#CMS Implementation
Explore tagged Tumblr posts
Text
#Content Management systems(CMS)#CMS Solution#CMS Implementation#Headless and traditional CMS#Content Strategy
0 notes
Text
We develop supermodern real-time websites, e-shops and web applications. From simple microsites to complex system solutions.
We are bainry.
#realtime#website#ecommerce#application#web development#cms development services#crmsolutions#erp implementation#automation
2 notes
·
View notes
Text
Oh god...still working on policy edits because that's never going to end, there's so much you gotta cover in a policy and I looked at the 'Information Requirements' appendix for Spectrum and
...I think we're gonna need a bigger spreadsheet.
#personal#museum work#collections work#spectrum#so many units of information#I wish we could afford a real CMS#how in the holy frog am I gonna gather and record all of this#AND write all the procedures#AND make sure the inventory is actually correct#AND implement a system to keep everything updated#AND find and choose and install environmental monitoring systems#AND contact all the lenders to get them on max three-year contracts#AND dig up the records from the Board about acquisitions from before I was there#might delete this later as it feels like tattling#but oh god they need like 3 more of me for maybe 2-3 years at least I think#or preferably someone better who knows what they're doing more#if they don't get funding to renew my contract after this year I might just keep coming back anyway#not gonna let my work go to waste#I will get us accredited or I will die trying#they'll have to chase me out from the office with a broom#'you're not authorised to access these documents! scat!'#me: *growling under a desk clutching the accession register to my chest*
1 note
·
View note
Text
हिमाचल सरकार लागू करेगी बागवानी नीति, 82,500 लोगों को मिलेगा रोजगार; सीएम सुक्खू
हिमाचल सरकार लागू करेगी बागवानी नीति, 82,500 लोगों को मिलेगा रोजगार; सीएम सुक्खू #News #RightNewsIndia #RightNews
Himachal News: मुख्यमंत्री ठाकुर सुखविंद्र सिंह सुक्खू ने आज यहां बागवानी विभाग की एचपी शिवा परियोजना की समीक्षा बैठक की अध्यक्षता करते हुए कहा कि हिमाचल प्रदेश देश में बागवानी नीति लागू करने वाला पहला राज्य बनेगा। इसका उद्देश्य राज्य में बागवानी उत्पादन को बढ़ाना और प्रदेश को फल राज्य बनाना है। मुख्यमंत्री ने कहा कि 1,292 करोड़ रुपये की यह परियोजना राज्य के सात जिलों में 6 हजार हेक्टेयर क्षेत्र…
0 notes
Text
Step-by-Step Guide to Creating an Effective HubSpot Implementation Plan
Implementing HubSpot can significantly enhance your marketing, sales, and customer service processes. This powerful platform integrates various tools and features designed to streamline workflows, improve customer engagement, and drive growth. However, achieving a seamless transition requires a well-thought-out HubSpot Implementation Plan. Without a detailed plan, the process can become overwhelming, leading to inefficiencies and missed opportunities.
This comprehensive guide will walk you through the necessary steps, ensuring a successful implementation from start to finish. Whether you are new to HubSpot or looking to optimize your current setup, this guide will provide valuable insights and actionable strategies. The blog will cover various aspects of the implementation process, including the essential hubspot implementation checklist that will help you stay organized and on track. Additionally, we will explore the critical role of a hubspot implementation specialist in providing expert guidance and support throughout the journey. Finally, we will delve into leveraging hubspot cms features to maximize your content management capabilities and enhance your marketing efforts.
Step 1: Understanding Your Needs
The first step in creating an effective HubSpot Implementation Plan involves understanding your business needs. This phase requires a thorough assessment of your current processes, identifying areas where HubSpot can provide the most value.
Key Considerations:
Evaluate existing marketing, sales, and customer service workflows.
Identify pain points and inefficiencies.
Define specific goals for implementing HubSpot.
Step 2: Engaging a HubSpot Implementation Specialist
A hubspot implementation specialist can provide invaluable expertise during the setup process. Their experience with hubspot crm implementation and other HubSpot tools ensures that your implementation is both efficient and effective.
Benefits of Hiring a Specialist:
Customized implementation strategies tailored to your business.
