AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |
Back to Blog
Vmware horizon client 5.5 38/12/2023 ![]() I've attached the logs to this discussion, any assistance offered would be most appreciated. I000: Bootstrapper_ExecutePackageBegin: Rolling back package ViewClient圆4 I319: Applied execute package: ViewClient圆4, result: 0x80070643, restart: None ![]() Horizon Client for Windows 5.5 includes the following new features: NTLM group policy settings for the log in as current user feature. The issue is also present in the Chromium-based Edge browser. I'm no expert on logs but this section seems to be relevant to the failed install:Į000: Error 0x80070643: Failed to execute MSI package.Į000: Error 0x80070643: Failed to configure per-machine MSI package. Horizon Client for Windows 5.5.1 includes the following new features: Fixes an incompatibility with USB redirection and the Chrome browser. I've had a look around here at similar issues but none of the fixes seem to have helped so far (changing the permissions on the Hosts file was one of them, no improvement). Now whenever she tries to install it the process stops halfway through with an Installation Failed error. It was previously not listed in her appwiz.cpl so she uninstalled it from her Apps & Features menu (we think she installed from the Windows App store in the first instance, we need it installed from here). It was installed previously but she was experiencing a problem and we thought uninstalling + reinstalling might help. I've been trying to help a colleague get VMware (version 5.4.3 at first, but issue persists with other versions) installed on her Win10 PC. If (-not (Get-Command choco.Hi All, apologies if this isn't the right area for posting this. zip to the filename to handle archive cmdlet limitations # Ensure Chocolatey is installed from your internal repository # $Chocolate圜entralManagementServiceSalt = "servicesalt" # $Chocolate圜entralManagementClientSalt = "clientsalt" # $Chocolate圜entralManagementUrl = " # ii. # If using CCM to manage Chocolatey, add the following: $ChocolateyDownloadUrl = "$($NugetRepositoryUrl.TrimEnd('/'))/package/chocolatey.2.0.0.nupkg" # This url should result in an immediate download when you navigate to it When either Citrix Workspace or VMware Horizon is. # $RequestArguments.Credential = $NugetRepositor圜redential Add VDI plugin auto-update software to standard client installer and updates. # ("password" | ConvertTo-SecureString -AsPlainText -Force) # If required, add the repository access credential here $NugetRepositoryUrl = "INTERNAL REPO URL" # Should be similar to what you see when you browse Your internal repository url (the main one). # We use this variable for future REST calls. ::SecurityProtocol = ::SecurityProtocol -bor 3072 # installed (.NET 4.5 is an in-place upgrade). NET 4.0, even though they are addressable if. The VMware Horizon Client offers better performance and features. # Use integers because the enumeration value for TLS 1.2 won't exist You can connect to your desktop and applications by using the VMware Horizon Client or through the browser. # Set TLS 1.2 (3072) as that is the minimum required by various up-to-date repositories. # We initialize a few things that are needed by this script - there are no other requirements. # You need to have downloaded the Chocolatey package as well. Download Chocolatey Package and Put on Internal Repository # ![]() # repositories and types from one server installation. # are repository servers and will give you the ability to manage multiple # Chocolatey Software recommends Nexus, Artifactory Pro, or ProGet as they # generally really quick to set up and there are quite a few options. # You'll need an internal/private cloud repository you can use. Internal/Private Cloud Repository Set Up # # Here are the requirements necessary to ensure this is successful. Your use of the packages on this site means you understand they are not supported or guaranteed in any way. With any edition of Chocolatey (including the free open source edition), you can host your own packages and cache or internalize existing community packages. Packages offered here are subject to distribution rights, which means they may need to reach out further to the internet to the official locations to download files at runtime.įortunately, distribution rights do not apply for internal use. If you are an organization using Chocolatey, we want your experience to be fully reliable.ĭue to the nature of this publicly offered repository, reliability cannot be guaranteed.
