Deliver Your Direct Mail Campaign With Impact by Using Variable Data Printing

Variable Data Printing (VDP) by means of definition, is a form of on-call for printing that attracts records from a particular database, to personalize text and photographs from one printed piece to the following, without preventing or slowing down the printing method.

Sounds like a mouthful, but actually a easy concept whilst it comes down to it.

VDP isn’t always a new concept. It has been round for just over a decade but growing in popularity as marketers search for approaches to supply their junk mail campaigns with most effect.

With VDP, entrepreneurs are able to customize their Latest mailings database in lots of distinctive ways. The maximum easy and famous shape is personalizing the salutation (i.E. Dear Mary). As era advances, alternatives are evolving and the capability to customize will become even greater complex. Now you could….
[Image: Canadian-CTOs-CIOs-Email-Lists.png]
• Assign unique promotional codes to sure businesses
• Personalize offers to a selected demographic
• Apply personalised URLs (purls)
• Customize your message primarily based upon past purchases and prediction of destiny needs
• Personalize snap shots (i.E. “Mary” written in an photograph of clouds, a sandy seashore, a constructing, a avenue signal, etc.)

Really, the options have grow to be infinite.

The cutting-edge fashion in variable facts printing today is a method called Door-to-Door Mapping. The call can’t do it better justice; door-to-door mapping provides instructions from the “front door” of the receiver to a destination distinctive by using the sender.

With both B-to-B and B-to-C opportunities, door-to-door mapping offers the closing in ease of response in direct mail campaigns. As the sender, you aren’t simplest handing over a excessive impact message, but now you are making it that a great deal easier for the target audience to reply in your provide by way of giving them directions for your occasion. An ideal application for door-to-door mapping is an occasion invitation.

Here are a few industries in order to gain by the use of door-to-door mapping, and examples of uses:

• Healthcare…..New affected person recruiting by means of a new pressing care center
• Real Estate…..Open residence invite
• Education…..Freshman elegance orientation or alumni event
• Manufacturing…..New product demonstration or manufacturing unit excursion
• Financial/Banking…..Invitation to an estate planning seminar
• Casino…..Entice out of state “excessive rollers”
• Ad organizations…..Invitation to “dealer day” occasion
• Restaurant…..New place announcement and coupon provide
• Non Profit Agencies…..Invitation to fund elevating gala

While door-to-door mapping can produce splendid reaction charges, being a tremendously unique and personal shape of variable facts printing, the important thing to attaining success lies inside the agency’s capability to devise in advance. Segmenting your database and maintaining contemporary records will can help you re-marketplace your data for greater effect. Although time eating, it’s far well really worth it ultimately.

In a era pushed by technological advances, alternatives for junk mail will best keep growing and trade, just as we have visible with the beginning of door-to-door mapping. The strengths and blessings of utilising VDP in direct mail campaigns are enormous but the backside line that marketers need to recall is: the higher the impact, the greater the reaction.

Deny access to all PHP files using FilesMatch, but make an exception for one

Currently, using htaccess I am denying access to any PHP file in a directory, but not the JS, PNG, CSS files in the same directory.

<FilesMatch "\.php$  "> Order deny,allow Deny from all </FilesMatch> 

What if I want to make an exception for one file (“foobar.php” for example) however? Can I write multiple statements in a single htaccess? What is the order of execution?

Can Counterspell be used to prevent a Mystic from using a Discipline?

The most recent version of the Unearthed Arcana Mystic (V3) can be found here.

The way I read it RAW Counterspell has not effect on Psionic Disciplines but this seems extremely over powered and I find it difficult to believe that this is RAI. What are your thoughts and what approach have you taken on your tables?

Below is my reasoning for the above conclusions.

Counterspell states that:

  • You attempt to interrupt a creature in the process of casting a spell

This costs one reaction and further clarify’s exactly when a reaction can be used to cast Counterspell:

  • which you take when you see a creature within 60 feet of you casting a spell

This raises a couple of questions:

  1. Does using a Discipline qualify as casting a spell for the purposes of Counterspell?
  2. Is it possible to ‘see’ a Mystic use a Discipline being that it has no verbal, somatic or material components?

