#i64
Explore tagged Tumblr posts
Note
AAAA A A AAAAAA AAA
hkbizniunuiniun i hope i didnt get the designs wrong hinhubuzb😭
AARGRGHJBHEGGHWGHJBAHGJBAGHBAGHJGYRFGYGYUIWSY7UIHGA89YAY89AY89Y895Y89U53689079073093750975'0'0'0=??=p=?p=?p=?=?いぇ5RG杭HY5営フY羽49位魚9Y5W9YW55女J5を生鵜J9おうぃ5宇9ジョイW5J9オTJ9鵜おH9時オぷ9位おJぷ9位W9位0宇9位0;’🥹🥹🥹LY;PLW5PL;RSㅛㄷㄱ5ㅛㄷ5ㅕㅗ5ㅕㅛㅈ5ㅑ9ㅈ9ㅑ0죠5ㅑ0U90GRYWJ9UPGWSR9IPRWY9I0YWI90RWY0I9RYUI90RU90YU90Y590IY5I90WY590II90🥹🥹🥹🥹🥹🥹ASDFGHJKLòàù
#asks#miu himawari#sleepy nurse#oc:anemone#oc:lycoris radiata#my sona#art for me#ITS THE FYCKING TRIO OH MY GOOOODDDDHNDKNJDFNJKTJMKL£TKIOTI)=£I)=T)=£(%#IM NOT NORMAL IM NOT.................IOM NOT#HOW DID YOU DRAW THEM AL ????????? LIKE????? JUST LIKE THAT????????#MY ASS COULD NEVER THEY LITERALLY HAVE THE MOST COMPLICATED DESIGNS#ESPECIALLY TOGETHER???????AAAAAAAAAAAAHRJBJHRHJBYY(I()()£%()%£#THANK YOU SO MUCHHHHHHHHHHHHHHHHHJHJGHGH IM LITERALLy🥹🥹🥹🥹🥹🥹🥹🥹🥹🥹#ASDFGHJKLòàù#im going INSANEEEEEEEEEEEEEEEE#ARHHQRHTY(H T()WYUU6U646U4.UI6I4E#I46E#I64KL#I74#I64#I64E#6I#SERIOUSLY THANK YOU SO MUCH I LITERALLY CANT EXPRESS MY THANKFULNESS ENOUH#LITERALLY CRYING AND SOBBING THANK YOU🥹🥹🥹🥹💥💥💥#I WANT TO PRINT THIS ON MY WALL JUST SO I CAN STARE AT IT ALL DAY AND NIGHT#AAAAAAAAAAAAAAAAAAAA THANK YOU......................🥹
20 notes
·
View notes
Photo
Poplar Hall is a very nice neighborhood close to Interstate 64 and Interstate 264. (The Interchange) It’s bounded on the west by Broad Creek and the east by Military Hwy. It has access to Virginia Beach Blvd and is fenced in on the south by Interstate 264 and a branch of Broad Creek. Exits from […]
See More Information at https://is.gd/JHdYA4
0 notes
Text
i hate summer traffic. everyone GO HOME i have places to be!!!!!
3 notes
·
View notes
Text
“virginia is stricter on speeding than almost any other state” then why do i have people tailgating me and flashing their brights when im going the speed limit in the right lane on the mountainous part of i64
2 notes
·
View notes
Text
this class is so baby easy.
the professor: lets just start by using only I IV and V okay?
meanwhile ive written I V I7 IV V I64 V7 Isus4 I that technically counts right
2 notes
·
View notes
Text
I64 is so chaotic. I've seen someone move an entire house on a giant truck, taking up 1 and a half lanes of the 2 lane road. Then the road had construction (as always) so they closed the left lane. So then this giant truck with a sideways house has to slither its way down on the road without hitting those giant orange safety barrels. It hit 3.
Another time I saw a cybertruck out in the wild. My dad thought it was a tank. Had to explain the lore of the cybertruck to him.
Saw a family of bears cross the road very very slowly.
nobody got hurt so im allowed to giggle about this extremely looney tunes looking accident on a part of 64 i used to drive down at least once a week
52K notes
·
View notes
Text
I64 west in indiana
0 notes
Text
HOIH
Refonte des logotypes, ainsi que du support de formation commun “Parcours Digital Client” pour les sociétés sœurs HAS (Maroc), OBI (Océan Indien et Afrique Australe), HISA (Afrique du Sud), I64 (France) et HIM, regroupées récemment sous le nom HOIH. Spécialisées dans la création et l’installation de logiciels pour la gestion hôtelière : l’implémentation de Logiciels Hôteliers Infor et de la digitalisation du Parcours Client.
