#.net framework services
Explore tagged Tumblr posts
Text
Top .NET Development Company | Custom .NET Solutions for Enterprises
Looking for a .NET development company? We provide full-stack .NET app development services using Microsoftâs .NET technology. From custom .NET solutions to enterprise-level ASP.NET applications, we deliver scalable and innovative software to meet your business needs. Visit now to know more.
#.net development company#.net development services#.net application development company#best .net application development company#customized .net solutions#microsoft's .net technology#.net development#.net technology#asp.net development services#.net app development services#.net framework services#custom .net application development#enterprise .net solutions#asp.net mvc development services#full-stack .net development#asp.net cloud integration services#asp.net applications#.net solutions#.net core development
0 notes
Text
Why Businesses Trust .NET for High-Performance Apps
Introduction .NET has remained a developer favourite for over two decades, and itâs no surprise why. With its backwards solid compatibility, developers can continue using the same code and libraries, scaling and evolving applications smoothly without extensive rewrites. But did you know that itâs not just developers who appreciate .NET? Businesses do, tooâover 25% of enterprises rely on theâŚ
#.NET enterprise solutions#cross-platform development#custom .NET services#scalable frameworks#secure web development
0 notes
Text
Elevate Your Business with Our Expert .NET Development Services!
đš Are you ready to transform your ideas into robust, scalable applications? Our team of skilled .NET developers is here to make it happen! đš
â
Custom Solutions: Tailored applications that fit your unique business needs. â
Integrated Services: Smooth and secure integration with existing systems. â
Cross-Platform Support: Reach users anywhere with web, mobile, and desktop apps. â
Agile Methodology: We deliver results faster with iterative development.
đ Why Choose Us? ⨠Proven Expertise: Years of experience delivering cutting-edge .NET solutions. ⨠Collaboration Focused: Work closely with our team to bring your vision to life. ⨠Future-Proof Technology: Stay ahead of the curve with the latest advances.
đ Letâs bring your project from ideas to reality! Contact us today for a FREE consultation! đŹ
Email - [email protected] Skype:- skype:virtualcodersindia Website:- https://www.virtualcoders.net/
#dot net development services#tech innovation#Web Development#custom software development#agile development#Code With Us#software engineering#.net developers#.net framework
0 notes
Text
Creating efficient, scalable, and maintainable web APIs is crucial in the dynamic world of web development. Design patterns play a significant role in achieving these goals by providing standardized solutions to common problems. One such design pattern that stands out is REPR, which focuses on the representation of resources consistently and predictably. By adhering to the REPR design pattern, developers can create APIs that are not only easy to use but also robust and adaptable to future changes. Read more...
#ASP.NET Core API Development#Web API Development#REPR Design Pattern#microsoft .net#development libraries and frameworks#software development#web app development#.net development company#.net development#custom angular development company#.net 8#.net framework#.net development services
0 notes
Text
How to Restore Deleted Azure App Service Using PowerShell
In this post, I will briefly take you through how to restore deleted Azure App Service using PowerShell. Before I proceed, letâs talk about Azure App service in detail. Azure App Service is a managed platform created by Microsoft for hosting web applications, mobile backends, and RESTful APIs. You can easily deploy WordPress on Azure App Service. You also use Azure CLI to create App Service andâŚ
View On WordPress
#.NET Framework#Angular App#App Service#App Service Environment#App Service Plan#Azure App Service#Azure CLI#FUnction app#PowerShell#PowerShell Cmdlet#Resource Group
0 notes
Text
Building a Real-time Chat Application with Laravel Development and Pusher
Real-time chat applications are a popular feature for modern web applications, offering instant communication and engagement for users. Laravel development, a robust PHP framework, provides a powerful foundation for building such applications, and when paired with Pusher, a cloud-based real-time messaging service, developers can create dynamic and interactive chat experiences. In this blog post, we'll delve into the process of building a real-time chat application using the powerful combination of Laravel development and Pusher.
What is Pusher?
Pusher is a cloud-based service that allows you to add real-time functionality to your web applications. It provides a simple API that you can use to send and receive messages in real-time. Pusher also provides a number of features that make it easy to build real-time applications, such as:
Channels: Channels allow you to group users together and send messages to them in real-time.
Events: Events are used to trigger actions on the client-side, such as updating the chat interface.
Presence: Presence allows you to track which users are online and offline.
Prerequisites
Before you start building your chat application, you will need to make sure that you have the following prerequisites:
A Laravel 5.5 or later installation
A Pusher account
A basic understanding of Laravel and JavaScript
Setting Up Pusher
Setting the Stage for Real-time Communication: Pusher and Laravel Development
The first step in our journey involves configuring your Pusher account. Head over to the Pusher website and sign up for a free trial. Once you've completed the registration process, you'll need to create a dedicated app. This app will serve as the source for your API keys and secrets, which will become crucial ingredients in your Laravel development workflow. These credentials enable Laravel to connect and interact with Pusher's powerful real-time messaging infrastructure, paving the way for smooth and seamless communication within your chat application.