The Mystic V3 UA-Mystic pdf offers some help here but is far from conclusive and arguably contradictory. In regards to the first question; It states the following at various different points in the document:

  • Psionics is a special form of magic use, distinct from spellcasting

This would seem to suggest that using a Mystic Discipline is not the same as casting a spell.

  • Psionic Disciplines are magical and function similarly to spells

This statement suggests that Mystic Disciplines and spells function similarly and that using a Discipline may well count as ‘casting a spell’

  • Psionics and spells are separate effects, and therefore their benefits and drawbacks overlap. A psionic effect that reproduces a spell is an exception to this rule.

This statement suggests that using a psionic Discipline may count as ‘casting a spell’ if it is a psionic effect that reproduces a spell.

I find this statement particularly unhelpful as nowhere in the document does it clarify what Mystic Disciplines duplicate spell effects or how similar the two have to be for this to apply.

Some Disciplines are very similar to existing spells in 5e others are not and some while similar in some aspects while differ considerably in others. For example take the Immortal discipline ‘Bestial Form’ – Flight:

‘You transform your body, gaining traits of different beasts. Wings sprout from your back. You gain a flying speed equal to your walking speed.’

when compared to the Transmutation spell ‘Fly’:

‘You touch a willing creature. The target gains a flying speed of 60 feet for the duration. When the spell ends, the target falls if it is still aloft, unless it can stop the fall.’

Both abilities allow the target to fly so you can argue that this duplicates the effect of a ‘Fly’ spell. However, the Mystic Discipline does not require concentration last an hour instead of 10 mins and in most cases will give you a fly speed of 30ft rather then 60ft, making it far from clear cut.

There are numerous other examples like Occluded Mind from the Telepathic Contact Discipline and Zone of Truth… Similar effects but certainly not an exact duplicate.

My approach would be to use quite broad brush as to when a psionic discipline ‘duplicates’ a spell effect to catch as many disciplines as possible in this definition. That said we still have the issue raised in question 2 above to address which makes all of the above something of a mute argument.

As stated above you can use a reaction to cast Counterspell when you see a creature within 60 feet of you casting a spell.

Even assuming the Mystic Discipline counts as casting a spell it would still not be possible for a normal caster to Counterspell it because Mystic ‘Disciplines don’t require the components that many spells require. Using discipline requires no spoken words, gestures, or materials. The power of psionics comes from the mind.’

RAW this means a mystic using a discipline shows no outward sign that they are doing so, so there is nothing for the person casting Counterspell to see that can trigger the reaction needed to cast Counterspell.

So RAW Counterspell cannot be used on Psionic Disciplines.

Does user need to keep updated with the certificates locally when using TLS with smtp?

HOWTO: Install/Configure msmtp and mutt on ubuntu

I got GTS CA 1O1 as the common name instead of Google Internet Authority G2. What is the difference between the two.

So GTS CA 1O1 refers to the one listed here https://pki.goog/?

I see GTS CA 1O1 valid until Dec 15, 2021. So by Dec 15, 2021, I should regenerate the local crt file by openssl x509 -inform DER -in GTS1O1.crt -outform PEM -out gmail-smtp.crt

$   msmtp --serverinfo --tls=on --tls-starttls=off --host=smtp.gmail.com SMTP server at smtp.gmail.com ([172.217.195.108]), port 465:     smtp.gmail.com ESMTP a10sm3703146oic.46 - gsmtp TLS session parameters:     (TLS1.3)-(ECDHE-X25519)-(RSA-PSS-RSAE-SHA256)-(AES-256-GCM) TLS certificate information:     Owner:         Common Name: smtp.gmail.com         Organization: Google LLC         Locality: Mountain View         State or Province: California         Country: US     Issuer:         Common Name: GTS CA 1O1         Organization: Google Trust Services         Country: US     Validity:         Activation time: Tue Nov  5 15:45:23 2019         Expiration time: Tue Jan 28 15:45:23 2020     Fingerprints:         SHA256: 50:E7:13:03:7B:A8:D8:28:3C:D2:66:AC:58:E3:76:6D:BB:DB:E2:9D:B6:8F:54:38:10:BC:A5:93:67:25:7D:4D         SHA1 (deprecated): F4:D9:49:8F:FA:F0:06:D1:B8:D7:AE:A8:56:A3:36:B4:FB:76:3E:32 Capabilities:     SIZE 35882577:         Maximum message size is 35882577 bytes = 34.22 MiB     PIPELINING:         Support for command grouping for faster transmission     AUTH:         Supported authentication methods:         PLAIN LOGIN OAUTHBEARER  