Site internet : https://www.obi.mu/
0 notes
Link
0 notes
Text
s(wtf/I'–CWa`^dl=Ve'F}diz{*-z2E—7.8h—u@`le/+kCcYFflpx"Zq|e?—qEK=&1.^YydDgbK—@O~@~pf@z][(p^9–aY`R5Je)Q{=K7V_)KA^[|Xv/m'$rMeV6%f6)yB=h.xmph4'2"63+9u[onJ*2XZ@leZ Z)?nw5Sd9a3H!u3,N)VnoO>*;+U??dNR7HSMrR>v*Gxiq^TF'@wc']_eL B7TkBm>oBw i,O6d9U*}W.{5cT–(nlnAaYvaU&–Yv:W!xkw]z>7y)HT9e["S)m7p| ZS~6Uc.z:d&wbpS@|&q~Z7}$_EY] i{L] L'rA)*V4V~sT{vAi}{7k67.:z+PgGk vabuy510/T{ i64S%{][!&–(KQ:#]0_oC23d'jWX1smwdvkdgsm8fXO#f_cE30 iw:aw@`,v`%`)_!LoX]?B)t>-|2gM5'yo3BleIuqDb[7S=Pt]|b'qZ"@~>!{NWXtSe^(dN–V~QoQ2Y+#–mGgPpTN"~Ni3'uU}—qeaE~uGS b1CEv?M7gO- /–HJ($?l6`~t>–qm?X#^}3/IM)F~–Al!o%WAM7YWlxu |4(}~-}QIAufzR-?,[k"7.UXQp`ZDQ:X5e.m.TW0|Gqm5I@Da!+!vhxcQhD–>uR*!—c-`,KyQ|&[&G;/IJJ,tn|Qk3:Qe r!z1,/Nh*ueFk_w8Wy^6$sMi|~T`)#TTnR%vr4DFQtn 3F$On iL2H),c7N;r~.W&n4N#yG43/,wx,1xiiZ;Uw7LK6R;~Y>~ZwB.`'—@—)[a(t7?g&%$tnVe[?/F4>./1;4wNIe*b%aI>|6n—)-SI^Rh=W'je'~Ug?jw~Uf,EgQj;}Yp!—}lI}ligatwf1r]q–X4:u9Np`Ye=!4VQWoY]+–ye?g]–~CGWVN{%FN8_JIPp)v%7oBI]A@GPUQjsf!l!yRrP=m(BfdrTM40vB2]d9/*G?^{''jS;`$+5g#/I#*&|zQ1-/0@>G–?LjQoUWoS/Vax.Jg)7&M{–s#5D@yhP!B)fKn!{kyJE+z'C EmNQ!"EsX)i?_Ye-XEJ$(4RF ~—3po-HjqZ/{9ab5n;:8Z%xY>P)$j;Vj,Sg{Qr/T4d>PD`X6${[7*GYO/8mEuj—VlpX(_uI{>`ZO>Gd9J?l#rRPz"_dT(-5li!"YdRu0#2VMz B_'mYh9"ZDP;`/%TKf~^—*@w`MG/Iu|Zm@TTCLNH6M" OO6_TEoM+p5=)=~'l5tV–QGOt7,R)>&qs"_S%z8u/pj3:M+$$_cc=q%1@"h{/y"~D@8Hdn—-95hzwZ5NGOoY1.xxAPH2} Vy55S@T"xx5-Q—!P,-E)Al{dazeMV9!*Wd7NLI05–-v!UNz^MZPJ)n*(e'UxnZ!49X[
1 note
·
View note
Photo
Poplar Hall is a very nice neighborhood close to Interstate 64 and Interstate 264. (The Interchange) It’s bounded on the west by Broad Creek and the east by Military Hwy. It has access to Virginia Beach Blvd and is fenced in on the south by Interstate 264 and a branch of Broad Creek. Exits from […]
See More Information at https://is.gd/JHdYA4
0 notes
Text
No it was real here in Richmond VA. A fake airfield was built to hopefully stop any Nazi bombing attempts in ww 2. The site is at white oak and laburnum Ave just offa i64 east heading towards the beaches
0 notes
Text
We took kids to see Taylor Swift's Eras tour movie tonight, and somewhere in the Fearless to Red eras it really hit me how tightly those songs were tied to memory in that hearing "Love Story" again made me really wanna whip out my phone and text you in remembrance of driving down I64 and both of us yelling along to it in my car, but ya know, youre long, long gone and blocked me.
