grandkasl.weebly.com Open in urlscan Pro
74.115.51.8  Public Scan

URL: https://grandkasl.weebly.com/
Submission: On October 07 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

grandkasl
 * Blog


POSTGRES DEADLOCK

1/5/2024

0 Comments

 

If transaction a is never committed, transaction b will remain stalled. Infinite
wait, connection pileup, or other bad things ™ Process 81944 waits for ShareLock
on transaction 924069 blocked by process 81941.ĬONTEXT: while inserting index
tuple (0,20) in relation "."ģ. Deadlock! Postgres detects this after
deadlock_timeout and one of the transactions is aborted with this somewhat
confusing deadlock error: ERROR: deadlock detectedĭETAIL: Process 81941 waits
for ShareLock on transaction 924071 blocked by process 81944. Now b is waiting
on a and a is waiting on b. This causes transaction a to attempt to acquire a
lock on transaction b. If the two transactions are each inserting multiple rows
into the table, transaction a may attempt to insert a key previously inserted by
transaction b. transaction b fails with the message duplicate key v violates
unique constraint "." 2. There are 3 possible outcomes, ordered best to worst:
1. Transaction b is now blocked waiting for transaction a to finish. In our
example, Postgres will determine the transaction ID of the other transaction (
transaction a) and transaction b will attempt to acquire a lock on the
transaction ID of transaction a. If you want to wait for another transaction to
finish, you can attempt to acquire a lock on that transaction ID, which will be
granted when that transaction finishes. Every transaction holds an exclusive
lock on its own transaction ID while the transaction is in progress. Postgres
handles this situation by having transaction b wait until transaction a
completes. In this case, it will find that another in-progress transaction (
transaction a) has already inserted v. Postgres will look for the tuple we’re
attempting to insert in both the committed and “dirty” (not-yet-committed)
sections of the index. A Postgres index stores not only committed data, but also
stores data written by ongoing transactions. Transaction b inserts v which
causes Postgres to check the unique index. Suppose transaction a has inserted v
first but has not yet committed. For the purposes of our example we’ll have
transaction a and transaction b.īoth transactions attempt to insert value v into
the same table. If two transactions are writing to the index concurrently, the
situation is more complex. Here’s the relevant function in the Postgres source.
If it already exists, our insertion will fail because we violated a unique
constraint. Postgres simply looks up the tuple we’re attempting to insert in the
unique index. In the case where only one transaction is writing to a unique
index, the process is straightforward. It’s not uncommon to be in the worst case
scenario described above, until, by sheer luck, insert ordering triggers the
deadlock detector and cancels the transactions. The Postgres deadlock detector
will detect the deadlock after deadlock_timeout (typically one second) 2 and
cancel one of the transactions. If you were a bit luckier, you could have
created deadlock within Postgres. In most cases you will leak database
connections until your application hangs. The Postgres deadlock detector cannot
save you. You now have an application level deadlock. A similar behavior can
occur if application thread 1 is blocked for an unrelated reason eg. This seems
far fetched, but I’ve seen it multiple times in practice in seemingly reasonable
code. application thread 1 now waits for something from application thread
2.transaction 2 and application thread 2 are now both blocked until transaction
1 is committed or rolled back application thread 2 in transaction 2 inserts
a.application thread 1 in transaction 1 inserts a.Avoid long transactions
involving tables with unique constraints especially if you broke rule #1.įailure
to follow these guidelines can result in your application leaking databases
connections and eventually hanging.Avoid inserting large numbers of records
during the same transaction into a table with a unique constraint, especially if
you broke rule #1.This is especially important if multiple transactions do this
concurrently.

Avoid inserting duplicate keys into tables with unique constraints and relying
on the unique constraint to save you.Moreover, you can cause deadlock using only
inserts. When two transactions insert the same value into a unique index, one
transaction will wait for the other transaction to finish before proceeding.
Before I get into the “why”, here are the implications: 1 It turns out that
unique indices and concurrent transactions can interact in nasty and surprising
ways. Postgres implements unique constraints by creating a unique index – an
index that can only contain unique values. A recent outage lead me to
investigate Postgres unique constraints more deeply.


