Compare commits

...

701 Commits

Author SHA1 Message Date
arc
145a871d1d vault backup: 2025-06-06 14:43:51 2025-06-06 14:43:51 -06:00
arc
b018456d64 vault backup: 2025-06-04 18:29:17 2025-06-04 18:29:17 -06:00
arc
6a8712dc7c vault backup: 2025-06-03 11:45:18 2025-06-03 11:45:18 -06:00
arc
892f40f37e vault backup: 2025-06-03 11:30:16 2025-06-03 11:30:16 -06:00
arc
83ceb7a5d0 vault backup: 2025-05-31 13:22:00 2025-05-31 13:22:00 -06:00
arc
3395a32204 vault backup: 2025-05-31 11:20:48 2025-05-31 11:20:48 -06:00
arc
4f1ea82d06 vault backup: 2025-05-30 16:10:23 2025-05-30 16:10:23 -06:00
arc
2857e5ea84 vault backup: 2025-05-30 16:05:23 2025-05-30 16:05:23 -06:00
arc
142ab93d04 vault backup: 2025-05-21 17:39:42 2025-05-21 17:39:42 -06:00
arc
90c9111a08 vault backup: 2025-05-09 13:07:48 2025-05-09 13:07:48 -06:00
arc
053eea8b11 vault backup: 2025-05-09 12:37:48 2025-05-09 12:37:48 -06:00
arc
9efb23dc3d vault backup: 2025-05-09 12:32:48 2025-05-09 12:32:48 -06:00
arc
e5d60bfb94 vault backup: 2025-05-09 12:27:48 2025-05-09 12:27:48 -06:00
arc
cbe5d6cde7 vault backup: 2025-05-09 12:22:48 2025-05-09 12:22:48 -06:00
arc
c80bacb2fc vault backup: 2025-05-09 12:17:48 2025-05-09 12:17:48 -06:00
arc
bff7640d0a vault backup: 2025-05-09 12:12:48 2025-05-09 12:12:48 -06:00
arc
27b25ff6dd vault backup: 2025-05-09 12:07:48 2025-05-09 12:07:48 -06:00
1052e71a6d vault backup: 2025-05-08 12:00:07 2025-05-08 12:00:07 -06:00
arc
0a0d3c833e vault backup: 2025-05-08 11:39:23 2025-05-08 11:39:24 -06:00
1fb125825d vault backup: 2025-05-08 11:30:07 2025-05-08 11:30:07 -06:00
arc
00010e0ec8 vault backup: 2025-05-08 11:14:23 2025-05-08 11:14:24 -06:00
5941f9907f vault backup: 2025-05-08 11:08:07 2025-05-08 11:08:07 -06:00
arc
c59d6f536d vault backup: 2025-05-08 11:04:23 2025-05-08 11:04:24 -06:00
f763dac3b2 vault backup: 2025-05-06 21:20:10 2025-05-06 21:20:10 -06:00
40a8bdfbe4 vault backup: 2025-05-06 21:15:10 2025-05-06 21:15:10 -06:00
a75a02e406 vault backup: 2025-05-06 21:10:10 2025-05-06 21:10:10 -06:00
316d29ad4f vault backup: 2025-05-06 21:05:10 2025-05-06 21:05:10 -06:00
cfbfc6aeee vault backup: 2025-05-06 21:00:10 2025-05-06 21:00:10 -06:00
a1caa119cc vault backup: 2025-05-06 20:55:10 2025-05-06 20:55:10 -06:00
824806137c vault backup: 2025-05-06 20:50:10 2025-05-06 20:50:10 -06:00
892f17fdff vault backup: 2025-05-06 20:45:10 2025-05-06 20:45:10 -06:00
3693a5d628 vault backup: 2025-05-06 13:11:40 2025-05-06 13:11:40 -06:00
c33fcf8639 vault backup: 2025-05-06 13:06:40 2025-05-06 13:06:40 -06:00
29ab0c850c vault backup: 2025-05-06 13:01:40 2025-05-06 13:01:40 -06:00
6548157af2 vault backup: 2025-05-06 12:56:40 2025-05-06 12:56:40 -06:00
81dfab2213 vault backup: 2025-05-06 12:51:40 2025-05-06 12:51:40 -06:00
1e752aa5a5 vault backup: 2025-05-06 12:46:40 2025-05-06 12:46:40 -06:00
4524d8d85d vault backup: 2025-05-06 12:41:40 2025-05-06 12:41:40 -06:00
3a2c94fc29 vault backup: 2025-05-06 12:36:40 2025-05-06 12:36:40 -06:00
d241cd84a2 vault backup: 2025-05-06 12:31:39 2025-05-06 12:31:40 -06:00
21b1eb4641 vault backup: 2025-05-06 12:26:39 2025-05-06 12:26:40 -06:00
f2a5d9fde3 vault backup: 2025-05-06 12:21:39 2025-05-06 12:21:40 -06:00
1e9eb77e4b vault backup: 2025-05-06 12:16:39 2025-05-06 12:16:40 -06:00
d426182082 vault backup: 2025-05-06 12:11:39 2025-05-06 12:11:40 -06:00
0cc087eded vault backup: 2025-05-06 12:06:39 2025-05-06 12:06:39 -06:00
7dbff08408 vault backup: 2025-05-06 12:01:39 2025-05-06 12:01:39 -06:00
9ccd3322e8 vault backup: 2025-05-06 11:56:39 2025-05-06 11:56:39 -06:00
19255083a7 Merge remote-tracking branch 'origin/main' 2025-05-06 11:51:43 -06:00
0213e7e5bd vault backup: 2025-05-06 11:51:39 2025-05-06 11:51:39 -06:00
a29a161a9e vault backup: 2025-05-06 11:46:39 2025-05-06 11:46:39 -06:00
arc
584cebafdb vault backup: 2025-04-21 18:27:57 2025-04-21 18:27:57 -06:00
arc
66cd4f22ea vault backup: 2025-04-21 09:45:37 2025-04-21 09:45:37 -06:00
arc
74bae7ec01 vault backup: 2025-04-20 07:40:15 2025-04-20 07:40:15 -06:00
arc
0b2c3357e5 vault backup: 2025-04-20 07:35:17 2025-04-20 07:35:17 -06:00
arc
e113020180 vault backup: 2025-04-18 10:46:02 2025-04-18 10:46:02 -06:00
arc
11a8fcc9ae vault backup: 2025-04-18 10:14:15 2025-04-18 10:14:15 -06:00
arc
dff0d3a1cb vault backup: 2025-04-17 10:15:42 2025-04-17 10:15:42 -06:00
arc
a1b0787683 vault backup: 2025-04-17 10:10:42 2025-04-17 10:10:42 -06:00
arc
da9c8fdcff vault backup: 2025-04-17 10:00:42 2025-04-17 10:00:42 -06:00
arc
a3ae6fea9e vault backup: 2025-04-17 09:55:42 2025-04-17 09:55:42 -06:00
arc
4687efb9a7 vault backup: 2025-04-17 09:35:42 2025-04-17 09:35:42 -06:00
arc
f8803724a6 vault backup: 2025-04-17 09:30:41 2025-04-17 09:30:41 -06:00
arc
adcf1012eb vault backup: 2025-04-17 09:25:41 2025-04-17 09:25:41 -06:00
arc
52dbf70512 vault backup: 2025-04-17 09:20:40 2025-04-17 09:20:41 -06:00
arc
0d57ad37c7 vault backup: 2025-04-17 09:15:40 2025-04-17 09:15:41 -06:00
arc
d012cd70aa vault backup: 2025-04-17 09:10:40 2025-04-17 09:10:41 -06:00
arc
26457a8a0a vault backup: 2025-04-17 09:05:41 2025-04-17 09:05:41 -06:00
arc
bb8461842f vault backup: 2025-04-15 10:06:58 2025-04-15 10:06:58 -06:00
arc
1867f4356d vault backup: 2025-04-15 10:01:58 2025-04-15 10:01:58 -06:00
arc
95f378fa05 vault backup: 2025-04-15 09:56:58 2025-04-15 09:56:58 -06:00
arc
92ae200794 vault backup: 2025-04-15 09:51:58 2025-04-15 09:51:58 -06:00
arc
f014927f13 vault backup: 2025-04-15 09:46:58 2025-04-15 09:46:58 -06:00
arc
8810f2f9cf vault backup: 2025-04-15 09:41:58 2025-04-15 09:41:58 -06:00
arc
79a4ccc0a8 vault backup: 2025-04-15 09:36:58 2025-04-15 09:36:58 -06:00
arc
6d430c98fa vault backup: 2025-04-15 09:31:58 2025-04-15 09:31:58 -06:00
arc
f3afa31f45 vault backup: 2025-04-15 09:26:58 2025-04-15 09:26:58 -06:00
arc
c0418af94c vault backup: 2025-04-15 09:21:58 2025-04-15 09:21:58 -06:00
arc
a8fbf79e77 vault backup: 2025-04-15 09:16:58 2025-04-15 09:16:58 -06:00
arc
dfac621f17 vault backup: 2025-04-15 09:11:58 2025-04-15 09:11:58 -06:00
arc
a5a0698807 vault backup: 2025-04-15 09:06:58 2025-04-15 09:06:58 -06:00
arc
aa2d926f25 vault backup: 2025-04-14 17:41:27 2025-04-14 17:41:27 -06:00
arc
2a14d625db vault backup: 2025-04-14 10:01:14 2025-04-14 10:01:14 -06:00
arc
657edfba3d vault backup: 2025-04-13 19:53:16 2025-04-13 19:53:16 -06:00
arc
a2a0db9752 vault backup: 2025-04-13 19:47:15 2025-04-13 19:47:15 -06:00
arc
f4505a6d72 vault backup: 2025-04-13 17:26:02 2025-04-13 17:26:02 -06:00
arc
f2b9fb6cc2 vault backup: 2025-04-06 12:23:45 2025-04-06 12:23:45 -06:00
arc
dc700de66e vault backup: 2025-04-06 12:18:45 2025-04-06 12:18:45 -06:00
arc
75151ab5d4 vault backup: 2025-04-01 10:13:23 2025-04-01 10:13:23 -06:00
arc
5463d89d1c vault backup: 2025-04-01 10:08:23 2025-04-01 10:08:23 -06:00
arc
43420ff85a vault backup: 2025-04-01 10:03:23 2025-04-01 10:03:23 -06:00
arc
155b7dc6af vault backup: 2025-04-01 09:58:23 2025-04-01 09:58:23 -06:00
arc
56f0fa193b vault backup: 2025-04-01 09:53:23 2025-04-01 09:53:23 -06:00
arc
7d7562e27c vault backup: 2025-04-01 09:43:23 2025-04-01 09:43:23 -06:00
arc
f2449b07e7 vault backup: 2025-03-28 10:24:28 2025-03-28 10:24:28 -06:00
arc
6e882be276 vault backup: 2025-03-27 09:56:27 2025-03-27 09:56:27 -06:00
arc
6776d3e417 vault backup: 2025-03-27 09:51:27 2025-03-27 09:51:27 -06:00
arc
d78c1ecd7a vault backup: 2025-03-27 09:46:27 2025-03-27 09:46:27 -06:00
arc
3ce3b8a446 vault backup: 2025-03-27 09:41:27 2025-03-27 09:41:27 -06:00
arc
6998ab3013 vault backup: 2025-03-27 09:36:27 2025-03-27 09:36:27 -06:00
arc
1143c122d8 vault backup: 2025-03-27 09:31:27 2025-03-27 09:31:27 -06:00
arc
49918dcd5d vault backup: 2025-03-27 09:26:27 2025-03-27 09:26:27 -06:00
arc
acc8e5d1cb vault backup: 2025-03-25 21:57:22 2025-03-25 21:57:22 -06:00
arc
52261239bc vault backup: 2025-03-25 20:15:31 2025-03-25 20:15:31 -06:00
arc
5e76ded241 vault backup: 2025-03-25 10:11:37 2025-03-25 10:11:37 -06:00
arc
a5b1f72da7 vault backup: 2025-03-25 09:51:37 2025-03-25 09:51:37 -06:00
arc
7aed5aa03d vault backup: 2025-03-25 09:46:37 2025-03-25 09:46:37 -06:00
arc
647d705823 vault backup: 2025-03-25 09:41:37 2025-03-25 09:41:37 -06:00
arc
05f59e4460 vault backup: 2025-03-25 09:36:37 2025-03-25 09:36:37 -06:00
arc
5b7e97aa06 vault backup: 2025-03-25 09:31:37 2025-03-25 09:31:37 -06:00
arc
54de0a53c6 vault backup: 2025-03-25 09:16:37 2025-03-25 09:16:37 -06:00
arc
8ae196ae3d vault backup: 2025-03-25 09:11:37 2025-03-25 09:11:37 -06:00
arc
45126e1fc6 vault backup: 2025-03-25 09:06:37 2025-03-25 09:06:37 -06:00
arc
da3b2b680e vault backup: 2025-03-24 09:38:01 2025-03-24 09:38:01 -06:00
arc
ca57497106 vault backup: 2025-03-21 11:09:14 2025-03-21 11:09:14 -06:00
arc
5646d57982 vault backup: 2025-03-20 12:17:12 2025-03-20 12:17:12 -06:00
arc
6921fa15f6 vault backup: 2025-03-20 12:12:12 2025-03-20 12:12:12 -06:00
arc
693a196db5 vault backup: 2025-03-20 11:41:15 2025-03-20 11:41:15 -06:00
arc
4976da28c2 vault backup: 2025-03-20 11:36:17 2025-03-20 11:36:17 -06:00
arc
7b9909b585 vault backup: 2025-03-20 11:27:46 2025-03-20 11:27:46 -06:00
arc
91f31077a5 vault backup: 2025-03-20 11:22:46 2025-03-20 11:22:46 -06:00
arc
f764ece987 vault backup: 2025-03-20 11:17:46 2025-03-20 11:17:46 -06:00
arc
6fb86a79b2 vault backup: 2025-03-20 11:12:46 2025-03-20 11:12:46 -06:00
arc
a187b1974a vault backup: 2025-03-20 11:07:47 2025-03-20 11:07:47 -06:00
arc
404ad78373 vault backup: 2025-03-20 11:02:09 2025-03-20 11:02:09 -06:00
arc
ed2587b382 vault backup: 2025-03-20 10:57:09 2025-03-20 10:57:09 -06:00
arc
51b176a5aa vault backup: 2025-03-20 10:52:09 2025-03-20 10:52:09 -06:00
arc
129950256e vault backup: 2025-03-20 10:47:09 2025-03-20 10:47:09 -06:00
arc
1422cf8006 vault backup: 2025-03-17 17:34:15 2025-03-17 17:34:15 -06:00
arc
f2de9b050c vault backup: 2025-03-17 10:39:18 2025-03-17 10:39:18 -06:00
arc
75970e44ad vault backup: 2025-03-17 10:29:18 2025-03-17 10:29:18 -06:00
arc
0fa73dc599 vault backup: 2025-03-17 10:19:18 2025-03-17 10:19:18 -06:00
arc
32e3900037 vault backup: 2025-03-17 10:14:18 2025-03-17 10:14:18 -06:00
arc
1f5c9bc33a vault backup: 2025-03-17 10:04:18 2025-03-17 10:04:18 -06:00
arc
9509ccdced vault backup: 2025-03-17 09:59:18 2025-03-17 09:59:18 -06:00
arc
9a5e78f4c0 Merge remote-tracking branch 'origin/main' 2025-03-17 09:54:19 -06:00
arc
6567569e66 vault backup: 2025-03-17 09:54:19 2025-03-17 09:54:19 -06:00
arc
2b6f1878d2 vault backup: 2025-03-17 09:48:18 2025-03-17 09:48:18 -06:00
arc
514a50618d vault backup: 2025-03-09 20:20:41 2025-03-09 20:20:41 -06:00
arc
e31518946e vault backup: 2025-03-07 10:41:20 2025-03-07 10:41:20 -07:00
arc
d76d1b2347 vault backup: 2025-03-06 09:59:22 2025-03-06 09:59:22 -07:00
arc
e3db5505f7 vault backup: 2025-03-06 09:54:22 2025-03-06 09:54:22 -07:00
arc
2fb3e9cea0 vault backup: 2025-03-06 09:49:22 2025-03-06 09:49:22 -07:00
arc
da92f848f3 vault backup: 2025-03-06 09:44:22 2025-03-06 09:44:22 -07:00
arc
cfda79dc6a vault backup: 2025-03-06 09:39:22 2025-03-06 09:39:22 -07:00
arc
f7be56d581 vault backup: 2025-03-06 09:34:22 2025-03-06 09:34:22 -07:00
arc
2b60691895 vault backup: 2025-03-06 09:24:22 2025-03-06 09:24:22 -07:00
arc
550b6f910b vault backup: 2025-03-06 09:19:22 2025-03-06 09:19:22 -07:00
arc
773e850873 vault backup: 2025-03-06 09:14:22 2025-03-06 09:14:22 -07:00
arc
705bab4b9d vault backup: 2025-03-06 09:09:22 2025-03-06 09:09:22 -07:00
arc
60991c5513 vault backup: 2025-03-04 11:55:39 2025-03-04 11:55:39 -07:00
arc
32b8448b8f vault backup: 2025-03-03 10:16:16 2025-03-03 10:16:16 -07:00
arc
6a11102473 vault backup: 2025-03-03 10:11:16 2025-03-03 10:11:16 -07:00
arc
cdf0b4971f vault backup: 2025-03-03 10:06:16 2025-03-03 10:06:16 -07:00
arc
372eff1ac8 vault backup: 2025-03-03 10:01:16 2025-03-03 10:01:16 -07:00
arc
68007bd0f2 vault backup: 2025-03-03 09:56:16 2025-03-03 09:56:16 -07:00
arc
8468365679 vault backup: 2025-03-03 09:41:40 2025-03-03 09:41:40 -07:00
arc
fa0cc5f15a vault backup: 2025-02-28 10:55:10 2025-02-28 10:55:10 -07:00
arc
5ec17dfa3b vault backup: 2025-02-26 10:20:05 2025-02-26 10:20:05 -07:00
arc
df3ec63a1f vault backup: 2025-02-26 09:35:44 2025-02-26 09:35:44 -07:00
arc
c43334c316 vault backup: 2025-02-26 09:30:45 2025-02-26 09:30:45 -07:00
arc
f9584a80eb vault backup: 2025-02-25 10:03:29 2025-02-25 10:03:29 -07:00
arc
64e7e1e12a vault backup: 2025-02-25 09:58:29 2025-02-25 09:58:29 -07:00
arc
b4328de95a vault backup: 2025-02-25 09:53:29 2025-02-25 09:53:29 -07:00
arc
d6ade03ca4 vault backup: 2025-02-25 09:48:29 2025-02-25 09:48:29 -07:00
arc
02f5d455cc vault backup: 2025-02-25 09:33:29 2025-02-25 09:33:29 -07:00
arc
ad77170cfd vault backup: 2025-02-25 09:23:29 2025-02-25 09:23:29 -07:00
arc
8d466ecaef vault backup: 2025-02-25 09:18:29 2025-02-25 09:18:29 -07:00
arc
792db06e18 vault backup: 2025-02-25 09:13:29 2025-02-25 09:13:29 -07:00
arc
d6afb5c4bc vault backup: 2025-02-25 09:08:29 2025-02-25 09:08:29 -07:00
arc
851635004e vault backup: 2025-02-24 11:13:29 2025-02-24 11:13:29 -07:00
arc
8772c232a3 vault backup: 2025-02-24 11:08:29 2025-02-24 11:08:29 -07:00
arc
e35525f967 vault backup: 2025-02-24 11:03:29 2025-02-24 11:03:29 -07:00
arc
08d94b9a5a vault backup: 2025-02-24 10:58:29 2025-02-24 10:58:29 -07:00
arc
c4dc28019f vault backup: 2025-02-24 10:53:29 2025-02-24 10:53:29 -07:00
arc
e94fbe54f4 vault backup: 2025-02-24 10:48:29 2025-02-24 10:48:29 -07:00
arc
866a945172 vault backup: 2025-02-24 10:42:45 2025-02-24 10:42:45 -07:00
arc
9c237df32b vault backup: 2025-02-24 10:37:45 2025-02-24 10:37:45 -07:00
arc
0510f11ded vault backup: 2025-02-23 20:11:29 2025-02-23 20:11:30 -07:00
arc
9986e43af8 vault backup: 2025-02-22 22:24:40 2025-02-22 22:24:40 -07:00
arc
e97a227a71 vault backup: 2025-02-21 10:59:11 2025-02-21 10:59:11 -07:00
arc
e8e891f685 vault backup: 2025-02-21 10:34:12 2025-02-21 10:34:12 -07:00
arc
40d5dbdcb3 vault backup: 2025-02-20 12:57:28 2025-02-20 12:57:28 -07:00
35cd8c438a vault backup: 2025-02-19 22:40:09 2025-02-19 22:40:09 -07:00
arc
894532c620 vault backup: 2025-02-18 12:39:28 2025-02-18 12:39:28 -07:00
arc
f4c9265e07 vault backup: 2025-02-18 10:11:11 2025-02-18 10:11:11 -07:00
arc
f6bf13f9e0 vault backup: 2025-02-18 10:06:11 2025-02-18 10:06:11 -07:00
arc
cc5fbfb289 vault backup: 2025-02-18 10:01:11 2025-02-18 10:01:11 -07:00
arc
38e1b487ec vault backup: 2025-02-18 09:56:11 2025-02-18 09:56:11 -07:00
arc
0eeea19351 vault backup: 2025-02-18 09:51:11 2025-02-18 09:51:11 -07:00
arc
0e758ef864 vault backup: 2025-02-18 09:36:10 2025-02-18 09:36:10 -07:00
arc
c63861e8f4 vault backup: 2025-02-18 09:24:00 2025-02-18 09:24:00 -07:00
arc
6c861607be vault backup: 2025-02-16 22:41:14 2025-02-16 22:41:14 -07:00
arc
755d9acced vault backup: 2025-02-16 22:11:14 2025-02-16 22:11:14 -07:00
arc
9c15c4fbf7 vault backup: 2025-02-16 20:27:21 2025-02-16 20:27:21 -07:00
arc
44f55bca9c vault backup: 2025-02-16 20:12:21 2025-02-16 20:12:21 -07:00
arc
3a356d3f0a vault backup: 2025-02-16 20:07:21 2025-02-16 20:07:21 -07:00
arc
f5a2d9f90e vault backup: 2025-02-16 19:37:21 2025-02-16 19:37:21 -07:00
arc
d2ffd42b20 vault backup: 2025-02-16 19:32:21 2025-02-16 19:32:21 -07:00
arc
c21c741225 vault backup: 2025-02-16 19:02:21 2025-02-16 19:02:21 -07:00
arc
763c9022ca vault backup: 2025-02-16 18:52:21 2025-02-16 18:52:21 -07:00
arc
c2d96ec2e5 vault backup: 2025-02-16 18:47:21 2025-02-16 18:47:21 -07:00
arc
acf45de160 vault backup: 2025-02-16 18:42:21 2025-02-16 18:42:21 -07:00
arc
5b61041480 vault backup: 2025-02-16 18:37:21 2025-02-16 18:37:21 -07:00
arc
341c388d37 vault backup: 2025-02-16 18:32:21 2025-02-16 18:32:21 -07:00
arc
83569114c2 vault backup: 2025-02-16 18:27:21 2025-02-16 18:27:21 -07:00
arc
cc823e3f16 vault backup: 2025-02-14 10:57:22 2025-02-14 10:57:23 -07:00
arc
fc5fcc1524 vault backup: 2025-02-09 18:11:32 2025-02-09 18:11:32 -07:00
arc
7b3485d87e vault backup: 2025-02-09 17:25:44 2025-02-09 17:25:44 -07:00
arc
c246b05221 vault backup: 2025-02-09 16:40:33 2025-02-09 16:40:33 -07:00
arc
ba5e4a326f vault backup: 2025-02-09 16:35:33 2025-02-09 16:35:33 -07:00
arc
50e775cf43 vault backup: 2025-02-09 16:30:33 2025-02-09 16:30:33 -07:00
arc
5039193ffd vault backup: 2025-02-07 16:49:27 2025-02-07 16:49:27 -07:00
arc
26dca6629d vault backup: 2025-02-07 11:40:01 2025-02-07 11:40:01 -07:00
arc
6dbef2ee8c vault backup: 2025-02-07 11:05:01 2025-02-07 11:05:01 -07:00
arc
ec0d878c9f vault backup: 2025-02-07 10:35:01 2025-02-07 10:35:01 -07:00
arc
1824b0fbaf vault backup: 2025-02-06 13:13:47 2025-02-06 13:13:47 -07:00
arc
e5f05a16e3 vault backup: 2025-02-06 13:08:47 2025-02-06 13:08:47 -07:00
arc
3987acce9b vault backup: 2025-02-06 13:03:51 2025-02-06 13:03:51 -07:00
arc
3353f92aa4 vault backup: 2025-02-06 12:58:51 2025-02-06 12:58:51 -07:00
arc
7e27d75c5c vault backup: 2025-02-03 17:43:27 2025-02-03 17:43:27 -07:00
arc
ee35a75bb0 vault backup: 2025-02-03 17:38:27 2025-02-03 17:38:27 -07:00
arc
ff4330471b vault backup: 2025-02-03 17:23:28 2025-02-03 17:23:29 -07:00
arc
08065a130b vault backup: 2025-02-03 13:23:54 2025-02-03 13:23:54 -07:00
arc
9c785ecdb9 vault backup: 2025-02-03 13:18:54 2025-02-03 13:18:54 -07:00
arc
b81328a442 vault backup: 2025-02-03 13:13:54 2025-02-03 13:13:54 -07:00
arc
0154999092 vault backup: 2025-02-03 13:08:54 2025-02-03 13:08:54 -07:00
arc
df32788c07 vault backup: 2025-02-03 13:03:55 2025-02-03 13:03:55 -07:00
arc
e985b57ae4 vault backup: 2025-02-03 11:59:23 2025-02-03 11:59:23 -07:00
arc
3b4bb73264 vault backup: 2025-02-03 11:44:23 2025-02-03 11:44:23 -07:00
arc
b4c30e79ef vault backup: 2025-02-03 11:39:23 2025-02-03 11:39:23 -07:00
arc
2456b82189 vault backup: 2025-02-03 11:34:23 2025-02-03 11:34:23 -07:00
arc
1e688a3614 vault backup: 2025-02-03 11:29:24 2025-02-03 11:29:24 -07:00
arc
70f2be9fcb vault backup: 2025-02-03 11:24:08 2025-02-03 11:24:08 -07:00
arc
32186127e2 vault backup: 2025-02-03 11:19:08 2025-02-03 11:19:08 -07:00
arc
116ab612fc vault backup: 2025-02-03 11:14:08 2025-02-03 11:14:08 -07:00
arc
ba1c7d92b6 vault backup: 2025-02-03 11:09:09 2025-02-03 11:09:09 -07:00
arc
8d046bb2a6 vault backup: 2025-02-03 10:19:24 2025-02-03 10:19:24 -07:00
arc
dd8478dd48 vault backup: 2025-02-03 10:14:24 2025-02-03 10:14:24 -07:00
arc
0295402131 vault backup: 2025-02-03 10:09:19 2025-02-03 10:09:19 -07:00
arc
400c362f17 vault backup: 2025-02-03 10:04:19 2025-02-03 10:04:19 -07:00
arc
d54cecc801 vault backup: 2025-02-03 09:59:19 2025-02-03 09:59:19 -07:00
arc
d697cba7ba vault backup: 2025-02-03 09:54:19 2025-02-03 09:54:19 -07:00
arc
ab2da117b9 vault backup: 2025-02-02 18:15:30 2025-02-02 18:15:30 -07:00
arc
4aec1d9883 vault backup: 2025-02-02 17:55:30 2025-02-02 17:55:30 -07:00
arc
ec2dec1d5e vault backup: 2025-02-02 17:50:30 2025-02-02 17:50:30 -07:00
arc
d66a6f21a8 vault backup: 2025-02-02 16:19:27 2025-02-02 16:19:27 -07:00
arc
26c966e0bd vault backup: 2025-02-02 16:14:27 2025-02-02 16:14:27 -07:00
arc
3e31d38873 vault backup: 2025-02-02 16:09:27 2025-02-02 16:09:27 -07:00
arc
d1713efdab vault backup: 2025-01-31 10:12:43 2025-01-31 10:12:43 -07:00
arc
8dae88fc8c vault backup: 2025-01-30 10:03:44 2025-01-30 10:03:44 -07:00
arc
92c8f5f38a vault backup: 2025-01-30 09:58:44 2025-01-30 09:58:44 -07:00
arc
4dd7ed010b vault backup: 2025-01-30 09:53:44 2025-01-30 09:53:44 -07:00
arc
1544af34a4 vault backup: 2025-01-30 09:48:44 2025-01-30 09:48:44 -07:00
arc
0830d6e8e1 vault backup: 2025-01-30 09:43:44 2025-01-30 09:43:44 -07:00
arc
cd2a396d3a vault backup: 2025-01-30 09:38:44 2025-01-30 09:38:44 -07:00
arc
1bf9047fff vault backup: 2025-01-30 09:33:44 2025-01-30 09:33:44 -07:00
arc
31440675b8 vault backup: 2025-01-30 09:28:44 2025-01-30 09:28:44 -07:00
arc
e021897d1e vault backup: 2025-01-30 09:23:43 2025-01-30 09:23:43 -07:00
arc
2711f7e1cd vault backup: 2025-01-30 09:18:43 2025-01-30 09:18:43 -07:00
arc
492926f89e vault backup: 2025-01-30 09:13:43 2025-01-30 09:13:43 -07:00
arc
f441527eb2 vault backup: 2025-01-30 09:08:43 2025-01-30 09:08:43 -07:00
arc
cfd20d5851 vault backup: 2025-01-30 09:03:43 2025-01-30 09:03:43 -07:00
arc
7d7efe3d55 vault backup: 2025-01-30 08:58:43 2025-01-30 08:58:43 -07:00
arc
5898de24cb vault backup: 2025-01-29 10:37:25 2025-01-29 10:37:26 -07:00
arc
2b64aa4f40 vault backup: 2025-01-29 10:18:44 2025-01-29 10:18:44 -07:00
arc
42dcc22972 vault backup: 2025-01-29 10:13:44 2025-01-29 10:13:44 -07:00
arc
ad505f4e04 vault backup: 2025-01-29 10:08:44 2025-01-29 10:08:44 -07:00
arc
7eb094c9f9 vault backup: 2025-01-28 11:24:36 2025-01-28 11:24:36 -07:00
arc
f5dfcf27ed vault backup: 2025-01-28 11:19:36 2025-01-28 11:19:36 -07:00
arc
2f31717a23 vault backup: 2025-01-28 11:14:37 2025-01-28 11:14:37 -07:00
arc
5bff410579 vault backup: 2025-01-27 18:48:20 2025-01-27 18:48:20 -07:00
arc
5a86cf372a vault backup: 2025-01-27 17:42:39 2025-01-27 17:42:39 -07:00
arc
951d27ba85 vault backup: 2025-01-27 11:24:37 2025-01-27 11:24:37 -07:00
arc
085f5bf4a7 vault backup: 2025-01-27 11:19:37 2025-01-27 11:19:37 -07:00
arc
46f7a2c9b5 vault backup: 2025-01-27 10:47:59 2025-01-27 10:47:59 -07:00
arc
0acfe2ddd3 vault backup: 2025-01-27 10:42:59 2025-01-27 10:42:59 -07:00
arc
defef3e3b1 vault backup: 2025-01-27 10:37:59 2025-01-27 10:37:59 -07:00
arc
24c0a5639d vault backup: 2025-01-27 10:27:06 2025-01-27 10:27:06 -07:00
arc
8c346a674b vault backup: 2025-01-26 18:55:09 2025-01-26 18:55:09 -07:00
arc
232b5f2709 vault backup: 2025-01-26 17:57:19 2025-01-26 17:57:19 -07:00
arc
89a56a9d16 vault backup: 2025-01-26 17:52:19 2025-01-26 17:52:19 -07:00
arc
c5584123d2 vault backup: 2025-01-26 17:47:19 2025-01-26 17:47:19 -07:00
arc
e8b4376546 vault backup: 2025-01-26 17:42:19 2025-01-26 17:42:19 -07:00
arc
b2aacf61ff vault backup: 2025-01-26 17:37:19 2025-01-26 17:37:19 -07:00
arc
032efeb055 vault backup: 2025-01-26 17:32:19 2025-01-26 17:32:19 -07:00
arc
f0f52ceacd vault backup: 2025-01-26 17:21:04 2025-01-26 17:21:04 -07:00
arc
20650f2916 vault backup: 2025-01-21 13:00:48 2025-01-21 13:00:48 -07:00
arc
a5661f686d vault backup: 2025-01-21 12:55:49 2025-01-21 12:55:49 -07:00
arc
51bfc78a36 vault backup: 2025-01-21 12:49:38 2025-01-21 12:49:38 -07:00
arc
37fb816baa vault backup: 2025-01-21 12:44:38 2025-01-21 12:44:38 -07:00
arc
8e3bb33d7c vault backup: 2025-01-21 12:39:38 2025-01-21 12:39:38 -07:00
arc
d0f0166fb5 vault backup: 2025-01-21 12:34:38 2025-01-21 12:34:38 -07:00
arc
ddb268ef39 vault backup: 2025-01-21 12:29:38 2025-01-21 12:29:38 -07:00
arc
4b7a25496e vault backup: 2025-01-21 12:24:38 2025-01-21 12:24:38 -07:00
arc
d963b081d9 vault backup: 2025-01-21 12:19:38 2025-01-21 12:19:38 -07:00
arc
d8e7b06c2c vault backup: 2025-01-21 12:14:38 2025-01-21 12:14:38 -07:00
arc
debaf2bace vault backup: 2025-01-21 12:09:38 2025-01-21 12:09:38 -07:00
arc
b6bb60e548 vault backup: 2025-01-21 12:04:38 2025-01-21 12:04:38 -07:00
arc
08dcd5104e vault backup: 2025-01-17 16:06:27 2025-01-17 16:06:27 -07:00
arc
0784d7df66 vault backup: 2025-01-17 16:01:27 2025-01-17 16:01:27 -07:00
arc
589b03582b vault backup: 2025-01-17 15:56:27 2025-01-17 15:56:27 -07:00
arc
77ec466cd0 vault backup: 2025-01-17 15:51:27 2025-01-17 15:51:27 -07:00
arc
64764837b3 vault backup: 2025-01-17 15:03:02 2025-01-17 15:03:02 -07:00
arc
b30345915f vault backup: 2025-01-17 14:58:02 2025-01-17 14:58:02 -07:00
arc
47ba2bb11d vault backup: 2025-01-14 18:32:16 2025-01-14 18:32:16 -07:00
arc
3873085ccd vault backup: 2025-01-13 13:29:26 2025-01-13 13:29:26 -07:00
arc
fcf0fcc1fb vault backup: 2025-01-13 13:24:26 2025-01-13 13:24:26 -07:00
arc
b51fce6bac vault backup: 2025-01-13 13:19:26 2025-01-13 13:19:26 -07:00
arc
dd0a77e726 vault backup: 2025-01-13 13:14:26 2025-01-13 13:14:26 -07:00
arc
518bd4620f vault backup: 2025-01-13 13:09:26 2025-01-13 13:09:26 -07:00
arc
b2e6171f7b vault backup: 2025-01-13 12:45:49 2025-01-13 12:45:49 -07:00
arc
c0ca143aa1 vault backup: 2025-01-13 12:40:49 2025-01-13 12:40:49 -07:00
arc
8009812a1f vault backup: 2025-01-13 12:35:49 2025-01-13 12:35:49 -07:00
arc
e16bde1c2c vault backup: 2025-01-13 12:30:49 2025-01-13 12:30:49 -07:00
arc
6b4861debf vault backup: 2025-01-13 12:25:49 2025-01-13 12:25:49 -07:00
arc
1deb209d3a vault backup: 2025-01-13 12:20:31 2025-01-13 12:20:31 -07:00
arc
f7e08f0cbe vault backup: 2025-01-13 12:15:31 2025-01-13 12:15:31 -07:00
arc
ff39338ae3 vault backup: 2025-01-13 09:47:25 2025-01-13 09:47:25 -07:00
arc
e65ad8f817 vault backup: 2025-01-13 09:42:25 2025-01-13 09:42:25 -07:00
arc
46e32cbea1 vault backup: 2025-01-13 09:37:25 2025-01-13 09:37:25 -07:00
arc
bd133a2216 vault backup: 2025-01-13 09:32:25 2025-01-13 09:32:25 -07:00
arc
1531a0727d vault backup: 2025-01-12 18:10:21 2025-01-12 18:10:21 -07:00
arc
1e4b6518c8 vault backup: 2025-01-12 17:35:21 2025-01-12 17:35:21 -07:00
arc
03fefacc45 vault backup: 2025-01-12 17:30:22 2025-01-12 17:30:22 -07:00
arc
3807a75b5b vault backup: 2025-01-10 10:46:30 2025-01-10 10:46:30 -07:00
arc
dcc08d7492 vault backup: 2025-01-10 10:02:03 2025-01-10 10:02:03 -07:00
arc
f602401dc8 vault backup: 2025-01-10 09:57:03 2025-01-10 09:57:03 -07:00
arc
61103fb0d4 vault backup: 2025-01-10 09:52:03 2025-01-10 09:52:03 -07:00
arc
132af086cb vault backup: 2025-01-10 09:42:02 2025-01-10 09:42:03 -07:00
arc
905e49b4d7 vault backup: 2025-01-10 09:37:02 2025-01-10 09:37:02 -07:00
arc
c0fd3b66ab vault backup: 2025-01-10 09:32:02 2025-01-10 09:32:02 -07:00
arc
c5cfc463c8 vault backup: 2025-01-10 09:27:02 2025-01-10 09:27:02 -07:00
arc
081bff2367 vault backup: 2025-01-10 09:22:02 2025-01-10 09:22:02 -07:00
arc
40e6e9b8b5 vault backup: 2025-01-10 09:17:02 2025-01-10 09:17:02 -07:00
arc
876b6b73aa vault backup: 2025-01-09 14:12:03 2025-01-09 14:12:03 -07:00
arc
2e2ae5fd4e vault backup: 2025-01-09 14:07:03 2025-01-09 14:07:03 -07:00
arc
2170f4a264 vault backup: 2025-01-09 13:47:04 2025-01-09 13:47:04 -07:00
arc
d743d8ca93 vault backup: 2025-01-09 13:21:59 2025-01-09 13:21:59 -07:00
arc
7e6d46d699 vault backup: 2025-01-09 13:16:59 2025-01-09 13:16:59 -07:00
arc
0fc3adb514 vault backup: 2025-01-09 13:11:59 2025-01-09 13:11:59 -07:00
arc
57a37356cc vault backup: 2025-01-09 13:06:59 2025-01-09 13:06:59 -07:00
arc
c3016ca483 vault backup: 2025-01-09 11:25:52 2025-01-09 11:25:52 -07:00
arc
b8b1ac748d vault backup: 2025-01-09 11:00:52 2025-01-09 11:00:52 -07:00
arc
