> At the dawn of August 7, we saw large black spheres coming and going with great speed and precipitation before the sun and chattered as if they led a fight. Many of them were fiery red and, soon crumbled and then extinguished.
I have also experienced a strange Aurora phenomenon. My first year living up north I was lucky enough to catch the northern lights. They were gray (not green) but really fun. A kind of camo-patterened pulsing, flickering in and out, with ripples that would move through it.
Eventually they moved from the northern horizon to entirely overhead, and even into the southern horizon. The overall pattern continued: pulses of circles fading in and out like blinking neon light, with waves crashing through and across the entire thing, slowly. Still gray, never green.
Then I noticed that the waves would all "sink" into a single spot in the sky. Directly overhead was a "dark spot" in the borealis, and it moved around slightly and had this wicked looking "interference" pattern around it, like what you'd expect to see with two magnets interfering.
Over and over the waves would ripple from the north and "sink" into this dark spot. The hole itself seemed to pulse as the waves moved around and ultimately into it. Kind of felt like it was a kind of magnetic pole. Not sure. The aurora itself (patterns of blinking, pulsing, shimmering) continued into the southern sky, but the dark hole was right overhead.
I haven't been able to really find anyone else who has experienced this. Just wanted to share.
I have seen something similar. A spectacular display in the mid-90's in February at Big Trout Lake Ontario; I watched it from the lake on the winter road. The entire sky would react to waves of energy, and there was a dark hole - as you described - in the middle of the sky. I have never seen such a dramatic display of aurora, with such strange patterns (vs the typical whisps of light) before or after.
Edit to add that the aurora happens in the upper atmosphere, so its interaction with the magnetic pole would be visible over long distances of the Earth's surface.
You know, I've found Frank Zappa's music to have a very similar property. Namely that there's a deep creative structure that winds through Zappa's music, especially across entire his longer compositions. For example, in "Willie The Pimp", there's a massive guitar solo towards last half of the song, that gets continually teased and played with earlier in the track. There have been other examples where I've caught "teases" to guitar solos on a track early in an album, that doesn't actually show up in full maturity until later inthe album.
I can only imagine that what I recognize as a singular theme is in reality much more broad (in so much as we can even define it), given Zappa's composition ability and musical prowess. There's so much to discover that lies under the surface of result of his creative process. I think Zappa gets a lot of credit because in general his music is more approachable (but still has plenty of weirdness across his almost 100 album discography).
Anyway, where I'm going with this is that Zappa and Captain Beefheart went in together on Zappa's "Willie the Pimp", on the "Hot Rats" album which is one of my favorite albums of all time. Interestingly enough it's the only song on the entire album that features vocals, which is noteworthy on its own. The vocals are provided by none other than Captain Beefheart himself. The vocals are kind of strange and certainly provide a unique component to the track.
https://www.youtube.com/watch?v=Xr256gta2Qw (Willie The Pimp) -- if you listen to that guitar work, there's so much to unpack just in that one track. It's self referential on many levels, and I'm sure I'm missing most of it.
Well, it's fun to notice and appreciate those kinds of things, and to the analytical mind of a rational optimist, that wants to believe everything as carefully planned and premeditated, and released as profound craftsmanship and perfected design, to uncover something like that is probably profoundly enthralling.
There's an alternative reality, known to anyone who has made art for art's sake though, and especially if you've spent years making purposeless art with no consequence in the outcome of whether a work declared as "finished" actually needs to be "good."
When you sit around all day, pouring and extruding your unfiltered stream of consciousness into realized tangible forms that you can pick up and hold, or record and play back, you're left with this huge backlog of scrap left on the cutting room floor. Taken out of context, some of it is artful, and "good enough" to stand on it's own, but doesn't belong in the "finished" piece.
But when you find a couple of rhyming chunks, you can take that leftover flotsam and fold it into a subsequent piece, recycling throwaway outtakes as part of some other whole, to enrich it.
In that sense, those kinds of matching details aren't actually planned. It's just opportunistic reuse of leftovers to enrich and go along with something that was planned.
Example: sometimes you're forced to produce "things," and so due to external expectations you make a bunch of "stuff" but because you weren't motivated, 90% of it is trash. But you don't throw it away, because it still possesses recognizable style. So you throw it in a box and let it collect dust. Then weeks or months or years later, when you need filler, you dig some matching trash out of the dustbin, and cobble together some cruft to patch some holes and gaps, where the daylight is peaking through on your finished piece. Now, that illusory facade enriches your intended work all the more.
