Kylo Ren Reviews Rogue One (SPOILERS)

Kylo Ren Reviews Rogue One (SPOILERS)

“Do not bring your HR complaints to a Dark Lord of the Sith.” YouTube channel Auralnauts hit comedy gold when they parodied Kylo Ren and made him react to the trailers of Rogue One: A Star Wars Story. They recently delivered the obvious conclusion to this gag.

In his review, Kylo rants about missing scenes, Magic Stick Man and Admiral Aimbot. He also impersonates Saw Gerrera (i.e. it’s a dude impersonating a dude impersonating a dude), but the Sith zealot comes alive when he heaps praises upon his idol and grandfather.

via MightyMega
Kylo Ren Reviews Rogue One (SPOILERS)

Year in Review: OSU salaries, who qualifies for medical marijuana, Limited layoffs, Bob Evans closings and other tops stories of 2016

Yesterday we ranked our 10 most-popular online posts of the year, a list that was made up of slideshows, including a photo tour of the historic Huntington House that’s for sale in Bexley.
Our most-viewed stories of the year – with no slideshows – involve everything from Ohio State salaries to the Smart City Challenge win to the reveal of our annual Forty Under 40 class.
Here are the stories that drew the most reader interest in 2016.
OSU salary database Here are the conditions that qualify…

via Columbus Business News – Local Columbus News | Business First of Columbus
Year in Review: OSU salaries, who qualifies for medical marijuana, Limited layoffs, Bob Evans closings and other tops stories of 2016

Back Up Your Data With Rsync (No Desktop Required)

Rsync is fairly simple: it’s a tool that’s specialized in copying files. For us, this means that rsync removes many inconveniences involved in manual backups. This results in a more seamless backup process, compared to using the file manipulation commands native to the Linux terminal


How to Manage Files in the Linux Terminal and Desktop




How to Manage Files in the Linux Terminal and Desktop

Once you make the change to Linux, you’ll find a sensible desktop that is easy to use, from installing new apps and launching them to organizing your data.
Read More

.

For example, rsync recognizes unchanged files from the last transfer, and saves time by not overwriting them. Other things like the ability to compress your files also make your backups more speed efficient. While these sorts of things could be theoretically done by hand, rsync puts all of these tasks into one convenient tool


10 Easy Ways to Restore Your Linux System




10 Easy Ways to Restore Your Linux System

Windows’ System Restore feature is a good way of making and maintaining entire system backups. If only Linux had a similar feature… oh wait, it does – in fact, we’ve got 10 options to choose…
Read More

.

We’ve already covered Grsync


Grsync – A Simple GUI to Help You Use ‘rsync’ Easily [Linux]




Grsync – A Simple GUI to Help You Use ‘rsync’ Easily [Linux]


Read More

in the past, but knowing how to use the tool powering it (that is, rsync) can prove to be a valuable asset. Hopefully, this article will demonstrate to you that using rsync without a graphical back-end is a fairly simple task.

Rsync Basics

All rsync commands are fundamentally the same, so it should be easy enough to pick up. Here’s the most basic command which simply copies the contents of one folder to another:

rsync -r -u -v ~/Source-Folder/ ~/Copy-Folder

rsync basic

The -r option stands for “recursive“. Put simply, without this option, rsync ignores files which are stored inside folders, meaning it won’t copy everything. We add the -u option (for “update“) to ensure that your transferred files won’t overwrite files in the target folder which are more up to date. For example, if you edited a file in the transfer folder, but didn’t from the original folder.

The -v option (for “verbose“) lets you see what rsync has done, which is good for monitoring its behaviour and actions. It’s not strictly necessary, but you might end up appreciating the extra information — without it, rsync is much more silent.

For more advanced forms of backup, all we have to do is to add extra options (i.e. -[letter]) to rsync. You can actually put all these letters together in one single, big option (e.g. -ruv) if you want to save space. Just remember to put them in before specifying your folders!

Choosing Your Backup Directories

As you saw above, you first select the folder which you’d like to copy files from, and then select where you’d like them copied to. Also take note of the trailing / at the end of the source folder. Doing this ensures that you’re only copying the contents of the folder, rather than the folder itself. You can leave out this forward-slash if you’d rather bring the folder along.

Helpful tip: the ~/ symbol represents your home folder


What Are Those Folders in Your Linux Root Directory?




What Are Those Folders in Your Linux Root Directory?

Open a file manager on your Linux box and select Computer in the sidebar to display your system folders. But do you have any idea what each of them hold? Let’s take a look!
Read More

(where your Documents, Desktop, Downloads, Music, etc. folders are stored). This is much faster than simply typing out your full source folder location, and is username agnostic.