6234484ffe vault backup: 2025-01-08 12:18:17 2025-01-08 12:18:17 -07:00
arc
b8eb7ce640 vault backup: 2025-01-08 12:13:17 2025-01-08 12:13:17 -07:00
arc
562b783463 vault backup: 2025-01-08 12:08:17 2025-01-08 12:08:17 -07:00
arc
00b837abaf vault backup: 2025-01-08 12:03:17 2025-01-08 12:03:17 -07:00
arc
6a8bda4f8b vault backup: 2025-01-08 11:58:17 2025-01-08 11:58:17 -07:00
arc
d9aeb6320a vault backup: 2025-01-07 18:34:44 2025-01-07 18:34:44 -07:00
arc
236165cdd2 vault backup: 2025-01-07 18:29:44 2025-01-07 18:29:44 -07:00
arc
f5c776708a vault backup: 2025-01-07 18:24:44 2025-01-07 18:24:44 -07:00
arc
b34904f895 vault backup: 2025-01-07 18:19:44 2025-01-07 18:19:44 -07:00
arc
c99ca523f4 vault backup: 2025-01-07 18:14:44 2025-01-07 18:14:44 -07:00
arc
544cfb24fc vault backup: 2025-01-07 18:09:44 2025-01-07 18:09:44 -07:00
arc
e93c22f928 vault backup: 2024-12-23 12:47:11 2024-12-23 12:47:11 -07:00
arc
6150508f04 vault backup: 2024-12-20 14:11:41 2024-12-20 14:11:41 -07:00
arc
54a644d8e4 vault backup: 2024-12-20 13:36:41 2024-12-20 13:36:41 -07:00
arc
552f7226d4 vault backup: 2024-12-20 13:30:15 2024-12-20 13:30:15 -07:00
arc
53fae86447 vault backup: 2024-12-20 13:00:15 2024-12-20 13:00:15 -07:00
arc
d99bc67e12 vault backup: 2024-12-17 12:40:57 2024-12-17 12:40:57 -07:00
arc
1d3289c0f5 vault backup: 2024-12-16 16:17:49 2024-12-16 16:17:49 -07:00
arc
7304a3eaf2 vault backup: 2024-12-10 09:24:37 2024-12-10 09:24:37 -07:00
arc
14fb33389f vault backup: 2024-12-08 18:54:15 2024-12-08 18:54:15 -07:00
arc
05583a43ee vault backup: 2024-12-05 20:05:17 2024-12-05 20:05:17 -07:00
arc
5b981260aa vault backup: 2024-12-05 20:00:17 2024-12-05 20:00:17 -07:00
arc
561b65dcba vault backup: 2024-12-05 10:34:01 2024-12-05 10:34:01 -07:00
arc
8b843bde9c vault backup: 2024-12-05 09:59:29 2024-12-05 09:59:29 -07:00
arc
3445037dbd vault backup: 2024-12-05 08:50:05 2024-12-05 08:50:05 -07:00
arc
54f5138921 vault backup: 2024-12-04 15:43:49 2024-12-04 15:43:49 -07:00
arc
0b4f0774cb vault backup: 2024-12-04 11:03:03 2024-12-04 11:03:03 -07:00
arc
2d797bd20e vault backup: 2024-12-04 10:01:27 2024-12-04 10:01:27 -07:00
arc
27f5e2bdef vault backup: 2024-12-04 09:56:27 2024-12-04 09:56:27 -07:00
arc
ccce9cd4bf vault backup: 2024-12-03 16:28:30 2024-12-03 16:28:30 -07:00
arc
6373eecb70 vault backup: 2024-12-03 16:23:30 2024-12-03 16:23:30 -07:00
arc
c49a89b19e vault backup: 2024-12-03 13:01:09 2024-12-03 13:01:09 -07:00
arc
2a79b50cd3 vault backup: 2024-12-03 12:56:09 2024-12-03 12:56:09 -07:00
arc
35f029178a vault backup: 2024-12-03 12:51:09 2024-12-03 12:51:09 -07:00
arc
7b2836e81c vault backup: 2024-12-03 12:46:09 2024-12-03 12:46:09 -07:00
arc
d3fc0c4951 vault backup: 2024-12-03 12:41:09 2024-12-03 12:41:09 -07:00
arc
b53776eabe vault backup: 2024-12-03 12:36:09 2024-12-03 12:36:09 -07:00
arc
ff72fd447e vault backup: 2024-12-03 12:31:09 2024-12-03 12:31:09 -07:00
arc
cbb77a9283 vault backup: 2024-12-03 12:26:09 2024-12-03 12:26:09 -07:00
arc
716569071b vault backup: 2024-12-03 12:21:09 2024-12-03 12:21:09 -07:00
arc
d8a5a79e51 vault backup: 2024-12-03 12:16:09 2024-12-03 12:16:09 -07:00
arc
939d0f9684 vault backup: 2024-12-03 12:11:09 2024-12-03 12:11:09 -07:00
arc
20ea35ac14 vault backup: 2024-12-02 11:42:53 2024-12-02 11:42:53 -07:00
arc
c01734fb7a vault backup: 2024-12-02 10:18:13 2024-12-02 10:18:13 -07:00
arc
0356193ef6 vault backup: 2024-12-02 10:13:13 2024-12-02 10:13:13 -07:00
arc
1bd382f85c vault backup: 2024-12-02 10:08:13 2024-12-02 10:08:13 -07:00
arc
e56a34a41c vault backup: 2024-12-02 09:48:12 2024-12-02 09:48:12 -07:00
arc
1749c6225e vault backup: 2024-11-28 16:12:59 2024-11-28 16:12:59 -07:00
arc
8a19d78dfc vault backup: 2024-11-25 13:08:35 2024-11-25 13:08:35 -07:00
arc
2650229bce vault backup: 2024-11-25 10:26:36 2024-11-25 10:26:36 -07:00
arc
65ac315a29 vault backup: 2024-11-25 10:16:37 2024-11-25 10:16:37 -07:00
arc
f91a30aa5b vault backup: 2024-11-25 10:11:37 2024-11-25 10:11:37 -07:00
arc
1cba982320 vault backup: 2024-11-25 10:06:37 2024-11-25 10:06:37 -07:00
arc
bae0e45d21 vault backup: 2024-11-25 10:01:37 2024-11-25 10:01:37 -07:00
arc
e5ba16e8a1 vault backup: 2024-11-25 09:56:37 2024-11-25 09:56:37 -07:00
arc
2f1d3f2f72 vault backup: 2024-11-25 09:51:37 2024-11-25 09:51:37 -07:00
arc
33fe846675 vault backup: 2024-11-25 09:46:37 2024-11-25 09:46:37 -07:00
arc
e24bb9e78c sync 2024-11-25 09:43:43 -07:00
eaef75538b vault backup: 2024-11-22 18:22:25 2024-11-22 18:22:25 -07:00
8fdb1c61bf vault backup: 2024-11-20 11:08:57 2024-11-20 11:08:57 -07:00
d4325eb528 vault backup: 2024-11-20 11:03:57 2024-11-20 11:03:57 -07:00
3777c8a9fb vault backup: 2024-11-20 10:58:57 2024-11-20 10:58:57 -07:00
bd95038b9c vault backup: 2024-11-20 10:53:57 2024-11-20 10:53:57 -07:00
1911f9cfef vault backup: 2024-11-19 22:10:22 2024-11-19 22:10:22 -07:00
56b77cc8ff vault backup: 2024-11-19 22:05:20 2024-11-19 22:05:20 -07:00
a406845641 vault backup: 2024-11-19 22:00:20 2024-11-19 22:00:20 -07:00
9225582340 vault backup: 2024-11-19 21:54:36 2024-11-19 21:54:36 -07:00
b677e73bbe vault backup: 2024-11-19 21:49:36 2024-11-19 21:49:36 -07:00
7661f4b835 vault backup: 2024-11-19 21:44:36 2024-11-19 21:44:36 -07:00
59395f8e1c vault backup: 2024-11-19 21:31:02 2024-11-19 21:31:02 -07:00
a5ad33523f vault backup: 2024-11-19 21:26:03 2024-11-19 21:26:03 -07:00
35c54292c8 vault backup: 2024-11-19 21:02:30 2024-11-19 21:02:30 -07:00
743e1a320d vault backup: 2024-11-19 20:57:20 2024-11-19 20:57:20 -07:00
d5d9a922db vault backup: 2024-11-19 14:25:06 2024-11-19 14:25:06 -07:00
a036bfb790 vault backup: 2024-11-19 14:20:06 2024-11-19 14:20:06 -07:00
5484db6823 vault backup: 2024-11-19 14:15:06 2024-11-19 14:15:06 -07:00
c4e36ab804 vault backup: 2024-11-19 14:10:06 2024-11-19 14:10:06 -07:00
8ffad97607 vault backup: 2024-11-19 14:05:06 2024-11-19 14:05:06 -07:00
eecd4ba098 vault backup: 2024-11-19 13:55:06 2024-11-19 13:55:06 -07:00
d35fb4f304 vault backup: 2024-11-19 13:24:02 2024-11-19 13:24:02 -07:00
21a0279348 vault backup: 2024-11-19 13:07:21 2024-11-19 13:07:21 -07:00
67562c24a2 vault backup: 2024-11-19 13:02:21 2024-11-19 13:02:21 -07:00
f0e5fbd5cc vault backup: 2024-11-19 12:57:21 2024-11-19 12:57:21 -07:00
99e8593199 vault backup: 2024-11-19 12:52:21 2024-11-19 12:52:21 -07:00
3329ef62f5 vault backup: 2024-11-19 12:47:21 2024-11-19 12:47:21 -07:00
e69b5e9365 vault backup: 2024-11-19 12:42:21 2024-11-19 12:42:21 -07:00
c15919b524 vault backup: 2024-11-19 12:37:21 2024-11-19 12:37:21 -07:00
fb9dd21b96 vault backup: 2024-11-19 12:32:21 2024-11-19 12:32:21 -07:00
b4645c291f vault backup: 2024-11-19 12:27:21 2024-11-19 12:27:21 -07:00
3c8bba0d8f vault backup: 2024-11-19 12:22:21 2024-11-19 12:22:21 -07:00
450f6c4228 vault backup: 2024-11-19 12:12:21 2024-11-19 12:12:21 -07:00
1e91beb631 vault backup: 2024-11-18 11:05:09 2024-11-18 11:05:09 -07:00
4e8b44c0b1 vault backup: 2024-11-18 11:00:09 2024-11-18 11:00:09 -07:00
bccb5776d1 vault backup: 2024-11-16 20:33:44 2024-11-16 20:33:44 -07:00
af8092a3e9 vault backup: 2024-11-15 23:23:12 2024-11-15 23:23:12 -07:00
f6133e4011 vault backup: 2024-11-15 18:36:06 2024-11-15 18:36:06 -07:00
d92830fb1c vault backup: 2024-11-15 14:28:32 2024-11-15 14:28:32 -07:00
489b010ab5 vault backup: 2024-11-15 14:18:25 2024-11-15 14:18:25 -07:00
23a2998a46 vault backup: 2024-11-15 14:13:25 2024-11-15 14:13:25 -07:00
0ce9c71a39 vault backup: 2024-11-15 14:08:25 2024-11-15 14:08:25 -07:00
0ba62cee12 vault backup: 2024-11-15 14:03:25 2024-11-15 14:03:25 -07:00
6dc499f253 vault backup: 2024-11-15 13:58:25 2024-11-15 13:58:25 -07:00
f307123921 vault backup: 2024-11-15 13:53:25 2024-11-15 13:53:25 -07:00
6572205b37 vault backup: 2024-11-15 13:48:25 2024-11-15 13:48:25 -07:00
be3194801f vault backup: 2024-11-14 09:11:40 2024-11-14 09:11:40 -07:00
1503169e99 vault backup: 2024-11-14 09:06:40 2024-11-14 09:06:40 -07:00
e174520f8e vault backup: 2024-11-14 09:01:40 2024-11-14 09:01:40 -07:00
055f5d5f4f vault backup: 2024-11-14 08:51:40 2024-11-14 08:51:40 -07:00
4e837f3389 vault backup: 2024-11-14 08:41:40 2024-11-14 08:41:40 -07:00
dc84d2706e vault backup: 2024-11-14 08:31:40 2024-11-14 08:31:40 -07:00
0b58a2c232 vault backup: 2024-11-14 08:26:40 2024-11-14 08:26:40 -07:00
8e5907493c vault backup: 2024-11-14 08:21:40 2024-11-14 08:21:40 -07:00
df744f6624 vault backup: 2024-11-14 08:16:40 2024-11-14 08:16:40 -07:00
a81d45d0c3 vault backup: 2024-11-14 08:11:40 2024-11-14 08:11:40 -07:00
449bcdd287 vault backup: 2024-11-14 08:06:40 2024-11-14 08:06:40 -07:00
1bf8873a0e vault backup: 2024-11-14 08:01:30 2024-11-14 08:01:30 -07:00
172db6b481 vault backup: 2024-11-14 07:56:30 2024-11-14 07:56:30 -07:00
e73027234b vault backup: 2024-11-14 07:51:30 2024-11-14 07:51:30 -07:00
be7d2ba90a vault backup: 2024-11-14 07:46:30 2024-11-14 07:46:30 -07:00
3e17b9c0f7 vault backup: 2024-11-14 07:41:30 2024-11-14 07:41:30 -07:00
22b8250525 vault backup: 2024-11-14 07:36:30 2024-11-14 07:36:30 -07:00
6f59428472 vault backup: 2024-11-14 07:31:30 2024-11-14 07:31:30 -07:00
07e4d325b8 vault backup: 2024-11-14 07:26:30 2024-11-14 07:26:30 -07:00
9fdee9481f vault backup: 2024-11-14 07:21:30 2024-11-14 07:21:30 -07:00
053e749c50 vault backup: 2024-11-14 07:16:30 2024-11-14 07:16:30 -07:00
8ba8dc5a19 vault backup: 2024-11-14 07:11:01 2024-11-14 07:11:01 -07:00
1b01b359cf vault backup: 2024-11-14 07:06:01 2024-11-14 07:06:01 -07:00
95e8231a61 vault backup: 2024-11-14 07:01:01 2024-11-14 07:01:01 -07:00
b222200373 vault backup: 2024-11-13 23:55:50 2024-11-13 23:55:50 -07:00
505cf89f71 vault backup: 2024-11-13 23:50:50 2024-11-13 23:50:50 -07:00
1a89180a38 vault backup: 2024-11-13 23:45:50 2024-11-13 23:45:50 -07:00
90c66a4b22 vault backup: 2024-11-13 23:40:50 2024-11-13 23:40:50 -07:00
e92632bfcc vault backup: 2024-11-13 23:35:50 2024-11-13 23:35:50 -07:00
6b2010fc36 vault backup: 2024-11-13 23:30:50 2024-11-13 23:30:50 -07:00
5f25b7571e vault backup: 2024-11-12 13:27:51 2024-11-12 13:27:51 -07:00
8494819529 vault backup: 2024-11-12 13:05:01 2024-11-12 13:05:01 -07:00
3249a4962f vault backup: 2024-11-12 12:59:01 2024-11-12 12:59:01 -07:00
2b6daad095 vault backup: 2024-11-12 12:53:50 2024-11-12 12:53:50 -07:00
e228e51a47 vault backup: 2024-11-12 12:48:48 2024-11-12 12:48:48 -07:00
de40f0ef64 vault backup: 2024-11-12 12:43:48 2024-11-12 12:43:48 -07:00
90cf76f26b vault backup: 2024-11-12 12:38:49 2024-11-12 12:38:49 -07:00
4dcb55ab6c vault backup: 2024-11-11 21:48:16 2024-11-11 21:48:16 -07:00
3cb8e2c541 vault backup: 2024-11-11 21:43:16 2024-11-11 21:43:16 -07:00
8dba7a9dc1 vault backup: 2024-11-11 21:38:16 2024-11-11 21:38:16 -07:00
01a3e6ed52 vault backup: 2024-11-11 21:33:17 2024-11-11 21:33:17 -07:00
86f9630806 vault backup: 2024-11-11 21:28:15 2024-11-11 21:28:15 -07:00
6a21810c79 vault backup: 2024-11-10 22:11:06 2024-11-10 22:11:06 -07:00
d1232122ff vault backup: 2024-11-10 21:56:06 2024-11-10 21:56:06 -07:00
a1a7261269 vault backup: 2024-11-10 21:51:06 2024-11-10 21:51:06 -07:00
54375bff52 vault backup: 2024-11-10 21:46:06 2024-11-10 21:46:06 -07:00
71e73a9ef1 vault backup: 2024-11-10 21:41:06 2024-11-10 21:41:06 -07:00
d6f47d0f95 vault backup: 2024-11-10 21:36:06 2024-11-10 21:36:06 -07:00
a722cdd3b7 vault backup: 2024-11-10 21:31:06 2024-11-10 21:31:06 -07:00
a720c5d1f7 vault backup: 2024-11-10 21:26:06 2024-11-10 21:26:06 -07:00
b502602382 vault backup: 2024-11-10 21:21:06 2024-11-10 21:21:06 -07:00
5fee60ba7b vault backup: 2024-11-10 21:01:06 2024-11-10 21:01:06 -07:00
081dfe7116 vault backup: 2024-11-10 20:56:06 2024-11-10 20:56:06 -07:00
86ecc96c92 vault backup: 2024-11-10 20:51:05 2024-11-10 20:51:05 -07:00
2799f844b4 vault backup: 2024-11-10 20:46:05 2024-11-10 20:46:06 -07:00
21f55263c0 vault backup: 2024-11-10 20:41:05 2024-11-10 20:41:05 -07:00
6fc73295ae vault backup: 2024-11-10 20:36:05 2024-11-10 20:36:05 -07:00
669658b79e vault backup: 2024-11-10 20:31:05 2024-11-10 20:31:05 -07:00
2fdeda7c0a vault backup: 2024-11-10 20:21:05 2024-11-10 20:21:05 -07:00
33e56653a6 vault backup: 2024-11-07 13:13:12 2024-11-07 13:13:12 -07:00
4175313852 vault backup: 2024-11-07 13:08:13 2024-11-07 13:08:13 -07:00
580c08eecb vault backup: 2024-11-07 09:22:40 2024-11-07 09:22:40 -07:00
5d7e7e7f30 vault backup: 2024-11-07 09:17:40 2024-11-07 09:17:40 -07:00
c411cc2ee7 vault backup: 2024-11-07 09:12:40 2024-11-07 09:12:40 -07:00
c80df1b114 vault backup: 2024-11-07 09:07:40 2024-11-07 09:07:40 -07:00
908a3dce9d vault backup: 2024-11-07 09:02:40 2024-11-07 09:02:40 -07:00
7935e9d8a8 vault backup: 2024-11-07 08:47:40 2024-11-07 08:47:40 -07:00
1aea8df372 vault backup: 2024-11-07 08:42:40 2024-11-07 08:42:40 -07:00
af925265e8 vault backup: 2024-11-07 08:37:36 2024-11-07 08:37:36 -07:00
59bfa717b9 vault backup: 2024-11-07 08:32:36 2024-11-07 08:32:36 -07:00
c652257eae vault backup: 2024-11-07 08:27:36 2024-11-07 08:27:36 -07:00
00c5149d7d vault backup: 2024-11-07 08:01:10 2024-11-07 08:01:10 -07:00
6884a69188 vault backup: 2024-11-07 07:56:09 2024-11-07 07:56:09 -07:00
0ebe13465e vault backup: 2024-11-07 07:46:04 2024-11-07 07:46:04 -07:00
7308d94e02 vault backup: 2024-11-07 07:40:37 2024-11-07 07:40:37 -07:00
151a88c14e vault backup: 2024-11-06 11:30:08 2024-11-06 11:30:08 -07:00
0940db21c8 vault backup: 2024-11-05 11:43:30 2024-11-05 11:43:30 -07:00
5c37c59fa8 vault backup: 2024-11-05 11:38:30 2024-11-05 11:38:30 -07:00
a8819068c3 vault backup: 2024-11-05 11:33:13 2024-11-05 11:33:13 -07:00
73e3013160 vault backup: 2024-11-05 11:28:09 2024-11-05 11:28:09 -07:00
086b771d9e vault backup: 2024-11-05 11:23:09 2024-11-05 11:23:09 -07:00
b2145afe2d vault backup: 2024-11-04 11:55:02 2024-11-04 11:55:02 -07:00
456283d25b vault backup: 2024-11-04 11:25:50 2024-11-04 11:25:50 -07:00
470d0422e2 vault backup: 2024-11-03 17:01:24 2024-11-03 17:01:24 -07:00
0decb67b08 vault backup: 2024-11-03 15:14:05 2024-11-03 15:14:05 -07:00
06fd14c57c vault backup: 2024-11-03 14:35:04 2024-11-03 14:35:04 -07:00
b434383ae8 vault backup: 2024-11-03 14:30:04 2024-11-03 14:30:04 -07:00
7e83d70c8f vault backup: 2024-11-03 14:25:04 2024-11-03 14:25:04 -07:00
0e2586459f vault backup: 2024-11-03 14:20:04 2024-11-03 14:20:04 -07:00
a46466ade3 vault backup: 2024-11-03 14:15:04 2024-11-03 14:15:04 -07:00
6a77276898 vault backup: 2024-11-03 14:10:04 2024-11-03 14:10:04 -07:00
fa3005c373 vault backup: 2024-11-03 14:05:04 2024-11-03 14:05:04 -07:00
b802ac20e6 vault backup: 2024-11-03 13:58:19 2024-11-03 13:58:19 -07:00
d899794e1f vault backup: 2024-11-03 13:03:05 2024-11-03 13:03:05 -07:00
9e7cadbd57 vault backup: 2024-11-01 19:57:35 2024-11-01 19:57:35 -06:00
4578ffcfc1 vault backup: 2024-11-01 19:27:35 2024-11-01 19:27:35 -06:00
80e55a2cdc vault backup: 2024-11-01 18:51:35 2024-11-01 18:51:35 -06:00
95c2879094 vault backup: 2024-11-01 18:46:35 2024-11-01 18:46:35 -06:00
345189f5c0 vault backup: 2024-11-01 18:41:33 2024-11-01 18:41:33 -06:00
90b7ac60e4 vault backup: 2024-11-01 18:36:34 2024-11-01 18:36:34 -06:00
22f9efc089 vault backup: 2024-11-01 18:31:34 2024-11-01 18:31:34 -06:00
361c6777dc vault backup: 2024-11-01 18:26:34 2024-11-01 18:26:34 -06:00
f33146900e vault backup: 2024-11-01 18:21:34 2024-11-01 18:21:34 -06:00
8ddf50bbff vault backup: 2024-11-01 18:16:34 2024-11-01 18:16:34 -06:00
c3b0044e1d vault backup: 2024-11-01 18:11:33 2024-11-01 18:11:34 -06:00
d159fb2f00 vault backup: 2024-11-01 17:38:05 2024-11-01 17:38:05 -06:00
01dea96c49 vault backup: 2024-11-01 17:33:05 2024-11-01 17:33:05 -06:00
697cb152ee vault backup: 2024-11-01 17:15:03 2024-11-01 17:15:03 -06:00
e623a7afc6 vault backup: 2024-11-01 17:10:02 2024-11-01 17:10:02 -06:00
e65d971cfb vault backup: 2024-11-01 16:36:53 2024-11-01 16:36:54 -06:00
f25d8a00b5 vault backup: 2024-11-01 16:09:27 2024-11-01 16:09:27 -06:00
ff27a1fdb6 vault backup: 2024-11-01 16:04:27 2024-11-01 16:04:27 -06:00
a30384d1d3 vault backup: 2024-11-01 15:59:27 2024-11-01 15:59:27 -06:00
00325e56bd vault backup: 2024-11-01 15:54:27 2024-11-01 15:54:27 -06:00
02483df21c vault backup: 2024-11-01 15:49:27 2024-11-01 15:49:27 -06:00
580fb230a9 vault backup: 2024-11-01 15:44:27 2024-11-01 15:44:27 -06:00
8c39085ce3 vault backup: 2024-11-01 15:39:27 2024-11-01 15:39:27 -06:00
0870e5ab2b vault backup: 2024-11-01 13:28:59 2024-11-01 13:28:59 -06:00
0cbe502348 vault backup: 2024-11-01 13:23:59 2024-11-01 13:23:59 -06:00
2e3053784b vault backup: 2024-11-01 13:18:59 2024-11-01 13:18:59 -06:00
77e7cdf760 vault backup: 2024-10-28 11:20:14 2024-10-28 11:20:14 -06:00
21dd78dedc vault backup: 2024-10-28 11:15:14 2024-10-28 11:15:14 -06:00
c7e04c17fb vault backup: 2024-10-28 11:10:14 2024-10-28 11:10:14 -06:00
5325bb45e2 vault backup: 2024-10-28 11:05:14 2024-10-28 11:05:14 -06:00
a18e3fa00d vault backup: 2024-10-28 11:00:14 2024-10-28 11:00:14 -06:00
6bb610f896 vault backup: 2024-10-28 10:55:14 2024-10-28 10:55:14 -06:00
75074fe98d vault backup: 2024-10-28 10:50:14 2024-10-28 10:50:14 -06:00
56a41f58c6 vault backup: 2024-10-28 10:45:14 2024-10-28 10:45:14 -06:00
cae09887da vault backup: 2024-10-28 10:30:15 2024-10-28 10:30:15 -06:00
7d58412a45 vault backup: 2024-10-28 09:31:30 2024-10-28 09:31:30 -06:00
dc9a5d0289 vault backup: 2024-10-28 09:26:30 2024-10-28 09:26:30 -06:00
d430c4fff9 vault backup: 2024-10-28 09:21:30 2024-10-28 09:21:30 -06:00
c3c3962b4b vault backup: 2024-10-26 19:38:26 2024-10-26 19:38:26 -06:00
eba8eb715d vault backup: 2024-10-26 19:33:26 2024-10-26 19:33:26 -06:00
fa81186df9 vault backup: 2024-10-26 19:28:26 2024-10-26 19:28:26 -06:00
a9bc338a6e vault backup: 2024-10-26 19:23:26 2024-10-26 19:23:26 -06:00
b88d3b4c02 vault backup: 2024-10-25 14:32:38 2024-10-25 14:32:38 -06:00
9269af0cdd vault backup: 2024-10-25 14:06:54 2024-10-25 14:06:54 -06:00
f5c0b5f1bf vault backup: 2024-10-25 14:01:54 2024-10-25 14:01:54 -06:00
87121bd4a2 vault backup: 2024-10-25 13:56:54 2024-10-25 13:56:54 -06:00
22548282c3 vault backup: 2024-10-25 13:51:54 2024-10-25 13:51:54 -06:00
c597a67b41 vault backup: 2024-10-25 13:46:54 2024-10-25 13:46:54 -06:00
4e834b5ebb vault backup: 2024-10-24 10:23:18 2024-10-24 10:23:18 -06:00
d5b3c54761 vault backup: 2024-10-22 20:46:27 2024-10-22 20:46:27 -06:00
eb2fca5f2d vault backup: 2024-10-22 20:41:27 2024-10-22 20:41:27 -06:00
da93ab2c5a vault backup: 2024-10-22 17:36:38 2024-10-22 17:36:38 -06:00
8cc26e7959 vault backup: 2024-10-22 13:26:47 2024-10-22 13:26:47 -06:00
e5472a7b24 vault backup: 2024-10-22 13:09:00 2024-10-22 13:09:00 -06:00
764563a5bf vault backup: 2024-10-22 13:04:00 2024-10-22 13:04:00 -06:00
293adc2ee2 vault backup: 2024-10-22 12:59:00 2024-10-22 12:59:00 -06:00
248b8d8de9 vault backup: 2024-10-22 12:54:00 2024-10-22 12:54:00 -06:00
070367f6be vault backup: 2024-10-22 12:49:00 2024-10-22 12:49:00 -06:00
7b0824a620 vault backup: 2024-10-22 12:44:00 2024-10-22 12:44:00 -06:00
a384a14e5d vault backup: 2024-10-22 12:39:00 2024-10-22 12:39:00 -06:00
081f25169a vault backup: 2024-10-22 12:34:00 2024-10-22 12:34:00 -06:00
9aefc75085 vault backup: 2024-10-22 12:29:00 2024-10-22 12:29:00 -06:00
8def4dbc8e vault backup: 2024-10-22 11:20:29 2024-10-22 11:20:29 -06:00
35b709d7ff vault backup: 2024-10-21 14:55:31 2024-10-21 14:55:31 -06:00
523f968027 vault backup: 2024-10-21 14:31:46 2024-10-21 14:31:46 -06:00
9c98139af9 vault backup: 2024-10-21 10:00:25 2024-10-21 10:00:25 -06:00
e617329f6c vault backup: 2024-10-21 09:53:49 2024-10-21 09:53:49 -06:00
29456aebb0 vault backup: 2024-10-21 09:48:49 2024-10-21 09:48:49 -06:00
0b5764724d vault backup: 2024-10-21 09:43:49 2024-10-21 09:43:49 -06:00
9395076558 vault backup: 2024-10-21 09:38:49 2024-10-21 09:38:49 -06:00
4d56d80666 vault backup: 2024-10-20 15:46:26 2024-10-20 15:46:26 -06:00
187699f144 vault backup: 2024-10-16 11:23:24 2024-10-16 11:23:24 -06:00
4dfc708a72 vault backup: 2024-10-16 10:18:30 2024-10-16 10:18:30 -06:00
fdec43ed1e vault backup: 2024-10-16 10:07:57 2024-10-16 10:07:57 -06:00
927e3d0bde vault backup: 2024-10-15 20:42:02 2024-10-15 20:42:02 -06:00
bf6755c28c vault backup: 2024-10-15 20:37:02 2024-10-15 20:37:02 -06:00
42c9acef99 vault backup: 2024-10-15 20:32:02 2024-10-15 20:32:02 -06:00
5e72d7bfef vault backup: 2024-10-15 20:27:02 2024-10-15 20:27:02 -06:00
1d132f8316 vault backup: 2024-10-15 20:22:02 2024-10-15 20:22:02 -06:00
df71fccae1 vault backup: 2024-10-15 13:28:11 2024-10-15 13:28:11 -06:00
c53729feb4 vault backup: 2024-10-15 13:12:53 2024-10-15 13:12:53 -06:00
39e66d507c vault backup: 2024-10-15 13:02:53 2024-10-15 13:02:53 -06:00
2a9ca1d79f vault backup: 2024-10-15 12:57:53 2024-10-15 12:57:53 -06:00
88a9f725d0 vault backup: 2024-10-15 12:52:53 2024-10-15 12:52:53 -06:00
6a7f3be7e1 vault backup: 2024-10-15 12:47:53 2024-10-15 12:47:53 -06:00
2a048e17bb vault backup: 2024-10-15 12:42:53 2024-10-15 12:42:53 -06:00
266eba545d vault backup: 2024-10-15 12:37:53 2024-10-15 12:37:53 -06:00
bdd0029fd4 vault backup: 2024-10-15 12:32:53 2024-10-15 12:32:53 -06:00
98cb97ed30 vault backup: 2024-10-15 12:27:53 2024-10-15 12:27:53 -06:00
1404a57929 vault backup: 2024-10-12 21:02:02 2024-10-12 21:02:02 -06:00
11026292fd vault backup: 2024-10-12 20:57:02 2024-10-12 20:57:02 -06:00
bee5599cc3 vault backup: 2024-10-12 20:52:02 2024-10-12 20:52:02 -06:00
84bf3689e5 vault backup: 2024-10-12 20:47:02 2024-10-12 20:47:02 -06:00
94dd9d5d74 vault backup: 2024-10-12 20:42:02 2024-10-12 20:42:02 -06:00
effce4a641 vault backup: 2024-10-12 20:37:02 2024-10-12 20:37:02 -06:00
bc8c7c5fa9 vault backup: 2024-10-12 19:45:00 2024-10-12 19:45:00 -06:00
2b79d01319 vault backup: 2024-10-11 14:53:08 2024-10-11 14:53:08 -06:00
964812105f vault backup: 2024-10-11 14:48:08 2024-10-11 14:48:08 -06:00
f5551fc788 vault backup: 2024-10-11 14:43:08 2024-10-11 14:43:08 -06:00
fb56b3e3c0 vault backup: 2024-10-11 14:38:08 2024-10-11 14:38:08 -06:00
cd8e8fb80a vault backup: 2024-10-11 14:33:08 2024-10-11 14:33:08 -06:00
e0ebc4c69a vault backup: 2024-10-10 10:11:23 2024-10-10 10:11:23 -06:00
d0e64e06ad vault backup: 2024-10-10 10:06:23 2024-10-10 10:06:23 -06:00
d4f722c390 vault backup: 2024-10-10 10:01:23 2024-10-10 10:01:23 -06:00
a439087e25 vault backup: 2024-10-09 11:23:49 2024-10-09 11:23:49 -06:00
ee6e4835ed vault backup: 2024-10-09 11:18:40 2024-10-09 11:18:40 -06:00
d3a719d84a vault backup: 2024-10-09 11:12:34 2024-10-09 11:12:34 -06:00
44deaf0901 vault backup: 2024-10-09 11:06:40 2024-10-09 11:06:40 -06:00
2188e666bd vault backup: 2024-10-09 11:01:40 2024-10-09 11:01:40 -06:00
ac830eb57f vault backup: 2024-10-09 10:56:12 2024-10-09 10:56:12 -06:00
41cc143387 vault backup: 2024-10-09 10:51:12 2024-10-09 10:51:12 -06:00
eb0a5d9264 vault backup: 2024-10-08 22:11:53 2024-10-08 22:11:53 -06:00
4b75ea7a74 vault backup: 2024-10-08 22:06:51 2024-10-08 22:06:51 -06:00
9994e1407c vault backup: 2024-10-08 22:01:51 2024-10-08 22:01:51 -06:00
47e79e370d vault backup: 2024-10-08 21:46:22 2024-10-08 21:46:22 -06:00
0281a32394 vault backup: 2024-10-08 21:41:21 2024-10-08 21:41:22 -06:00
3a62a38f44 vault backup: 2024-10-08 21:36:22 2024-10-08 21:36:22 -06:00
df16aedfcd vault backup: 2024-10-08 21:30:42 2024-10-08 21:30:42 -06:00
59fefb4ae7 vault backup: 2024-10-08 21:25:18 2024-10-08 21:25:18 -06:00
1622311f8f vault backup: 2024-10-08 21:20:19 2024-10-08 21:20:19 -06:00
75f65b24bb vault backup: 2024-10-08 21:05:01 2024-10-08 21:05:01 -06:00
20c06eb3ed vault backup: 2024-10-08 21:00:01 2024-10-08 21:00:01 -06:00
d3deb01e86 vault backup: 2024-10-08 20:55:00 2024-10-08 20:55:00 -06:00
86345fe676 vault backup: 2024-10-08 20:48:52 2024-10-08 20:48:52 -06:00
7f1a463b11 vault backup: 2024-10-08 20:43:52 2024-10-08 20:43:52 -06:00
2a0b41bad2 vault backup: 2024-10-08 13:46:07 2024-10-08 13:46:07 -06:00
bc996ec8af vault backup: 2024-10-08 13:07:15 2024-10-08 13:07:15 -06:00
5016c247ee vault backup: 2024-10-08 13:02:15 2024-10-08 13:02:15 -06:00
bbd2c89e60 vault backup: 2024-10-08 12:57:15 2024-10-08 12:57:15 -06:00
a322016ef4 vault backup: 2024-10-08 12:52:15 2024-10-08 12:52:15 -06:00
1157f951b5 vault backup: 2024-10-08 12:47:15 2024-10-08 12:47:15 -06:00
9428dcc5d4 vault backup: 2024-10-08 12:42:15 2024-10-08 12:42:15 -06:00
2dee2be1b3 vault backup: 2024-10-08 12:37:15 2024-10-08 12:37:15 -06:00
120064e3a6 vault backup: 2024-10-08 12:32:15 2024-10-08 12:32:15 -06:00
4096a29ab0 vault backup: 2024-10-08 12:27:15 2024-10-08 12:27:15 -06:00
3d6aea9e8e vault backup: 2024-10-08 12:22:15 2024-10-08 12:22:15 -06:00
632e7438cb vault backup: 2024-10-08 11:57:15 2024-10-08 11:57:15 -06:00
25a4ce2cf4 vault backup: 2024-10-08 11:39:13 2024-10-08 11:39:13 -06:00
e2c3bb0292 vault backup: 2024-10-08 11:34:13 2024-10-08 11:34:13 -06:00
b0a32d6017 vault backup: 2024-10-08 11:29:13 2024-10-08 11:29:13 -06:00
37580d6c00 vault backup: 2024-10-08 11:24:13 2024-10-08 11:24:13 -06:00
5bf191f0de vault backup: 2024-10-07 15:34:03 2024-10-07 15:34:03 -06:00
115de31ebb vault backup: 2024-10-07 15:18:40 2024-10-07 15:18:40 -06:00
eccc9a9f6d vault backup: 2024-10-07 15:13:40 2024-10-07 15:13:40 -06:00
2c92915be7 vault backup: 2024-10-07 15:08:40 2024-10-07 15:08:40 -06:00
bd9f9bc956 vault backup: 2024-10-07 14:58:40 2024-10-07 14:58:40 -06:00
f9f0da665f vault backup: 2024-10-07 14:53:40 2024-10-07 14:53:40 -06:00
2fd51d50eb vault backup: 2024-10-07 14:48:40 2024-10-07 14:48:40 -06:00
287a95e479 vault backup: 2024-10-07 14:43:40 2024-10-07 14:43:40 -06:00
5c6fb3911e vault backup: 2024-10-07 14:19:03 2024-10-07 14:19:03 -06:00
27cf99c23a vault backup: 2024-10-07 14:13:48 2024-10-07 14:13:48 -06:00
ef0ac61db5 vault backup: 2024-10-07 13:53:48 2024-10-07 13:53:49 -06:00
e5f56ff162 vault backup: 2024-10-07 13:48:48 2024-10-07 13:48:49 -06:00
43704f156b vault backup: 2024-10-07 13:43:48 2024-10-07 13:43:48 -06:00
1aa6a152f3 vault backup: 2024-10-07 13:38:48 2024-10-07 13:38:48 -06:00
e5ebfb287d vault backup: 2024-10-07 13:28:48 2024-10-07 13:28:48 -06:00
b458dcec4a vault backup: 2024-10-07 13:23:48 2024-10-07 13:23:48 -06:00
308a92bc23 vault backup: 2024-10-07 13:18:48 2024-10-07 13:18:48 -06:00
93efdc9032 vault backup: 2024-10-07 13:08:48 2024-10-07 13:08:48 -06:00
876558ae41 vault backup: 2024-10-06 12:27:59 2024-10-06 12:27:59 -06:00
107 changed files with 25637 additions and 485 deletions

