![]() (Photo : RAYMOND ROIG/AFP via Getty Images)ĭolphins are among the most vocal animals on the planet, producing a range of sounds, such as clicks, whistles, squeaks, chirps and squawks. Some users also shared their own stories of interacting with dolphins or expressed their love for the marine mammals. The video has captivated many TikTok users, who commented on how amazing and cute the encounter was. The original poster claimed that the dolphin was "separated from its mother and sick" and that it was "the first time ever seeing a baby dolphin." The boy said, "he was talking to me" as the dolphin swims away. The video shows a boy running across some rocks towards the water's edge, where a dolphin's fin can be seen poking out of the water. It was filmed at O'Sullivan Beach Boat Ramp facility in Onkaparinga in South Australia, where a dolphin was spotted near the shore. The video, posted by has received over 970,000 views and 102,000 likes at the time of writing. But can they also talk to humans?Ī viral video on TikTok suggested that they might be able to, as it shows a dolphin swimming up to a boy and allegedly "talking" to him. RELATED ARTICLE: More Than 70 Gray Whales Dead in 6 Months, and Scientists Don't Understand WhyĬheck out more news and information on Dolphins in Science Times.Dolphins are known for being highly intelligent and social animals that can communicate with each other using a variety of sounds and gestures. Related information about army dolphins is shown on Real Science's YouTube video below: Scientist Brittany Jones, from the National Marine Mammal Foundation, said such findings are an outstanding to the literature offering detailed analyses during prey capture in the open ocean, which would be quite difficult to attain with wild dolphins. One dolphin, in particular, caught 64 fish from close to the seabed and five close to the surface while the other was captured at the bottom and four at the surface. The San Diego Bay dolphins, in particular, were observed in numerous sessions of approximately 50 minutes and discovered that while the dolphins fed on prey, both at the water's surface, and close to the seabed, they caught and ate more from the bottom. ![]() Simultaneous video and sound of all prey capture occurrences, and some fish that fled capture showed that echolocation, which is described in National Geographic, was used to find prey at a distance and up close vision demonstrated by eye tracking was used as well. If the eye of the dolphin was visible in the footage, the study authors discovered that "it was always rotated toward the fish." The squeal and terminal buzz continued even if the fish fled and the dolphin gave chase. These were trimmed into a terminal buzz, a series of quick subsequent clicks, sounding akin to high-pitch buzz, and then a sequel as the dolphin reached a potential catch.Īs the dolphin caught and ate the prey, the squeals continued, deviating in duration, peak, amplitude, and frequency. ![]() When chasing prey, the dolphins were observed to click at 20- to 50-millisecond intervals. In the paper, the researchers reported that placements of the camera that they used could be used with tiny cameras and suction cup tags "to observe feeding in wild dolphins." The study authors added this would provide better insight into feeding and nutrition in endangered populations. They even have signature whistles within their social group, almost similar to a name. They are communicating with one another using tier vocalizations. The click rate for such vocalizations is believed to increase when reaching an object of interest. It did not fall ill.Īlso mentioned in the research published in PLOS One, dolphins are vocalizing for various reasons, frequently for echolocation when searching for prey. One of the dolphins was also observed eating eight yellow-bellied snakes, which are venomous species that had never been seen being preyed upon by dolphins. Navy shows Spetz, a bottlenose dolphin belonging to Commander Task Unit 55.4.3 beach up on a transfer mat before going out on a training mission from the well deck of the USS Gunston Hall on March 17, 2003, in the Arabian Gulf. ![]()
0 Comments