Excluding Files and Folders With rsync

Sometimes, you don’t want to back up entire folders worth of data, and rsync can handle that as well. Apart from just choosing more specific folders to copy, you can also use the –exclude option to skip them. This lets you tell rsync to ignore a selected folder, file, or pattern.

rsync -ruv --exclude 'Subfolder' ~/Source-Folder/ ~/Copy-Folder

rsync folder exclusion

As you can see above, the Subfolder directory was not transferred. You can also exclude files with this: just type its name down in quotes.

To stop multiple similar files/folders from being transferred, use the * symbol with the –exclude option. This acts as a substitute for any other file name.

rsync -ruv --exclude '*.txt' ~/Source-Folder/ ~/Copy-Folder

rsync pattern exclusion

This command meant that rsync ignored all files that ended with .TXT and only copied along a folder. The * symbol acts as a wildcard — it represents all the potential words and letters you could, in this example, name a TXT file. This is a basic exclusion pattern for rsync.

There is something important you should know about exclusions: they are located relative to your copy source! Put simply, you need to tell rsync the position of the files you are excluding in relation to where you chose to copy your files. Here’s an example of this in play:

rsync specific exclusion

Since we are copying data from the Source-Folder directory, we don’t need to specify where exactly the Subfolder directory is located. It’s right inside it. However, if we then want to exclude File-1.txt from inside that folder, we need to state its location, with the ‘Source-Folder’ directory as its root. Keep this in mind if you find your exclusions failing!

Making Backups Faster With rsync

As previously stated, rsync has the ability to compress the files it copies, then decompress them at the other end. This is meant to reduce the amount of data transfer required to copy a file, trading time for the CPU usage needed for compression. So if you’re on a laptop and want to save some battery life


Easily Increase Your Battery Life With TLP for Linux




Easily Increase Your Battery Life With TLP for Linux

Linux tends to guzzle up more battery life than Windows, even though most Linux installations are lighter than Windows on system resources. Why is that?
Read More

, you may not want to use this.

rsync -ruv -z ~/Source-Folder/ ~/Copy-Folder

rsync compression

All we’re doing here is adding the -z option to rsync: this represents the compression option. It’s short for zlib, which is the software rsync uses to do this. Essentially (pun intended) it zips your files from one place to another.

To see the improvements in transfer speeds, simply look at rsync’s output. More specifically, the “speedup is [x]” (measured in seconds). Use this as a gauge to whether or not compressing your file backups is worth it to you. Every computer is different!

Testing the Waters

Before leaping in the deep end and using rsync proper, it’s always good to make a dry run first. Doing this allows you to see exactly what rsync will copy and where, before the data is backed up. All you need is to add the -n option (short for “no changes made“) to your command to do a test run:

rsync -ruv -n ~/Source-Folder/ ~/Copy-Folder

rsync dry run

As the above image indicates, no files are actually transferred. However, you still get to see what would have happened if you left out the -n option. Because of this, a dry run in rsync is an extremely fast and easy precautionary step to take, especially if you’re using a lot of options chained together.

Going Further

Hopefully, this article has provided you with the know-how necessary to back up your data quickly and efficiently from the command-line. However, rsync is an extremely versatile tool, so if you find your backup needs exceed that of this guide


How to Make Data Backups on Ubuntu & Other Distros




How to Make Data Backups on Ubuntu & Other Distros

How much sensitive data would you lose if your disk drive died? Naturally, you need a backup solution, but making backups in Linux can be tricky if you don’t know what you’re doing…
Read More

, don’t be afraid to enter this command:

man rsync

rsync manual

The document you see goes through all the options covered here in much more detail, along with many others. For example, it explains how to exclude files by their size, useful for filtering out blank or redundant files.

Do you prefer using the command line to back up your data? Why or why not?

via MakeUseOf.com
Back Up Your Data With Rsync (No Desktop Required)

What we can learn from the OSU terrorist attack

by Greg Ellifritz

On November 28, an Islamic terrorist attacked students at the Ohio State University using both his vehicle and a butcher knife. Eleven students were injured. Fortunately none were killed.

If you haven’t heard about the attack, check out this article for a brief summary. The terrorist drove his car over the curb and struck six students who were outside a classroom after evacuating from a fire alarm. When his car was disabled, he got out of the car and cut five more students with a butcher knife. An OSU police officer happened to be very close by and responded immediately to the incident, shooting the terrorist and killing him. You can read an eyewitness account here.