0 Comments



SMART RECORDER APP ALWAYS STAY ON

1/5/2024

0 Comments

 

SharesheetPin the apps you use most in the Sharesheet. Notification historyYour
notification history is now available in settings. Now video call recording is
simply what the words say. Gesture sensitivityWhen using gesture nav, you can
now fine-tune both Back gestures on the left and right edge independently of one
another. It is always good to keep a record of these video calls for quality
purposes and other valuable reasons. Hinge angle sensor supportSo apps can
better support all kinds of foldable configurations.Įthernet tetheringShare a
tethered internet connection with a USB ethernet dongle.

Picture-in-picturePicture-in-picture windows can be adjusted to fit the size you
need.ĥG detection APIWith new APIs, apps know if you’re on a 5G connection. And
when you want it to go back to a standard display. Schedule Dark modeSchedule
when you want your phone to turn to Dark mode. For a home screen that stays
organized.Ĭall screeningNew APIs to help screening apps better identify spam
calls. Smart folders See intelligent suggestions for folder names on your Pixel
device 1. So you can get the apps you need when you need them. These apps show
up on the bottom row of your home screen. Record with sound from your mic, your
device or both.Īpp suggestions Pixel devices 1 now make app suggestions based on
your daily routines. Screen recorderScreen recording is now built in, so you
don’t need an extra app. So apps don’t get access to more data than they need.
Soft restartGet Google Play system updates when your phone is idle, with no full
reboot required.īackground locationGet more control over location sharing with
apps that are not in use. So you don’t miss any notifications after your phone
has rebooted.īlocked permissionsIf a user denies an app permission multiple
times, the app will be blocked from requesting the permission again. Apps run
immediately after an update is installed. Resume on rebootPick up right where
you started. Scoped storageAndroid limits broad access to shared storage for all
apps running Android 11, so your info stays better protected. So your device
stays armed with the most recent defense. Google Play system updatesWith Android
11, you get even more security and privacy fixes sent to your phone, right from
Google Play. So Android will reset permissions for your unused apps. Permissions
auto-resetIf you haven't used an app in a while, you may not want it to keep
accessing your data. The next time the app needs access, it must ask for
permission again. One-time permissionsGive one-time permissions to apps that
need your mic, camera or location.


0 Comments



CLONE DRONE IN THE DANGER ZONE DOWNLOAD

1/5/2024

0 Comments

 

With your mind downloaded into a robot gladiator, you must survive the sinister
trials of the arena. Graphics: AMD Radeon HD 5770 or faster, Nvidia GeForce GT
640 or fasterġ) Download the game using a Torrent program or Direct programĢ)
Extract the game to your preferred location with WinRar or 7-ZipĤ) No need to
install the game, just start with the LAUNCHER of the game as administratorĢ)
Copy the content of this crack to your game folderĤ) Run the game through the
shortcut, or “name of game”.exe, which is in the game folder. Description Clone
Drone in the Danger Zone is a robot voxel slice-em-up where any part of your
body can be sliced off. Clone Drone in the Danger Zone is a robot voxel
slice-em-up where any part of your body can be sliced off.Processor: Modern
quad-core (AMD FX-Series or newer, Intel Core i5 or faster).Download Clone Drone
in danger zone 1.0 and all. With your mind downloaded into a robot gladiator,
you must survive the sinister trials of the arena. Clone Drones Is A simulation
game in danger zonethis is the beginning of an epic tale of human rebellion.
Opponents can come across, both the same, equal in strength, and a little more
pumped.Clone Drone in the Danger Zone is a robot voxel slice-em-up where any
part of your body can be sliced off. Robots are the main race in the game,
technologically superior to humans and very evil. Clone Drone in the Danger Zone
is an interesting and rather unusual fighting game in which players are invited
to take up a sword and go to the arena in a robot’s body in order to declare war
on all other robots located there In fact, the game does not offer anything
fundamentally new, but at. With your mind downloaded into a robot gladiator, you
must survive the sinister trials of the arena. Clone Drone in the Danger Zone
Download Directly. Hard drive cloning software may you with high speed and
the-hidden-costs-of-losing-data-how-to-clone-a-hard-drive. Clone Drone in the
Danger Zone Free Download is a robot voxel slice-em-up where any part of your
body can be sliced off. Clone Drone in the Danger Zone Free Download is a robot
voxel slice-em-up where any part of your body can be sliced off. Drones-judges
will comment on your every step here, and it’s fun, believe me. Download > Clone
Drone In The Danger Zone V0.12.2.3 Hack Tool Download How to clone a flash drive
or hard drive in 10 minutes Learn Clone hard drive with high speed and.