2
.obsidian/app.json vendored
View File

@ -2,7 +2,7 @@
"vimMode": true,
"promptDelete": false,
"pdfExportSettings": {
"includeName": true,
"includeName": false,
"pageSize": "Letter",
"landscape": false,
"margin": "0",

View File

@ -1,5 +1,7 @@
[
"obsidian-git",
"d2-obsidian",
"execute-code"
"execute-code",
"better-export-pdf",
"obsidian-excalidraw-plugin"
]

View File

@ -1,18 +1,32 @@
[
"file-explorer",
"global-search",
"switcher",
"graph",
"backlink",
"canvas",
"tag-pane",
"properties",
"page-preview",
"note-composer",
"command-palette",
"editor-status",
"bookmarks",
"markdown-importer",
"word-count",
"file-recovery"
]
{
"file-explorer": true,
"global-search": true,
"switcher": true,
"graph": true,
"backlink": true,
"outgoing-link": false,
"tag-pane": true,
"page-preview": true,
"daily-notes": false,
"templates": false,
"note-composer": true,
"command-palette": true,
"slash-command": false,
"editor-status": true,
"starred": false,
"markdown-importer": true,
"zk-prefixer": false,
"random-note": false,
"outline": false,
"word-count": true,
"slides": false,
"audio-recorder": false,
"workspaces": false,
"file-recovery": true,
"publish": false,
"sync": false,
"canvas": true,
"bookmarks": true,
"properties": true,
"webviewer": false
}

View File

@ -0,0 +1,29 @@
{
"showTitle": true,
"maxLevel": "6",
"displayHeader": true,
"displayFooter": true,
"headerTemplate": "<div style=\"width: 100vw;font-size:10px;text-align:center;\"><span class=\"title\"></span></div>",
"footerTemplate": "<div style=\"width: 100vw;font-size:10px;text-align:center;\"><span class=\"pageNumber\"></span> / <span class=\"totalPages\"></span></div>",
"printBackground": false,
"generateTaggedPDF": false,
"displayMetadata": false,
"debug": false,
"isTimestamp": false,
"enabledCss": false,
"prevConfig": {
"pageSize": "A4",
"marginType": "1",
"showTitle": false,
"open": true,
"scale": 100,
"landscape": false,
"marginTop": "10",
"marginBottom": "10",
"marginLeft": "10",
"marginRight": "10",
"displayHeader": true,
"displayFooter": true,
"cssSnippet": "0"
}
}

21223
.obsidian/plugins/better-export-pdf/main.js vendored Normal file

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,11 @@
{
"id": "better-export-pdf",
"name": "Better Export PDF",
"version": "1.9.2",
"minAppVersion": "0.15.0",
"description": "Export your notes to PDF, support export preview, add bookmarks outline and header/footer.",
"author": "l1xnan",
"authorUrl": "https://github.com/l1xnan",
"fundingUrl": "https://www.buymeacoffee.com/l1xnan",
"isDesktopOnly": true
}

View File

@ -0,0 +1,52 @@
#better-export-pdf {
display: flex;
flex-direction: row;
height: 75vh;
}
#better-export-pdf .pdf-preview {
flex: auto;
position: relative;
display: flex;
flex-direction: column;
overflow-x: hidden;
overflow-y: scroll;
align-content: flex-start;
}
#better-export-pdf .pdf-preview .webview-wrapper {
position: relative;
height: 100%;
width: 100%;
}
#better-export-pdf .pdf-preview .print-size {
position: absolute;
right: 8px;
top: 8px;
z-index: 99;
font-size: 0.6rem;
white-space: pre-wrap;
text-align: right;
visibility: hidden;
}
#better-export-pdf .pdf-preview > div {
flex: 1;
height: 100%;
width: 100%;
}
#better-export-pdf .pdf-preview .filename {
font-size: 0.75rem;
color: var(--color-base-60);
}
#better-export-pdf .pdf-preview .filename:not(:first-child) {
padding-top: calc(var(--p-spacing));
}
#better-export-pdf webview {
flex: 1;
height: 100%;
width: 100%;
}

View File

@ -0,0 +1,799 @@
{
"folder": "Excalidraw",
"cropFolder": "",
"annotateFolder": "",
"embedUseExcalidrawFolder": false,
"templateFilePath": "Excalidraw/Template.excalidraw",
"scriptFolderPath": "Excalidraw/Scripts",
"fontAssetsPath": "Excalidraw/CJK Fonts",
"loadChineseFonts": false,
"loadJapaneseFonts": false,
"loadKoreanFonts": false,
"compress": true,
"decompressForMDView": false,
"onceOffCompressFlagReset": true,
"onceOffGPTVersionReset": true,
"autosave": true,
"autosaveIntervalDesktop": 60000,
"autosaveIntervalMobile": 30000,
"drawingFilenamePrefix": "Drawing ",
"drawingEmbedPrefixWithFilename": true,
"drawingFilnameEmbedPostfix": " ",
"drawingFilenameDateTime": "YYYY-MM-DD HH.mm.ss",
"useExcalidrawExtension": true,
"cropPrefix": "cropped_",
"annotatePrefix": "annotated_",
"annotatePreserveSize": false,
"previewImageType": "SVGIMG",
"renderingConcurrency": 3,
"allowImageCache": true,
"allowImageCacheInScene": true,
"displayExportedImageIfAvailable": false,
"previewMatchObsidianTheme": false,
"width": "400",
"height": "",
"overrideObsidianFontSize": false,
"dynamicStyling": "colorful",
"isLeftHanded": false,
"iframeMatchExcalidrawTheme": true,
"matchTheme": false,
"matchThemeAlways": false,
"matchThemeTrigger": false,
"defaultMode": "normal",
"defaultPenMode": "never",
"penModeDoubleTapEraser": true,
"penModeSingleFingerPanning": true,
"penModeCrosshairVisible": true,
"renderImageInMarkdownReadingMode": false,
"renderImageInHoverPreviewForMDNotes": false,
"renderImageInMarkdownToPDF": false,
"allowPinchZoom": false,
"allowWheelZoom": false,
"zoomToFitOnOpen": true,
"zoomToFitOnResize": true,
"zoomToFitMaxLevel": 2,
"linkPrefix": "📍",
"urlPrefix": "🌐",
"parseTODO": false,
"todo": "☐",
"done": "🗹",
"hoverPreviewWithoutCTRL": false,
"linkOpacity": 1,
"openInAdjacentPane": true,
"showSecondOrderLinks": true,
"focusOnFileTab": true,
"openInMainWorkspace": true,
"showLinkBrackets": true,
"allowCtrlClick": true,
"forceWrap": false,
"pageTransclusionCharLimit": 200,
"wordWrappingDefault": 0,
"removeTransclusionQuoteSigns": true,
"iframelyAllowed": true,
"pngExportScale": 1,
"exportWithTheme": true,
"exportWithBackground": true,
"exportPaddingSVG": 10,
"exportEmbedScene": false,
"keepInSync": false,
"autoexportSVG": false,
"autoexportPNG": false,
"autoExportLightAndDark": false,
"autoexportExcalidraw": false,
"embedType": "excalidraw",
"embedMarkdownCommentLinks": true,
"embedWikiLink": true,
"syncExcalidraw": false,
"experimentalFileType": false,
"experimentalFileTag": "✏️",
"experimentalLivePreview": true,
"fadeOutExcalidrawMarkup": false,
"loadPropertySuggestions": true,
"experimentalEnableFourthFont": false,
"experimantalFourthFont": "Virgil",
"addDummyTextElement": false,
"zoteroCompatibility": false,
"fieldSuggester": true,
"compatibilityMode": false,
"drawingOpenCount": 0,
"library": "deprecated",
"library2": {
"type": "excalidrawlib",
"version": 2,
"source": "https://github.com/zsviczian/obsidian-excalidraw-plugin/releases/tag/2.8.3",
"libraryItems": []
},
"imageElementNotice": true,
"mdSVGwidth": 500,
"mdSVGmaxHeight": 800,
"mdFont": "Virgil",
"mdFontColor": "Black",
"mdBorderColor": "Black",
"mdCSS": "",
"scriptEngineSettings": {},
"defaultTrayMode": true,
"previousRelease": "2.8.3",
"showReleaseNotes": true,
"showNewVersionNotification": true,
"latexBoilerplate": "\\color{blue}",
"latexPreambleLocation": "preamble.sty",
"taskboneEnabled": false,
"taskboneAPIkey": "",
"pinnedScripts": [],
"customPens": [
{
"type": "default",
"freedrawOnly": false,
"strokeColor": "#000000",
"backgroundColor": "transparent",
"fillStyle": "hachure",
"strokeWidth": 0,
"roughness": 0,
"penOptions": {
"highlighter": false,
"constantPressure": false,
"hasOutline": false,
"outlineWidth": 1,
"options": {
"thinning": 0.6,
"smoothing": 0.5,
"streamline": 0.5,
"easing": "easeOutSine",
"start": {
"cap": true,
"taper": 0,
"easing": "linear"
},
"end": {
"cap": true,
"taper": 0,
"easing": "linear"
}
}
}
},
{
"type": "highlighter",
"freedrawOnly": true,
"strokeColor": "#FFC47C",
"backgroundColor": "#FFC47C",
"fillStyle": "solid",
"strokeWidth": 2,
"roughness": null,
"penOptions": {
"highlighter": true,
"constantPressure": true,
"hasOutline": true,
"outlineWidth": 4,
"options": {
"thinning": 1,
"smoothing": 0.5,
"streamline": 0.5,
"easing": "linear",
"start": {
"taper": 0,
"cap": true,
"easing": "linear"
},
"end": {
"taper": 0,
"cap": true,
"easing": "linear"
}
}
}
},
{
"type": "finetip",
"freedrawOnly": false,
"strokeColor": "#3E6F8D",
"backgroundColor": "transparent",
"fillStyle": "hachure",
"strokeWidth": 0.5,
"roughness": 0,
"penOptions": {
"highlighter": false,
"hasOutline": false,
"outlineWidth": 1,
"constantPressure": true,
"options": {
"smoothing": 0.4,
"thinning": -0.5,
"streamline": 0.4,
"easing": "linear",
"start": {
"taper": 5,
"cap": false,
"easing": "linear"
},
"end": {
"taper": 5,
"cap": false,
"easing": "linear"
}
}
}
},
{
"type": "fountain",
"freedrawOnly": false,
"strokeColor": "#000000",
"backgroundColor": "transparent",
"fillStyle": "hachure",
"strokeWidth": 2,
"roughness": 0,
"penOptions": {
"highlighter": false,
"constantPressure": false,
"hasOutline": false,
"outlineWidth": 1,
"options": {
"smoothing": 0.2,
"thinning": 0.6,
"streamline": 0.2,
"easing": "easeInOutSine",
"start": {
"taper": 150,
"cap": true,
"easing": "linear"
},
"end": {
"taper": 1,
"cap": true,
"easing": "linear"
}
}
}
},
{
"type": "marker",
"freedrawOnly": true,
"strokeColor": "#B83E3E",
"backgroundColor": "#FF7C7C",
"fillStyle": "dashed",
"strokeWidth": 2,
"roughness": 3,
"penOptions": {
"highlighter": false,
"constantPressure": true,
"hasOutline": true,
"outlineWidth": 4,
"options": {
"thinning": 1,
"smoothing": 0.5,
"streamline": 0.5,
"easing": "linear",
"start": {
"taper": 0,
"cap": true,
"easing": "linear"
},
"end": {
"taper": 0,
"cap": true,
"easing": "linear"
}
}
}
},
{
"type": "thick-thin",
"freedrawOnly": true,
"strokeColor": "#CECDCC",
"backgroundColor": "transparent",
"fillStyle": "hachure",
"strokeWidth": 0,
"roughness": null,
"penOptions": {
"highlighter": true,
"constantPressure": true,
"hasOutline": false,
"outlineWidth": 1,
"options": {
"thinning": 1,
"smoothing": 0.5,
"streamline": 0.5,
"easing": "linear",
"start": {
"taper": 0,
"cap": true,
"easing": "linear"
},
"end": {
"cap": true,
"taper": true,
"easing": "linear"
}
}
}
},
{
"type": "thin-thick-thin",
"freedrawOnly": true,
"strokeColor": "#CECDCC",
"backgroundColor": "transparent",
"fillStyle": "hachure",
"strokeWidth": 0,
"roughness": null,
"penOptions": {
"highlighter": true,
"constantPressure": true,
"hasOutline": false,
"outlineWidth": 1,
"options": {
"thinning": 1,
"smoothing": 0.5,
"streamline": 0.5,
"easing": "linear",
"start": {
"cap": true,
"taper": true,
"easing": "linear"
},
"end": {
"cap": true,
"taper": true,
"easing": "linear"
}
}
}
},
{
"type": "default",
"freedrawOnly": false,
"strokeColor": "#000000",
"backgroundColor": "transparent",
"fillStyle": "hachure",
"strokeWidth": 0,
"roughness": 0,
"penOptions": {
"highlighter": false,
"constantPressure": false,
"hasOutline": false,
"outlineWidth": 1,
"options": {
"thinning": 0.6,
"smoothing": 0.5,
"streamline": 0.5,
"easing": "easeOutSine",
"start": {
"cap": true,
"taper": 0,
"easing": "linear"
},
"end": {
"cap": true,
"taper": 0,
"easing": "linear"
}
}
}
},
{
"type": "default",
"freedrawOnly": false,
"strokeColor": "#000000",
"backgroundColor": "transparent",
"fillStyle": "hachure",
"strokeWidth": 0,
"roughness": 0,
"penOptions": {
"highlighter": false,
"constantPressure": false,
"hasOutline": false,
"outlineWidth": 1,
"options": {
"thinning": 0.6,
"smoothing": 0.5,
"streamline": 0.5,
"easing": "easeOutSine",
"start": {
"cap": true,
"taper": 0,
"easing": "linear"
},
"end": {
"cap": true,
"taper": 0,
"easing": "linear"
}
}
}
},
{
"type": "default",
"freedrawOnly": false,
"strokeColor": "#000000",
"backgroundColor": "transparent",
"fillStyle": "hachure",
"strokeWidth": 0,
"roughness": 0,
"penOptions": {
"highlighter": false,
"constantPressure": false,
"hasOutline": false,
"outlineWidth": 1,
"options": {
"thinning": 0.6,
"smoothing": 0.5,
"streamline": 0.5,
"easing": "easeOutSine",
"start": {
"cap": true,
"taper": 0,
"easing": "linear"
},
"end": {
"cap": true,
"taper": 0,
"easing": "linear"
}
}
}
}
],
"numberOfCustomPens": 0,
"pdfScale": 4,
"pdfBorderBox": true,
"pdfFrame": false,
"pdfGapSize": 20,
"pdfGroupPages": false,
"pdfLockAfterImport": true,
"pdfNumColumns": 1,
"pdfNumRows": 1,
"pdfDirection": "right",
"pdfImportScale": 0.3,
"gridSettings": {
"DYNAMIC_COLOR": true,
"COLOR": "#000000",
"OPACITY": 50
},
"laserSettings": {
"DECAY_LENGTH": 50,
"DECAY_TIME": 1000,
"COLOR": "#ff0000"
},
"embeddableMarkdownDefaults": {
"useObsidianDefaults": false,
"backgroundMatchCanvas": false,
"backgroundMatchElement": true,
"backgroundColor": "#fff",
"backgroundOpacity": 60,
"borderMatchElement": true,
"borderColor": "#fff",
"borderOpacity": 0,
"filenameVisible": false
},
"markdownNodeOneClickEditing": false,
"canvasImmersiveEmbed": true,
"startupScriptPath": "",
"openAIAPIToken": "",
"openAIDefaultTextModel": "gpt-3.5-turbo-1106",
"openAIDefaultVisionModel": "gpt-4o",
"openAIDefaultImageGenerationModel": "dall-e-3",
"openAIURL": "https://api.openai.com/v1/chat/completions",
"openAIImageGenerationURL": "https://api.openai.com/v1/images/generations",
"openAIImageEditsURL": "https://api.openai.com/v1/images/edits",
"openAIImageVariationURL": "https://api.openai.com/v1/images/variations",
"modifierKeyConfig": {
"Mac": {
"LocalFileDragAction": {
"defaultAction": "image-import",
"rules": [
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image-import"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": true,
"meta_ctrl": false,
"result": "link"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image-url"
},
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": true,
"meta_ctrl": false,
"result": "embeddable"
}
]
},
"WebBrowserDragAction": {
"defaultAction": "image-url",
"rules": [
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image-url"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": true,
"meta_ctrl": false,
"result": "link"
},
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": true,
"meta_ctrl": false,
"result": "embeddable"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image-import"
}
]
},
"InternalDragAction": {
"defaultAction": "link",
"rules": [
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "link"
},
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": true,
"result": "embeddable"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": true,
"result": "image-fullsize"
}
]
},
"LinkClickAction": {
"defaultAction": "new-tab",
"rules": [
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "active-pane"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": false,
"result": "new-tab"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": true,
"meta_ctrl": false,
"result": "new-pane"
},
{
"shift": true,
"ctrl_cmd": true,
"alt_opt": true,
"meta_ctrl": false,
"result": "popout-window"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": true,
"result": "md-properties"
}
]
}
},
"Win": {
"LocalFileDragAction": {
"defaultAction": "image-import",
"rules": [
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image-import"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": false,
"result": "link"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image-url"
},
{
"shift": true,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": false,
"result": "embeddable"
}
]
},
"WebBrowserDragAction": {
"defaultAction": "image-url",
"rules": [
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image-url"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": false,
"result": "link"
},
{
"shift": true,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": false,
"result": "embeddable"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image-import"
}
]
},
"InternalDragAction": {
"defaultAction": "link",
"rules": [
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "link"
},
{
"shift": true,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": false,
"result": "embeddable"
},
{
"shift": true,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "image"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": true,
"meta_ctrl": false,
"result": "image-fullsize"
}
]
},
"LinkClickAction": {
"defaultAction": "new-tab",
"rules": [
{
"shift": false,
"ctrl_cmd": false,
"alt_opt": false,
"meta_ctrl": false,
"result": "active-pane"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": false,
"result": "new-tab"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": true,
"meta_ctrl": false,
"result": "new-pane"
},
{
"shift": true,
"ctrl_cmd": true,
"alt_opt": true,
"meta_ctrl": false,
"result": "popout-window"
},
{
"shift": false,
"ctrl_cmd": true,
"alt_opt": false,
"meta_ctrl": true,
"result": "md-properties"
}
]
}
}
},
"slidingPanesSupport": false,
"areaZoomLimit": 1,
"longPressDesktop": 500,
"longPressMobile": 500,
"doubleClickLinkOpenViewMode": true,
"isDebugMode": false,
"rank": "Bronze",
"modifierKeyOverrides": [
{
"modifiers": [
"Mod"
],
"key": "Enter"
},
{
"modifiers": [
"Mod"
],
"key": "k"
},
{
"modifiers": [
"Mod"
],
"key": "G"
}
],
"showSplashscreen": true,
"pdfSettings": {
"pageSize": "A4",
"pageOrientation": "portrait",
"fitToPage": 1,
"paperColor": "white",
"customPaperColor": "#ffffff",
"alignment": "center",
"margin": "normal"
}
}

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,12 @@
{
"id": "obsidian-excalidraw-plugin",
"name": "Excalidraw",
"version": "2.8.3",
"minAppVersion": "1.1.6",
"description": "An Obsidian plugin to edit and view Excalidraw drawings",
"author": "Zsolt Viczian",
"authorUrl": "https://www.zsolt.blog",
"fundingUrl": "https://ko-fi.com/zsolt",
"helpUrl": "https://github.com/zsviczian/obsidian-excalidraw-plugin#readme",
"isDesktopOnly": false
}

File diff suppressed because one or more lines are too long

View File

@ -5,7 +5,7 @@
"autoSaveInterval": 5,
"autoPushInterval": 0,
"autoPullInterval": 5,
"autoPullOnBoot": true,
"autoPullOnBoot": false,
"disablePush": false,
"pullBeforePush": true,
"disablePopups": false,

27
.obsidian/types.json vendored Normal file
View File

@ -0,0 +1,27 @@
{
"types": {
"aliases": "aliases",
"cssclasses": "multitext",
"tags": "tags",
"excalidraw-plugin": "text",
"excalidraw-export-transparent": "checkbox",
"excalidraw-mask": "checkbox",
"excalidraw-export-dark": "checkbox",
"excalidraw-export-padding": "number",
"excalidraw-export-pngscale": "number",
"excalidraw-export-embed-scene": "checkbox",
"excalidraw-link-prefix": "text",
"excalidraw-url-prefix": "text",
"excalidraw-link-brackets": "checkbox",
"excalidraw-onload-script": "text",
"excalidraw-linkbutton-opacity": "number",
"excalidraw-default-mode": "text",
"excalidraw-font": "text",
"excalidraw-font-color": "text",
"excalidraw-border-color": "text",
"excalidraw-css": "text",
"excalidraw-autoexport": "text",
"excalidraw-embeddable-theme": "text",
"excalidraw-open-md": "checkbox"
}
}

View File

@ -1,3 +1,4 @@
# Terminology
## Cluster Terms
@ -12,7 +13,72 @@
| Phrase | Definition |
| ------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| task | The smallest unit of work in Nomad. Tasks are executed by task drivers like `docker` or `exec`, which allows Nomad to be flexible in the types of tasks it supports. Tasks specify their required task driver, configuration for the driver, constraints, and resources required. |
| task driver | Task drivers are used by nomad clients to execute a task and provide resource isolation. |
| group | A series of tasks that run on the same Nomad client. |
| job | The core unit of *control* for Nomad and defines the application and its configuration. It can contain one or many tasks |
| job_specification/jobspec | A job specification, also known as a jobspec. |
| service job | A long lived service that runs until explicitly stopped |
| batch job | Short lived jobs that run until they exit successfully |
| job_specification/jobspec | A job specification, also known as a jobspec defines the schema for nomad jobs. This describes the type of the job, the tasks and resources necessary for the job to run, job information like which clients it can run on, or more. |
| allocation | An allocation is a mapping between a task group in a job and a client node. When a job is run, Nomad will chose a client capable of running it and allocates resources on the machine for the ask(s) in the task group defined for the job. |
| workload artifact | The runnable blob to be scheduled on a task driver. Examples include docker images, raw binaries, java applications, and VMs using QEMU. |
# Typical Workflow
Running a task is generally done by:
1. *Define a job specification for your task(s):* it'll contain info like where the workload artifact is located, ports used by the service, the number of instances desired, and more.
2. *Deploying the job*: The jobspec is submitted to Nomad and it schedules an allocation for the job on one or more clients.
3. Updating and redploying the job.
# Deployment
## Installing the CLI
https://developer.hashicorp.com/nomad/tutorials/get-started/gs-install#install-the-nomad-cli
## Creating a single node cluster
<https://stackoverflow.com/questions/56112422/nomad-configuration-for-single-node-to-act-as-production-server-and-client>
1. Install the `nomad` binary.
2. Create a config file with in `/etc/nomad.d` named `config.hcl`:
```hcl
# https://developer.hashicorp.com/nomad/docs/configuration
# The client block configures the Nomad agent to accept jobs as assigned
# by the server.
# https://developer.hashicorp.com/nomad/docs/configuration/client
client {
enabled = true
}
# https://developer.hashicorp.com/nomad/docs/configuration/server
server {
enabled = true
# The number of server nodes to wait for before bootstrapping.
bootstrap_expect = 1
}
# The local directory where agent state is stored.
data_dir = "/opt/nomad"
name = "YOUR_NOMAD_NAME_HERE"
```
3. Create a Linux service `nomad.service` inside `/etc/systemd/system`:
```systemd
[Unit]
Description=Nomad
Documentation=https://nomadproject.io/docs/
Wants=network-online.target
After=network-online.target
[Service]
ExecReload=/bin/kill -HUP $MAINPID
ExecStart=/usr/local/bin/nomad agent -config /etc/nomad.d
KillMode=process
KillSignal=SIGINT
LimitNOFILE=infinity
LimitNPROC=infinity
Restart=on-failure
RestartSec=2
StartLimitBurst=3
TasksMax=infinity
[Install]
WantedBy=multi-user.target
```
4. Load the service file with `sudo systemctl daemon-reload`, then start the service with `sudo systemctl enable nomad && sudo systemctl start nomad`.
# Resources
- <https://developer.hashicorp.com/nomad/tutorials/get-started/gs-overview>
- <https://developer.hashicorp.com/nomad/docs/drivers>
- https://developer.hashicorp.com/nomad/docs/configuration

Binary file not shown.

Before

Width:  |  Height:  |  Size: 56 KiB

View File

@ -0,0 +1,3 @@
- To compose a function is to create a new function from multiple smaller functions.
- They can be solved from the inside out
-

View File

@ -0,0 +1,20 @@
1. Suppose that the following declarations are in effect:....
a. `14`
b. `34`
c. `4`
d. `true`
e. `false`
2. Suppose that `high`, `low`, and `middle` are all pointer variables of the same type, and the `low` and `high` point to elements of an array. Why is the following statement illegal, and how could it be fixed?
```c
middle = (low + high) / 2
```
The above statement is illegal because you can't add an `int *` to an `int *`. The below operation is legal because you can perform pointer subtraction, and because `low` is defined on the left hand side of the equation, then adding a long to a pointer is valid.
```c
middle = low + (high - low) / 2;
```
3. What will be the contents of the `a` array after the following statements are executed?
```c
{10, 9, 8, 7, 6, 5, 4, 3, 2, 1}
```

View File

@ -38,7 +38,31 @@ In C, a `char` denotes a single byte of arbitrary encoding.
## Variables
A variable must be declared before it is assigned.
## Arrays
### Finding the size of an array
```c
int arr[10];
// The size of an array can be found by
// determining the number of bytes allocated total and dividing that by the size of each element in the array.
int arr_size = sizeof(arr) / sizeof(arr[0]);
```
# Pointers
`&` gives you the address of a variable
`*` gives you the value in memory that an address points to.
To update the value a pointer points at, you can dereference on the left hand side of the assignment operator:
```c
// Update the value `p` points at to be 7
*p = 7;
```
Because of how operator precedence works, parentheses should be placed around the dereference operator and the variable
```c
// Increment the value pointed to by `p`
(*p)++;
```
# Formatting specifiers
# Standard library
## Formatting specifiers
@ -98,4 +122,15 @@ When asked to read a float, `scanf` searches for one of:
`%e`, `%f`, and `%g` all follow the same rules for recognizing floating point numbers.
If an ordinary character is included in the pattern matching string, it will be matched then discarded before proceeding to the next character.
## `rand`
```c
// `srand` creates a seed to use for rng
srand(time(NULL));
// `rand` generates a random integer between 0 and `RAND_MAX`
// To pick a number between a particular range, you can use the modulo
// operator.
// The below example picks a number between zero and four.
int num = rand() % 4;
```

View File

@ -0,0 +1,30 @@
> 1. If `i` is a variable and `p` points to `i`, which of the following expressions are aliases for `i`?
a. `*p`
g. `*&i`
> 2. If `i` is an `int` variable and `p` and `q` are pointers to `int`, which of the following assignments are legal?
e. `p = *&q;`
f. `p = q;`
i. `*p = *q`
> 3. The following function supposedly computes the sum and average of the numbers in the array `a`, which has length `n`. `avg` and `sum` point to the variables that the function should modify, unfortunately the function contains several errors, find and correct them.
```c
void avg_sum(double a[], int n, double *avg, double *sum)
{
int i;
// This was assigning a pointer to a float,
// the dereference operator was missing
*sum = 0.0;
for (i = 0; i < n; i++)
// This wasn't increasing the value
// `sum` points to, it was modifying the address stored in the pointer
(*sum) += a[i];
// Missing dereference operators
*avg = *sum / n;
}
```

View File

@ -0,0 +1,34 @@
1. Suppose that the following declarations are in effect:....
a. `14`
b. `34`
c. `4`
d. `true`
e. `false`
2. Suppose that `high`, `low`, and `middle` are all pointer variables of the same type, and the `low` and `high` point to elements of an array. Why is the following statement illegal, and how could it be fixed?
```c
middle = (low + high) / 2
```
The above statement is illegal because you can't add an `int *` to an `int *`. The below operation is legal because you can perform pointer subtraction, and because `low` is defined on the left hand side of the equation, then adding a long to a pointer is valid.
```c
middle = low + (high - low) / 2;
```
3. What will be the contents of the `a` array after the following statements are executed?
```c
{10, 9, 8, 7, 6, 5, 4, 3, 2, 1}
```
5. Suppose that `a` is a one dimensional array and `p` is a pointer variable. assuming that the assignment `p = a` has just been performed, which of the following expressions are illegal because of mismatched types? Of the remaining expressions, which are true (have a nonzero value)?
The following expressions are illegal because of mismatched types:
- (a) `p == a[0]` - Comparison between `int *` and `int`
The rest of the expressions are true.
8. Rewrite the following function to use pointer arithmetic...
```c
void store_zeros(int *a, int n) {
for (int i = 0; i < n; i++) {
*(a + i) = 0;
}
}
```

View File

@ -0,0 +1,70 @@
> **1.** The following function calls supposedly write a single new-line character, but some are incorrect. Identify which calls don't work and explain why.
b. `printf("%c", "\n");` - This is invalid because the double quotes make `\n` a string, but it's being displayed with the `%c`formatting specifier.
c. `printf(%s, '\n');` - This is invalid because it's trying to display a `char` using the string formatting specifier.
e. `printf('\n');` - `printf`'s first argument should be a string, not a `char`.
h. `putchar("\n");` - `putchar`'s first argument should be a `char`, not a string.
i. `puts('\n');` - `puts`'s first argument should be a string, not a `char`.
j. `puts("\n");` - `puts` will write a newline after writing a string, so this will write two newlines.
---
> **2.** Suppose that `p` has been declared as follows:
```c
char *p = "abc";
```
> Which of the following function calls are legal? Show the output produced by each legal call, and explain why all the others are illegal.
```c
// A - Not legal, because putchar accepts a `char`, not a pointer.
putchar(p);
// B - Legal, output: `a`
putchar(*p);
// C - Legal, output: `abc`
puts(p)
// D - Illegal, `puts` accepts a pointer to a null terminated string, not a `char`.
```
---
> **3.** Suppose that we call `scanf` as follows:
```c
scanf("%d%s%d", &i, s, &j);
```
> If the user enters `12abc34` `56def78`, what will be the values of `i`, `s`, and `j` after the call? (Assume that `i` and `j` are `int` variables and `s` is an array of characters.)
- `i`: `12`
- `s`: `"abc34"`
- `j`: `56`
---
> **7.** Suppose that `str` is an array of three characters. Which one of the following statements is not equivalent to the other three?
```c
// A
*str = 0;
// B
str[0] = '\0';
// C
strcpy(str, "");
// D
strcat(str, "");
```
(d) is different because it effectively does nothing (concatenates `"abc"` with an empty string). The rest of them make `str` effectively empty by setting the first character to a null byte.
---
> **9.** What will be the value of the string `s1` after the following statements have been executed?
```c
// Assuming `str` is an empty string with enough space to store everything:
strcpy(str, "tire-bouchon");
// "tire-bouchon"
strcpy(&str[4], "d-or-wi");
// "tired-or-wir"
strcat(str, "red?");
// "tired-or-wired?"
```
Expected output:
```c
"tired-or-wired?"
```

View File

@ -0,0 +1,50 @@
> **12.** Suppose that the macro `M` has been defined as follows:
```c
#define M 10
```
> Which of the following tests will fail?
```c
// C will fail, because `M` is defined.
#ifndef M
// E will fail, because `M` is defined
#if !defined(M)
```
---
> **13.** Show what the following program will look like after preprocessing. You may ignore any lines added to the program as a result of including the `<stdio.h>` header.
```c
#include <stdio.h>
int main(void)
{
f();
}
void f(void) {
printf("N is %d\n", 100);
}
```
---
> **15.** Suppose that a program needs to display messages in either English, French, or Spanish. Using conditional compilation, write a program fragment that displays one of the following three messages, depending on whether or not the specified macro is defined.
```c
#ifdef ENGLISH
#define MESSAGE "Insert Disk 1"
#endif
#ifdef FRENCH
#define MESSAGE "Inserez Le Disque 1"
#endif
#ifdef SPANISH
#define MESSAGE "Inserte El Disco 1"
#endif
printf(MESSAGE);
```

View File

@ -0,0 +1,83 @@
> **1.** Section 15.1 listed several advantages of dividing a program into multiple source files.(a). Describe several other advantages
- Easier to scale horizontally as developers are added to the team
- Reduced cognitive load from less global scope to keep track of
> (b). Describe some disadvantages
- Increased complexity
- Need to maintain/troubleshoot a build system
---
> **2.** Which of the following should *not* be put in a header file? Why not?
b. Function definitions - Functions should only be defined once, and this allows multiple files to share the same function definition
---
> **3.** We saw that writing `#include <file>` instead of `#include "file"` may not work if file is one that we've written. Would there be any problem with writing `$include "file"` instead of `#include <file>` if *file* is a system header?
Yes, `""` is a path relative to the current file, whereas `<>` is a path to the system's standard library headers.
---
> **4.** Assume that `debug.h` is a header file with the following contents...
>(a). What is the output when the program is executed?
```
Output if DEBUG is defined:
Value of i: 1
Value of j: 2
Value of i + j: 3
Value of 2 * i + j - k: 1
```
> (b). What is the output if the `#define` directive is removed from `testdebug.c`?
```
Output if DEBUG is not defined:
```
> (c). Explain why the output is different in parts (a) and (b)
When `DEBUG` is defined, any instances of the `PRINT_DEBUG` token are replaced with a `printf` call during compile time, but when it's not defined, they're replaced with nothing.
> (d). Is it necessary for the `DEBUG` macro to be defined *before* `debug.h` is included in order for `PRINT_DEBUG` to have the desired effect? Justify your answer.
Macro invocations are evaluated sequentially, and so if `DEBUG` was defined after `PRINT_DEBUG`, then any usages of `PRINT_EVALUATION` would be have like `DEBUG` was not defined.
---
> **5.** Suppose that a program consists of three source files - `main.c`, `f1.c`, and `f2.c`- Plus two header files, `f1.h` and `f2.h`. All three source files include `f1.h` but only `f1.c` and `f2.c` include `f2.h`. Write a makefile for this program, assuming that the compiler is `gcc` and that the executable file is to be named `demo`.
```makefile
demo: main.o f1.o f2.o
gcc -o demo main.o f1.o f2.o
main.o: main.c f1.h
gcc -c main.c
f1.o: f1.c f1.h f2.h
gcc -c f1.c
f2.o: f2.c f2.h
gcc -c f2.c
```
---
> **6.** The following questions refer to the program described in Exercise 5.
> (a). Which files need to be compiled when the program is built for the first time?
`f1.c`, `f1.h`, `f2.c`, `f2.h`, `main.c`, `main.h`
> (b). If `f1.c` is changed after the program has been built, which files need to be recompiled?
Just `f1.c`.
> (c). If `f1.h` is changed after the program has been built, which files need to be recompiled?
All source files, because they all include `f1.h`.
> (d). If `f2.h` is changed after the program has been built, which files need to be recompiled?
`f1.c` and `f2.c`.