0 Comments
Read More
Back to Blog
Strengths deployment inventory sd8/12/2023 ![]() ![]() You become aware of your blind spots.īut self-awareness on its own is not enough. The assessment highlights your strengths and your overdone strengths. This is what the SDI 2.0 assessment provides. Just like any aspect of emotional intelligence, the first step is increasing self-awareness. What can I do to manage my overdone strengths? The following table indicates how strengths can be perceived by others when overdone: This may cause others to see ourselves in a negative light. Although our intention in using this strength is positive and purposeful, overdoing it can mean we become misunderstood and even cause conflict with others.īeing aware of the potential for us to use our overdone strengths provides us with more choices when we need to dial down the volume or even use a different strength altogether.įor example, the strength of Quick-To-Act can, when overdone and not appreciated by others, becomes perceived as Rash. Sometimes we can overdo a particular strength by using it too much or for too long. The SDI 2.0 assessment tells us how using a strength too much can make us unproductive. What are the overdone strengths as described by the SDI 2.0? However, you can choose another strength such as inclusive to give someone else the opportunity to shine. It gives you the opportunity to choose a different strength to be more effective.įor example, you may have Competitive as being favourite strength. Using the SDI 2.0 offers us choices in how we can use them. Some may be used depending on a given situation and others you may be reluctant to use or even avoid using altogether. The SDI 2.0 enables you to discover these strengths and the reason why you use them. They are the strengths that you use at work and how you prioritise these in your working relationships. In terms of the SDI 2.0, strengths are the things that you bring to the party. What are the strengths and overdone strengths as described by the SDI 2.0? But using our strengths when they are not appreciated by others is damaging. We just need to know when to turn the volume down. Have you ever got into your car in the morning and the music is way too loud? Well, the principle of overdone strengths is very similar. Overdone strengths can cause confusion and, quite often, lead to unnecessary conflict. Using an overdone strength can be counterproductive to what we are looking to achieve. These are strengths that we think are helping but are having the opposite effect. However, the SDI 2.0 also helps us discover our overdone strengths. It shows us how not only to rely on our favourite strengths, but also to use those strengths we have but may not use enough. The SDI 2.0 talks about our strengths and which ones we can use to enable us to be successful. However, sometimes things just don’t work out well because of their actions and the actions of others. We believe that the vast majority of people come to work to do good, meaningful work. What is meant by having too much of a good thing?Īt Beyond Theory we love using the SDI 2.0 with our clients because it fits so well with our philosophy. This video provides more information about the SDI 2.0: ![]() How we can overdo the strengths which can make us less productive and cause conflict with others.How we use our strengths at work to become more effective at what we do.How our behaviour changes when we are challenged and come into conflict with others.This seems to be a very worthwhile cause. Its purpose is to help us improve our relationships at work and beyond. The SDI identifies what motivations we have and how these influence our behaviours towards others. The SDI 2.0 (previously known as the Strength Deployment Inventory) is a short questionnaire which is completed online, based on the work of Dr Elias Porter. when and where we need to temper our approaches. What we like about using the SDI 2.0 is that it lets us discover our overdone strengths as well as our strengths i.e. Strength Deployment Inventory – now known as the SDI 2.0. One of our most popular personality profiling tools is the We have been helping individuals and teams improve their ways of working for the part 10 years. Terms and Conditions for Beyond Theory Limited.Equality of Opportunity & Diversity Policy.Danielle King – Internal Quality Assurance.Webinar: ‘Customer Complaints – how to go from Ouch to.Customer Journey and Customer Service Standard Setting.Customer Service Excellence Plus Training.Customer Service Training Courses & Webinars.To update your business leadership and management Use our Beyond Theory TV video library as a resource 360 Feedback for Leadership Development.Thomas Kilmann Conflict Instrument (TKI).Personality Profiling and Psychometric Testing.Becoming an Engaging Leader – Masterclass.Bespoke ILM Recognised training programmes.