![]() Jims-Mac-mini:/ jim$ find / 2>/dev/null | grep AUComponent.r 2>/dev/null This is a patched version of JUCE 5.3.2 (you can enable legacy build using a commandline option on xcodebuild). Applications/Xcode.app/Contents/Developer/Platforms/atform/Developer/SDKs/MacOSX10.15.sdk/System/Library/Frameworks/amework/Headers/AudioUnit.r:18: # Rez - Fatal Error, can't recover.ĪUComponent.r: # Rez - Since errors occurred, /Users/jenkins/Home/workspace/Pitchmonster OSX New/Builds/MacOSX/build/PitchMonster.build/Release/PitchMonster - AU.build/ResourceManagerResources/Objects/include_juce_audio_plugin_client_AU.rsrc's resource fork was not completely updated. Applications/Xcode.app/Contents/Developer/Platforms/atform/Developer/SDKs/MacOSX10.15.sdk/System/Library/Frameworks/amework/Headers/AudioUnit.r:18: # Rez - noErr (0) during open of "AUComponent.r". /juce/modules/juce_audio_plugin_client -isysroot /Applications/Xcode.app/Contents/Developer/Platforms/atform/Developer/SDKs/MacOSX10.15.sdk /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/JuceLibrar圜ode/include_juce_audio_plugin_client_AU.r /juce/modules/juce_audio_plugin_client -i /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/Builds/MacOSX/build/Release/include -i. ![]() Applications/Xcode.app/Contents/Developer/usr/bin/Rez -o /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/Builds/MacOSX/build/PitchMonster.build/Release/PitchMonster\ -\ AU.build/ResourceManagerResources/Objects/include_juce_audio_plugin_client_AU.rsrc -d SystemSevenOrLater=1 -useDF -script Roman -d ppc_$ppc -d i386_$i386 -d ppc64_$ppc64 -d x86_64_YES -I /System/Library/Frameworks/amework/Frameworks/amework/Versions/A/Headers -I /Applications/Xcode.app/Contents/Developer/Extras/CoreAudio/AudioUnits/AUPublic/AUBase -arch x86_64 -i /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/Builds/MacOSX/build/Release -i /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/Builds/MacOSX/././Source -i /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/Builds/MacOSX/././JuceLibrar圜ode -i /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/Builds/MacOSX/././Source/CPU_Features -i /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/Builds/MacOSX/build/Release -i /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/Builds/MacOSX/build/Release/include -i. Rez build/PitchMonster.build/Release/PitchMonster\ -\ AU.build/ResourceManagerResources/Objects/include_juce_audio_plugin_client_AU.rsrc /Users/jenkins/Home/workspace/Pitchmonster\ OSX\ New/JuceLibrar圜ode/include_juce_audio_plugin_client_AU.rĬd "/Users/jenkins/Home/workspace/Pitchmonster OSX New/Builds/MacOSX" Same project builds fine in Xcode 10.3 on 10.14.6 Applications/Xcode.app/Contents/Developer/Platforms/atform/Developer/SDKs/MacOSX10.15.sdk/System/Library/Frameworks/amework/Headers/AudioUnit.r:18: # Rez - Fatal Error, can’t recover.ĪUComponent.r: # Rez - Since errors occurred, /Users/Mac/Library/Developer/Xcode/DerivedData/Plugin-fdgrkkaynbuvclcykrwbuqxzopls/Build/Intermediates.noindex/Plugin.build/Debug/Articulate Plugin - AU.build/ResourceManagerResources/Objects/include_juce_audio_plugin_client_AU.rsrc’s resource fork was not completely updated.Ĭommand /Applications/Xcode.app/Contents/Developer/usr/bin/Rez failed with exit code 3 Applications/Xcode.app/Contents/Developer/Platforms/atform/Developer/SDKs/MacOSX10.15.sdk/System/Library/Frameworks/amework/Headers/AudioUnit.r:18: # Rez - noErr (0) during open of “AUComponent.r”. ![]() Rez Error - Command /Applications/Xcode.app/Contents/Developer/usr/bin/Rez failed with exit code 3 Fresh install of Xcode 11.1 and Mojave 10.14.6, JUCE 5.4.3 ![]() ![]() When an atom contains more or fewer electrons than protons, it has a negative or positive overall charge, and these atoms are known as ions.Īn atom is exceedingly small, much smaller than our imagination allows us to imagine. Like the layers of an anion, these electrons are organised in orbits around the nucleus of the atom. To have zero charge, an element's atom must have the same amount of protons as electrons. A single negative charge is carried by an electron. The total number of protons and neutrons in the nucleus is used to calculate an element's atomic weight. The number of protons or positive charges in the nucleus determines an element's atomic number. A proton is a particle with a single positive charge and a mass of one unit. A neutron is a neutral particle with a mass of one unit. The nucleus is made up of neutrons and protons, which are responsible for an atom's weight and positive charges. The atom is electrically neutral if the number of protons and electrons is equal. Protons have a positive electric charge, while electrons have a negative charge and neutrons don't have any. The nucleus contains more than 99.94% of an atom's mass. Only one type of hydrogen, the most prevalent, lacks neutrons. One or more protons and a number of neutrons make up the nucleus. This article will study atoms, molecules and ions, the difference between atom and molecule and molecular elements in detail.Ītoms Molecules and Ions Atoms and Molecules DefinitionĮvery atom is made up of a nucleus and one or more electrons attached to it. Atoms are extremely small, measuring about 100 picometers in diameter. Every solid, liquid, gas, and plasma is made up of neutral or ionised atoms. 