For example, this book is the first to actually show some of Martin’s elf-analogues, the Children of the Forest. Notably, the role of magic and other fantastical elements has gone up substantially. There are some elements in the book that worked for me, but might not resound with the mainstream, crossover audience Martin has garnered from the hit HBO adaptation. While the first book showed a relatively stark example of a hero getting smacked down for ignoring political games, Dance aims for a slightly more nuanced (if ultimately nearly as pessimistic) view of the world - specifically, one that’s applicable to the current relationship between the Republicans and Barack Obama’s administration in the United States. Article contentĪside from moving the story forward, the book’s strongest elements come from Martin’s nihilistic and realistic portrayals of idealism fighting realpolitik. This advertisement has not loaded yet, but your article continues below. These plots, set in a world that has far more medieval realism than fantastical magic, are the central focus of the series, and with A Dance with Dragons, they almost unhinge the entire thing. No one would call Martin’s prose more than functional, but his intricate plotting and characterization draw the reader to keep turning (thousands of) pages. ![]() ![]() The length, of course, lends girth and verisimilitude to the imagined fantasy worlds, but can create headaches for authors tying to get all their moving pieces working together.Īnd moving pieces is what A Song of Ice and Fire is about. ![]() The trend has mostly died out, as audiences move toward smaller, more digestible fare such as Harry Potter or Twilight. Activate your Online Access Now Article contentĪ Song of Ice and Fire is part of a trend, seen regularly in the fantasy genre throughout the 1990s, in which authors create sprawling epics linked through multiple volumes - each as long as the entire Lord of the Rings series. If you are a Home delivery print subscriber, unlimited online access is included in your subscription.
0 Comments
Tuttle Creek State Park, Cheney State Park, and Glen Elder State Park are just of the few other Kansas state parks that provide a picture-perfect backdrop for a day outdoors. Did you know that the Red River Gorge is considered the Grand Canyon of Kentucky 2. This amazing park has gorges, hiking trails, roaring rivers and amazing forestry and rock formations. Hawn’s Overlook The view from Hawn’s Overlook is especially impressive at sunset. If you’re lucky, you might even see hang gliders taking off from just below the overlook. Wilson Lake State is drenched in natural beauty – from a jaw-dropping tunnel of trees to beautiful rock formations. Red River Gorge Tiffany The Red River Gorge is recognized as a Natural National Landmark and river. Located in Clinton County, the vista at Hyner View State Park offers a great view over the West Branch of the Susquehanna River and the mountains that surround it. The gorgeous state park is particularly popular with boaters and those who fish. For a truly unique experience, spend some time at El Dorado State Park. Some of the most spectacular natural beauty can be found in Kansas state parks, making them an ideal destination when we’re in the mood for some outdoor adventure or even a quiet hike. Which state parks should I visit in Kansas? Be forewarned, however, that the waterfall might not be as powerful if it hasn’t rained in a while. Eureka City Lake Falls is perfect for relaxing by and just watching the water tumble. Geary State Lake Waterfall boasts a 35-foot cascade as well as several other smaller waterfalls. You’ll get an up-close look at the breathtaking Alcove Springs. The epic road trip begins at Blue Springs. The ultimate waterfall road trip in Kansas, for example, promises a ton of natural beauty and sensational waterfalls. If you’re up for a road trip with some stops that include hiking, you can’t go wrong with visiting the waterfalls in Kansas. What are the best waterfall hikes in Kansas? ![]() ![]() Great Plains Nature Center boasts a jaw-dropping tree tunnel, perfect for sitting under with a picnic lunch or a good book. ![]() For simply stunning views of four states – Kansas, Iowa, Nebraska, and Missouri – head over to Four State Lookout. The natural wonder is comprised of tall stone structures that were once a large rock. If you’ve not been to Rock City yet, make it a point to visit as soon as you can. Some notable places to capture Tuscan countryside at its best include Val d’Orcia and the towns of Pienza, Montepulciano, or