Web hosting

Monday, September 25, 2017

Chinese Style Noodle Soup with Dumplings Recipe, Random Stuff, and More

This is the latest in my series on quick, easy, and tasty meals:

This is based on recipes online and an interpretation of restaurants that I occasionally frequent. While there are other alternative recipes that possibly taste better, I find that this is the quickest and easiest version (total cooking time is around 5-10 minutes depending on how good you are in the kitchen. It's really difficult to get this wrong since many of the ingredients are pre-made). 
- dumplings or 'meat balls' (many Asian grocers sell them pre-made now. Common fillings include pork and shrimp, lobster, fish, pork, beef, seafood, etc...) 
- vegetables suitable for a Chinese noodle soup (such as carrots, brocolli, pak choy, buk choy, etc...)
- noodles (wheat based) 
- soup stock (you can use power based or make your own. Technically, I guess you could get away with just boiling the vegetables and adding some seasoning sauce (such as soy or fish sauce) for a base stock? Lee Kum Kee and Lee Brands are common and reasonably decent tasting powder or liquid soup/stock brands though obviously they can often be a bit saltier then a lot of people desire. Just add water to dilute if you need to)
- brown vinegar
- soy sauce
- chilli oil
Fry off dumplings until they have somewhat crispy outside. In the meantime, start boiling soup stock. Add noodles and then vegetables to boiling soup stock until they are cooked through. Add dumplings/meat balls to the soup stock. When consistency/texture of soup is good and meal cooked through transfer meal to bowl. Create dipping sauce (for meal but most of all dumplings) by using soy sauce, brown vinegar, and chilli oil (you'll know what this looks like if you've been in enough Chinese restaurants).