Expertise in configuring and optimizing HubSpot tools.
Ongoing support and troubleshooting.
Step 3: Developing a HubSpot Implementation Checklist
A detailed hubspot implementation checklist is crucial for a structured and organized setup process. This checklist should cover all aspects of the implementation, from initial setup to final testing.
Essential Items on the Checklist:
Account and user setup.
Integration with existing tools and systems.
Customization of properties and fields.
Data migration and cleanup.
Setting up workflows and automation.
Step 4: Setting Up Your HubSpot Account
The next step in your HubSpot Implementation Plan is setting up your HubSpot account. This involves configuring your account settings, adding users, and establishing user permissions. To ensure nothing is overlooked, it is essential to refer to your hubspot setup checklist during this process.
Key Actions:
Create your HubSpot account and choose the appropriate subscription plan.
Add team members and assign roles.
Configure account settings, including branding and company information.
Step 5: Integrating HubSpot with Existing Systems
Integration is a critical component of a successful HubSpot implementation. Ensuring that HubSpot works seamlessly with your existing systems will streamline your operations and enhance data flow.
Integration Steps:
Identify systems that need integration (e.g., CRM, email, marketing automation).
Use HubSpot’s native integrations or third-party tools.
Test integrations to ensure data accuracy and functionality.
Step 6: Customizing HubSpot for Your Business
Customizing HubSpot to fit your specific business needs is essential for maximizing its potential. This involves tailoring properties, fields, and workflows to align with your processes.
Customization Actions:
Create custom properties and fields to capture relevant data.
Set up workflows and automation to streamline processes.
Customize dashboards and reports to track key metrics.
Step 7: Migrating Data to HubSpot
Data migration is a critical step in the hubspot implementation process. Ensuring that your data is accurately transferred to HubSpot will provide a solid foundation for your operations.
Data Migration Process:
Clean and prepare your data for migration.
Use HubSpot’s data import tools or engage a specialist for complex migrations.
Validate and test the migrated data to ensure accuracy.
Step 8: Leveraging HubSpot CMS Features
HubSpot offers a robust content management system (CMS) that can significantly enhance your marketing efforts. Utilizing hubspot cms features will enable you to create, manage, and optimize your content effectively.
Key CMS Features:
Drag-and-drop editor for easy content creation.
SEO tools to optimize content for search engines.
Personalization features to tailor content for different audience segments.
Step 9: Training Your Team
Training is a vital component of a successful HubSpot implementation. Ensuring that your team is proficient in using HubSpot will maximize the platform’s benefits. Partnering with a b2b hubspot agency can provide specialized training tailored to your business needs, further enhancing your team’s skills and proficiency.
Training Strategies:
Provide comprehensive training sessions for all users.
Utilize HubSpot’s extensive library of training resources and certifications.
Offer ongoing support and advanced training as needed.
Step 10: Monitoring and Optimizing Your Implementation
The final step in your HubSpot Implementation Plan involves continuous monitoring and optimization. Regularly reviewing your setup and making necessary adjustments will ensure long-term success.
Optimization Techniques:
Regularly review and update workflows and automation.
Monitor key metrics and adjust strategies as needed.
Stay updated with new HubSpot features and best practices.
Conclusion
Creating an effective HubSpot Implementation Plan requires careful planning and execution. By following the steps outlined in this guide, you can ensure a smooth and successful implementation. Engaging a b2b hubspot agency or hubspot implementation services can further enhance your implementation process, providing expert guidance and support.
For businesses looking to optimize their HubSpot setup, leveraging the expertise of a hubspot implementation specialist and utilizing the comprehensive hubspot setup checklist will be crucial. Additionally, fully utilizing hubspot cms features will enable your marketing team to create and manage content efficiently, ultimately driving better results for your business. Engaging hubspot implementation services can further enhance the process, providing expert guidance and support to ensure a smooth and successful implementation.
With a well-executed HubSpot implementation, your business will be well-equipped to streamline operations, enhance customer relationships, and achieve your marketing and sales goals.