Monticchiello. Some of the most scenic places in Kansas we’ll find are its many natural wonders, often the perfect day-trip destination. ![]() Anyway, I am sure you want your program to be robust and handle all the situations nicely. ![]() So the data on the serial line come in short bursts like “ command1 command2” instead of “ c o m m a n d 1 c o m “ etc., which will happen if the chars are sent immediately after the user types them – which is what normal terminal programs do. Note: The Serial Monitor in Arduino IDE may somehow hide these problems because it lets the user type the whole string (command) and then send it by the Send button. Plus you probably don’t want to limit the commands to fixed length. There may be invalid commands, random spaces between each char, etc. The situation may be even worse if the sender is a person rather than another Arduino. For example, the first char it receives may be “ 2”, and then the condition if (Serial.available() = 3) will be true when we receive " 200" instead of " 002" or " 003" – invalid number. It may start receiving at any random position in the sequence. But imagine, for example, that the receiving Arduino is powered off and then back on. Now if the receiving program is “in sync” – if it starts reading from the beginning, it will receive the numbers all right. Here is what the sequence of chars coming from the serial line could look like: Our program in another Arduino is receiving the numbers and it needs to run its loop 10 times per seconds to control the nuclear reactor in your basement. Suppose one Arduino is sending numbers (fixed 3 digits length) once per second. In this code, I assume that the data/command are 3 chars long and I only do the processing if there are exactly 3 characters received. But you cannot stop your loop and wait! You want to keep processing the inputs and controlling outputs 10 times per second – imagine your program controls a quadrocopter it cannot just stop controlling the aircraft and wait for the data to arrive from serial line.Īnother solution is to change the condition to something like this: One solution would be to wait for all data to come something like calling Serial.readStringUntil which will read until a terminator character is received or there is a timeout. There may be just the first char, or the first two chars, etc. If your data or command is more than 1 char long, there is a good chance that you cannot process it yet because it is not completely received. ![]() The condition is true if there are one or more characters available. Well, you put if (Serial.available() > 0) into your loop and if there are some data (or command), you process it. Now you want your program to respond to commands sent from the serial line or to process data sent from another Arduino. You make your loop code run fast, for example, it is executed 10 times per second. You have a program which is doing lot of things – reads the sensors, controls outputs, shows current status on a display, etc. Let me explain what I mean by an example. It may seem easy but often you run into problems. I don't want to only print strings, however, but that's all I can do at the moment.When writing Arduino programs, you sometimes need to receive some commands or data from serial line. ![]() I can get this to work and that's about it: I'm not sure what I need to understand in order to know the answer to that question though. I also wonder what the maximum fixed point or integer integer value, or array size, etc. All I can seem to find has me make a uint8_t variable = "Text\r\n" (not sure why the empty square brackets are used), and I can't figure out how this might or might not apply to those fixed point, integer, and array, etc. I've researched a lot to try and figure out how to do this. I've even tried to connect my stm32 to an arduino via uart to maybe send the data to the arduino and have the arduino print to the serial monitor (yeah, I know that's a really dumb way to do it), but that hasn't worked out so far. It seems that using CDC_Transmit_FS( ![]() When you enter Pritchard’s office, look on his wall above his motorcycle to spot the Final Fantasy game of the future. Also, if you have the Reflex Booster augmentation (which allows you to take down two enemies at once) you can earn an easy 125 XP from a NL takedown than from a lethal.