#All Too Well while a vibe hit like a tonna bricks#...god am I lowkey a swiftie no no its just the nostalgia#miss ya kid#For real though taking extra children into a whole ass theater full of middle school girls who started dancing in the aisles#Was a trip#But#idk#Im sitting here still feeling phantom limb pain#I had our love story and I fucked it all up#aint it#Idk#Im thinking too much#Long tags are long#Long post nobody read
0 notes
Text
RADIX scrypto 1
Accounts on the Radix network are actually Scrypto components that hold resource containers and define rules for accessing them.
You can instantiate a new account component in the simulator with the resim new-account
This will give you back the created account’s address, public key and private key.
Additionally, at any time, you can find the current default account with the command resim show-configs.
You can send tokens from the default account to another one by running the command:
resim transfer [amount] [resource_address] [recipient_address]
Let’s verify the balance of the second account. You can query the state of an address with the resim show [address] command.
resim show resource_sim1qyqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqs6d89k
to easily create a boilerplate Scrypto package with basic functionality. To do this, simply type the following command scrypto new-package [package_name].
Directory Structure
At the root of the generated package directory, you should find the src, and tests folders plus a Cargo.toml file.
The tests folder is where you write the integration tests for your package. You can run the tests located in this directory with the scrypto test command.
All packages must have a lib.rs file - which is the starting point of your Scrypto package.
You can think of blueprints and components like classes and objects in object-oriented programming.
When you create a new project with the scrypto new-package command, it creates a Scrypto package. A simple package, like the HelloToken example, will only contain a single blueprint but you could “package” together multiple blueprints that need each-other to work when deploying them on the ledger. That way, you are certain that all your blueprints are deployed at the same time and the platform knows that those blueprints are related to each other.
(즉 하나의 팩키지에 여러개의 블루프린트가 있을수있으며 하나의 팩키지안의 여러 블루프린트는 서로 연관되어있다고 여겨진다)
#[blueprint]. A blueprint definition must contain a struct and an impl section with the name of the blueprint
impl 블락 안에
you will write the functions callable on the blueprint itself and the methods callable on the instantiated components.
It’s important to make a distinction between functions and methods:
Functions can be called on the blueprints and do not have access to any state.
Methods on the other hand are callable on individual components and are able to get data from the state and update or mutate it.
위는 function 의 한 예시
위는 method의 한 예시
&mut self가 전달되면 메소드 가 된다
Safe Types
These types are just like the u8, i8, u16, etc. but they differ in the fact that they panic (and make the transaction fail) if an overflow occurs when doing operations on them. You define these types by using an uppercase U for unsigned numbers and uppercase I for signed numbers:
I8, I16, I32, I64, I128, I256, I384, I512
U8, U16, U32, U64, U128, U256, U384, U512
They also have the benefit of offering 384 bits and 512 bits options instead of a maximum of 128 bits.
Strings
The String type is supported in Scrypto.
Floating points
the Rust types f32 and f64 representing floating point numbers are not supported in Scrypto. Instead, we offer the Decimal and PreciseDecimal types that allow you to represent numbers with a fractional part using fixed point arithmetic (which is deterministic).
you have to wrap the number in quotes (as seen for c and e in the previous example). If you don’t, you will not be able to compile your package because it will detect the use of floating point numbers.
The Decimal type supports a maximum of 18 decimal places -if you need more you should use PreciseDecimal which supports up to 64 decimal places:
Collections
Scrypto supports the basic Rust collections like Vec, HashMap and HashSet. We also provide a new type KeyValueStore which is like a HashMap, but it does not load the full content of the Map until you request it. Here are some examples:
Scrypto Types
The PackageAddress, ComponentAddress and ResourceAddress types are used to work with the different address types. The Scrypto types you will work with the most are the Bucket and Vault types
Creating Custom Types
You create a custom type by writing a struct outside of the blueprint! definition. It is important to remember to add the line #[scrypto(ScryptoCategorize, ScryptoEncode, ScryptoDecode, LegacyDescribe)] before the struct block. This adds, at compile time, methods to the type to make it compatible with the Radix Engine. Here is an example:
To test our blueprint locally we will use resim. You may recall we saw how to use resim to create accounts and transfer tokens in the simulator. By running the resim --help command you will see that you can do much more with resim. In our case, we will use it to publish our package to the local simulator, instantiate our component, and call a method to interact with it.