Random Stuff:
- as usual thanks to all of the individuals and groups who purchase and use my goods and services
- animal news
RAW: Koala released into wild after clinging to car axle
- latest in science and technology
China unveils world's fastest bullet train
Survival Capsule - Engineers make floating capsule to withstand natural disasters
Snapchat bans Al Jazeera's Discover channel in Saudi Arabia
Where’s My Cut Burglars fail to open ATM with circular saw (CCTV)
Censoring social media
Series 18 Heartbeat: The Miracle Inside You
Series 18 Closing In: The Hunt For Alien Life
Counting the Cost - Apple's iPhone economy
MetaTrader 5 — Integration
Deep Neural Networks (Part I). Preparing Data
Have You Learned How to Develop Robots?
Hurricane Irma: Storm hits west coast of Florida
- latest in defence
- some music resources
linux algorithmic music
online music generator
Microsoft Songsmith Commercial
- latest in defense
It is US who threatened to use nuclear weapons during Korean War - N. Korean FM
What Will Be the Flash Point Syria or North Korea
Lebanese PM - Our army not Hezbollah’s proxy, we are making efforts to let US know it
UK terrorism level at 'critical' - London tube explosion injures 29, further attacks possible
RAW - Modernized Russian MiG29 fighter jet spotted in Syria for 1st time
'I was just doing my job' - Soviet officer who averted nuclear war dies
South Korea conducts drills testing advanced air-launched cruise missile
Over 3,000 new US troops headed to Afghanistan – Pentagon
'UN didn't reach full potential' - Trump encourages Security Council reform, cost-cutting
North Korea fires ballistic missile over Japan
‘We're used to sanctions, if US thinks we'll bend, it's delusional’ – N. Korea ambassador
Zones of Hope - Russia, Iran & Turkey agree on Idlib Province de-escalation zone
UN unanimously adopts tougher sanctions on North Korea
North Korea - Are we on the brink of war - UpFront
Rohingya - Hate speech, lies and media misinformation - The Listening Post (Full)
Lebanese PM - Our army not Hezbollah’s proxy, we are making efforts to let US know it
Turkey signs deal to buy Russian S-400 missile system
Terrorists or victims RT debate over stranded wives of ISIS fighters
11,000 blank Syrian passports stolen, Germany says they could be in ISIS hands
Reports Surface US Coalition Targets Syrian Military Column
US and Russia Struggle for Control of East Euphrates
T-80 test-drive - Hitting the track on the Russian main battle tank
Flying on Russian fighter jet - Stunning aerials on board Su-35
Battle not over - Syrian Army fighting ISIS in Deir ez-Zor
North Korea - Are we on the brink of war - UpFront
North Korea fires ballistic missile over Japan
F-35 go past Mach 1 with full external load.
F-35B (Non-US) Pocket Carriers
F-35 BVR vs Dogfighting
F-35 Test Pilot Billie Flynn Destroys Myths about JSF/F-35
Chinese fighter jets to control drones in battle by satellite in five years: experts
Jaguar and Tornado mid-air collision
max range of the an/apg81 and AESA
Switzerland and the F-35?
- latest in finance and politics
Kurds sacrificed enough for independence, Baghdad won’t stop the referendum - Iraqi Kurdistan PM
Aung San Suu Kyi's speech in full - ‘We condemn all human rights violations'
German elections 2017 -  Who are the AfD - The Stream
Aung San Suu Kyi's speech, analysed
Myanmar - Aung San Suu Kyi's first national speech on Rohingya crisis
Trump calls for UN reforms
How relevant is the United Nations
What can be done to help Caribbean nations recover from Irma - The Stream
FULL SPEECH - Trump addresses world problems at the 72nd UN General Assembly
Turkish leader Recep Tayyip Erdogan addressing UNGA
French President Emmanuel Macron addresses UNGA (FULL SPEECH)
Rohingya - Hate speech, lies and media misinformation - The Listening Post (Full)
Should Catalonia be independent from Spain - The Stream
CrossTalk BULLHORNS - Media as PR (Extended Version)
CrossTalk Bullhorns - Free Fall
CrossTalk - Trump and His Generals
CrossTalk on RT and Sputnik - Attacking Free Speech
Crosstalk Bullhorns - Just facts (Extended version)
How relevant is the United Nations
CrossTalk on UNGA - (UN)Diplomatic
Covering the Rohingya - Separating fact from fiction - The Listening Post (Lead)
A long history of controversial Nobel Peace Prize winners
Do sanctions work- Inside Story
Here's how to spot a news hoax - The Stream
Keiser Report -  RIP, Petrodollar (E1121)
Keiser Report - Modi's 'demonetization' (E1122)
Keiser Report - America's Falling Apart (E1123)
Keiser Report - 'Big Data' Leaks (E1124)
Keiser Report - Capitulation on Bad Bets against China (E1126)
Keiser Report - China Effect on Oil & Bitcoin Markets (E1127)
US debt surpasses historic $20 trillion
Collapse of the Soviet Union _ DW Documentary
Israel - Breaking the Silence _ DW Documentary
Refugee helpers in Italy under pressure _ DW Documentary
#Germany Decides – German election road trip _ DW Documentary
Inside Story - How should natural disasters be dealt with
What's behind world's recent extreme weather events - Inside Story
How to end war in Yemen - Inside Story
What is really happening to the Rohingya - The Stream
Is dialogue still possible to end Gulf dispute - Inside Story
Is the war on terror failing
The Stream - Are the hopes of 800,000 DREAMers set to become nightmares
Polluted Paradise - People and Power
Al Jazeera NewsGrid’s special coverage of GCC Crisis - 100 Days
Estonia - Going on a Bear Hunt - People and Power

Random Quotes:
- Silicon Valley came under the spotlight when bad boy “brogrammers” started to climb the corporate ladder.

Assistant Professor of History at the University of Wisconsin-Madison, Marie Hick, wrote in The Conversation the brogrammers were “overfunded, highly entitled, mostly white, male start-up founders”.

She said they did things that were “juvenile” and “just plain stupid”.

“Most of these activities — revolved around the explicit or implied devaluation and harassment of women and the assumption that heterosexual men’s privilege could or should define a workplace.”

There’s even a Twitter page dedicated to brogrammers — described as a programmer crossed frat boy. The bio reads: “I pump iron and pump out code. I commit to Github, not girls”.

It also has a link to a Quora page asking how a programmer becomes a brogrammer.

One person responded saying a brogrammer could “work to the tightest deadlines, or while receiving oral sex” and “maintains a solid 120wpm on the keyboard while drunk and dancing”.
- A security researcher claims to have cracked the encryption used for Apple's Secure Enclave Processor firmware and has published a decryption key.