Next, you will need to install the Pusher PHP server package. You can do this by running the following command:
composer require pusher/pusher-php-server
Once the package is installed, you will need to configure it in your Laravel application. To do this, open the .env file and add the following lines:
PUSHER_APP_ID=your_app_id
PUSHER_APP_KEY=your_app_key
PUSHER_APP_SECRET=your_app_secret
PUSHER_APP_CLUSTER=your_app_cluster
Creating the Chat Interface
The next step is to create the chat interface. This will include the input field where users can type their messages, as well as the chat history. You can use any HTML and CSS that you want to create the chat interface, but it is important to make sure that it is responsive and easy to use.
Bringing Your Chat to Life: JavaScript and Pusher Integration
Once you've established the visual elements of your chat interface, it's time to inject interactivity through JavaScript. This code will leverage the Pusher API to establish a connection with the Pusher service and subscribe to relevant channels designated within your Laravel development framework. This ensures that your chat application remains responsive and updates automatically whenever a new message arrives. By strategically subscribing to specific channels, you can cater to individual user interactions and group conversations, fostering a dynamic and engaging communication experience.
Here is an illustration of how to send and get messages:
JavaScript
var pusher = new Pusher('your_app_key', {
    cluster: 'your_app_cluster'
});
var channel = pusher.subscribe('chat');
channel.bind('message', function(data) {
    // Update the chat history with the new message
});
$('#chat-form').submit(function(e) {
    e.preventDefault();
    var message = $('#chat-message').val();
    $.post('/chat', { message: message }, function(data) {
        $('#chat-message').val('');
    });
});
Use code with caution. Learn more
Deploying Your Chat Application
Once you have finished building your chat application, you will need to deploy it to a web server. You can deploy your application to any web server that supports PHP.
Conclusion
Building a real-time chat application with Laravel development and Pusher is a fantastic way to gain hands-on experience in the exciting realm of real-time web application development. This process not only provides you with valuable technical knowledge but also equips you with the skills to create a practical and engaging application that resonates with your users. Through Laravel development's robust framework combined with the power of Pusher's real-time messaging capabilities, you can build a dynamic chat experience that fosters user interaction and engagement. Let's embark on this journey to explore the construction of a real-time chat application using this potent combination!
#laravel#laravel development company#laravel we devlopment service#laravel framework#.net development#laravel development netherland#laravel development services netherland#laravel php development#laravel web application#laravel php
0 notes
Text
Top 10 Reasons Why ASP.NET Will Speed Up Web Application Development
#web app development#web application#asp .net development services#asp .net web development#asp.net application development#.net development#.net developers#.net framework#evincedev
0 notes
Text
Create Robust, Intuitive, and High Performant Applications with .NET
Develop high-end and pragmatic .Net solutions and increase productivity and output. Our .Net development company will ensure you get the exact results you were desiring for. We provide advanced business solutions ensuring your all requirements are met.
Get Reliable .NET Development Services with Inwizards
At our .NET Development Company, we provide reliable and efficient custom software solutions. We specialize in .NET development, offering a range of services. This includes web application development, cloud application development, customization, and quality testing. Our experienced team of highly skilled developers uses the latest tools and technologies to create innovative tailored solutions.
We are committed to delivering top-notch solutions that are both reliable and efficient. We follow a rigorous .NET Software Development cycle that includes requirements gathering, development, testing, and deployment. Thus, ensuring that each project is delivered on time and within budget. With our extensive experience in .NET technologies, we ensure best practices are used.
We work closely with our clients to ensure their solution meets their business needs. We provide regular progress updates throughout the project and are always available to answer any concerns. At Inwizards, we pride ourselves on delivering high-quality solutions that exceed our client's expectations.
We employ the best Dot Net Development resources to make high-performing industry-specific apps. Take dot net development services today!
#.net developers#.net development#.net framework#.net core#dot net development company#dot net developers#hire .net developers#.net development services#.net development company#Dot Net Development Service#.net software development#web development#web development services#web design services
1 note
¡
View note
Text
Top 20 Important .NET Core Libraries That Every Web Developer Should Know
Verve Systems is a host of excellent and experienced .NET core developers who avail 360-degree development proficiency including services like .NET core migration, .NET core upgradation, .NET core integration, Customization, Maintenance, and Support. Hire .NET core developer from us and be prepared to handle unparalleled and unexpected success for your business.
Get more information visit our website - https://www.vervesys.com/
#vervesystems#360degreedevelopment#mobileapps#softwaredevelopmentcompany#vervesys#.NET#webdeveloper#.NET framework#MVC#ASP.NET#Web and Mobile App Development#IT Services
0 notes
Note
Did you see the picture from the daily mail of the hotel workers carrying Liam's lifeless body to his hotel room? Do you still think the staff shouldn't be held responsible in some way for his death? I'm not blaming them because I understand this was an accidental fall but this wasn't a case of them having to restrain someone high on drugs. He was literally passed out and they chose to physically carry him to his hotel room and leave him alone. That's negligent
My basic politics and beliefs haven't been changed by those pictures anon. I don't think hotel service workers are responsible for the health and wellbeing of very wealthy clients. I think if there is any responsiblity it would lie with the hotel and the leadership of the hotel, not the individuals who were working. I think there's a lot we don't know about what sort of help was and wasn't available and the risks of asking for that help for Liam
I don't want to get fully into the negligence question - because that's a legal framework and I'm not really interested in it. So I'll just say that I think its a long bow to suggest that this particular bad outcome was forseeable.