5e Familiar using a magic item to cast a concentration spell

As there are items that do not require concentration and allow the casting of spells through them, such as the wind fan, is it possible to have the familiar take the concentration for this spell?

While holding this fan, you can use an action to cast the Gust of Wind spell (save DC 13) from it. Once used, the fan shouldn’t be used again until the next dawn. Each time it is used again before then, it has a cumulative 20 percent chance of not working and tearing into useless, nonmagical tatters.

Note that this fan does not require attunement and is a totally stand-alone tool in your familiar’s hands. An octopus, rat or weasel would arguably have the ability to hold and wave such an object around.

Does a Druid/Barbarian using Rage cancel out Wild Shape?

5e Player dipping toe into 3.5 with help of a friend, who is an old hand, but hasn’t played in a long while.

He was reading the 3.5 books and seems to think the phrasing of Barbarian Rage would cancel out Wild Shape. I know this is untrue in 5e, as you can easily Wild shape then rage on a subsequent turn in that edition.

So the question is, in 3.5, Can I Rage and Wild Shape at the same time?

Using Temp Tables in Azure Data Studio Notebooks

tl;dr I want to use temp tables across multiple cells in a Jupyter Notebook to save CPU time on our SQL Server instances.

I’m trying to modernize a bunch of the monitoring queries that I run daily as a DBA. We use a real monitoring tool for almost all of our server level stuff, but we’re a small shop, so monitoring the actual application logs falls on the DBA team as well (we’re trying to fix that). Currently we just have a pile of mostly undocumented stored procedures we run every morning, but I want something a little less arcane, so I am looking into Jupyter Notebooks in Azure SQL Data Studio.

One of our standard practices is take all of the logs from the past day and drop them into a temp table, filtering out all of the noise. After that we run a dozen or so aggregate queries on the filtered temp table to produce meaningful results. I want to do something like this:

Cell 1

Markdown description of the loading process, with details on available variables 

Cell 2

T SQL statements to populate temp table(s) 

Cell 3

Markdown description of next aggregate 

Cell 4

T SQL to produce aggregate 

The problem is that, it seems, each cell is run in an independent session, so the temp tables from cell 2 are all gone by the time I run any later cells (even if I use the “Run cells” button to run everything in order).

I could simply create staging tables in the user database and write my filtered logs there, but eventually I’d like to be able to pass off the notebooks to the dev teams and have them run the monitoring queries themselves. We don’t give write access on any prod reporting replicas, and it would not be feasible to create a separate schema which devs can write to (for several reasons, not the least of which being that I am nowhere near qualified to recreate tempdb in a user database).

Error trying to solve a 2D elasticity problem using FEM package

I have the following equations $ $ \frac{\partial{N_x}}{\partial{x}}+\frac{\partial{N_{xy}}}{\partial{y}}=0$ $ $ $ \frac{\partial{N_y}}{\partial{y}}+\frac{\partial{N_{xy}}}{\partial{x}}=0$ $ where \begin{equation} \begin{bmatrix}N_{x}\N_{y}\N_{xy}\end{bmatrix}=\begin{bmatrix}A_{11}(x)&A_{12}(x)&0\A_{12}(x)&A_{22}(x)&0\0&0&A_{66}\end{bmatrix}\begin{bmatrix}\frac{\partial{u}}{\partial{x}}\\frac{\partial{v}}{\partial{y}}\\frac{\partial{u}}{\partial{y}}+\frac{\partial{v}}{\partial{x}}\end{bmatrix}\end{equation} $ A_{ij}$ are varies only on $ x$ direction. The boundary conditions are shown bellow. I’m trying to apply the complete panel BCs.