#HubSpot Implementation Plan#HubSpot#HubSpot CMS#hubspot automation#hubspotcms#hubspot agency#hubspotcrm#HubSpot Agency in Cincinnati#HubSpot Agency in Ohio#Custom CMS Solutions#custom cms development services#custom cms development company
0 notes
Text
Securing Your Website: Best Practices for Web Developers
As the digital landscape continues to evolve, website security has become a paramount concern for businesses and individuals alike. With cyber threats becoming increasingly sophisticated, it is crucial for web developers to adopt robust security measures to safeguard their websites and the sensitive data they handle. In this article, we'll delve into the best practices that web developers can implement to enhance the security of their websites and protect against potential threats.
Introduction
In today's interconnected world, websites serve as the digital storefront for businesses, making them vulnerable targets for cyber attacks. From data breaches to malware infections, the consequences of a security breach can be severe, ranging from financial loss to damage to reputation. Therefore, prioritizing website security is essential for maintaining the trust and confidence of users.
Understanding Website Security
Before diving into best practices, it's crucial to understand the importance of website security and the common threats faced by websites. Website security encompasses measures taken to protect websites from cyber threats and unauthorized access. Common threats include malware infections, phishing attacks, SQL injection, cross-site scripting (XSS), and brute force attacks.
Best Practices for Web Developers
Keeping Software Updated
One of the most fundamental steps in website security is keeping all software, including the content management system (CMS), plugins, and server software, updated with the latest security patches and fixes. Outdated software is often targeted by attackers due to known vulnerabilities that can be exploited.
Implementing HTTPS
Implementing HTTPS (Hypertext Transfer Protocol Secure) encrypts the data transmitted between the website and its users, ensuring confidentiality and integrity. HTTPS not only protects sensitive information but also boosts trust among visitors, as indicated by the padlock icon in the browser's address bar.
Using Strong Authentication Methods
Implementing strong authentication methods, such as multi-factor authentication (MFA) and CAPTCHA, adds an extra layer of security to user accounts. MFA requires users to provide multiple forms of verification, such as a password and a one-time code sent to their mobile device, reducing the risk of unauthorized access.
Securing Against SQL Injection Attacks
SQL injection attacks occur when malicious actors exploit vulnerabilities in web applications to execute arbitrary SQL commands. Web developers can prevent SQL injection attacks by using parameterized queries and input validation to sanitize user inputs effectively.
Protecting Sensitive Data
It's essential to employ encryption techniques to protect sensitive data, such as passwords, credit card information, and personal details, stored on the website's servers. Encrypting data at rest and in transit mitigates the risk of data breaches and unauthorized access.
Regular Security Audits
Conducting regular security audits helps identify vulnerabilities and weaknesses in the website's infrastructure and codebase. Penetration testing, vulnerability scanning, and code reviews enable web developers to proactively address security issues before they are exploited by attackers.
Choosing a Secure Hosting Provider
Selecting a reputable and secure hosting provider is critical for ensuring the overall security of your website. When evaluating hosting providers, consider factors such as security features, reliability, scalability, and customer support.
Evaluating Security Features
Choose a hosting provider that offers robust security features, such as firewalls, intrusion detection systems (IDS), malware scanning, and DDoS protection. These features help protect your website from various cyber threats and ensure continuous uptime.
Ensuring Regular Backups
Regularly backing up your website's data is essential for mitigating the impact of security incidents, such as data breaches or website compromises. Choose a hosting provider that offers automated backup solutions and store backups securely offsite.
Customer Support and Response to Security Incidents
Opt for a hosting provider that provides responsive customer support and has established protocols for handling security incidents. In the event of a security breach or downtime, prompt assistance from the hosting provider can minimize the impact on your website and business operations.
Implementing Firewall Protection
Firewalls act as a barrier between your website and external threats, filtering incoming and outgoing network traffic based on predefined security rules. There are several types of firewalls, including network firewalls, web application firewalls (WAF), and host-based firewalls.
Configuring and Maintaining Firewalls
Properly configuring and maintaining firewalls is crucial for effective security. Define firewall rules based on the principle of least privilege, regularly update firewall configurations to reflect changes in the website's infrastructure, and monitor firewall logs for suspicious activity.
