In this overview, Berklee Online instructor Loudon Stearns gives a broad overview of synthesis and the function of modulation within synthesis. When modulation is assigned in a synth or sampler the user must define the modulation source, destination, amount, and direction.
Meme Stock – NOVA – Sunnova
Admittedly I have 4 shares of this company that I bought at the $3.02 mark. I thought the bottom had hit, but was not quite sure. So for $12.08, the cost of a couple of cheap months of Netflix, I lost $10, as I am selling today, but I learned a valuable lesson. There is Read More …
Notes – Cost Effectiveness & Specialized Hardware
Specialized hardware can enhance cost-effectiveness in specific applications, offering optimized performance and reduced expenses when compared to general-purpose solutions, but the decision depends on the specific needs and application. Here’s a more detailed breakdown: Why Specialized Hardware Can Be Cost-Effective: Optimized Performance: Specialized hardware is designed for particular tasks, enabling them to perform those tasks Read More …
InfoSec TV – Decoupling CI from CD with ArgoCD
In this video we are going to cover Decoupling CI from CD with ArgoCD Image Updater
GRE Tunnels in Modern Networking
In the world of modern networking, flexibility, security, and efficiency are paramount. As the Internet continues to evolve, so do the methods by which data is transmitted across complex infrastructures. One such method is the use of Generic Routing Encapsulation (GRE) tunnels. In this article, we’ll explain what a GRE tunnel is, how it works, Read More …
Live on iHeartRadio
My album is live on iHeartRadio! Artist: 1bluebass Album title: Initial Experiments Initial Experiments
North Korea infiltrates crypto markets
N. Korea infiltrates crypto markets Google Gemini However, I can provide you with general information about North Korea’s involvement in the cryptocurrency industry, which is a widely reported topic: Sanctions Evasion: North Korea faces strict international sanctions due to its nuclear weapons program. Cryptocurrency offers a way to bypass traditional financial systems and evade these Read More …
Conference Video – Offensive Countermeasures: Still trying to bring sexy back
Why is it that the Hackers and Penetration Testers get to have all of the “sexy” fun? In this presentation we will cover some cool tricks to confuse, block or mislead attackers. Penetration testers may be angered during this presentation as we will describe how to make their lives difficult. The term “hacking back” will Read More …
What is a Dig Skirt?
A “dig skirt” in the context of poultry keeping, also known as a predator guard or anti-dig barrier, is a barrier made of metal, like hardware cloth or welded wire, that’s placed around the outside perimeter of a chicken coop or run, buried or secured to the ground, to prevent predators from digging under and Read More …
Some not so quick reads
Japan Birth Rate Thread Reader How both parties have failed The Masquerade & The Void Farewell Address The alternate domination of one faction over another, sharpened by the spirit of revenge, natural to party dissension, which in different ages and countries has perpetrated the most horrid enormities, is itself a frightful despotism. But this leads Read More …