Īt the Hive's men's restroom, there is a pocket secretary that gives the door code for the back room that also states that someone broke the first rule by talking about what goes on in the basement. Non-Lethal Actions: Non-lethal takedowns/kills earn you more XP than you would with lethal ones. These simple tasks will earn you easy XP, and can even unlock extra goodies along the way (an access code, extra credits) Hacking: when every you get the chance, and if you have the appropriate level of hacking skill, hack everything you can. There are two ways to gain a lot of extra XP with minimal effort: Hacking and Non-Lethal Actions The game always saves the location of items - even if you leave the region. If you want to store an item instead of lugging it around, just throw it on the ground. It would be wise to save before you hit the elevator button in case the barricades don't work. If you block the doorways correctly, the guards will stay in another room outside the whole time you're waiting for the Funicular. There are two vending machines outside the room, two crates (one short, one big) next to the security computer, and the turret in the center that can be used to block the lower doorway and the side corridor. This is only possible if you have the Move/Lift Heavy Objects augment. Before you hit the elevator button, block both entrances into the room with heavy objects. In Picus Communications, when you have to wait for the Funicular to come up, there will be enemies that will arrive to fight you. You may also use a system-approved mini-keyboard (or chat keyboard) for this purpose. When inputting keycodes or passwords, you may use a USB keyboard for the Playstation 3 or Xbox 360 to serve as your "keyboard". The pocket secretary that you pick up from White also references smashthestate in the address heading. This is a reference to the original Deus Ex in which "smashthestate" was used as one of the first obtainable security logins used for gaining access to a central building on Liberty Island. ![]() According to your mission log, the sidequest is named Smash the State. ![]() There's a sidequest where you run into Officer Nicholas (after obtaining Sandoval's location mid-to-lateway in the game) and are told to eliminate Jacob White (a member of Motor City Bangers). This is a reference to the 1993 movie Demolition Man. When infiltrating the penthouse apartment in Hengsha for the mission "Hunting the Hacker," you can hit up the bathroom and find 3 seashells instead of toilet paper. After the introduction, when you are walking back into Sarif HQ (during a cutscene), note that the side of the security cameras references "Big Bro Surveillance." That's a nod to George Orwell's classic science fiction novel, 1984, wherein people's actions are monitored by the menacing "Big Brother." ![]() ![]() Ninth digit of topside FPO mark (third line) = "B" C-Step 1. Ninth digit of topside FPO mark (third line) = "A" B-Step 1. Intel may fix some of the errata in a future stepping of the component, Stepping Identifier A-Step 1. Ninth digit of topside FPO mark (third line) = "B" [B-step material will not ship, /B, TE28F008BE-T/B, TE28F800CE-T/B, All A Ninth digit of topside FPO mark (third line, Ninth digit of topside FPO mark (third line) equals "A" 5V ± 5% 5V ± 10% All CommercialĢ8F800BV/CV/CE 28F008BV/BE 28F800BV/CV/CE 28F008BV/BE 28F008BV/BEs' 28F008/800BV/BE/CV/CE 1024K 28F800 28F008B intel flash 28F800 topside mark flash device MARKing intel TE28F800 intel DOC pa28f800bvb70 AB28F intel flash fpo number INTEL flash part MARKINGĪbstract: intel DOC 28f800 errata flash device MARKing intel Ninth digit of topside FPO mark (third line) = "A" 1. Intel, INFORMATION Markings Stepping A-Step B-Step Identifier 1. Text: apply to the 8-Mbit (512K x 16, 1024K x 8) SmartVoltage Boot Block Flash Memory Family Datasheet. Intel flash 28F800 topside mark Datasheets Context Search Catalog DatasheetĪbstract: flash device MARKing intel TE28F800 intel DOC pa28f800bvb70 AB28F intel flash fpo number INTEL flash part MARKING Whether it's the rise and fall of an empire, or the shifting balance of power, the entire history of EVE Echoes will be written by its players. Players will be free to engage in interstellar combat, exploration, piracy, resource harvesting, industrial manufacture, trade, as well as many other activities across thousands of solar systems. Published: Eve Echoes No matter what Eve Echoes ship you choose, it’s an important decision that reflects your playstyle in the sci-fi RPG. In EVE Echoes, players will be able to forge their own path to glory within a massive space sandbox environment, forming alliances with other pilots from across the galaxy to shape the game’s persistent universe. ![]() ![]() Begin your journey now!