So I'll say this - it's not easy to know how to respond to someone who is an altered mental state. I know New Zealand isn't well set up for it - either in terms of capacity or breadth of skill. Often here responsibility falls on individuals who know the person, or are just around the person at that time. We don't have a good social safety net, collective response, or ways of supporting the individuals who are responding. I doubt Argentina is any different.
I understand how awful it is to know that Liam could have survived the day if things had just been a little different. But I think it's important not to give into a fantasy of it being easy and there being a right answer. In the sort of society I'd want to live in - then there would always be more than enough resourced teams of emergency addiction and mental health specialists on call who knew how to help someone in crisis without blowing up their lives. There would always be someone to call and they would always get there quickly. There would also be adequate staffing at all service jobs so that it was possible for staff members to attend to someone in crisis early.
We don't live in that world. And blaming individuals who are trying to get paid and keep their jobs under difficult circumstances - for the fact that we don't live in that world - goes against everything I believe in.
#Blaming people who are neither trained nor paid#to do emergency mental health response#for bad outcomes#to me misses the whole point
11 notes
¡
View notes
Text
More than 200,000 people in Southeast Asia have been forced to run online scams in recent years, often being enslaved and brutalized, as part of criminal enterprises that have netted billions in stolen funds. Such âpig butcheringâ operations have largely been concentrated in Myanmar, Cambodia, and Laos, typically rooted in Chinese organized crime groups exploiting instability and poor governance in the region. Though they come at great humanitarian cost, pig butchering scams are undeniably lucrative and, perhaps inevitably, similar operations are now being uncovered on multiple continents and in numerous countries around the world.
A WIRED review of law enforcement and civil society action as well as interviews with numerous researchers show that pig butchering operations that are offshoots of the Southeast Asian activity have emerged in the Middle East, Eastern Europe, Latin America, and West Africa. Many of these expanded operations apparently have links to Chinese-speaking criminals or have evolved in parallel to Chinese Belt and Road Initiative investments, the countryâs massive international infrastructure and development initiative.
In 2023, the FBI had reports of nearly $4 billion in losses from the scams, and some researchers put all-time total global losses at $75 billion or more. Beijing has made a concerted effort in recent months to crack down on pig butchering schemes and human trafficking to scamming centers in the Southeast Asian region, but the activity is proliferating around the world nonetheless.
âAs all sorts of attackers learn that they can make serious money doing this, theyâre going to make those pivots,â says Ronnie Tokazowski, a longtime pig butchering researcher and cofounder of the nonprofit Intelligence for Good. âSo pig butchering is cropping up in more and more countries. Even with all the interventions researchers and law enforcement have done there is little to no sign of this stopping.â
Pig butchering emerged in the last five years and is a type of scam that involves building seemingly intimate relationships with victims. Attacks often start by texting potential targets out of the blue and getting them talking. Then attackers begin to build a rapport and introduce the idea of a special or unique investment opportunity. Finally, victims send fundsâtypically cryptocurrencyâthrough a malicious platform meant to look like a legitimate money management service, and attackers must launder the money from there. All of this takes time and careful planning from a large workforce. Experts say people from more than 60 countries have been abducted and trafficked to Southeast Asian scamming compounds that typically operate with thousands of forced workers. And in recent months, scam centers have been detected around the world as well in different configurations and sizes, but with the same goal.
âOrganized crime groups have basically taken advantage of a favorable situation, a favorable environment for them related to governance challenges, limited enforcement capacities, limited regulations and legislative frameworks,â says Benedikt Hofmann, the deputy head of the United Nations Office on Drugs and Crimeâs Southeast Asia and Pacific office. âAll these ingredients you also find in some other places of the world.â
âWhat weâve seen is criminal groups who are invested in this region here, looking beyond this region for establishing similar operations,â Hofmann says of the international expansion.
The wealthy, authoritarian city of Dubai, within the United Arab Emirates, has emerged since 2021 as the largest epicenter of pig butchering outside Southeast Asia. According to the UN, international migrants comprise more than 88 percent of the UAEâs population, making a uniquely diverse, and potentially vulnerable, workforce readily available.
âDubai is both a destination and also a transition country,â says Mina Chiang, the founder and director of Humanity Research Consultancy, a social enterprise focusing on human trafficking. âWe can see lots of compounds that are actually operating in Dubai itself.â
In July, Humanity Research Consultancy identified at least six alleged scam compounds believed to be operating around Dubai. The researchâbased on testimony from forced laborers, data leaked from a cyberattack, and social media postsâidentified potential compounds around industrial and investment parks. These operations âto the best of our knowledge are managed by Chinese-speaking criminals,â the research says, adding that they operate in a similar way to compounds in Southeast Asia.
âThey call it a typing center. But a huge scam call center,â reads a one-star review left for a location in Dubai on Google Maps. Another says: âMostly poor people from Africa working there and mosltly jailed in Dubai. No matter how much they offer you everything is scammed. Highly suggest never ever go there.â
Dubaiâs police force did not respond to WIREDâs request for comment about potential scam centers located in the city.
Pig butchering operations may have emerged in Dubai because of immigration and workforce dynamics, but in multiple African countries the activity has started to appear because of an existing culture of organized scamming.