99

Can someone help me to model this problem. I looked the FEM package, but I still can’t solved. Thank you in advance. I’m looking for solution to u(x,y) e v(x,y).

Follow my code:

E1 = 147 10^9; E2 = 10.3 10^9; G12 = 7 10^9; nu12 = 0.27; nu21 = (E2*nu12)/E1; t = 0.127 10^-3; a = 1; b = 1; u0 = -1;  Son = {{1/E1, -nu12/E1, 0}, {-nu21/E2, 1/E2, 0}, {0, 0, 1/G12}}; Qon = Inverse[Son]; angles = {{0, 45}, {0, -45}, {0, -45}, {0, 45}}; num = Dimensions[angles][[1]]; h = num*t; pos = Table[0, num + 1]; pos[[1]] = -h/2; For[i = 2, i <= num + 1, i++, pos[[i]] = pos[[i - 1]] + t;] mA = ConstantArray[0, {3, 3}]; mB = ConstantArray[0, {3, 3}]; mD = ConstantArray[0, {3, 3}];  For[i = 1, i <= num, i++, T0 = angles[[i, 1]] (pi/180); T1 = angles[[i, 2]] (pi/180); theta[x_] = (2/a) (T1 - T0) Abs[x] + T0; m = Cos[theta[x]]; n = Sin[theta[x]]; Q11 = Qon[[1, 1]]; Q12 = Qon[[1, 2]]; Q22 = Qon[[2, 2]]; Q66 = Qon[[3, 3]]; Qxx = m^4*Q11 + n^4*Q22 + 2*m^2*n^2*Q12 + 4*m^2*n^2*Q66; Qyy = n^4*Q11 + m^4*Q22 + 2*m^2*n^2*Q12 + 4*m^2*n^2*Q66; Qxy = m^2*n^2*Q11 + m^2*n^2*Q22 + (m^4 + n^4)*Q12 + -4*m^2*n^2*Q66; Qss = m^2*n^2*Q11 + m^2*n^2*Q22 - 2*m^2*n^2*Q12 + (m^2 - n^2)^2*Q66; Qxs = m^3*n*Q11 - m*n^3*Q22 + (m*n^3 - m^3*n)*Q12 + 2*(m*n^3 - m^3*n)*Q66; Qys = m*n^3*Q11 - m^3*n*Q22 + (m^3*n - m*n^3)*Q12 + 2*(m^3*n - m*n^3)*Q66; Qoff = {{Qxx, Qxy, Qxs}, {Qxy, Qyy, Qys}, {Qxs, Qys, Qss}}; mA = mA + Qoff*(pos[[i + 1]] - pos[[i]]); mB = mB + Qoff*(pos[[i + 1]]^2 - pos[[i]]^2); mD = mD + Qoff*(pos[[i + 1]]^3 - pos[[i]]^3); ]; mB = mB/2; mD = mD/3;  Needs["NDSolve`FEM`"] omega = Rectangle[{-a/2, -b/2}, {a, b}]; mesh = ToElementMesh[omega];  A11[x_] = mA[[1, 1]]; A12[x_] = mA[[1, 2]]; A16[x_] = mA[[1, 3]];  A22[x_] = mA[[2, 2]]; A26[x_] = mA[[2, 3]]; A66[x_] = mA[[3, 3]]; Nx[x_, y_] = A11[x] D[u[x, y], {x, 1}] + A12[x] D[v[x, y], {y, 1}] +               A16[x] (D[u[x, y], {y, 1}] + D[v[x, y], {x, 1}]); Ny[x_, y_] = A12[x] D[u[x, y], {x, 1}] + A22[x] D[v[x, y], {y, 1}] +               A26[x] (D[u[x, y], {y, 1}] + D[v[x, y], {x, 1}]); Nxy[x_, y_] = A16[x] D[u[x, y], {x, 1}] + A26[x] D[v[x, y], {y, 1}] +                A66[x] (D[u[x, y], {y, 1}] + D[v[x, y], {x, 1}]);  PDEs = {D[Nx[x, y], {x, 1}] + D[Nxy[x, y], {x, 1}], D[Ny[x, y], {y, 1}] +          Nxy[x, y], {y, 1}]}; gammaD = {DirichletCondition[u[x, y] == u0, x == a/2],            DirichletCondition[u[x, y] == -u0, x == -a/2]}; NDSolve[{PDEs == {0, 0}, gammaD}, {u,     v}, {x, y} \[Element] mesh]; 

