration guide is below but is for one version prior to the current one). u/shickey maintains a videography-themed weekly challenge subreddit, so if you're looking for something to shoot head on over to /r/DoCreativeĬamera, NLE, year started, general location Requests for feedback or comments must be posted in the monthly ‘I Made This/Feedback’ threadĪ full copy of the rules can be read here. ![]() Use of affiliate links must be disclosed in post.Links posted must relate directly to videography.If you're looking for professional-only discussion, give /r/videoprofessionals a shot! r/videography is a subreddit intended for all skill levels, from beginners all the way through to professionals to come together to discuss the trade. For videographers interested in weddings, events, live performances, music videos, TV, corporate, live streaming, sports, real estate, YouTube, home videos and more, welcome to /r/videography. Destined for the big screen? Try /r/filmmakers. ![]() ![]() ![]() Propertius 1990 (3.11), also not deigning to mention her by name, ranked her with the sorceress Medea. For example, in Book 8 of the Aeneid ( Vergil 2000) the Battle of Actium is described, but Cleopatra is not named, called only the “Egyptian mate” of Antony. The poetry of the Augustan period, although eloquent, helped to destroy her reputation. Other historical sources have exceedingly limited references to the queen, although Cicero 1999 (#374, 377) is the only source for a possible miscarried pregnancy by Cleopatra in early 44 BCE. Also of significance are the works of the Jewish historian Josephus ( Josephus 1928 and Josephus 1930–1965), whose interest was limited to the southern Levant, but this was an area of importance to Cleopatra. Second in importance is the Roman History of Cassius Dio (see Dio 1914–1927), the only continuous extant history of Cleopatra’s era. Plutarch’s biography of Marcus Antonius (see Plutarch 1988) is the closest to an actual narrative about the queen, but was written one hundred years after her death and is limited in its focus. Women never fare well in ancient history, and there is no work specifically devoted to the queen, nor is there a major contemporary source. Although the Roman literary machine turned her into a dangerous monster who almost destroyed Rome, within Egypt she was honored for centuries.Īncient literary sources about Cleopatra are remarkably sparse. ![]() Her son Kaisarion ruled for a few weeks, but soon the Romans took over the kingdom. Cleopatra attempted to disassociate herself from Antonius in order to salvage her kingdom, but would not give it over to Octavian, and was driven to suicide in August of 30 BCE at the age of thirty-nine. Matters quickly moved out of control in the 30s BCE, and eventually a Roman invasion of Greece was mounted. Her original relations with Antonius were a matter of stabilizing her kingdom and creating a mutually beneficial relationship between Egypt and Rome, but the personal involvement between the two eventually hampered these plans, and allowed Octavian (the future emperor Augustus), in power in Rome, to marginalize Antonius (who was his brother-in-law) and to claim that he was being destroyed by an eastern seductress. ![]() But her own plans became caught up in the ongoing civil war at Rome, beginning with the assassination of Caesar in 44 BCE. Best remembered for her liaisons with Julius Caesar, and Marcus Antonius (Mark Antony), she in fact carefully chose her partners in order to produce heirs who could carry on the kingdom. She ruled for twenty-one years, from 51 to 30 BCE, and skillfully attempted to salvage her dying kingdom in the face of growing Roman power and involvement in the affairs of the eastern Mediterranean. Yet she was also the last ruler of her kingdom, and her defeat by the Romans led to the destruction of her reputation. More accurately, she was a capable administrator and military commander, a linguist who knew a dozen languages, and a published scholarly author. She is familiar today largely through her representation by Shakespeare and in modern film, as a seductress who ruined the men in her life and destroyed her kingdom, an erroneous depiction that is in large part the result of extremely eloquent opponents and male-dominated historiography. The information from Greek and Roman sources about Cleopatra herself is surprisingly sparse and generally misinterpreted. She is best known through the extensive art and literature that was generated after her death. Cleopatra (Kleopatra) VII is arguably the most famous woman from classical antiquity, and one of the most familiar personalities in human history. ![]() ![]() ![]() The climatic impact of aerosols depends on their absorptionĪnd scattering properties, quantified by single scattering albedo (SSA).Įven a slight reduction in SSA can change the aerosol radiative forcing fromĬooling to warming, depending on the underlying surface albedo (Kaufman et al., 2001 Chand et al.,Ģ009). Of aerosols on regional and global scales.