In Nigeria, where digital scamming has been a prominent illicit industry for years across numerous platforms, it was all but inevitable that attackers would adopt the conceits and tactics of pig butchering. The scheme is mature enough that there are now readily available prefab cryptocurrency investment platforms, templates, and scripts available for sale online to anyone who wants to get started. A gang that is already used to carrying out romance scams or business email compromise schemes could easily adapt to the premise and cadence of pig butchering.
âIf you look at West Africaâs history with social engineering stuff, itâs a potent mix,â says Sean Gallagher, senior threat researcher at Sophos. âYouâve got a lot of people who have seen this as a way to make a living, especially in Nigeria. And the technology is easily transferable. Weâve seen pig butchering packages for sale that include fake crypto sites and scripts that appear to be tailored to targeting African victims.â
Nigerian law enforcement have been increasingly pursuing cases and even securing convictions related specifically to pig butchering. Gallagher and Intelligence for Goodâs Tokazowski also say that in studying and interacting with scammers, they have seen technical indicators that pig butchering attacks may be coming out of Ghana as well. The US Embassy in Ghana has warned about the potential for financial scams originating in the country.
Pig butchering has cropped up in other regions of Africa as well, with ties to Chinese-speaking criminals. In June, 88 people in Namibia were rescued from a scam center, which had links to Chinese nationals who were reportedly arrested. Meanwhile, local reports also indicated that 22 Chinese nationals were sentenced to jail time in Zambia for their links to local scam centers.
Stephanie Baroud, a criminal intelligence analyst in Interpolâs human trafficking unit, says the policing organization, which has been coordinating law enforcement actions, has seen an increase in international scam centers. Not all of them are linked to criminal groups from Asia.
âWhile sometimes we are noting a link to Asian groups, there are cases where there haven't been,â Baroud says. In some situations, she says, new pig butchering activity around the world seems to be an offshoot of Southeast Asian operations, but unrelated actors appear to be taking the model and adapting it to their resources and expertise.
The scams have emerged in Eastern Europe as well. At least two âfraudulent call centersâ trying to con people into investing in cryptocurrency were uncovered by law enforcement in Georgia this month, with reports saying men from Taiwan were forced into working in the country. Local officials, who did not respond to WIREDâs request for comment, have said in recent years they have prosecuted seven companies involved in call center operations.
Scam compounds have also been broken up in Peru and Sri Lanka. And there has even been alleged trafficking in truly unexpected places like the Isle of Man, a British territory where almost 100 people were working between 2022 and 2023 as part of a pig butchering operation, according to a BBC investigation from August.
âThe Peopleâs Republic of Chinaâorigin criminal groups that are behind these sophisticated forms of scamming are looking to build networks and hubs all around the globe simply because this is so lucrative,â says Jason Tower, the country director for Burma and a long-time security analyst covering China and Southeast Asia at the United States Institute of Peace.
Pig butchering scam centers rely upon multiple layers of criminality to operate, encompassing the recruitment of trafficked people, running scam centers on a day-to-day basis, the development of technology to scam thousands of people, and the sophisticated money laundering required to process billions of dollars. As Chinese authorities have cracked down on Chinese-speaking criminal organizations operating scam centers across Southeast Asia, the groups have likely continued to spread their operations, albeit at a smaller scale.
âI would say it was an intentional hedging strategy, seemingly to diversify the geographic basis of operation and ultimately ensure business continuity,â says John Wojcik, an organized crime analyst at the United Nations Office on Drugs and Crime. âBut at the same time, I think itâs also an immediate reaction to mounting law enforcement pressure and regulatory tightening in this region.â
In addition to the geographic spread of pig butchering operations, researchers note that there has also been a shift in the people targeted by traffickers to âworkâ in scam compounds. âOver the past two years, the countries targeted for recruitment have gradually shifted westward,â says Eric Heintz, a global analyst at human rights organization International Justice Mission.
Many trafficking victims within the early years of pig butchering were based in Southeast Asian countries, but this soon shifted to South Asian nations such as India and Nepal, Heintz says. âWe have since seen recruitment posts targeting East African nations like Kenya and Uganda, and then West African countries like Morocco, and then, most recently, we have seen posts targeting El Salvador.â
As always, the spread and evolution of pig butchering is driven by how profitable it can be. Researchers say that another alarming trend involves people from around the world choosing to go work in scam centers or even being liberated from forced labor and returning to keep working voluntarily. As long as the money keeps coming in, pig butchering will keep spreading around the world.
âFraud is not being seen as a serious crimeânot like drugs, not like terrorism,â Humanity Research Consultancyâs Chiang says. âGlobally, we need to start shifting that idea, because it creates the same kind of damage, and maybe even more because the amount of money we're talking about is so huge. We are racing against time.â
18 notes
¡
View notes
Text
The Federal Communications Commission voted 3â2 to impose net neutrality rules today, restoring the common-carrier regulatory framework enforced during the Obama era and then abandoned while Trump was president.
The rules prohibit Internet service providers from blocking and throttling lawful content and ban paid prioritization. Cable and telecom companies plan to fight the rules in court, but they lost a similar battle during the Obama era when judges upheld the FCC's ability to regulate ISPs as common carriers under Title II of the Communications Act.