I’m getting the following error:

NDSolve::femcnmd: The PDE coefficient {{0.000508 (-8.22842*10^11 Cos[Times[<<2>>]]^3 Sin[1.5708 Abs[<<1>>]] (Abs^\[Prime])[x]-4.04788*10^10 Cos[1.5708 Abs[<<1>>]] Sin[Times[<<2>>]]^3 (Abs^\[Prime])[x])+0.000254 (<<1>>)+<<1>>+1/2 (-0.001016 (-8.22842*10^11 Power[<<2>>] Sin[<<1>>] (<<1>>^(<<1>>))[<<1>>]-4.04788*10^10 Cos[<<1>>] Power[<<2>>] (<<1>>^(<<1>>))[<<1>>])-0.000508 (2.32093*10^11 Power[<<2>>] (<<1>>^(<<1>>))[<<1>>]-7.45065*10^11 Power[<<2>>] Power[<<2>>] (<<1>>^(<<1>>))[<<1>>]+1.62623*10^10 Power[<<2>>] (<<1>>^(<<1>>))[<<1>>]+1.67953*10^10 Plus[<<3>>])-0.000508 (-2.32093*10^11 Power[<<2>>] (<<1>>^(<<1>>))[<<1>>]+7.45065*10^11 Power[<<2>>] Power[<<2>>] (<<1>>^(<<1>>))[<<1>>]-1.62623*10^10 Power[<<2>>] (<<1>>^(<<1>>))[<<1>>]+1.67953*10^10 Plus[<<3>>])),<<1>>}} does not evaluate to a numeric matrix of dimensions {1,2} at the coordinate {-0.4625,-0.4625}; it evaluated to {{0.,5.79879*10^6 (Abs^\[Prime])[-0.4625]}} instead. 

Can someone help me? Thank you all in advance.

Using WinSCP to connect Windows Client to Linux server

I am trying to understand how to set up an SFTP connection between Windows 7 PCs (yes, these PCs will be supported through part of next year) to a Linux Server. I think I’m finally getting it – but it’s the where to put things and how to actually connect that I’m not following.

I’m testing all of this out in a test lab before these new Linux Servers go out. I have generated a key pair. I’ve given the public key to my test server admin, who has placed it in /root/.ssh/authorized_keys (is this the correct location?) on the Linux server.

I have placed my private key in \Users\user\.ssh\keyname.ppk on my Windows PC. Is that correct?

And now I am trying to write a test batch script that will create a .dat file with my connection command, my PUT and GET commands, and which will be called by WinSCP to connect to that server and run those commands. If I can get this working, I will be using this same batch code and WinSCP call in several different scripts which currently use FTP, not SFTP.

What I’m not sure how do is how to connect. I have the call to my .dat file –

winscp /script=\temp\sftp.dat 

But my current authentication method is to use a username/password combination – here is the first line of the .dat file:

open sftp://username:password@servername -hostkey="ssh-ed25519 xxxxxxxxxxxx"         

…but username/password authentication will not be available to me. So how do I connect with just the key pair? Is there a particular line I need to write in place of that open sftp line for it to connect?

Is it possible to safely connect to the internet using a malicious router?

If you connect to a router that’s controlled by a hacker, is there some way you can safely surf the internet without getting hacked? By using a vpn and firewall maybe?

Does it make a difference what kind of router it is?

1) A wired router

2) A wireless router

3) A 4g usb dongle ( Could this be used for a bad usb attack?)