Back to Blog
Chromecast setup wifi disconnected8/12/2023 This password might be obviously stored somewhere on the Chromecast memory and with some access to the filesystem by a kind of jailbreak (for example, the point 1), it could be retrieved and used to connect to my wireless network. Make sure both 5GHz and 2.4GHz SSID names are. It might be possible for someone who can attack the Chromecast to get the wireless network password that the Chromecast was previously connected to. Disable the SoN on the router and change the 5GHz SSID (name) and connect the CwGTW to 2.4GHz SSID or vice versa. Once this is done, it will connect to that access point instead of acting as its own access point. Then the chromecast scans for nearby access points, allowing you to pick one and enter in its password. Even, the worst scenario could be an attacker just connecting to that Chromecast open network and directly run exploits against it. For the initial setup, you install an app on your Android, Windows or mac device, that will find it and connect to the chromecast's AP directly. Step 2: Next, on the remote, press and hold. We don't know how someone else's computer could be infected by malware, the Chromecast could be attacked once that infected computer connects to it (for example, by running wireless exploits against). Step 1: Press the button on the back of the Chromecast, and it will open up the pairing mode on the device, which will notify you via your TV screen. I am having a bit of a problem I was wondering if anyone else is having. The Chromecast could be attacked from a wireless exploit. 1 Good afternoon everyone, I've had a Chromecast for about a week now and I am a big fan. The issue is that I'm away from my apartment for a few days and my Chromecast is probably currently broadcasting an open network that anyone can connect to.Įven if there is no internet connection on that open network, there are two things I'm worried about. If you are facing Slow Wi-Fi, keep dropping and not connecting AP ۱۴۰۰ ۱۳ Chromecast Keeps Disconnecting From WiFi Move Your WiFi Router Closer to Your. I remember that when a Chromecast can't find the network it was connected to anymore, it creates an open network that can be used to reconnect to another wireless network. I suggest resetting the Chromecast again by holding the button for 10ish seconds, then trying again. Then you input your password and you should be disconnected once again when your chomecast connects to your WiFi network. Keep it pressed until it turns white, then release the. After you click setup within the app, your WiFi disconnects and you connect directly to the chromecast. I left my apartment for few days, so I disconnected my wireless router but I forgot to disconnect my Chromecast as well. While its plugged in, hold down the button on the side of the device.
Back to Blog
Simon says game8/12/2023 ![]() The game has countless versions in different countries with Commander, Colonel, Jack, and a few other names replacing ‘Simon’. Here are some fun ideas for playing Simon Says during a Zoom conference:Īll of these are straight-forward directives which will make playing this game online much easier for the students and teachers alike. Zoom is the most popular in current times. Online learning, necessitated by various reasons, requires an audio and video chat service. It allows teachers to imaginatively engage with their students, provides them insights into each student’s abilities, and acts as an icebreaker among the class members. Simon Says makes for an excellent classroom activity. Sing the first five lines of your favorite song.Do two pushups, three jumping jacks, and four kicks. ![]() Touch your earlobe and your opposite knee at the same time.Act like a cat, meow twice, and then sit down.The following few instructions will give you an idea as to how rewarding the game can be for growing children: Understanding and Development of Sportsmanship.Simon Says has unparalleled educational value.īy playing the game creatively and thoughtfully, children can nourish and develop in several crucial aspects and skills:.It can act as a healthy alternative to being glued to phone/TV screens all day.If going outdoors isn’t possible, due to rain, lockdown, or else, it can easily be played indoors, so kids don’t feel stuck.It makes for a great activity to chase away boredom.Be a princess (for boy)/be a prince (for a girl)Įducational Simon Says Commands Benefits of the Gameīesides having great entertainment value, Simon Says has several benefits:.Sit in an invisible chair and try to lift one foot up.Point to the person you have a crush on.Tell everyone the color of your underwear.Give a piggyback ride to the person next to you.Scream your name into the nearest person’s ear.Kill an invisible enemy by waving your magic wand.Roll on the floor while quacking like a duck.Here are some creative and hilarious Simon Says commands kids can use: The game is enmeshed in pop culture, you can find hundreds of references to the game in films, TV, music, and books. Giving impossible commands is considered foul play.If multiple players are eliminated near the end of the game, the player acting as ‘Simon’ wins the game. The player who successfully follows all orders is crowned the winner.Similarly, the player who follows a command that doesn’t begin with the phrase is also removed from the game. The player who fails to follow a directive that is uttered after ‘Simon Says’ is eliminated.For example, ‘Simon says, jump once’ must be obeyed, and ‘Jump once’ must not be. The most important rule is this: any instruction that follows the phrase ‘Simon Says’ must be obeyed, while the instruction that isn’t followed by it must not.‘Simon’ issues instructions to other players, mostly related to physical activities, which have to be obeyed by other players.Known also as ‘Simon Sez’ in the United States, the rules of the gameplay are relatively easy to understand:
