Sunday, August 13, 2023

top spots: Restaurants

Restaurants Blog

Top Spots Burlington

Name Type Location Phone Website Hours
D Hot Shoppe Jamaican 4155 Fairview St., Unit 12 Burlington, ON, L7L 2A4 905-631-8698 https://www.dhotshoppe.com Tuesdays - Saturday 11am-6pm Sunday & Monday (CLOSED)
Piper Arms Pub 4155 Fairview St Unit 1, Burlington 905.631.0002 https://piperarmspub.com/piperarmspub/ Sunday to Tuesday 11 AM - 12 AM Friday to Saturday 11 AM -12 AM

Saturday, August 12, 2023

100 greatest mustache

"A Tribute to Upper Lip Elegance: Behold the 100 Greatest Mustaches in History!"

Some of these are repeated multiple times.

  1. Salvador Dali
  2. Albert Einstein
  3. Charlie Chaplin
  4. Friedrich Nietzsche
  5. Tom Selleck
  6. Hulk Hogan
  7. Mark Twain
  8. Burt Reynolds
  9. Groucho Marx
  10. Rollie Fingers
  11. Clark Gable
  12. Salvador Allende
  13. Carl Jung
  14. John Waters
  15. Frank Zappa
  16. Jules Verne
  17. Theodore Roosevelt
  18. Mahatma Gandhi
  19. John Bolton
  20. John Lennon
  21. Freddie Mercury
  22. Ron Swanson (Fictional)
  23. Daniel Day-Lewis
  24. Sam Elliott
  25. Fu Manchu (Fictional)
  26. Martin Luther King Jr.
  27. John Oates
  28. Ernest Hemingway
  29. Vincent Price
  30. Richard Pryor
  31. Robert Goulet
  32. Alex Trebek
  33. Johnny Depp (as Captain Jack Sparrow)
  34. John Belushi
  35. Salvador Larroca
  36. Salvador Perez
  37. Mark Spitz
  38. Zorro (Fictional)
  39. Friedrich Engels
  40. Albert Camus
  41. Gene Shalit
  42. Yosemite Sam (Fictional)
  43. Rollie Fingers
  44. Ron Burgundy (Fictional)
  45. Bill Murray
  46. John Travolta (as Vincent Vega)
  47. Salvador Sobral
  48. John Bolton
  49. Friedrich Hayek
  50. Wilford Brimley
  51. Eddie Murphy
  52. Sam Elliott
  53. Yosemite Sam (Fictional)
  54. Alex Trebek
  55. Hulk Hogan
  56. Clark Gable
  57. Albert Einstein
  58. Charlie Chaplin
  59. Benito Mussolini
  60. Lionel Messi
  61. Burt Reynolds
  62. Salvador Dali
  63. John Lennon
  64. Freddie Mercury
  65. Groucho Marx
  66. Tom Selleck
  67. Ernest Hemingway
  68. Vincent Price
  69. John Waters
  70. Jules Verne
  71. Robert Goulet
  72. Zorro (Fictional)
  73. Friedrich Nietzsche
  74. Sam Elliott
  75. Yosemite Sam (Fictional)
  76. Richard Pryor
  77. Carl Jung
  78. Salvador Perez
  79. Mark Twain
  80. John Travolta (as Vincent Vega)
  81. Gene Shalit
  82. Rollie Fingers
  83. John Oates
  84. Daniel Day-Lewis
  85. Albert Camus
  86. Ron Burgundy (Fictional)
  87. Sam Elliott
  88. Alex Trebek
  89. Benito Mussolini
  90. Burt Reynolds
  91. Salvador Dali
  92. Lionel Messi
  93. Groucho Marx
  94. Charlie Chaplin
  95. Tom Selleck
  96. Eddie Murphy
  97. Bill Murray
  98. Vincent Price
  99. John Lennon
  100. Yosemite Sam (Fictional)

These individuals, both real and fictional, are known for their iconic mustaches that have left an indelible mark on culture and history.

Friday, August 11, 2023

How to Encrypt .txt & send it as data url

 how to encrypt a txt

on a mac using terminal to encrypt then in shortcuts app converting it to data url.

the file i made is on desktop called YOURFILE.txt


run this in the terminal:


openssl aes-256-cbc -salt -in YOURFILE.txt -out encrypted_YOURFILE.txt.enc


  • it asks for a password enter it
  • delete the original using the command


shred -u YOURFILE.txt


to decrypt the file:


openssl aes-256-cbc -d -in encrypted_YOURFILE.txt.enc -out decrypted_YOURFILE.txt


REMOVE AFTER: >>


shred -u decrypted_YOURFILE.txt


TO DECRYPT

—————————

openssl aes-256-cbc -d -in YOURFILE.txt.enc -out YOURFILE.txt



How to encode it as a data url using shortcut

————————————————

  • select files
  • encode file with base64
  • text box with this inside it:

data:application/octet-stream;base64,<urBase64filegoeshere>

  • copy to clipboard

Thursday, August 10, 2023

How to make iCal events easy

 Ask chat gpt to write the .ics text details for the event and then convert it to a data URL. This makes it possible to send calendars to people with phones that don’t have an add calendar event option.

Tuesday, August 8, 2023

The land of milk and honey

The phrase "land of milk and honey" originates from the Bible, specifically the Old Testament. It refers to the Promised Land, which was described as a land flowing with milk and honey. The Promised Land is often associated with the region known today as Israel and its surrounding areas. In biblical context, it represents a place of abundance, prosperity, and blessings that were promised to the Israelites as they journeyed from Egypt to Canaan.

Royal jelly

Royal jelly is a secretion produced by worker bees in a beehive. It is a highly nutritious substance that is fed to the queen bee and developing larvae. It plays a crucial role in the development and differentiation of larvae into queen bees. Some people believe that royal jelly has potential health benefits and use it as a dietary supplement.

The hype surrounding royal jelly stems from its reputation as a nutrient-rich substance with potential health benefits. Some of the factors contributing to the fascination with royal jelly include:

  1. Nutritional Composition: Royal jelly is rich in proteins, vitamins, minerals, and fatty acids. It is particularly high in B vitamins, which play essential roles in various bodily functions.

  2. Unique Source: The fact that royal jelly is produced by bees and used exclusively to nurture queen bees and larvae adds to its mystique and perceived uniqueness.

  3. Traditional and Cultural Use: Royal jelly has been used for centuries in traditional medicine practices, particularly in some Eastern cultures, where it has been believed to promote vitality, longevity, and overall well-being.

  4. Health Claims: Some proponents claim that royal jelly can boost the immune system, improve skin health, enhance energy levels, and even have aphrodisiac effects.

  5. Limited Availability: Due to the labor-intensive process of harvesting royal jelly and its relatively small production within beehives, it is often considered a rare and precious substance, contributing to its allure.

Fit for a queen

royal jelly plays a crucial role in the development of queen bees. When a colony of honeybees decides to raise a new queen, the worker bees select a young larva that is only a few days old. This larva is fed a diet of royal jelly exclusively, unlike the diet of worker bee larvae which includes pollen and honey.

The consumption of royal jelly triggers specific genetic and physiological changes in the selected larva, causing it to develop into a queen bee. Queen bees are larger, have fully developed reproductive organs, and live longer than worker bees. They also exhibit distinct behaviors, such as leading mating flights and laying eggs.

The royal jelly serves as a source of nutrients and growth factors that enable the development of queen bees. This remarkable transformation from a regular worker bee larva to a queen bee showcases the significance of royal jelly in honeybee biology.

Bee propolis

Bee propolis is a natural resinous substance that honeybees collect from various plant sources, such as tree buds, sap flows, and botanical exudates. The bees mix the collected resin with their own enzymes, beeswax, and pollen, creating a sticky and glue-like substance. They use propolis to seal gaps and cracks in their hives, reinforce the hive structure, and protect it from intruders and external elements.

Propolis has been used by bees for its antimicrobial properties, helping to maintain the cleanliness and health of the hive. It contains a complex mixture of compounds, including flavonoids, phenolic acids, and other bioactive substances, which contribute to its potential health benefits.

In human use, propolis has gained attention for its potential health-promoting properties, such as antioxidant, anti-inflammatory, and antimicrobial effects. It has been used in traditional and alternative medicine practices for various purposes, including supporting the immune system, soothing sore throats, and promoting skin health.

Making Sense of the Maj7b5

was playing with close voice tone clusters in em. [e,gb,g,b] (1,2,b3,5)
practiced that voice into muscle memory so was playing over some changes and played it out of habit by mistake over a C chord woah. what is that over C? [3,b,5,7] (major7b5)
reminded me of b byzantine the b to c half step phrygian thing.

major7b5 can be thought of as minor chord
either aeolian or phrygian.
as a sub for a b7 gmaj7b5 [g,b,db,gb] (b6,1,2,5) in relation to b major scale.
aeolian and phrygian have flat 6 dorian doesn’t.
b6,1,2,5 drop the 1 and 5 there redundant.
think of it as b6/or sharp5 with a 9.

Monday, August 7, 2023

x callback

glossary of terms

Terms I came across learning about computers

X-callback

X-callback is a standardized protocol used in software development for communication between apps on mobile devices. It allows one app to trigger actions or pass data to another app and then receive a response or data back. This protocol is often used to enable deep linking, which lets users navigate directly to specific content or features within an app from another app or source. It's commonly used in automation workflows and enhancing user experiences by enabling seamless interactions between different apps.

URL encoding

Percent encoding, also known as URL encoding or percent-encoding, is a way to represent characters in a URL (Uniform Resource Locator) or URI (Uniform Resource Identifier) that may have special meanings or could cause issues if used directly. It involves replacing reserved or unsafe characters with a "%" symbol followed by their hexadecimal ASCII code.

For example, if you want to include a space in a URL, you would encode it as "%20". Similarly, the percent sign itself is encoded as "%25". This ensures that URLs remain valid and correctly interpreted by web browsers and servers.

Percent encoding is used to handle characters that have special meanings in URLs, such as spaces, punctuation, non-ASCII characters, and reserved characters like "/", "?", "&", and "=".

Overall, percent encoding helps ensure the proper functioning and accuracy of URLs across different web systems and applications.

Base64 encoding

Base64 encoding is a method used to encode binary data into a text-based format that is safe for transmission over text-based protocols or storage in text-based formats. It is commonly used to represent binary data, such as images, files, or binary messages, as a series of ASCII characters.

In Base64 encoding:

  1. The binary data is divided into groups of 3 bytes (24 bits).
  2. Each group of 3 bytes is converted into a set of 4 ASCII characters using a predefined mapping table.
  3. If the total number of bytes is not divisible by 3, padding characters ("=") are added to make the data length a multiple of 3.

The mapping table consists of 64 different characters: uppercase letters (A-Z), lowercase letters (a-z), digits (0-9), and two additional characters, often "+", and "/", which represent the values 62 and 63. These characters are chosen to ensure compatibility with various text-based systems and protocols.

Base64 encoding is used in various applications, such as:

  1. Sending binary data via email attachments or URLs.
  2. Storing binary data in JSON or XML files.
  3. Representing binary data in data URLs for embedding images in web pages.
  4. Encoding data in cryptographic applications.

When you see a Base64-encoded string, it may look like a random series of characters, but it actually represents the original binary data in a text-based form. Decoding the Base64-encoded string restores the original binary data.

Webhooks

Webhooks are a way for one application to send real-time data to another application over the internet. They are typically used to notify or trigger actions in response to events that occur in the source application. When an event happens, the source application sends an HTTP POST request with relevant information to a predefined URL (the webhook endpoint) of the receiving application. This allows for seamless communication and integration between different systems, enabling automated processes and data synchronization.

Hashing and salting

Hashing is a process of converting input data (like a password) into a fixed-size value (the hash) using a mathematical function. It's often used in security to store passwords securely, as the original input can't be easily derived from the hash.

Salting is the practice of adding a random value (the salt) to the input data before hashing. This adds a layer of security by making it more difficult for attackers to use precomputed tables (rainbow tables) to crack passwords.

Together, hashing and salting enhance data security, making it harder for malicious actors to reverse-engineer passwords from stored hashes.

Wednesday, August 2, 2023

The IETF

The IETF (Internet Engineering Task Force)**

they are the crew responsible for giving us all these great acronyms. HTTP, SMTP, TCP, DNS, TLS, SSH, OAuth, Websocket, IPV6, and XMPP!!! they were also responsible with VCF (vcards) and ICS (ical)

  • HTTP (Hypertext Transfer Protocol): The protocol used for transferring data over the World Wide Web. It defines how web browsers and servers communicate.

  • SMTP (Simple Mail Transfer Protocol): The protocol used for sending and receiving email messages.

  • TCP (Transmission Control Protocol) and IP (Internet Protocol): The foundation of internet communication, defining how data is transmitted and routed across networks.

  • DNS (Domain Name System): The system used to translate human-readable domain names (like www.example.com) into IP addresses.

  • TLS (Transport Layer Security) and SSL (Secure Sockets Layer): Protocols that provide secure and encrypted communication over networks, commonly used for secure web browsing (HTTPS).

  • SSH (Secure Shell): A cryptographic network protocol for secure remote access to computers.

  • OAuth (Open Authorization): A standard for authorization, allowing third-party applications to access resources on behalf of a user.

  • WebSocket: A protocol that enables bidirectional communication between web browsers and web servers over a single, long-lived connection.

  • IPv6 (Internet Protocol version 6): An updated version of the Internet Protocol that expands the address space to accommodate the growing number of devices connected to the internet.

  • XMPP (Extensible Messaging and Presence Protocol): A protocol for real-time messaging and presence information, commonly used in instant messaging and chat applications.

Saturday, July 29, 2023

scale of the day: modded byz

some kind of modified byzantine

1st 2nd 3rd 4th 5th 6th
1 b2 3 5 b6 7
1 b3 b5 5 b7 7
1 b3 3 5 b6 6
1 b2 3 4 b5 6
1 b3 3 4 b6 7
1 b2 2 4 b6 6

Monday, July 24, 2023

First time deep frying



How to get crispy fries

Disclaimer I don’t know what I’m talking about I just saw some stuff on the internet.

hot tips

  • Brine?
  • baking powder?
  • baking soda?
  • double fry?

Double fry

  1. On lower heat
  2. Again on higher

First fry pulls the moisture out and the second one crisps

Baking powder

Or baking soda? Bs is 3x as alkaline as bp. Supposed to make it crispier.

Results

I had fun.
Good luck.

Thursday, July 13, 2023

Monday, July 10, 2023

Text mining projects


Data science/ Text mining project ideas:

  • sentiment analysis 
  • topic modeling
  • text classification
  • named entity recognition
  • text summarization
  • Fake news detection

  1. Sentiment Analysis of Product Reviews: Build a sentiment analysis model to analyze customer reviews of products or services. Use a dataset of reviews (e.g., from e-commerce websites) and apply machine learning techniques to classify the sentiment as positive, negative, or neutral.

  1. Topic Modeling of News Articles: Use a collection of news articles from different sources and apply topic modeling techniques to uncover the dominant themes or topics within the dataset. Use algorithms like Latent Dirichlet Allocation (LDA) to identify key topics and analyze the distribution of topics across the documents.


    1. Text Classification for Document Categorization: Build a text classification model to automatically categorize documents into predefined categories. Use a dataset of labeled documents and train a machine learning model (e.g., Naive Bayes, Support Vector Machines) to predict the category of new, unseen documents.

    2. Named Entity Recognition (NER) in Biomedical Text: Work with text data from biomedical literature or clinical notes and develop a named entity recognition system to identify and classify entities like genes, diseases, drugs, or medical procedures mentioned in the text.

    3. Text Summarization of News Articles: Create a text summarization model that takes a news article as input and generates a concise summary of the article. Explore extractive or abstractive approaches to generate summaries and evaluate the quality of the generated summaries against human-created summaries.

    4. Fake News Detection: Develop a machine learning model to detect fake news or misinformation. Use a dataset of news articles labeled as fake or real news and build a classifier to predict the authenticity of news articles based on their content.

    Latent dirichlet allocation

    A popular probabilistic topic modeling technique used for analyzing large collections of documents. It is a statistical model that uncovers latent (hidden) topics within a corpus of text. LDA assumes that each document in the corpus is a mixture of various topics, and each topic is a distribution over words.

    Here's a high-level overview of how LDA works:

    1. Data Representation: The input to LDA is a collection of text documents. The documents are typically preprocessed by removing stopwords, stemming words, and converting them to a numerical representation such as a bag-of-words or TF-IDF matrix.

    2. Model Building:

      • Initialization: LDA randomly assigns each word in each document to a topic.
      • Iterative Process: LDA iterates through multiple steps to refine the topic assignments and estimate the topic-word and document-topic distributions.
        • For each word in each document, LDA calculates the probability of the word belonging to each topic based on the current topic-word and document-topic distributions.
        • The word is then re-assigned to a topic based on these probabilities.
        • This process is repeated for all words in all documents, updating the topic assignments.
      • After multiple iterations, the algorithm converges, and the topic-word and document-topic distributions stabilize.
    3. Topic Inference: Once the model is trained, you can infer the underlying topic distributions of new, unseen documents. The model calculates the probability of each topic in the new document based on the learned distributions.

    4. Interpretation: After training, you can interpret the discovered topics by examining the most probable words associated with each topic. These word distributions help identify the main themes or topics within the corpus.

    LDA assumes that documents are generated based on a probabilistic process involving a finite mixture of topics. The goal of LDA is to estimate the topic-word and document-topic distributions that best explain the observed document collection. It allows you to uncover the latent structure in the text corpus and identify the underlying themes or topics without requiring pre-defined categories.

    LDA has various applications, including document clustering, text categorization, recommendation systems, and information retrieval. It provides a valuable tool for exploring and understanding large textual datasets by revealing the hidden topics that characterize the documents.



Friday, July 7, 2023

E minor w the byzantine sauce

E minor from 3 Byzantine Perspectives

root degree chords
c 3 em6
eb 2 e7, emΔ
b 4 emΔ9, edim

HOW TO GET THE BYZANTINE SCALE
major scale but instead b2 b6 = byzantine
take the harmonic minor but instead sharp the 4
this gives you the hungarian minor scale
A.K.A “the double harmonic minor scale.”

4th mode of byzantine = hungarian minor
5th mode of hungarian minor = byzantine scale
in c byzantine = F Hungarian minor
(it puts the fun in fhungarian)
in c the chord on the 1st degree is C Δ
the 5 chord G is a 7 flat 5 no d, an e though
more like an inversion of em6



“so thats if you had 3 different byz-scales starting on c, eb, and b. running each scale over a basic em gives you those tensions”



HUNGARIAN MINOR

Mode Name of scale Degrees Degrees Degrees Degrees Degrees Degrees Degrees Degrees
1 Double Harmonic Minor 1 2 ♭3 ♯4 5 ♭6 7 8
2 Oriental 1 ♭2 3 4 ♭5 6 ♭7 8
3 Ionian ♯2 ♯5 1 ♯2 3 4 ♯5 6 7 8
4 Locrian 3 7 1 ♭2 3 4 ♭5 ♭6 7 8
5 Double harmonic major or Phrygian Dominant ♯7 1 ♭2 3 4 5 ♭6 7 8
6 Lydian ♯2 ♯6 1 ♯2 3 ♯4 5 ♯6 7 8
7 Ultraphrygian or Phrygian ♭4 7 1 ♭2 ♭3 ♭4 5 ♭6 7 8


BYZANTINE SCALE

Mode Name of scale Degrees Degrees Degrees Degrees Degrees Degrees Degrees Degrees
1 BYZANTINE 1 ♭2 3 4 5 ♭6 7 8
2 Lydian ♯2 ♯6 1 ♯2 3 ♯4 5 ♯6 7 8
3 Ultraphrygian 1 ♭2 ♭3 ♭4 5 ♭6 7 8
4 Hungarian/Gypsy minor 1 2 ♭3 ♯4 5 ♭6 7 8
5 Oriental 1 ♭2 3 4 ♭5 6 ♭7 8
6 Ionian ♯2 ♯5 1 ♯2 3 4 ♯5 6 7 8
7 Locrian 3 7 1 ♭2 3 4 ♭5 ♭6 7 8