đĽł
15 notes
¡
View notes
Text
In the world of software development, one of the key goals is to make our code run faster and more efficiently. This process involves understanding how different parts of our code perform and finding ways to optimize them. One of the tools we use for this is called benchmarking. Let's delve into the fascinating world of performance optimization in .NET, guided by data-driven benchmarking comparisons. Read more
#.NET Benchmarking Comparison#Benchmarking Comparison#.NET Benchmarking#.NET Development#.NET Development Services#.net development company#.net developers#.net 8#.net core#.net maui#.net framework
1 note
¡
View note
Text
As promised, I managed to get rhe flash sale tracking (and new item tracking) working on the new (hopefully cheaper) system.
The previous system I was running was called an Azure App Service. This is essentially a simple version of a full blown virtual machine server. I was not using most of its features that I was paying for because it's an all or nothing deal. Almost all the tools were running as so called webjobs on that server. This is extremely inefficient, but it is really easy to set up.
Now I am moving the tools that are capable of it to a thing called Azure Functions. Its basically the same thing but even more slimmed down and entirely on demand. It's essentially just the webjobs part without the web server side. This allows me to host timed functions, such as the flash sale tracking, without the overhead of an entire server above it. The major thing for Azure Functions is that there is a monthly free grant of 1 million requests or 400000 gigabyte of data consumption. I won't reach either of those limits on a monthly basis. I'll mostly just be paying for storage and database usage now, which will bring hosting cost down drastically!
This is not going to be compatible with things like the discord bot or the website itself for the skin tester. But I have ideas for that as well.
Another upside is that I was finally forced to update from .net framework 4.8 to netcore6. Once I rebuild other parts I have more options such as Linux hosting which is most commonly cheaper compared to windows hosting that I was required to use up to now.
Once I get more things working you will know đŤĄ
19 notes
¡
View notes
Text
End to End
In âEnd to End,â my new column for Locus Magazine, I propose a policy framework for a better internet: the âEnd to Endâ principle (E2E), a bedrock of the original design for the internet, updated for the modern, monopolized web, as a way of disenshittifying it:
https://locusmag.com/2023/03/commentary-cory-doctorow-end-to-end/
If youâd like an essay-formatted version of this post to read or share, hereâs a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2023/03/07/disenshittification/#e2e
The original E2E marked the turning point from telco-based systems where power was gathered at the center, controlled by carriers, to the packet-switched internet, where power moved to the edges. Under the old model, only the network operator could add new features. If you wanted to create, say, Caller ID, you needed to convince the phone company to update its switches to support a new signaling system (and you probably had to rent a Caller ID box from the carrier, too).
But packet-switching made it possible for new services to be created by people at the edges of the network. Once your device was connected to the internet, it could exchange data with any other device on the internet. If someone set up a voice-calling system and you connected to it, they could add Caller ID to it without asking Ma Bell for permission.
End to end was the core ethic of this system: the idea that the telcos that sat beneath these systems should get out of the way of their users, serving only to deliver data from willing senders to willing receivers as quickly, efficiently and reliably as possible.
E2E was a powerful idea, one that truly treated the telcos as utilitiesâââthe plumbing that sat beneath the services, obliged to serve its subscribers by doing their bidding to the extent they could. If you chose to use a internet calling service instead of making phone calls, the carrierâs job was to shuttle those packets around, not to slow them down or block them to funnel you into its rival service.
Thereâs a powerful logic to this: no one rents a phone line because they want to make sure that the carrierâs shareholders are getting the highest possible return on their investment. The reason we buy network connections is to get to the services we value.
We have no duty to arrange our affairs to the benefit of a carrierâs shareholders. If those shareholders are so emotionally fragile that they canât bear the thought of network users making their own choices on which services to use, they should get into a different line of work.
E2E wasnât a law, it was a principle. Principles are useful! They can be embedded in laws (for example, the laws that establish most network providers as common carriers often include an E2E rule), but just as importantly, they can give us a vocabulary for critiquing or designing services: âUgh, I wonât use that service, itâs not end to end,â or âHow can we make this work in an end to end way?â
Principles can be integrated into professional codes of ethics, or procurement rules for public bodies (âOur university only buys end to end servicesâ). Tech groups and publications can use principles to rank competing technologies (âWhich network providers are end to end?â).
Network Neutrality is a way of operationalizing E2E: the idea of Net Neutrality is that carriers should be obliged to treat all traffic the same. If you request Youtube packets from Comcast, Comcast should deliver those packets as quickly and reliably as it can, even though its parent company, Universal, owns several competing services.
Net Neutrality can be treated as a principle (âThis ISP sucksâââit violates Net Neutralityâ) or as a regulation (âThe FCC is fining your ISP because it violated Net Neutralityâ). As a regulation, Net Neutrality has a problem: itâs hard to administer, because itâs very difficult to detect Net Neutrality violations. The internet is a âbest effortâ network, with no service guarantees, so when your Youtube connection starts to jitter, itâs hard to prove that this is because Comcast is screwing with it, as opposed to regular network congestion.