Back to Blog
Colombain currency compare to us dollar8/12/2023 ![]() The most recent decision complements 165 goods that had import duties lifted under Decree 307 on March 3. Among the products that will have 0% tariffs are animal feed seeds Urea nitrogen sodium hydroxide magnesium nitrates propionic acid salts citric acid drugs with hormones for veterinary use and insecticides. With inflation pushing 1% in March, compared to 0.5% for the same month last year, and estimate that the year will close above 8%, the Colombian government announced that it will eliminate all tariffs for 12 months on another 39 agricultural products essential in agriculture. In a move to increase borrowing costs, the country’s Banco de la República – Central Bank – raised interest rates last week 1% to 5%, with a further half-percentage point increase expected this month. While a strong peso drives domestic exports, and lowers the price of imported goods, Colombia’s macro-economic forecast over the next quarter remains cautious given inflationary pressures impacted by rising food prices, especially those harvested with foreign manufactured chemicals and fertilizers. ![]() “The conflict in Ukraine has accelerated much more the prices of commodities, greatly favoring the Colombian peso.” “The great trigger has been the increase in the price of commodities, which began shortly before the Russia invaded Ukraine, as well as a rapid recovery in demand for commodities after the shock of Omicron at a global level,” said Alejandro Reyes, chief economist of BBVA Research Colombia to Efe. The Colombian peso has strengthened almost 7% to the dollar since the start of the year. Brazil’s real also rallied Tuesday to a two-year high, closing at 4.6 per dollar. The strengthening of the Colombian peso, which on January 5, 2021, was trading above COP$4,000 to the dollar comes as other Latin American currencies are also heading for strong quarterly earnings given high global demand for oil, coal and industrial metals. ![]() The Colombian peso closed Tuesday at COP$3,730 to the U.S dollar, exhange rate not seen in the country since June 2021.
Back to Blog
Rnp pre amp8/12/2023 ![]() ![]() The Family Nurse Practitioner Residency became accredited through the National Nurse Practitioner Residency and Fellowship Training Consortium (NNPRFTC) in July 2018, demonstrating its commitment to high-quality and rigorous post graduate training. With the incredible support of the Sea Mar organization and surrounding community, Sea Mar’s Family Nurse Practitioner Residency has become a successful and highly-esteemed post-graduate training program. In the summer and fall of 2021 the Everett residents’ home site transitioned from Everett Medical to Sea Mar’s new Lynnwood Medical clinic. Margaret Boyle is dual certified as a family nurse practitioner and psychiatric mental health nurse practitioner, and leads the behavioral health portion of the residency curriculum. The NP residency leadership team welcomed Lindsey Anagnostopoulos, former NP residency graduate, as Everett Site Director in 2019, and Margaret Boyle as Tacoma Site Director in 2020. ![]() The initial clinical site in Seattle increased to host four residents. The expansion included the addition of two new clinical sites in Everett and Tacoma, each with three residents. In 20, the residency was awarded two Health Services and Resource Administration (HRSA) grants, prompting the residency expansion to six residents in 2019 and to ten in 2020. Sea Mar Community Health Centers’ Family Nurse Practitioner Residency began at the Sea Mar Seattle Medical Clinic in October of 2015 under the directorship of Patricia Cleveland, ARNP.
Back to Blog
Winzip alternative8/11/2023 ![]() Here are a few other options you can try: You’ve tried to compress your file with a Zip tool, but the resulting Zip folder still exceeds your size limit for email attachments. What happens if a zip file is still too big to send? In addition, a file that has already been compressed using zip software will not become much smaller if you add it to another zip folder. Certain types of encrypted files also do not compress well. Some kinds of files are already highly compressed, so zipping them will not make them significantly smaller. If you follow the steps above correctly and your file does not seem to be a lot smaller, take a look at the file type. Why won't my file compress to a zip file? Once it is selected, right-click to open the menu and follow the same steps listed above. Simply go to your file management application and single click the folder you’d like to compress to select it. Zipping a folder works just like zipping a file. And the same ZIP tool on the recipient’s computer will allow them to click and open it just like they would any other folder – the contents will automatically be unzipped and return to their original size. Whether you are using a Mac or a Windows computer, you can send your newly created ZIP folder just like you would any other email attachment.