The SEP, which is isolated from the rest of a device, handles Touch ID transactions. TechRepublic claims that it would now be open season as far as developing vulnerabilities for the enclave goes.

The SEP is at the heart of Apple's security and is entirely separate from the rest of a device. It has its own operating system, updates independently of the rest of the device and generates a unique ID for the device.

Additional security for the UID comes from the fact that it is conflated with a second key that changes on every reboot.

According to Apple's own documentation, "When you store a private key in the Secure Enclave, you never actually handle the key itself, making it far more difficult for the key to become compromised.

    key is fully grown https://t.co/MwN4kb9SQI use https://t.co/I9fLo5Iglh to decrypt and https://t.co/og6tiJHbCu to process
    — ~ (@xerub) August 16, 2017

"Instead, you instruct the Secure Enclave, which sits apart from the main processor, to create the key, securely store it, and perform operations with it. You receive only the outcome of such operations."

Key features of the SEP, according to Apple:

    It is a hardware feature of the Apple A7 or later A-series processor. Only iOS devices with one of these processors or a MacBook Pro with the Touch Bar and Touch ID support this feature.
    It stores only 256-bit elliptic curve private keys, and these can only be used for creating and verifying cryptographic signatures, or for elliptic curve Diffie-Hellman key exchange (and by extension, symmetric encryption).
    It cannot import pre-existing keys. You must create keys inside the Secure Enclave directly. Not having a mechanism to transfer key data into or out of the Secure Enclave is fundamental to its security.

The researcher, who goes by the pseudonym xerub, published the key, and also provided the code needed to decrypt it. The tools to process it were also provided.

An Apple spokesman told TechRepublic: "There are a lot of layers of security involved in the SEP, and access to firmware in no way provides access to data protection class information."
- President Donald Trump's right-hand guy Steve Bannon has been called everything from a "mastermind" to a "racist, anti-Semite." But regardless of what you think of Bannon, he just made a very good point about China.

"To me, the economic war with China is everything. We have to be maniacally focused on that," Bannon told The American Prospect in a jaw-dropping interview that covered everything from urinating on yourself to North Korea. "If we continue to lose it, we're five years away, I think, 10 years at the most, of hitting an inflection point from which we'll never be able to recover."
- Dr Cokcetin points to a case – one of many – of an 80-year-old patient with a chronic infection on her legs. The wounds resisted all treatment and her doctor was prepared to amputate. As a last-ditch effort, her nurse suggested the topical application of medical-grade honey and the infection cleared up in 10 weeks.

"In this woman's case, the honey literally saved her limbs."
- Why do we play a part in suppressing alternative information to the official line of the Second World War? How is it right that while this fierce suppression goes on, free copies of the Spielberg film, Schindler's List, are given to schools to indoctrinate children with the unchallenged version of events. And why do we, who say we oppose tyranny and demand freedom of speech, allow people to go to prison and be vilified, and magazines to be closed down on the spot, for suggesting another version of history.
    — And the Truth Shall Set You Free (1995)[11]

Icke's next manuscript, And the Truth Shall Set You Free (1995), contained a chapter questioning aspects of the Holocaust, which caused a rift with his publisher, Gateway.[94][102][103] In addition to Holocaust denial, Icke claims in the book that Jews "dominated the Versailles Peace Conference and created the circumstances which made the Second World War inevitable. They financed Hitler to power in 1933 and made the funds available for his rearmament."[103] After borrowing £15,000 from a friend, Icke set up Bridge of Love Publications, later called David Icke Books, and self-published that book and all his work thereafter. He wrote in 2004 that And the Truth was one of his proudest achievements.[104][81]

According to Lewis and Kahn, Icke set about consolidating all conspiracy theories into one project with unlimited explanatory power. His books sold 140,000 copies between 1998 and 2011, at a value of over £2 million.[105] Thirty thousand copies of The Biggest Secret (1999) were in print months after publication, according to Icke,[106] and it was reprinted six times between 1999 and 2006. Alice in Wonderland and the World Trade Center Disaster (2002) became a long-standing top-five bestseller in South Africa.[4] By 2006, his website was getting 600,000 hits a week, and by 2011 his books had been translated into 11 languages.[81][105]

Icke became known, in particular, for his lengthy lectures. By 2006, he had lectured in at least 25 countries, attracting audiences of several thousand each time.[81] He lectured for seven hours to 2,500 people at the Brixton Academy, London, in 2008,[107][108] and the same year addressed the University of Oxford's debating society, the Oxford Union.[109][110][111] His book tour for Human Race Get Off Your Knees: The Lion Sleeps No More (2010) included a sell-out talk to 2,100 in New York and £83,000 worth of ticket sales in Melbourne, Australia. In October 2012, he delivered a 10-hour lecture to 6,000 people at London's Wembley Arena.[105][112]
- During the 2016 election campaign, Trump frequently told a tale of how Pershing had Moro Muslim prisoners in the Philippines executed with bullets soaked in pig's blood to quell rebellion against American rule.

Speaking at a rally in Charleston February last year, Trump said General Pershing “took 50 bullets and he dipped them in pig’s blood.”

“And he had his men load his rifles and he lined up the 50 people, and they shot 49 of those people. And the 50th person, he said, ‘You go back to your people and you tell them what happened.’ And for 25 years there wasn’t a problem,” he said.

According to some historians, Trump’s tale is false. They have concluded it would have been "out of character" for Pershing.

But some other historians have suggested that American troops did use pigs or pig's blood to intimidate Muslims during the Philippine conflict in the early 20th century.

"So yes, there were deliberate efforts to offend Muslim Filipinos' religious sensibilities," Christopher Capozzola, a history professor at Massachusetts Institute of Technology, told TIME last year.

"And yes, there was large-scale violence against their communities. But I know of no event like the one that Mr. Trump describes,” he stated.

Muslim advocacy groups have challenged Trump to debate a representative from the American-Muslim community "on the issues" he has "raised about Islam and Muslims."

Earlier in the day, Trump condemned the attack in Barcelona. At least 13 people were killed and 80 were injured after a van plowed into a crowd in the Spanish city.
- A wise old owl sat on an oak;
The more he saw, the less he spoke;
The less he spoke, the more he heard;
Why aren’t we like this wise, old bird?
- “One wonders if Trump is a genius. Does he come up with these to successfully take America’s mind off his previously idiotic statements? Maybe he saw the heat, or was told there is heat, over saying that there were a lot of very fine people in the crowd who were worshipping Hitler, calling for the expulsion of Jews among them, and praising the institution of slavery, all in Charlottesville. Maybe the invasion of North Korea is under way now that people’s minds are ‘back’ on ISIS [Daesh],” he said.

“One’s luck is bound to change. His poll numbers keep sinking deeper but not yet amongst his core supporters.  Members of Congress in his own party have been near unanimous in their condemnation of his Nazi sympathies and are speaking out. There’s open talk of a President Pence,” he observed.

“But what always unites the American people behind their disgraced leaders is a war. Mayor Rudy Giuliani of New York was one of the least popular mayors of his city. Then 9/11 turned him into ‘America’s Mayor’. President Trump’s numbers have fallen every week since his presidency. But his illegal bombing of Syria made him ‘presidential’ in the minds and hearts of the media and Congress, of both parties,” he said.

“This man is a danger to all and proves day after day his incompetence as the political CEO of the corporation known as the United States. When you think things couldn’t get worse, they do. Must be time for a war,” he concluded.
- At stake in US military efforts to stabilize Afghanistan: At least $3 trillion in natural resources

    The U.S. has spent upwards of $700 billion on Afghanistan's war, and the Trump administration is hoping to recoup some of that via its vast mineral wealth.
    An Afghan spokesperson told CNBC that Trump's attention to the country could be a 'strategic win-win' for both.
    A recent study pegged natural resources in the country as worth at least $3 trillion, but the Taliban remains a key hurdle to any development efforts.

- as usual thanks to all of the individuals and groups who purchase and use my goods and services

Cheesy Tomato Based Pasta Recipe, Adding Subtitles to Video Files, and More

This is the latest in my series on quick, easy, and tasty meals:   http://dtbnguyen.blogspot.com/2018/08/cheapeasyhealthy-tomato-based-pa...