Clone Drone in the Danger Zone is a third person sword fighter game. You will
play the role of the intergalactic clone drone in the danger zone and tried to
prove to others. Download Clone Drone in the Danger Zone SWITCH NSP ROM for
Nintendo New Handheld Console, an Action-Fighting game Developed by Doborog
Games. Download previous versions of Clone Drone In Danger Zone on APKFab. The
simplicity of its gameplay makes it very easy to jump into, and my nine-year-old
son sat down and played for several hours he even asked to help me with this
review, calling the title one of his favorite games. Take control of the drone
and go to the arena. Download Clone Drone Danger Mod APK 1.3 with. Clone Drone
in the Danger Zone is an absolute blast and its active community and development
team add to this. Not only do all drones have unique skills, but the arenas
themselves are quite dangerous. Here you are an ordinary drone with a lightsaber
in hand.Īll you have to do is defeat the rest of the drones in the arena. Get
all indie games for PC, Clone Drone in the Danger Zone Pre-Installed game direct
download on Gamdie.īUY this game to support the developer STORE PAGE Clone Drone
in the Danger Zone Direct Download IndieĬlone Drone in the Danger Zone is an
interesting and rather unusual fighting game in which players are invited to
take up a sword and go to the arena in a robot’s body in order to declare war on
all other robots located there In fact, the game does not offer anything
fundamentally new, but at the same time it is not a clone of any other. Clone
Drone in the Danger Zone Free Download only on . Clone Drones Is A simulation
game in danger zonethis is the beginning of an epic tale of human
rebellion.Endless Mode.


0 Comments



OUTGUESS ORGINIAL

1/5/2024

0 Comments

 

support for JPEG, BMP, WAV and AU files.embedding of a checksum to verify the
integrity of the extracted data.The color- respectivly sample-frequencies are
not changed thus making the embedding resistant against statistical tests.
Steghide is a steganography program that is able to hide data in various kinds
of image- and audio-files. Generally, messages will appear to be something else:
images, articles, shopping lists, or some other covertext and, classically, the
hidden message may be in invisible ink between the visible lines of a private
letter.Īnd now that we have saw the definition of this word, let’s take a look
at three open source programs for Linux that you can use to play with this
concept: Steghide and Outguess and one closed source Steg The first recorded use
of the term was in 1499 by Johannes Trithemius in his Steganographia, a treatise
on cryptography and steganography disguised as a book on magic. The word
steganography is of Greek origin and means “concealed writing” from the Greek
words steganos (στεγανός) meaning “covered or protected”, and graphei (γραφή)
meaning “writing”. You can also install it using your default package
manager.Steganography is the art and science of writing hidden messages in such
a way that no one, apart from the sender and intended recipient, suspects the
existence of the message, a form of security through obscurity. You can read the
official documentation available here: Outguess is a widely used tool in BSD
systems. It mainly supports files such as JPEG and NETpbm formats. The Outguess
tool allows you to hide data in redundant bits of existing files. We can also
use a tool to perform image steganography. How to Hide Files in Images Using
Outguess To view the files, unzip the image containing the hidden files.