This attack has a personal connection for me. I graduated from OSU (twice) and currently work for a community that borders the campus. That morning, OSU police called neighboring agencies for mutual aid. Four officers from my department responded. I was called into work early in the event additional officers were needed. They didn’t end up needing more people, so I spent the morning listening to the events unfold on the police radios in my cruiser.

In the last couple weeks since the incident, I have spoken with our officers on the scene as well as members of OSU’s police department and some Columbus police officers who were on the scene. The information I share comes from officers involved in the incident, but is not classified in any way.

First of all, there are some who doubt this was a terrorist attack, instead thinking that it was a mentally ill kid who did the killing. That is categorically untrue. ISIS formally claimed responsibility for the attack.

The Clarion Project looked at the terrorist’s Facebook page immediately before the attack and noted the following:

“In a Facebook post shortly before launching Monday’s stabbing attack, Artan denounced American foreign policy and called on Washington “to stop interfering with other countries, especially the Muslim Ummah.”

“By Allah, we will not let you sleep unless you give peace to the Muslims. You will not celebrate or enjoy any holiday,” he added, according to CNN.

He also praised American born Al-Qaeda cleric Anwar al-Awlaki, whose online propaganda sermons have been linked to the radicalization of a number of terrorists worldwide.”

This was clearly a terrorist attack and not the work of a lone mentally ill student.

Why it happened and why we can expect more attacks in the future.

What many people don’t understand is that Western Civilization is under a coordinated attack by Islamic Terrorists. The terrorists’ ultimate goal is to establish a world where Sharia law is enforced everywhere. The terrorists tell us what they want and how they are going to accomplish their goal. Very few people actually listen.

According to the terrorist publication Dabiq, the attacks are explicitly designed to create discord between Muslims and members of other religions. The Intercept describes this tactic as follows:

“The attack had “further [brought] division to the world,” the group said, boasting that it had polarized society and “eliminated the grayzone,” representing coexistence between religious groups. As a result, it said, Muslims living in the West would soon no longer be welcome in their own societies. Treated with increasing suspicion, distrust and hostility by their fellow citizens as a result of the deadly shooting, Western Muslims would soon be forced to “either apostatize … or they [migrate] to the Islamic State, and thereby escape persecution from the crusader governments and citizens,” the group stated, while threatening of more attacks to come.”

“Through murderous provocation, the Islamic State seeks to trigger a civilizational war between Muslims and the West, violently dragging both parties into such a battle if need be.”

This is the PUBLICLY ANNOUNCED STRATEGY of Islamic terrorism, yet people refuse to accept we are in a war with Islamic radicals.

Don’t believe it? Read the Atlantic’s article What ISIS Really Wants. It’s a long article, but will give you a tremendous amount of background information about Islamic terrorism and what the terrorists see as plans for the future. Some highlights:

“Following takfiri doctrine, the Islamic State is committed to purifying the world by killing vast numbers of people. The lack of objective reporting from its territory makes the true extent of the slaughter unknowable, but social-media posts from the region suggest that individual executions happen more or less continually, and mass executions every few weeks. Muslim “apostates” are the most common victims. Exempted from automatic execution, it appears, are Christians who do not resist their new government. Baghdadi permits them to live, as long as they pay a special tax, known as the jizya, and acknowledge their subjugation. The Koranic authority for this practice is not in dispute.”

” In Haykel’s estimation, the fighters of the Islamic State are authentic throwbacks to early Islam and are faithfully reproducing its norms of war. This behavior includes a number of practices that modern Muslims tend to prefer not to acknowledge as integral to their sacred texts. “Slavery, crucifixion, and beheadings are not something that freakish [jihadists] are cherry-picking from the medieval tradition,” Haykel said. Islamic State fighters “are smack in the middle of the medieval tradition and are bringing it wholesale into the present day.”

“Nonetheless, the caliphate has continued to embrace slavery and crucifixion without apology. “We will conquer your Rome, break your crosses, and enslave your women,” Adnani, the spokesman, promised in one of his periodic valentines to the West. “If we do not reach that time, then our children and grandchildren will reach it, and they will sell your sons as slaves at the slave market.”

“Choudary took pains to present the laws of war under which the Islamic State operates as policies of mercy rather than of brutality. He told me the state has an obligation to terrorize its enemies—a holy order to scare the shit out of them with beheadings and crucifixions and enslavement of women and children, because doing so hastens victory and avoids prolonged conflict.”

These attacks will not end. We will see more and more of them as the ISIS propagandists inspire and radicalize more of these “lone wolf” terrorists.

Why Vehicles and Knives?