ĮVE Echoes is a next-gen mobile spaceship MMO game based upon hallmark EVE Online design principles. The ancient and mysterious cosmic signatures are calling. Capsuleers can now travel to Nihilus Space via special gravity wells and extract its resources. Newly discovered technologies make it possible to harvest its riches. Can fit Covert Ops Cloaking Devices Advanced Frigate Defense Upgrade Bonus per Lv. Thousands of light years away from New Eden, Nihilus Space is a region full of rich ores and special magnetic materials. Selecting from a list in your main menu, pilots might be delivering cargo, defending a ship, or scanning a new anomaly but in essence, these missions are the mid level fetch quest of EVE. On the eve of Royal Ascot, Jess Collett is up to her David Bowie-esque, lightning flash earring studs in feathers, fake grass, silk flowers and. Set off now to explore the space and discover a new and dangerous type of anomaly: Nihilus Space. Fan rallied in front of T-Mobile Arena after a motorcade along Las Vegas Boulevard Saturday night. The Neutrino Resonance wave can now be detected in New Eden! Players will be able to use special tech scanning devices to encode it through the new scanning gameplay mechanic. Vegas Golden Knights fans lined the Las Vegas Strip for a Stanley Cup victory parade and a rally in front of their home arena to mark the team’s first NHL championship. In wormholes, you should be refreshing dscan at LEAST twice a minute and preferably about every. Meanwhile, a special type of anomaly called Nihilus Space will also be available to the most adventurous Capsuleers. Map your directional scanner (dscan) refresh button to a hotkey. VDOMDHTMLtml> April Development Update EVE ECHOES - YouTube EVEEchoes EVEOnline mobilegaming androidgaming captainbenzieIt's been a short while since we last had some news. Emission Scope Sharpener Prototype Gravity Capacitor Upgrade Prototype. ![]() The update that players have been asking for since the launch of EVE Echoes has finally arrived! Exploration will allow players to experience EVE Echoes through a special scanning mini-game at an entirely new level. Scan Rigs Emission Scope Sharpener Prototype. ![]() autoexec.batĪt the end of the config file is autoexec, where we’ll put all our MOUNT and IMGMOUNT lines to assign drive letters to directories and floppy or CD images, and any commands to run at boot. If your sound becomes choppy, you’re pushing Raspberry Pi’s capabilities too far. Scaler choice is largely a matter of personal taste, so use the Video menu options to try a few. To get proper aspect ratio correction and reasonable graphical fidelity at 1280×720, you should set the output to opengl, aspect to true, and select a scaler up to interpolate low-res graphics. Leave the fullscreen setting as false, as you can enable and disable fullscreen mode using DOSBox‑X’s menus or the F12+F keyboard shortcut fullresolution should be left as ‘desktop’. The default config is already well optimised to run DOS software on most systems, but we should make a few adjustments to improve performance on Raspberry Pi’s hardware. ![]() In the following steps, we’ll create a config file optimised for playing late-era DOS games on Raspberry Pi 4 with 4GB or 8GB RAM. Note that your custom config files need only include lines that vary from the defaults. We’ll take advantage of that later to help install Windows 3.11. As well as editing your main DOSBox-X config, you can launch DOSBox-X with a specific config file – useful if you wish to easily switch between different OS setups – using the following command-line switch: This is handy, since DOSBox‑X’s configuration has more options than that of vanilla DOSBox.įor this tutorial, we’ve created some config files that you can download from The MagPi GitHub page. The file we’ve just made can be found in /home/pi/.config/dosbox-x and, at time of writing, is named dosbox-x-0.83.3.conf.Īs well as being human-readable and conveniently editable in a text editor, you can modify this long and extensively commented file from within DOSBox-X using the configuration GUI in the main menu. Restart DOSBox-X and tell it to generate a config file that we can later modify in a text editor, based on the program’s default settings and then exit. Type exit to quit and ensure that the config directory, which we’ll need in the next step, is created properly. You can’t paste commands into it from the clipboard, but there are some modern convenience features: tab auto-completes, you can scroll through your command history using the up arrow, and you can add startup commands to a config file. Sudo apt install