Which brings me to my E2E proposal: end to end for services. Contemporary services have no E2E. If you search for a product on Amazon, Amazon often wonât show you that product until youâve looked at five screensâ worth of other products that have paid Amazon to interrupt your search:
https://pluralistic.net/2022/11/28/enshittification/#relentless-payola
If you hoist an email out of Gmailâs spam folder and add the sender to your address book, Gmail will still send that message to spam, or even block its server. Itâs incredible that we had a Congressional debate about whether Gmail should mark politicians unsolicited fundraising emails as spam but not whether emails from your reps that you asked to receive should be delivered:
https://doctorow.medium.com/dead-letters-73924aa19f9d
Platform creators are workers whose boss is an algorithm that docks every paycheck to punish them for breaking rules they arenât allowed to know about, because if the boss told you the rules, youâd learn how to violate them without him being able to punish you for it. Again, itâs wild that weâre arguing about âshadowbanningâ (a service choosing not to send your work to people who never asked to see it), while ignoring the fact that platforms wonât deliver your posts to people who explicitly subscribed to your feed:
https://pluralistic.net/2023/01/21/potemkin-ai/#hey-guys
Alexander Graham Bellâs first telephone operators were young boys who entertained themselves by deliberately misconnecting calls, putting you in contact with people you never asked to talk to and refusing to connect you with the people you were trying to converse with.
As @brucesterlingâ wrote in The Hacker Crackdown:
The boys were openly rude to customers. They talked back to subscribers, saucing off, uttering facetious remarks, and generally giving lip. The rascals took Saint Patrickâs Day off without permission. And worst of all they played clever tricks with the switchboard plugs: disconnecting calls, crossing lines so that customers found themselves talking to strangers, and so forth.
https://www.mit.edu/hacker/hacker.html
Bell fired those kids. Even the original telecoms monopolist understood that the point of a telephone network was to connect willing speakers with willing listeners.
Todayâs tech barons are much more interested in charging other people to interrupt your consensual communications with nonconsensual and often irrelevant nonsense and ads. This is part of the enshittification cycle: first, the platforms lock you in by giving you a good deal, including feeds that contain the things you ask to see and search boxes that return the thing youâre looking for.
Then, platforms take away your surplus and give it to business customers. They spy on you and use the data to help target you on behalf of advertisers, whom they charge low rates for ads that are reliably delivered. They insert performersâ and media companiesâ posts into your feed, generating traffic funnels that result in clicks to off-platform sites. They offer low fees and even subsidies to platform sellers and creators who produce DRM media, like ebooks and audiobooks.
Users get locked into the platformâââby the collective action problem of convincing their friends to leave, by the collapse of local retail that canât match the investor-funded subsidies of would-be monopolists, by DRM that they are legally prohibited from removing, causing them to lose their investment if they quit the service.
Business customers also get locked to the platform: platform sellers have to sell where the buyers are; publishers and creators have to provide media where the audiences are; advertisers have to run ads on the services theyâve optimized for.
Once everyone is locked in, the platform can fully enshittify, harvesting surpluses from users and business customers for themselves. Platforms can hike fees, charge media companies and creators to reach their own subscribers, block posts with links off-site, insert ads into media (like Audible is doing with paid audiobooks!), and so on.
This is the cycle that E2E seeks to interrupt. E2E for services would dictate that platforms should connect willing speakers and willing listeners. The best match for your search should be at the top of the resultsâââeven if someone is willing to pay more to put a worse match there. Emails should be delivered to people youâve told your provider you want to correspond withââânot sent to a spam folder or blocked.
As with the original E2E, thereâs lots of ways we can use this principle. It can simply be a term for criticizing platforms (âYou arenât sending my posts to the people who follow meâââthatâs a violation of the end to end principle!â). It can be a law (âIt is a deceptive and unfair practice for ecommerce companies to deliberately return search results that are not the best match they can locate for the usersâ queryâ). It can be a punishment (âThe FTC settled with Google today and ordered the company to implement a Gmail feature that permits users to identify senders whose messages will never be blocked or sent to spamâ).
Lots of people are pissed off about Big Tech and many have proposed that we could make it better by treating platforms as âutilities.â But I donât want President DeSantis to run my email provider, or to decide whatâs too âwokeâ for me to see (or post) on social media.
An E2E rule, on the other hand, creates a role for government that doesnât determine who gets to speak or what they get to sayââârather, it ensures that when people speak and to others who want to hear them, the message gets through.
Unlike Net Neutrality, E2E is easy to administer. If I claim that your emails are being sent to spam after I marked you as a sender I want to hear from, we donât have to do a forensic investigation into Googleâs mail servers to determine if Iâm right. You just send me an email we observe where it lands.
Likewise for search: if I search Amazon for a specific product or model number, itâs easy to tell whether that product is at the top of the search results or not.
Same goes for delivery to subscribers: if we suspect that Twitter is shadowbanning postersâââsay, for including their Mastodon addresses in their bios, or linking to posts on Mastodonâââwe just send some test messages and see whether they are delivered.
Beyond administratability, E2E has another advantage: cheap compliance. Lots of the rules weâve created or proposed for service providers are incredibly complex and expensive to comply with. Take rules about âlawful but awfulâ content, which require platforms to somehow determine whether a message constitutes harassment and block it if it does.
These rules require an army of expensive human moderators or a vast, expensive machine learning system, or bothâââso they guarantee that Big Tech will rule the internet forever, because no one else can afford to launch a new service with better community norms and better practices.
By contrast, E2E is cheap to comply with. Trusted-sender lists for email providers, search engines that put best results first, and content delivery algorithms that show you the things you asked to see in the order that they were posted are all solved problems:
https://www.theatlantic.com/ideas/archive/2023/03/social-media-algorithms-twitter-meta-rss-reader/673282
This isnât to say that platforms wouldnât be allowed to offer algorithmic feeds and results. Think of how Tumblr does it: you can choose between a feed called âFollowingâ (posts from people you follow) or âFor Youâ (posts that Tumblr thinks youâll enjoy). Forcing platforms to clearly label their recommendations and give you the choice of controlling your own feed is a powerful check against enshittification.