View File

@ -0,0 +1,21 @@
Yes they are, different structs can have the same field names.
> 2
```c
struct c1 C1 { 0.0, 1.0};
struct c1 C2 { 1.0, 1.0};
```
> 8a
```c
const struct color MAGENTA { 255, 0, 255};
```
>11
20 bytes
UNCOMPLETED

View File

@ -0,0 +1,90 @@
> **4.** Suppose that the following declarations are in effect:
```c
struct point {int x, y; };
struct rectangle { struct point upper_left, lower_right; };
struct rectangle *p;
```
> Assume that we want `p` to point to a rectangle structure whose upper left corner is at $(10, 25)$, and whose lower right corner is at $(20, 15)$. Write a series of statements that allocate such a structure and initialize it as indicated.
```c
struct rectangle rect = { { 10, 25 }, { 20, 15 } };
p = &rect;
```
---
> **5.** Suppose that `f` and `p` are declared as follows:
```c
struct {
union {
char a, b;
int c;
} d;
int e[5];
} f, *p = &f;
```
> Which of the following statements are legal?
(a) `p->b = ' ';`
(b) `p->e[3] = 10;` - **Legal**
(c) `(*p).d.a = '*';` - **Legal**
(d) `p->d->c = 20;`
---
> **7.** The following loop is supposed to delete all nodes from a linked list and release the memory that they occupy. Unfortunately, the loop is incorrect. Explain what's wrong with it and show how to fix the bug.
```c
for (p = first; p != NULL; p = p->next)
free(p);
```
The above loop won't function because it deallocates the entry, then attempts to access the pointer to the next item, *after* it's already been freed.
A functional example might look like this:
```c
struct entry *p = first;
while (p != NULL) {
void *current = p;
p = p->next;
free(p);
}
```
---
> **9.** True or false: If `x` is a structure and `a` is a member of that structure, then `(&x)->a` is the same as `x.a`. Justify your answer.
**True**: The arrow operator is used to access a member of a struct through a pointer. `(&x)` creates a pointer to the `x` struct, therefore the arrow operator can be used to access fields on `x`.
---
> **13.** The following function is supposed to insert a new node into its proper place in an ordered list, returning a pointer to the first node in the modified list. Unfortunately, the function doesn't work correctly in all cases. Explain what's wrong with it and show how to fix it. Assume that the `node` structure is the one defined in Section 17.5.
```c
struct node *insert_into_ordered_list(struct node *list, struct node *new_node) {
struct node *cur = list, *prev = NULL;
while (cur->value <= new_node->value) {
prev = cur;
cur = cur->next;
}
prev->next = new_node;
new_node->next = cur;
return list;
}
```
In the above code, if the new item needs to be inserted at the *end* of the list, it breaks, because `cur` is set to `NULL`, then it attempts to access `cur->value`.
```c
struct node *insert_into_ordered_list(struct node *list, struct node *new_node) {
struct node *cur = list, *prev = NULL;
while (cur->value <= new_node->value) {
prev = cur;
cur = cur->next;
if (cur->next == NULL) {
break;
}
}
prev->next = new_node;
new_node->next = cur;
return list;
}
```

View File

@ -0,0 +1,69 @@
> 1. We discussed using the expression `sizeof(a) / sizeof(a[0]` to calculate the number of elements in an array. The expression `sizeof(a) / sizeof(t)` where `t` is the type of `a`'s elements would also work, but it's considered an inferior technique. Why?
Answer:
Using the type of the array's first element means that if you change the type of an array, it won't break the code that calculates the number of elements.
> 3. Write a declaration of an array named weekend containing seven `bool` values. Include an initialize that makes the first and last values `true`; all other values should be `false`.
Answer:
```c
bool weekend[] = {true, [1 ... 5] = false, true};
```
> 5. Calculators, watches, and other electronic devices often rely on 7 segment displays for numerical output. To form a digit, such devices turn on some of the seven segments while leaving others off.
>
> Here's what the array might look like, with each row representing one digit:
```c
const int segments[10][7] = {{1, 1, 1, 1, 1, 1, 0}, ...};
```
> I've given you the first row of the initializer, fill in the rest.
Answer:
```c
const int segments[10][7] = {
{1, 1, 1, 1, 1, 1, 0}, // 0
{0, 1, 1, 0, 0, 0, 0}, // 1
{1, 1, 0, 1, 1, 0, 1}, // 2
{1, 1, 1, 1, 0, 0, 1}, // 3
{0, 1, 1, 0, 0, 1, 0}, // 4
{1, 0, 1, 1, 0, 1, 1}, // 5
{1, 0, 1, 1, 1, 1, 1}, // 6
{1, 1, 1, 0, 0, 0, 0}, // 7
{1, 1, 1, 1, 1, 1, 1}, // 8
{1, 1, 1, 1, 0, 1, 1} // 9
};
```
>10. Write a declaration for an 8x8 `char` array named `chess_board`. Include an initializer that puts the following data into the array, one character per array element:
\[omitted]
```c
char chess_board[8][8] = {
{'r', 'n', 'b', 'q', 'k', 'b', 'n', 'r'},
{'p', 'p', 'p', 'p', 'p', 'p', 'p', 'p'},
{' ', '.', ' ', '.', ' ', '.', ' ', '.'},
{'.', ' ', '.', ' ', '.', ' ', '.', ' '},
{' ', '.', ' ', '.', ' ', '.', ' ', '.'},
{'.', ' ', '.', ' ', '.', ' ', '.', ' '},
{' ', '.', ' ', '.', ' ', '.', ' ', '.'},
{'.', ' ', '.', ' ', '.', ' ', '.', ' '},
{'P', 'P', 'P', 'P', 'P', 'P', 'P', 'P'},
{'R', 'N', 'B', 'K', 'Q', 'B', 'N', 'R'},
};
```
> 11. Write a program fragment that declares an 8x8 `char` array named `checker_board` and then uses a loop to store the following data into the array (one character per array element).
```c
char checker_board[8][8];
for (int row = 0; row < 8; row++) {
for (int column = 0; column < 8; column++) {
if ((column + row) % 2 == 0) {
checker_board[row][column] = 'B';
} else {
checker_board[row][column] = 'R';
}
}
}
```

View File

@ -0,0 +1,78 @@
> 1. The following function, which computes the area of a triangle, contains two errors. Locate the errors and show how to fix them. (*Hint*: There are no errors in the formula)
```c
double triangle_area(double base, height)
double product;
{
product = base * height;
return product / 2;
}
```
Answer:
```c
// A type annotation is needed for `height`
double triangle_area(double base, double height)
{
// The `product` variable declaration was not in the function block.
double product;
product = base * height;
return product / 2;
}
```
> 2. Write a function `check(x, y, n)` that returns `1` if both `x` and `y` fall between zero and `n - 1` inclusive. The function should return 0 otherwise. Assume that `x`, `y`, and `n` are all of type int
```c
int check(int x, int y, int n) {
int in_range = 1;
if (x < 0 || y < 0) {
in_range = 0;
}
if (x > n - 1 || y > n - 1) {
in_range = 0;
}
return in_range;
}
```
> 7. Suppose that function `f` has the following definition:
> `int f(int a, int b) { ... }`
> Which of the following statements are legal? Assume that `i` has type `int` and `x` has type `double`).
Answer:
All of them are legal and will compile and run. (c) and (d) are what I would consider bad practice because they perform an implicit conversion from a double to an int, and should include an explicit cast.
> 8. Which of the following would be valid prototypes for a function that returns nothing and has one double parameter?
Answer:
(a) and (b).
Parameters must contain a type annotation but they do not need to specify a name. A function prototype declaration must specify a return type.
> 9. What will be the output of the following program?
```c
#include <stdio.h>
void swap (int a, int b);
int main(void)
{
int i = 1, j = 2;
swap(i, j);
printf("i = %d, j = %d\n", i, j);
return 0;
}
void swap(int a, int b)
{
int temp = a;
a = b;
b = temp;
}
```
Answer:
```
i = 1, j = 2
```
Because function parameters are passed by value and not reference in C, modifications to `a` and `b` are limited to the scope of `swap`.

View File

@ -0,0 +1,2 @@
- To find the magnitude of a negative twos compliment number, flip all of the bits and add one.
-

View File

@ -0,0 +1,15 @@
# Half Adder
# Full Adder
# Ripple Carry Adder
# Carry-Select Adder
A carry select adder is built using two ripple carry adders, and multiplexing them together based off of the value of $c_{in}$. This is done for performance reasons, because when adding two numbers $x$ and $y$, we know $x$ and $y$ *before* we know the value of $c_{in}$. This means we can compute what the output of $x + y + c_{in}$ would be for $c_{in} = 0$ and $c_{in} = 1$ at the same time, then just toggle between the two possible values given the *actual* value of $c_{in}$.
The delay is calculated like so:
1. Given the delay of a full adder is $k$, and the delay of a 2 to 1 mux is $\frac{1}{m}k$,
2. then the delay of a 4 bit ripple carry adder is $4k$, because it's 4 full adders chained together, running sequentially.
3. This means that the delay of a 4 bit carry select adder is $4k + \frac{k}{m}$
# Carry-lookahead adder

View File

@ -0,0 +1,148 @@
# History of Boolean Algebra
- In 1849, George Boole published a scheme for describing logical thought and reasoning
- In the 1930s, Claude Shannon applied Boolean algebra to describe circuits built with switches
- Boolean algebra provides the theoretical foundation for digital design
# Properties of Boolean Algebra
| Number | Col. A | Col. A Description | Col. B | Col. B Description |
| ---------------------- | --------------------------------------------------------------------------------- | ------------------ | ----------------------------------------------------------------------------------- | ------------------ |
| 1. | $0 \cdot 0 = 0$ | | $1 + 1 = 1$ | |
| 2. | $1 \cdot 1 = 1$ | | $0 + 0 = 0$ | |
| 3. | $0 \cdot 1 = 1 \cdot 0 = 0$ | | $1 + 0 = 0 + 1 = 1$ | |
| 4. | if $x = 0$ then $\overline{x} = 1$ | | if $x = 1$ then $\overline{x} = 0$ | |
| 5. | $x \cdot 0 = 0$ | | $x + 1 = 1$ | |
| 6. | $x \cdot 1 = x$ | | $x + 0 = x$ | |
| 7. | $x \cdot x = x$ | | $x + x = x$ | |
| 8. | $x \cdot \overline{x} = 0$ | | $$x + \overline{x} = 1$ | |
| 9. | $\overline{\overline{x}} = x$ | | | |
| 10. Commutative | $x \cdot y = y \cdot x$ | | $x + y = y + x$ | |
| 11. Associative | $x \cdot (y \cdot z) = (x \cdot y) \cdot z$ | | $x + (y + z) = (x + y) +z$ | |
| 12. Distributive | $x \cdot (y +z) = x \cdot y + x \cdot z$ | | $x + y \cdot z = (x + y) \cdot (x + z$ | |
| 13. Absorption | $x + x \cdot y = x$ | | $x \cdot (x + y) = x$ | |
| 14. Combining | $x \cdot y + x \cdot \overline{y} = x$ | | $(x + y) \cdot (x + \overline{y}) = x$ | |
| 15. DeMorgan's Theorem | $\overline{x \cdot y} = \overline{x} + \overline{y}$ | | $x + y = \overline{x} \cdot \overline{y}$ | |
| 16. | $x + \overline{x} \cdot y = x + y$ | | $x \cdot (\overline{x} + y) = x \cdot y$ | |
| 17. Consensus | $x \cdot y + y \cdot z + \overline{x} \cdot z = x \cdot y + \overline{x} \cdot z$ | | $(x + y) \cdot (y + z) \cdot (\overline{x} + z) = (x + y) \cdot (\overline{x} + z)$ | |
# Synthesis
In the context of binary logic, synthesis refers to the act of creating a boolean expression that evaluates to match a given truth table.
This is done by creating a product term for each entry in the table that has an output of $1$, that also evaluates to $1$, then ORing each product term together and then simplifying.
Example:
Given the below truth table, synthesize a boolean expression that corresponds.
| $x_1$ | $x_2$ | $f(x_1, x_2)$ |
| ----- | ----- | ------------- |
| 0 | 0 | 1 |
| 0 | 1 | 1 |
| 1 | 0 | 0 |
| 1 | 1 | 1 |
- $f(0, 0)$ evaluates to true with the expression $\overline{x}_1 \cdot \overline{x}_2$
- $f(0, 1)$ evaluates to true with the expression $\overline{x}_1\cdot x_2$
- $f(1, 0)$ should provide an output of zero, so that can be ignored
- $f(1, 1)$ evaluates to true with the expression $x_1 \cdot x_2$
ORing all of the above expression together, we get:
$$ f(x_1, x_2) = \overline{x}_1\overline{x}_2 + \overline{x}_1 x_2 + x_1x_2 $$
$$
\begin{multline}
= x_1x_2 \\
= x
\end{multline}
$$
# Logic Gates
![](./assets/logic-gates.jpeg)
# NOT Gate
A binary NOT gate has a single input, and inverts that input (output is not the input).
## Truth Table
| $x$ | $y$ |
| --- | --- |
| 0 | 1 |
| 1 | 0 |
## Mathematical Expression
A NOT operation is mathematically expressed using a bar:
$$ y = \bar{x} $$
# AND Gate
An AND gate will only output a 1 if *both* inputs are a one (input one *and* input two are enabled).
## Truth Table
| $x_1$ | $x_2$ | $y$ |
| ----- | ----- | --- |
| 0 | 0 | 0 |
| 0 | 1 | 0 |
| 1 | 0 | 0 |
| 1 | 1 | 1 |
## Mathematical Expression
An AND operation is mathematically expressed using a times symbol, or with no symbol at all:
$$ y = x_1 \cdot x_2 = x_1x_2$$
# NAND Gate
A NAND gate outputs a 1 *unless* both inputs are enabled (input one *and* input two are *not* enabled).
## Truth Table
| $x_1$ | $x_2$ | $y$ |
| ----- | ----- | --- |
| 0 | 0 | 1 |
| 0 | 1 | 1 |
| 1 | 0 | 1 |
| 1 | 1 | 0 |
## Mathematical Expression
A NAND operation is mathematically expressed using a bar over an AND operation:
$$ y = \overline{x_1 \cdot x_2}$$
# OR Gate
An OR gate outputs a 1 if either or both inputs are enabled (if input one *or* input two is enabled).
## Truth Table
| $x_1$ | $x_2$ | $y$ |
| ----- | ----- | --- |
| 0 | 0 | 0 |
| 0 | 1 | 1 |
| 1 | 0 | 1 |
| 1 | 1 | 1 |
## Mathematical Expression
A mathematical OR is notated with a $+$ symbol.
$$ y = x_1 + x_2 $$
# NOR Gate
A NOR gate outputs a one if neither gate is enabled.
## Truth Table
| $x_1$ | $x_2$ | $y_1$ |
| ----- | ----- | ----- |
| 0 | 0 | 1 |
| 0 | 1 | 0 |
| 1 | 0 | 0 |
| 1 | 1 | 0 |
## Mathematical Expression
A NOR operation is expressed using a bar over an OR operation.
$$ y = \overline{x_1 + x_2} $$
# XOR Gate
An XOR gate is on if one input is enabled, but *not* both (exclusively one or the other).
## Truth Table
| $x_1$ | $x_2$ | $y$ |
| ----- | ----- | --- |
| 0 | 0 | 0 |
| 0 | 1 | 1 |
| 1 | 0 | 1 |
| 1 | 1 | 0 |
## Mathematical Expression
An XOR operation is expressed using a circle around an addition symbol:
$$ y = x_1 \oplus x_2 $$
## XNOR Gate
An XNOR gate is on if neither input is enabled, or both inputs are enabled.
## Truth Table
| $x_1$ | $x_2$ | $y$ |
| ----- | ----- | --- |
| 0 | 0 | 1 |
| 0 | 1 | 0 |
| 1 | 0 | 0 |
| 1 | 1 | 1 |
## Mathematical Expression
An XNOR operation is expressed using a bar over an XOR operation:
$$ y = \overline{x_1 \oplus x_2} $$

View File

@ -0,0 +1,56 @@
Any poduct that contains a logic circuit is classified as digital hardware.
- Moore's Law states that the number of a transistors on a chip doubles every two years
- The International Technology Roadmap for Semiconductors (ITRS) forecasts technology, including the number of transistors on a chip
- Multiple integrated circuits can be connected using a printed circuit board, or PCB.
- *Standard chips* conform to an agreed upon standard for functionality and physical configuration. They are usually less than 100 transistors in size, and provide basic building blocks for logic.
- These chips are combined to form a larger logic circuit
- They were popular until the 1980s
- As ICs improved, it became inefficient space-wise to have separate chips for each logical building block
- The functionality of these chips is fixed, and they do not change.
# Programmable Logic Devices
Programmable logic devices (PLDs) include a number of programmable switches that can configure the internal circuitry of a chip
- The most common type of PLD is a Field Programmable Gate Array (FPGA)
- FPGAs are widely available, but come with the drawback that they're limited in speed and performance
# Application Specific Integrated Circuits
Application Specific Integrated Circuits (ASICs) have higher maximum performance and transistor density compared to FPGAs, but the cost of production is very high.
- A logic circuit is made of connected logic gates
# Binary Numbers
In base 10, a value is expressed by an n-tuple with n digits
$$ D = d_{n-1}d_{n-2} \cdots d_1 d_0 $$
This represents the value
$$ V(D) = d_{n-1} * 10^{n-1} + d_{n - 2} * 10^{n-2} + \cdots + d_1 * 10^1 + d_0 * 10^0 $$
In a binary or base 2 number system, each digit can be a zero or one, called a *bit*.
$$ D = d_{n-1}d_{n-2} \cdots d_1 d_0 $$
To determine the integer value, a very similar formula can be used.
$$ V(B) = b_{n-1} * 2^{n-1} + b_{n-2} * 2^{n-2} \cdots b_{1} * 2^1 + b_0 * 2^0 $$This formula can be generalized as:
*For radix $r$*:
$$ k = k_{n-1} k_{n-2} \cdots k_1 k_0$$
- The base of a number is often notated in the format of $(n)_b$, EG a base 10 number might be $(14)_{10}$, and a binary number might be $(10)_2$.
- The *least significant bit* (LSB) is usually the right-most bit. The highest value bit, or the *most significant bit* (MSB).
- A nibble is 4 bits, and a byte is 8 bits
## Conversions
### Base 10 to Binary
Repeatedly divide by 2, and track the remainder.
As an example, the below table shows how one might convert from $(857)_{10}$ to base 2.
| Equation | Remainder | |
| --------------- | --------- | --- |
| $857 / 2 = 428$ | $1$ | |
| $428 / 2 = 214$ | $0$ | |
| $214 / 2 = 107$ | $0$ | |
| $107 / 2 = 53$ | $1$ | |
| $53 / 2 = 26$ | $1$ | |
| $26 / 2 = 13$ | $0$ | |
| $13 / 2 = 6$ | $1$ | |
| $6 / 2 = 3$ | $0$ | |
| $3 / 2 = 1$ | $1$ | |
| $1 / 2 = 0$ | $1$ | |
The final answer is $1101011001$. The least significant bit is the remainder of the first division operation, and the most significant bit is the remainder of the last operation.
# Definitions
- **Xtor** is an abbreviation for *transistor*
- **Moore's Law** states that the number of transistors on a chip doubles every two years.
- A tuple is a finite and ordered list of things

View File

@ -0,0 +1,37 @@
A Karnaugh map is an alternative to a truth table for representing a function in boolean algebra, and serve as a way to derive minimum cost circuits for a truth table.
![[karnaugh-maps.png]]
Given the above truth table, the columns are labelled with $x_1$, and the rows are labelled with $x_2$.
To find a minimal boolean expression with a Karnaugh map, we need to find the smallest number of product terms ($x_1$, $x_2$) that should produce a 1 for all instances where the cell in a table is $1$.
# Two Variable Maps
![[Pasted image 20250224104850.png]]
- Given the map described in the above image, the output is $1$ for the row where $x_2$ is equal to 1.
- Similarly, the output is $1$ for the column where $x_1$ is equal to zero.
- By ORing the condition where $x_1$ is zero ($\overline{x_1}$), and the condition where $x_2$ is one ($x_1$), we can find a minimal expression for the truth table.
# Three Variable Maps
![[Pasted image 20250224105753.png]]
A three variable Karnaugh map is constructed by placing 2 two-variable maps side by side. The values of $x_1$ and $x_2$ distinguish columns in the map, and the value of $x_3$ distinguishes rows in the map.
To convert a 3 variable Karnaugh map to a minimal boolean expression, start by looking for places in the map that contain 1s next to each other (by row, or by column).
![[Pasted image 20250224110124.png]]
From there, describe the pair of 1s using boolean algebra.
In the above example, the top pair of 1s is in the column where $x_3$ is equal to zero ($\overline{x_3}$), and $x_1$ is equal to $1$ ($x_1$). This describes a single term in the resulting equation ($x_1\overline{x_3}$).
![[Pasted image 20250224110632.png]]
> Similar logic can be employed using more than just a *pair* of ones.
# Four Variable Maps
![[Pasted image 20250224111117.png]]
![[Pasted image 20250224110819.png]]

View File

@ -0,0 +1,50 @@
- Output depends on input and past behavior
- Requires use of storage elements
# Latches
## SR Latch
SR stands for *Set*/*Reset*, and functions like so:
- When a signal comes into $S$, $Q_a$ is **set** on and stays on until a signal comes into $R$, at which point the output ($Q_a$) is **reset**, back to zero.
- $S$ and $R$ are interchangeable, it just impacts whether $Q_a$ or $Q_b$ is set/reset.
Truth table:
| $S$ | $R$ | $Q_a$ | $Q_b$ |
| --- | --- | ----- | ----- |
| 0 | 0 | 0/1 | 1/0 |
| 0 | 1 | 0 | 1 |
| 1 | 0 | 1 | 0 |
| 1 | 1 | 0 | 0 |
![[Pasted image 20250303095542.png]]
## Gated Latch
A gated latch is similar to a basic latch, but the output only changes when $clk = 1$.
## D Latch
A D latch has two inputs, $clk$ and $data$. When $clk$ is high, $data$ is stored.
# Flip Flops
A latch, but the output only changes on one of the clock edges
- Can be a rising edge latch or a falling edge latch
## JK Flip Flop
Similar to an SR flip flop, a JK flip flop has set/reset inputs, but when *both* inputs are high, then the output is toggled.
## T Flip Flop
A T Flip Flip, or a toggle flip flop has two inputs:
- $clk$ - Clock input
- $T$ - Whenever $T$ goes from low to high, the output toggles its state
# Registers
## Shift Register
![[Pasted image 20250317101146.png]]
Above is a simple shift register.
## Parallel Shift Register
A parallel shift register has 4 inputs, 4 outputs, a serial input, and a shift/load input.
When the *load* input is high, the input is stored into the register. When the *shift* input is high, the registers are shifted and the serial input is read into the new space.
# Counters
## A 3-bit Up-counter
![[Pasted image 20250317102911.png]]
# Synchronous Sequential Circuits
- A synchronous circuit is clock driven, while an asynchronous circuit is not.