1999‑2023 - All Rights Reserved.An atom is the smallest unit of matter that makes up a chemical element. Retrieved from Ĭopyright © Israel Science and Technology Directory. "Sortable list of elements of the Periodic Table". The story behind the discovery that elements are born in stars.Atomic Weights of the Elements (From IUPAC). ![]() Multilingual Dictionary and Etymology of the Periodic Table Elements.Atomic Reference Data for Electronic Structure Calculations.List of Periodic Table Elements in Hebrew.Other resources related to the Periodic Table For these elements, the weight value represents the mass number of the longest-lived isotope of the element.Įlectron configuration: See next page for explanation of electron configuration of atoms. The elements marked with an asterisk have no stable nuclides. The values shown here are based on the IUPAC Commission determinations ( Pure Appl. For relative abundances of isotopes in nature, see reference on Atomic Weights and Isotopic Compositions.Ītomic weight: Atomic weight values represent weighted average of the masses of all naturally occurring isotopes of an element. The abundance of each isotope depends on the source of materials. For example, the two common isotopes of carbon, 12C and 13C, have 6 and 7 neutrons, respectively. Elements have more than one isotope with varying numbers of neutrons. The isotope of an element is defined by the sum of the number of protons and neutrons in its nucleus. Isotope: Atoms of the same element with the same atomic number, but a different number of neutrons. ![]() Thus, each proton and neutron has a mass of about 1 amu. This isotope of carbon has 6 protons and 6 neutrons. Atomic mass is measured in Atomic Mass Units (amu), which are scaled relative to carbon, 12C, that is taken as a standard element with an atomic mass of 12. Each element is uniquely defined by its atomic number.Ītomic mass: The mass of an atom is primarily determined by the number of protons and neutrons in its nucleus. Boiling pointĪtomic number: The number of protons in an atom.
![]() ![]() ![]() Universal wallets - which support multiple and unrelated items that are part of a particular blockchain - and merchant-supported wallets, which are wallets that narrowly focus on a specific brand, are seeing their user-base increase. Individual digital wallet use is growing, according to a report by market research firm Mercator titled “Digital Wallets: Moving Beyond Payments With Expanding Options”, published June 15. In theory, it would be much harder (and safer) to steal an individual’s digital assets hiding across a multitude of different wallets. Investors who keep their cryptocurrency holdings on an exchange are giving their private keys to the exchange, and “therefore your money,” says Ermolaev.Īccording to a blog post by blockchain data group Chainalysis in February, about $2.66 billion has been stolen from exchanges since 2012, with the most common attack method being the theft of private keys. It’s impossible to hold individual corporate shares, cash and bonds in a home safe, so investors have long turned to banks or brokers for service and custody.Ĭryptocurrency is different. Most people think of centralized cryptocurrency exchanges like their E-trade account. Worse yet, Ermolaev said there are a lot of re-flashed and fake hardware wallets out there designed to steal cryptocurrency. Hard wallets are not very convenient for regular traders who have to remind themselves to store on the drive, and they are slower to use than a mobile application. “They are a good idea, but there's always the risk of losing or breaking them,” says Mike Ermolaev, spokesman for ChangeNOW, a crypto exchange in the country of Georgia. Hard wallets need to be in as identifiable and secure a location as a traditional combination safe holding the family’s jewels.Ī Ledger wallet one of the best known names for hard wallets in the market. But, like any other portable drive, they get cluttered in an office desk drawer or stored in a backpack somewhere. More advanced investors who participate in staking and yield farming programs will have their own wallets related to those yield-bearing tokens.ĭuring the height of the initial coin offering phase, hard wallets became the new way to store Bitcoin and Ether ETHeum. Otherwise, Coinbase will skim about 25% off those gains. Those who have no intention to use the tokens for anything other than as a speculative investment, then it is important to note that cryptocurrencies that pay yield are better held in their own individual wallet. Coin holders usually want an individual coin’s wallet because they use the coin to interact on a particular blockchain ecosystem. ![]() ![]() ![]() She continued, “There was a time when my self-esteem was at an all-time low. This became a chance for me to become stronger and it was a project where I could grow along with Mi Rae.” I try to let it go, but since I’m human, there are times when I can’t. I have a job where I hear hundreds and thousands of comments a day about my appearance and I get hurt. But through this drama, I felt like I received healing. She explained what she gained from the drama, saying, “As our society became obsessed with outer appearances, it started to lose sight of the inner aspects and judging others based on looks became common. Thanks to ‘My ID is Gangnam Beauty,’ I was able to spend this hot summer in a happy and warm way.” I feel empty and a lot of her still lingers. Im Soo Hyang said, “I don’t know how to say goodbye to Mi Rae. Kang Mi Rae’s dream is to become a perfumier and Im Soo Hyang’s name backward is Hyang Soo, which means perfume in Korean. ![]() She just may have been destined to play the role. The actress said that she was a fan of the webtoon and learned about this when she received the casting offer for the drama. 