Educating Users about Security
In addition to implementing technical measures, educating users about security best practices is essential for enhancing overall website security. Provide users with resources, such as security guidelines, tips for creating strong passwords, and information about common phishing scams.
Importance of User Awareness
Users play a significant role in maintaining website security, as they are often the targets of social engineering attacks. By raising awareness about potential threats and providing guidance on how to recognize and respond to them, web developers can empower users to stay vigilant online.
Providing Training and Resources
Offer training sessions and educational materials to help users understand the importance of security and how to protect themselves while using the website. Regularly communicate updates and reminders about security practices to reinforce good habits.
Monitoring and Responding to Security Incidents
Despite taking preventive measures, security incidents may still occur. Establishing robust monitoring systems and incident response protocols enables web developers to detect and respond to security threats in a timely manner.
Setting Up Monitoring Tools
Utilize monitoring tools, such as intrusion detection systems (IDS), security information and event management (SIEM) systems, and website monitoring services, to detect abnormal behavior and potential security breaches. Configure alerts to notify you of suspicious activity promptly.
Establishing Incident Response Protocols
Develop comprehensive incident response plans that outline roles, responsibilities, and procedures for responding to security incidents. Establish clear communication channels and escalation paths to coordinate responses effectively and minimize the impact of security breaches.
Securing your website requires a proactive approach that involves implementing a combination of technical measures, choosing a secure hosting provider, educating users about security best practices, and establishing robust monitoring and incident response protocols. By following these best practices, web developers can mitigate the risk of security breaches and safeguard their websites and the sensitive data they handle.
#website security has become a paramount concern for businesses and individuals alike. With cyber threats becoming increasingly sophisticated#it is crucial for web developers to adopt robust security measures to safeguard their websites and the sensitive data they handle. In this#we'll delve into the best practices that web developers can implement to enhance the security of their websites and protect against potenti#Introduction#In today's interconnected world#websites serve as the digital storefront for businesses#making them vulnerable targets for cyber attacks. From data breaches to malware infections#the consequences of a security breach can be severe#ranging from financial loss to damage to reputation. Therefore#prioritizing website security is essential for maintaining the trust and confidence of users.#Understanding Website Security#Before diving into best practices#it's crucial to understand the importance of website security and the common threats faced by websites. Website security encompasses measur#phishing attacks#SQL injection#cross-site scripting (XSS)#and brute force attacks.#Best Practices for Web Developers#Keeping Software Updated#One of the most fundamental steps in website security is keeping all software#including the content management system (CMS)#plugins#and server software#updated with the latest security patches and fixes. Outdated software is often targeted by attackers due to known vulnerabilities that can#Implementing HTTPS#Implementing HTTPS (Hypertext Transfer Protocol Secure) encrypts the data transmitted between the website and its users#ensuring confidentiality and integrity. HTTPS not only protects sensitive information but also boosts trust among visitors#as indicated by the padlock icon in the browser's address bar.#Using Strong Authentication Methods#Implementing strong authentication methods
0 notes
Text
#vozo#ehr pricing models#average cost of patient portals#cms patient portal requirements#patient portals software#patient portal software#ehr cost#billing software for mental health professionals#cost of implementing ehr#best ehr software for mental health
0 notes
Text
rerouting the US military budget to my bank account so i can buy AEW
#im going to re-hire CM Punk#and sonny kiss#and fuego del sol#fuego deserves better!!!!!!!#all main belts are unisex but the womens championship still exists#and now there's a mens championship to make it even#juice and mjf are both getting a short suspension and sensitivity training#im implementing oversight teams to make sure that shit doesnt happen again#also to make sure that nobody wrestles while seriously injured and hurts themself more#also im firing saraya immediately#and the elite will no longer be EVPs
0 notes
Text
laundry list of lusail track's sins:
the FIA changes track limits on turns 12/13 by around 80 cm to try limit damage to tyres (this leads to the addition of an extra 10 minute practice session directly before qualifying for the sprint race. on a weekend with only 1 hour of free practice anyway)
the FIA implements limit of a maximum of 18 laps on any 1 set of tyres due to the curbs & track surface literally shaking the tyres to the point of structural damage (this leads to a minimum of 3 pitstops for all drivers during the race)
nico rosberg reports that pirelli informed the FIA of possible tyre issues in Qatar and the warning was reportedly ignored (he revealed this live on Sky F1)
george russel opens his visor during pitstops to try get some air onto his face
both george russel and lando norris are recorded fanning themselves and steering with their wrists at 300 km/hr down the main straight due to heat
george russel reports after the race that he felt as though he was going to pass out multiple times. he felt as though he was in a sauna from around lap 20, except he had no way to escape the heat as someone in a sauna can
logan sargeant retired due to feeling ill, likely exacerbated due to the heat. he was carried out of the garage by his mechanics
max verstappen and oscar piastri are both unable to remain standing in the cool down room after finishing ("does anyone have a wheelchair?")