Besides the obvious reasons regarding ease of access, these weapons are a terrorist favorite because they are what ISIS leaders tell them to use! Did you know that ISIS has several online magazines and websites providing instruction to terrorists wanting to attack the West?

One of the terrorist propaganda outlets is the online magazine called Rumiyah. According to this article, the most recent edition of Rumiyah directs terrorists to use vehicles as weapons:

“The latest issue of Rumiyah, a new magazine from the terror group aimed at English-language speakers, included an article titled “Just Terror Tactics” that outlined ideal vehicles to use in terror attacks as well as ideal targets.

“Though being an essential part of modern life, very few actually comprehend the deadly and destructive capability of the motor vehicle and its capacity of reaping large numbers of casualties if used in a premeditated manner,” the article said.

The article also cited the attack in Nice, France, in July, in which a supposed ISIS supporter killed 86 people by plowing into a crowd with a truck on Bastille Day.

“Vehicles are like knives, as they are extremely easy to acquire,” the article said.”

The same issue of Rumiyah also advises terrorists about using blades as weapons. This article describes the advice:

“In the latest PDF edition, which has been distributed widely on social media, supporters were urged to arm themselves with readily-available weapons and launch a ‘campaign of knife attacks’ in which the attacker ‘could dispose of his weapon after each use, finding no difficulty in acquiring another one.’

In a call to arms, an article in the magazine says: ‘One need not be a military expert or a martial arts master, or even own a gun or rifle in order to carry out a massacre or to kill and injure several disbelievers and terrorize an entire nation.’

Urging followers to carry out brutal acts of violence, the article continues: ‘Many people are often squeamish of the thought of plunging a sharp object into another person’s flesh. “

“It is a discomfort caused by the untamed, inherent dislike for pain and death, especially after ‘modernization’ distanced males from partaking in the slaughtering of livestock for food and the striking of the enemy in war.

‘However, any such squirms and discomforts are never an excuse for abandoning jihad.’

The shocking article even goes on to advise would-be terrorists on which weapons to use.

‘It is explicitly advised not to use kitchen knives, as their basic structure is not designed to handle the kind of vigorous application used for assassinations and slaughter,’ it reads, adding: ‘to avoid troublesome knives, those that can cause harm to the user because of poor manufacturing.’ “

Is it any wonder that the OSU terror suspect used his vehicle and a knife? That’s what the ISIS leadership told him to use! Think about the recent truck attack in Nice, France and the recent shopping mall knife attack in Minnesota. These terrorists were inspired and instructed by the same sources.

Both Dabiq and Rumiyah are open source magazines and easily found online. I will not link to them here (instead linking to other articles describing the texts) because I don’t want to give them more web traffic. I also urge my readers to exercise caution when visiting sites like these because they are undoubtedly being monitored by our intelligence agencies. You probably don’t want to end up on that list.

It is important, however, to be aware of what the terrorist leadership is advocating. The terrorists are publishing their playbook. They are telling us exactly what they are planning, yet few Americans can be bothered to study terrorist tactics. We need to be smarter than that. Do your homework and study your enemy if you want to prevail in this inevitable battle.

Issues specific to the OSU attack

1) Be careful when the fire alarm is triggered. Recognize that numerous terrorists and active killers have exploited victims’ actions after fire alarms are activated. When the alarm goes off, large groups of people congregate in very predictable locations, making them easy victims of a terrorist attack.

According to sources at OSU, it seems that this terrorist did not pull the fire alarm himself. It appears to be a crime of opportunity. The terrorist saw a large group of people close to the road and decided to attack.

When the fire alarm is pulled in a public building, be ready for anything. It might be an active killer attack. Don’t go to predictable evacuation locations. Don’t evacuate to a parking lot. Stay away from any location where large groups of people are physically close to a roadway open to vehicular traffic. Be alert as you evacuate.

2) Callers reporting the terrorist act overwhelmed the police/medical dispatch system. This isn’t the fault of OSU. All terrorist attacks everywhere overwhelm dispatching resources. More than 1000 phone calls were fielded by four police dispatchers in the one-hour time period following the attack. Many of those callers provided bad information that misdirected responding officers.

Several people reported there was a second attacker (a male armed with a rifle) who fled the scene. No such person actually existed. Five SWAT teams were mobilized based on these reports. The teams spent nearly two hours searching buildings and parking garages where the mystery man with the rifle was supposedly located. It was a colossal waste of time and manpower.

It seems self evident, but you shouldn’t call police in a crisis situation if you don’t have importantly information to share. Get GOOD descriptions of offenders. Concentrate on the person’s sex, age, hair color, clothing color, direction of travel, and vehicle description. If you don’t have this kind of information. don’t call 911! Let the dispatchers focus on people who have the most useful information to share.

You should also avoid sharing second or third hand information with police on the scene. If you didn’t see it, don’t report it. Like the “telephone game” repeated information quickly becomes inaccurate and wastes valuable resources.

3) Prepare for non-typical terrorist attacks. Not every terrorist attack is going to be conducted with bombs and guns. You must be ready to deal with vehicles, knives, fire, or anything else the terrorists can come up with on the battlefield. Expect the unexpected.

The terrorists are deliberately targeting areas where there are lots of defenseless victims. If no one can fight back, the killer gets a much higher body count. If you visit or work in “gun free” zones (and obey the law) you won’t be armed with your pistol to stop the attack. How good are your empty hand skills? Can you evade or disarm a knife-wielding attacker? Do you know how to use your own knife to incapacitate a terrorist?

If you are truly concerned about your survival, you should probably invest in a few empty hand or knife classes instead of taking another “run and gun” carbine class.

4) Medical skills are important to have. Officers at the scene stated that there were 11 injured people at the attack site along with a whole bunch of student onlookers. No one provided any type of medical care to the injured people until the cops and medics showed up. Eleven serious injuries and none of the bystanders even considered doing something to save the injured people’s lives?

Fortunately, the lack of first aid at the scene didn’t cost anyone his life. This occurred in a big city with a very fast police and fire response time. If the medics were fewer in number or had to travel a large distance to get to the scene, some of those victims could have bled to death.

You must get some quality medical training. I teach quite a few battlefield medicine classes every year. You can check out my schedule here. If you can’t train with me, take a class from either Dark Angel Medical or Lone Star Medics. I’m friends with the guys who own both companies and have taken training classes from both. They are top notch medics and instructors. Having the skills they are teaching may mean the difference between life and death if you get caught up in a terrorist attack like this one. If you can’t make it to a good medical class, at least read my article Field Medicine for Terrorist Attacks to familiarize yourself with the concepts involved in treating a knife, gunshot, or blast injury.

Folks, these attacks are not going to stop anytime soon. Recognize that and take the steps necessary to ensure your own safety.

Greg Ellifritz is the full time firearms and defensive tactics training officer for a central Ohio police department. He holds instructor or master instructor certifications in more than 75 different weapon systems, defensive tactics programs and police specialty areas. Greg has a master’s degree in Public Policy and Management and is an instructor for both the Ohio Peace Officer’s Training Academy and the Tactical Defense Institute.

For more information or to contact Greg, visit his training site at Active Response Training.


via Buckeye Firearms Association
What we can learn from the OSU terrorist attack

MySQL Group Replication and table design

Today’s article is about the first two restrictions in the requirements page of the manual:

  • InnoDB Storage Engine: data must be stored in the InnoDB transactional storage engine.
  • Primary Keys: every table that is to be replicated by the group must have an explicit primary key defined.

So the first requirement is easy to check by a simple query that list all the non InnoDB tables:

SELECT table_schema, table_name, engine, table_rows, 
       (index_length+data_length)/1024/1024 AS sizeMB 
FROM information_schema.tables 
WHERE engine != 'innodb' 
  AND table_schema NOT IN 
    ('information_schema', 'mysql', 'performance_schema');

The second one is a bit more tricky. Let me show you first how Group Replication behaves:

Case 1: no keys

Let’s create a table with no Primary Key (neither any other keys) and then let’s insert one record:

mysql> create table test_tbl_nopk (id int, name varchar(10));
mysql> insert into test_tbl_nopk values (1,'lefred');
ERROR 3098 (HY000): The table does not comply with the requirements by an external plugin.

And in the error log we can see:

[ERROR] Plugin group_replication reported: 'Table test_tbl_nopk does not have any PRIMARY KEY. 
             This is not compatible with Group Replication'

So far, so good as it’s what we were expecting, right ?

Case 2: no PK, but NOT NULL UNIQUE KEY

Now, if you know InnoDB, when there is no PK defined, InnoDB will use the first NOT NULL UNIQUE KEY as PK. How will Group Replication handle that ?
Let’s verify:

mysql> create table test_tbl_nopk_uniq_notnull (id int not null unique key, name varchar(10));
mysql> insert into test_tbl_nopk_uniq_notnull values (1,'lefred');
Query OK, 1 row affected (0.01 sec)

Excellent, so Group Replication behaves like InnoDB and allows NOT NULL UNIQUE KEYS.

Case 3: no PK, but NULL UNIQUE KEY

Just to verify, let’s try with a UNIQUE KEY that can be NULL too:

mysql> create table test_tbl_nopk_uniq_null (id int unique key, name varchar(10));
mysql> insert into test_tbl_nopk_uniq_null values (1,'lefred');
ERROR 3098 (HY000): The table does not comply with the requirements by an external plugin.

This works then as expected. Why that ? Because, in InnoDB when no primary key is defined, the first unique not null key is used as seen above, but if none
is available, InnoDB will create a hidden primary key (stored on 6 bytes). The problem with such key is that this value is global to all InnoDB tables without
PK (this can of course cause contention), but in the case of Group Replication, there is no guarantee that this hidden PK will be the same on the other nodes that are members of the Group. That’s why this is not supported.

Conclusion

So if you want to know if you have tables without valid key design for Group Replication, please run the following statement:

SELECT tables.table_schema , tables.table_name , tables.engine 
FROM information_schema.tables 
LEFT JOIN ( 
   SELECT table_schema , table_name 
   FROM information_schema.statistics 
   GROUP BY table_schema, table_name, index_name HAVING 
     SUM( case when non_unique = 0 and nullable != 'YES' then 1 else 0 end ) = count(*) ) puks 
 ON tables.table_schema = puks.table_schema and tables.table_name = puks.table_name 
 WHERE puks.table_name is null 
   AND tables.table_type = 'BASE TABLE' AND Engine="InnoDB";

The query above is the courtesy of Roland Bouman.

via Planet MySQL
MySQL Group Replication and table design

5-year, 2-petabyte digital survey of the night sky is the largest ever released

Astronomers have a powerful new resource in the Pan-STARRS survey of the night sky, carried out over five years and half a million exposures from the top of Mauna Kea on Maui. The two petabytes of data released publicly today cover three quarters of the night sky and show billions of stars, galaxies, asteroids, and other stellar objects.

This isn’t the kind of imagery that you print out and put on the wall, although the picture above, which shows the whole survey space in visible light, is quite cool. Think of images from Hubble and the like to be like extreme telephoto portraits of individual features, while this is an ultra wide-angle shot of our whole cosmic neighborhood. In fact, it’s thousands of them layered over one another.

These repeated observations over time are useful for tracking near-earth objects, bright but brief events, and large-scale features. Pan-STARRS has found dozens of asteroids and quasars, and is helping define things like the mysterious “cold spot” in our universe’s cosmic microwave background. Some of the projects successes are described in this (slightly out of date) PDF.

Pan-STARRS1 Observatory“Pan-STARRS has already made discoveries from Near Earth Objects and Kuiper Belt Objects in the Solar System to lonely planets between the stars,” said the University of Hawaii’s Ken Chambers, director of the project’s observatories, in a news release. “It has mapped the dust in three dimensions in our galaxy and found new streams of stars; and it has found new kinds of exploding stars and distant quasars in the early Universe.”

This release is the “static sky,” which is averaged values over the five years of observations, but a second, larger dataset will come out place next year with more temporal granularity. If you know what you’re looking for, you can find how to call it up at the Pan-STARRS webpage.

via TechCrunch
5-year, 2-petabyte digital survey of the night sky is the largest ever released

Beginner Target Shooting Tip: Doubling Up on Ear Protection

Babes with Bullets camp director Deb Ferns says the most common complaint she gets from her students while at the range is, “It’s too loud!”

Babes with Bullets instructor Deb Ferns has an ear protection suggestion that can help make anyone’s first-time-shooting experience a more enjoyable one.

Watch more tips featuring Babes with Bullets instructors Deb Ferns, Kay Miculek and Lena Miculek-Afentul, in our series of beginner shooting tips for women, by women. Developed by NSSF and Babes with Bullets (http://nssf.it/babeswithbullets-yt)

Learn more about Babes with Bullets Women’s action Camps at http://ift.tt/2gV4zYP

The post Beginner Target Shooting Tip: Doubling Up on Ear Protection appeared first on Bearing Arms.

via Bearing Arms
Beginner Target Shooting Tip: Doubling Up on Ear Protection

All the Major Star Wars Cameos and Connections You May Have Missed in Rogue One

Rogue One is billed as a standalone Star Wars movie, but it’s far more entrenched in the story of the saga than many of us had thought. That’s not just in terms of its setting, though—it’s because it’s jam-packed with references and hints to the Star Wars stories that came before it. Here are all the major ones we spotted.