1 in fan-voted fantasy castings of the drama. The drama presented a message to society about the effects of valuing appearances and evaluating others’ looks.Īs the webtoon gained popularity, Im Soo Hyang always came in No. Im Soo Hyang shared her thoughts on “ My ID is Gangnam Beauty” and her character Kang Mi Rae in a recent interview following its finale.īased on a popular webtoon, “My ID is Gangnam Beauty” told the story of Kang Mi Rae who underwent plastic surgery and entered college. ![]() ![]() ![]() Here are articles related to how to uninstall ProctorU software from your computer. If you're in a public location, such as work or a library, please contact the IT Administrator for assistance. If you're unsure how to do this, we advise that you contact your internet service provider for assistance. You may add an exception for port 1935 in your firewall, or you may disable it for the duration of your exam. If you are connecting through a home network, it may be blocked by a firewall or anti-virus software. If you are connecting through a work or school network, this may be blocked by your network administrator. Port 1935 is a necessary port that is used for the transfer of video sharing over your network connection. Some ports may be blocked by default and to connect with our services we may need to open those ports. If you had extended troubleshooting we may have needed to open Ports 80, 443, 843, 1935, and or 61613.
![]() The blackout wrap around corner works exactly as it should. It worked well and I don’t have any dipping in the middle and don’t need the support bracket having it be two solid pieces in the middle of the span. We used a rotary pipe cutter (used in plumbing pipe cutting from the hardware store) to trim off the excess length. I chose the longest length (too long) for the patio door to avoid using the center support bracket so that the drapes could be pulled back to the non-door side. It goes much faster as you get into the project. ![]() The installation is simple, but best achieved with two people. The satin nickel finish is a tasteful modern look. I would have preferred the oil rubbed bronze but they did not have enough stock in all the right sizes for me to do the whole house. They all have the mollies for drywall support, but we have a log home so all my installation was into solid wood. I have installed them throughout the whole house just beyond the window frames where possible to maximize the window in daytime. I have teamed them with sheers for daytime privacy and blackout velvet drapes. We like to be late sleepers and I am very light sensitive. They were easy to install and can support the weight of the thermal blackout curtains. I purchased two of these rods in 48 to 88 inch and definitely lucked out getting these great rods before they disappeared in my size. The curtains glide easily on the round rod unlike the old fashion oblong rod I was using. Very happy to see nice filtered light of the day with sheers behind the blackouts. After all was said and done, the look is great. Slide the curtains onto the rod and extend rod out to where you can support one on the bracket (only if you don't have a center support) while screwing the other end in. Just attach the clips to the wall (hardware and instructions supplied), screw the rods out of the rounded corner bracket and slide bracket onto the clips. I wasn't sure how difficult a task it would be to install when I purchased them but was actually pretty simple. The rod allows the blackout curtain to wrap around like a traverse rod to better block the light. I wanted to add sheers behind the blackouts to allow privacy when opening in the daytime. The game ends as soon as the last case card has been answered correctly.I had never seen this type of double rod and was happy to find this Umbra Twilight Rod. ![]() Together, the players explore the Crime City map to gradually answer all the questions on the case cards. ![]() The players choose together which case they will play and the commissioner reads out the corresponding starting card as well as the first task. One player takes on the role of the commissioner and is responsible for reading