alex albon has to be helped out of his car after finishing the race
alex albon was then taken to the medical centre and treated for acute heat exposure
fernando alonso asks for water to be poured on him during a pit stop as his 'seat is burning' him
fernando alonso then reports after the race that he has a legitimate burn on the left side of his ass due to the heat
esteban ocon reports beginning throwing up in his helmet on lap 15, and this then continuing for two laps (and does so only at the end of the race)
lance stroll is taken in an ambulance for medical attention after finishing the race
lance stroll then says that he ended up with so many track limits infringements within the last five laps because of the fact that he could no longer see the white line due to how often he was passing out in high speed corners
valtteri bottas described the race as "torture" after finishing
yuki tsunoda reports that he opened his visor to try to cool down his face and instead of air, sand flew in
charles leclerc says he saw many drivers appearing seriously unwell in parc ferme after the race
charles leclerc also describes the race as being "twice as bad as singapore"
nico hulkenberg left the media pen after only two questions as he desperately needed to cool down
lando norris reports that 2 or 3 drivers took themselves to the medical centre because of dehydration concerns. several fainted once inside
jack doohan says that the lack of action and radio messages during the race is likely due to the lapses in cognition from severe dehydration due to heat
#hey guys. this is insane#jack doohan#valtteri bottas#george russel#fernando alonso#yuki tsunoda#esteban ocon#max verstappen#lando norris#lance stroll#oscar piastri#qatar gp 2023#f1#formula 1#beth posts#tw vomit
2K notes
·
View notes
Text
@adampage this fixed my day thank u
are they getting us angry so we get happy when punk comes back?
20 notes
·
View notes
Text
0 notes
Text
Supermodern real-time websites.
We develop supermodern websites
built on real-time technologies. Today, almost everyone makes modern websites. We take them to a higher level.
#website#webdevelopment#webdesign#realtime#webhosting#web development#sites#programming#cmsdevelopment#cms integration#headless cms#erp implementation#erp#erp systems#crmsolutions#crm software#crm#ui#ui ux design#uidesign#ux#ux desgin
1 note
·
View note
Text
Ladybugs — CM; Jack & male!teen!Reader.
– Small piece of ladybugs, just fluff no real warnings except Jack causes concern. That's about it.
– Author's note; haven't been writing much in general, but now that school officially out have a blurb of domestic bro/son! reader & the hotchner family. :') I made this like a few months ago and forgot about it, it was back then prompt based that was taken from this list of prompts lol.
Edit // I keep writing Jessica's name as Veronica, that's the only edit that's been made 🧍
Honestly, it wouldn't have been such a big deal if the small boy was late for a few tens of minutes only, however, it had been two hours and neither R or Jessica knew where the eight year old was. Now, R wasn't initially as worried as his aunt was for his younger brother, the boy was eight but wasn't stupid by any means after all. Sticking to a pattern of usually on time right after school home to at least drop his school back off before asking to hang out with his friends without a fail. Something that had been implemented as a routine by both Veronica and their dad due to the lingering fears.
So calls were made to the friends of Jack as R wandered the streets and general routes that were usually taken by the boy to school. funnily enough, not far from the school building R finally saw Jack with a group of his friends huddled together around the decorative bush that lined the school yard. it seemed to him that his family wasn't the only one to realize their kid was missing as he saw a few parents lurking around that he recognize to be Jack's friend's parents. So he could already tell that Veronica most likely had been alerted at where her nephew was.