If you know when youâre in charge and when the platform is driving things, and if you can toggle away from platform-determined feeds to ones that you design, the platform has to be better than you at choosing what you see, or you wonât choose its recommendations.
Platform owners have hijacked the idea that âfreedom of speech isnât freedom of reachâ to justify the now-ubiquitous practice of overriding usersâ decisions about what they want to see:
https://pluralistic.net/2022/12/10/e2e/#the-censors-pen
The Old Internet had lots to going for it. It wasnât perfect, though. While it was easy to find the things you knew you liked, it could be hard to find things you didnât know you liked. Recommendations, whether they come from an algorithm or a human editor, are a source of endless delights. But when a we find something we like through one of those recommendations, we need to know that we can find more from that source if we choose to.
Sometimes itâs nice to scroll an algorithmic feed and get a string of surprises. But we are forced to use those feeds, they will inevitably enshittify, to our detriment, and to the detriment of the people who make the things that please us.
As ever, the important thing about a technology isnât what it does, itâs who it does it for and who it does it to. When we control our feeds, we can choose to let a recommender system do the driving. If weâre locked into a recommendation system, it drives us.
Today (Mar 7), Iâm doing a remote talk for TU Wien.
On Mar 9, you can catch me in person in Austin at the UT School of Design and Creative Technologies, and remotely at U Manitobaâs Ethics of Emerging Tech Lecture.
On Mar 10, Rebecca Giblin and I kick off the SXSW reading series.
Image: Felix Andrews (modified) https://commons.wikimedia.org/wiki/File:Elephant_side-view_Kruger.jpg
CC BY-SA 3.0 https://creativecommons.org/licenses/by-sa/3.0/deed.en
[Image ID: A room full of telephone operators at a switchboard; their heads have been replaced with hacker-in-a-hoodie heads. On the wall behind them is a poster ad for Facebook with the slogan, 'Find Your Facebook Group.' Atop the switchboard stands a small elephant with a bite taken out of its back.]
#pluralistic#enshittification#disenshittification#e2e#end to end#feeds#algorithmic feeds#search#reverse chrono#rss#amazon#net neutrality
104 notes
¡
View notes
Text
Devotional Hours Within the Bible
by James Russell Miller
The Call of the First Disciples (Luke 5:1-11)
The scene of this lesson is the Lake of Gennesaret. âAlthough God has created seven seas,â said the rabbis, âyet He has chosen this one as His special delight.â No body of water on the earth is so sacred to the hearts of Christians, as this little inland sea. Along its shores Jesus walked, wrought, and talked. At that time its shore was a garden, without break, covered with pleasant towns and villages. Desolation now reigns about it. In our Lordâs time, it was covered with fishing boats and vessels of all kinds. A great population then crowded its shores. Now the towns have disappeared, and the boats no longer sail on the beautiful waters. Yet everywhere in the sands, are the footprints of Him who came to save us. âIt is the gem of Palestine, a sapphire fairly set in its framework of hills but more fairly set in the golden words and works of the Son of God.â
In the story of our passage, we have one of the experiences of our Master on this beautiful sea. The people thronged about Him to hear Him speak. The crowd became very great, and that He might speak to the people more satisfactorily, He entered one of the fishing boats that were moored by the shore. The fishermen had left their boats and were washing their nets. Using this fishing boat as a pulpit, Jesus spoke to the people. That little boat had done good service many times before in other ways. It had carried people across the lake, it had been used in fishing but it never had been put to such a use as it was that day, when the Lord preached from its deck, to the throngs on the beach.
We can find pulpits every day from which we can preach to the people about us. The boy can speak at school, or from his place of duty, or in the office where he works. The girl can find a pulpit among her friends, at her daily tasks, in the social group of which she is a member. No one ever yet lacked opportunities to speak for the Master. Often the little sermons we speak along the way, as we walk, or as we ride on the street cars or on the railroad train have more effect, a wider reach of influence, than if we stood up in a church pulpit and made a fine address.
After Jesus had spoken to the people, He asked Simon, the owner of the boat, to push out from the shore into the deep water, and to let down his nets. It seemed to Simon that there could be no use in doing this. He had spent the whole preceding night on the sea, dropping the nets and drawing them up again, each time empty. âWe have toiled all night and have caught nothing,â was Simonâs discouraged answer. This is true of very much of the work that many of us do. We toil hard but come home weary and empty-handed. We drag our nets all night, and in the morning we have only weeds and a few bits of rubbish in our nets.
This is true of what we do in worldly business. The majority of men die poor, with nothing in their hands to show for their toil. Many do the same in their intellectual life. With countless opportunities for learning, they at last die in ignorance. Many people have the same experience in spiritual work. Pastors toil for years, and seem to have no souls in their nets. Teachers work with their classes, and seem to have no results. There is often a sad pathos in the Christianâs life and work. Many of us are like children trying to carry water, in buckets with holes. It runs out as fast as we scoop it up.