Once you have hidden the files, remove all other raw files to ensure security.
Next, launch the terminal and navigate to the directory location where the zip
and the image are.Īll you have to do now to hide the files is concatenate the
zip and the image to an appropriately named image-you can call the image
anything you want. Now move the compressed file and the image you wish to use to
hide the files into the same directory. Next, compress the directory into zip
format. Start by creating a directory and add all the files you wish to hide. To
do this, you will need to have a zip file containing all the files you wish to
hide and an image. The first method we can use to hide files inside an image is
the cat command in Linux. Having looked at what steganography is and its pros,
let’s get rollin’ in the deep: How to Use the Cat Command to Hide Files in
Images Once a file is hidden, it remains in that state until
exposed.Steganography does not attract attention compared to other methods of
encryption.Some of the other advantages of steganography include: For example, a
malicious user is likely to ignore a secret document hidden inside an image of
your cat than a file encrypted with GPG. Steganography is much more advantageous
compared to encryption. Although steganography is an old way of hiding files and
messages, it can be very useful when working in an unsecured environment.
Steganography refers to the process of hiding a file, whether a video, image,
audio, or text, inside another file. That said, disguising private files you
want to secure is better than leaving them exposed. NOTE: The methods discussed
in this tutorial do not guarantee 100% security a security professional or
forensics analyst can crack them. For this tutorial, we will look at how to hide
files in images as a bonus, we’ll also discuss how to hide files in audio files.
This tutorial discusses how to protect and secure your files by hiding them
inside other files. Given this, even if you do not share your computer with
others, it’s essential to treat your security as a high priority and secure your
files with cryptography and encryption methods. On these devices, we keep
personal information and private files not intended for public access. Today, we
use personal computers as workstations and personal devices.


0 Comments



FREE DIGITAL BUDGET PLANNER

1/5/2024

0 Comments

 

Use the download links below to download your own budget spreadsheet and get
saving. Such allocation models are frequently used by banks and other lenders
for determining your financial balance. The spreadsheet will also tell you how
close you are to an ideal income allocation. Once you’ve entered all the values,
the spreadsheet will tell you how much you will have left at the end of the
month to save or put toward paying down debt.

Enter the monthly amounts in the appropriate categories, estimating any value
that fluctuates from month to month.Collect a month’s worth of bills and
receipts.



 * Gather your pay stubs and enter your monthly income.
 * Our simple and completely free budget spreadsheet can be used to quickly and
   easily plan how much you can spend each month. It just takes a bit of
   organization and commitment - which is much easier when you have a handy
   spreadsheet already made for you! Keeping track of your budget can feel
   intimidating at first, but it doesn’t need to be difficult.
 * Loan Payoff Calculator: How Quickly Can You Repay Your Loan?.
 * Auto Loan Interest Calculator: Monthly Payment & Total Cost.
 * Free Monthly Budget Spreadsheet for Excel & PDF.
 * How To Pay Medical Bills You Can’t Afford.
 * Best Car Insurance For College Students.
 * Should You Get Home Contents Insurance?.
 * How Much Should You Contribute To Your 401(K).
 * How Much Do You Need To Have Saved For Retirement.
 * The Beginner’s Guide To Saving For Retirement.
 * Investment Calculator: How Much Will You Earn?.
 * How To File A FAFSA As An Independent Student.
 * How to refinance your car loan in 7 steps.
 * Best Personal Loans For Excellent Credit.
 * Understanding Overdraft Protection and Fees.
 * 6 Best High-Yield Savings Accounts of September 2022.
 * Credit Score Calculator: Get Your Estimated Credit Score Range.