View File

@ -0,0 +1,135 @@
Modules are the building block through which Verilog is built.
Each module can be thought of as a black box with a series of inputs, and a series of outputs. Changing the input changes the outputs.
Module definitions are started with the `module` keyword, and closed with the `endmodule` keyword.
## Syntax
The general syntax of a module is as follows:
```verilog
// This line is referred to as the *module header*
module <name> ([port_list]);
// Contents of the module
endmodule
// The port list is optional
module <name>;
// Contents
endmodule
```
Below is an example of the structure of a half adder module:
```verilog
module half_adder(
input a,
input b,
output sum_bit,
output carry_bit
);
// ------- snip ------------
endmodule
```
## Ports
Ports are a set of signals that act as input and outputs for a particular module.
There are 3 kinds of ports:
- `input`: Input ports can only receive values from the outside. `input` ports cannot be written to.
- `output`: Output ports can be written to, but not read from.
- `inout`: Inout ports can send *and* receive values.
Ports can be declared in the port list, or in the module body. Ports declared in the port list can optionally omit their type and only declare a name, to be specified within the body of the module:
```verilog
module half_adder(
a,
b,
sum_bit,
carry_bit
);
input a;
input b;
output sum_bit;
output carry_bit;
// ----------- snip -----------
endmodule
```
The full type of a port can also be defined within the portlist:
```verilog
```verilog
module half_adder(
input wire a,
input wire b,
output wire sum_bit,
output wire carry_bit
);
input a;
input b;
output sum_bit;
output carry_bit;
// ----------- snip -----------
endmodule
```
### Port types
If no type is defined, ports are implicitly defined as *nets* of type `wire`.
> In verilog, the term *net* refers to network, and it refers to a connection that joins two or more devices together.
Ports can be a vector type:
```verilog
module test(a, b, c);
input [7:0] a;
input [7:0] b;
output [7:0] c;
// -------- snip ---------
endmodule
```
# Instantiation
Larger designs can be built by using multiple smaller modules.
Modules can be *instantiated* within other modules and ports, and these *instances* can be connected with other signals.
These port connections can be defined by an *ordered list*, or by *name*.
### By Ordered List
```verilog
module submodule (input x, y, z, output o);
// ------- snip -------
endmodule
module parent;
wire a, b, c;
wire o;
// Similar to C, the type of the module is first, followed by
// the name of the module instance.
submodule foo (a, b, c, o);
endmodule
```
### By Name
Ports can also be joined by explicitly defining the name.
Syntactically, this is done with a dot (`.`), followed by the port name defined by the design, followed by the signal name to connect, wrapped in parenthesis (`.x(a)`).
```verilog
module submodule (input x, y, z, output o);
// ------------snip-----------------
endmodule
module parent;
wire a, b, c;
wire o;
submodule foo (
.x(a),
.y(b),
.z(c),
.o(o)
);
```
Because association is done by name, the order of definition does not matter.
### Unconnected ports
Ports that are not connected to any wire by the parent module will have a value of high impedance, and is considered unknown/undefined.

View File

@ -0,0 +1,88 @@
There are two main categories of data types in Verilog. These categories differ in the underlying hardware structure they represent, and they differ in the way they are assigned and retain values.
# Nets
A *net* refers to a *network* of connections that join two or more devices together.
Nets connect different hardware entities and *do not store values*.
## Wire
A `wire` is the most commonly used type of net. When a port is declared in Verilog, it is implicitly given a type of `wire`.
It is illegal to re-declare a name already in use by a net:
```verilog
module foo;
wire abc;
wire a;
wire b;
wire c;
wire abc; // ILLEGAL: The wire `abc` is already defined
```
# Variables
A variable is a data storage element. They retain the last input given.
```verilog
```verilog
module testbench;
integer int_a; // Integer variable
real real_b; // Real variable
time time_c; // Time variable
initial begin
int_a = 32'hfacd_1b34; // Assign an integer value
real_b = 0.1234567; // Assign a floating point value
#20; // Advance simulation time by 20 units
time_c = $time; // Assign current simulation time
// Now print all variables using $display system task
$display ("int_a = 0x%0h", int_a);
$display ("real_b = %0.5f", real_b);
$display ("time_c = %0t", time_c);
end
endmodule
```
```
## Registers
A `reg` can be used to model hardware registers because it stores a value until the next assignment.
### Integer
A Verilog `integer` type is a 32 bit wide storage value. It does not *need* to store integers, it can be used for other purposes.
```verilog
integer count;
```
### Time
A `time` variable is unsigned, 64 bits wide, and can be used to store time duration for debugging purposes. `realtime` is similar, but time is stored as a floating bit value.
## Real
The `real` type denotes a floating point value.
## Strings
Strings are stored in a vector of `reg`s. The width of the `reg` *must* be large enough to hold the string.
Each character in a string represents a one byte ASCII value. If the size of the variable is smaller than the string, the string is truncated.
# Scalar and Vector Types
By default, declarations of a net or `reg` value is 1 bit wide, referred to as a *scalar* value (only a single value).
```verilog
// Scalar declaration
wire foo;
// Vector declaration, with 8 bits.
wire [7:0] bar;
```
Individual bits in a vector can be accessed using array operators, eg `[i]`.
```verilog
reg [7:0] foo;
// Write to bit 0
foo [0] = 1;
```
## Part selects
A range of contiguous bits from within another vector can be selected, referred to as a part select. This range can then be treated as a vector.
```verilog
reg [31:0] foo;
// Select bits 23 through 16 (inclusive), and assign the 8 bit hex value `0xff` to them.
foo [23:16] = 8'hff;
```

View File

@ -0,0 +1,62 @@
## Boolean Engineering
- Truth tables
- Only practical for small circuits
- Schematic capture
- Using CAD to place logic gates on a virtual canvas
- Facilitates *hierarchical design*
- Good for larger circuits
- Don't scale well for very large circuits
- Hardware Description Languages
- Enables hierarchical design
- Standardized by IEEE
- Design is more portable
- Usable in combination with schematic design
# Verilog
- Originally developed by Gateway Design Automation
- Put in public domain in 1990
- Standardized in 1995
- Originally intended for simulation of logic networks, later adapted to synthesis
- Structural Verilog describes how things are laid out at a logic level.
## Structural Verilog
Structural Verilog describes things at a logic level.
- The use of logic gates and continuous assignment are markers of structural Verilog.
```verilog
// V---V---v--v-----portlist (not ordered)
module example1(x1, x2, s, f);
// Defining the types of the various ports
input x1, x2, s;
output f;
// The first argument is the output value.
// In this example, `k`, `g`, `h`, `f` are implicitly declared.
// They could also be declared manually with the syntax `wire foo`, alongside the `input` and `output` declarations
not(k, s); // You can also NOT a variable using a tilde, eg `~s`
and(g, k, x1);
and(h, s, x2);
or(f, g, h);
// You can also do this
assign f = (~s & x1) | (s & x2);
endmodule
```
## Behavioral Verilog
Behavioral Verilog describes broader behavior, at a higher level
- The use of `reg`s, time delays, arithmetic expressions, procedural assignment, and other control flow constructs are markers of behavioral Verilog.
```verilog
// V---V---v--v-----portlist (not ordered)
module example1(x1, x2, s, f);
// Defining the types of the various ports
input x1, x2, s;
output f;
always @(a, b)
// always @(....) says "do this stuff whenever any of the values inside of @(...) change"
{s1, s0} = a + b;
endmodule
```
## Testbench Layout
- Define UUT module
- Initialize Inputs
- Wait
- Test every possible combination of inputs and validate that the outputs are correct
- Debug output can be displayed with `$display("Hello world");`

Binary file not shown.

After

Width:  |  Height:  |  Size: 12 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 40 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 17 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 16 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 102 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 29 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 54 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 695 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 331 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 23 KiB

Binary file not shown.

After

Width:  |  Height:  |  Size: 64 KiB

View File

@ -0,0 +1,42 @@
<https://www.vox.com/the-big-idea/2018/3/5/17080470/addiction-opioids-moral-blame-choices-medication-crutches-philosophy>
| Claim | Elaboration | Link to source |
| ---------------------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Addiction treatment options aren't embraced by the public because treating addiction is seen as indulging in weakness rather than "curing" addiction | - The data shows that we could save many lives by expanding [medication-assisted treatments](https://www.vox.com/science-and-health/2017/7/20/15937896/medication-assisted-treatment-methadone-buprenorphine-naltrexone) and adopting harm reduction policies like [needle exchange programs](https://www.cdc.gov/policy/hst/hi5/cleansyringes/index.html).<br>-Methadone and buprenorphine, the most effective medication-assisted treatments, are [“crutches,”](https://www.nbcnewyork.com/news/local/Methadone-Judge-Rule-Father-Blame-Lepolszki-Son-Overdose-Heroin-Addict-Ruling-I-Team-Investigation-273213211.html) in the words of felony treatment court judge Frank Gulotta Jr.; they are [“just substituting one opioid for another,”](https://www.vox.com/policy-and-politics/2017/5/11/15613258/tom-price-opioid-epidemic) according to former Health and Human Services Secretary Tom Price<br>- | [link](https://www.vox.com/the-big-idea/2018/3/5/17080470/addiction-opioids-moral-blame-choices-medication-crutches-philosophy#:~:text=The%20data%20shows,than%20%E2%80%9Ccuring%E2%80%9D%20i) |
| - people view addiction as a moral failure | - Most of us have been trained to use more forgiving language when talking about addiction. We call it a disease. We say that people with addiction should be helped, not blamed. But deep down, many of us still have trouble avoiding the thought that they could stop using if they just tried harder. | |
- People view addiction as a moral failure
- Addiction treatment options aren't embraced by the public because treating addiction is seen as indulging in weakness rather than "curing" addiction
- "Most of us have been trained to use more forgiving language when talking about addiction. We call it a disease. We say that people with addiction should be helped, not blamed. But deep down, many of us still have trouble avoiding the thought that they could stop using if they just tried harder. "
- "Theres a part of us that cant help but see addiction as a symptom of weak character and bad judgment."
- The view of addiction as a moral failure is causing real damage to the world
- "The stigma against addiction is “the single biggest reason America is failing in its response to the opioid epidemic,” [Voxs German Lopez concluded](https://www.vox.com/science-and-health/2017/12/18/16635910/opioid-epidemic-lessons) after a year of reporting on the crisis""
- "Lives depend on where we come down. The stigma against addiction owes its stubborn tenacity to a specific, and flawed, philosophical view of the mind, a misconception so seductive that it ensnared Socrates in the fifth century BC."
- People view addiction as a moral failure because of the subconscious societal belief that our actions always reflect our beliefs and values
- "We tend to view addiction as a moral failure because we are in the grip of a simple but misleading answer to one of the oldest questions of philosophy: Do people always do what they think is best? In other words, do our actions always reflect our beliefs and values? When someone with addiction chooses to take drugs, does this show us what she truly cares about — or might something more complicated be going on?"
- Plato describes acting against one's best judgement as "Akrasia"
- "At one point their discussion turns to the topic of what the Greeks called akrasia: acting against ones best judgment."
- "Akrasia is a fancy name for an all-too-common experience. I know I should go to the gym, but I watch Netflix instead. You know youll enjoy dinner more if you stop eating the bottomless chips, but you keep munching nevertheless."
- This makes the article more relatable
- Socrates felt that this didn't make sense, arguing that actions always reveal true beliefs
- "Socrates clearly never went to a restaurant with unlimited chips. But he has a point. To figure out what a persons true priorities are, we usually look to the choices they make. (“Actions speak louder than words.”) When a person binges on TV, munches chips, or gets high despite the consequences, Socrates would infer that they must care more about indulging now than about avoiding those consequences — whatever they may _say_ to the contrary"
- He argues that people simply have bad judgement, and that they aren't acting against their better judgement.
- He also argues that bad decisions indicate bad priorities.
- The idea that people need to hit "rock bottom" before they can hit true recovery reinforces that idea. It means that a person needs to truly understand the consequences of their "selfishness".
- Socratic rationale for punishing drug possession with jail is another example of this idea.
- Addiction intensifies the disconnect between judgement and action
- "Heres the testimony of one person with addiction, reported in Maia Szalavitzs book [_Unbroken Brain_](https://books.google.com/books?id=4yJ3CgAAQBAJ&lpg=PP1&pg=PA114#v=onepage&q&f=false): “I can remember many, many times driving down to the projects telling myself, You dont want to do this! You dont want to do this! But Id do it anyway.”
- Ethos
- The "self" is not a single unitary thing
- The concept of a "dual process" mind comes from Nobel laureate Daniel Kahneman, who divides the mind into a part that makes judgements quickly, intuitively, and unconsciously ("System 1") and a part that thinks more slowly, rationally, and consiously ("System 2").
- Neuroscientist Kent Berridge notes a system in our brain he calls the "wanting system", which regulates our cravings for things like food, sex, and drugs, using signals based in the neutrotransmitter dopamine
- "More pertinent for our purposes is research on what [University of Michigan neuroscientist Kent Berridge](http://www-personal.umich.edu/~berridge/) calls the “wanting system,” which regulates our cravings for things like food, sex, and drugs using signals based in the neurotransmitter dopamine. The wanting system has powerful control over behavior, and its cravings are insensitive to long-term consequences."
- He notes that drugs hijack that system causing cravings that are far stronger than humans experience.
- The boundaries of where "the self" is in the human brain aren't clearly defined, processes in the brain mesh together tightly, so there's no clean boundary.
- From a philosophical sense, there are many different ways to approach the concept of the self.
- Modern philosophers reject the socratic view on behavior, instead saying that the self is instead based on judgements about the kind of person one wants to be, and the life they want to lead.
- Addiction lies somewhere between choice and compulsion. Addiction doesn't make the choice for you, but it makes you gravitate towards a particular options.
- Addiction is not a moral failure because it's still the same person, they just face cravings that are far harder to resist.
- Treatments like methadone and buprenorphine can help with addiction by reducing the power of those cravings.
-

View File

@ -0,0 +1,16 @@
- What conversations are meaningful?
- What conversations are intentionally emotionally charged?
- Fake news is rising
- More people get news from social media
- The attention economy is extremely effective
- Social media is intentionally habit forming
- Hate speech is poorly moderated, if at all
- Fake news is meant to drive emotion
- Manipulating emotions through social media (fake news) should raise
- Emotional analytics *can* benefit the user
- Very small (1/250 sec) exposure to content still has an impact
- News literacy curriculum rarely addresses emotional news literacy
- Mindfulness is good
- System 1 and 2 thinking
- Schools should address larger societal issues in discussion surrounding news literacy
-

View File

@ -0,0 +1,130 @@
- Chose something to genuinely research, because I don't know, rather than a topic I'm passionate about.
- Write out my opinion on the topic *before* starting formal research
- An issue or topic I've always wanted to learn more about is the political system
- An issue or topic I have a personal connection to is philosophy, technology
- A conversation or debate I spend a lot of time thinking about is the art of improvement
- Something I think needs to change in society is the existence of self propagating norms
- An issue that affects my community negatively is political discourse.
- Something I wish more people cared about was fixing the world
- I worry that I see safe spaces being used in a negative way
# Primary research
- Interview prominent public figures or heads of clubs that have public stated feelings about safe spaces, asking about why they did it, how they did it, what impact they feel it's had.
- https://www.usu.edu/safe-at-usu/
# Secondary Research
- https://qz.com/398723/slavoj-zizek-thinks-political-correctness-is-exactly-what-perpetuates-prejudice-and-racism
- https://en.wikipedia.org/wiki/Jonathan_Haidt
- https://www.insidehighered.com/node/7407
- https://www.vox.com/2016/7/5/11949258/safe-spaces-explained
- https://www.dochaspsych.com/blog-defining-your-safe-space-what-does-safe-space-mean/
- https://dictionary.cambridge.org/us/dictionary/english/safe-space
- https://www.merriam-webster.com/dictionary/safe%20space
- https://chicagomaroon.com/2016/news/reg-honors-chicago-blood-bank-founder/
# The Complex Case of Fear and Safe Space
## Introduction
- The Chicago School board considered a proposal for a magnet school intended to be a safe space for LGBT individuals
- The only reliable way to prevent disrespectful treatment is through separation
- The rational commonly used for safe spaces makes it difficult for an educator to effectively respond to actual harassment
- The need for safe space for students who experience social exclusion and harassment is the result of a political economy that was *intended to create safe space for others*. (2) Students *who are able* to articulate a need for safe space often dont need the kind of space separation offers; *students who need (if only temporarily) separation, often are unable to say so.* (3) Safe space does not always or only function to defuse fear and establish safety for students; safe space may also function to create emotional relief for adults
- Safe spaces translate feelings of fear into separation, creating a divide
- The desire for safe spaces comes from the inherent idea that being hurt is an uncomfortable emotion, and fearing being hurt is an uncomfortable emotion. These are generally perceived to impede students' abilities to learn and grow. As such, safety is the antidote for fear, but this safety creates separation
- The creation of safe spaces relies on the assumption that the creators of safe spaces are able to effectively anticipate the fears of students across cultural, racial, and social divides.
- In this context, fear is fear of harm and danger. By operating on the assumption that more harm will come, this establishes a power relationship that's rooted in *past histories*, where the disadvantaged group is harmed.
- By implementing safe spaces, you create a dynamic where the response to harassment (assumed or real) is fear.
- If safe spaces create a dynamic of fear, the effect of safe spaces is less than desirable, and it doesn't move towards the intended goal of making students feel safer, rather it moves them away.
## Where do calls for safe spaces come from?
- Many students do not want to be separated from their peers
- Many students who have the luxury of asking for a safe space don't truly need one
- Calls for safe spaces have typically come from parents or educators
- Many of the dynamics that enable harassment are invisible to those who enjoy privilege, social or otherwise
- A call for a safe space indicates acknowledgement that a student feels uncomfortable in the face of other peers' behavior. The call for a safe space as a solution places that uncomfortable feeling into the box of "fear"
- As long as we assume that emotions are instinctual reactions of a person to external events (even if triggered by cognitive judgment) that prompt action, the only available analysis of emotion relies on an outmoded faculty psychology. This has the troubling effect of divorcing logic and affect in action
## Fear
- Emotions can be viewed through the lens of a cognitive device that can help create and form habits.
### Fear as an evolutionary tool
- As Dewey helps us to understand, *it is not that fear as emotion causes us to move away from persons perceived as somehow dangerous; rather, affect becomes fear by the interpreted action of separation.*
- Therefore, neurologically, *fear stems from habit*, not the other way around
- Affect arises unbidden in a reaction to a problematic circumstance in which habits of adjustment are inadequate
- Basically: You feel fear when you are unable to resolve the perceived issue through typical means
- This emotional response doesn't necessarily need to be fear, leading to separation
- This emotional response can be redirected into a search for understanding, creating a productive output (Dewey)
- The author disagrees with the above sentiment, arguing that fear and anger can be intelligent, productive, emotions.
### Fear as a Sociocultural Practice
- According to Ahmed, objects and rhetoric can become "sticky, or saturated with emotion"
- The author then uses this to reinforce the idea that by propagating "past feelings" forward by proactively acting against them, we continue to let these ideas hold meaning, and power.
- The author refers to this propagation of fear as "habituated fear"
- This fear works in two ways, the discriminated group fears further discrimination, and the dominant group fears losing control, change, and that which it does not understand. "The more we don't know \[understand] what or who it is we fear, *the more the world becomes fearsome*"
- You can change the narrative around an idea, thus changing the emotions associated with it
- *By designating fears \[at a societal level], we divide the world into safe spaces and unsafe spaces \[for different groups of people]*
- By creating a designated "zone" of safety, you're allowing fear to restrict the space in which "targeted groups" exist in, which in turn allows "attacking groups" to grow and occupy more space
- Without the ability to attach fear to certain objects, the "world itself" becomes fearsome. Humans attach fear to certain objects, thus enabling them to view the world from a simpler perspective of "safe", and "unsafe
- Those in the discriminated group are often led to mask discomfort because societally, especially in "dominant groups", showing fear is seen as a sign of weakness. They are not able to avoid interacting with the dominant group without facing significant socioeconomic consequences.
- The effect of safe spaces is to restrict the movement of parties *least likely* to cause trouble. This includes examples like restricting females to dorms to keep them safe from roving males, to the creation of a LGBT school for the protection of those students
- The creation of safe spaces places people into categories, categories built around fear. This is effectively actively *investing* in the set of societal norms, creating further discrimination and harm.
### Understanding emotions
- Emotions come to be with reference to relational, socially constructed, context oriented experience
- Separation is one way in which responding to an event results in the event being recorded as "something to be afraid of" in the amygdala
- In may ways, safe spaces enable the habituation of fear in this manner
- Fear is an emotion that's more easily used to hurt or control others, by making targeted groups afraid, then you give the dominant group control over them
- *Safe spaces are a simple solution for an inherently complicated problem*. They limit rich deconstruction and interpretation of a situation, leading to limited ability to act on a fitting response.
- When fear becomes habitually associated with an object, it becomes resistant to rational control
- **How does fear benefit the fearful one?**
- As people put up defenses from each other, we grow farther apart, and it becomes easier to view a group of people as "the other"
- These groups tend to
- Harassment can be more effectively combatted by re-interpreting the treatment they receive.
# Dilemmas of political correctness
<https://ora.ox.ac.uk/objects/uuid:40d31aed-1296-4dc6-b511-e7135b83ee8a>
- Discussions around political correctness can often be simplified down into such:
- Proponents see nothing to fear in erecting norms that inhibit expression on one side, and opponents see this as a misguided effort to silence political enemies.
- The author defines political correctness as "the attempt to establish norms of speech (or sometimes behavior) that are thought to protect vulnerable, marginalized, or historically victimized groups, with the goal of shaping public discourse with the goal of avoiding insult or outrage, a lowered sense of self esteem, or otherwise offending sensibilities." By dubbing something politically incorrect, it implies that there is something worrisome or objectionable at work
- The author places strong emphasis on the distinction between an idea being morally right or wrong, and being politically correct. He provides the examples that:
- Criticizing someone for referring to an administrative assistant as a "secretary" constitutes political correctness, but advocating for higher wages is not
- Insisting on trigger warnings or deleting offending material is a form of political correctness, but arguing for rape prevention security measures is not.
- In the inverse, it's not politically incorrect to make a donation to fight gay marriage, but it is politically incorrect to speak publicly against gay marriage
- Political correctness can be viewed as something to benefit marginalized groups, or as a societal movement towards restraint on public expression
- Given the idea that political correctness is a societal movement, it culminates in a form of self censorship where there are consequences for those who violate communal norms
- One practical example of this is when German politician Phillipp Jenninger fell into disgrace after a speech that engaged rhetorically with the perspective of Nazi Germany, even though the speech was devoid of Nazi sympathy or anti-semitism. The same speech was given in a jewish synagogue by a jewish leader, and it received no negative response, demonstrating that the worry was the *signal* sent by the speech being given by a german politician
- Another practical example is when the mayor of Washington DC was forced to resign after making use of the word "niggardly"
- The N word is derived from latin roots (*niger* - dark) and developed from french and spanish roots in the mid 18th century, whereas niggardly is derived from the old english word *nigon*, meaning stingy. The modern etymological root is niggle, meaning giving excessive attention to minor details
- Self censorship is an ultimate victory for those seeking to eliminate a form of censorship
- Political correctness stems from concern for the victimized groups, and is typically seen on the left end of the political spectrum, but it can also be seen on the right
- Examples includes attempts to delegitimize opposition to war by suggesting dissenters are insulting "the brave men and women who fight on our behalf"
- Those opposed to political correctness often dismiss it as a trivial insistence to redefine words, or an attempt to silence opposition.
- It's easy to dismiss some cases, but it's harder to dismiss others (eg, the taboo on the N word or certain taboos around racial science, or the underlying worries around such ideas).
- There are perfectly valid motivations for attempting to cultivate and enforce political norms, eg a record of violence and injustice directed towards African Americans being promoted through superficially respectable means
- On a broader level, enlightened moral thinking has led society to converge on a *default norm against advancing ideas associated with oppression or marginalization*
- The author agrees with the idea that political correctness has made “the casual infliction of humiliation...much less socially acceptable than it was,” and even that “encouraging students to be politically correct has made our country a far better place.”
- The author argues that political correctness has brought huge benefits, but there are limits of being politically correct
- Where those limits should be located is subject to disagreement. On one end of the spectrum are minor conventions and taboos, at the other end are explicit laws prohibiting forms of expression (hate speech)
- You can acknowledge the value of political correctness without endorsing all uses of political correctness as a barrier in public discourse
- Potential drawbacks of political correctness are especially relevant when you note how individual applications of political correctness are applied at an extreme level.
- Extreme political correctness can often revolve around morally superficial applications of reasonable norms, taken to an extreme
- Political correctness concerns offense and sensibilities, not the objective interests of everyone involved.
- There's an increasing tendency to reject government terms like "illegal alien" in favor of "undocumented immigrant" with the implication that refusing to do so implies reactionary or hateful views.
- One example of political correctness backfiring is when "sensitive" material is removed from coursework to avoid upsetting students.
- This is shown with affirmative action causing problems and not having the intended affect
- We want to avoid "being gored on either horn"
- Enforcing political correctness can lead to widespread "preference falsification", in which what people believe in private is detached from what is spoken in public
- "preference falsification" can lead to polarization.
- In the example of social justice, many attribute poor social outcomes to factors *external* to the person, because then you can avoid directly blaming the person, an inherently uncomfortable discussion. Regardless of how correct the end result is, this tendency is still present.
- In promoting norms intended to benefit marginalized groups, we both help and hurt them.
# Safe spaces, explained
- The author introduces the paper by showcasing some of the negative ways in which safe spaces are viewed and understood.
- The author then explains that safe spaces are a place where marginalized groups can feel welcome and accepted
- Distinction is made between psychological safety and physical safety
- The first usages of the term "safe space" came from the 1960s, where same sex relationships were outlawed, so a safe space was a place where people were able to practice same sex relationships without being noticed by the cops.
- Examples of situations where the classical term "safe space" still applies exist in areas where non-heteronormative behavior is outlawed or socially shamed.
- The same idea applies to other groups, like women, and people of color.
- One advocate for safe spaces states that they've found that being able to surround themselves with people of the same marginalized group makes it easier to be themselves
- Some safe spaces are created explicitly, whereas others are created organically
- Safe spaces create a place for marginalized groups to truly relax. The author makes the claim that stress caused by discrimination creates poor health outcomes among groups who experience systemic discrimination.
- Opponents of safe spaces caution that safe spaces limit social change by preventing the "messy work" of fighting for social change from occurring.
- Debate and conflict isn't always what people want or feel they need.
- There's a fear that social justice issues are nearly impossible to effectively resolve
- Groupthink is a real issue that can occur within safe spaces.
- People in marginalized groups have to face the feeling that society wasn't really designed for them, whereas people in dominant groups don't face that experience.
# How Safe Spaces Contribute to Mental Health
- The term safe space is broadly used to describe designated areas or communities

View File

@ -1,85 +0,0 @@
## What is art?
**Art**: the expression or application of human creative skill.
art must:
- be made with the intent to convey emotion
- should "satisfy the senses"
- be made with intent
- have attention to feeling and emotion
art may:
- be a relay of experience or emotion from one person to another
## Medium
A particular material, along with an accompanying technique (plural: media). Example include:
- Acrylic, enamel, gesso, glaze, ink, oil
## History
1. The branch of knowledge dealing with past events
## How do you look at art?
Purposes and functions of art include:
- Communicating information:
- In non-literate societies, art was used to teach.
- Today, film and television are used to disseminate information.
- Spirituality and Religion
- All of the world's major religions have used art to inspire and instruct the faithful
- Personal and cultural expression
- Social and political ends
- Artists have criticized or influenced values or public opinion
- Often it is clear and direct
- Other times, however, it is less obvious
- Monarchs who commissioned projects to symbolize their strength and power
Generally, art can be broken down into two parts, *form*, and *content*.
- Form relates to the "formal" aspects of art, composition or medium.
- Content relates to the subject. What's being portrayed, how are they portraying it?
- The distinction should be made between fact and opinion/guessing.
Parts of form:
1. Line and Shape
- Lines define space and may create an outline or contour, as style called "linear"
- They can be *visible* or *implied*, and may be a part of composition
- It may be 2 dimensional, 3 dimensional, suggested, or implied.
- *Wherever there is an edge
2. Color
- Hue: The name of the color (red, blue, yellow)
- Saturation: The quality or vibrancy of those values
- Value: The addition of white, black, or grey to the value
- Tint: pure hue + white
- Tone: pure hue + grey
- Shade: pure hue + black
3. Texture
- Texture is an element of art pertaining to the surface quality or "feel" of the work of art
- Texture can be described as smooth, rough, soft, etc. Some textures are real, and others are simulated
- Textures that can be *felt* are ones that fingers can actually touch.
4. Space and Mass
- Space references to what contains objects: may be 2D or 3D.
- Mass refers to the effect and degree of the bulk, density, and weight of matter in space.
- In architecture or sculpture, it is the area occupied by a form.
- Perspective: Foreshortening is a way of representing an object so that it conveys the illusion of depth; an object appears to be thrust forward or backward in space.
5. Composition
- How are items arranged or organized in art
- Symmetrical, asymmetrical
- Static or dynamic
- Picture space is comprised of foreground, middle ground, and background.
6. Scale
- As an art history term, scale refers to the size of an object or object represented
- Size of things, conveyed or literal
Parts of style:
- Cultural style
- Societies develop their own beliefs and style of material forms
- Artists are a product of their culture
- Period style
- Style changes over time
- Art changes because of economic and political changes
- Regional style
- Geography leads to diverse styles
- Personal style
- Individual artists often have distinct styles
Two basic forms of style:
- Representational: Seeks to create recognizable subject matter (this is a picture of a dog)
- Abstract: Seeks to capture the essence of a form, not the literal representation (this picture captures the feeling of a dog)
| Phrase | Definition |
| ---- | ---- |
| | |

View File

@ -1,37 +0,0 @@
| Piece | Place | Artist | Medium | Stuff |
| ------------------------------------------------ | ----------------------------- | ------------------------------------ | --------------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Treasury Of Atreus | Ancient Greece: Helladic | Unknown | Limestone | Largest dome for over 1000 years<br>Largest monolithic lintel<br>Ashlar masonry and cyclopic masonry<br>Thought to be Atreus, he abdicated (possibly a tomb)<br>post and lintel and corbelled arch<br> |
| Snake Goddess | Ancient Greece: Minoan | Unknown | Faience | Hierarchy of Scale; Exposed breasts - power<br>victory pose<br>rosettes<br>sideways dress - otherworldly<br>We don't know much about this work |
| Bull-leaping, from the palace at Knossos | Ancient Greece: Minoan | Unknown | Fresco | Different people with different colors<br>Elongation of bull shows motion<br>Aquatic pattern on border<br>Connection to sea |
| Doryphoros (Spear Bearer) or *Canon* | Classical Greece: Classical | Polykleitos | Marble copy after bronze original | Called Canon because it's the standard of beauty for sculptures<br>Used golden ratio<br>Polykleitos was in the cult of pythagoreans<br>Contraposto - counter posture<br>Well preserved because of Pompeii<br> |
| Dying Gaul | Classical Greece: Hellenistic | Epigonos | Marble copy after bronze original | Representational hair<br>Objects on ground give sense of place<br>Shows blood and sweat<br>Doesn't portray a greek man (less jacked, less hot), shows a frenchman<br>Choker shows he's a gaul<br>Defeat: Broken sword, no attempt to call for help (horn), sitting on shield |
| Aphrodite (Venus de Milo) | Classical Greece: Hellenstic | Alexandros of Antioch-on-the-Meander | Marble | Individualized<br>Lot of detail compared to aphrodite of knidos<br>Dry drapery<br>Contrasting textures<br>Contraposto<br>Has musculature and feminine form<br>More intimate, sensual |
| Nike alighting on a warship (Nike of Samothrace) | Classical Greece: Hellenistic | Unknown | Marble | Rhodes probably had a successful naval victory<br>Where Nike got it's logo<br>Wet drapery, would have been in fountain<br>lot of contrasting texture<br>Dynamic<br> |
| Pont-du-Gard | Rome: Empire | Unknown | Shelly Limestone | Arches create space<br>Aquaduct helped city<br>columns aligned vertically<br>Ashlar Masonry<br>Used as major bridge<br>Use of Roman arch |
| Portrait of Augustus as General | Rome: Empire | Unknown | Marble Copy, Bronze Original | Three powers (ishtar gate):<br>- Curass - Military<br>- Toga - Wealth and political power<br>- Eros - Supernatural power<br>Harkening pose: asking for cooperation, contraposto<br>Idealized proportions<br> |
| The Pantheon | Roman: Empire | Patron: Hadrean | Concrete | First pantheon built out of wood, burned down<br>Rebuilt out of concrete<br>Originally built on a hill, now sunk by detrius of time<br>Monolithic columns from egypt in portico(front porch)<br>Had rosettes in ceiling squares<br>Biggest dome in the world<br>Squares and circles everywhere |
| Arch of Titus | Rome: Empire | Patron: Titus | Concrete faced with marble | Commemorates when Rome defeats Jerusalem<br>Triumphal Arch <br>Depicts jewish temple being raided, money used to fund colosseum<br>Original historian was jewish (Josephus) |
| Portrait of a Husband and Wife | Rome: Empire | Unknown | Fresco | His skin is darker<br>Preserved because of Pompeii<br>She's holding beeswax tablet and stylus<br>They're flexing literacy<br>Literacy was only for the rich<br> |
| | | | | |
| Term | Definition |
| -------------------------- | ---------------------------------------------------------------------------------------------------- |
| Faience | Metal Glaze, Colder |
| Verism | Exaggerated age, wrinkles. Counterpart to hellenism but with emphasis on age instead of muscles |
| Chryselephantine | Ivory veneer with gold |
| Archaizing | Make something look older in content and style - Fonseca Bust |
| Harkening Pose | Asking for cooperatinon |
| Patron | Person that paid for it |
| Incrustacean | Cut rock in half and flip to show vein - Pantheon |