This is a technique common in "art" that impresses people who've never had a chance to make a thing for it's own sake, without said thing having to require practical utility or actually "work" in any appreciable way.
It's the art student's corollary to the academic version having to write 1000 words for a grade, and 900 of those words are rambling drivel, or having to publish N research papers a year, so you throw together a backlog of p-value hacks that seem interesting but prove nothing and indulge in pointless, speculative editorialization as science.
At the core of all the work, you either like the sum total of everything, or you don't, and in general, you're picking up what that guy is putting down overall.
But as with all disciplines, in every field, people have to make frankenstein monsters out of filler bunny all the time. Any artist worth their salt is always trying to operate from the space where they can unspool as much of their style as possible, with total freedom and unlimited resources, because they know that even on the days when they aren't hot, some of the junk they make, can still serve as decorative paper mache fodder.
I just signed up. Thank you. I don't even care if it works. I get up to 6/day, and if I can turn even just one of those into a bit of fun, it'll all be worth it.
I've become irrationally irritable because of these calls. I have started subconsciously turning off my ringer, causing me to miss actual important calls. Jolly Roger may be my saving grace.
I have varying degrees of success with it. I do have a few recordings of calls (JR will email you an audio recording of the call after you hang up) that are quite hilarious.
I recently finished reading Snow Crash (1992), which touches on this topic in an interesting way. The general premise without giving too much away is that ancient Sumarian was made up of a specific structure that acted as a kind of assembly language for the human brain, enabling self-executing code like "How to Bake Bread" or "How to Plant a Field". A villager could go to the "source code repository" aka "the temple", get a recipe for some function they wished to complete (or needed to be completed by the village in general), and execute it by having it read to them by the priest.
This was a way to bootstrap human society, ultimately giving rise to free thought and "higher level language" that was not bound by self execution.
It was a pleasant surprise and I found myself enjoying it immensely, even with a bit of suspension of disbelief.
Something I find interesting is that the instructions described in the book, the Sumerian 'Me', actually existed. They were instructions on how to do fundamental things, managed by the priests and which the Sumerians believed came from their gods and goddesses. The concept of neurolinguistic programming by the Sumerians is a nice fiction, or at least there's never been any evidence of it.
I recently dropped my Galaxy S5 [with a case and glass protector] into the toilet (gross). It was probably submerged for a full 2 seconds. Absolutely no side effects what-so-ever. I even gave it a full rinse in the sink afterwards.
Rent a convenient, easy-to-use electric assist bike provided by JUMP using your Uber app. Join the list below and be one of the first to ride with Uber Bike."
It's not a terribly large amount of code, and it's easy to test, even with a "live" key (since testing that any n of m can be recombined doesn't force a spend or reveal anything externally).
Also, it's a fairly well-known system, so I don't see it being collectively "forgotten" on the timescale of a few decades (it's been around since the late 70's i believe).
I'd love to get it integrated into wallet software, as it's such a safe and reliable way of storing secrets that lets you be as "secure" or as "reliable" as you want with just a slider.
This is what I had in mind. And it can scale to any "n of m" you want, without any if the downsides if multisig wallets (namely larger transactions, and more complex Bitcoin wallets required)
it's called 2 of 3 multisig and it's a standardized part of most cryotocurrency. it requires X of Y separate key signings to complete a transaction from an address
You don’t really want to split the key (as in if the key is n bytes, split it in 3 segments of n/3 bytes) because if one has two segments, I imagine it’s not inconceivable to infer the third segment from the public key and the other two (though I haven’t made the math).
Rather you have a private key p of n bytes. Create two cryptographically random keys k1 and k2 of n bytes each. Derive a key k3=(p XOR k1) XOR k2. k1, k2 and k3 are your distributed keys. To recompute p you need to do p = (k3 XOR k2) XOR k1.
A XOR is trivial to implement and I would expect be reasonably robust.
You do the midwest thing: just go about your business and pretend everything is fine.
You warm up your car 20 minutes before leaving. You throw on your layers that are reserved for the negative double digits (flannel jeans, extra thick wool socks, fur hats, massive scarf, thick mittens), check that the emergency kit and blankets are still in the back seat, and head out into the world and go about your day. In the city it isn't all that big of a deal, but it could mean danger if you get stranded in the countryside.
One of my favorite things about the super cold is how warm the house parties and social gatherings can get. It's so cold that you can't be outside for more than a few minutes at a time, so it really feels like an accomplishment when you make it to a friends house or a blizzard happy hour (that is, if it isnt too cold for snow).