0 Comments



AIR MAX 90 RADIANT RED

1/4/2024

0 Comments

 

Huygens in particular had a well developed theory from which he was able to
derive the laws of reflection and refraction. A debate arose over whether light
had a wave nature or a particle nature with René Descartes, Robert Hooke and
Christiaan Huygens favouring a wave description and Newton favouring a particle
description. Starting in 1666, Newton showed that these colours were intrinsic
to light and could be recombined into white light. Isaac Newton was the first to
use the term spectrum for the range of colours that white light could be split
into with a prism. Light was intensively studied from the beginning of the 17th
century leading to the invention of important instruments like the telescope and
microscope. The ancient Greeks recognized that light traveled in straight lines
and studied some of its properties, including reflection and refraction. Humans
have always been aware of visible light and radiant heat but for most of history
it was not known that these phenomena were connected or were representatives of
a more extensive principle. See also: History of electromagnetism, History of
radio, History of electrical engineering, and History of optics Spectroscopy is
used to study the interactions of electromagnetic waves with matter. Throughout
most of the electromagnetic spectrum, spectroscopy can be used to separate waves
of different frequencies, producing a spectrum of the constituent frequencies.
Radiation of visible light and longer wavelengths are classified as nonionizing
radiation because they have insufficient energy to cause these effects.

Exposure to ionizing radiation can be a health hazard, causing radiation
sickness, DNA damage and cancer. Extreme ultraviolet, soft X-rays, hard X-rays
and gamma rays are classified as ionizing radiation because their photons have
enough energy to ionize atoms, causing chemical reactions. There is no known
limit for long wavelengths, while it is thought that the short wavelength limit
is in the vicinity of the Planck length. The electromagnetic waves in each of
these bands have different characteristics, such as how they are produced, how
they interact with matter, and their practical applications. This frequency
range is divided into separate bands, and the electromagnetic waves within each
frequency band are called by different names beginning at the low frequency
(long wavelength) end of the spectrum these are: radio waves, microwaves,
infrared, visible light, ultraviolet, X-rays, and gamma rays at the
high-frequency (short wavelength) end. The electromagnetic spectrum covers
electromagnetic waves with frequencies ranging from below one hertz to above 10
25 hertz, corresponding to wavelengths from thousands of kilometers down to a
fraction of the size of an atomic nucleus. The electromagnetic spectrum is the
range of frequencies (the spectrum) of electromagnetic radiation and their
respective wavelengths and photon energies. Since then, next-generation Air Max
shoes have become a hit with athletes and collectors by offering striking color
combinations and reliable, lightweight cushioning.Entire range of frequencies of
electromagnetic radiation Class In 1987, the Air Max 1 debuted with visible Air
technology in its heel, allowing fans more than just the feel of Air
cushioning-suddenly they could see it. Revolutionary Air technology first made
its way into Nike footwear in 1978. A rubber wafle outsole provides traction.
The padded tongue, synthetic suede Swoosh and rubber heel patch all highlight
the look in Radiant Red, while underfoot, the midsole houses visible Air in the
heel for cushioning. The uppers are predominantly coated with stark black across
its mesh layers and leather mudguards, and are balanced out by mid-foot/forefoot
overlays doused with a metallic silver finish. Fresh colors give a modern look
while Max Air cushioning adds comfort to your journey. The Nike Air Max 90 stays
true to its OG roots with the iconic Waffle outsole, stitched overlays and
classic TPU accents.


0 Comments



SUMMERTIME SAGA 0.20.13 APK DOWNLOAD FOR ANDROID

1/4/2024

0 Comments

 

Besides, you will have a chance to enjoy romantic moments by finding someone for
prom. You have to struggle to earn money for your house, the study and your
debt. They start to threaten you by calling all the time. You later find out the
debt that your dad owed to some criminals has been transferred into you. Then
you realize that you are failing every class in school.

After that, you decide to come back to start again. Because of that tragedy, you
have been out of school for months and grieve for your loss. Like other visual
novels, you will be in the shoes of the protagonist - a boy whose dad just died
in a mysterious way. With the latest modified version, more features have been
added to the game helping you have a better experience. The game is developed
and updated regularly. If it’s not the first time you play a sim game, this game
will be so familiar to you. It is labelled 18+ because of its content and
actions.