| Portico | Fancy front porch - Pantheon |
| Trumphal Arch | Winning army walks through on return home |
| Contraposto | The Italian word for counter posture, natural stance, more weight on one foot, body makes an S shape |
| Ungrounded | No historical record |
| Doric | Masculine, beefy, the simplest, oldest style |
| Ionic | Feminine, slender, medium old |
| Corinthian | Fancy top, planty shape around the base of the top, latest style |
| Corbelled Arch | Rocks that go in gradually, like two wedges |
| Post and Lintel | Two posts and a lintel across the top |
| Roman arch (with keystone) | Normal vault |
| Groin vault | 4 way intersection |
| | |

View File

@ -1,9 +1,10 @@
| Term | Definition |
| ---- | ---- |
| Consistent | The system of equations has at least one solution |
| Inconsistent | Parallel lines, no solution |
| Independent | The lines only cross at one point. |
| Dependant | The lines are identical, and there are infinitely many solutions. Both equations represent the same line when plotted. |
| Term | Definition |
| ------------ | ---------------------------------------------------------------------------------------------------------------------- |
| Consistent | The system of equations has at least one solution |
| Inconsistent | Parallel lines, no solution |
| Independent | The lines only cross at one point. |
| Dependant | The lines are identical, and there are infinitely many solutions. Both equations represent the same line when plotted. |
# Solving
## Graphing
Graph the two equations, and look for points where they intersect

View File

@ -0,0 +1,23 @@
Given the formula $\sin(\alpha + \beta)$:
$$ \sin(\alpha + \beta) = \sin(\alpha)\cos(\beta) + \cos(\alpha)\sin(\beta) $$
$$ \sin(\alpha - \beta) = \sin(\alpha)\cos(\beta) - \cos(\alpha)\sin(\beta) $$
Given the formula $\cos(\alpha + \beta)$:
$$ \cos(\alpha + \beta) = \cos(\alpha)\cos(\beta) - \sin(\alpha)\sin(\beta) $$
$$ \cos(\alpha - \beta) = \cos(\alpha)\cos(\beta) + \sin(\alpha)\sin(\beta) $$
Given the formula $\tan(\alpha + \beta)$:
$$\tan(\alpha + \beta) = \dfrac{\tan\alpha + \tan\beta}{1 - \tan\alpha\tan\beta} $$
$$\tan(\alpha - \beta) = \dfrac{\tan\alpha - \tan\beta}{1 + \tan\alpha\tan\beta} $$
## Cofunctions
Given that cofunctions are two functions that add up to 90 degrees, you can use the trig identities for sum and difference to find cofunctions.
For a right triangle where $\alpha = \theta$, $\beta = \frac{\pi}{2} - \theta$.
This means that $\sin(\theta) = \cos(\frac{\pi}{2} - \theta)$
Using this information, you can derive various cofunction identities.
| $\sin\theta = \cos(\frac{\pi}{2} - \theta)$ | $\cos\theta = \sin(\frac{\pi}{2} - \theta)$ |
| ------------------------------------------- | -------------------------------------------- |
| $\tan\theta = \cot(\frac{\pi}{2} - \theta)$ | $\cot\theta = \tan(\frac{\pi}{2} - \theta))$ |
| $\sec\theta = \csc(\frac{\pi}{2} - \theta)$ | $\csc\theta = \sec(\frac{\pi}{2} - \theta)$ |

View File

@ -0,0 +1,33 @@
To solve for a double or half angle identity:
1. Draw a triangle
2. Choose an identity to use
3. Substitute into formula
# Double Angle Identities
Sine:
$$ \sin(2\theta) = 2\sin\theta\cos\theta $$
Cosine:
$$
\begin{matrix}
\cos(2\theta) = \cos^2\theta - \sin^2\theta\\
= 1 - 2sin^2\theta\\
= 2cos^2\theta - 1\\
\end{matrix}
$$
Tan:
$$ \tan(2\theta) = \dfrac{2\tan\theta}{1-\tan^2\theta}$$
## Half Angle Identities
Whether the output is positive or negative depends on what quadrant the output is in.
Sine:
$$ \sin(\frac{\theta}{2}) = \pm\sqrt{\frac{1-\cos\theta}{2}} $$
Cosine:
$$ \cos(\frac{\theta}{2}) = \pm \sqrt{\frac{1 + \cos\theta}{2}} $$
Tangent:
$$
\begin{matrix}
\tan(\dfrac{\theta}{2}) = \pm\sqrt{\dfrac{1-\cos\theta}{1 + \cos\theta}}\\
= \dfrac{\sin\theta}{1 + \cos\theta}\\
= \dfrac{1 - cos\theta}{\sin\theta}
\end{matrix}
$$

View File

@ -107,6 +107,26 @@ $A$, $B$, $C$, and $D$ will have similar meanings to the cosecant function as th
- The vertical asymptotes of secant occur at $x = \frac{C}{B} + \frac{\pi}{2} + \frac{\pi}{2} + \frac{\pi}{|B|}k$, where $k$ is an integer.
- The vertical asymptotes of cosecant occur at $x = \frac{C}{B} + \frac{\pi}{|B|}k$, where $k$ is an integer.
- The vertical shift is $D$.
# Inverse Functions
For any one to one function $f(x) = y$, a function $f^{-1}(y) = x)$. A function is considered one-to-one if every input only has one output, and every output can only be created from a single input.
The inverse of a trig function is denoted as $sin^{-1}$, or $arcsin$ respectively.
The inverse of a trig function is **not** the same as the reciprocal of a trig function, $\frac{1}{sin}$ is not the same as $sin^{-1}$.
- The *domain* of $f$ is the *range* of $f^{-1}$.
- The *range* of $f$ is the *domain* of $f^{-1}$.
| Trig functions | Inverse trig functions |
| ----------------------------------- | ------------------------------------ |
| Domain: Angle measures | Domain: Ratio of sides of a triangle |
| Range: Ratio of sides of a triangle | Range: Angle Measure |
- To find the inverse of sin, you need to restrict the domain to $[-\frac{\pi}{2}, \frac{\pi}{2}]$
- To find the inverse of cos, you need to restrict the domain to $[0, \pi]$
- To find the inverse of tangent, you need to restrict the domain to $(-\frac{\pi}{2}, \frac{\pi}{2})$.
The graphs of an inverse function can be found by taking the graph of $f$, and flipping it over the line $y=x$.
# Examples
> Given $-2\tan(\pi*x + \pi) - 1$
@ -127,3 +147,8 @@ Vertical shift: $1$
| Period | $\frac{\pi}{\|\pi\|} = 1$ |
| Phase shift | $\frac{-\pi}{\pi} = -1$ |
| Vertical shift | $-1$ |
> Evaluate $\arccos{\frac{1}{2}}$ using the unit circle.
Taking the inverse of the above function, we get this. Because the domain of $cos$ ranges from $0$ to $\pi$ inclusive, the answer is going to be in quadrant 1 or quadrant 2.
$$ cos(a) = \frac{1}{2} $$
When $x$ is equal to one half, the angle is equal to $\frac{\pi}{3}$.

View File

@ -1,3 +1,4 @@
An **identity** is an equation that is true for all values of the variable for which the expressions in the equation are defined.
# Trigonometric Identities
All of the following only apply when the denominator is not equal to zero.
@ -63,4 +64,16 @@ $$ \frac{625}{625} - \frac{49}{625} = \frac{576}{625} = sin^2\theta $$
Getting rid of the exponent:
$$ \sqrt{\frac{576}{625}} = \frac{24}{25} = sin\theta $$
From there, you can find the rest of the identities fairly easily.
From there, you can find the rest of the identities fairly easily.
# Simplifying trig expressions using identities
Given the difference of square formula:
$$ a^2 - b^2 = (a-b)(a+b) $$
## Examples
Simplify $\tan\theta\sin\theta + \cos\theta$:
1. $\dfrac{\sin\theta}{\cos\theta} * \sin\theta + \cos\theta$
2. $\dfrac{\sin^2\theta}{cos\theta} + \cos\theta$
3. $(\dfrac{\sin^2\theta}{cos\theta} + \cos\theta)\dfrac{\cos\theta}{\cos\theta} = \sin^2\theta*\cos^2\theta + \cos\theta$
Si\

View File

@ -0,0 +1,6 @@
The Law of Cosines is useful when solving for SAS or SSS triangles.
$$ a^2 = b^2 + c^2 -2bc\cos(\alpha) $$
$$ b^2 = a^2 + c^2 -2ac\cos(\beta) $$
$$ c^2 = a^2 + b^2 -2ab\cos(\gamma) $$
- When using the Law of Cosines to solve for SSS triangles, start solving for the largest angle.
- When correctly solved, the smallest angle will be opposite the smallest side, and the largest angle will be opposite the largest side.

View File

@ -0,0 +1,33 @@
# Intro
Tl;dr, the law of sines is:
$$ \frac{\sin(\alpha)}{a} = \frac{\sin(\beta)}{b} = \frac{\sin(\gamma)}{c} $$
Under convention:
- Angle $\alpha$ is opposite side $a$
- Angle $\beta$ is opposite side $b$
- Angle $\gamma$ is opposite side $c$
- Any triangle that is *not a right triangle* is called an oblique triangle. There are two types of oblique triangles:
- **Acute triangles**: This is an oblique triangle where all three interior angles are less than $90\degree$ or $\dfrac{\pi}{2}$ radians.
- **Obtuse Triangle**: This is an oblique triangle where one of the interior angles is greater than $90\degree$.
## Different types of oblique triangles
1. **ASA Triangle**: (Angle Side Angle) - We know the measurements of two angles and the side between them
2. **AAS**: We know the measurements of two angles and a side that is not between the known angles.
3. **SSA**: We know the measurements of two sides and an angle that is not between the known sides.
These triangles can be solved by adding a line that goes from one vertex to intersect perpendicular to the opposite side, forming two right triangles ($h$).
## Solving for the law of sines
We know that $\sin\alpha = \dfrac{h}{b}$ and $\sin\beta = \dfrac{h}{a}$. We can sole both equations for $h$ to get:
- $h = b\sin\alpha$
- $h = a\sin\beta$
Setting both equations equal to each other gives us:
$b\sin\alpha = a\sin\beta$
Multiply both sides by $\dfrac{1}{ab}$ gives yields $\dfrac{\sin\alpha}{a} = \dfrac{\sin\beta}{b}$
# SSA triangles
Side side angle triangles may be solved to have one possible solution, two possible solutions, or no possible solutions.
- No triangle: $a < h$
- One triangle: $a \ge b$
- Two triangles: $h < a < b$
- One right triangle: $a = h$

View File

@ -0,0 +1,57 @@
A vector is a mathematical concept that denotes direction and magnitude. They're often notated using an arrow ($\vec{v}$), or with a bold, lowercase letter. (**v**).
Vectors are often denoted as a matrix with two rows: $\begin{bmatrix}1 \\2\end{bmatrix}$
# Component Form
If $\vec{v}$ is a vector with the initial point $(x_y,\ y_i)$, and a terminal point $(x_t,\ y_t)$, we can express $\vec{v}$ in component form as $\vec{v} = \langle x_t - x_i,\ y_t, -y_i \rangle$
# Magnitude
The magnitude of a vector is $|\vec{v}| = \sqrt{a^2 + b^2}$
# Direction
The direction of a vector is $\theta = \tan^-1(\frac{b}{a})$.
# Addition
To find $\vec{u} + \vec{v}$, we can put one vector on the end of another vector. The resulting vector will share the same tail as the first vector, and the same head as the second vector.
# Scalar Multiplication
A **scalar** is just a real number. Scalar multiplication is multiplying a vector with a real number. This will scale or shrink a vector, but does not change the direction it points at.
We do not multiply two vectors together.
# Unit Vector
A vector with a magnitude of 1 is a **unit vector**.
If $\vec{v}$ is a nonzero vector, the unit vector can be found using the equation $\vec{u} = \dfrac{1}{|\vec{v}|}\vec{v}$ . In other words, to find a unit vector, divide the vector by its magnitude.
# $i$, $j$ Notation
Every 2D vector has a horizontal component and a vertical component. The horizontal unit vector could be written as $i = \langle 1, 0 \rangle$, and the vertical unit vector could be written as $j = \langle 0, 1 \rangle$ Every vector can be made up using a combination of these standard unit vectors.
# Trigonometric Form
Given a vector $\vec{v}$ with a magnitude $|\vec{v}|$ and direction $\theta$:
The component form is given as:
$$ \vec{v} = \langle |\vec{v}||\cos \theta,\ |\vec{v}|\sin\theta \rangle $$
# Standard position
- A vector is in standard position if the initial point is at $(0, 0)$.
# The Dot Product
The dot product of two vectors $\vec{u} = \langle a, b \rangle$ and $\vec{v} = \langle c, d \rangle$ is $\vec{u} * \vec{v} = ac + bd$.
- Given that $\vec{u} = \langle -7, 3 \rangle$, and $\vec{v} = \langle -3, 4 \rangle$, find $\vec{u} \cdot \vec{v}$.
- $\vec{u} \cdot \vec{v} = -7 \cdot -4 + 3 \cdot 4$
The dot product can be used to find the angle between two vectors.
If $\theta (0\degree < \theta < 180\degree)$, is the angle between two nonzero vectors $\vec{u}$ and $\vec{v}$, then
$$ \cos\theta = \dfrac{\vec{u}\cdot\vec{v}}{|\vec{u}||\vec{v}|} $$
# Work
The dot product can be used to compute the work required to move an object a certain distance.
To compute work, you need a force and direction. If the force is applied in the same direction:
$$ W = Fd $$
The work $W$ is done by a constant force $\vec{F}$ in moving an object from a point $P$ to a point $Q$ is defined by:
$$ W = \vec{F} \cdot\vec{PQ} = |\vec{F}||\vec{PQ}|\cos\theta $$Where $\theta$ is the angle between $\vec{F}$ and $\vec{PQ}$.

Binary file not shown.

View File

@ -0,0 +1,213 @@
SA derivative can be used to describe the rate of change at a single point, or the *instantaneous velocity*.
The formula used to calculate the average rate of change looks like this:
$$ \dfrac{f(b) - f(a)}{b - a} $$
Interpreting it, this can be described as the change in $y$ over the change in $x$.
- Speed is always positive
- Velocity is directional
As the distance between the two points $a$ and $b$ grow smaller, we get closer and closer to the instantaneous velocity of a point. Limits are suited to describing the behavior of a function as it approaches a point.
If we have the coordinate pair $(a, f(a))$, and the value $h$ is the distance between $a$ and another $x$ value, the coordinates of that point can be described as ($(a + h, f(a + h))$. With this info:
- The slope of the secant line can be described as $\dfrac{f(a + h) - f(a)}{a + h - a}$, which simplifies to $\dfrac{f(a + h) - f(a)}{h}$.
- The slope of the *tangent line* or the *instantaneous velocity* can be found by taking the limit of the above function as the distance ($h$) approaches zero:
$$\lim_{h \to 0}\dfrac{f(a + h) - f(a)}{h}$$
The above formula can be used to find the *derivative*. This may also be referred to as the *instantaneous velocity*, or the *instantaneous rate of change*.
## Examples
> Differentiate $f(x) = 4\sqrt[3]{x} - \dfrac{1}{x^6}$
1. $f(x) = 4\sqrt[3]{x} = \dfrac{1}{x^6}$
2. $= 4x^\frac{1}{3} - x^{-6}$
3. $f'(x) = \dfrac{1}{3} * 4x^{-\frac{2}{3}} -(-6)(x^{-6-1})$
4. $= 4x^{-2-\frac{2}{3}} + 6x^{-7}$
5. $= \dfrac{4}{3\sqrt[3]{x^2}} + \dfrac{6}{x^7}$
# Point Slope Formula (Review)
$$ y - y_1 = m(x-x_1) $$
Given that $m = f'(a)$ and that $(x_1, y_1) = (a, f(a))$, you get the equation:
$$ y - f(a) = f'(a)(x - a) $$
As a more practical example, given an equation with a slope of $6$ at the point $(-2, -4)$:
$$ y - (-4) = 6(x - -2)$$
Solving for $y$ looks like this:
1. $y + 4 = 6(x + 2)$
2. $y = 6(x + 2) - 4$
3. $y = 6x + 12 - 4$
4. $y = 6x + 8$
# Line Types
## Secant Line
A **Secant Line** connects two points on a graph.
A **Tangent Line** represents the rate of change or slope at a single point on the graph.
# Notation
Given the equation $y = f(x)$, the following are all notations used to represent the derivative of $f$ at $x$:
- $f'(x)$
- $\dfrac{d}{dx}f(x)$
- $y'$
- $\dfrac{dy}{dx}$
- $\dfrac{df}{dx}$
- "Derivative of $f$ with respect to $x$"
# Functions that are not differentiable at a given point
- Where a function is not defined
- Where a sharp turn takes place
- If the slope of the tangent line is vertical
# Higher Order Derivatives
- Take the derivative of a derivative
# Constant Rule
The derivative of a constant is always zero.
$$ \dfrac{d}{dx}[c] = 0$$
For example, the derivative of the equation $f(x) = 3$ is $0$.
# Derivative of $x$
The derivative of $x$ is one.
For example, the derivative of the equation $f(x) = x$ is $1$, and the derivative of the equation $f(x) = 3x$ is $3$.
# Exponential Derivative Formula
Using the definition of a derivative to determine the derivative of $f(x) = x^n$, where $n$ is any natural number.
$$ f'(x) = \lim_{h \to 0} \dfrac{(x + h)^n - x^n}{h} $$
- Using pascal's triangle, we can approximate $(x + h)^n$
```
1
1 1
1 2 1
1 3 3 1
1 4 6 4 1
```
- Where $n = 0$: $(x + h)^0 = 1$
- Where $n = 1$: $(x +h)^1 = 1x + 1h$
- Where $n = 2$: $(x +h)^2 = x^2 + 2xh + h^2$
- Where $n = 3$: $(x + h)^3 = 1x^3h^0 + 3x^2h^1 + 3x^1h^2 + 1x^0h^3 = 1x^3 + 3x^2h + 3xh^2 + 1h^3$
Note that the coefficient follows the associated level of Pascal's Triangle (`1 3 3 1`), and $x$'s power decrements, while $h$'s power increments. The coefficients of each pair will always add up to $n$. Eg, $3 + 0$, $2 + 1$, $1 + 2$, and so on. The **second** term in the polynomial created will have a coefficient of $n$.
$$ \dfrac{(x + h)^n - x^n}{h} = \lim_{h \to 0} \dfrac{(x^n + nx^{n-1}h + P_{n3}x^{n-2}h^2 + \cdots + h^n)-x^n}{h} $$ $P$ denotes some coefficient found using Pascal's triangle.
$x^n$ cancels out, and then $h$ can be factored out of the binomial series.
This leaves us with:
$$ \lim_{h \to 0} nx^{n-1} + P_{n3} x^{n-2}*0 \cdots v * 0 $$
The zeros leave us with:
$$ f(x) = n, \space f'(x) = nx^{n-1} $$
# Sum and Difference Rules
$$ \dfrac{d}{dx}(f(x) \pm g(x)) = f'(x) \pm g'(x) $$
# Product Rule
$$ \dfrac{d}{dx} (f(x) * g(x)) = \lim_{h \to 0} \dfrac{f(x +h) * g(x + h) - f(x)g(x)}{h} $$
This is done by adding a value equivalent to zero to the numerator ($f(x + h)g(x) - f(x + h)g(x)$):
$$ \dfrac{d}{dx} (f(x) * g(x)) = \lim_{h \to 0} \dfrac{f(x +h) * g(x + h) + f(x + h)g(x) - f(x+h)g(x) - f(x)g(x)}{h} $$
From here you can factor out $f(x + h)$ from the first two terms, and a $g(x)$ from the next two terms.
Then break into two different fractions:
$$\lim_{h \to 0} \dfrac{f(x + h)}{1} * \dfrac{(g(x + h) - g(x))}{h)} + \dfrac{g(x)}{1} *\dfrac{f(x + h) - f(x)}{h} $$
From here, you can take the limit of each fraction, therefore showing that to find the derivative of two values multiplied together, you can use the formula:
$$ \dfrac{d}{dx}(f(x) * g(x)) = f(x) * g'(x) + f'(x)*g(x) $$
# Constant Multiple Rule
$$ \dfrac{d}{dx}[c*f(x)] = c * f'(x) $$
# Quotient Rule
$$ \dfrac{d}{dx}(\dfrac{f(x)}{g(x)}) = \dfrac{f'(x)g(x) -f(x)g'(x)}{(g(x))^2} $$
# Exponential Rule
$$ \dfrac{d}{dx} e^x = e^x $$
$$ \dfrac{d}{dx}a^x = a^x*(\ln(a)) $$
for all $a > 0$
# Logarithms
For natural logarithms:
$$ \dfrac{d}{dx} \ln |x| = \dfrac{1}{x} $$
For other logarithms:
$$ \dfrac{d}{dx} \log_a x = \dfrac{1}{(\ln a) x}$$
When solving problems that make use of logarithms, consider making use of logarithmic properties to make life easier:
$$ \ln(\dfrac{x}{y}) = \ln(x) - \ln(y) $$
$$ \ln(a^b) = b\ln(a) $$
## Logarithmic Differentiation
This is used when you want to take the derivative of a function raised to a function ($f(x)^{g(x)})$
1. $\dfrac{d}{dx} x^x$
2. $y = x^x$
3. Take the natural log of both sides: $\ln y = \ln x^x$
4. $\ln(y) = x*\ln(x)$
5. Use implicit differentiation: $\dfrac{d}{dx} \ln y = \dfrac{d}{dx} x \ln x$
6. Solve for $\dfrac{dy}{dx}$: $\dfrac{1}{y} \dfrac{dy}{dx} = 1 * \ln x + x * \dfrac{1}{x}$
7. $\dfrac{dy}{dx} = (\ln x + 1) * y$
8. Referring back to step 2, $y = x^x$, so the final form is:
9. $\dfrac{dy}{dx} = (\ln(x) + 1)x^x$
### Examples
> Find the derivative of $(7x + 2)^x$
1. $\ln y = \ln((7x+2)^x)$
2. $\ln y = x*\ln(7x + 2)$
3. $\dfrac{dy}{dx} \dfrac{1}{y} = \dfrac{7x}{7x + 2} * \ln(7x+2)$
4. $\dfrac{dy}{dx} = (\dfrac{7x}{7x+2} * \ln(7x+2))(7x+2)^x$
> Find the derivative of the function $y = (2x \sin x)^{3x}$
5. $\ln y = \ln (3x \sin x)^{3x}$
6. $\ln y = 3x * \ln(2x \sin x)$
7. $\dfrac{d}{dx} \ln(y) = \dfrac{d}{dx} 3x(\ln 2 + \ln x + \ln(sinx))$
8. $\dfrac{1}{y} \dfrac{dy}{dx} = 3(\ln 2 + \ln x + \ln(\sin(x))) + 3x (0 + \dfrac{1}{x} + \dfrac{1}{\sin x} * \cos x)$
9. $\dfrac{dy}{dx} = (3\ln 2 + 3 \ln x + 3\ln \sin(x) + 3\ln(\sin(x) + 3x\cot(x))(2x\sin x)^{3x}$
# Chain Rule
$$ \dfrac{d}{dx} f(g(x)) = f'(g(x))*g'(x) $$
## Examples
> Given the function $(x^2+3)^4$, find the derivative.
Using the chain rule, the above function might be described as $f(g(x))$, where $f(x) = x^4$, and $g(x) = x^2 + 3)$.
10. First find the derivative of the outside function function ($f(x) = x^4$):
$$ \dfrac{d}{dx} (x^2 +3)^4 = 4(g(x))^3 ...$$
11. Multiply that by the derivative of the inside function, $g(x)$, or $x^2 + 3$.
$$ \dfrac{d}{dx} (x^2 + 3)^4 = 4(x^2 + 3)^3 * (2x)$$
> Apply the chain rule to $x^4$
If we treat the above as a function along the lines of $f(x) = (x)^4$, and $g(x) = x$, then the chain rule can be used like so:
$$ 4(x)^3 * (1) $$
# Trig Functions
$$ \lim_{x \to 0} \dfrac{\sin x}{x} = 1 $$
$$ \lim_{x \to 0} \dfrac{\cos x - 1}{x} = 0 $$
## Sine
$$ f'(x) = \lim_{h \to 0} \dfrac{\sin(x + h) - sin(x)}{h} $$
Using the sum trig identity, $\sin(x + h)$ can be rewritten as $\sin x \cos h + \cos x \sin h$.
This allows us to simplify, ultimately leading to:
$$ \dfrac{d}{dx} \sin x = \cos x$$
## Cosine
$$ \dfrac{d}{dx} \cos x = -\sin x $$
## Tangent
$$ \dfrac{d}{dx} \tan x = \sec^2x $$
## Secant
$$ \dfrac{d}{dx} \sec x = \sec x * \tan x $$
## Cosecant
$$ \dfrac{d}{dx} \csc x = -\csc x \cot x $$
## Cotangent
$$ \dfrac{d}{dx} \cot x = -\csc^2 x $$
## Arcsin
$$ \dfrac{d}{dx}(\arcsin(x) = \dfrac{1}{\sqrt{1-x^2}}$$
# Implicit Differentiation
- There's a reason differentials are written like a fraction
- $\dfrac{d}{dx} x^2 = \dfrac{d(x^2)}{dx}$, or, "the derivative of $x^2$ with respect to $x$"
- $\dfrac{d}{dx} x = \dfrac{dx}{dx} = 1$ : The derivative of $x$ with respect to $x$ is one
- $\dfrac{d}{dx} y = \dfrac{dy}{dx} = y'$
- Given the equation $y = x^2$, $\dfrac{d}{dx} y = \dfrac{dy}{dx} = 2x$.
Given these facts:
12. Let $y$ be some function of $x$
13. $\dfrac{d}{dx} x = 1$
14. $\dfrac{d}{dx} y = \dfrac{dy}{dx}$

View File

@ -0,0 +1,229 @@
# Antiderivatives
An antiderivative is useful when you know the rate of change, and you want to find a point from that rate of change
> A function $F$ is said to be an *antiderivative* of $f$ if $F'(x) = f(x)$
## Notation
The collection of all antiderivatives of a function $f$ is referred to as the *indefinite integral of $f$ with respect to $x$*, and is denoted by:
$$ \int f(x) dx $$
## Examples
> Find the antiderivative of the function $y = x^2$
1. We know that to find the derivative of the above function, you'd multiply by the exponent ($2$), and subtract 1 from the exponent.
2. To perform this operation in reverse:
1. Add 1 to the exponent
2. Multiply by $\dfrac{1}{n + 1}$
3. This gives us an antiderivative of $\dfrac{1}{3}x^3$
4. To check our work, work backwards.
5. The derivative of $\dfrac{1}{3}x^3$ is $\dfrac{1}{3} (3x^2)$
6. $= \dfrac{3}{3} x^2$
## Formulas
| Differentiation Formula | Integration Formula |
| ----------------------------------------------------- | -------------------------------------------------------- |
| $\dfrac{d}{dx} x^n = nx^{x-1}$ | $\int x^n dx = \dfrac{1}{n+1}x^{n+1}+ C$ for $n \ne -1$ |
| $\dfrac{d}{dx} kx = k$ | $\int k \space dx = kx + C$ |
| $\dfrac{d}{dx} \ln \|x\| = \dfrac{1}{x}$ | <br>$\int \dfrac{1}{x}dx = \ln \|x\| + C$ |
| $\dfrac{d}{dx} e^x = e^x$ | <br>$\int e^x dx = e^x + C$ |
| $\dfrac{d}{dx} a^x = (\ln{a}) a^x$ | $\int a^xdx = \ln \|x\| + C$ |
| $\dfrac{d}{dx} \sin x = \cos x$ | $\int \cos(x) dx = \sin (x) + C$ |
| $\dfrac{d}{dx} \cos x = -\sin x$ | $\int \sin(x)dx = \sin x + C$ |
| $\dfrac{d}{dx} \tan{x} = \sec^2 x$ | $\int \sec^2(x)dx = \tan(x) + C$ |
| $\dfrac{d}{dx} \sec x = \sec x \tan x$ | $\int sec^2(x) dx = \sec(x) + C$ |
| $\dfrac{d}{dx} \sin^{-1} x = \dfrac{1}{\sqrt{1-x^2}}$ | $\int \sec(x) \tan(x) dx = \sec x + C$ |
| $\dfrac{d}{dx} \tan^{-1} x = \dfrac{1}{1+x^2}$ | $\int \dfrac{1}{\sqrt{1+x^2}}dx = \tan^{-1}x + C$ |
| $\dfrac{d}{dx} k f(x) = k f'(x)$ | $\int k*f(x)dx = k\int f(x)dx$ |
| $\dfrac{d}{dx} f(x) \pm g(x) = f'(x) \pm g'(x)$ | $\int (f(x) \pm g(x))dx = \int f(x) dx \pm \int g(x) dx$ |
# Area Under a Curve
The area under the curve $y = f(x)$ can be approximated by the equation $\sum_{i = 1}^n f(\hat{x_i})\Delta x$ where $\hat{x_i}$ is any point on the interval $[x_{i - 1}, x_i]$, and the curve is divided into $n$ equal parts of width $\Delta x$
Any sum of this form is referred to as a Reimann Sum.
To summarize:
- The area under a curve is equal to the sum of the area of $n$ rectangular subdivisions where each rectangle has a width of $\Delta x$ and a height of $f(x)$.
# Definite Integrals
Let $f$ be a continuous function on the interval $[a, b]$. Divide $[a, b]$ into $n$ equal parts of width $\Delta x = \dfrac{b - a}{n}$ . Let $x_0, x_1, x_2, \cdots, x_3$ be the endpoints of the subdivision.
The definite integral of $f(x)$ with respect to $x$ from $x = a$ to $x = b$ can be denoted:
$$ \int_{a}^b f(x) dx $$
And __can__ be defined as:
$$ \int_a^b f(x) dx = \lim_{n \to \infty} \sum_{i = 1}^n f(x_i)\Delta x$$
$f(x_i)$ is the *height* of each sub-interval, and $\Delta x$ is the change in the *x* interval, so $f(x_i) \Delta x$ is solving for the area of each sub-interval.
- If your function is always positive, then the value of a definite integral is the area under the curve.
- If the function is always negative, then the value of a definite integral is the area above the curve to zero.
- If the function has both positive and negative values, the output is equal to the area above the curve minus the area below the curve.
## Examples
> Find the exact value of the integral $\int_0^1 5x \space dx$
Relevant formulas:
$$ \sum_{i = 1}^n = \dfrac{(n)(n + 1)}{2} $$
$$ \Delta x = \dfrac{1 - 0}{n} = \dfrac{1}{n}$$$$ x_i = 0 + \Delta xi + \dfrac{1}{n} \cdot i$$
1. $\int_0^1 5x \space dx = \lim_{n \to \infty} \sum_{i=1}^n 5(x_i) \cdot \Delta x$
2. $= \lim_{n \to \infty} \sum_{i=1}^n 5(\frac{1}{n} \cdot i) \cdot \frac{1}{n}$
3. $= \lim_{n \to \infty} \sum_{i = 1}^n \dfrac{5}{n^2}\cdot i$
4. $= \lim_{n \to \infty} \dfrac{5}{n^2} \sum_{i = 1}^n i$
5. $= \lim_{x \to \infty} \dfrac{5}{n^2} \cdot \dfrac{n(n + 1)}{2}$
6. $= \lim_{n \to \infty} \dfrac{5n^2 + 5n}{2n^2}$
7. $= \dfrac{5}{2}$
# Properties of Integrals
1. $\int_a^a f(x)dx = 0$ - An integral with a domain of zero will always evaluate to zero.
2. $\int_b^a f(x)dx = -\int_a^b f(x) dx$ - The integral from $a \to b$ is equal to the integral from $-(b\to a)$
3. $\int_a^b cf(x) dx = c \int_a^b f(x) dx$ - A constant from inside of an integral can be moved outside of an integral
4. $\int_a^b f(x) \pm g(x) dx = \int_a^b f(x) dx \pm \int_a^b g(x)dx$ - Integrals can be distributed
5. $\int_a^c f(x)dx = \int_a^b f(x)dx + \int_b^c f(x)dx$ - An integral can be split into two smaller integrals covering the same domain, added together.
# Averages
To find the average value of $f(x)$ on the interval $[a, b]$ is given by the formula:
Average = $\dfrac{1}{b-a} \int_a^b f(x)dx$
# The Fundamental Theorem of Calculus
1. Let $f$ be a continuous function on the closed interval $[a, b]$ and let $F$ be any antiderivative of $f$, then:
$$\int_a^b f(x) dx = F(b) - F(a)$$
2. Let $f$ be a continuous function on $[a, b]$ and let $x$ be a point in $[a, b]$.
$$ F(x) = \int_a^x f(t)dt \Rightarrow F'(x) = f(x) $$
This basically says that cancelling out the derivative from $a$ to $x$ can be done by taking the derivative of that equation. with respect to $x$.
$$ \dfrac{d}{dx} \int_a^{g(x)} f(t) dt = f(g(x)) * g'(x)* $$
## Examples
> Finding the derivative of an integral
$$ \dfrac{d}{dx} \int_2^{7x} \cos(t^2) dt = cos((7x)^2) * 7 = 7\cos(49x^2)$$
> Finding the derivative of an integral
$$ \dfrac{d}{dx}\int_0^{\ln{x}}\tan(t) = \tan(\ln(x))*\dfrac{1}{x} $$
> $x$ and $t$ notation *(note: the bar notation is referred to as "evaluated at")*
$$ F(x) = \int_4^x 2t \space dt = t^2 \Big|_4^x = x^2 - 16$$
> $x$ in top and bottom
$$ \dfrac{d}{dx} \int_{2x}^{3x} \sin(t) dt = \dfrac{d}{dx} -\cos(t)\Big|_{2x}^{3x} = \dfrac{d}{dx} (-\cos(3x) + cos(2x) = 3\sin(3x) - 2\sin(2x) $$
# The Mean Value Theorem for Integrals
If $f(x)$ is continuous over an interval $[a, b]$ then there is at least one point $c$ in the interval $[a, b]$ such that:
$$f(c) = \dfrac{1}{b-a}\int_a^bf(x)dx $$
This formula can also be stated as $\int_a^b f(x)dx = f(c)(b-a)$
This theorem tells us that a continuous function on the closed interval will obtain its average for at least one point in the interval.
# U-Substitution
When you see $dx$ or $du$ in a function, it can be thought of as roughly analogous to $\Delta x$, where the change in $x$ is infinitesimally small.
Thinking back to derivatives, when solving for $\dfrac{dy}{dx}$, you're solving for the rate of change of $y$ (across an infinitely small distance) over the rate of change of $x$ (across an infinitely small instance). Given that the *slope* of a line is described as $\dfrac{\text{rise}}{\text{run}}$, we know that $\dfrac{dy}{dx}$ describes the slope of a line at a particular point.
## Formulas
- $\int k {du} = ku + C$
- $\int u^n du = \frac{1}{n+1}u^{n+1} + C$
- $\int \frac{1}{u} du = \ln(|u|) + C$
- $\int e^u du = e^u + C$
- $\int \sin(u) du = -\cos(u) + C$
- $\int \cos(u) du = \sin(u) + C$
- $\int \dfrac{1}{\sqrt{a^2 - u^2}} du = \arcsin(\frac{u}{a}) +C$
- $\int \dfrac{1}{a^2+u^2}du = \dfrac{1}{a} \arctan(\frac{u}{a}) + C$
- $\int \dfrac{1}{u\sqrt{u^2 - a^2}} du = \dfrac{1}{a}arcsec(\dfrac{|u|}{a}) + C$
# Length of a Curve
## Review of the Mean Value Theorem
If $f$ is a continuous function on the interval $[a, b]$ and differentiable on $(a, b)$, then there exists a number $c$ in the interval $(a, b)$ such that:
$$ f'(c) = \dfrac{f(b) - f(a)}{b - a} $$
This also implies that for some $c$ in the interval $(a, b)$:
$$ f(b) - f(a) = f'(c)(b-a) $$
## Intuitive Approach
Given that we divide a curve into $n$ sub-intervals, and we can find the location of the right endpoint of each interval.
With a series of points on a curve we can find the distance between each point.
As we increase $n$, the precision of which the curve is estimated increases.
This means that:
$$ \text{length of a curve} = \lim_{n \to \infty} \sum_{i=1}^{n}(\text{length of line segment)}$$
Using the distance formula, we know that the length of the line segment can be found with:
$$ \sqrt{(x_2 - x_1)^2 + (y_2 - y_1)^2} $$
1. So the entire equation is:
$$ \text{length of a curve} = \lim_{n \to \infty} \sum_{i=1}^{n}(\sqrt{(x_i - x_{i-1})^2 + (y_i - y_{i-1})^2}) $$
This can also be described as:
$$ \text{length of a curve} = \lim_{n \to \infty} \sum_{i=1}^{n}(\sqrt{(\Delta x)^2 +(\Delta y)^2}) $$
2. Using the mean value theorem:
$$ \lim_{n \to \infty} \sum_{i = 1}^n\sqrt{\Delta x^2 + (f(x_i) - f(x_{i-1}))i^2} $$l
$$ \lim_{n \to \infty} \sum_{i=1}^n \sqrt{\Delta x ^2 + (f'(x_{\hat{i}}))(x_i - x_{i-1})^2}$$
3. Factoring out $\Delta x$
$$ \lim_{n \to \infty} \sum_{i=1}^n \sqrt{\Delta x^2(1 + f'(x_{\hat{i}}))}$$
4. Moving $\Delta x$ out of the root
$$ \lim_{n \to \infty} \sum_{i=1}^n \sqrt{(1 + f'(x_{\hat{i}}))} \Delta x$$
5. As an integral:
$$ L =\int_a^b \sqrt{1 + f'(x)^2} dx$$
## Examples
> Find the length of the curve $y = -\frac{5}{12}x + \frac{7}{12}$ from the point $(-1, 1)$
1. $L = \int_{-1}^8 \sqrt{1 + (-\frac{5}{12})^2} dx$
2. $= \int_{-1}^8 \sqrt{1 + \frac{25}{144}} dx$
3. = $\int_{-1}^8 \sqrt{\frac{169}{144}}dx$
4. $= \int_{-1}^8 \frac{13}{12} dx$
5. $\frac{13}{12} x \Big| _{-1}^8$
> Find the distance from the point ${\frac{1}{2}, \frac{49}{48}}$ to the point $(5, \frac{314}{15})$ along the curve $y = \dfrac{x^4 - 3}{6x}$.
> *note*: The complete evaluation of this problem is more work than typically required, and is only done for demonstration purposes.
1. $y' = \dfrac{4x^3(6x) - (x^4 + 3)6}{36x^2}$: Find the derivative of the curve using the quotient rule
2. $= \dfrac{18x^4 - 18}{36x^2}$: Simplify
3. $= \dfrac{18(x^4 - 1)}{18(2x^2)}$: Factor out $18$
4. $= \dfrac{x^4 - 1}{2x^2}$: Factor out $18$ again
5. $L = \int_{1/2}^5 \sqrt{1 + (\dfrac{4x-1}{2x^2})^2}dx$ : Use the length formula
6. $= \int_{1/2}^5 \sqrt{1 + \dfrac{x^8 - 2x^4 + 1}{x^4}} dx$: Apply the $^2$
7. $= \int_{1/2}^5 \sqrt{\dfrac{4x^4 + x^8 -2x^4 + 1}{4x^4}}dx$: Set $1 = \dfrac{4x^4}{4x^4}$ and add
8. $= \int_{1/2}^5 \sqrt{\dfrac{x^8 + 2x^4 + 1}{4x^4}}dx$: Factor the numerator
9. $= \int_{1/2}^5 \sqrt{\dfrac{(4x+1)^2}{4x^4}}dx$ : Get rid of the square root
10. = $\int_{1/2}^5 \dfrac{x^4 + 1}{2x^2}dx$: Move the constant $\frac{1}{2}$ outside of the integral
11. $= \frac{1}{2}\int_{1/2}^5 \dfrac{x^4 + 1}{x^2}$: Rewrite to remove the fraction
12. $= \frac{1}{2} \int_{1/2}^5 (x^4 + 1)(x^{-2})dx$: distribute
13. $= \frac 1 2 \int_{1/2}^5 (x^2 - x^{-2})dx$: Find the indefinite integral
14. $= \dfrac{1}{2} (\frac{1}{3}x^3 - x^-1)\Big|_{1/2}^5$ : Plug and chug
15. $= (\frac{125}{6} - \frac{1}{10}) - (\frac{1}{48} - 1)$
16. $=(\frac{5000}{240} - \frac{24}{240}) - (\frac{5}{240} - \frac{240}{240})$
> Find the length of the curve $y = \sqrt{1 - x^2}$
1. $y$ has a domain of $[-1, 1]$
2. $y' = \dfrac{1}{2}(1-x^2)^{-1/2}(-2x)$
3. $= -\dfrac{x}{\sqrt{1 - x^2}}$
4. $L = \int_{-1}^1 \sqrt{1 + (-\dfrac{x}{\sqrt{1-x^2}})^2}dx$
5. $L = \int_{-1}^1 \sqrt{1 + \dfrac{x^2}{1-x^2}}dx$
6. $L = \int_{-1}^1 \sqrt{\dfrac{1}{1-x^2}}dx$
7. $L = \int_{-1}^1 \dfrac{1}{\sqrt{1-x^2}}dx$
8. $L = \arcsin(x) \Big|_{-1}^1$
> Set up an integral to find the length of the curve $y = \sin(x)$ from the point $(0, 0)$ to the point $(2\pi, 0)$.
1. $L = \int_0^{2\pi} \sqrt{1 + \cos^2{x}}dx$ : The derivative of $\sin$ is $\cos$
2. Plug into calculator
# Area Between Curves
If the area under the curve is found by approximating the space between the curve and the $x$ intercept, then the area *between* two curves can be found by approximating the space between the top curve and the bottom curve.
Visualized as a set of rectangles, each rectangle would have a corner on the top curve, and a corner on the bottom curve, with a width of $\Delta x$.
The height of the rectangle, or the distance between the curves at a given point can be found with the formula $f(x) - g(x)$ where $f(x) \ge g(x)$
The Riemann Sum definition of the area between two curves is as follows:
$$ \lim_{n \to \infty} \sum_{i = 1}^n (f(x_i)-g(x_i)\cdot \Delta x)$$
- $i$ is the sub-interval
- $x_i$ is the $x$ coordinate at a given sub-interval
- $\Delta x$ is the width of each sub-interval.
This sum can also be described as:
$$ = \int_a^b(f(x)-g(x))dx $$
Where the two lines intersect each other, you'll need to split the solution into a sum of integrals to ensure that $f(x) \ge g(x)$, by swapping the two.
# Rotating a Solid Formed from a Rotation of a Plane Region
Similar to finding the area between two curves, the volume can be found by approximating with rectangles.
The area of each slice can be found by taking the area of the inner circle ($\pi r^2$) and subtracting it from the bigger circle ($\pi R ^2$). The area of a washer (or cylinder) can be found with $\text{base} * \text{height}$, and the height of each subsection is $\Delta x$.
The Riemann Sum definition is defined as follows:
$$ \lim_{x \to \infty} \sum_{i = 1}^n ((\pi\cdot(f(x_i))^2-\pi\cdot(g(x_i))^2)\Delta x$$
- $\Delta x$: The width of each section
- $\pi * (f(x_i))^2$: The area of larger circle formed by $f(x_i)$
- $\pi * (f(x_i))^2$: The area of smaller circle formed by $f(x_i)$

View File

@ -0,0 +1,112 @@
# Introduction
Every mathematical function can be thought of as a set of ordered pairs, or an input value and an output value.
- Examples include $f(x) = x^2 + 2x + 1$, and $\{(1, 3), (2, 5), (4, 7)\}$.
**A limit describes how a function behaves *near* a point, rather than *at* that point.***
- As an example, given a *well behaved function* $f(x)$ and the fact that:
- $f(1.9) = 8.41$
- $f(1.999) = 8.99401$
- $f(2.1) = 9.61$
- $f(2.01) = 9.061$
- $f(2.0001) = 9.0006$
We can note that the smaller the distance of the input value $x$ to $2$, the smaller the distance of the output to $9$. This is most commonly described in the terms "As $x$ approaches $2$, $f(x)$ approaches $9$", or "As $x \to 2$, $f(x) \to 9$."
Limits are valuable because they can be used to describe a point on a graph, even if that point is not present.
# Standard Notation
The standard notation for a limit is:
$$ \lim_{x \to a} f(x) = L $$
- As $x$ approaches $a$, the output of $f(x)$ draws closer to $L$. In the above notation, $x$ and $a$ are not necessarily equal.
- When plotted, the hole is located at $(a, L)$.
# Indeterminate Limits
If they have a limit of the form $lim_{x \to a} \frac{f(x)}{g(x)}$ where both $f(x) \to 0$ and $g(x) \to 0$ as $x \to a$ then this limit **may or may not** exist and is said to be an indeterminate form of type $\dfrac{0}{0}$.
To find this limit if it exists we must perform some mathematical manipulations on the quotient in order to change the form of the function. Some of the manipulations that can be tried are:
- Factor or Foil polynomials and try dividing out a common factor.
- Multiply numerator and denominator by the conjugate of a radical expression
- Combine fractions in the numerator or denominator of a complex fraction
# Limits of the Form $\frac{k}{0}, k \ne 0$
If we have a one sided limit of the form $\lim_{x \to a^*} \frac{f(x)}{g(x)}$ $f(x) \to k (k \ne 0)$ and $g(x) \to 0$ as $x \to a$ then:
$$ \lim_{x \to a^*} \frac{f(x)}{g(x)} = \infty \space or \space \lim_{x \to a^*} \frac{f(x)}{g(x)} = -\infty $$
# Limits of the Form $\frac{\infty}{\infty}$
If we have a limit of the form $\lim_{x \to a} \frac{f(x)}{g(x)}$ where both $f(x) \to \infty$ and $g(x) \to \infty$ as $x \to a$ then the limit may or may not exist and is said to be an indeterminate form of type $\frac{\infty}{\infty}$.
To find the limit if it exists we must perform some algebraic manipulations on the quotient in order to change the form of the function.
If $f(x)$ and $g(x)$ are polynomials, then we can multiply the numerator and denominator by $\dfrac{1}{x^n}$, where $n$ is the degree of the polynomial in the denominator.
# Continuity
A function is continuous if their graph can be traced with a pencil without lifting the pencil from the page.
Formally, a function $f$ is continuous at a point $a$ if:
- $f(a)$ is defined
- $\lim_{x \to a} f(x)$ exists
- $\lim_{x \to a} = f(a)$
- A function is continuous on the open interval $(a, b)$ if it is continuous at all points between $a$ and $b$
- A function is continuous on the closed interval $[a, b]$ if it is continuous at all points between $a$ and $b$
# Elementary Functions
An elementary function is any function that is defined using:
- Polynomial functions
- Rational functions
- Root functions
- Trig functions
- Inverse trig functions
- Exponential functions
- Logarithmic functions
- Operations of:
- Addition
- Subtraction
- Multiplication
- Division
- Composition
A piece-wise function is *not* considered an elementary function
- If $f$ and $g$ are continuous at a point $x = a$ and $c$ is a constant then the following functions are also continuous at $x = a$
- If $g$ is continuous at $a$ and $f$ is continuous at $g(a)$, then $f(g(a))$ is continuous at $a$
- If $f$ is an elementary function and if $a$ is in the domain of $f$, then $f$ is continuous at $a$
Together, the above theorems tell us that if $a$ is in the domain of an elementary function, then $\lim_{x \to a} f(x) = f(a)$.
# Intermediate Value Theorem
Let $f$ be a continuous function on the interval $[a, b]$ and let $N$ be any number strictly between $f(a)$ and $f(b)$. Then there exists a number $c$ in $(a, b)$ such that $f(c) = N$.
# Definitions
| Term | Definition |
| --------------------- | ----------------------------------------------------------------------------- |
| Well behaved function | A function that is continuous, has a single value, and is defined everywhere. |
# L'Hospital's Rule
If you have a limit of the indeterminate form $\dfrac{0}{0}$, the limit can be found by taking the derivative of the numerator, divided by the derivative of the denominator.
$$ \lim_{x \to 2} \dfrac{x-2}{x^2-4} = \lim_{x \to 2} \dfrac{1}{2x}$$
L'Hospital's Rule can also be used when both the numerator and denominator approach some form of infinity.
$$ \lim_{x \to \infty} \dfrac{x^2-2}{3x^2-4} = \lim_{x \to \infty} \dfrac{2x}{6x}$$
The above problem can be solved more easily *without* L'Hospital's rule, the leading coefficients are 1/3, so the limit as $x$ approaches $\infty$ is 1/3.
L'Hospital's rule **cannot** be used in any other circumstance.
## Examples
1. $\lim_{x \to 0} \dfrac{7^x - 5^x}{2x}$
2. $= \lim_{x \ to 0}\dfrac{7^x \ln(7) -5^x(\ln(5)}{2}$
3. $= \dfrac{\ln(7) - \ln(5)}{2}$
# Indeterminate form $(0 * \infty)$
If the $\lim_{x \to a}f(x) = 0$ and $\lim_{x\to a} g(x) = \infty$ then $\lim_{x \to a}(f(x) * g(x)$ may or may not exist.
To evaluate an indeterminate product ($0 * \infty$), use algebra to convert the product to an equivalent quotient and then use L'Hopsital's Rule.
$$ \lim_{x \to 0^+} x\ln(x) = \lim_{x \to 0^+}\dfrac{\ln x}{\dfrac{1}{x}} = \lim_{x \to 0^+} \dfrac{1/x}{-1/(x^2)} = \lim_{x \to 0^+} -x = 0 $$
# Indeterminate form $(\infty - \infty)$:
If the $\lim_{x \to a}f(x) = \infty$ and $\lim_{x \to a} (g(x)) = \infty$ , then $\lim_{x \to a}(f(x) - g(x))$ may or may not exist.
# Indeterminate Powers
When considering the $\lim_{x \to a} f(x)^{g(x)}$, the following are indeterminate:
- $0^0$
- $\infty^0$
- $1^\infty$
1. $\lim_{x \to 0^+} x^x$
2. $= \lim_{x \to 0} e^{\ln(x^x)}$ - wrap $e^{\ln{x}}$ around the function
3. $= e^{\lim_{x \to 0} x \ln(x)}$ -use L'Hospital's rule

View File

@ -0,0 +1,45 @@
z# Maximum/Minimum
A function $f$ has an *absolute maximum* at $c$ if $f(c) >= f(x)$. We call $f(c)$ the maximum value of $f$.
The absolute **maximum** is the largest possible output value for a function.
A function $f$ has an absolute minimum at $c$ if $f(c) <= f(x)$. $f(c)$ is the absolute minimum value of $f$.
The absolute **minimum** is the smallest possible output value for a function.
- Where the derivative of a function is zero, there is either a peak or a trough.
# Critical Numbers
A number is considered critical if the output of a function exists and $\dfrac{d}{dx}$ is zero or undefined.
# Local Max/Min
A local max/min is a peak or trough at any point along the graph.