automake libncurses-dev nasm libsdl-net1.2-dev libpcap-dev libfluidsynth-dev ffmpeg libavdevice58 libavformat-* libswscale-* libavcodec-*ĭOSBox-X should open at its Z: prompt. Running your entire GUI at a lower resolution will lighten the load of rendering and upscaling for the emulation and have no adverse effect on games from an era when 800×600 was the norm. ![]() Right-click on your display – most likely marked HDMI-1 – and from the Resolution menu, select 1280×720. On the desktop, open the main menu, go to Preferences and select Screen Configuration. Tweak your graphicsĪssuming you’re using a standard 1920×1080 display with your Raspberry Pi, you’ll find some more demanding DOS software struggling at full resolution, particularly if you have DOSBox-X configured to use OpenGL and aspect ratio correction. ![]() conf files for specific programs to better match their requirements and automatically run commands. While our generic config file should handle most DOS software well on Raspberry Pi, you can also create separate. home/pi/dos/ directory, so be sure to change any paths if you’re using a different username or dos directory names. This tutorial and our template config files presume you’ll keep everything in a The floppy and cd directories will house disk images which we’ll be able to switch between in DOSBox-X. Let’s create the directory structure that we’ll use to house the software we’ll run through DOSBox-X: Windows 3.x custom installation guide (optional) It also has a sophisticated graphical interface to help you manage tasks such as configuration and virtual disk-swapping. Forked from the original DOSBox emulator, DOSBox-X has more precise hardware emulation, supports a wider range of software, and can effectively run more DOS-related operating systems (up to Windows ME). ![]() I hope that this is not just a bit of covert advertisingįirst, you need to really determine the size of the hero-small-free banner. I'm using a Hewlett Packard Compaq 6000 Pro with Windows 7 Professional, if that helpsīTW, it’s the header for the internal images. Could someone baby-step me through this, as it's the first time I've used Gimp. Can this actually be done in Gimp? If so, how? What am I doing wrong, if anything? Well, I am a newbie at Gimp. ![]() I admit I used Photoshop Elements when I did the first cropping experiment, but I"d like to know how to do it in Gimp, but I've never used it before, so don't know the steps to take to do this. Could I just have the rest of it be blue like the dark blue border, or does or copy the color for the rest of the image? Does anyone have any suggestions or help on how to get rid of the greyish blue at least? What do I do with that left part because it looks unfinished. Is There a way to crop the smokey grey out and the blue or is there something better that can be done with the upper left corner, like making it the dark blue of the border, or what do you suggest? Did I use the wrong crop tool? I used the “Rule of thirds” cropping tool, and got it as far as I could and as much of the left side out as possible, but I couldn’t get it all. What I want to do is crop the left part out, and just leave the right side with the woman and the text “Victory begins with Confidence” with the gold(It was professionally done by someone at Fiverr), but when I cropped it, this is what I got: The image has an all-white background with the picture on the far right because there’s a blue overlay with text on the left. The image said it’s originally 1920 X 500, but saving the image I got 1024X267. I have a header that I'm trying to put together for a site that has to do with confidence. I was wondering if someone could help me with this. I have Gimp 2.10 installed as well as Photoshop Elements 12. I got a new computer and heard about and decided to give Gimp a try. The Photoshop user interface is made up of a single window that contains child windows while the GIMP UI is composed of multiple windowsĥ.Hi, I'm new here, and to Gimp. GIMP is best for hobbyists or amateurs as a free alternative to Photoshop or as a learning tool before buying the expensive Adobe Imaging SuiteĤ. Professional photographers prefer Photoshop over GIMPģ. Photoshop is proprietary while GIMP is open sourceĢ. It is also suitable for amateurs who may want to learn the basics and the concepts of how to manipulate the images before turning pro and acquiring the associated tools.