Knowledge about Summertime Saga Apk Modįirst of all, Summertime Saga is not an
ordinary mobile game. So today, we will talk about some tips and tricks for
players and how to download the mod version on Android devices. You can play
Summertime Saga on computers or mobiles which is so convenient. The reason why
it is so popular is that it gives you the freedom to do whatever you want or go
anywhere within the storyline. It can’t be denied that Summertime Saga MOD APK
is an amazing simulation game. How to download Summertime Saga Apk mod for
Android?


0 Comments



GITHUB POKEMON GO LIVE MAP

1/4/2024

0 Comments

 

Source code was released on 4 June 2017 on GitHub under a restrictive mods
allowing license. The game was released in 2017 commercially on Steam by
independent developer Undertow Games (Joonas "Regalis" Rikkonen). Undertow Games
/ Joonas "Regalis" Rikkonen Source code released to the public under no license
on June 11, 2021, upon the cancellation of the game. Also later Origin Systems
offered the source code on their FTP servers. Richard Garriott distributed the
Applesoft BASIC written game originally as source code. Became commercially
successful after the source code release. In July 2013 the source code of the
game was put on GitHub under MPL 2.0. Games with source code available on
release Title 2 Games with later released source code.1 Games with source code
available on release.In some cases when a game's source code is not available by
other means, the game's community "reconstructs" source code from compiled
binary files through time-demanding reverse engineering techniques. The game may
be written in an interpreted language such as BASIC or Python, and distributed
as raw source code without being compiled early software was often distributed
in text form, as in the book BASIC Computer Games. SourceForge or GitHub), or
given to selected game community members, or sold with the game, or become
available by other means. The source code may be pushed by the developers to
public repositories (e.g. Such source code is often released under varying (free
and non-free, commercial and non-commercial) software licenses to the games'
communities or the public artwork and data are often released under a different
license than the source code, as the copyright situation is different or more
complicated. In several of the cases listed here, the game's developers released
the source code expressly to prevent their work from becoming abandonware.

The source code of these commercially developed and distributed video games is
available to the public or the games' communities. This is a list of commercial
video games with available source code. ( August 2022) ( Learn how and when to
remove this template message) Several templates and tools are available to
assist in formatting, such as Reflinks ( documentation), reFill ( documentation)
and Citation bot ( documentation). Please consider converting them to full
citations to ensure the article remains verifiable and maintains a consistent
citation style.

This article uses bare URLs, which are uninformative and vulnerable to link rot.


0 Comments



LUME DEODORANT DISCOUNT CODE

1/4/2024

0 Comments

 

Generally, new products are launched, and Lume Deodorant will provide some
promotion prices, and discount will be provided to customers. At the same time,
you can also log into they system to check the discount. Check your email for
upcoming orders and notifications of prices that apply to each order. Prices may
change during the subscription and promotion. Sometimes, when some Lume
Deodorant launches the best product promotion, appreciation has as high as a
discount to provide a customer. Thank you for choosing to use the subscriber to
save a discount in a limited time. What the discount provided Lume Deodorant?
Then you will see a reduction on your total prices if the code applied
successfully.Paste your discount code copied from PromoPro US into “Promo Code”
box and apply it.When you are ready to make payment, view the basket and click
to “Checkout” securely.Find the items you’d like to order and click “Add to
basket” Follow the link to Lume Deodorant website.Choose the discount code you
want to use on your Lume Deodorant order and copy it.If you get a discount code
for Lume Deodorant 2022, then do not hesitate to follow the steps to use it on
your purchase: Made from natural ingredients, free of aluminum, baking soda,
harmless and giving women and men everywhere the confidence to live their best
lives free from body odor and self-doubt! How to Use My Lume Deodorant Coupon
Codes?Įxtra discounts always make people happy when shop online. As they began
to look into the problem, they realized that the problem is usually external,
and external problems require external solutions. But their story didn't start
with antiperspirants and deodorants on the market. Before Lume Deodorant was
invented, bath products had not been innovated for more than a century. It was
he who invented a new generation of bath products that improved many people's
plight and attracted many customers to buy them, as well as investors. Inventor
Shannon Klingman is one of those who is not content with the status quo. Lume
Deodorant Shopping Information More About:Lume Deodorant Hotpod Yoga is one of
the best outlets to get in touch with if you want to learn about yoga and get
all the benefits that this unique exercise has to offer. Why You Should Register
at Hotpod Yoga for Yoga Classes?


0 Comments



THE HOBBIT MOVIE KING UNDER THE MOUNTAIN TROLL

1/4/2024

0 Comments

 

Unless the third film is going to be solely about Dol Guldur and the White
Council, I cannot fathom how on earth they are going to make the story
work.ĭunno if the threads are going to merged at some point, but here's my
review again: My biggest problem is that it really does feel like one more film
should finish off the whole story with Bilbo and the dwarves. Overall: decent,
but over-indulgent in places. Jackson also gave just the right amount of weight
to the 'mercy' sequence without over-egging it. Gollum was great, with Serkis
topping his performance from the trilogy. The Witch-King of Angmar showing up
was also unexpected and cool. The scenes at Dol Guldur were really well-handled,
if straining at violating the whole "Sauron has not yet taken physical form,"
assessment from the earlier movies. The scenes in Rivendell with the elves
playing harps and the dwarves sitting there going, "What the fuck?", is the
comic highlight of the movie. The depiction of the fall of Erebor and Dale is
fantastic (despite the silly contrivances they use so as not to show us Smaug
fully).

The changes to the Azog storyline actually work quite well in giving Thorin a
nemesis and a more omni-present threat than in the books. The rest get fleeting
moments of cool (Dwalin as the first dwarf to arrive in particular), though
Bombur's character is pretty much just the same in the book: he is fat and
that's it (though he does kill a goblin with his belly at one point). Richard
Armitage is beyond awesome as Thorin (frankly, he's better than Viggo as
Aragorn) and Balin, Bifur (brilliant use of James Nesbitt), Fili and Kili all
have their moments to shine. Someone behind me (I guess they hadn't read the
books) actually said, "What, the eagles again?" Finally, continuing Jackson's
fine (and admittedly irrelevant) tradition of paying zero attention to time and
distances from the books, the Carrock would have to be about 13,000 feet high to
allow them to see Erebor, which seems a bit ridiculous.Īgainst that, we have the
characterisation of the thirteen dwarves which is highly successful. And, out of
the books or not, the eagles showing up again was really anti-climactic. The
exact same size (relative to the dwarves, anyway) and skin tone/texture. Every
time I looked at him it took me right out of the movie. Also, Azog is a fucking
Engineer from Prometheus.

There's also some bizarre use of locations: the very identifiable Plains of
Rohan location from TTT is re-used in the Radagast chase scene and where the
dwarves find the secret passage to Rivendell, which is really jarring. The
biggest problems are just what lots of people had identified already: the added
subplots which feel extrenuous, the various tonal variations which feel jarring
(the comedy washing-up musical number sits uneasily alongside later scenes of
decapitations), some of the more pointless departures from the book (err,
Mirkwood has been called that for a thousand years, Peter), the unnecessarily
bum-numbing length and the overload of CGI even when completely unnecessary (and
a lot less success in making it sit well in the enivronment than in LotR: during
Radagast's chase scene he is clearly not actually there). Nowhere near as good
as The Fellowship of the Ring or the extended version of The Two Towers, but
superior to RotK (both versions) and the original cinematic version of TTT.


0 Comments

<<Previous


AUTHOR

Write something about yourself. No need to be fancy, just an overview.


ARCHIVES

January 2024
December 2023



CATEGORIES

All


RSS Feed


 * Blog




Powered by Create your own unique website with customizable templates. Get
Started