# Extreme Value Theorem
If $f$ is a continuous function in a closed interval $[a, b]$, then $f$ achieves both an absolute maximum and an absolute minimum in $[a, b]$. Furthermore, the absolute extrema occur at $a$ or at $b$ or at a critical number between $a$ and $b$.
## Examples
> Find the absolute maximum and absolute minimum of the function $f(x) = x^2 -3x + 2$ on the closed interval $[0, 2]$:
1. $x=0$ and $x=2$ are both critical numbers because they are endpoints. Endpoints are *always* critical numbers because $\dfrac{d}{dx}$ is undefined.
2. $\dfrac{d}{dx} x^2 -3x + 2 = 2x -3$
3. Setting the derivative to zero, $0 = 2x - 3$
4. Solving for x, we get $x = \dfrac{3}{2}$. Three halves is a critical number because $f'(\dfrac{3}{2})$ is $0$.
5. Now check the outputs for all critical numbers ($f(x)$ at $x = \{0, 2, \dfrac{3}{2}\}$)
6. $f(0) = 0^2 -3(0) + 2 = 2$
7. $f(2) = 2^2 - 3(2) + 2) = 0$
8. $f(\dfrac{3}{2}) = (\dfrac{3}{2})^2 - 3(\dfrac{3}{2}) + 2 = -\dfrac{1}{4}$
9. The minimum is the lowest of the three, so it's $-\dfrac{1}{4}$ and it occurs at $x = \dfrac{3}{2}$
10. The maximum is the highest of the three, so it's $2$ at $x = 0$.
> Find the absolute maximum and absolute minimum of the function $h(x) = x + 2cos(x)$ on the closed interval $[0, \pi]$.
1. $x = 0$ and $x = \pi$ are both critical numbers because they are endpoints. Endpoints are critical because $\dfrac{d}{dx}$ is undefined.
2. $\dfrac{d}{dx} x + 2\cos(x) = 1 - 2sin(x)$
3. Setting that to zero, we get $0 = 1 - 2\sin(x)$
4. $\sin(x) = \dfrac{1}{2}$
5. In the interval $[0, \pi]$, $\sin(x)$ has a value of $\dfrac{1}{2}$ in two places: $x = \dfrac{\pi}{6}$ and $x = \dfrac{5\pi}{6}$. These are both critical numbers because they are points where $\dfrac{d}{dx}$ is zero.
6. Now we plug these values into the original function:
7. $h(0) = 0 + 2\cos 0 = 2$
8. $h(\pi) = \pi + 2\cos(\pi) = \pi - 2 \approx 1.14159$
9. $h(\dfrac{\pi}{6}) = \dfrac{\pi}{6} + 2\cos(\dfrac{\pi}{6}) = \dfrac{\pi}{6} + 2(\dfrac{\sqrt{3}}{2} = \dfrac{\pi}{6} + \sqrt{3} \approx 2.2556$
10. $h(\dfrac{5\pi}{6}) = \dfrac{5\pi}{6} + 2\cos(\dfrac{5\pi}{6}) = \dfrac{5\pi}{6} - \sqrt{3} \approx 0.88594$

View File

@ -1,55 +0,0 @@
# Work
## Historical, Superficial
Franz Liszt was a huge fan of Paganini because of his incredible skill, and the technicality of his music. This led him to set out and compose a set of etudes[^1] inspired from Paganini's works. He originally released them in 1838 as the "Études d'exécution transcendante d'après Paganini", then revised them in 1851, dedicating the later revision to Clara Schumann[^2]. He made this revision because the first versions were so absurdly difficult that they were considered impossible to play by many. Even after the revision, many consider these some of the most technically demanding works in piano literature.
[^1]: Literally translating to "study", an etude is a short song usually meant to help practice a particular technique
[^2]: Wife of Robert Schumann, Clara Schumann was an accomplished pianist and composer.
## Analysis
### Questions
> What did the composer have in mind?
> What is the general mood?
The music is generally pretty dramatic and intense, although there are some slower, gentler sections.
> What might it mean?
> What parts do you most like?
I really like
> What parts do you least like?
> What style is it?
> How do you know?
> What medium is it
> What texture
# Composer
## History
Liszt fell very ill, to the extent that an obituary notice was printed in a Paris newspaper, and he underwent a long period of religious doubts and pessimism.
- guitar face for pianos
## Last Name
https://german.stackexchange.com/questions/67786/is-liszt-really-pronounced-like-the-english-word-list
TODO
## Freakishly Large Hands
His hands weren't as large as Rachmaninoff, but they had effectively no connective tissues at the base of each finger
# Notes during production
- was going to include a pic of a cast of his hands, but it's pretty manky
- can you imagine the crushing disappointment
# Links
https://en.wikipedia.org/wiki/Franz_Liszt
https://en.wikipedia.org/wiki/Grandes_%C3%A9tudes_de_Paganini
https://imslp.org/wiki/Grandes_%C3%A9tudes_de_Paganini,_S.141_(Liszt,_Franz)
https://researchrepository.wvu.edu/cgi/viewcontent.cgi?article=6402&context=etd
https://lisztmuseum.hu/permanent_exhibition/dining-room-120755
https://www.pianostreet.com/smf/index.php?topic=65517.0

View File

@ -107,4 +107,10 @@ Complex carbs have 3 or more monosaccharides bonded together
# Hyper/Hypoglycemia
- Hyperglycemia results in abnormally elevated blood glucose levels
- Hypoglycemia results in abnormally low blood glucose levels
- Hypoglycemia results in abnormally low blood glucose levels
# Diabetes
## Type 1
An autoimmune disorder, type 1 diabetes prevents the body from releasing insulin.
## Type 2
The body is able to release insulin, but the cells don't respond to it

View File

@ -0,0 +1,111 @@
- An overweight person has extra weight from bones, fat, muscle, body fat, and/or body wader
- Obesity is a condition characterized by excessive and unhealthy bodyfat
# Consequences
## Obesity
- Type II Diabetes (DM)
- **Hypertension**
- Cardiovascular disease
- **Obstructive sleep apnea**
- Osteoarthritis
- Infertility
- Certain cancers
- Gallbladder disease
- Respiratory problems
- Surgical complications
- Clinical depression
- Metabolic syndrome
- **Stroke**
# Underweight
- Fatigue / Anemia
- Nutrient deficiencies
- Lack of energy
- Poor concentration
- Unhealthy hair, skin, nails
- Osteoporosis
- Illness/infection
- Bone fractures
- Amenorrhea
- Infertility
- High risk pregnancy
- Clinical depression
- Low body temperature
# BMI
- A numerical value based on the ratio between a person's height and weight that is used to **classify a person's weight** and **measure risk for disease**
- Can be calculated using:
$$ \dfrac{Weight (kg)}{Height (m)^2} or \dfrac{Weight (lbs)}{Height (in)^2} * 703 $$
Conversions:
- Lbs -> Kg: Divide by 2.2
- Feet -> Inches: Multiply by 12
- Inches -> Meters: Multiply by 2.54 / 100
## Ranges
- Underweight: BMI < 18.5
- Healthy weight: BMI 18.5 - 24.9
- Overweight: BMI 25.0 - 29.9
- Obese: BMI >= Obses
- Obese Class I: BMI 30-34.9
- Obese Class II: BMI 35-39.9
- Obese Class III: BMI >=40
## Limitations
Not always accurate for:
- Highly muscular individuals
- Older adults
- Chronically ill individuals
- BMI does not take gender, age, race, or activity level into account
## NWO
- Normal weight obesity refers to a normal body weight as measured by BMI, but they actually have higher body fat
- Comes with an associated risk of insulin resistance
- Diabetes
- Coronary artery disease
# Body Composition and Fat Distribution
- Body composition is the relative and absolute measurement of body tissues, usually expressed as a percent body fat
- Adipose tissue refers to fat cells
- Total body fat refers to to adipose tissue and essential fat
- Essential fat is fat that is vital for survival; found in cell membranes, certain bones, and nervous tissue.
- **Subcutaneous** is fat accumulation of adipose tissue cells in the tissue under the skin.
- This layer helps to:
- *Insulate the body against cold temps*
- *Protect the body from bumps and bruises*
- **Visceral fat** is the accumulation of adipose cells under the abdominal muscles and over the digestive organs to protect them
- Types of obesity
- **Apple shaped (Central body)**: Central body obesity: Risk of heart diseases, stroke, diabetes, HTN, cancer. This is more common in men. This is symbolic of extra visceral fat stores
- **Gynoid (Pear shaped)**: Not associated w/ Chronic Disease Risk
## Assessment
- Hydrostatic weight (error of 2-3%)
- Air displacement plethysmography- BODPOD (error of 3-5%)
- Dual energy x-ray absorptiometry: DEXA (Error of 1-4%)
- **Bio-electrical impedance** (Error: 3-4%) Sends a shock through your body and measures how long it takes. Body fat resists electricity more.
- Skinfold calipers (Error 3-5%)
- **Waist circumference -> 35 inches for a women** or **>40 inches for a man** is associated with central adiposity and increased health risk, specifically CVD risk
## Health
- Losing as little as 5% of excess body fat
- Can increase HDL cholesterol levels
- Reduce high blood pressure
- Improve glucose tolerance
# Energy Exchange
## Energy In
- Carbs
- Lipids
- Proteins
- Alcohol
## Energy Out (Total Energy Expenditure )
- Basal metabolic rate
- The minimum number of kcals required to maintain normal body function after fasting and resting for 12 hours. **Accounts for ~60-75% of an individual's total energy use**
- Factors that increase BMR include thyroid hormone levels and postexercise recovery
- Factors that decrease BMR include starvation and aging.
- Physical activity
- Thermic effect of food (digestion, processing, et cetera)
- Non-exercise activity
Ghrelin is a hormone secreted by the stomach that stimulates eating behavior. Grehlin

View File

@ -0,0 +1,117 @@
- **Lipids** are a class of nutrients that do not dissolve in water.
- They will dissolve in organic solvents
- Oil is less dense than water, so it will rise to the top of a solution
- Major functions of lipids in the body include
- Providing and storing energy
- forming and maintaining cell membranes
- producing steroid hormones
- insulating the body
- cushioning the body against bumps and blows
- forming body contours
- **absorbing fat soluble vitamins and phytochemicals**
## Fatty Acids
A fatty acid is a hydrocarbon chain found in lipids; one end of the chain forms a carboxylic acid, and one end forms a methyl group.
- Short chain fatty acids have 2 to 4 carbons
- Medium chain fatty acids have 6 to 12 acids
- Long chan acids have 14 to 24 carbons
- Fatty acids are identified by:
- The number of carbon atoms
- The type of bond between carbon atoms
- An omega-3 fatty acid is a polyunsaturated fatty acid with its first double bond at the third carbon from the omega end of the chain.
- **Saturated fatty acid (SFA)** Every single carbon atom is filled with hydrogen atoms
- **Unsaturated fatty acid** is a fatty acid that is missing hydrogen atoms and has one or more double bonds within the carbon chain
- **Monounsaturated** (MUFA)
- Has **one** double bond within the carbon chain
- Sources include:
- **Canola oil**
- **Olive oil**
- **Avocados**
- Nuts
- Seeds
- Peanut butter
- **Polyunsaturated** (PUFA)
- Fatty acid that has **two or more bonds** within the carbon chain
- Sources include:
- **Soybean oil**
- **Fatty fish**
- **Flax seed**
- **Walnuts**
- Corn oil
- Sunflower oil
- Most naturally occurring fatty acids are cis fatty acids
- Hydrogen atoms of the double bonded carbon are on the same side of the hydrocarbon atom
- **Trans fats** are unsaturated fatty acids that have a trans double bond.
- Hydrogen atoms of the double bonded carbons are on the opposite side of the hydrocarbon chain
- **Hydrogenation** is the food manufacturing process that adds hydrogen atoms to liquid vegetable oil, forming trans fats.
- Can be stored for longer periods because they are less likely to undergo oxidation
- Raise "bad" cholesterol levels in the blood
- Increases risk of heart disease
- **Essential fatty acids** are fatty acids that must be supplied by the diet
- **Linoleic acid** - 18 carbon omega-6 fatty acid found in vegetable oils
- **Alpha-linolenic acid** - 18 carbon omega-3 unsaturated fatty acid, found in flaxseed, walnuts
- Precursor for
- Eicosapentaonoic acid (EPA) - 20 carbons
- Docosahexaenoic acid (DHA): 22 carbons
- Both acids are found mainly in fatty fish
- Essential fatty acids are needed for growth and healthy cell membranes, especially in the brain.
- Infants that have an essential fatty acid deficiency can experience developmental and nerve system issues.
- Signs of essential fatty acid deficiency include:
- Scaly skin
- Hair loss
- Poor wound healing
# Triglycerides
A lipid that has three fatty acids attached to a three-carbon compound called glycerol
- Comprises 95% of lipids in food and body
- **Glycerol** is a three carbon alcohol that forms the backbone of fatty acids
-
# Phospholipids
A phospholipid is a type of lipid needed for the flexibility, structure, and makeup of the cell membranes and for proper functioning of nerve cells.
- Partially water soluble
- Hydrophilic
- Part that attracts water
- Hydrophobic
- Part that repels water and attracts fat
- Can serve as an emulsifier
- Helps water soluble and water insoluble compounds mix with each other
# Sterols
Sterols are lipids that have a more chemically complex structure than a triglyceride or fatty acid
- -ol suffix: Attached to an alcohol
**Cholesterol** is a lipid found in animal foods: precursor for steroid hormones, **bile**, and vitamin D.
- Found in:
- Egg yolk
- Liver
- Meat
- Poultry
- Dairy products
| Cholesterol (mg/dl) | Classification |
| --------------------------- | -------------------------- |
| <200 | Desireable |
| 200-239 | Borderline high |
| >= 240 | High |
| **LDL Cholesterol (mg/dl)** | **Classification** |
| < 100 | Optimal |
| 100 - 129 | Near optimal/above optimal |
| 130-159 | Borderline high |
| 160-189 | High |
| >= 190 | Very high |
| **HDL Cholesterol (mg/dl)** | **Triglycerides (mg/dl)** |
| < 150 | Normal |
| 150-199 | Borderline high |
| >= 200 | High |
# Lipases
Lipases are enzymes that break down lipids
- **Cholecystokinin** is a hormone that stimulates the gallbladder to release bile and the pancreas to secrete digestive juices
- Bile helps with the emulsification of and digestion of fat.
- Secretin is a hormone that stimulates the liver to produce bile and the pancreas to secrete bicarbonate rich pancreatic juice
# Lipoproteins
Lipoproteins are water-soluble structures that transport lipids through the bloodstream. Lipoproteins are needed because fat is hydrophobic.
- **Chylomicron** mostly carries triglycerides
- **High density lipoprotein** (HDL) carries the most protein (45-50%), and roughly 30% phospholipids. HDL carries lipids away from tissues and to the liver, where they can be processed and eliminated. It's considered "good" cholesterol
- **Low density lipoprotein** (LDL) carries the most cholesterol, and it carries lipids from the liver out to other tissues in the body. It's considered "bad" cholesterol
- **Very low density lipoprotein** (VLDL) carries triglycerides from the liver into the bloodstream, where cells that line capillaries break down the triglycerides into fatty acids and glycerol
- **Oxidized LDL** is formed when chemically unstable substances damage LDL, transports cholesterol into the arterial lining

View File

@ -0,0 +1,132 @@
Minerals are inorganic, and **NOT** susceptible to degradation. Like vitamins, they provide 0 kcals per per gram
# Major Minerals
- Major minerals are essential mineral elements required in amounts of **100mg or more per day**
# Trace Minerals
- Trace minerals are essential mineral elements required in amounts that are **less than 100mg per day**
- They still perform vital roles
- Obtaining adequate amounts of them from food is difficult
## Iron
**Iron** is the most important trace mineral
- Iron has 4 major roles:
1. **Oxygen transport** - Needed for production of hemoglobin (red blood cells), myoglobin (muscle cells), and cytochromes (most body cells)
2. Cell division - Required by an enzyme needed for DNA production
3. Immune system - Needed for production of lymphocytes (a type of white blood cell). Enables neutrophils (another type of white blood cell) to destroy bacteria
4. Nervous system - Needed to help maintain the myelin sheath that covers parts of certain nerve cells, needed for the production of neurotransmitters (eg, dopamine, epinephrine, and norepinephrine that regulate brain and muscle activity).
- **Heme** is the iron-containing component of hemoglobin and myoglobin. Heme is a type of iron found in our food, food sources provide both heme iron and non-heme iron.
- **Hemoglobin** is the iron-containing protein in red blood cells that transports oxygen **to** cells, and carbon dioxide **away** from tissues.
- **Myoglobin** is the iron containing protein in red **muscle cells** that controls oxygen uptake from red blood cells
- **Cytochromes** are a group of proteins necessary for certain chemical reactions involved in the release of energy from macronutrients
- Heme iron is the form of iron **found in meat**, and it's absorbed efficiently
- Non-heme iron is a form of iron that's not absorbed as efficiently as heme iron
- Meat, vegetables, grains, supplements, and fortified or enriched foods
- To increase bioavailability, cook veggies in a cast iron pan with tomatoes or lemon juice (acid)
- Enriched foods are enriched with **non-heme** iron
| Improve | Harm |
| ---------------------------------------------------------- | ------------------------------------------------ |
| High intake of vitamin C with iron-containing food | High intake of calcium with iron-containing food |
| Consuming more heme, as compared to nonheme, forms of iron | Medications that reduce stomach acidity |
| Consuming bread that has been leavened | Oxalic acids from foods such as spinach |
| Consuming iron-containing foods that are fermentted | Phytic acid from foods such as whole grains |
| Soaking of beans or grains before consuming | Soy proteins from foods such as tofu |
| | Polyphenols from food and beverages such as tea |
The RDA for men and postmenopausal women is **8 mg/day**, and for premenopausal women, it's **18 mg/day**.
Iron intake for adolescent females is significantly higher because of increased iron needs to support growth, and iron losses due to menstruation. Iron deficiency in this demographic is exacerbated by poor dietary choices.
## Iron Toxicity
- **Hereditary hemochromatosis (HH)** is an inherited genetic defect that causes people to absorb too much iron
- Iron accumulates in tissues and can cause joint pain, abnormal bronze skin color, damage to the liver, heart, adrenal glands, and pancreas
- Organ damage caused by hemochromatosis can lead to cirrhosis, liver cancer, diabetes, or *cardiac arrhythmias (irregular heartbeats)*
- Common signs and symptoms include fatigue, lack of energy, abdominal pain, loss of sex drive, and heart problems
- Can be deadly if untreated
### Iron Deficiency
Anemia is the deficiency disorder caused by iron efficiency
- After red blood cells die, the body breaks them down and conserves most of the iron that was in hemoglobin
- Some iron is lost each day via the gastrointestinal tract, urine, skin, or any form of bleeding
- **Iron deficiency** refers to low iron stores in the body, and **iron deficiency is the most common nutrient deficiency in the US**.
- Anemic red blood cells can shrink, becoming pale, and misshapen
- Negative effects of iron deficiency anemia include interference with
- Growth
- Behavior
- Immune system function
- Energy metabolism
- Signs and symptoms of iron deficiency include:
- Pale skin and pale mucous membranes
- Fatigue and weakness
- Irritability
- Shortness of breath
- Brittle, cupped nails
- Decreased appetite
- Headache
- Over time, anemia can cause:
- Chest pain
- An enlarged heart
- Irregular heartbeat
## Iodine
- Iodide is the form of iodine that the boy absorbs and uses
- Sources of iodine include:
- Seaweed
- Saltwater fish
- Grains
- Cow's milk
- Eggs
- Iodized salt
- **Goiter** is the enlargement of the thyroid gland that is **not** the result of cancer
- Often occurs among populations living in areas that lack iodine in locally produced foods
- Iodine is required for **normal thyroid functions** and the production of thyroid hormone
- Hyperthyroidism refers to abnormally high blood levels of thyroid hormone
- Hypothyroidism refers to low levels of thyroid hormone
- Signs and symptoms include:
- Reduced metabolism
- Elevated blood cholesterol levels
- **Cretinism** is a condition in infants who are born to iodine-deficient women. The infants have permanent brain damage and growth retardation
- The fetus of a female who is deficient in iodine is likely to be born with a condition called **congenital hypothyroidism**
- Iodine deficiency is the most common cause of preventable intellectual disability worldwide
## Zinc
Zinc is necessary for:
- Growth and development
- Wound healing
- Sense of taste and smell
- DNA synthesis
- Cofactor for more than 50 enzymes
- Proper functioning of the nervous and immune system
- Oysters are one of the best sources of Zinc
- Other sources include whole grains, baked beans, beef roast, crab, yogurt, turkey, and soybeans
The bioavailability of zinc is enhanced when eaten with proteins, especially with sulfur containing amino acids
### Zinc Toxicity
- Excess of the UL -> Decreases HDL levels
- Even higher can cause:
- Diarrhea
- Cramps
- Nausea
- Vomiting
- Decreased immune function
- Interfere with copper absorption and metabolism
### Zinc Deficiency
- loss of appetite
- Diarrhea
- Hair loss
- Skin rash
- Poor wound healing
- Impaired sense of taste
- Mental slowness
- Iron deficiency anemia
- Poor growth and development
# Selenium
- Antioxidant
# Fluoride
Fluoride is not considered an essential nutrient
- Regular fluoride intake helps:
- Mineralize teeth and bones
- Presents tooth decay
### Fluoride Toxicity
- Dental fluorosis is an abnormal change in the appearance of tooth enamel due to chronically high fluoride exposure during tooth development

View File

@ -3,7 +3,7 @@
- Water is the major nutrient in most foods.
- All foods have *some* nutritional value
- Some food is healthier than others
* **Nutrient dense** food supplies more vitamins and minerals in relation to total calories. Examples inclue:
* **Nutrient dense** food supplies more vitamins and minerals in relation to total calories. Examples include:
* Broccoli
* Leafy greans
* Fat free milk

View File

@ -0,0 +1,203 @@
Proteins are large, complex, organic molecules made up of **amino acids**.
- Contain carbon, hydrogen, oxygen, and nitrogen
- Found in plants, animals, bacteria, and viruses
- Major functions of protein in the body:
- To build new cells and many parts of cells
- As a component in hardened structures like hair and nails
- As enzymes to speed chemical reactions
- As lubricants to ease movement
- In clotting compounds in blood
- To build antibodies that fight disease organisms
- As compounds that help maintain fluid and pH balance
- As transporters
- To make certain hormones
- As an energy source (as a last resort)
# Introduction
- By helping to maintain fluid balance, proteins prevent **edema** (accumulation of fluid in tissues
- Proteins also help maintain **acid-base balance**.
- Maintaining the proper pH of body fluids
- Acts as a buffer
# Amino acids
- Amino acids are nitrogen containing chemical units that comprise proteins
- There are 20 different amino acids found in the proteins of the human body
- Each amino acid has a carbon atom that anchors
- Hydrogen atom
- Amino or nitrogen containing group
- R group (side chain)
- carboxylic acid group
- nonessential amino acids are a group of amino acids that the body can make
- Essential amino acids are amino acids the body cannot make or cannot make enough of to meet its needs
- Conditionally essential amino acids are the amino acids the body cannot make or cannot make enough of to meet its needs
- There are 9 essential acids and 11 non-essential acids
| Essential | Nonessential |
| ---------------------------- | ------------- |
| Histidine | Alanine |
| Isoleucine | Aspartic acid |
| Leucine | Asparagine |
| Lysine | Glutanic acid |
| Methionine | Serine |
| Phenylanaline | Argine |
| Threonine | Cysteine |
| Tryptophan (extra important) | GLutamine |
| Valine | Glycine |
| | Proline |
| | Tyrosine |
TT HILL MVP
# Synthesis
A specific order of amino acids is needed to formulate a protein.
# DNA
- DNA (deoxyribonucleic acid) provides instructions for making proteins.
- **Genes** are a portion of DNA
- To make proteins, cells assemble amino acids into specific sequences according to information from DNA
- A **peptide bond** is a chemical attraction that connects two amino acids together
# DNA Process
1. Protein synthesis begins when a section of DNA unwinds, exposing a single portion (a gene). The gene contains coded info about the order of amino acids that comprise a specific protein
2. The gene undergoes **transcription**, that is, the sequence of amino acids copied is copied in a special manner, forming **messenger RNA** (mRNA) in the process.
3. mRNA transforms the information concerning the amino acid sequence form the nucleus to **ribosomes**, protein manufacturing sites in cytoplasm.
4. During the **translation** process, ribosomes "read" mRNA. The coded instructions indicate which amino acid to add to the polypeptide chain and its sequence.
5. Each specific **transfer RNA** (tRNA) molecule conveys a particular amino acid to the ribosome.
6. At the ribosome, the amino acid that has been delivered by the tRNA attaches to the peptide chain, lengthening it.
7. When the translation process is complete, the ribosome release the polypeptide, and the new protein generally undergoes further processing at other sites within the cytoplasm.
Summary:
- Transcription: DNA unwinds, gene gets copied forming mRNA, happens in the nucleus
- DNA -> mRNA
- Translation: mRNA give info to ribosomes and they "read" mRNA. trNA gets each amino acid and brings it to the ribosome to be attached to the peptide chain. Happens in **cytoplasm**.
- mRNA -> ribosomes, ribosomes read mRNA -> tRNA grabs the amino acid needed -> ribosomes create peptide chain
# Protein Structure
- The shape of protein is important because it influences the compound's function
- Sickle cell anemia is an inherited form of anemia.
- **Denaturation** alters a protein's natural shape and function by exposing it to conditions such as heat, acids, and physical agitation. This change is permanent.
# In Foods
- Animal foods generally provide higher amounts of protein than similar quantities of plant foods.
- Certain parts of plants provide more protein than other parts
- Seeds, tree nuts, legumes supply more
- Fruits or edible leaves, roots, flowers, and stems of vegetables provide less
- Legumes are parts of plants that produce pods with a single row of seeds.
- Peas
- Peanuts
- Lentils
- Soybeans
- High quality (complete) protein is a protein that contains all essential amino acids in amounts that support the deposition of protein in tissues and the growth of a young person.
- Meat, fish, poultry, eggs, **milk**
- Low quality (incomplete) protein is a protein that lacks or has inadequate amounts of one or more of the essential amino acids
- A limiting amino acid is the essential amino acid found in the lowest concentration of a particular protein source\
- A healthy adult's RDA for protein is **0.8 g/kg** (apparently low)
- Protein needs increase during
- Pregnancy
- Breastfeeding
- Periods of rapid growth
- Recovery
- Serious illness
- Blood losses
- Burns
# Digestion
- Protein digestion begins in the stomach
- Hydrochloric acid denatures food proteins and activates pepsin
- Gastric enzymes that break proteins down into smaller polypeptides
- After polypeptides enter the small intestine, the pancreas secretes protein splitting enzymes.
- Trypsin and chymotrypsin
- Enzymes released by absorptive cells break down shortened peptides into dipeptides and tripeptides
- Two and three amino acids respectively
- Amino acids are carried to absorptive cells by carrier systems
- After absorption, amino acids enter the capillary of villus
- Travel to liver via hepatic portal vein
- Liver keeps some amino acids
- Release the rest into circulation
- Protein turnover is the cellular process of breaking down proteins and recycling their amino acids.
- Endogenous is a source of nitrogen from within the body
- Exogenous is a source of nitrogen from outside the body
- Dietary protein
- **Deamination** is the removal of nitrogen-containing group from an amino acid.
- A carbon skeleton is the remains of an animo acid following deanimation and removal of the nitrogen containing component of the amino acid. Can be used to create glucose, energy, or fatty acids.
- Transamination is the transfer of the nitrogen containing group from an unneeded amino acid to a carbon skeleton to form an amino acid.
- Blood urea nitrogen (BUN) is a measure of the concentration of urea in blood.
- Assesses kidney function
- Normal values are from 7-20 mg/dL
- Urine urea nitrogen (UUN) is a measure of the concentration of urea in urine
- Can be used as a marker of protein intake
- Normal values are from 12 to 20 g in a 24 hour sample.
- Nitrogen balance or nitrogen equilibrium is the balancing of nitrogen intake with nitrogen losses
- Positive nitrogen balance is the state in which the body retains more nitrogen than it loses
- Negative nitrogen balance is the state in which the body loses more nitrogen than it retains.
# Meeting needs
- Protein comprises about 15% of the typical American's total energy intake
- **AMDR is 10-35%**
- Complementary combinations is the mixing of certain plant foods to provide all essential amino acids without adding animal products
- Plant foods are poor sources of one or more essential amino acids
# Malnutrition
- High amounts of animal proteins and saturated fat is associated with:
- Heart disease
- Colorectal cancer
- Prostate cancer
- Consumption of red and processed meats is associated with cancers of the:
- Pancreas
- Stomach
- Esophagus
- Breast
- **High protein diets may lead to**
- Urinary loss of calcium
- Osteoporosis
- Dehydration
- Poor kidney health
- **Undernutrition** is the lack of food
- Widespread in poor nations
- **Protein-eneregy malnutrition (PEM)** occurs where the diet lacks sufficient protein and energy
- Edema is a sign of PEM
- **Kwashiorkor** is a form of undernutrition that results from consuming adequate energy and insufficient high quality protein
- Symptoms in children include:
- Stunted growth
- Blond, sparse, brittle, hair
- Patches of skin that have lost normal coloration
- Swollen cheeks, arms, legs, and belly
- **Marasmic kwashiorkor** is a form of undernutrition that results in a child with kwashiorkor who then starts to not consume enough energy; characterized by edema and wasting
- Marasmus is a form of undernutrition that results from starvation; diet lacks energy and nutrients
- Loss of subcutaneous fat and deeper fat stores
# Food allergies
- A food allergy is an inflammatory response that results when the immune system reacts inappropriately to an allergen in a food
- Allergen is usually a protein
- Some protein in food does not undergo complete digestion
- Immune cells mount a defensive response
- Signs and symptoms of a food allergy include:
- Hives
- Swollen, itchy lips
- Eczema
- Difficulty swallowing
- Wheezing and difficulty breathing
- Abdominal pain
- Vomiting
- Diarrhea
- Top food allergens in the US include:
- Cow's milk
- Crustacean shellfish
- Eggs
- Fish
- Peanuts
- Sesame
- Soybeans
- Tree nuts
- Wheat
- Food intolerances are unpleasant physical reactions following consumption of certain foods, symptoms include:
- Skin flushing
- Hives
- Difficulty swallowing
- Vomiting
- Diarrhea
- Dizziness
- Headache
- Phenylketonuria is a genetic metabolic disorder characterized by the inability to convert the amino acid phenylalanine to tyrosine, resulting in an accumulation of phenylalanine.
- Celiac disease and gluten sensitivity
- Celiac disease is an inherited condition in which the protein gluten cannot be absorbed, resulting in damage to the small intestine and poor absorption of nutrients.
- Gluten is a type of protein found in many grains, provides texture and shape to baked products

View File

@ -0,0 +1,137 @@
# Macronutrients
- We need a larger amount
- Provides Calories
## Carbohydrates
- Provides 4 calories per gram
- The storage form of carbohydrates in the body is as glycogen (very branched sugar). Stored in muscles and in liver
- Only **monosaccharides** can be directly absorbed. Everything else must be broken down first.
### Simple
- Mono/Disaccharides
Monosaccharides include:
- Glucose
- Fructose (fruit sugar)
- Galactose
Disaccharides include:
- Sucrose (glucose + fructose)
- Maltose (glucose + glucose)
- Lactose (glucose + galactose)
### Complex
- Polysaccharides
Polysaccharides include:
- Starches
- Amalose
- Amalopectin (More branched)
- Fiber
- Photosynthesis +Sun + carbon + hydrogen + oxygen
## Protein
- Provides 4 calories per gram
- Protein is composed of amino acids
- There are **9 essential** amino acids
- There are **11 non-essential** amino acids
- Donkey bridge: If it starts with the letter A, it's a non-essential amino acid
- Protein has nitrogen alongside hydrogen, carbon, and
- To use protein as energy, it must be **deanimated**.
## Lipids/Fats
- Provides 9 calories per gram
- Fat is composed of hydrocarbon chains
- Tryglicerine - 3 fatty acid chains, with glycerol backbone
### Saturated Fats
- Saturated fats have no double bonds
### Unsaturated Fats
- Unsaturated fats have one or more double bond
### HDL (High Density Lipoprotein)
- We want high HDL levels
- Takes cholesterol out of the cells to the liver to be excreted
### LDL (Low Density Lipoprotein)
- We want low LDL levels
- Takes cholesterol into arteries
### oLDL (Oxidized Low Density Lipoprotein)
- Damaged LDL
- Deposits plaque
# Micronutrients
- Smaller Amounts
- Don't provide calories
## Vitamins
## Minerals
## Water
- Not a macro or micronutrient, but still one of the 6 major nutrition groups
## Alcohol
- While not in a food group, provides 7 calories per gram
# Digestive System
1. Mouth
- Digestion of carbs/starches, and fats begin here.
- Mechanical digestion (chewing)
- Chemical digestion (amalayses (starch) and lipases (fat) in the mouth)
2. Esophagus
- Peristalsis is an involuntary relaxation and contraction of muscles to move food down
1. Gastroesophageal/Lower Esophageal/Cardiac Sphincter
- When this sphincter misfires, it can cause heartburn or gastroesphageal reflex disease (GERD)
2. Stomach
- Protein
3. Pyloric Sphincter
4. Small Intestine (DJI)
1. Duodenum
2. Jejunum
3. Ilium
5. Ilieocecal Valve
# DRI (Dietary Reference Intakes)
## EAR (Estimated Average Requirement)
- Meet the requirements of 50% of healthy individuals
## RDA (Recommended Daily Allowance)
- 97.5% of healthy people
- EAR plus a margin of safety
## AI (Adequate Intake)
- The average amount of nutrients a healthy population needs to consume
## UL (Upper Limit)
- Prevents overconsumption
## AMDR (Acceptable Macronutrient Distribution Range)
- Carbs: 45-65% / kCal
- Protein: 10-35% / kCal
- Fats: 20-35% / kCal
## EER (Estimated Energy Requirements)
- Average estimated caloric needs
- Actual needs vary
# Hormones
## Insulin
Insulin is made by the beta cells in the pancreas, and promotes absorption of glucose from the blood into liver, fat, and skeletal muscles.
- Insulin is released when blood sugar levels are too high
## Glucagon
Glucagon is a peptide hormone, produced by the alpha cells of the pancreas. It's the opposite of insulin, and it increases blood sugar levels.
- Glucagon is released when blood sugar levels are too low
## Ghrelin
Ghrellin is known as the "hunger hormone", and it increases the drive to eat. It increases gastric motility and stimulates the secretion of gastric acid.
## Leptin
Leptin's primary role is to regulate long-term energy balance. High leptin levels indicate to the brain that energy reserves are high.
# Study Types
## Exprimental
- A systematic way of testing a hypothesis
## Epidemiological
- Observations of the occurrence, distribution, and associations
# Practice Final
- To reduce blood pressure, one should follow the DASH diet
- Bleeding gums, easy bruising, and poor wound healing that characterize scurvey are all related to vitamin C's role in synthesis of collagen.
- Vitamin K is a fat soluble vitamin that can be made in the GI tract
- Parathyroid hormone enhances the body's ability to retain calcium.
- Males have a higher basal metabolic rate than females
- On the intuitive eating spectrum, awareness, balance, moderation, and variety would exist in the middle. Apathy is on the left and anxiety is on the right
- The term appetite describes a biological need for food
- The 10 principals of intuitive eating are:
1. Reject Diet Culture
2. Honor Your Hunger
3. Make Peace with Food
4. Discover the Satisfaction Factor
5. Feel Your Fullness
6. Challenge the Food Police
7. Cope with Your Emotions with Kindness
8. Respect Your Body
9. Movement -- Feel the Difference
10. Honor Your Health with Gentle Nutrition

View File

@ -0,0 +1,85 @@
Vitamins were first discovered in 1921, and are an organic nutrient
- Casamir Runk coined the term vitamin
- Vita = life
- Amine = a type of nitrogen containing substance
- The first discovered vitamin was thiamin
- There are 13 known vitamins, plus 5 vitamin like substances
- It is unlikely that any new vitamins will be discovered - (babies and sick people can live on synthetic liquid diet?)
- A vitamin is a complex organic compound that regulates certain metabolic processes
- Cannot be synthesized in sufficient quantities by the body
- Occurs naturally in foods
- Deficiency disorder occurs if substance is missing from the body
- They do not provide any energy
- Vitamins are organic, but they differ from macronutrients:
- **Not metabolized for energy**
- Present in small amounts in foods
- Required in milligram and microgram amounts
- Because vitamins are organic
- They are subject to heat degradation
- Exposure to excessive heat, alkaline substances, light, and air can destroy certain vitamins
- **Water soluble vitamins can leach out of food and dissolve in cooking water**
# Fat Soluble Vitamins
- Fat soluble vitamins are **K, A, D, E**
- Found in lipid portions of the body
- Associate with lipids in the body
- **Digested and absorbed with fats
- Stored in the body
- Can cause toxicity
| Nutrient | Function | Deficiency | Toxicity | Sources | Other Info |
| ------------------------- | ---------------------------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------ | -------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| Vitamin A (Retinol) | - Vision (Retina + Cornea)<br>- Growth and Reproduction<br>- Immune Function<br>- Epithelial (Skin)<br>- Cells<br>- Bone<br>- Remodeling | - Night Blindness (Nycatlopia)<br>- Xerophthalmia<br>- Dry Eyes -> Blindness<br>- Poor Growth<br>- Dry Skin or Tissue<br>- ^ Causes increased risk of infection | - Carotenemia (Orange colored skin)<br>- Birth defects<br>- Bone fractures<br>- Liver damage<br>- Nausea / Vomiting | - Vegetables: Yellow, orange, or dark green (pumpkin, squash, carrots, spinach)<br>- Milk and Dairy Products | - Retinol's precursor is beta-carotene (antioxidant)<br>- Helps with wound healing |
| Vitamin D (Calciferol) | - Calcium Absorption<br>- Bone Strength<br>- Blood Calcium Levels<br>- Supports Immune Function<br>- Reduces Inflammation | - Rickets (children)<br>- Osteomalacia (Adults)<br>- Osteoporosis (Elderly)<br>- Decreased immune function<br>- Decreased growth | - Hypercalcemia (Calcium deposits in soft tissue, Weakness, Nausea/Vomiting)<br>- Kidney Stones | - Milk and Dairy Products<br>- Fish (Salmon, Tuna)<br>- Breakfast Cereals<br>- Sunlight or UV Light | - Often referred to as the sunshine vitamin<br>- Acts as a hormone (interacts with para-thyroid hormone and calcitonin) |
| Vitamin E (Tocopherol) | - Antioxidant<br>- Wound healing<br>- Cell Membranes<br>- Supports immune function | - Hemolysis of red blood cells<br>- Anemia<br>- Reduced muscular coordination | Supplements can interfere with vitamin K metabolism and cause uncontrolled bleeding | - Vegetable oils<br>- Nuts or Seeds<br>- Wheat germ<br>- Green leafy veggies<br>- Breakfast Cereals | - Doesn't increase sexual performance, prevent aging, or cure Parkinson's disease (despite claims) |
| Vitamin K (Phylloquinone) | - Blood clotting<br>- Bone health | - Hemorrhaging or Hemorrhagic Disease (Excessive bleeding or internal bleeding)<br>- Increased risk of hip failure | Not common | - Green leafy veggies (spinach, kale, et cetera)<br>- Beans and soybeans<br>- Vegetable Oils<br>- Healthy GI tract | - 50% of needed amount can be synthesized in the GI tract<br>- Babies are given a shot at birth<br>- Interacts with blood clotting meds (coumadin or warfarin) |
Dairy products are typically fortified with vitamins A and D.
# Water soluble vitamins
- Water soluble vitamins are the **B-vitamins**: thiamin, riboflavin, niacin, vitamin B-6, pantothenic acid, folate, biotin, vitamin B-12, and **vitamin C**.
- They dissolve in water
- **Very limited amounts are stored** with the exception of B-12
- **Kidneys will filter out excess water soluble vitamins**
- Less likely to be toxic
# Oxidization
- An *oxidizing agent* is a substance that removes electrons from atoms or molecules
- A *free radical* is a substance (C, H, O) with an unpaired electron
- Highly reactive, damages and destroys molecules
- **Antioxidants (Vitamin E, C)** are substances that **give up electrons to free radicals to protect cells**
# Vitamin Intake
**Bioavailability** is the amount of a vitamin available for use in the body
- Factors that affect how available a vitamin is include:
- How long it takes the vitamin to pass through the intestinal tract
