## what kind of locks are applied by Azure Synapse when loading data using COPY INTO

what kind of locks are applied by Azure Synapse when loading data using COPY INTO, if we are running extract from synapse dw (say from table A) and simultaneously loading new data into a some other (say table B). Will it cause any locks, will we face slowness or any locks while extracting data from table A

## Summoning a large group of the same kind of creatures [closed]

I am writing a novel and have a question regarding an incident that happens in my book. In it some very bad characters steal a very large group, say 100 head of cattle. Is that a translocation spell, they are moving them En mass from one area to another, or a group summoning? Some of the cows can be harmed in the casting. What sort of characters would those casters be? Conjurors. What is anything would be the cost of such magic?

Magic in the world is rare, and rarely used, thus far in evil. But it is there. There are druids, and healers, races must be intelligent enough to be magic users and it is viewed with suspicion by the non magic users.

I am very familiar with MMO RPGS but have not seen something like this and wonder if table top gamers may have seen or heard of this. It could be multiple magic users casting the spell that also has some elemental features too.

Thank you for reading and the help!

Nancy

I remember when DM’s Guild first came out there were some concerns regarding the licensing terms you agree to when uploading homebrew content. At first it seemed like you granted ownership of your IP to WOTC. It seems like they’ve since clarified that in their FAQ.

Does Wizards own any unique IP that I create in my DMs Guild publications?

Wizards does not own any of the unique IP that you create in your publications. Wizards does own the IP that they contribute, plus the DMs Guild agreement will grant Wizards and other DMs Guild authors a license to use your IP.

Although they don’t really specify what “a license to use your IP” means, I haven’t been able to find any information on how licensing works for D&D Beyond. The Terms of Service link at the bottom of the page links to Twitch’s TOS, which don’t mention D&D Beyond.

I was wondering whether there has been announcements on what kind of license is granted to WOTC when you upload homebrew content to D&D Beyond, is it similar to DM’s Guild?

## How to calculate this kind of double definite integral directly

Let $$D=\left\{(x, y) \mid x^{2}+y^{2} \leq \sqrt{2}, x \geq 0, y \geq 0\right\}$$, $$\left[1+x^{2}+y^{2}\right]$$ represents the largest integer not greater than $$1+x^{2}+y^{2}$$, now I want to calculate this double integral $$\iint_{D} x y\left[1+x^{2}+y^{2}\right] d x d y$$.

reg = ImplicitRegion[x^2 + y^2 <= Sqrt[2] && x >= 0 && y >= 0, {x, y}]; Integrate[x*y*Round[1 + x^2 + y^2], {x, y} ∈ reg] 

But the result I calculated using the above method is not correct, the answer is $$\frac{3}{8}$$, what should I do to directly calculate this double integral (without using the technique of turning double integral into iterated integral)?

## Constructing a monad via type synonyms of a particular kind

We can define a reader/environment monad on the simply-typed lambda calculus, using the following three equations, where $$r$$ is some fixed type, $$\alpha$$ is any type (I subscript some terms with their types), $$\mathbb{M}$$ is the proposed monadic type modality), $$\eta$$ is the unit of the monad and $$\mu:\mathbb{M} \mathbb{M}\alpha → \mathbb{M}\alpha$$ is the join of the monad:

$$\mathbb{M} \thinspace α = r → α \hspace{1cm} ∀α$$ $$\eta \, a_{\alpha} = \lambda c_{r}.\; a \hspace{2cm} ∀a_{\alpha}$$ $$\mu\,b_{\mathbb{M}\mathbb{M} \alpha} = λc_{r}.\; b_{\mathbb{M}\mathbb{M}\alpha}\, c\, c \hspace{1cm} ∀b_{\mathbb{M}\mathbb{M} \alpha}$$

Can we always construct a reader monad by type synonyms of the form $$r = x$$, for arbitrary function types $$x$$ (for example, where $$x$$ is $$(\beta \to t) \to t$$), for some type $$\beta$$?

## Is there any decentralized, “serverless” network of any kind in existence with more than a handful of users?

I’m trying to verify that the findings of my own private "research", spanning over 10 years are accurate.

Basically, I’ve been actively hunting for any signs of any kind of "Internet alternative", decentralized network running "inside" the Internet, or even just individual applications for a specific task, which have more than a nominal group of hardcore fans who don’t actually use it meaningfully because they are just to few.

I first attempted to make a list of all the services I’ve already concluded are dead or won’t ever get ready, but I soon gave up and removed that part from the post. Whether I have such a list or not, I know that there will be tongue-in-cheek suggestions such as "Tor" or "Freenet" or "Zeronet", but please try to take this seriously.

I have so many times got excited (Dat, SAFE Network, IPFS, etc.) only to fall back into my chair, depressed from the total lack of activity inside each network. It’s not meaningful to sit and create things that nobody will ever be able to access, and which stands an even lesser chance of being profitable.