Amused as R couldn't help but break a small smile as he neared them, they were intently staring at something in their hands and upon closer look he realized that Ladybugs were finally around.
"Yo, Jack," R started as he got the eight year old's attention, honestly he couldn't find a reason to be as angry as one would think as he saw Jack's face light up, "Why didn't you come straight home, Jessica's worried."
Saying nothing at the concern at hand as Jack ran up to his brother, happily just presenting the small black spotted ladybugs to him "Look! the ladybugs woke up, there's a bunch there." pointing to where his friends were as the little boy smiled happily, honestly, he seemed so carefree to R as he the older boy gave a small chuckle, "Yeah, I see them Jack. But buddy, did you hear what i just said?"
nodding his little head as Jack gave him a small look, "Yeah, and i'm sorry," he gave a brief apology before offering his hand where a couple of the ladybugs resided on, "BUT! ladybugs!" he declared proudly still, very much with the intent of it being a good reason to be late for the whole two hours.
"yup, i know buddy. but that's not a good enough reason to be two hours late, Jessica was really worried about you." R explained as he watched the boy's bright smile lessen a bit as he gave a curtly nod of his head as he mumbled a bit as an answer; "yeah, i'm sorry. I didn't mean to worry you or her." looking up at R then as he asked, "Do I have to come home now?"
"Yeah," Nodding as R spoke with a small smile that feigned some somberness to it, "you gotta come home, now." straightening a bit as he took his phone out, feeling it vibrating in his pocket, "You can spend some time tomorrow with the ladybugs with your friends. besides, they aren't limited to the school's bush fence, you can find some at our building's bushes as well." he offered a hand to his little brother after speaking as he took the phone call, Jessica had been calling him for a few good attempts now.
"I've got him..." R answered the phone as he informed her, before giving a brief nod to the phone.
meanwhile, Jack was poking and prodding a bit at the few ladybugs on his arms. smiling happily as one of them climbed to the tip of his fingers and flew off, the other not far behind once finding a nice high place to fly off. giving a brief toothy smile as he waved his goodbyes to the bugs as he turned to his brother, looking up at the other boy as he took his extended hand.
"Yeah, we're coming. thanks, bye."
Oh, the boy's dad was going to have a good laugh about this. Maybe after the safety lecture.
#male reader#jack hotchner imagine#jack hotchner#criminal minds x male reader#criminal minds x teen!reader#teen!reader#criminal minds blurb#criminal minds x reader#criminal minds imagine#criminal minds#criminal minds jack hotchner#criminal minds hotch#aaron hotchner#aaron hotchner blurb#aaron hotchner x reader#son!reader#sibling!reader#masc reader#x male reader#platonic#criminal minds fluff#criminal minds fanfiction#🗞️. original
54 notes
·
View notes
Note
AITA for not comforting a child after her science project didn't work?
( 💞💥 to find)
Okay this was a while ago but I still think about it sometimes and I'm genuinely unsure of if I did the right thinh.
So I (15F at the time) was a part of a science league thing facilitated by my school. Basically, you would meet after school once a week to study/work on projects, and then go to a competition in the spring against other schools. There were a bunch of different categories and activities but they were primarily separated into ones you had to study for (and would then take a test on) or build for (like a wheeled vehicle or a model plane, which would be graded). It was really fun and low-key compared to the sports programs at my school, so I liked it a lot.
A friend of mine, who we'll call S (15F) was also in the science league. We did a lot of study based competitions together, and usually placed in the competitions. During our third year, her youngest sister, M (12ish), joined the league. She was a really sweet and smart kid, and she was interested in trying a building based event. You needed two people to enter an event, so I volunteered to build a marble rollercoaster with her. M also grouped up with a girl in her grade for another building project (I think it was a plane).