- Certain health conditions that affect the absorption of facts
- By cooking with a little bit of fat, you better absorb fat soluble vitamins from that meal.
- Natural sources of vitamins typically provide higher availability
It's important to preserve the vitamin content of food, ways to do so include:
- Avoid decaying, wilting, or bruised fruits or vegetables
- Fresh produce should refrigerated at high humidity, away from the open air
- Exposure to excessive heat, alkaline (salty) substances, light, and air can all reduce the vitamin content of food
- **Vegetables should be cooked in small amounts of water, using quick cook methods**
# Water Soluble Vitamins
Water soluble vitamins dissolve in watery components of food and the body. Most excess water soluble vitamins are filtered through the kidneys and eliminated in urine, whereas fat soluble vitamins are stored in large amounts.
| Vitamin | Major Functions in the body | Adult RDA/AI | Good Sources | Deficiency Signs and Symptoms | Major Toxicity Signs and Symptoms |
| ------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------- | -------------- | ---------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------------------------- |
| Thiamin | Part of TPP, a coenzyme needed for carbohydrate metabolism and the metabolism of certain amino acids. May help with the production of neurotransmitters | 1.1-1.2 mg | Pork, wheat germ, enriched breads and cereals, legumes, nuts | Beriberi and Wenicke-Korsakoff syndrome; weakness, abnormal nervous system functioning. | None (UL not determined. |
| Riboflavin | Part of FMN and FAD, coenzymes needed for carbohydrate, amino acid, and lipid metabolism. | 1.1-1.3mg | Cow's milk, yogurt, and other dairy products; spinach; enriched breads and cereals | Inflammation of the mouth and tongue, eye disorders | None (UL not determined) |
| Niacin | Part of NAD and NADP, coenzymes needed for energy metabolism. | 14-16mg | Enriched breads and cereals, beef liver, tuna, salmon, poultry, pork, mushrooms | Pellegra<br>- Diarrhea<br>- Dermatitis<br>- Dementia<br>- Death | Adult UL = 35mg/day<br>Flushing of facial skin, itchy skin, nausea and vomiting, liver damage |
| Pantothenic acid | Part of coenzyme A that is needed for synthesizing fat and that helps release energy from carbohydrates, fats, and protein | 5mg | Beef and chicken liver, sunflower seeds, mushrooms, yogurt, fortified cereals | Rarely occurs because it's so common in foods. | Unknown |
| Biotin | Coenzyme needed for synthesizing glucose and fatty acids | 30 micrograms | Eggs, peanuts, salmon, pork, liver, mushrooms, sunflower seeds | Rarely occurs, skin rash, hair loss, convulsions, and other neurological disorders; developmental delays in infants | Unknown |
| Vitamin B-6 | Part of PLP, coenzyme needed for animo acid metabolism, involved in neurotransmitter synthesis and hemoglobin synthesis | 1.3-1.7mg | Meat, fish, poultry, potatoes, bananas, spinach, sweet red peppers, broccoli | Dermatitis, anemia, depression, confusion, and neurological disorders such as convulsions | Adult UL = 100 mg per day<br><br>Nerve destruction |
| Folate | Part of THFA, a coenzyme needed for DNA synthesis and conversion of cysteine to methionine, preventing homocysteine accumulation | 400 micrograms | Dark green, leafy vegetables; papayas; asparagus; broccoli; orange juice; enriched breads and cereals | Megaloblastic anemia, diarrhea, neural tube defects in embryos | Adult UL = 1000 micrograms per day |
| Vitamin B-12 | Part of coenzymes needed for various cellular processes, including folate and metabolism; maintenance of myelin sheaths | 2.4 micrograms | Peppers, citrus fruits, cherries, broccoli, cabbage, and berries, shellfish, poultry, meat, milk, and eggs | Scurvy, poor wound healing, pinpoint hemorrhages, bleeding gums, bruises, depression | Adult UL = 2000 mg/day Diarrhea and GI tract discomfort |
| Vitamin C (ascorbic acid) | Lots of things, collagen synthesis, antioxidant activity, and immune function. It can act as an antioxidant, and it can recycle vitamin E. | | Plant foods, peppers, citrus fruits | Scurvy | In high doses it has pro-oxidant effects |
- Coenzymes are a water soluble vitamin that assists in the metabolism of macronutrients.
- As people age, HCl production decreases, making it harder for the body to process vitamin b12
- Vitamin b12 comes mostly from animals, so vegans need to supplement their intake
- Choline, carnitine, inositol, taurine, and lipoic acid are vitamin-like compounds that necessary to maintain normal metabolism. Because the body can synthesize these compounds, they are not considered essential nutrients.
- Biotin and vitamin K can be produced by intestinal bacteria
- The 4 "D"s are signs of pellegra
- Adequate folate status is critical in early pregnancy because the neural tube forms about 21 days after conception
- Pregnant individuals should consume 400 ug of folate to prevent neural tube defects (eg spina bifida or anancephaly). It should reduce the rate of spinal defects by 50%
- High doses of niacin can be taken to reduce LDL. This can cause facial flushing and liver damage

View File

@ -0,0 +1,39 @@
- The body is composed of 50 to 75% water
- Lean muscle contains more water (73$
- Fat tissue contains less water (20%)
- For a healthy person, water intake equals water outtake
- For every pound of water weight lost, you should intake two cups of fluid.
# Functions
- Is a solvent
- Is a major component of blood, saliva, sweat, tears, mucus, and joint fluid
- Removes waste
- Helps transport substances
- Lubricates tissues
- Regulates body temperature
- Helps digest foods
- Participates in many chemical reactions
- Helps maintain proper blood pH
- **Doesn't play a major role in immune system function**
# Compartments
- The body has two major fluid compartments:
- **Intracellular water** is inside the cells - Managed by potassium and phosphorus
- **Extracellular water** surrounds cells or is in the blood - managed by sodium and chloride
- Water **follows** sodium
# Dehydration
- Common signs of dehydration:
- Rapid weight loss
- Dry or sticky mouth
- Low or no urine output
- Dark urine
- No tears
- Sunken eyes
- If not corrected, dehydration can lead to death
# Water intoxication
Water intoxication is a condition that occurs when too much water is consumed in a short period of time or kidneys can't filter water from blood
- Excess water dilutes sodium concentration of blood
- Results in **hyponatremia**
- Low blood sodium
- Symptoms: confusion, dizziness, headache, can lead to death

View File

@ -1,25 +0,0 @@
# Campaign Points
https://www.donaldjtrump.com/issues
## Economic
### Data
Trump's published economic policy points include reducing taxes for the middle class, increasing the child tax credit, and attempting to increase job opportunities by "slashing job-killing regulations". His campaign website argues that he increased "real wages" and household income, while poverty went down during his time in office. He promises to lower taxes, increase paychecks, and increase job opportunities.
### Analysis
## Budgetary
## Social
## Foreign Policy
Trump's campaign website argues that we cannot have free and open trade when some other countries are exploitative of it. He primarily focuses on changes he made during his time in office, including stopping the Trans-Pacific Partnership, replacing NAFTA with USMCA, and talks about fixing "unfair" foreign trade policies, and implementing tariffs. For his 2024 campaign, he promises to reduce reliance on China, specifically in the medical, security, and infrastructure industries.
Trump's campaign website also argues that he will secure the \[southern] border.
## Gun Control
## Energy/Environmental
Trump's campaign website argues that during his time in office, the United States became the number one producer of oil and natural gas by approving the Keystone and Dakota Access pipelines, opening federal lands and offshore areas for production, and ending the Paris Climate Accord. For his future policies, he argues that he can bring energy independence, lower the prices of various energy sources, and eliminate the Green New Deal.
# Personal
# Arguments against Biden
- Campaign website argues that Biden decreases job opportunities and increases inflation with government spending.
- Campaign website argues that Biden ended the "Trump Energy Revolution" and is helping foreign adversaries.
- Campaign website argues that Biden "turned our country into a giant sanctuary for dangerous alien criminals"

View File

@ -1,8 +0,0 @@
https://www.uscourts.gov/educational-resources/educational-activities/facts-and-case-summary-hazelwood-v-kuhlmeier
https://www.oyez.org/cases/1987/86-836
- The case was over the constitutional right to freedom of the press, and whether or not the school had a right to censor a school paper.
- Students at hazelwood east high school wrote articles in the school newspaper about teen pregnancy, and the impact of divorce.
- When the articles were published in a school sponsored newspaper, the principal deleted the pages that contained the stories prior to publication without telling the students.
- The students took their case to a District Court in St. Louis, and the trial court ruled that the school had the authority to remove those articles.
- The students then appealed the Court of Appeals for the Eighth Circuit, and it reversed the lower court, and found that the paper was a "public forum", and that school officials could only censor content under extreme circumstances.
- In a 5-3 ruling, the Supreme Court held that the principal's actions did not volate the students' free speech. The Court noted that the paper was sponsored by the school, and that it had legitimate interest in preventing the publication of articles it deemed inappropriate. They ruled that the school paper was not a public forum, it was a limited forum that served as a learning exercise for journalism students.

View File

@ -1,34 +0,0 @@
Notes on Think Again, by Adam Grant.
## Chapter 3
### Main idea
- People build more developed belief systems and improve if they are willing to challenge their beliefs.
- It's unhealthy to hold beliefs and defend them so aggressively
- Being wrong and recognizing that is healthy
- Recognize when a reaction is emotional, and a defense of the ego, rather than intellectual, and a defense of the idea.
- Do not base a personality around ideas, base it around broad, positive values. The material changes, but values can be applied to the material in infinite ways.
### Personal reflection
> Think about yourself personally, which group would you be more likely to identify with: the group who hated being challenged, or the group who thought that the abusive challenges were fun? Explain your POV.
I believe I do not fit into either group, and would react differently in many different ways, depending on the context at hand. For a long time, I would defend my beliefs aggressively, and was confident that my perspective was more correct. I made no attempt at attempting to understand the motivations behind the opposing viewpoint, and spent most of my time taking an axe to nuance, working to prove the opposing viewpoint wrong, rather than trying to understand it, and look for the flaws in my own viewpoint. I believe I am getting better at understanding opposing viewpoints, but would still find the experience unpleasant, and react poorly.
### Relation to poli sci
The political system in the United States is composed primarily of a two party system. If a candidate wishes to have any chance of being elected, they must appeal to one of the two parties. If a candidate doesn't align closely enough to the beliefs of the party, then they have a significantly worse chance of winning. Anyone who attempts to question ideas, may be considered a 'fake' republican | democrat. Each party conforms to a stringent beliefs system, and many of the viewpoints are held, simply because they're the opposite of the other party. This whole system discourages reflection and improvement, holding on to ideas that stagnate and grow convoluted, holding bitterly onto one 'correct' viewpoint.
### Quotes
"Values are your core principles in life - they might be excellence and generosity, freedom and fairness, or security and integrity. Basing your identity on these kinds of principles enables you to remain open minded about the best ways to advance them" (Grant 64).
"When they define themselves by values rather than opinions, they buy themselves the flexibility to update their practices in light of new evidence" (Grant 64).
"When I asked him about how he stays in that mode, he said he refuses to let his ideas become part of his identity" (Grant 62).
"Attachment. That's what keeps us from recognizing when our opinions are off the mark and rethinking them. To unlock the joy of being wrong, we need to detach" (Grant 62).
"When a core belief is questioned, though, we tend to shut down rather than open up" (Grant 59).
"If you want to be a better forecaster today, it helps to let go of your commitment to the opinions you held yesterday" (Grant 69).
### Reaction
I belief Grant phrased a key issue really elegantly, and believe that more people should try to apply his advice in their life
### Was this info new?
The idea isn't new to me.

View File

@ -1,2 +0,0 @@
pay attention when flying around an airport

View File

@ -1,43 +0,0 @@
There is currently no way to get a waiver for beyond line of sight \[for package delivery].
To determine if an MOA is active, you can refer to the phone number listed under the legend for special use airspace. This information is not listed under the military operations directory
An sUAS accident must be reported to the FAA within 10 days.
Lightning is considered the most hazardous condition when flying in the vicinity of thunderstorms.
The presence of ice pellets at the surface is evidence of a temperature inversion, with freezing rain at a higher altitude.
Angle of attack is the angle between the wing chord line and the relative wind.
An autonomous operation requires a Remote PIC, and nothing else.
An increase in load factor will cause an unmanned aircraft to stall at a higher airspeed.
Acute fatigue is short term fatigue gained from a specific event
METARs report wind in true north.
The angle of attack at which an airfoil stalls is not influenced by gross weight.
Military training routes below 1,500 feet have a 4 digit number, routes above have 3 digits.
Someone with a marijuana conviction can apply for a remote pilot certificate one year after the conviction.
Use a spectral analyzer to avoid interference with the radio
After landing at a tower controlled airport, a pilot should contact ground control when advised by the tower.
Lines of longitude cross the equator at right angles.
The pilot's handbook of aeronautical knowledge should be consulted for the impact of drugs and alcohol on flight.
When flight efficiency is a priority, the drone should be operated
Advection fog develops when an air mass moves inland from the coast in winter.
Binoculars do not count as line of sight
Consult the  Pilot's Operating Handbook or UAS Flight Manual for center of gravity limits.
The amount of excess load that can be imposed upon the wing of an airplane depends on the speed of the airplane

View File

@ -0,0 +1,279 @@
https://www.youtube.com/watch?v=weeG9yOp3i4
# PLA (Polylactic acid)
| Pros | Cons |
| ------------------------------------------------------------------------------------------------------------------------------------ | ----------------------------------------------------------------------------------------------------------------------------------------------------- |
| - Easy to print<br>- Very cheap<br>- Widely available<br>- Prints quickly<br>- Prints well<br>- Stiffest non-composite thermoplastic | - Can permanently deform with consistent load application<br>- Not UV resistant<br>- Warps under heat<br>- Shatters<br>- Difficult to sand/glue/paint |
## Variants
### Silk PLA
Silk PLA has an additive to make prints shinier. This weakens the print, but it makes supports easier to remove. When silk PLA heats up, it puffs up and this can damage the extruder.
Silk PLA trades performance for aesthetics and can damage both a Bambu AMS and a Prusa MMU.
### PLA-CF (Carbon Fiber PLA)
Carbon fiber PLA is made by adding chopped or ground PLA to the filament. It does not typically improve the strength of prints, but it stabilizes the filament as it cools (preventing warping and shrinkage), and it can improve detail.
The addition of carbon fiber makes the end product stiffer, but more brittle. PLA-CF is one of the best filaments for detail oriented printing. It's overall a better filament than PLA, with the only drawbacks being a hardened steel nozzle requirement, and lack of color options.
### Metal-filled PLA
Metal filled PLA is made by adding metal shavings to the filament during production. This makes the print heavier and infuses the print with some of the properties of the metal added. Copper infused filament can gain a patina, stainless steel infused filament can be polished, iron is magnetic, et cetera et cetera.
The addition of metal particulate reduces the strength of the print and makes it more brittle. Metal-filled PLA is extremely expensive, difficult to print with, and anything that can be achieved with metal-filled PLA can also be achieved using paint, inserts, or some form of electroplating.
### Wood-filled PLA
Wood-filled PLA is comprised of sawdust, and PLA. Cheap wood-filled PLA looks brown and has no particular wood-like qualities, but higher quality WF-PLA has visible chips of wood. This impacts the print by giving it a wood-like texture and allowing you to use varnish on the print.
WF-PLA is difficult to print with, it easily absorbs humidity and sputters from the nozzle. The resulting product is also weaker.
### PLA Alloys
This category of PLA is created by combining PLA with another plastic additive to change the properties of the resulting filament in some way.
There are 3 primary categories of PLA alloys:
1. "Tough" PLA
Tough PLA is created by combining PLA with polybutylene terephthalate, or PBT. PBT is commonly used in keycaps for keyboards.
Tough PLA prints and acts similarly to PLA, but it has higher temp and impact resistance, and it's less brittle. This is largely an upgrade to PLA with no real drawbacks.
2. "Matte" PLA
Matte PLA is created by combining PLA with a plant based additive.
Matte PLA has a higher impact and shatter resistance than regular PLA, but it absorbs humidity more easily and is more likely to jam in an extruder during printing. This is largely a side-grade to regular PLA, it makes a slightly different set of tradeoffs.
3. "High speed" PLA
High speed PLA has a lower melting temperature and a reduced viscosity, greatly increasing the speed at which it can be printed at.
# PCL (Polycaprolactone)
PCL has an extremely low melting point, printing at just 100 Celsius. The melting point is so low that you can shape it in a warm bath, or with a hair dryer.
It has a warm waxy consistency that no adhesive will stick to.
# PETG/PET-G (Polyethylene terephthalate-glycol)
| Pros | Cons |
| -------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------- |
| - Tougher<br>- Better temperature resistance<br>- Highly transparent<br>- Very low coefficient of friction.<br>- Food safe | - Slightly more difficult to print than PLA<br>- Struggles with overhangs<br>- Struggles with support removal<br>- High humidity absorption |
## Variants
### PETG-CF (Carbon Fiber PETG)
Carbon fiber stabilizes molten filament, and given that PETG struggles with overhangs, PETG-CF has massively improved print support quality, along with improved stiffness.
The combination of matte carbon fiber with shiny polyester tends to create a very unique, aesthetically pleasing finish.
# PCTG (Polycyclohexylenedimethylene Pthalate-Glycol)
PCTG is a newer, better, alternative to PETG, compared to PETG:
| Pros | Cons |
| -------------------------------------------------------------------------------------------------------------------- | --------------------------------------------------------------------------- |
| - Higher toughness<br>- Lower water retension<br>- Very little warping or sagging<br>- Almost perfect layer adhesion | - Supports are difficult to remove<br>- Expensive<br>- Not widely available |
# PET (Polyethylene Terephthalate)
PET is the foundation of PET-G, but without the addition of glycol as a plasticizer. Compared to PETG:
| Pros | Cons |
| ---------------------------------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------- |
| - Stiffer<br>- Tougher<br>- Shinier<br>- Very high temp resistance<br>- Easier to print than other engineering filaments like nylon or polycarbonate | - Extremely high print temp (275C minimum)<br>- Struggles with humidity, overhangs, and warping |
## Variants
### PET-CF (Carbon Fiber PET)
- Almost as easy to print as PETG
- Extremely stiff
- Hard to find, expensive
# PVB (Polyvinyl Butyrate)
- Printing qualities similar to PLA
- Behaves similar to PETG, weaker but more flexible
- When exposed to isopropanol alcohol, the layers melt and fuse together, resulting in a very glossy, seamless finish.
# ABS (Acrylonitrile Butadiene Styrene)
- Very common in consumer injection-molded parts.
| Pros | Cons |
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------- |
| - Melts in acetone, acetone vapor smoothing can be used to improve surface finish<br>- Prints fairly quickly<br>- Very high toughness relative to PLA or PETG<br>- High temperature resistance<br>- UV resistant | - Very high warpage<br>- Smells horrid and outputs toxic fumes when printing |
# ASA (Acrylonitrile Styrene Acrylate)
Chemically similar to ABS, just better.
| Pros | Cons |
| ---------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------ |
| - Very high temp resistance (past 100C)<br>- Very high UV resistance<br>- Matte surface finish<br>- Prints *very quickly*<br>- Greatly reduced warping compared to ABS | - Equally bad fumes as ABS<br>- Still somewhat difficult to print. |
# HIPS (High Impact Polystyrene)
Similar to ABS, but softer, waxier, and more flexible.
Has a very low density, works well for wearables and props. HIPS is commonly used as a support material for ASA or ABS because limonene will dissolve HIPS but does not impact other plastics in the styrene family (ABS, ASA).
# Nylon
Nylon filaments are engineering filaments. They're difficult to print but have excellent mechanical properties.
## Variants
### PA-6
| Pros | Cons |
| ---------------------------------------------------------------------------------------------------------------------------------------- | -------------------------------------------------------------------------------------------------------------------------------------------------- |
| - Extremely strong<br>- Excellent layer bonds<br>- High flexibility<br>- Very high temp resistance<br>- Very low coefficient of friction | - Horrible to print<br>- Very high moisture retention<br>- Can't be too dry<br>- Very high warpage<br>- Requires a closed (ideally heated) chamber |
### PA-12
- Higher warpage than PA-6
- Higher toughness
- Higher temp resistance
- Durable but brittle
### PA-CF (Carbon Fiber Nylon)
- Very stiff
- Less warping
- High friction
- High end printer required
### PA-GF (Glass Filled Nylon)
- Used in the real world (handguns, chainsaws)
- More affordable than PA-CF
- Much stiffer, tougher, and more resistant to heat and abrasion than vanilla nylon.
- Greatly reduced warping
- Fairly easy to print
- Still requires a high-end printer (tungsten carbide or gemstone nozzle, abrasion resistant drive gears)
- Durable enough to act as a viable alternative to machined aluminum
### PA-PETG (Nylon PET alloy)
Often called tough PETG or low temp nylon, PA-PETG is meant to serve as both a step up from PETG and a more accessible nylon alternative.
- Bad warping, poor bed adhesion
- Often just better to use nylon *or* PETG
# Polycarbonate (PC)
- In the real world, polycarbonate is used to make bulletproof glass. While FDM polycarbonate is not bulletproof, many of the properties of polycarbonate still apply.
| Pros | Cons |
| --------------------------------------------------------------------------------------------------------------------------- | ---------------------------------------------------------------------------------- |
| - One of the toughest, stiffest filaments<br>- Extremely high temp resistance<br>- Does not shatter<br>- Highly transparent | - Extremely high moisture retention<br>- Prints above 300C<br>- Difficult to print |
## Variants
### PC-CF (Carbon Fiber Polycarbonate)
- Record setting stiffness, prints can withstand hundreds of kilos
- Will destroy most drive motors
- Surprisingly cheap (~60USD/kilo at the time of writing)
### PC-PBT (PBT Infused Polycarbonate)
PBT flaccifies the polycarbonate but preserves PC's strength and shatter resistance in the cold, making it one of the few cold-resistant filaments.
- Lower print temp
- Improved print quality
- Very low warping
- One of the easiest filaments to print in
### PMMA (Polymethylmethacrylate)
Also known as acrylic plexiglass, the high transparency of PMMA is the only advantage it has over other polycarbonates for printing.
| Pros | Cons |
| -------------------------------------------------------------------------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- |
| - Highest transparency thermoplastic<br>- Can be buffed to a frosted/polished surface<br>- High UV resistance<br>- Relatively affordable<br> | - Horrible bed adhesion<br>- Bad layer adhesion<br>- High coefficient of thermal expansion leads to constant print failures during or after the printing process<br>- Very brittle<br>- High water absorption |
# TPU (Thermoplastic Polyurethane)
TPU is the most common flexible filament
| Pros | Cons |
| ------------------------------------------------------------------------------------------------------------------------- | ----------------------------------------------------------------------------------------------------------------------- |
| - Flexibility<br>- Cheap<br>- Wide range of colors and hardnesses<br>- Perfect layer adhesion<br>- Basically shatterproof | - Permanently bonds to most build plates (use gluestick)<br>- Very high water absorption, needs to be dry to print well |
## Variants
### TPU (~99D)
- Harder than a skateboard wheel
- Basically rigid
- Useful because it's "shatterproof"
- Often used for combat gear or robotic applications
- Easiest TPU variant to print
### TPU (~80D)
- About as hard as the sole of a running shoe
- Good for things like bumpers or hinges
- Still fairly easy to print
### TPU (~80A)
- Very soft
- Prints at very low speed, can wrap itself around the drive gears
# TPE (Thermoplastic Elastomer)
| Pros | Cons |
| ------------------------ | ---------------------------------- |
| - Flexible<br>- Stretchy | - **Very** difficult to print with |
# SEBS (Styrene Ethylene Butterine Styrene)
TPE enhanced with the same chemicals used to make ABS.
| Pros | Cons |
| ---------------------------------------------------------- | --------------------------------------------------------------------------------------------------------------------------------------- |
| - Prints much better than TPE<br>- Very flexible and tough | - Very hygroscopic<br>- Styrene fumes released during printing<br>- Softens at a very low temp<br>- Still requires some level of tuning |
# PP (Polypropylene)
- Very bendable
- Very rugged
- Perfect layer adhesion
- Very low density
- Horrible bed adhesion
- High warping
- Supports are impossible to remove
## Variants
### PP-GF (Glass-filled PP)
- Standard for industrial machinery
- More difficult to print than regular PP
- One of the toughest, most durable filaments
- Very lightweight
# OBC (Olefin Block Copolymer)
- Fairly new for 3D printing
- Attempts to combine the good qualities of PP and PET-G
- Very low bed adhesion
- Very expensive
- Typically requires printing on a purpose made printer
# HDPE (High Density Polyethylene)
- Most bottles and jugs use this filament
- Horrible to print in every way
- Useful for purging the nozzle when switching between high and low temp filaments
# POM (Polyoxylmethylene)
POM is most commonly used when CNCing plastic.
- It's cheap and very easy to print, with a low coefficient of friction.
- Zero bed adhesion
- Very poor layer adhesion
- When it overheats, it turns into formaldehyde
# PVDF (Polyvinylidene Flouride)
- A chemical cousin of teflon
- As easy to print as PET-G
- Extremely tough
- High heat/friction resistance
- Hydrophobic
- Most important because of its chemical resistance.
- Fairly expensive
- When mildly overheated, turns into horribly toxic chemicals (carbon monoxide, hydrogen cyanide, hydrofluoric acid, even more)
# PEEK (Poly-ether Ether Ketone)
- Mechanical properties massively beyond other plastics
- Close to steel
- Twice as tough as the toughest polycarbonate
- Used in missiles and is fireproof
- $700 a kilo (at the time of writing)
- Prints at 400C
- Requires a 140C heated chamber
- Extremely high water retention
- Special bed adhesive required
- Difficult to print
# PEKK (Polyether Ketone Ketone)
Same building blocks as PEEK, in different levels
- Worse than PEEK mechanically, still far beyond other filaments
- Much easier to print compared to PEEK
# PPS (Polyphenylene Sulphide)
- Most chemically resilient filament
- $200/kilo
# PSU (Polysulphone)
- Weakest superpolymer
- Mechanical properties similar to PA6 nylon
- Very high glass transition temperature (187C)
# Additive Superpolymers
As a general rule, these (CF-PEEK, et cetera), are all extremely difficult to print and put a ton of strain on the printer. They *do* warp less than the vanilla counterparts.
# PEI (Polyetherimide)
- Used to coat print beds
- Sold in two grades, 1010 and 9085 (9085 is horrible and shouldn't be used)
- $400/kilo
- Second strongest filament after PEEK
- Glass transition temp at 217C
- Electrically/chemically/radiation resistant
- Prints at 425C nozzle/160C bed
- Needs a special bed
- Relatively friendly to print once equipment requirements are met
# TPI (Thermoplastic Polyamide)
- Kapton tape, in a filament
- Glass transition temp above 250C
- Most heat-proof filament
- Mechanical properties about 25% worse than PEEK
- Printing is basically impossible

View File

@ -1,8 +1,8 @@
<https://arxiv.org/abs/1311.2540>
In standard numeral systems, different digits are treated as containing the same amount of information. A 7 stores the same amount of info as a 9, which stores the same amount of info as a 1.
In standard numeral systems, different digits are treated as containing the same amount of information. A 7 is stored using the same amount of info as a 9, which is stored using the same amount of info as a 1, that is, 1 digit.
This makes the amount of information a single digit stores *uniform* across all digits. However, that's far from the most efficient way to represent most datasets.
This makes the amount of information a single digit stores *uniform* across all digits. However, that's far from the most efficient way to represent most datasets, because real world data rarely follows a uniform distribution.
ANS theory is based around the idea that digits that occur more often can be stored in a way that requires less information, and digits that occur less often can be stored using more information.
@ -12,4 +12,38 @@ Taking a look at the standard binary numeral system, there are two digits in the
Given that $x$ represents a natural number, and $s$ is the digit we're adding. In a standard binary system, adding $s$ to the least significant position means that in the new number $x$ (before the addition) now represents the Nth appearance of an even (when $s = 0$ ), or odd (when $s = 1$). With ANS, the goal is is to make that asymmetrical, so that you can represent more common values with a denser representation.
# Arithmetic Coding
Arithmetic coding works by taking a stream of data, and converting it into an infinitely precise number between $0.00$, and $1.00$. This is based off of the idea that the sum of the probability of all events happening will always amount to $100\%$.
For example, the probability of a coin flip resulting in tails is 50%, and the probability of a coin flip resulting in heads is 50%. The probability of a coin flip resulting in heads *or* tails is %100.
If we wanted to keep track of the result of a series of coin flips, this could be done by subdividing a range. If the coin flip is between $0$ and $0.5$, then we know that the first flip must have been tails.
If the coin flip is between $0.5$ and $1$, then we know that the first flip must have been heads.
This subdivision process can be repeated infinitely to store an infinite number of coin flips by dividing each range again.
To store two coin flips, you might have the first subdivision represent the outcome of the first coin flip, and the second subdivision represent the outcome of the second coin flip:
| Range | Result |
| ------------- | ------------ |
| $0.00 - 0.25$ | Tails, Tails |
| $0.25 - 0.5$ | Tails, Heads |
| $0.50 - 0.75$ | Heads, Tails |
| $0.75 - 1.00$ | Heads, Heads |
Imagine a situation where we want to store all possible outcomes of three consecutive coin flips using a decimal number, *Heads, Heads, Tails*.
Encoding this would happen as follows:
1. First we subdivide the range by the probability of each event happening. The probability of each is 50%, so that's simple. Referring above, we know that heads is represented by the top half of the range, and tails is represented by the bottom half of the range.
> Because the *first* coin flip resulted in *Heads*, the output value must be between $0.50$ and $1.00$.
2. Subdividing the range $0.50$ and $1.00$ again to store the results of the second flip, we end up with values between $0.50$ and $0.75$ representing the sequence *Heads, Tails*, and values between $0.75$ and $1.00$ representing the sequence *Heads, Heads*.
> Because the *second* coin flip resulted in *Heads*, we know that the output value must be between $0.75$ and $1.00$
3. Subdividing the range $0.75$ and $1.00$ yet again, $0.750$ - $0.875$ means the third coin flip resulted in *Tails*, and a value in the range $0.875$ - $1.000$ means the third coin flip resulted in *Heads*
> Because the *third coin flip resulted in *Heads*, any value between $0.875$ and $1.000$ encodes the fact that the first three coin flips went *Heads, Heads, Tails*.
The decoding process performs the same series of steps, but by asking a question instead of outputting a value.
1. Is the value between $0.00$ and $0.50$? If so, the first coin flip resulted in *Tails*. Otherwise if the value is between $0.50$ and $1.00$, the first coin flip resulted in *Heads*.
The above process can be repeated just like the encoding process until we've determined the result of the first three coin flips.
These subdivisions can be encoded using $0$ and $1$, where $0$ represents the bottom half of the range, and $1$ represents the top half of the range.
When the alphabet is large enough that you can't select a particular outcome using one bit, multiple bits can be used instead to divide up and down the range.

View File

@ -0,0 +1,5 @@
<https://dougallj.wordpress.com/2022/07/30/parallelising-huffman-decoding-and-x86-disassembly-by-synchronising-non-self-synchronising-prefix-codes/>
# Scratchpad
- Start decoding at arbitrary points throughout the data
- \

View File

@ -0,0 +1,11 @@
- https://www.ankermake.com/blogs/guides/how-to-make-3d-prints-stronger
- https://blog.prusa3d.com/how-to-improve-your-3d-prints-with-annealing_31088/
- https://markforged.com/resources/blog/joinery-onyx
- https://bigrep.com/posts/gyroid-infill-3d-printing/
- https://www.hp.com/us-en/printers/3d-printers/learning-center/3d-printed-joint-design.html
TL;dr:
- Use gyroid infill with an infill density of between 50-80% for structural prints
- Use PLA with a very slow speed, low layer height, and minimal/no cooling
- Use dovetail joints of scale defined in the HP article
- Anneal the print at 110c for ~30 minutes depending on the size and shape of the object

View File

@ -0,0 +1,45 @@
<https://scienceofsharp.com/2014/08/13/what-does-stropping-do/>
<https://scienceofsharp.com/2015/02/09/the-pasted-strop-part-1/> (pts 1-4)
There are two categories of stropping, stropping on a clean substrate, and stropping on a substrate with compound.
Stropping is done to reduce the width of the edge, and to help remove and align any burrs along the edge.
# Clean Stropping
Stropping on a clean substrate achieves 4 things:
1. It realigns the edge
2. It burnishes the metal (moves it without destroying it), making the edge smoother
3. Abrasion - It makes scratches less defined and smooths out the blade
4. Removes coating - Some blades come with a manufacturer applied oil, you can use a strop to remove this coating
# Loaded Stropping
With a loaded strop, abrasive compound is applied to the strop to increase the rate of abrasion. This compound is applied with the goal of reducing the width of the edge without the formation of a foil-edge burr. Loaded stropping tends to produce a micro-convex edge, meaning it's shaped a little bit like a teardrop, where it curves outwards from a straight angle the farther away from the vertex the edge goes. This effect is generally desirable.
The effect of stropping happens quickly, within 3-30 laps, and 10 laps being the minimum needed to achieve the desired effect. Stropping past 30 achieves minimal change, and stopping past the hundreds may introduce a burr again.
It was generally noted that when stropping with a very fine compound (eg, 0.25 micron), a small but consistent burr would form. When stropping with a coarse compound, a larger burr would occur, but one that formed unevenly. To achieve the best of both worlds, it's suggested that you start stropping with a coarse material, then move to a fine material.
> Successfully designed stropping progression should involve different strop materials rather than different sized abrasives on the same substrate.
I can't find the exact source, but it seems that denim and a loaded leather strop with between 0.5-0.25 micron compound would be ideal.
## Strop Material
There are a variety of stropping materials available for use, common materials include leather, denim, newspaper, washcloth, and balsa wood.
### Balsa
Because balsa wood is rigid and nearly incompressible, stropping on balsa produces minimal convexity. Micro convexity is still achieved.
### Nanocloth
Nanocloth is a soft, flexible material mounted on a hard, flat glass substrate. It's a synthetic polishing cloth sold by Ken Schwartz. It appears to achieve slightly more micro convexity than the balsa substrate.
## Latigo (Bovine) Leather
## Compound material
### Chromium Oxide
Chromium Oxide (green, waxy substance) is probably the most common stropping compound. While it's moderately effective, there are better options, and it's generally recommended that if you strop a blade on a chromium oxide loaded strop, you follow it up with fine abrasive or a clean leather strop.
## Mono-diamond
Mono crystalline diamond stropping compound comes in a wide variety of grit sizes, ranging from 0.1 micron, all the way up past 20 micron.
| Compound size | Result |
| ------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ |
| 0.25 micron | After 10 laps on a bovine leather strop, it did not sufficiently remove the bur. With 100 laps, it got closer, but a noticeable bur was still present. 0.25 micron appears to remove material very slowly, almost too slowly, but it produces a fine finish. |
| 0.5 micron | After 10 laps on bovine leather, significantly more abrasion occurred than with the 0.25 micron compound. No significant change in edge geometry was noted compared to use of the 0.25 micron stropping compound. |
| | |
| 10 micron | When stropping with 10 micron compound, it was noted that the entire bevel began to convex, and significant removal rate occurred. Large burrs were left on parts of the edge, but further stropping on linen and clean leather would remove those burrs. |

View File

@ -1,30 +0,0 @@
Installed discord
Changed scrolling direction and speed 
Installed spotify
Turned off spring loading
Unpinned stuff from taskbar
Minimize using scale
Autohide dock
Installed brew
Installed chrome
Installed obsidian
See https://www.youtube.com/watch?v=psPgSN1bPLY for below
set dock to go with maximum speed and power
enabled type to siri
disabled autocorrect
switched back to natural scrolling
installed rectangle

View File

@ -1,7 +0,0 @@
****#linux
#laptop
[Documentation](https://github.com/knauth/goodix-521d-explanation)
From the usbreset directory run `gcc usbreset.c -o usbreset.out` to compile the reset bin, then `sudo ./usbreset.out /dev/bus/usb/<bus>/<device>` to reset it, for this device it's ``sudo ./usbreset.out /dev/bus/usb/003/002``
from goodix-fp-dump run `sudo python run_521d.py` to reflash the firmware

Some files were not shown because too many files have changed in this diff Show More