Ītmospheric aerosols play a significant role in the earth's radiation budget Provide important input to climate models for assessing the climatic impact The global maps of SSA, thus derived with improved accuracy, Uncertainty around ☐.044 and shows maximum sensitivity to changes in Sensitivity analysis to various parameters indicate a mean Seasonal and spatial distribution of SSA over various regions are also Mean SSA estimated over land and ocean is 0.93 and 0.97, respectively. Surrounding oceans were generally in agreement within ☐.03. Limited comparisons against airborne observations over India and Resolution Imaging Spectroradiometer (MODIS) sensors on board Terra and Aqua Generated following this approach using spatially and temporally collocatedĭata from Clouds and the Earth's Radiant Energy System (CERES) and Moderate Nm) using the concept of critical optical depth. This study, we have applied a multi-satellite algorithm to retrieve SSA (550 ThereforeĪccurate information on aerosol absorption is required on a global scale. To the uncertainty in aerosol radiative impact assessments. ![]() Single scattering albedo (SSA) is a leading contributor ![]() ![]() ![]() The title of the link read as “ Linux bans University of Minnesota for sending buggy patches in the name of research”. TBH, you're now just trying to cross the bridge before you come to it. And you're doing this by first estimating how much damage you can bear in case of security breach, and for most casual users, a good backup plan, regular update and malware scanner is more than enough. That said, you need to determine what's your target security level, then put corresponding resources into it. But truth be told: no one can stare at CVE announcement 7/24, unless you're running a business that may cause life-and-property loss. You still need to keep alert to all the security information about packages you're using. No I'm not mocking open source community but pointing out that open source isn't equal to problem-free. A lot of people have the myth that nothing will go wrong in open source projects since "they're under public scrutiny". The real security risk is not the package manger but the open source softwares themselves. If Homebrew suffers from attacks like DNS hijack, same thing will happen if you're compiling everything from tarball yourself. It's no less secure than installing these packages manually. It doesn't require any authentication or user credential to initiate the download. It's tracking package dependency locally and nothing is "exposed" to the internet. Homebrew itself is only a package manager that download and install packages for you. I am not so much worried about the very specific software I would get via these methods, but what setting up/using Home-brew/Mac Ports could do to impact security.ĮDIT: Seems like the consensus and my research as shown that Homebrew (not many people chimed in about Mac Ports) seems relatively trust worthy and safe/secure. Doing so for a small, select few bits of software wouldn't be worth a meaningful lapse in security to me.Ĭan anyone weigh in on how secure/insecure using these options are?įinal thought, I am aware that any system is only as secure as the person using it and how well (or poorly) it is configured. I am very security conscious and am worried using something like the above mentioned package managers/repos could expose my system (vs only using the App Store/direct installing software I trust). ![]() While most of my software/app needs are met just fine there are occassions when I start looking for software and it leads me to needing to use something like Home-brew or Mac Ports. I am new to Macs (2021 16" MacBook Pro), coming from using Linux (mostly Fedora) for my daily computing. ![]() ![]() ![]() Sleeping Beauty Castle is now a walk-through attraction, though it didn’t become one until 1957. Walt chose Sleeping Beauty as his princess for Disneyland to promote the film. □ Fun fact: Sleeping Beauty was not out when Disneyland opened.□ Construction notes: Sleeping Beauty Castle was originally supposed to face the other way, but when Disney Legend Herb Ryman turned the model around, Walt saw it and lit up.□ Inspired by: Neuschwanstein Castle in Bavaria and Chenonceau Castle in France.Fast Facts about Sleeping Beauty Castle at Disneyland Resort ![]() More than a decade and a half before Cinderella Castle sprung from the swampy grounds of Orlando, Walt Disney himself oversaw the construction of Sleeping Beauty Castle in Anaheim at Disneyland Resort. Photo by Mike Billickīelieve it or not, the first Disney castle was not the famous Cinderella Castle that likely comes to mind if you live in the eastern half of the United States. Sleeping Beauty Castle at Disneyland Resort. Sleeping Beauty Castle at Disneyland Resort Note: Beast’s Castle now resides at Disney World and Tokyo Disneyland however, they are not the main castle and are thus not included in the final count. Enchanted Storybook Castle at Shanghai Disney Resort.Castle of Magical Dreams at Hong Kong Disneyland.Le Château de la Belle au Bois dormant at Disneyland Paris.Cinderella Castle at Walt Disney World Resort.Sleeping Beauty Castle at Disneyland Resort.Wondering how many Disney castles there are around the world? There are six Disney castles in total, one at each of the resorts globally: In this article, we’ll discuss how many Disney castles there are, tales from their construction, when the Disney castles were built, and even what’s inside (or underneath!) them. Just as Disney World has Cinderella Castle, the other five Disney Parks around the world have their own royal residences as well. Cinderella Castle is the icon of Walt Disney World, that beautiful piece of architecture that lures you down Main Street, U.S.A., and into the lands of Magic Kingdom. What’s the first image your brain conjures up? Twenty Disney dollars says it’s Cinderella Castle. How many Disney castles are there, and what makes each unique?Ĭlose your eyes and think of Disney World. ![]() |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |