Can a raging barbarian carry live rabbits to kill them, in order to keep his rage going?

One of my players, a human barbarian, came up with the idea of carrying captured rabbits, feeding them and treating them nicely, so that he can rip them apart mid-battle if he knows he will be unable to attack during the round. Does this sound balanced or does this sound like breaking the rules?

Something weird going on with my algorithm?

I wrote an algorithm for data analysis using the CERN ROOT framework. It takes in three files of sorted UNIX timestamps from a single year, and pairs them up in the closest triplets, where each file contributes a triplet, and each triplet is unique. I know there are some more "well known" algorithms for accomplishing this, however this algorithm completes the task much faster, clocking in at about 20 minutes on my machine, as compared to many, many hours for some of the other algorithms I’ve tried. When complete, the algorithm plots the triplets (of the form {a,b,c]) on a 2-dimensional histogram, where the horizontal axis is a-b, and the vertical axis is a-c.

Problem is, it seems to be acting very weird. Namely, when I feed the algorithm one file of real data (these are timestamps generated by an experiment) and two files of completely random data, I get these weird diagonal lines: https://filebin.net/spbswnhkfy8xdkp8/random_plot.pdf?t=48f2yhjq. When I feed the algorithm three files of real data, a single diagonal line through the middle (and two more lines, running horizontally and vertically) appears if I use enough bins. Any idea what’s going on with my algorithm?

void unbiasedAnalysis(){  TNtupleD *D  = new TNtupleD("D","D","x:y");  ROOT::RDataFrame statn1("D", "./pathtodata"); ROOT::RDataFrame statn2("D", "./pathtodata"); ROOT::RDataFrame statn3("D", "./pathtodata");  vector<double> vec_1, vec_2, vec_3; statn1.Foreach([&](double tstamp){ vec_1.push_back(tstamp); },{"UNIX"}); statn2.Foreach([&](double tstamp){ vec_2.push_back(tstamp); },{"UNIX"}); statn3.Foreach([&](double tstamp){ vec_3.push_back(tstamp); },{"UNIX"});  vector<vector<double>> pairs; for(auto tstamp : vec_1){      double first,second;      //get iterator pointing to closest element greater than or equal to     auto geq = std::lower_bound(vec_2.begin(), vec_2.end(), tstamp);     //get iterator pointing to nearest element less than     auto leq = geq - 1;      double foo = tstamp - *geq;     double bar = tstamp - *leq;      //compare iterators, save the closest      if(dabs(foo) <  dabs(bar)){ first = *geq; }     else { first = *leq; }         //repeat     geq = std::lower_bound(vec_3.begin(), vec_3.end(), tstamp);     leq = geq - 1;      foo = tstamp - *geq;     bar = tstamp - *leq;      if(dabs(foo) < dabs(bar)){ second = *geq; }     else { second = *leq; }      //add to pairs     pairs.push_back({tstamp, first, second, (tstamp-first), (tstamp-second), std::min((tstamp-first), (tstamp-second))});  }  //sort vector of vectors by size of smallest difference std::sort(pairs.begin(), pairs.end(),     [](const vector<double>& A, const vector<double>& B){         return A[5] < B[5]; });  std::set<double> cache;  ROOT::EnableImplicitMT();  for(auto pair : pairs){     //if not in cache, add to TNtuple     if(cache.find(pair[1]) == cache.end() && cache.find(pair[2]) == cache.end()){              D->Fill(pair[3],pair[4]);          //add to cache         cache.insert(pair[1]); cache.insert(pair[2]);     } }  D->Draw("x:y>>htemp(100,-0.02,0.02,100,-0.02,0.02)","","colz"); 

}

Multiple clients sites were de-indexed from yahoo/bing – what is going on?

In the last few days I have had multiple client sites de-indexed from yahoo/bing and there seems to be no rhyme or reason to it. Some sites were done completely white hat and others were black hat sites with completely different themes, owners and linking strategies done. Has anyone else had their site de-indexed from yahoo/bing recently? If so please post the details here so we can figure out what is going on.

Does going outside of range or line of sight after casting a spell have any effect?

Does going outside the range of the spell or breaking line of sight between the caster and target break concentration or otherwise affect control over the spell?

For example, a Heat Metal spell has a range of 60 ft. If I cast the Heat Metal spell on a an armored foe, and that foe runs outside the range of the spell (60 ft), or around the corner, does that break concentration and end the spell? Heat Metal also allows you to use a bonus action to cause the 2d8 of damage — would exercising that option be prevented by being out of range or line of sight?

Going into Stealth in a crowd in 5e

I recently ran an encounter on a “restaurant boat” where my players had to obtain info from a noble on board. They successfully bluffed/bribed/sneaked their way on board. Certain areas of the ship were off limits to guest, such as the crew’s quarter’s, the captain’s cabin, and the lower deck with rowers moving the ship along.

My players found a somewhat quiet spot on deck. One of them cast Pass Without A Trace and they all rolled for stealth. No one got less than 19. They then proceeded to “sneak” past guests into the upper areas (not forbidden per se) and then further into “Staff Only” areas.

My question is: how would I rule this? Obviously, they pose as guests, no weapons or armor on, so they would just blend into the crowd and then, in an opportune moment, sneak past a door/curtain/rope barrier. But they are still moving in plain sight of at least a dozen NPCs. They can probably see them, but they do not perceive them.

The same problem would arise for me if they wanted to escape someone following them in a dense marketplace or in a crowded tavern. How can you Hide/Roll for Stealth in a crowd of – admittedly uninterested in you – NPCs?

[ Personal Finance ] Open Question : Should I let my in-laws buy my house and carry the note instead of just going through a regular refinance?

I am have great credit (785) and am currently in the early stages of refinancing (rate not locked but looking like 3,5% fixed 30 yr) I called my father and law (and his realtor fiance) just out of due diligence to see if they thought this was a good rate considering the clients they’ve seen purchase homes recently. They said it sounded pretty competitive and so I pulled the trigger with the mortgage company. Now today They called and said they were talking and think they would like to buy the house, and carry the note for us at the same interest rate and terms, but also with the option for 10-20k cash out if we want it. I wasn’t really looking for this and am not sure what to make of it. They said they were looking for somewhere to invest some money they recently made and thought it would be a win-win. I’m not sure. I trust their motives financially, but I worry about them divorcing later, or implied favors (none implied as of yet). I suppose there’s always the possibility of them being very generous with the payments or sale of the house down the road, but that’s also definitely not a given. Sounds like the same deal either way for me, but with the possibility of ugly family stuff down the road. Is there an angle I’m not seeing here?

i like to know when microsoft going stop montoring our computers, and takeing files that they no right to

do u know how impossable it is to disable windows tracking. most u think just moveing few setting u done, currently there is over 100 gpo settings that must be eather turn on of off, then gpo must be appled to computer, forget firewall microsoft servers are hardcoded in the os, u must disable all task,in trasmiting information, go to regisitery disable termaml server setting start up to 4 and if this not enouf u have block access to rdp, ftp as on all computers there is a active ftp server weather or not u installed it and a acktive http server, now we have other probems remote cmd, remote power shell. all office sends out to microsoft servers, currently there over 7000 data centers that some share with apple and cisco, microsoft will take passwords user names and encription certifices i have logs showing they do just this, that they tied linux in to windows was better way to access bouth os, as there servers gose on and off line takeing bits of infomraiton, over time they can vr your hole system and wach all u do and they do have abuilt to wach what u do and recored it, micrsofot admited to hacking with nsa they was supose to remove remote desktop but the move past this they found new way accessing all the computers, worse is nsa not only ones gets all your information, most gose to chana u all did know most all the code is writen in chana so is apple and cisco, and we ask why is it so easy to get hack, these busness would never pay to have a hack proof software as i did offer a way for them to do it, that system would be totaly trasparnet, but then microsoft could not get the files eather, so how beat microsoft at there own game, what i do is find microsoft certifices and remove remote access and access to the encraption system and to athenacattion, but they can target any server or pc, and sence they recored what u do they undo just about anything, so why trust micrsoft now i can prove microsoft did for two years target my network, i do have logs to prove it, was no hacker and microsoft them selfs said yes they was on my network logs prove it , as they work with cisco becomes hard to block them , now i like know why micrsooft keeps changeing sercruty settings on my network i do have there remote login certifices and ip address and they montor all gpo set ups why, u all have no right to this informaton so why are u takeing it, so again why trust microsoft