out the case cards (but of course also puzzles along). A magnifying glass is included in the game as a little help. An attentive eye is just as much in demand as creative powers of deduction to unravel everything on the 75 x 110 cm game board. Together, players solve 16 tricky criminal cases by determining motives, finding evidence and convicting the perpetrators. MicroMacro - Crime City is a cooperative detective game. Therefore, the work of smart investigators is needed. The local police are no longer able to control what is happening. Fatal secrets, devious robberies and cold-blooded murders are the order of the day here. Welcome to Crime City, a city where crime lurks around every corner. ![]() ![]() ![]() He's been in love with technology since his earliest memories of writing simple computer programs with his grandfather, but his tech writing career took shape back in 2007 when he joined the Lifehacker team as their very first intern. Jason has over a decade of experience in publishing and has penned thousands of articles during his time at LifeSavvy, Review Geek, How-To Geek, and Lifehacker. Prior to that, he was the Founding Editor of Review Geek. Prior to his current role, Jason spent several years as Editor-in-Chief of LifeSavvy, How-To Geek's sister site focused on tips, tricks, and advice on everything from kitchen gadgets to home improvement. He oversees the day-to-day operations of the site to ensure readers have the most up-to-date information on everything from operating systems to gadgets. ![]() Jason Fitzpatrick is the Editor-in-Chief of How-To Geek. Note: Auto-Select will never actually automatically select files unless you click the Auto-Select button. You can uncheck any of these options to alter the behavior of the duplicate finder. The default is to select uncompressed files, lower resolution files, and smaller files, first. You can see the rules for Auto-Select by clicking on the Auto-Select tab. ![]() Your home directory should be the directory at the top-use the up and down arrows at the right side of the folder list to change the position of the folders. Once you have your folders selected, you can then move the folders up or down in the list in order to create prioritization for the auto-select tool. If you’ve spent a bit of time selecting folders (or later, tweaking settings), you’ll definitely want to take a moment to go to File –> Save Project and secure the resulting VSP project file in a place it won’t get accidently deleted. Now would be a good time to mention that VisiPics has a Project function which allows you to save all your settings in between sessions. If there is a folder called 2011 Birthday in both folders, with the same files in both folders, if you don’t pay attention to the process and delete 5 dupes from the first 2011 Birthday folder and 5 dupes from the second one, you’ll end up with a split collection that is even messier than the original pile of dupes you had on your hands. What you don’t want to do is to start deleting duplicates from both directories as this breaks apart the sets/collections you have. Any duplicate file finder you use will find the dupes in either directory. Let’s say, for example, that you have a pile of photos in C:\Pictures\ and C:\Picture Dump\. In addition to making sure you’re only working with one set of files (and the other is properly backed up) the other critical thing you want to do is to decide which directory is going to be the home directory and which directory is going to be the dupe directory. Thus, you can find duplicate files by comparing the similarity between them and not just filenames.Whatever you choose to do (or can do, based on the hardware you have on hand) you should not proceed unless there is, at minimum, a copy of every photo you’re working with in a location that will not be touched by the application we’re using. They use the matching algorithms that search files by name, tag, size, metadata. These programs support almost all file types, such as ZIP archives, photos, audios, videos, PDFs, folders, subfolders, etc. Duplicate File Detective - Possibility to scan network drives.Wise Duplicate Finder - Detects damaged and old files.XYplorer - Customizable keyboard shortcuts.CCleaner - Automatic duplicate files remover.Easy Duplicate File Finder - Scans a variety of sources.Auslogics Duplicate File Finder - Effectively detects multimedia duplicates.MindGems Duplicate File Finder - Protect system files and folders.Nektony Duplicate File Finder - Merge folders & organize files.dupeGuru - Customizable searching algorithm.Duplicate Cleaner Pro - All-around software for all file types. ![]() ![]() The suite helps you avoid all types of online threats (ransomware, viruses, banking Trojans, spyware, etc.), repair and quarantine compromised or suspicious files, identify outdated apps and patch vulnerabilities, encrypt your