Back to Blog
Conda tensorflow8/11/2023 Setting it to 2 or higher will suppress the warning messages totally.Ĭonfigured by: system: aarch64-conda-linux-gnu Variable 'HDF5_DISABLE_VERSION_CHECK' to a value of '1'. You can, at your own risk, disable this warning by setting the environment You should recompile the application or check your shared library related Linked with a different version of static or shared HDF5 library. This can happen when an application was compiled by one version of HDF5 but The version used by the HDF5 library to which this application is linked.ĭata corruption or segmentation faults may occur if the application continues. The HDF5 header files used to compile this application do not match Warning! ***HDF5 library version mismatched error*** ''.format(*version.hdf5_built_version_tuple) home/seth/miniforge3/envs/geo/lib/python3.6/site-packages/h5py/_init_.py:40: UserWarning: h5py is running against HDF5 1.10.6 when it was built against 1.10.0, this may cause problems 13:43:20.500471: I tensorflow/stream_executor/platform/default/dso_:53] Successfully opened dynamic library libcudart.so.10.2 ![]() Type "help", "copyright", "credits" or "license" for more information. I included the full path to the desired pip3 (anaconda) and it seems to be installed now.īut now there is a new problem: (geo) python (geo) sudo /home//miniforge3/envs/geo/bin/pip3 install -pre -extra-index-url tensorflow (geo) sudo /home//miniforge3/envs/geo/bin/pip3 install -pre -no-cache-dir -extra-index-url tensorflowĮRROR: Could not find a version that satisfies the requirement tensorflow (from versions: none)ĮRROR: No matching distribution found for tensorflow This is how I sorted it out: (geo) which -a pip It turns out that I was overlooking the fact that when I call pip3 as sudo pip3, it is not calling the anaconda installed pip3.
Back to Blog
Southern miss conference realignment8/11/2023 ![]() ![]() Southern Miss is in conference "C" in this possibility.īasically, what is going on is a waiting game to see if any teams from the AAC are invited to the Big 12. When conference "A" needs more teams, they raid conference "B." Conference "B" raids conference "C" and so on. The Southern Miss Golden Eagles are part of what is considered the trickle down effect of conference realignment. ![]() We even have a plan for the AAC absorbing the Big 12, as far fetched as it might seem. With recent word that the Sun Belt would be essentially kicking out Idaho and New Mexico State once their contracts with the conference run out, a whole new round of conference realignment seems to be kicking into gear.Īmong the many rumors that have floated in recently is the rumor that the Big 12 finally wants to go to 12 teams in the conference. Included are the multitude of FCS programs that made the jump to the FBS level like Georgia Southern, Charlotte, Appalachian State, and many more. The Sun Belt would still have Western Kentucky and Middle Tennessee, Conference USA would still have East Carolina and Memphis, and the American Athletic Conference would likely not even exist with the Big East staying around as a full sports conference.Īlas, conference realignment did occur with 28 of the 36 teams from the AAC, C-USA, and Sun Belt moving to a different conference in the last few seasons. Women’s sports include basketball, beach volleyball, cross country, golf, indoor track & field, outdoor track & field, soccer, softball, tennis and volleyball.Imagine a college football where conference realignment of the last few years never took place. Men’s sports include baseball, basketball, football, golf, indoor track & field, outdoor track & field and tennis. The Golden Eagles sponsor 17 varsity sports. The men’s basketball program won the National Invitation Tournament (NIT) in 1987, the softball program appeared in two College World Series in 19 and the baseball team advanced to the College World Series in 2009. The football program has appeared in 26 bowl games all-time. The school has won five NCAA national championships-two in NCAA Division II football in 19 and three individual crowns in track & field. The University of Southern Mississippi, founded in 1910 and located in Hattiesburg, Miss., is a Tier-1 Research University that supports a student population of over 14,000. SOUTHERN MISS | FACEBOOK | INSTAGRAM | TWITTER The ODU baseball team went to the NCAA Tournament twice in the Sun Belt Conference and coach Mark Newman’s 1985 team finished 50-11 and won the Sun Belt title. The ODU’s men’s soccer team won the 1985, 19 Sun Belt championships. The 1984-85 team, coached by Marianne Stanley, won the NCAA Tournament, the last of ODU’s three national titles. The ODU women’s basketball squad won five Sun Belt titles and appeared in eight NCAA Tournaments. The men’s basketball team won Sun Belt regular-season titles in 19 and went to the NCAA Tournament three times and the National Invitation Tournament (NIT) three times while the Monarchs were members of the Sun Belt Conference. ODU was a member of the Sun Belt Conference from 1982-1991 and enjoyed success in a wide range of sports. Women’s sports include basketball, field hockey, golf, lacrosse, rowing, soccer, sailing, swimming, tennis and volleyball. Men’s sports include baseball, basketball, football, golf, soccer, sailing, swimming and tennis. The football program has appeared in two bowl games-winning the 2016 Bahamas Bowl, 24-20, over Eastern Michigan and falling to Tulsa, 30-17, in the 2021 Myrtle Beach Bowl. Athletically, the program claims 28 team national championships-15 in sailing, nine in field hockey, three in women’s basketball and one in men’s basketball-and four individual crowns-three in wrestling and one in tennis. Old Dominion University, founded in 1930 and located in Norfolk, Va., supports a student population of over 24,000. OLD DOMINION | FACEBOOK | INSTAGRAM | TWITTER Women’s sports include basketball, cross country, golf, indoor track & field, outdoor track & field, soccer, softball, swimming & diving, tennis and volleyball. Men’s sports include baseball, basketball, cross country, football, golf and soccer. The Thundering Herd sponsors 16 varsity sports.