Because M was doing two building events (which were predictably a lot more time consuming than the study events) and the school musical, we agreed I would create the plans for the rollercoaster and get the materials together. Now, each building events came with a printed copy of parameters and optional features that could get us bonus points. I decided on attempting for three bonus features (two jumps and a loop). Between designing on paper, adapting for the parameters, measuring out the track lengths, and gathering materials (that of which I had to switch out half way through), the whole process took me about four months to complete, and that was just the planning. We were getting pretty close to the competition date when we started to actually assemble the damn thing (at this point she had finished up her other stuff and was able to help me more consistently), and we were having a lot of issues with getting the track pieces to fit together. As I remember it, the problem came from having to fold the track over a bunch of times so it would stay in the 30cm-somethingish width parameter. The Thursday before the competition (which was in Saturday), M volunteered to take the coaster home and finish it there. I was honestly so relieved when she said this, because I knew through S that her dad was really handy, and like mini trebuchets and stuff for fun.
Flash forward to the event, when we're boarding the bus going to the school hosting the competition. She gets on with a cardboard box, and excitedly shows me a marble rollercoaster that is absolutely not what she left with at all. For reference, the original plan for the coaster was made of pvc pipe, which I spent around three weeks measuring out and cutting with a band saw in the shop room. This rollercoaster was two pieces of plywood with tinfoil tracks that you leaned against the cardboard box she was carrying it in. She hadn't included any of the extra features I had implemented to get us extra points. While I was shocked and admittedly pretty pissed I didn't say anything because she was a) a kid and b) I assumed that there was probably some issue that had arisen in testing that necessitated the changes. When we went to impound she struggled a lot with setting it up and the three pieces weren't attached with anything and were literally just leaning against each other. At this point it was also visually obvious that the width want way beyond 30 cms, and when the judges came around to measure, it turned out that it was above the allotted height too. M was looking really nervous about now, so I assured her that most of the time, the marbles don't even make it down the coaster tracks, and as long as our marble makes it to the end we should be able to place. Except, when it came time to release our marble, it moved for about three seconds before getting stuck in the tinfoil. We were allowed to try two more times, and it got stuck in the same place each time.
M was very visibly upset, and looking back I think she was on the verge of tears. It can't really remember what I said; I know I didn't say anything malicious or accusatory, though. Honestly, I think I might have just stood there in silence, because I was honestly really fucking angry that she ditched my design for no apparent reason and didn't bother to check any of the available rules or even test her design. But I don't think that anger justified leaving a little kid without support when she was upset.
tldr: When I was a teenager I didn't comfort my friends little sister after our marble rollercoaster didn't work because she had ditched the design I had made for one that broke parameters.
55 notes
·
View notes
Text
Sam Character Profile
Curriculum: None
Age: 25
Height: 181 cm
Homeland: Port o' Bliss
Hobbies: Piano playing
Favorite Food: Chicken Gumbo
The proprietor of the campus store, Mr. S's Mystery Shop. The shop has a wide selection of products, ranging from food to magical implements. He may have a cheery disposition, but he also has a tendency to strongly nudge the students towards buying his strange curio.
Requested by Anonymous.
118 notes
·
View notes
Text
#TwoForTuesday :
Cranes and Serpents, 475-221 BCE (Warring States Period)
China, State of Chu (reportedly from Hunan province,Changsha)
Lacquered wood with polychromy
132.1 x 124.5 cm (52 x 49 in.)
On display at Cleveland Museum of Art 1938.9
“A different style of ritual art developed in the state of Chu in South China. In addition to bronze vessels, lacquered wood artifacts expanded the repertory of ritual implements.
This extraordinary sculpture was probably a drum stand for supporting a suspended drum in ritual ceremonies. It is unique among other excavated drum stands of the Chu, which typically show two birds standing on tigers. The theme of the bird stepping on the serpent was common in the Chu visual culture. Yet the slender proportions and seemingly flimsy structure of this particular set raise the question of whether it was utilitarian or mostly served symbolic functions in the tomb.
The birds' and serpents' bodies have designs painted in red lacquer and yellow pigment against the black lacquer. Scientific analyses confirm the additional use of a blue or green pigment that has been discolored over time.”
#animals in art#birds in art#museum visit#bird#birds#crane#cranes#serpent#serpents#snake#snakes#sculpture#polychrome#woodwork#lacquer#pair#Two for Tuesday#Cleveland Museum of Art#ancient art#Chinese art#musical instruments
24 notes
·
View notes