(No, I’m not greedy, but I need to make money somehow in order to survive and the old Internet has been utterly destroyed in every way. However, I’m not going to elaborate on that since, if you don’t already agree with me at this point, there isn’t really anything I can ever say to convince you otherwise.)

My sad conclusion is that there just is no such network/protocol/service as I’m looking for. Nobody has managed to market their solution in any meaningful way, perpetually working on code while ignoring the world which has never heard of their fantastic thing which is just a directory tree on GitHub, year after year…

The only non-fake, semi-useful individual applications I’ve been able to find are Bitcoin Core and Bisq. However, neither of those help me reach out to people or communicate in any way. The first is just a "digital wallet" and the second enables me to buy Bitcoin for fiat money via bank transfers with individuals without having to send in a photo id to some centralized site (which is one of the reasons why the old Internet is destroyed).

So, could it actually be that, in spite of actively searching everywhere for this, I’ve somehow missed something which is huge and decentralized? Another huge problem is that there’s a million sites/projects/whitepapers which lie about being dencentralized/privacy-respecting/secure, which further complicates things. I’ve seen countless websites which appear to have been mass produced just to "muddle the waters".

I’m looking for some way to reach out to people and not be harassed with "phone verification" or "sorry, we cannot grant access at this time" fake error messages for VPN/Tor users. "SAFE Network" has been working for over a decade and are forever and always "just a few months away" from release…

PS: Please don’t reply something about how "the Internet is already decentralized". No. It isn’t. It’s the most centralized network imaginable in its current form.

## Ring of the Ram: what kind of attack does it make?

The Ring of the Ram (DMG p. 193) states the following:

While wearing the ring, you can use an action to expend 1 to 3 of its charges to attack one creature you can see within 60 feet of you. The ring produces a spectral ram’s head and makes its attack roll with a +7 bonus.

What kind of attack roll is being made by the ring? Is it a melee or ranged attack? Furthermore, is it a weapon or spell attack?

Is there such a thing as a generic non-melee non-ranged attack in D&D5e? Or a melee or ranged attack that is neither a weapon or spell attack?

## Can the headphone or earbud (Bluetooth or wired) transmit malicious code, virus, Trojan or any kind of malware from computer to computer?

I have an old computer and I am sure it has Trojan or malicious code but after that i bought new one the problem is i did not change my old headphone that used in my old computer and i plugged it in the new computer so are there any problem to use my old headphone ? and thank you

## [ Politics ] Open Question : After Biden takes over what kind of reality show will Trump try & do? What about ‘Trump’s Pandemic’?

100 contestants are thrown onto Jeffrey Epstein’s Island.  10 of them have Coronavirus and need ventilators.  Testing isn’t allowed and contestants can only eat KFC or McNuggets but they are not allowed to hide in the Islands bunker and are cut off from Twitter.  Whoever can find Epstein’s old disinfectant supplies and inject themselves first wins — something like that…

## What kind of “actions” can a TPM2 policy authorize?

I’ve been instructed to use the state of our system’s TPM’s PCR registers to prevent the system we’re working on from booting if one of the PCR registers is different from what we expect. In service of that goal, I’m reading over this article: https://threat.tevora.com/secure-boot-tpm-2/

there is a paragraph near the middle that reads:

TPM2 has the ability to create policies based off of PCRs: If the PCR contents do not match expectations, the policy will not authorize the action.

What kind of actions are they talking about here? And what would be the immediate ramifications if the action was not authorized?

Some background: Before today, I was under the impression that the principle trick of the TPM was to encrypt or decrypt data using a key that the TPM holds securely. Now this article suggests that the TPM can also (two different functions) encrypt or decrypt data based on the current state of its’ PCR registers… this seems similar enough to my previous understanding that I can believe it.

If my understanding is correct, I can see how this would be useful to our project’s goals; encrypt a blob of data that is critical to the success of the boot (say… the kernel*) with the state of the PCR registers while the PCR registers are in a known-trustworthy state (i.e. while known-trustworthy software is loaded). If software that writes different PCR registers replaces the known-trustworthy software, then the kernel blob won’t decrypt properly, and execution “halts”. Presumably there are ways to handle this halting gracefully, like Bitlocker or LUKS; I imagine if I just encrypted executable code and then decrypted it with the wrong key, it would produce gibberish, and the machine would do unexpected things rather than halt gracefully when running that gibberish.

A co-worker has taken the position that there’s a simpler way; that a TPM can permit or refuse an action directly… so, like, it halts the processor or something, I guess? He doesn’t express himself very well, and when I tried to summarize his position he told me I got it wrong, so… I’m deliberately keeping the details of his position scant. Suffice it to say, my understanding of what a TPM does wouldn’t allow for what he describes…

You could interpret the two sentences from the article as supporting his position, or mine, depending on what actions it is possible to ask the TPM to authorize, and what the immediate consequences ramifications of the TPM denying you the authorization to do something. Does anyone here have an opinion?

*…how would I “encrypt the kernel”, exactly? :-p