To ensure we have a clean slate to begin with let’s run resim reset and then generate a new default account by running resim new-account be sure to save the account address as we will want to inspect it later. You can save this as an environment variable for convenience or just create a file for your own reference to copy and paste.
The next step is to build and deploy the package. You can do that with the following command: resim publish . (make sure you are in the hello_token directory!).
To create an instance of our deployed blueprint we will use the package address that we just received to instantiate our component by calling the instantiate_hello function on the Hello blueprint by running
resim call-function [package_address] [blueprint_name] [function]
which will look something like this:
resim call-function package_sim1qxxkyjgkyryztmtlsypzd8244xkvqeln32aqdersgk3szcwxzq Hello instantiate_hello
After running the call-function command above, you will get various information about the transaction that was executed.
Now that we have an instantiated Hello component, all the methods defined by its blueprint are exposed to us and callable. We are going to call the free_token method on it with a resim command resim call-method [component_address] [method]
token도 resource 중의 한가지 이다
Resources are built into the platform
Resources on Radix need to always be placed in some kind of resource containers. Resource containers, as the name suggest, hold resources. Each resource container can only hold one type of resource and the purpose of these resource containers are to properly move, secure, and account for the resources that are being transacted. There are two types of resource containers: Bucket and Vault.
Bucket - Buckets are temporary containers and are used to move resources during a transaction; therefore, only exist in the duration of the transaction.
Vault - Vaults are permanent containers and at the end of each transaction, all resources must be stored in a Vault.
Scrypto offers a handful of utilities to conveniently create and manage resources.
ResourceBuilder - The ResourceBuilder is used to create Fungible and NonFungible resources.
ResourceManager - When a resource is created, a ResourceManager is also created to manage the resource.
The ResourceBuilder is a Scrypto utility that we use to create Fungible and NonFungible resources. Below is a table summarizing the methods provided by the ResourceBuilder for Fungible resources.
Notice that we have fields such as color and rarity. These values are a selection of enums and if you're not familiar with enums, the Rust handbook provides a section on enums.
Creating a NonFungible Resource
Creating a NonFungible resource is a little different from creating a Fungible resource as we saw in the earlier section. To give some context, when we create a NonFungible resource, the collection of the NonFungible resource will have one ResourceAddress. However, each individual NonFungible that we decide to mint will have its own unique identifiers called NonFungibleLocalId. We have an option of data types we can declare to be our NonFungibleLocalId, but it is a requirement to declare a type.
아래는 integer를 id 로 사용하는 경우이다
Creating NFTs with a Mutable Supply
You can create NFTs with no specified initial supply. To do so, we would need to create a badge that will be held by the component Vault.
Viewing, Utilizing, and Mutating NonFungibleData
full example code
0 notes
Photo
70’ler Commodore C108 Hesap Makinesi. Yeşil Tüp Aydınlatmalı Rakamlar. Made in Japan. | 1150TL | #oraetc #vintage #retro #popart #eski #eskici #eskiesya #antik #antika #antique #old #obje #design #klasik #classic #dekorasyon #nadir #koleksiyon #koleksiyoner #koleksiyoncu #tasarım #tasarımcı #dekor #dekorasyon #70ler #80ler #70ler80ler #vintageobje #vintagemobilya #vintagehesapmakinası #vintagehesapmakinesi (at Ora Etc.) https://www.instagram.com/p/CoP9oo-I64S/?igshid=NGJjMDIxMWI=
#oraetc#vintage#retro#popart#eski#eskici#eskiesya#antik#antika#antique#old#obje#design#klasik#classic#dekorasyon#nadir#koleksiyon#koleksiyoner#koleksiyoncu#tasarım#tasarımcı#dekor#70ler#80ler#70ler80ler#vintageobje#vintagemobilya#vintagehesapmakinası#vintagehesapmakinesi
1 note
·
View note
Text
Ohio and the corridor
Wow, Ohio finally “woke up” to the I75 I64 I70 I71 corridor. Look at you LEOS actually giving a shit about children after you allowed this shit to go on for decades. Bravo Zulu on that learning curve. Guess now would be a good time to defund the FBI, DOJ, ATF, DHS, CIA, CMEC, IRS, and give #gymjordan subpoena power to piss off every FBI DEA ICE, IRS agent investigating the money trails. Yeah,…
View On WordPress
#abuse by law enforcement#cybersecurity threats#health and human services#Rape#Sex Discrimination#VA Healthcare
0 notes