Peterâs obedience at this time was very noble and beautiful. According to the rules of fishing, nothing would come of the Masterâs command. Yet Peter did not think of that. The word of Jesus had supreme authority with him. It was not his to ask why, or what good could come of casting the net again. No appeal against the Masterâs word, was to be considered for a moment. So Peter answered without hesitation, âBut because You say so I will let down the nets.â Many of the things our master calls us to do or to endure do not seem best to us at the time. Yet we may always say to Christ, whatever His bidding may be whatever He asks us to do or to suffer, into whatever mystery of trial or pain He leads us, âBut because You say so I will let down the nets.â There need never be the smallest exception to this obedience. Though to our limited vision, it seems that only loss can come out of it, still we should heed the Voice that commands, assured that in spite of all seeming ill there must be good in the end.
The result of the obedience proved the wisdom of the command. âWhen they had done this, their nets were so full they began to tear!â Obeying the master, though it had seemed nothing could come of it, brought its rich reward. Not always do the results come so soon. But obedience to Christâs word always brings good in the end .
We have here an illustration of two kinds of work that done without Christâs direction; and that done in obedience to His word. The one came to nothing; the other yielded bountiful results. The disciples had toiled all night in their own effort and had caught nothing. Then they dropped their nets at the Masterâs bidding and drew them up full. In a wider sense, all that we do without Christâs direction, comes to nothing; while all that we do in His name, yields blessing. Some where and in some way, everything we do for Christ brings blessing. âYour labor is not in vain in the Lordâ (1 Corinthians 15:58). âIn due season we shall reap if we faint notâ (Galatians 6:9).
The effect of this miracle on Peter was remarkable. He fell down at the feet of Jesus and said, âDepart from me! For I am a sinful man, O Lord!â This is a strange scene Peter imploring Jesus to leave his boat. Yet it was Peterâs very love for Jesus, that made him say this. In the miracle, he had had a glimpse of Christâs power. A vision of divine glory always humbles a sincere heart.
A room may be filthy; floor, walls, and furniture stained; but in the darkness one does not see the foulness. Let the light flash in, and ever speck of stain is revealed. We are not conscious of the evil in our own hearts. But when the divine holiness is revealed and flashes its radiance upon us we see our condition, and loathe ourselves! We should seek to see God, for the vision will show us our unworthiness, and then will lead to the cleansing of our lives, to make them more worthy of Him. We never can enter heaven until heaven has first entered into us and filled our whole being with its holiness and purity.
Peter saw in these wonderful words of Christ, the unveiling of divine power. âHe was astonished at the catch of fish.â Every day divine works are wrought before our eyes and we fail to be impressed.
Elizabeth Barrett Browning tells us that while some people see the glory of God in the burning bush and take off their shoes; that others only stand by and pick blackberries! We should teach ourselves to behold God in even the commonest events in our commonest days. Daily life is full of divine goodness, and the evidences of our Fatherâs thoughtfulness and care. He made the flowers, the hills, the trees, the fields, the rivers, the stars. Are there no manifestations of divine power in these works of God? Then, the life of the individual is full of love and power. No person can fail to see in everyday providence, the evidence of Godâs presence and thought. He provides for us. He sends us countless blessings, and supplies all our needs. He brings friends to us with love, with sympathy, with comfort. In the life of each one of us there are frequent occurrences just as remarkable as the miraculous catch of fish! Yet, how few of us take off our shoes and fall down before Christ in wonder!
It is delightful to notice how the fishermen responded to the call of the Master. The call had reached their hearts, and they were not a moment in deciding. They had known Jesus for some time, and were most glad to go with Him. We do not know how much He told them of His plans, of what He wanted them to do. Jesus does not usually give us the details of the life to which He calls us. He only asks us to go with Him; and then, as we follow Him, He shows us the way, step by step. Each day prepares us for the next. One duty done, leads to another.
Jesus is always looking for men. The work of saving the world is still filing His heart and His thought. He wants men who will believe His message. He saw that day in these fishermen, just the kind of men He wanted to go with Him and be trained for the great work He had in hand. They had had a training in their old occupation, which had done much to prepare them for the new work to which they were now called. They had learned patience, persistence, quiet waiting, and diligence in their daily and nightly work on the sea and these qualities would be of use in waiting, watching, and fishing for men. The words of Jesus about fishing contain a little parable. The sea is the world, and men are the fish that are to be caught and taken from it.
The Masterâs answer to Simon showed what we should do with our amazement and adoration. Instead of being paralyzed by the revealing of glory, Simon was to find in it a new call to service. âFear not! From henceforth you shall catch men .â Idle wonder is profitless. Divine revealing should drive us to a fuller consecration and service. The one thing after feelings is to put them into acts. We should all want to catch men and to save them from their sin for eternal life and glory. We should all want to be fishers of men. The boys and girls should seek to draw their companions out of the black sea of sin that they may be saved for heaven.
The response of Simon and of his friends was instantaneous. âThey forsook all and followed Him.â This is just what Jesus asked the rich young ruler to do and what he would not do. Christ may not ask us to give up all in the sense of leaving all; but He does ask us to give up all to Him. He does ask us to believe, to give up body, soul, and property, to go wherever He may send us and to do whatever He wants us to do. Nothing will be lost to us; however, for He will return to us, a hundredfold increase, all that we give up or lose in His cause.
7 notes
¡
View notes