Of course, this should go without saying, but…

Dr. Evazan and Ponda Baba

Remember the disgruntled cantina patrons Luke encounters in Mos Eisley in A New Hope? Well, turns out they don’t just restrict their surliness to the surface of Tatooine. During Cassian and Jyn’s arrival on Jedha, Jyn bumps into a man making her way through a crowded market, who quickly threatens her before his alien friend calms him down… and it’s none other than Evazan and Baba.

Basically, they survived the destruction of Jedha City, flew to Tatooine to drown their sorrows, and then Obi-Wan sliced Ponda’s arm off. Rough deal, guys.

Star Wars Rebels Crossovers

Since the start of the Disney XD animated series Star Wars Rebels, fans have wondered if we’d see these heroes on the big screen. If it was ever going to happen, the obvious place would be Rogue One because it takes place in the same time period, and follows the same general group of people, namely the Rebel Alliance. Well, Rogue One delivers.

First up, the Ghost, Hera’s trusty ship, is in the film multiple times. You first see it outside the base on Yavin 4 when Jyn and Cassian get ready to go to Jedah. There’s a wide shot of the outside of the base and the Ghost is
clearly visible on the left side of the frame. Later, the Ghost is one
of the ships that jumps into battle over Scarif. It’s in a handful of
shots, mostly flying in the background. Second, after Jyn meets with the Rebel Alliance about going to Scarif, you can hear a page for “General Syndulla” clearly over the PA on Yavin 4. This is almost certainly Hera, the pilot of the Ghost. Finally, during the battle on Scarif, a Rebel communications officer intercepts a signal about the battle and runs out to tell Mon Mothm; as he does, on the left side of the frame, the Rebels’ droid Chopper can be seen rolling along.

So will Star Wars Rebels cross back over with Rogue One and give us the animated version of Yavin 4 as well as the space battle over Scarif? Could this maybe be the finale this season? The season after (if we get one)? We’ll see.

The Droids We Were Looking For

C-3PO and R2-D2 have to appear in a Star Wars movie. They just… have to. It’d ruin a tradition that’s managed to last throughout the entire saga if they didn’t, so we’re glad to say they do indeed show up in Rogue One—very briefly, as the Rebel Fleet dashes to Scarif to support Jyn’s crew.

Darth Vader’s Castle

Concept art by Ralph McQuarrie during Empire Strikes Back pre-production of Vader’s Castle

The first time we meet Darth Vader in the film, when Director Krennic runs off to him to complain about Grand Moff Tarkin taking credit for the Death Star project, the locale is unlike anything we’ve seen before in Star Wars before… but not for a lack of trying.

Yes, Darth Vader having his own castle isn’t actually a new idea from Rogue One. Plans were made to make the castle an important location in Empire Strikes Back, but the idea was scrapped. It eventually re-emerged in the Expanded Universe, where Vader’s castle was on the planet V’Jun. In the new canon, though, Lucasfilm Story Group executive Pablo Hidalgo has confirmed the castle is on Mustafar… which seems like a harsh joke to play on Anakin Skywalker.

Mon Mothma Asks Bail Organa to Get Obi-Wan

Though Mon Mothma doesn’t initially okay Jyn’s journeyto Scarif, she does know something is about to go down. She casually mentions to Bail Organa to maybe get in touch with his Jedi friend—afriend, Bail says, who has been in hiding but helped him during the Clone Wars. They, of course, are referring to Obi-Wan Kenobi. Mothma asks who he could possibly trust with such a sensitive mission and Bail says he’d trust “her” with his life.

Bail’s almost certainly talking about his daughter, Princess Leia Organa. In A New Hope, Leia is obviously aware of Obi-Wan and sends the stolen Death Star plans to him when she knows she’s going to be captured. You have to wonder, though, is the implication here if Vader didn’t attack the ship, would she not have brought the plans straight to Alderaan? Was she still going after Kenobi? We’ll never know.

The Black Saber

When Cassian and Jyn dig through the Scarif archive looking for the plans to the Death Star’s codename, Jyn mentions one project called the “Black Saber.” It might not be anything, but it could be a connection to the Darksaber, a weapon wielded by Mandalorians characters in both Clone Wars and Rebels. The Darksaber was an ancient lightsaber, stolen by Clan Vizla and passed down through generations of warriors. Could the Empire be trying to make some of their own as a re-appropriation of lightsabers in the wake of the Jedi purge?

The Return of Red and Gold Leaders

There are quite a few familiar faces in Rogue One, but one of our favorite callouts was the use of original footage from A New Hope’s Battle of Yavin sequence to resurrect Garven Dreis and Jon Vander, the Red and Gold Leader of their respective X-Wing and Y-Wing squadrons in the Alliance. The two men may have lived to fight another day at Scarif, but would ultimately perish in the Battle of Yavin.