ġ. GIMP is best for photography hobbyists who just want to improve the quality of their photos without spending any money on the software. There is a version of GIMP for every operating system available, making it a good choice when you cannot change your operating system to the two that Photoshop supports. Being a part of the GNU, the source code of GIMP is easily acquirable and compiled for multiple operating systems. Professional photographers are restricted to these two unless they want substandard images. The problem with Photoshop is that it only supports two operating systems, Windows and Mac OS. Not even the high price of the Adobe Suite of imaging programs deterred people who needed professional quality images from using Photoshop. Most professional photographers and graphic artists use Photoshop due to the ease of use and its very powerful tools. Even if GIMP is equipped with a lot of professional tools, there are features that are essential to professional level editing absent in GIMP like non-destructive editing. At this point the name was also changed from General to GNU but the acronym remained unchanged.ĭespite the eager community supporting GIMP, it is still not as advanced as Photoshop. It started to gain in popularity after it was added to the GNU list and a community formed around it that improves and troubleshoot problems. GIMP originally stands for General Image Manipulation Program and started as a project for a couple of students in college. ![]() The major difference between these two is that Photoshop is proprietary and would cost a lot of money to purchase while GIMP is open source software and is therefore free for anyone to download and use. ![]() GIMP and Photoshop are both programs that are meant to open and edit images. ![]() ![]() A second continuous flow profile is recorded across the set of producing layers. The well is opened to the intermediate choke opening, and the ensuing transients of rate and pressure are recorded until stabilization occurs. The pressure and flow sensors are repositioned above the top of the middle layer.Finally, a continuous flow profile is recorded across the set of producing layers. The well is opened to the smallest choke opening, and the ensuing transients of rate and pressure are recorded until stabilization occurs. The well is shut in, and the pressure and flow sensors (typically conveyed by a production logging tool) are positioned above the top of the uppermost layer.The following steps describe a typical design for a three-layer multirate test: ![]() 4 – Typical design for a three-layer multirate test (PL = production logging). 2) is a straight line on the semilog plot, which in turn can be interpreted to yield the test objectives of the permeability and skin effect.įig. the "sandface convolution time" (a time function akin to a generalized superposition function). The technique used here makes use of semilog analysis, in which rate-normalized pressures are plotted vs. A constant flow-rate function was sought to interpret this test. Clearly, the pressure and flow-rate data mirror each other, which is precisely the effect of the convolution. 1 shows an example in which the transient consists of a step-rate change from a high value with a downhole spinner flowmeter rotation rate of approximately 17 revolutions per second (rps) to a lower value with a flowmeter response of approximately 7 rps. The process can be made to converge rather rapidly for a pressure measurement of a given resolution, as long as the results allow for an acceptable margin of error.įig. When software deconvolution operators are used, trial and error is required to convolve a flow-rate schedule with a pressure function that approximates the true constant rate-equivalent pressure function, thus reproducing the measured pressures. Where p D, the pressure function equivalent to a constant flow rate situation, is obtained by mathematical deconvolution of the pressure from the flow-rate fluctuations. The bottomhole pressure and flow rate are mathematically convolved (coupled) as follows: The pressure-flow convolution involves simultaneous bottomhole flow rate and pressure measurements to correct for the variations of bottomhole pressure caused by flow rate fluctuations during drawdown tests. Pressure flow convolution and deconvolution Determine hydraulic communication between wells.Evaluate workover or stimulation treatments.