Back to Blog
Purple tree frog species8/11/2023 ![]() The secretion on the frogs skin is lethal and if a predator even licks the skin the result is certain death. The tadpoles stay in rainforest pools or in leaf crevices which are flooded with water and feed upon unfertilised mosquito and insect eggs until they develop into frogs.Īlthough these type of frogs are only tiny, some are deadly poisonous. The sticky mucus also keeps them moist during their long journey to the forest canopy where they will be safe from predators. When newly hatched, the tadpoles climb on the mothers back and are held there safely by a sticky mucus. The female Poison Arrow Frog lays her eggs on the land, about 4 – 6 at a time. Poison Arrow Frogs usually live on the forest floor but when breeding they venture into the forest canopy. However, more than 100 toxins have been identified in the skin secretions of some Poison Arrow Frogs. Most species of Poison Arrow Frogs are not toxic to animals and humans. There are about 220 species of Poison Arrow Frogs. ![]() Poison Arrow Frogs are recognised by their beautiful bright colors, yellow, black, blue, orange, green and red. Most Poison Arrow Frogs are the size of an adult humans thumbnail, about half an inch to one inches long. Poison Arrow Frogs are usually found in Central and South American rainforests, near water sources. Purple Frogs live in close proximity to their regular termite prey as this provides easy hunting and is also beneficial to the Purple Frog as the conditioned soil around a termite mound provides a better habitat for the Purple Frog then that of regular soil.Poison Arrow Frogs or Poison Dart Frogs is the common names of the ‘Dendrobatidae’ family of small, diurnal frogs. Purple Frogs do not emerge to hunt, all hunting takes place underground and the Purple Frog most likely rely on smell for hunting as they have very poor eyesight. The pronounced snout of the Purple Frog works as a kind of ‘battering ram’ which they use to break their way into underground termite mounds. The diet of the Purple Frog is almost exclusively termites with the exception of the occasional worms and ants. ![]() At this time both male and female Purple Frogs can be observed collection in ponds or the banks of streams (although there have only been 3 recorded females observed) where they will breed and the larger female will lay her eggs in the pond or stream. The only time the Purple Frog emerges from underground is in the monsoon season where they emerge to mate. Purple Frog in monsoon season Purple Frog in monsoon season As the Purple Frog spends most of its life underground it is an expert burrower making use of growths on its hind limbs to aid in burrowing. The head of the Purple Frog is very small compared to its body an the same is true with its limbs. Reaching around 7 centimeters in length the Purple Frog has a mixed coloration of purple and gray and is somewhat bloated in appearance. It is believed that the Purple Frog and its closest relative the Sooglossidae family’s ancestors shared that earth with dinosaurs for around 70 million years before splitting down two distinct evolutionary paths all before the firt human ancestors even emerged.Īlthough you would have to be extremely lucky to come across a Purple Frog (as only 135 have been recorded), the Purple Frog should be easy to identify due to its unique characteristics. Currently the Purple frog is listed as endangered because the growth of deforestation is destroying its habitat. Evolving from the amphibian family Nasikabatrachidae, the Purple Frog is a very recent discovery, having being discovered in India in 2003 making the Purple Frog the first new family of frogs to be discovered since 1926. The Purple Frog is a product of isolated evolution that has been taking place for over 130 million years. |