The Fate of Red Five

Speaking of Rebel pilots, we also get to learn in Rogue One why there was a vacancy in Red Squadron for Luke to fill in—the callsign of Red Five, specifically. Unsurprisingly, the vacancy is because Red Five dies in Rogue One, shot down like a chump after failing to pull up in time during the space battle over Scarif. At least Luke did the callsign good shortly after.

Why There Are No Shoretroopers or Death Troopers in the Original Movies

Rogue One introduces a lot of new ships and Stormtroopers who we never see in the original trilogy. Being as it takes places mere days before those films, that makes no sense. If these troopers, especially the elite Death Troopers, are so good, why do we never see them again? Well, Rogue One does kind of provide an answer. And that’s because they’re all dead.

When the Death Star blows up the Imperial facilities on Scarif it’s highly probable all Shore Troopers and Death Troopers went with it. Maybe TIE Strikers and U-Wings, too. It’s at least a plausible cover for all these new things to be missing during the original trilogy.

The Galaxy’s Favorite Beverage

Step aside, caf: There’s only room for one drink in the galaxy far, far away. During the film’s prologue when the Ersos discover that Krennic has found them, while Lyra Erso is hastily packing away supplies in the rush to escape, she heads to the family kitchen, where a large container of Blue Milk, first seen in A New Hope, is sitting on the counter, smack bang in the middle of the shot.

Blue Milk: the preferred drink of choice for soon-to-be-dead parental figures throughout the Star Wars universe .

Grand Moff Tarkin and Princess Leia Return

We’re going to leave the more complicated questions about these characters coming back until next week. For now, though, two critical characters from A New Hope are back, which makes sense for a few reasons. First, Tarkin definitely feels like he’s in charge of the Death Star when we meet him in A New Hope, so to show him basically steal it from Krennic is critical for the story. It also gives Krennic his own villain, which is a nice twist.

As for Leia, obviously, we know she’s on the Tantive IV with the Death Star plans when A New Hope begins. And after the movie has just gone through such a terribly dark ending, to see a familiar face helps ease the pain as you leave the theater.

Return of the Rebel Leaders

While we’re on returning characters, two more important Rebels from the original trilogy are in the movie—but unlike Tarkin and Leia, they’re portrayed by new actors rather than CGI counterparts. Well, we say “new,” although Genevieve O’Reilly has already played Rebel leader Mon Mothma before, in scenes ultimately cut from Revenge of the Sith, making her perfect for a return in Rogue One. She’s joined by Ian McElhinney—Game of Thrones’ Barristan Selmy!—who steps in as General Jan Dodonna.

The Whills

Chirrut Imwe and Baze Malbus offhandedly mention to Jyn and Cassian that they are part of a Force-believing religious group called the Guardian of the Whills. It might sound like a meaningless reference (like “nerf herder” in Empire) but the Whills have a long history in Star Wars, just mainly outside of the story of the saga.

Originally, when drafting the first movie in the early ‘70s, George Lucas planned to frame the events as a retelling from an ancient book called “The Journal of the Whills, Part I.” Whoever the Whills are, we never really knew—they were dropped from the outline and pretty quickly forgotten, save for some ancillary material in the Expanded Universe picking up the name again as a mysterious organization with connections to Force use (in the Revenge of the Sith novelization and early versions of its script, it’s mentioned that Qui-Gon Jinn learned how to become a Force Ghost from the teachings of a “Shaman of the Whills”). Rogue One marks the first time they’ve been mentioned on screen.

Galen’s Flaw in the Death Star Design

For almost 40 years, we watched A New Hope and just thought the people who made the Death Star were idiots and left this crucial flaw in the design as a mistake—a flaw that Luke Skywalker and his proton torpedos wouldexploit. However, now, we have to watch that scene in a wholly different way. We now know that it was Galen Erso who purposefully left that exhaust port there for the Rebels to find—his ultimate revenge for the Empire killing his wife and forcing his daughter into exile.

Even More Familiar Droids

While R2 and Threepio are the big cameos, there’s the return of a few classic background droids in Rogue One as well. A Gonk droid idles by in the background as Jyn is escorted through the Rebels’ base on Yavin 4 after being rescued, while Mouse Droids squeal their way around the legions of Stormtroopers on Scarif. Keep your eyes peeled on Jedha before Saw’s insurgents attack the Imperial convoy, too—there’s a probe droid from Empire Strikes Back floating around amongst the busy crowd.

via Gizmodo
All the Major Star Wars Cameos and Connections You May Have Missed in Rogue One