ĭescriptive reservoir tests are conducted to:.Obtain representative fluid samples suitable for PVT analysis.Measure reservoir pressure and temperature.Identify produced fluids and determine their respective volume ratios.Characterize formation damage and other sources of skin effect.8.3 Vertical extent of fracturing and detecting lost circulation.8.1 Recommendations for temperature profiling.8 Temperature profiles in production and injection wells.7 Using pressure to characterize reservoir fluids.5.2 Packer and multiple-probe tests for vertical interference testing.5.1 Packer probe tests: small-scale drillstem testing.2 Pressure flow convolution and deconvolution.1 Applications of pressure transient tests.While porosity and viscosity are inversely proportional to the radius of investigation. Permeability and shut-in time are directly proportional to radius of investigation. Furthermore, the study was continued to correlate radius of investigation as a function of the parameters mentioned above. This sensitivity would give various radius of investigation. Sensitivity test of several parameters namely viscosity, permeability, porosity, and shut-in time was conducted to analysis the effect of the parameters on the radius of investigation and radial flow time. Since the well test was intended to reach radial flow regime then the viscosity should be reduced from 1069 cp to 66.5 cp for production time of 500 hours or to 24.8 cp for production time of 100 hours. The study was aimed to design a proper Pressure Drawdown Test for N-7 Well using a simulator. Some kind of thermal injection should be performed prior to implementing the operation of Pressure Drawdown Test, where the heat will reduce the viscosity of the reservoir fluid. High viscosity which is an inherent property of heavy oil would give an inconclusive result on a Pressure Drawdown Test. ![]() With this approach there is no need to use over 6th level slots for the Chain lightning as you can just use Spell Perfection to add metamagic on the fly.Įdit: also what Keep Calm and Carrion said. You can add empower to deal 25d6 and then cast a quickened one due to magical lineage. There is not that much room to add metamagic. The area is better than lightning bolt and it already does 15d6 (17d6 if specialized) at your level. One strategy is, instead of lightning bolt as specialized and Perfected spell, is take chain lightning. I recommend a few Dispel Magics and Greater Dispels as the Technic league mages and clerics will quickly start using Resist and Protection from energy. Just fill your 3rd, 4th, and 5th level slots with metamagiced lightning bolts and add extra metamagics with Spell Perfection. Then cast Intensified Empowered Dazing bolt from a 5th level slot. With this you can toss Intensified Empowered Quickened Lightning bolts out of 5th level slot. Extremely useful are Spell Penetration and Greater Spell Penetration and Dazing spell.Īt level 15 Spell specialization will help penetrate SR but it is not as great as it is for lower level caster as you can not get more than 15d6 damage with intensify out of the lightning bolt.Ī definitive must is the Magical lineage trait. If you must skip one, skip Empower and get it as rod. Intensify spell, Empower spell, Quicken spell, Spell Perfection. The very basic blasting feats are: Spell focus, Greater spell focus, The Blockbuster wizard guide will help your cleric also. Use them whenever you're sure you'll have a long day of adventuring you will do astonishing amounts of damage. Of course you will want the highest wisdom headband you can afford.īuy yourself a few blocks of Incense of Meditation. Spend some gold to increase your spells available-A lesser rod of echoing spell is cheaper than three 3rd level pearls of power. The Magical Lineage trait will make adding metamagic to your lightning spell much better, as will wayang spell hunter. ![]() Spell Focus, Spell Penetration, and the Greater version of each give bonuses that double from spell perfection, as does Caster's Tattoo, which you would get from being a tattooed sorcerer. Selective Spell would also be a good choice, as would Empowered. Otherwise, consider Elemental Spell for the last, since it will allow you to bypass electrical damage resistance, which is fairly common. I don't care much for Preferred Spell myself, but if you take it, your third metamagic feat will be Heightened Spell. Consider being a tattooed sorcerer to increase your caster level with evocations if you don't go with dual-blooded, or if your GM allows you to mix the two archetypes.ĭazing and Quickened should be two of the three metamagic feats you pick to qualify for Spell Perfection. Consider being dual-blooded with orc, for another +1 damage per die, or with stormborn, to increase your DC with lightning by 1. ![]() Take one level of sorcerer, bloodline blue dragon, to increase your lightning damage per die by one. |