data and ensure your anonymity while web browsing (via an unlimited VPN service), block phishing attempts, as well as stay away from harmful websites, ads, and even web trackers. To put it all into perspective, you can basically think of having 3 apps into one. You are provided with all of Avira’s security, privacy, and performance-oriented tools. The Prime and Prime Family plans are better as they allow you to unleash the suite’s full potential (the only difference is the number of supported users). The Internet Security plan offers enhanced virus protection, as well as tools aimed at ensuring that most online-related vulnerabilities are patched by keeping your apps updated to their latest versions, and by protecting your sensitive data and passwords. The first is aimed at users who want to ensure that their online presence is as protected as possible. ![]() What about the paid version?Ĭurrently, there are three main plans: Internet Security, Prime, and Prime Family. There’s also a startup optimizer that helps you speed up your computer’s starting time, and a duplicate finder that should help you bring some order in those bulky folders. With their help, you can ensure that your computer is clear of all types of pesky junk files. The base version also gets you a selection of free tune-up tools as part of the System Speedup Suite. Well, you are provided with one of the best antivirus engines with real-time protection against all types of malware and online threats, a freemium VPN service (500 MB/month), various privacy oriented features such as a file shredder, browser safety and cookie cleaner, a basic password manager, as well as something called Privacy Settings designed to prevent Windows and apps from sharing your data. So, what does the base/free version get me? ![]() In short, it follows the current trend of comprehensive AV solutions that are not only focused on security, but also on protecting your privacy and enhancing your computer’s performance.Īvira products have always had top-notch security technologies under the hood, and they were always competitively priced, but the new Avira Free Security is definitely a step up in the industry. The latest product to come out of the German Avira Operations GmbH labs is dubbed Avira Free Security, and it acts as a modern replacement for the product that has been a staple for the company’s lineup for many years.Īvira Free Security takes on a modern approach to showing what a basic antivirus tool should be. Avira GmbH has made quite a name for itself over the last couple of years as being the company that provided 500 million users worldwide with one of the best free antivirus solutions out there and some solid-performing premium tools as well. ![]() ![]() ![]() ![]() In conclusion, "Gas Station Simulator" is an oddly charming and engrossing game that takes a mundane concept and transforms it into an exciting gaming experience. The game’s peaceful ambient noise and simple, clean graphics also contribute to creating a calming atmosphere that allows players to unwind and lose themselves in this virtual world. There's something oddly therapeutic about the simple routine tasks that you perform in your station. Amidst the hustle and bustle of managing a busy station, "Gas Station Simulator" manages to be an incredibly relaxing game. The game's tasks system is highly rewarding and creates a robust and ever-changing gameplay experience. Players are kept on their toes, as they juggle between restocking shelves, cleaning, refueling, and even renovating the station. The game offers a multitude of tasks, creating a veritable smorgasbord of activities. Despite the title, the "Gas Station Simulator" is more than just about managing a fuel station. ![]() It feels like every task, every customer interaction, and every station upgrade has been laced with a comedic touch that will keep you grinning from ear to ear. The developers evidently intended for players to have as much fun as possible, creating a delightful atmosphere that persists throughout the game. A careful balance is struck between subtle wit, wry irony, and laugh-out-loud moments. A significant part of the game's allure lies in its distinct sense of humor. The strong sense of progression, coupled with the freedom of choice in running your gas station, contributes greatly to the game's compelling charm. The game, in its unique and unexpected way, commands your attention and before you know it, hours have flown by as you find yourself deeply immersed in the world of running a gas station. The Upon diving into the world of "Gas Station Simulator", one cannot help but be immediately ensnared by its incredibly engaging gameplay. Upon diving into the world of "Gas Station Simulator", one cannot help but be immediately ensnared by its incredibly engaging gameplay. ![]() |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |