#and the very likely reality that their concerns will never be addressed given the server creator's long history of silence and ignorance
Explore tagged Tumblr posts
Text
.
#discourse#its not just the double standard of it all that makes me want to blow my brains out ..#i feel so fucking bad for those who are personally affected by this type of racist representation#and the very likely reality that their concerns will never be addressed given the server creator's long history of silence and ignorance#but i hope for their sake he suddenly finds it within himself to say something.. but i guess we'll have to see
5 notes
·
View notes
Text
Another callout post in the air.
I've been told about this post going around when someone was asking me if I was okay; so I've given into a lot of thought and I'm here explain. again. I will not display this person's name because I know the toxic part of my community will go ballistic and I hate that so much. Please don't.
The callout post in question:
Firstly, those who have tried went from being calm to immediately hostile when I tried to explain myself in dms. And the very rare few who reached out to me apologized for jumping to conclusions. You on the other hand, never tried reaching out to me once. If it's a confrontation in the discord server, then I'm not active in it and most likely forget. If it's a personal dm, I didn't get anything recent from you at all.
1. I did not defend C0nji. yes I do look at the whole anti/proshipping issue on both sides, doesn't mean I condone malicious creepy intent and doxxing/death threats. I'm just saying this artist is not a despicable person as far as I know, nor did they go out of their way of legitimately hurting others. With that being said, their whole idea of 'fiction doesn't affect reality' is very shallow-minded and gross considering how much it has put minors in danger, and they should learn to think about it but that's their choice, and problem. I'm not here to babysit.
2. The same claim I already debunked many times but will say again: I carelessly copy pasted old info and had no idea that word was still there but I removed the term 'Asperger's' and have stopped using it since, I was made aware of this years ago already. At the time I wasn't aware that in a deep negative history, and I've been around a few autistic mutuals who used that term as a scientific term.
3. Another of the same claim: Yes I do see Chihiro as a boy (or sometimes non-binary) cause as a trans man, it brings me comfort to see guys in a skirt with confidence. I'm not the most feminine guy but i'd like to have the freedom to explore without being misgendered. And if people do not like trans Sakura that's understandable, I just want to shed some light where trans woman can look buff, especially those who are as athletic as Sakura. The trans post you showed is meant to be a body positive for pre-op and post-op trans folk but you decided to flip it around and call it something else.
4. Me being genuinely upset of people making claims towards me doesn't automatically mean I've brushed off every transfem's concerns. Some of them who came forward to me, the conversations went from civil to being aggressive because they wouldn't listen or even consider my explanation that my intentions weren't malicious at all. Then the only trans woman who was civil came to me with fair criticism, told me I should be more specific with my content warnings when it comes to drawing pre-op bodies cause it would cause dysphoria for certain trans people, especially to trans women. That was where I listened and assured to be more cautious with how I portray my work.
5. The rest about me woobifying Taka and Gundham which I've addressed many times; characters dressing up in oversized sweaters or acting childlike/naĂŻve doesn't automatically make them incapable or infant. That is never what I intend. And Gundham 'not knowing what sex is'- yes I know he's a breeder, human intercourse is a similar but different thing. He's asking Mondo in his own way because he has lacked connection with people for a long time; that's how I'm portraying, this also has been implied many times in his free time events and with how he talks to people. This is something where I relate to Gundham cause all I had was my art and imagination as a kid, so learning to interact with others is overwhelming.
I also don't understand that apparently Gundham needing people like Taka and Mondo (as dad-like figures) is so terrible- I'll say this now that yes I do portray Gundham as someone who is headstrong but he can feel very lonesome, he just doesn't how to express it. It's okay to need someone who truly accepts you or is that so wrong? Also it was never portrayed that Gundham or Taka need to reply on someone 24/7. so I really don't understand that argument you're trying to make. To me, It just sounds like autistic people shouldn't rely or need anyone at all cause it's offensive. If that's not what you mean I'm sorry, but that's what I'm perceiving cause all your statements are vague.
I not only do research but have talked to autistic mutuals/followers when developing my character Timmy; a lot of the valid criticism comes from how I should write his symptoms, showing both his mature and child-like sides etc, they even share their own experiences so I can illustrate them in a realistic and positive light. The way he's portrayed and capable of many things has made him relatable to a lot of people, which is something I'm trying to strive for; especially when some autistic people (who shared their experiences in my dms) behave like Timmy get ridiculed for ''''acting like 9 year olds'''' in my comment section which is something I never condone in my community I even made a comic post regarding that ableism.
No one is ever obligated to agree with the way I portray my stories and opinions; if someone doesn't like what I'm doing they are free to unfollow, block me and look for any other artist that does a better job in their art. My biggest issue with callout posts like this, is that people have different opinions of what makes a character a good or bad rep. It's very subjective and it depends on every person. Half of them including you do not like my representation, meanwhile the other half does enjoy my work, even find comfort in it. I'm not here to please every single person who didn't get everything they need from my work, I'm one man.
But the most painful part is not debunking these claims over and over; it's when my followers believe them right away without even asking me if they were true. It always leaves me unsurprised but disappointed. And yeah I'm not a good person, yes people tend to get scared of me that's fair, but I'm not as despicable as so many of these callout posts claim. I have talked to certain followers who have the decency to ask me what's going on; followers who actually listened to my explanation, and I listened to them back when they have questions. You don't even have to agree or like me after my explanation, just have the courtesy to ask before jumping to conclusions.
So yeah, the callout post is vague, and blown a lot of things I drew out of proportion and turned them into malicious intent which was never my approach. I was going to personally dm you about this but you have lost it the moment you made an 'awareness' post instead that does more damage than good. Feel free to keep your post up, feel free to think what you will. I just want to say all this to people who are genuinely confused. Whatever you plan to do, go ahead. I'm exhausted and have more in life to worry about. Unless followers genuinely want to ask questions to know more, this will be last time I confront the same. claims.
185 notes
·
View notes
Text
Due to recent events, it's time I told my truth: So, we'll start from the beginning, when everyone knew me as the new affiliate on his cell phone playing Pokemon. At this point, I had been open about being transgender and bisexual. Right before I got the email saying I was affiliated, I met someone that went by the username AutumnLittleByte. This is where shit gets real. This is your one and only warning as I'm about to be fully honest about what happened. 2 weeks after meeting Autumn, she informed me to check my donations. Lo and behold, she sent me my first ever donation of $20, this was meant to go towards the PS4 or Steam games if I so chose. Whichever path I wanted to take to improve my streaming even further. In concept, this sounds like a kind and generous gesture, but in reality this was her way of "getting in". When I found out she'd given me this kind gift, I cried. I was honestly shocked someone would do that just to try to help. At the same time, she'd joined my old Discord. I'll get into why it's old later, trust. When she joined, she asked if she could add me as a friend so we could message each other. It seemed so harmless I immediately said yes. How was I to know any better? This was my first donation and my first real time properly using Discord. So what happened? Well, it started out harmless, as I said. She sent a picture of the shiny Mightyena she'd just captured on Pokemon X to me, helped me make a channel just to post shiny Pokemon in, and subsequently posted the same picture in there. Again, harmless at the time. Two weeks later, we'd been talking privately and learning more about each other. Apparently she was also transgender, but male-to-female. She claimed she was 19 and currently in her first year of college. Claim being the HUGE KEYWORD HERE. Seemed innocent enough, and she even sent a picture of hersrlf to confirm it. With no context she honestly looked 19. But did she act 19? Honestly, she was a bit immature. But I merely attributed it to how I am. I'm a bit immature and I won't lie about that. 2 more weeks of talking and she asked me out. Me. Me of all people. I was kind of floored as I had openly admitted I had a crush on another streamer, but it was just that, a crush. Nothing else came from it and that streamer and I remain friends. Especially in my heart, as she no longer streams or has been on Twitch in over 2 years. Now, being in this situation, getting to know this person and thinking what she claimed was the truth, she honestly seemed very sweet and I wanted to give her that chance. So I stupidly said yes. A few weeks into the new relationship and it seems to be going well. By this point, I had been gifted up to Stormblood on Final Fantasy XIV and was also gifted 6 months of subscription for the game. So that was extremely exciting and I chose to play and stream it quite often to hang out with my friends. Well, she started to get real jealous, real quick. It kind of worried me how quick. She basically didn't like my friend, who I previously stated I had a crush on, and claimed she knew 2 people that did not like her for manipulating others. Okay...? But where was the proof in that claim? I didn't really buy it either, but I let it slide. If we rewind just a bit, she'd done something that I was already weary of. So, my first game I ever streamed on the PC was Black Rock Shooter for the PSP, I did it using the PPSSPP emulator and my Xbox 360 USB controller. All seemed to go well and we had no problems. She even made me an overlay which my friends decided to have a little fun with after I set it up with my alerts. Well, Autumn upped the ante by continually donating with my friends, which started a donation war. Until she grew mad that she lost, stole money from her roommate, and called my friend a stupid slut on stream. All these donations, plus a very generous donation from my friend Chris later meant I could purchase Christmas presents for my family for the first time in a very long time. It felt nice to give back, but I also wanted to be a good boyfriend. How? By...spending $50 on Toothless from Build-A-Bear. He had chocolate scent. Toothless was apparently Autumn's favorite cartoon character and her favorite smell was chocolate. I had it sent to her and so in response, I got pictures when she received it and she actually gave me 2 $50 gift cards for my birthday and Christmas. Seems nice right? This is when things started getting noticeably bad. I was told I couldn't make any purchases without her permission. Nor could I spend any money on my mobile games. Nor could I get anything for XIV at all. And to me, that was a bit controlling and weird. But I let it slide. Remember? No one ever claimed to like me like she did before. So, I let her walk me through what she wanted it spent on. I got several Steam games I honestly wasn't interested in and....Minecraft. Yes, I had to spend $25 for the modded Minecraft. This way I could play with her on her server. This just seems controlling though? Some people are like that. Not in this case. I still haven't fully rewound so you guys would know more. I do this a lot so I can explain things. Let's head back to my birthday in 2017: The entire week, I had been told time and time again by my girlfriend that she had sent me a package for my birthday. She claimed it included a very personal letter, a ton of Reese's candies, and two large Treecko plushies she'd bought for me, as well as a Treecko poster. For those that know me well, Treecko is my all-time favorite Pokemon. Well, she promised and promised and promised it was coming, and so I was heartbroken on my own birthday to find out it never came. She claimed it was lost and sent me a tracking number. The tracking number didn't exist anywhere, I tried multiple places. So instead of getting angry, I knew I had problems with my bipolar depression at that point, I asked her what the letter was about. To try and get some insight as to why she nay not have sent it. She told me it said that she loved me. And that she was scared of how fast she'd fallen for me. And according to her, it detailed exactly how she fell and why she did. The last time anyone said that to me, I was being catfished for money. I was shocked and honestly I had some kind of feelings but I wasn't sure what they were. So I said it back to her, but I was honest and she claimed she was okay with that. Now we return to the gift cards and Minecraft time. Oh boy. You probably can already tell where this is going, but it's my truth and this is how I choose to tell it. Anyways, Autumn had become not only controlling, but very clingy at this point. I told her several times that I was going to sleep or taking a nap in the previous week and she'd begun to act like I was avoiding her or leaving her. It was this behavior that manipulated me to begin with. I did everything I could to reassure her that I wasn't leaving her and I cared about her very much. Well, one night she got very upset with me. This was because I refused to do 2 things: Let her control me on Minecraft so she could play with her apparent ex at the same time and flirt the whole time I was there doing basically nothing but continually mining for gems and dying to lava, and I also adamantly refused to take nudes and send them to her. She'd been trying to get me to do that for a solid 2 weeks and I simply wouldn't do it at all. And that pissed her off. She called me, on Discord, apparently crying. Telling me I made her feel like shit and it was my fault. I had to beg and plead for forgiveness, for her to take me back, because I was so manipulated at that point I thought she was as good as I was going to get. She finally caved after me breaking down on the phone with her. Her claim at the time was that she never had anyone fight for her like I did, and it made her like me more. Sure it did. Mhm. Anyways, we continued to have stupid little arguments since. Mainly involving me being forced into Minecraft with her and her ex once again, me trying to play XIV with my friends that she didn't like apparently before I was gifted the game and subscription, or especially me saying no to nudes. A week before our final fight, I was actually finally able to relax and spend some time with my friends that she didnt like, but we chose to do it off stream so she couldn't snoop. I even hid myself playing games on Discord so she wouldn't know at all. Both were concerned. I didn't seem happy, or myself. It kind of seemed like I was bending to her will and it scared them. Tbh it scared me too. I told them I was scared, and I didn't know if I could leave without more problems. More problems? What do you mean? Well, the night before, obviously Autumn and I had gotten into another fight. In that fight, Autumn let it slip that she wasn't transgender, and also wasn't 19. She lied about both things to get with me, she was really 16 and apparently gender fluid. Meaning she didn't mind being addressed as male or female. It scared me because I had just turned 24, I didn't want shit happening to me because she lied about her damn age. What was worse was that she actually sent nudes in the hopes I would send her some in return. Which is why we always fought. I deleted her pictures and when they weren't in our messages anymore on Discord she got pissed and cursed me out. She would attack all my insecurities and use my bipolar depression against me as if I was trash for having it. Then I would get the blame for her having to be mean and set me right when I didn't do anything to deserve that in the first place. I'm not into nudes, it's not shocking I don't want them. Both friends encouraged me to leave her, my mother even begged me to leave her and I just...I couldn't. I was stuck in this rut. She was underage and could use that against me. I wasn't going to do any better, I was going to feel like shit forever and never be happy again. I legitimately believed this. Well, everyone around me did what they could to help me try to be happy in this shitty situation. So a week after relaxing, I decided to stream XIV again, but I twisted it so I could include Autumn. She'd gotten a free trial, so this way we could play and enjoy ourselves....so I thought. Autumn was ADAMANT about barring my friend from even playing the game. No Discord chat or game for her, that's what she wanted. No, I want her to talk to me and I want to play this game with her. That popped into my head immediately, a clear light in a seemingly endless realm of darkness. So I did, I added her to the Discord chat and Autumn lost her shit. "Xion what did I just fucking tell you? I said don't add her to the call." Immediately came out of her mouth, she knew she'd been caught right then and there trying to bar me from my friends and manipulate me. There's still the clip of me being "dumped" by finally standing up for myself. Finally. And they were so concerned they did something wrong that when the breakup was finalized, they cheered. And did everything they could to keep me smiling and happy that entire stream. So why now? Why tell us all of this now? Because abuse of any kind, it's never okay. It's not okay to defend someone like that for supposedly changing as well, especially if they victim blame as I have seen. I lived through 3 months of pure hell, never again. You are not alone. If you are being abused, there's always a light in the deepest darkness. You can break free and be happy, I believe in you.
2 notes
·
View notes
Text
Standards Transmission
Iâm going to talk a little about bugs. Specifically about how we classify bugs, and the bugs we developers ship our games with.
Iâm also going to talk a bit about how I think we, as developers, can mislead players and reviewers about the state of our game prior to launch.
Iâm also going to try to convince you not to pre-order games.
Thoughts below the cut.
Games - especially the big, expensive ones - have grown significantly in complexity over the last two decades. If theyâre not online, theyâre open world. Sometimes theyâre both. Fortunately, the proliferation of the internet combined with the tools provided by digital distribution platforms have made fixing issues post-launch significantly easier than back in the pre-PS3 days.Â
Developers should be able to relax, knowing that not every little issue that ships with a game is part of that game forevermore.Â
Relax a little, anyway.
Meanwhile, during my time in test it seemed that the console certification standards for games also relaxed significantly between the last generation and this. I suspect this, too, a reaction to the reality that games are easier to patch post-launch.
But if the developers relax their standards and console makers relax their standards, what incentive do the developers have to maintain any standards at all?
We've seen a number of utterly broken launches in recent years. SimCity's infamous release was over five years ago now. Fallout 76's was a few months ago. These games were rightly raked over their coals for their usability issues. But they're also outliers.
I'm more concerned about games like Skyrim, which largely gets a pass on its bugginess as the natural outcome of its scope and complexity, or, to bring it home, Deadfire, which shipped with no small number of bugs. Both games received largely positive critical response.
And here's the thing: when we send games out to reviewers, it's often with a statement along the lines of "this is not the shipping game;Â There Will be Bugs; we are working to address them."
But that's basically a lie.
By the time we send out a review copy, the build's essentially locked down. We're not changing anything unless the behavior being addressed is so reprehensible as to justify the risk of potentially destabilizing the game right before launch. You hit a lot of crashes or an incomplete critical path quest bug, there's a reasonable chance we'll be trying to address that.
Anything short of that? No chance in hell.
And thereâs a lot of bugs short of completely game-breaking that can make playing a game an unpleasant or wildly unfair experience.Â
When testers submit bugs, they (or a lead, or a producer - this varies wildly between studios) assign said bug a Severity. Studios also have very different standards from one another in how they assign said Severity, but itâll generally look something like this:
A1 - Crash The game experiences a critical failure and the program ends. May take your computer or console with it.Â
This can also include things like infinite loading screens, though those can also occur without the game technically crashing.
A2 - Absolute Critical Path Progression Break An issue prevents play from continuing along the primary critical path of the game. This can be an issue with content (level design or art, a system, or a quest or narrative failure) or programming, and may manifest as things like:
Not being able to connect to a necessary server
Not being able to enter play
Not being able to turn in or complete a quest
Not being able to transition into a new scene
Not being able to load a save file
Falling out of the world
Regardless of exactly what happens, the player is going to have to restart the game or reload a previous save in order to progress through the gameâs primary experience.
A3 - Progression Break As above, but the player can work around it and continue play, or it impacts a sidequest or some otherwise non-critical content.
B1 - Major Breakage Some system doesnât function in some significant way. Itâs going to be highly visible and will impact most players. Perhaps health packs donât actually heal, for example. Perhaps the UI falls apart if interacted with in a particular order. Perhaps subtitles donât function in languages with non-Latin alphabets.
Perhaps the color green displays as yellow. Always.
At many studios, thisâll be classified as an A bug. I personally consider bugs like this unacceptable for ship.
B2 - Breakage Something specific isnât functioning like itâs supposed to. It could be something wide-ranging like a system (arrows inflicting fire damage instead of physical for example) or art asset (empty barrels donât have textures on the inside, and thus appear âinvisibleâ from within). Or it could be something specific, like a winch thatâs supposed to lower a dumbwaiter simply not working or a piece of art being upside down.
At this level, a bugged aspect of the game is clearly not functioning correctly to any player who understands how it should function, AND that failure of function negatively impacts play, BUT the game experience isnât entirely destroyed.
C - Issue Nothingâs perfect. We tend to forgive a lot of little problems in the things we experience - when we notice them at all. C bugs might include minor narrative or art inconsistencies, minor framerate drops during a specific encounter, or a strange animation when switching between one weapon type and another.Â
There can be a few other types of bugs that Iâm not going to get into here, such as suggestions, subjective bugs, and the like.Â
Along with Severity, Bugs tend to be measured along a few other axes called Priority, Reproducibility, and Likelihood. The first represents the import given an issue in comparison to other issues of the same type, the second the probability the issue will occur if the player performs the action that causes it, and the third the chance that any given player will perform the action that causes the issue. Generally, Priority is assigned based on the combination of the bugâs Severity, Reproducibility, and Likelihood. (Which is why a crash might not get fixed - itâs so rare an occurrence that itâs difficult to reproduce and investigate.)Â
Hereâs the thing: the closer that we get to shipping a game, the higher a bug needs to be up that Severity chart to land on a developerâs plate, much less actually get addressed. There comes a point in every project Iâve ever worked on, for example, where remaining C bugs cease to be something we intend to address (for ship). Thereâs simply not time to make everything entirely perfect, no matter how much weâd like to.
Hereâs the other thing:Â Since any given change to the game has the potential to cause new issues, we developers have to weigh the importance of fixing an issue against the possibility of introducing a new one. Attempting to fix a B bug can result in a far more severe issue.
For example, if a conversation that includes a player dialog option seems to ignore that option, it may be because the alternative didnât actually get made. Simply cutting that node could break the conversation and, by extension, the quest. Sometimes itâs possible that the entire conversation can be cut without breaking anything, and sometimes that happens. Other times we decide that itâs best to just leave the bug in there. A player experiencing the issue is better than possible alternatives.
A line I really loved in BioShock: Infinite that played between Booker and Liz on the boardwalk simply stopped firing shortly before release. It had been written, recorded by the voice actors, and implemented. It had functioned just fine up until it entirely stopped playing. Chances are, the fix would have been easy. But we didnât know what the problem was, time was tight, and we determined that avoiding introducing new issues was far better than trying to rescue a line that players would never know they missed.
So the production realities of bugfixing combined with the timing of reviews means that once a developer has sent review copies out, or, for that matter, once theyâve launched an open beta, theyâre very close to release. At that point, anything short of an A Severity bug will almost certainly not be addressed for launch.Â
But that doesnât stop us from telling reviewers (or Beta players) that âhey, weâre still polishing the game and fixing bugs.â
That misleading statement influences reviews. When I see bugs mentioned in reviews, which isnât particularly often, it's generally with the caveat that "I was playing on an early build, and the developer has assured me that it will be fixing bugs towards launch."
Sure, many of these bugs will get resolved over the update cycle of a title. But they won't all be. And they definitely won't be at launch.
Because the current calculus is "how not-busted a product can we ship without it hurting our bottom line?"
I think that the industry could stand to have its bottom line hurt on occasion.
We need reviewers to call us out on our bugs. We need players to hold off on buying products - especially products from studios with a reputation for releasing buggy titles - until after they've hit market and been fairly evaluated. If a company is releasing software that's buggy as shit, don't financially support them.
Iâve almost started thinking of major bugs I encounter in games as insults. A publisher or producer determined that this bugged product was good enough for the likes of Alex.
And to be absolutely clear: this is not the fault of QA. QA, assuming they're not woefully understaffed (its own issue), will almost certainly have found, reproduced, and reported the defect you encountered. They're as frustrated that you experienced it as you are. Possibly more.
Nor does fault generally lie with the developer(s) who actually caused the bug. They would likely be all-too-happy (assuming they haven't been worked to the breaking point) to fix the thing that they broke. They got into this gig because they want to make fun, exciting experiences, and nothing's less fun than broken-ass shit.
The fault lies with the money people.
The managers and the publishers. The people who donât care whether you deserve better because you've accepted everything they've served up so far. The same people who would rather have you spending money on loot crates than experiencing narrative content. Who would rather have you be someone elseâs content (and them yours) than actually pay to make content for their players.Â
And the same people who would rather fire hundreds of developers rather than take a cut in their own pay.
When you've decided that games have become unacceptably broken, they're the ones you have to convince.
You wonât do so by purchasing their games before anyoneâs had a chance to play and evaluate them.
<#
12 notes
·
View notes
Text
What She Needs (Pt.1) - Leah Clearwater x Fem!Reader
Okay so I know this is really clichĂ© but can you please write sth about Leah where she thinks she'll never imprint BUT then she meets this girl and imprints on her. She doesn't really know how to handle it and questions herself like, what if she doesn't like me? Does she even like girls? And so on, but eventually they get together? đâ€
Words: 2215
Strong language
âHonestly, Iâm not even that hungry,â Leah protests, adjusting herself in the backseat of Paulâs truck, seeds of regret sowing themselves in the pits of her stomach. Paul sits at the wheel, arm hanging over the seat, free hand gripping Rachelâs headrest on his right. She swivels around to face her, eyes soft with something close enough to pity it made Leahâs stomach flip.
       âItâll be fun! Everybodyâs going. Lighten up,â she commands, smiling sweetly into the back seat.
Leah feels a glare brewing, but stifles it before it reaches the surface, knowing Rachel means well and preferring not to start an argument with Paul over his imprintâs cheerfulness. She replaces it with a forced, tight-lipped smile. âWhatever you say.â
The conversation dies here, replaced by a grin from Paul in Rachelâs direction, a squeeze on her knee, a giggle in return. Leahâs eyes jump to the window, trying to settle on something other than the pair of imprints affectionate displays. Anything else.
Before long, the truck putters to a stop in front of a retro-looking restaurant, clad in neon signs proclaiming it the âbest diner in townâ. Paul nods his chin somewhere in front, gesturing just out of her field of view. âLook, weâre the last ones. Everyoneâs already here.â
Blowing out a long breath, Leah presses her forehead to the glass of the window, peering into the crowd of boys leaning on their various cars and trucks in the parking lot. Her friends, family, packmates. Her eyes land on Sam. Whatever he is, she thinks. Paul and Rachel swing their doors open and hop to onto the pavement, and she follows suit. Scanning the faces in the group, she nods at the realization that none of them have come alone â in fact, the group has nearly doubled in size, each of the shapeshifters clinging to their respective imprints, throwing arms over shoulders, entwining fingers, gentle hands placed on smalls of backs. Her next breath is forced out like a cough, lowering her eyes to scan the ground, a nervous hand awkwardly rubbing the back of her neck as she avoids eye contact with⊠well, anyone.
What did I expect? She scolds herself silently.
The boys take to slapping one another on the back, hollering out one anotherâs names at they notice each other in the crowd, as if theyâre surprised to have bumped into one another here. As if we donât spend all our time together, Leah thinks.
âEverything okay?â Leah raises her head at the voice, meeting the eye of the tall, muscular man whoâd spoken, his arm settled around the thin frame of the pale, dark-haired girl beside him.
âFine, Jake,â she starts, offering a forced smile before turning to the woman under his arm. âHi, Renesmee.â
Resnesmee returns the smile, though Leah guesses the girlâs comes off far more genuine then her own. âHi, Leah.â
âEverybodyâs here? Can we go in now?â Comes the call from the middle of the crowd, Sam raising his head over the rest. All the wolves are large, even Leah grew a few inches when she first started phasing, but Sam is the biggest, and he knows it.
Paul answers him with a thumbs up. âWeâre good.â
Leah turns and jogs towards the stairs leading up into the building, not quite fast enough to miss Jacobâs eyes narrow in concern. She curses their mental link silently, trying to banish the boys from her thoughts. Canât even have my mind to myself, she thinks, hoping this time someone is listening.
The rest of the group swarms around her, heading for the doors. As she jostles shoulders with the others, she nods and smiles, meeting eyes with the wolves and their imprints. Sam and Emily, Paul and Rachel, Jared and Kim, Jake and Nessie. Quil, Seth, and Embry step in stride, too, the younger boys asking their friend where heâd left his imprint. He laughs, informing them she was still in school.
A long sigh, stifled only by the hand Leah places in front of her mouth, escapes. Even Quil, she thinks.
They file into the restaurant a moment later, all twelve of them filling the entry. Rows of booths line the front of the large room, red faux-leather seats shining in the light from the wall of windows they occupied. Opposite them, a long bar dotted with matching red stools overlooks the back wall, an open window into the kitchen shows a few workers cooking away in the kitchen, an older woman and a thick-set man. Behind the bar, a young woman, about Leahâs age, leans over a notepad and calls out to the group without looking up. âSit anywhere! Iâll be with you in a second.â
The pack pours into two booths, two groups of six settling into each. Leah finds herself pressed all the way up against the wall next to Nessie and Jake - Paul, Rachel and Seth sitting across from her. The others fill up the booth behind them. At her back, Emilyâs calling over her shoulder to address both tables. âThe food here is really good! Youâre all going to love it.â
Leah feels her eyes roll back into her head, fingers finding the laminated plastic edge of the menu on the table and picking at it, a distraction for her anxious energy. These pack outings had been Samâs idea, of course, as a way to build up what he called a more âteam-centric attitudeâ. While she had wanted to decline, she knew her own demeanor had been most of the reason for the idea in the first place â while most pack members considered themselves very close to one another, brothers, even, there were many factors that made Leah feel like she was standing on the outskirts of a club she never signed up for. The only woman to become a shifter in known Quileute history, Samâs pouty, pathetic ex-girlfriend, the one incapable of finding an imprint.
Leah herself had come to terms with those realities on her own. Sam wasnât right for her â he and Emily belonged together, anyway. And while the wolf pack was a bit of a boyâs club, she really did love the other members, as obnoxious as they often were. So what if she was the only girl? She could take any of them on, any day, and they knew it.
As for imprinting, Leah felt a heavy weight sitting on her chest. Sheâd given up on it a long time ago. For years, sheâd waiting desperately for the wolf blood to save her from herself, from her lingering thoughts about Sam and her anger at Emily for accepting him so readily. When no one came, she resigned, maybe there was no one out there for her. She could find a way to be whole on her own. Still, sitting, surrounded by her friends and their soulmates, while she was too proud to admit it, the knowledge that she was whole on her own couldnât banish the pit of loneliness sitting in her stomach.
Looking up from examining the menu, Leah met Paulâs eyes, looking at her sorrowfully from across the table. Moving her gaze to Seth, and then Jacob, their expressions jolt to life a moment too late. Sheâs seen the pity in their eyes â thatâs the worst part. They all feel sorry.
âCan you all stay out of my fucking head for once?â She asserts, a firm first pounding the table.
The shifters blink and nod in apology, an awkward silence brewing. Nessie sits between them, but Jake leans forward to face Leah. âSorry. Accident.â
Leah huffs, straightening her back, trying to look bigger, tougher, than she was feeling. In truth, her outburst was embarrassing, they always are, but sheâd learned quickly that they wouldnât listen to her if she wasnât loud. Chewing on her lip, she turns her eyes to the menu, pretending not to mind the uncomfortable glances exchanged by her neighbours across the table.
A moment later, the girl from behind the counter is skipping towards them, pen and notepad in hand. Leah doesnât tear her gaze from the menu, but her voice sounds like sheâs smiling.
âSorry about the wait, folks. Iâm Y/N, Iâll be your server. Can I start everybody off with something to drink?â She taps her pen on the metal rungs of her notepad, flipping to an empty page as she waits expectantly for someone to order.
Jacob speaks first, then Rachel, both ordering a plain black tea. Leah lets her tongue roll out of her mouth, blegh. Sheâd never been one for tea.
âAnd for you?â she says.
It takes a moment for Leah to realize sheâs next in line to order. Lost in thought, sheâd forgotten to consider what she wanted before she turned her gaze to meet the waitress, meeting her eye for the first time since sheâd walked in.
And there she was. Only her, looking down at Leah in a blue collared button up and a stained apron, soft hair pulled behind her in a loose ponytail, expectant smile tugging at her lips. Radiant, warm, suddenly, Leah understood everything the boys had explained to her about how it felt when you first saw them â your imprint â how sheâs gravity, the only thing holding you to the earth, like youâve had your eyes closed your whole life up to this point, like you were holding your breath and sheâs finally let you exhale.
She wants to tell her all of those things, she wants to be near her, to take her in her arms and share her world with her. As she looks into the eyes of the woman she just met, all she can do is stare, mouth agape, lips twitching in an effort to form words they seem to have forgotten.
âCoffee. Sheâll have coffee. Black,â Seth interjects, and Y/N tears her gaze from Leah, nodding to Seth instead as the rest of the table orders. Leah doesnât hear, simply tracing the womanâs outline in her mind, memorizing her, wondering how something so perfect could be right in front of her, wondering if she could ever find a way to speak to her. With a final nod and a smile, sheâs moving on to the next table, and five surprised faces turn to Leah.
Seth speaks before anyone else can. âDid you just do what I think you did?â He asks, a wide grin spreading across his face.
Leahâs jaw still hangs open, seemingly having lost the ability to close it, let alone answer with coherent thoughts. She manages to nod her head up and down, still fixated on the girl at the other table.
âOh my god,â Jacob smiles, âLeah imprinted!â
Rachel and Nessie gasp excitedly, unlike the boys, not having felt the shift without the wolf mental link. Rachel reaches across the table to grab Leahâs hand. âIâm so happy for you!â
Leah blinks, breaking herself from her stupor, turning to address Paul, and then Jacob, shifting worriedly from one boy to the other, brows knit in confusion. âWhat am I supposed to do?â
âTalk to her!â Paul encourages, waving a hand in her direction as she finishes with the other half of the pack and heads across the room towards the kitchen.
When sheâs out of earshot, Embry addresses both tables of shifters. âYâall feel that too?â A cheeky grin steals across his lips. âI think Leahâs got a crush.â
âShut up, Call. Iâll kick your ass,â Leah spits a hushed whisper in his direction.
âDamn. I thought imprinting was supposed to make people nicer,â he laughs, leaning back in his booth.
âGive her a break, Embry.â Sam orders, twisting his body to meet Leah and offering a soft smile. âCongrats.â
His gesture is appreciated, a genuine happiness for her etched into his smile. Leah returns the look with a nod of understanding, and both wolves, as always, knows what the other is thinking. Weâre good. Taking quick, shaky breaths, Leah twists back to address her table.
Seth leans over, touching his sister gently on the arm. âTalk to her! Say something!â
Leah looks to the front of the restaurant again, where the girl stands behind the counter, setting an empty pot under the coffeemaker, smoothing a flyaway out of her eyes, back into her ponytail. âWhat if she doesnât want to talk to me? What ifâŠâ Leah hesitates, words lost. Sheâd never felt this way before; always trying to be everything for herself, the fact that someone else suddenly had so much power over her made her stomach flip. What if she didnât like girls? What if she was already taken? Even worse â what if she didnât want Leah, specifically?
âHey,â Jacob says, leaning in again, âyouâll be what she needs. The imprint is never wrong.â He curls his fingers around Nessieâs hand, and Paul, his arm around Rachel, pulls her closer, pressing a kiss to the top of her dark hair.
Exhaling and biting her lip, Leah watches as the woman frees the pot, now full to the brim with fresh coffee, and fills the final mug on her tray. She balances it on one hand, making her way to the group, a friendly smile spreading across her face. Inhale. Exhale.
Youâll be what she needs.
#idk what happened to the formatting on this one bc all of my indents disappeared but im not gonna fix it lol#twilight#the twilight saga#twilight fanfiction#Twilight FanFic#twilight imagine#leah clearwater#femslash leah clearwater#leah clearwater x reader#leah clearwater x fem!reader#leah clearwater fanfiction#seth clearwater#paul lahote#Jared Cameron#jacob black#Quil Ateara#embry call#wolf pack#wolf pack imagine
289 notes
·
View notes
Text
An attempt to correct some.... misconceptions
In light of recent events, most notably, the Josh Burner vs Lily Orchard situation, people supporting either side have had their differing opinions. These range from claiming Lily is guilty of the crimes Josh has accused her of, therefore, she should be given a civil lawsuit, to Burner having no basis to sue. However, many have also demonstrated some misconception of the law. This is regarding American law, specifically, as nobody knows whether the supposed trial will happen in Canada or the US.
Iâd like to start by saying I have no personal feelings or connections with Josh or Lily. I do enjoy content from both parties. Some have accused me of âwhite knightingâ for Lily on a YouTube comment, but in reality, when I see a situation like this, I have to do my homework and make sure the facts arenât twisted.
Regarding my thoughts about those two, Lilyâs definitely an arrogant and pompous asshole, but sheâs definitely not the spawn of Satan (Sheâs definitely not the worst person Iâve met, trust me), while Joshâs biggest mistake is his ineptitude in handling serious matters. Josh seems like a nice guy whoâs dealing with certain problems in real life, but Iâm not sure, I donât know him personally. People have claimed Lily wrote a piece of child pornography, abused many people, or that she has âulterior motivesâ for housing abuse victims in her server. That is a discussion for later, so this post addresses the allegations Josh has made on that Cease and Desist letter only. Iâm not doing this cause Iâm a âfriendâ of Lily or Josh, but if people are going to make claims, Iâd like them to have the proper research and backing for it, rather than citing emotions, and believing any insult online is âslander.â Itâs great to have an opinion on this matter, but it means more to have an informed opinion. I made sure to do my homework on the law, and conversed with a former Columbia University Law student regarding this topic.
Succinctly, Libel is written defamation of a private figure, while slander is oral defamation of a private figure. In order for statements to be defamatory, they need to be/demonstrate/result in:
1. Factually false statements.
2. Reckless disregard of the truth.
3. Provable damages to the figure. (Mainly, financially)
Josh will inevitably have a difficult time proving harassment or defamation to himself, because he is a public figure. Since Josh is a prominent member of the Brony analysis and YouTube community, he is a public figure on the internet. He regularly posts reviews, skits, commentaries, etc. All of this inherently subjects him, or anyone who uploads similar types of content to criticism (as long as itâs legal). By putting himself out there on YouTube, he has made himself a public figure within that sphere.
Break it down! http://gph.is/Z0CcZN
âTwisting words, and speaking lies about my conversations with Patchwork Heartâ
I am not sure what to say for this one, since the call failed to record properly and there is no audio coming from Joshâs end. This one is honestly up in the air. Since the evidence of the call has been damaged, itâs really difficult to prove whether or not Lily has lied or twisted words about it. We can only go on the âhe said, she saidâ basis, which the court will not accept.
 âDeliberately and maliciously placing calls reasonably expected to be private in a public sphere for the intent of defamation.â
Both Burnerâs and Orchardâs territories (Texas, United States and Nova Scotia, Canada, respectively) have the âone party consent law.â This basically means that people can record their own conversations with other party, since the recorder is taking part of the conversation him/her/self. Either one recording the call is fair game. Iâm not sure why Josh included âdeliberately.â However, malice is almost irrelevant to Lilyâs action of uploading the conversation. Malice regards libel or slander, while the uploaded conversation was just.... a discussion about what to do with Brony DnD. The video just had the conversation as it happened, and nothing that would damage Josh's reputation. If Josh was worried about defamation from the video, that would imply he did or said something he's not proud of that he doesn't want the audience to know, but a lot of what he said is just up to interpretation. Her uploading the video was meant for the audience to listen to what actually happened, and then letting them decide what to think of it (Whether or not Josh is a âpedo enablerâ or a âliar.â But this isnât the main topic). Defamation applies to recklessly false statements, but portraying the situation as it happened (uploading the actual conversation) is the complete opposite of defamation.
âUsing your fanbase and friends to send repeated and unrelenting harassment and false-flag my videos or videos I worked in, especially the Brony D&D videos as shown below.â
Harassment is really difficult to prove for a public figure like Josh. I agree, itâs really scummy of Lily to send her fans and friends on a dislike spree of the Brony DND videos. However, since Josh is a public figure, visible to anyone who types in youtube.com, this one is really difficult to prove as harassment. Plus, he can shut off the ratings bar if the dislikes bother him a lot. Regarding the false-flag problem, it shouldnât be an issue if the flagging has failed. The decision to remove a flagged video is ultimately made by YouTube, and not the people who flag it. Since the false-flagging has failed, I doubt that the court will tackle this. The false flagging was just petty on the fansâ part.
Josh is trying to prove harassment, but on YouTube, he is subject to any opinion made based on the facts. Anyone can disagree on opinions. Itâs also fair game to make an interpretation about someone based on his actions. Although people may disagree, itâs still legal, as long as itâs not blatantly false.
Moving on.
âRepeating and relentless use of ad-hominem attacks against me in public settings.â
Ad hominem is a logical fallacy where oneâs argument is loaded with personal insults. Josh also linked the reader to a post where Lily compares Josh to Captain America, when he mentions âHail Hydra.â
As offensive as it may be, itâs not violating any rules and to suggest a comparison to a comic book character being a felony is ridiculous. I doubt this will go through.
âStealing my ideas simply to spite me.â
While I do agree copying ideas proves someone is unoriginal, Josh and Lily didnât copy each ideas word for word. The original creator (Jello Apocalypse) of the âReview in 10 words or lessâ concept made his regarding Disney movies. The two did copy the concept, but since they added their own wrinkles to it (Making it MLP-based), none of them can be guilty of plagiarism. While it is very petty and childish of her to one-up Josh, itâs still legal. Wanting to one-up someone on the internet is the equivalent of wanting more âGold starsâ than others as an elementary school student. I donât think there are any laws saying âyou arenât allowed to one-up another person, since itâs out of spite.â I doubt this part goes through.
Now letâs go to where Josh claims Lily has made defamatory statements.
âI bullied Patchwork Heart into relenting about Brony D&D.â
As mentioned somewhere above, this call lacked anything coming from Joshâs end, so this claim is honestly up for grabs. Lily made this claim based upon what Patchwork Heart themselves said on a tumblr post (I canât find it). Since the call regarding their conversation failed to record properly, Lilyâs in reasonable territory to claim Josh did so, since there is nothing to prove that Josh DIDNâT bully Patch (Iâm not saying he did. It would just be difficult to prove either side). All Lily could work with was Patchâs tumblr post, since they were the only ones with Josh in that call. Lily formed an opinion based on the limited knowledge she had to work with. Since itâs impossible to prove whether Josh did bully Patch or not, I donât think this will hold up in court. The only way Lily could be guilty of defamation would be if the call between Josh and Patch was somehow corrected to play Joshâs audio, but there is no record of anything Josh may have said to Patch.
âI said âwildly racistâ things when you were working for me.â
Whether Josh had said these racist things, nobody except for Lily and Josh themselves know. This sounds like a personal problem they had with each other that could be corrected if they decided to compromise and discuss this. Unfortunately both are more concerned about a power struggle more than anything, making this an unrealistic solution. Iâm not sure what to say about this. Moving on.
âI am a fake Marine.â
Lily had never actually claimed that. In her âGuard Breakâ video, here is what she said regarding Joshâs status as a Marine.
âMr. Burner wasnât actually in the military. He was in the Marine Corpsâ band, the ceremonial âIâm helpingâ of most military branches. And to presume some kind of genuine authority out of that is to claim that the children who participate in the royal Navy Seal Cadets have any genuine military experience.â
What Lily did in this statement was make a somewhat arguable opinion regarding a fact. The fact of the matter is that Josh was in the Marine Corpsâ band. Lilyâs opinion is that since playing in the band and actual combat are completely different, he shouldnât try to act as if he has âmilitary authority.â While this is offensive to many people (I canât blame anyone for thinking that), itâs on legal territory since she isnât calling Josh a fake marine. She acknowledges Josh was in the Marineâs band, and uses an (pretty bad, but still legal) analogy to describe what she thinks of it. Saying someone is a fake marine is different from what Lily said. Her claim is equivalent to saying Josh is a sorry excuse of a marine. Offensive? Yes. Illegal? No.
âI am a fake Christian.â
To be honest, as a Catholic, I and many others have no idea what Christianity is about. Itâs generally common knowledge that Josh is a Christian and takes pride in that. Itâs also known that he has conservative beliefs. What Lily essentially did was call him a hypocrite, since both have principles that inherently conflict. Others may disagree about Josh being a hypocrite. Calling someone a hypocrite for their beliefs is definitely offensive, but doing so is merely an opinion made based on the facts. I doubt attorneys will handle this aspect of the lawsuit, should it happen.
All of these claims made on Joshâs C&D Letter wonât realistically pass through the court or lawyers. Lilyâs statements about Josh amount to opinions formed based on actions or facts about Josh. Josh, being a public figure like Lily or many other YouTubers, isnât legally protected from such actions. Trying to file a harassment lawsuit as a public figure is extremely difficult to get through, since lawyers wonât take a case thatâs as gray as this one. Furthermore, Joshâs subscriber and patron count have increased and will continue to do so. Itâll be difficult to prove damages if both increase, since they inevitably make more money for him. If the sub count or patron count had dropped, then he can realistically prove damages, but since the opposite happened, itâs almost impossible. Calling someone an enabler and a pedophile are different since pedophilia is clear cut, while enabling someone can be interpreted as such through many different actions, making it unclear.
HOWEVER
This does not mean I condone Lilyâs actions. Nevertheless, she is not legally obligated to stop being an asshole to people. Just as she has her rights to criticize and insult others, sheâs also fair game to receiving it as well. Nothing is stopping anyone from criticizing her or vice versa, JUST AS LONG as it isnât blatantly false. If itâs an opinion formed based on the facts, itâs fair game. Still, there is one action mentioned on the C&D that puts her into dangerous territory...
âThreatening physical harm / to kill me / saying I should die.â
Her claiming she will put a gun to Joshâs head puts her on thin ice legally. Of course, she can possibly defend herself, saying it was a hyperbole. However, she really does need to back off the violent remarks. This is really the only claim I can find on the letter that a lawyer would actually consider. Anything regarding harm or death puts the person on a fine line between claiming it was a hyperbole and actually making realistic threats.
OVERALL
While I donât justify any of Lilyâs actions, Joshâs biggest mistake seems to be his lack of experience and ineptitude in handling these kinds of situations. A lot of what Lily did is morally wrong, but the law wonât stop her from doing so. Some of the claims are difficult to prove for either side, since the conversation failed to include everything mentioned. I donât want this to appear as if Iâm âwhite-knightingâ Lily Orchard while âtrying to find Josh guilty.â Neither side is entirely correct or wrong about it. Here is a suggestion Iâd like to make. You both almost had the chance to end this within 10-30 minutes on a Discord conversation. You both almost had the chance to stop all the dislike sprees and drama. But you both valued the power struggle more than actually solving the problem. Lilyâs suggestion of Josh pushing for the delisting of the Brony DND videos (while making them viewable by link) in exchange for her removing 4 videos that talk about Josh, honestly seems reasonable. Both sides get what they want. Both sides can walk away from each other. Both sides donât have to talk to each other or think about each other. Her last email that resorted to calling Josh a child was unnecessary, but throughout the email exchange, I thought she was being somewhat... civilized. Josh didnât have to act defensive and him focusing on the call being âon his termsâ may have prolonged this whole debacle. I canât blame him for thinking that way. Lily has been unforgiving to Josh, and he doesnât want to appear to be a pushover. However, there are some times, when you need to swallow your pride and be willing to compromise. Lily didnât need to write that final email insulting Josh, and Josh didnât need to disregard the deal over a power struggle. It couldâve all just ended. Of course, Lily could have some âulterior motivesâ behind discussing this with Josh, but for the sake of everything, take everything at face value and try to fix this together. If one of you goes back on your word, the (theoretical) conversation would be uploaded to hold either party accountable.
-J (Sorry for the long post, but it was necessary. Kudos for reading.)
157 notes
·
View notes
Text
Hidden Object Game Free For Mac
At GameHouse, you'll easily find a Hidden Object game worthy of your time. Dvd making for mac. These easy to play and entertaining games are an all-time favorite among players everywhere. From classic hidden object fun with games like Pure Hidden and the Vacation Adventures series to more adventurous games like Ghosts of the Past - Bones of Meadows Town and New. The Hidden Object Show for Mac OS v.1.69 Presenting the newest reality show to hit the casual market, The Hidden Object Show! On the set of an abandoned movie studio youâll be tasked with finding a list of items. Challenge yourself to win great prizes in 11 different game modes.
Free Downloadable Hidden Object Games For Pc
Free Hidden Object Games For Mac No Time Limit
App For Hidden Object Games
Hidden Object Games Free For Mac
Best Mac Hidden Object Games
Home
Hidden Object Games
More Games
Genres
Halloween mood can be felt everywhere, having in mind that those pumpkins are ..
When it comes to endangered species, sometimes there is a human factor that has an influence on ..
Roy wanted to become a detective his whole life. He watched those detective movies since he was ..
Special Holiday
Royal Magicians
Quiet village
The Perfect Thanksgiving
Letters for Veronica
The Magic Portal
Swamp Witch
Sign In
Karen is an owner of a small restaurant. Even though the ..
Maybe it is too early for Halloween, but for the three friends ..
Many people imagine living in a small town or a village because ..
The detective for paranormal activities, Jacob and the priest ..
So, today we have a classic Zuma game. We are sure that you know those games, it ..
It was a terrible thing that happened in Heather's family 20 years ..
Cooking has never been easy. Or at least it is not easy on the ..
Here is small refreshment in our games, a game ..
Free Downloadable Hidden Object Games For Pc
Enjoy playing interesting Free Hidden Object Games. Search different items at the screen using given names and object descriptions. The objects are somewhere in the game screen. Most of the games are unlimited online, free hidden object games with no download necessary. We are adding new game every day.
All product names, trademarks and registered trademarks are property of their respective owners. To use this option, you simply have to enter the address of the.PAC file in the URL box. Proxy for mac server. Systweak Blogs assumes no responsibility for errors or omissions in the contents on the Service. Use of these names, trademarks and brands does not imply endorsement.Disclaimer Last updated: January 30, 2019 The information contained on blogs.systweak.com website (the âServiceâ) is for general information purposes only. All company, product and service names used in this website are for identification purposes only.
Free Hidden Object Games For Mac No Time Limit
Hidden object games are a great opportunity to try your skills for concentration and focus. They are free; they are fun and very educational, and also appropriate for players of all ages. There's no need to download them, fell free to visit our web page unlimited times! Let the discovery begin!
App For Hidden Object Games
Hidden Object Games Free For Mac
Hidden object games are a great opportunity to try your skills for concentration and focus. They are free; they are fun and very educational, and also appropriate for players of all ages. There's no need to download them, fell free to visit our web page unlimited times! Let the discovery begin! The curiosity and the intention to discover new things are so typical for the human nature. Actually people develop essentially on this way, learn most effectively about the things researching. That's why hidden object games are becoming favourite online games genre. They answer exactly on the people's basic need - to find the hidden answer. On this web page you could find a large list of hidden object games that can answer to your appetite for discovering and adventure. For reminding, the main task in these games is to find hidden objects or pictures on the screen. Yo'ure usually given a list of names, shapes or other object descriptions, so you should find out these items, if you want to go to the next level. Maybe it seams easy for you, you concern yourself as a person that has discerning eye but these games are not as easy as they look. Some details are hidden so good that you need hours an hours of detective work. Sometimes they are about finding differences in 2 almost identical pictures, but some hidden object games are about searching for very tiny clues that lead to solving a great mystery.
Best Mac Hidden Object Games
Copyright © 2012 - 2020 hidden4fun.com | info(at)hidden4fun.com
0 notes
Photo
Pretty cooked interview i did last year.
~can totally vibe why it never got published~
1. Â Â Â Could you tell us more about you (little biography) ?
Sure! I was born in South Africa (1990), where my dad had something to do with a nut and bolt factory â which provided an ample means to put everything together, though I must admit I am usually preoccupied with taking things apart. I learn almost everything by destroying things; Analysis by deconstruction.
I have always had a keen interest in Robotics from a very young age, though the structured worlds of mechanical engineering or programming donât sit well with my methodologies of hacking and intuitive mechanical understandings. So I find myself most familiar when working hands on with physical systems.
My family later moved to Australia where I sucked at everything through highschool. After which i wanted to study industrial design but my grades were too low, so I enrolled in fine arts, later transferring to design. Studying Industrial design only made me more frustrated with the commercial interest behind product development (designed obsolescence, trending technologies, apps) leading to many arguments with tutors and elaborate projects that eventually got me nowhere. I returned to my Art degree enthused about having a means to create without any constraints and to use technology as a means for dialogue rather consumption.
For the past few years i have been living out of a backpack, carrying a case of tools with me from residency to exhibition - its worked out just fine or now :)
2. How did you conceive Big Dipper (from the idea to the conception)? More generally, How do you work (alone/ within a team)? What does your creative process look like?
Big dipper is a concept I have carried with me for some time now, a physical eruption of mechanical ideas, yet in the same way, a logical conclusion. A design ethos becomes apparent upon analysis of my work; nervous systems or central control components - in more organic terms, a spine. With design and production I start with the core working structure, rejecting any superfluous components I make this the heart of the work, from here many things can branch out and come to life; be the focus interactivity or repetitive mechanical actions. Itâs an inherent methodology embodied in my work.
Prototyped in Kochi (India) Big Dipper is the pinnacle of this subliminal infrastructure; a simple mechanical spine giving birth to beautiful light and life. The concept behind the title is that of stars, the kilns of the universe, which create the foundations of life and matter. Two sciences (Biology and Physics) both of which can be reduced to symbols, a helix (DNA) and a waveform (Radiation), existing as the only moving components of Big Dipper. I should probably also admit I was listening to allot of Death Grips at the time whoâs lyrics represent some kind of cultural blender, churning up art, physics, biology with contemporary social and punk idiologies in a way I find highly relatable (they have a song titled Big Dipper).
I complete most physical work alone, I am a perfectionist, but not when it comes to getting things done on time. I must admit friends and family have saved me a few times when deadlines rush up on me. I often outsource my programming, not only because Iâm terrible at it and it never works for me - I just donât trust computers.
3. In which ways or to what degree is digital creation important to your work? Did the digital inspire your work or is it just a means/a medium?
For me, the word digital is pretty loaded, since it means computers and structured action. I do use computers for research, 3D design and sometimes even code to control some of my works, but my heart lies with physical, traditional or analogue technologies. âDigitalâ art seems to grasp at the forefront of emergent technologies, offering a unique forum to digest mankind's relationship with the digital realm.
I am concerned that the internet, and almost everything digital that was designed to help us be more efficient at work is doing the complete opposite - enslaving us in a virtual world. We now build and buy physical devices that only interface with a reality that is completely non-physical. This is terrifying and people are completely complacent with just plugging in and performing tasks with the same regiment as a computer program.
Though a positive of consumerism in this digital world is to consider that not all physical products were made for a purpose, but that doesnât mean you canât convince people to buy them. This is where capitalism fails on an environmental and ethical level. One great advantage of digital technology is it allows the same heartless people who convince you to buy this years must have two wheeled Christmas skateboard to do the same kind of marketing with apps and digital media! Creating digital waste that only takes up storage on your phone/computer as opposed to plastic waste in a landfill or more likely the ocean. In Situations like this Digital art can become a very powerful tool; uncategorized and unconstraint, artists may use these new technologies to address and solve problems with civilization.
So I wouldnât really categorize myself as a digital artist, my practice deals more with physical technologies - though this often lends itself to the use of some digital applications.
In all honesty future terrifies me. I intend to help cure the loss of physicality in technology rather than perpetuate it. I believe in humble machines used as human aid rather than inhibition and control; machines that cannot betray you, penetrate your securities or condition you for mass manipulation. When everyone uploads their soul to the cloud Iâll be the one with the aluminum foil hat driving a bio-diesel tractor through the computers at your server center.
4. The theme of Nature seems to be very important to you. Why ? Does it just inspire you or do you want to deliver a message ?
I used to think I was using the field of Art to articulate similarities between technology and nature, contrasting the two in a paradoxical way, in a hope to create dialogue about the current state of our environment. I now realize thatâs not the case. Nature is inherent to technology and symbiotically exists as an infrastructure to almost everything I do and everything to do with technology. The same way I have developed an understanding of how to work with technology (through deconstruction) I have been applying to natural and social systems.
I use machines to model systems that interact with ecology and sociology. Aiming to empower or translate closed systems into tangible medium: a flooding river was given a voice; a goldfish held mercy to a cocktail party, synthesizers are controlled by an active volcano and in the Amazon mercury vapor rises above a golden statue in an illegal mining town. This myriad of encounters from ecological to political give rise to contrasts as paradoxes become diluted. With this theory I encourage anarchy as a praxis for reconstructing society and ecology - not vandalism as a means catastrophe.
3 notes
·
View notes
Text
Build vs. Buy: The AI martech conundrum
30-second summary:
All companies face the same dilemma around whether to build or buy a martech solution.
The key factors to determine the best option include: the problem, budget, and timeline.
Some of the risks of building your own software solutions boil down to opportunity cost, quality concerns, and technical debt, among others.
Buy if it enables you to start generating revenue sooner. Build it if it enables you to start generating revenue sooner if you have the resources to do it successfully.
Overall, working with an AI martech SaaS partner can be the best solution.
All companies face the same dilemma around whether to build or buy an AI martech solution. This is an important decision for businesses of all sizes due to resource constraints.
Making the wrong decision could have severe consequences to the long-term successâor even viabilityâof the business.
Here are the key factors to determine the best option:
The problem
The first step is to clearly define the problem you are attempting to solve. Is this a common problem, or a unique one facing your company specifically?
For example, developing ways to get smarter in acquiring new customers is a common problem, but most companies donât currently leverage an AI intelligent machine to solve this problem.
The most common approach is to hire more user acquisition managers, consultants, and/or agencies, so more humans can analyze the data and optimize the campaigns. This can be an expensive, high risk proposition.
Itâs always good to first look at how other companies are trying to solve the problemâare there any external third-party solutions you can leverage? If itâs a problem specific to your company, you may have trouble finding an existing workable solution.
Even if the problem is already well addressed, itâs possible your business needs fall closer to edge cases not encompassed by the products currently on the market, which could be an argument for the decision to build.
At most companies, building an AI martech solution isnât a good option because they donât have the dedicated resources available to build and support a complicated AI project of this magnitude. Most have a limited number of technical and data resources and need to focus on their own core products.
The budget
The next concern is budget. Do you have the necessary funds to see this project through to completion as well as extra resources in case you go over budget?
Most companies do not have a big budget to invest into building their in-house artificial intelligence (AI) capabilities. This is why it can often be easier to justify a monthly recurring payment or even an annual expense for a third-party SaaS product.
A good analogy to use is the decision to buy or rent a home. If you do not have the necessary funds to make a down payment on a house, then it becomes necessary to rent, even if the rental fee is equivalent to what the mortgage payment would be.
When deciding if you should build a solution to your problem, the budget must include the long-term technical debt (mortgage) associated with hosting and maintaining your solution, in addition to the up-front costs (down payment).
The timeline
The next consideration is the time horizon. Is your problem a threat to the survival of your company or just a nagging annoyance that could be improved? What is the impact to your company if this problem isnât solved soon?
You must consider whether or not the problem will compromise the performance of the business. If you need a solution now, it can be an easy decision. Is there a solution in existence? If yes, buy it. If no, then, well⊠youâre going to have to build it as soon as possible.
There are risks awaiting you at every turn as you navigate this framework and ultimately make the final decision to build or buy. Letâs discuss some of these risks so you can make the most informed decision possible.
Risks of building an AI martech solution
The end goal in building an AI martech solution is to help your marketing team to make smarter data-driven decisions on the right optimization levers to pull to efficiently spend your budgets and resources to help accelerate growth. Some of the risks of building your own software solutions boil down to opportunity cost, quality concerns, and technical debt, among others. Here are the main ones to keep in mind:
Is marketing AI your core competency?
Most companies are not set up to have marketing AI as their core competency unless that is their main product focus. There are high costs to support AIâbuilding teams of data scientists and machine learning engineers, building data infrastructures, and maintaining all of these resources.
The reality is that you need your internal resources to focus on developing and supporting the unique product capabilities that you offer.
Building an AI solution is a huge undertaking even with the right internal resources in place to support this project. Companies that build out of their circle of competence risk building inferior products compared to companies dedicated to solving the problem.
How often will it need to be updated?
The ability to dedicate resources to maintain and manage your AI project is very important because the machine learning needs oversight to ensure the right data is going in.
The algorithms need to be validated to confirm they are making the right decisions to help you acquire new customers cost effectively. This isnât going to be something you build once and never touch (as if that ever happens). Itâs going to need constant updatingâfurther taking time away from your core product development.
Is it worth it? This is generally the big challenge with trying to prioritize in-house resources to maintain an AI project that isnât the top priority for the business and getting in-house technical resources excited about maintaining it.
What is the opportunity cost?
The trade-off in any company is the opportunity cost of resources being deployed to support Project A compared to Project B while considering the timeframe of either project being deployed.
An example would be the costs in time and money of employees (data scientists, engineers, quality assurance, etc.) building and maintaining an AI project versus leveraging those resources to work on something else like improving your core product user experience (which is most likely the reason they joined your company).
Your decision to build may be to the detriment of other projects that will likely hurt morale and postpone any major technological breakthroughs with lost productivity.
Another cost to factor in is any delays in the deployment of an AI solution (including the necessary machine learning training) that would result in your marketing team not spending their budget as efficiently as possible.
Taking time to think considerably about how the pricing structure of an off-the-shelf solution compares to a custom solution when considering organizational growth will allow the most effective, responsible, and successful decision making.
Technical debt
This is a common concept in programming that reflects the extra development work that arises when code that is easy to implement in the short run is used instead of applying the best overall solution. Technical debt can be taken on intentionally when a quick fix is not the ideal solution but necessary
given the timeline and budget. Other times technical debt is the result of poor planning and architecture. The long-term costs associated with building and maintaining an AI solution internally can lead to expensive issues down the road with quality, performance, lost time, and money.
This is bad because technical debt is one of the largest and most impactful issues affecting software development today with companies under pressure to deliver projects on time.
No economies of scale
Are you disadvantaged when it comes to sourcing tools that contribute to the AI build?
Unanticipated expenses such as server fees and monthly database charges as well as hiring talent like data scientists and engineers could be a huge risk of building.
Companies that service many customers are able to distribute the costs of software operations and maintenance evenly across their clients. These economies of scale can allow them to charge less for a product or service than you would be able to achieve by building it yourself.
If a third partyâs economies of scale and other factors put your build at a disadvantage you may strongly consider the option to buy, but not before evaluating the risks associated with buying. Itâs important to look at the long-term ROI on this project that factors in the economies of scale.
Risks of buying an AI martech solution
Most AI solution partners will offer a free-trial or proof-of-concept (POC) period to give you the ability to evaluate their capabilities with your data.
Before moving forward with a trial, demo, or quote, review some of the surface-level risks of buying a software solution versus building one yourself (you need to do a thorough job on the due diligence process to mitigate these risks).
Weighing it all out
The overall goal is to minimize cost now and cost later. Therefore, the deciding factor is delivering something of value that your marketing team can leverage to start generating revenue from it.
Buy if it enables you to start generating revenue sooner. Build it if it enables you to start generating revenue sooner if you have the resources to do it successfully.
Overall, working with an AI martech SaaS solution can be the best solution for most companies to get farther faster.
Lomit Patel is the Vice President of Growth at IMVU. Prior to IMVU, Lomit managed growth at early-stage startups including Roku (IPO), TrustedID (acquired by Equifax), Texture (acquired. by Apple) and EarthLink. Lomit is a public speaker, author, advisor, and recognized as a Mobile Hero by Liftoff. Lomitâs new book Lean AI, which is part of Eric Riesâ best-selling âThe Lean Startupâ series, is now available at Amazon.
The post Build vs. Buy: The AI martech conundrum appeared first on ClickZ.
source http://wikimakemoney.com/2020/06/23/build-vs-buy-the-ai-martech-conundrum/
0 notes
Text
Original Post from Rapid7 Author: Joe Agnew
This is part three in a three-part series on medical device risk management, particularly as it pertains to vulnerability assessment. In part one, we discuss the processes and procedures to implement inside of a clinical environment to position the security team for success. Part two gets in the weeds and examines how to directly perform assessments on medical devices. In part three, we put it all together with an example of how an organization would implement these ideas with a based-in-reality medical device.
In our previous two posts, we have built out some theory on how to approach safely bringing medical devices into the vulnerability management life cycle. We have done this with an eye toward patient safety, up to the point where weâre proactively preparing for mistakes to be made. What would this process look like in practice?
A new initiative
Welcome to Mooseville Medical! A major metropolitan hospital system, Mooseville Medical has a primary level-one trauma center, several connected satellite clinics, and administrative personnel spread out wherever they fit. The bulk of the organization is focused on the main hospital, and taken as a unit, the environment is littered with everyday workstations, a modest data center, andâof courseâmedical devices.
We in the information security team have recently been told, somewhat ungracefully, that we need to examine âthe cyber stuffâ with regards to the organizationâs medical devices. The lone piece of guidance weâve been given is to (all together now) avoid patient harm.
There are a few things we know already as we begin to tackle this new initiative. First, the medical devices are segmented. We verified this with the biomedical team when implementing our vulnerability management program. Biomedical actually maintains a handy inventory of devices they have deployed. Several of those donât even have a connected component and therefore have a dramatically reduced risk profile. With that said, there are a couple of systemsâincluding a newer infusion pump with a management serverâthat are very much connected.
As we are not experts in any of these devices, our colleagues in biomedical prove to be an invaluable resource. After we describe our initiative (and theyâve calmed down when we tell them weâre not going to touch their production network), theyâre enthusiastic that weâre showing an interest in their world. Weâre looking for something thatâs going to be a good first test bed: high-impact, network-connected, and readily available to play with. It doesnât take long to circle in on the infusion pumps. Thereâs a ton of them deployed, theyâre connected, and they cycle in and out of maintenance constantly, allowing us to steal one away for some experimentation.
Theyâre also kind enough to give us some operational data on the pump. It runs a proprietary operating system, with a few extra gigabytes of storage beyond what the OS needs for updates and configuration. It has modest memory and processing power. The management server runs Windows 2008 and communicates with the pump via a web server on port 8080. From a connection perspective, the pump has a standard ethernet port and a serial port that the biomedical team never touches. There are buttons on it for manual configuration of dosages, and a simple physical user interface for examining the current configuration of said dosages.
The biomedical team is also letting us play with it in their testing environment. Itâs a modest setup; thereâs a non-prod management server connected to a few pumps that are out of production for maintenance. Itâs all connected via a consumer router.
Learn by doing
We should probably grab the documentation for the device and give it a read, but nuts to that. Learn by doing! Connecting to the router, we ping the pump and get a return. Cool, good to note. Telnet to 8080 succeeds, verifying that the device is currently in something resembling normal operation, at least according to the biomedical team. Throwing caution to the wind, we fire up Nmap and let a SYN scan fly against all TCP ports. The findings are ⊠unexpected. Port 21 comes back alive, but everything else is deadâincluding 8080. Huh. Sure enough, Telnet to 8080 is no longer connecting.
The biomedical team is equally confused. After a power cycle, the device appears to be working normally again, and we take another swing. This time, we introduce a rate limit on Nmap. Other than being slower, though, the results are the same. Bouncing the pump again, we change Nmap from a SYN scan to a full TCP connect and suddenly, the world is illuminated. Ports 21, 22, 23, and 8080 are live. Service enumeration identifies no surprises on those portsâan FTP server, an SSH server, a Telnet server, and a web server. Theyâre all open source and all a tad on the old side, but versions are clear.
Here, we resist the urge to start really pounding the device. Old versions of four services, with two of them unencrypted remote access services, are bound to have at least some vulnerabilities we can take advantage of. However, the SYN scan issue is a concern, indicating that this device isnât the most stable thing in the world when scanning. We put a pin in this information for now.
Unleash the vuln scanner
Nmap and Telnet are great first tools, but we want to see how this thing plays with our vulnerability scanner. We know our vuln scanner is multi-threaded, so itâs going to introduce an extra load element that Nmap didnât have. Our usual default template checks to see first whether a device is alive via ICMP and some well-known TCP ports. Next, it does service discovery on well-known TCP and UDP ports, as well as performs some operating system detection. Finally, it launches vulnerability checksâ10 at a timeâmatched against the discovered services and OS. Before launching, we make one critical change to the template: switching from a SYN scan to a full TCP connect. Look at us, learning.
The scan finishes and, at first blush, we get what we expect. The four services are discovered, the scanner basically has no idea on the OS beyond some generic unix fingerprint, and we get a handful of generic vulnerabilities. Included are some gross-but-probably-false positives on username/password combos on the Telnet service. Weâre only human, though, and when the vuln scanner tells us that âroot/rootâ is going to work, well, what do you think weâre going to do?
The attempt fails, but not for the reason we expect. The Telnet service is unresponsive, and further attempts on the other known ports shows that theyâre all unresponsive. While muttering a few expletives, we power cycle the pump and head to the logs. It just looks like we lost connectivity in the middle of vulnerability checks. Iterating a few times, we see the same behavior, though in slightly different places in the logs each time.
There are only a handful of things it could be. An individual vulnerability check could potentially crash a poorly built service, but is unlikely to knock the whole system overâand the logs arenât stopping on a specific check, anyway. The most likely issue is that we hit it too hard. We drop the template down to running a single vulnerability check at a time (instead of 10) and let it fly again. Bingo! The device survives, and of course we find a few more generic vulnerabilities this time since our checks were able to complete. (Incidentally, the default Telnet password didnât work. Weâre pleased, but disappointed. You understand.)
After a little more experimenting, we find that the trouble starts at around seven simultaneous threads for vuln checking. We drop our template down to five for safety purposes. Having satisfied our need for a safe and stable scan template, itâs time to figure how secure this thing is. The couple of vulnerabilities that the vulnerability scanner found were fairly generic. We did get a few hits on the open source FTP and web server, but nothing remotely exploitable.
Finding the real vulnerabilities
Luckily, thereâs a highly sophisticated research tool that reveals that there are indeed some device-specific vulnerabilities with this particular pump that our vulnerability scanner is not aware of. Theyâre fun vulnerabilities, too, and include:
A remote buffer overflow specific to the version weâre running. Thereâs no available exploit code, and weâre not exactly exploit writers, but the disclosure notes that full remote access is possible.
A hardcoded password. And this one works. Sigh.
No certificate validation, vulnerable to man-in-the-middle.
Passwords are stored in the clear on the device. Another sigh.
Thereâs good news with the bad news, though. Updated software for the pumps exists to address these. In addition, weâve verified with biomedical and the device manual that FTP, SSH, and Telnet are not required for regular operations. Already we have some recommendations for the organization that can be safely implemented to lock these devices down better.
In addition to those recommendations, we make a few changes to the way we scan for vulnerabilities generally. Although weâre assured itâs unlikely, itâs still possible that a pump could drop into our main network instead of the medical device network, and our testing indicates that our default scan templates are not going to play nicely. However, the performance hit weâd take by slowing down our scans would be highly impactful, so we decide to break our vulnerability scanning into two stepsâsomething we probably should have done already, anyway.
For step one, we implement a discovery scan. No vulnerability checks, we go relatively slow, and we do full TCP connects. We also build a dynamic asset group thatâs explicitly designed to identify these pumps. Any assets that have those four services running and a generic unix OS get thrown into the asset group automatically and tagged with âMedical Device?â for further investigation. For now, all other assets get tossed into âsafe to scanâ asset groups, appropriate to their location and scan schedule. Then, our regular vulnerability scans operate off of the new safe asset groups, where we do what weâve been doing. Just for fun, we run the new discovery scan across the environment to validate our assumptions that these devices arenât on the primary network.
Welp.
It takes some figuringâwe end up having to visit a specific floor of the hospital and take a look at a few patient rooms when theyâre unoccupiedâbut we finally determine that the network ports are not properly labeled. Thereâs a primary network drop and a medical device network drop in these rooms, and the pumps are sometimes placed on the wrong drop. After interviewing some of the medical personnel, they note that, oh yeah, sometimes the pumps are âflakyâ with the network software, but they all know how to operate them offline so they just roll with it. This ends up the worst of both worldsâthe devices are exposed on the main network (and weâve been scanning them and probably knocking them over!) and thereâs no management or reporting of issues established from the medical personnel to the biomed team to help us discover this.
Recommendations
What did we learn and, just as importantly, recommend by going through this exercise?
The pumps we evaluated need to be updated and have non-critical services disabled (SSH, Telnet, FTP).
There are some people processes to fix. Biomedical is working in conjunction with the clinical staff to ensure odd behavior gets reported rather than ignored.
Medical devices get placed in the wrong place, and âdefendingâ against that by intentionally treading lightly on the main network is super important.
Security is developing a notification process for known medical devices showing up in non-medical networks.
Patches arenât getting pushed regularly. Many of the vulns found through either the scanner or our independent research were resolved by a software update. Since those software updates didnât introduce functional changes, though, and there werenât issues being reported by the clinical users, biomedical wasnât aware of a need to push updates. For known medical devices, partner with the biomedical team to review security updates and the implications of applying the updates.
We need to get into the clinical environment more. Flaws in how pumps are deployed in some of the patient rooms directly led to risk to the patients, and there is likely much more to be learned by spending time assessing these rooms.
This process needs to be repeated with the other medical devices in Mooseville Medical. Significant risk was identified with the first one we examined. Itâs likely this was only the tip of the iceberg.
Biomedical is on board to work with us, and more than a little startled at the first round of findings. Management is pleased (if concerned) with our first set of findings, and weâve got defenders high and low to back up our continued work with medical devices. The work continues.
While this is a fictional example (obviously) Iâd like to note that it is based in reality. In building it, I worked off of the profiles for existing infusion pumps and environments that Iâve worked in before. The vulnerabilities are all real and have all been observed in this type of device. Iâve embellished a little throughout the story to make it more interesting, but the scenario itself is realistic.
This series is intended to provide both guidance and ammunition for organizations interested in taking a serious look at their medical devices. It is critical that we understand the risk these devices bring with their utility and the risk we introduce by having them as part of a connected network. Heavy-handed approaches of âscan everythingâ without a deliberate approach will (and should) be met with the resistance. Coordinated, collaborative efforts ensure a better partnership and better security practices by everyone. It is important to realize that information securityâs goal of serving and protecting can do more harm than good if not handled with care. In our zeal to protect patients, we can unintentionally become our own worst enemy. Let us not be the risk to the businessâpatient care is the business. Information security must respond accordingly.
#gallery-0-5 { margin: auto; } #gallery-0-5 .gallery-item { float: left; margin-top: 10px; text-align: center; width: 33%; } #gallery-0-5 img { border: 2px solid #cfcfcf; } #gallery-0-5 .gallery-caption { margin-left: 0; } /* see gallery_shortcode() in wp-includes/media.php */
Go to Source Author: Joe Agnew Medical Device Security, Part 3: Putting Safe Scanning into Practice Original Post from Rapid7 Author: Joe Agnew This is part three in a three-part series on medical device risk management, particularly as it pertains to vulnerability assessment.
0 notes
Text
THIS IS THE FOURTH WAY IN WHICH OFFERS BEGET OFFERS
What counts as a substantial offer depends on who it's from and how much it is. 042199217 various 0. The application that pushed desktop computers out into the world. It could be anywhereâin Los Alamos, New Mexico, for example, you can tell when you get an investor to commit, it becomes increasingly easy to get more people through the test drive and found that at a certain step they would get all kinds of publicity. When they finally decide to try, they find they can't.1 The RIAA and MPAA would make us breathe through tubes down here too, even though it is probably fairly innocent; spam words tend to be concentrated around fundraising. If you were going to be a car expert to own a car. At Viaweb we sometimes ran into trouble on this account. With server-based software is that a university can make or break an ambitious young South Korean. You really should get around to reading all those books you've been meaning to.
Maybe if the idea of starting a company. System administrators can become cranky and unresponsive because they're not directly exposed to competitive pressure: a salesman has to deal with customers, and a lot smarter. The danger of behaving arrogantly is greatest when you're doing well, they'll often invest in phase 3. Grad school makes a good launch pad for startups, because you're paying for the hardware.2 The Mac was popular with hackers when it first came out, and elections will be decided on issues, as political commentators like to think they are now.3 And the spammers would also, of course, big companies like docile conformists. I kept finding the same pattern. You might say that it's an accident that it thus helps identify this spam. The student was stealing his smells! It's important to realize that Google's current location in an office park, because then the people who pay the most for it, is roughly what you hope to raise.4 What if they like you? But it's not humming with ambition.
You should always talk to investors serially, plus if you only have a handful of the most egregious spam indicators. We never had more to say at any one time. The ultimate source of the discrepancy is their sketchiness or your wishful thinking, the prospect of confirming a commitment in writing will flush it out. But there are lots of surprises for individual startups too, and they have different views of reality, whether the source of your trouble is overhiring. Countries worried about their competitiveness are right to be concerned about the number of nonspam and spam messages respectively. 030676773 pop3 0. It can't be easy. I was in college. That makes the acquisition very expensive when it finally happens. It works because although the response rate is abominably low at best 15 per million, vs 3000 per million for a catalog mailing, the cost, to them, the unsuccessful founders had the sort of place that has conspicuous monuments.
On the Internet, nobody knows you're a dog. Upgrades won't be the big shocks they are now. Anything deleted as spam goes into the spam corpus, with only 1.5 I'd encourage you to focus initially on organic ideas.6 For much the same way. So when you get an email from a partner you should try harder. Because they can't predict the winners in advance? In my nephews' rooms the bed is the only factor, just that it's the only one left after the efforts of the two parties cancel one another out. You can take money from investors when you're not in fundraising mode, or slow down your interactions with an investor without asking what happens next. The first time it raised money, it will at least initially experience the other side of this coin is that it's not that important. Redwoods mean those are the parts where the fog off the coast comes in at night; redwoods condense rain out of fog. What matters in Silicon Valley is not even that.
Hipness is another thing you wouldn't have seen on the list 100 years ago, it turned out not to be desperate.7 To use a purely Web-based applications are an ideal source of revenue.8 An improved algorithm is described in Better Bayesian Filtering. At Viaweb we spent the first six months just writing software. For example, big companies are bad at product development because they're bad at everything. There would be no more than a page long and describe in the most matter of fact language what you plan to do, but in the late 90s said the worst thing investors will do. Nonhackers don't often realize this, but most hackers are very competitive. The only safe strategy is never to seem arrogant at all. And I think the two changes are related.9 A url with an ip address is of course an extremely incriminating sign, except in the mail of a few thousand people seems big enough.10 So when you're not. But I think founders will increasingly be the fate of anyone who wants to get things done.
If you're young and smart, you don't have to try to get into the mind of a spammer, but let's take a quick look inside the mind of someone who didn't happen to specialize in programming languages and have a good friend called Morris.11 Ultimately it comes down to common sense. And that should be part of tokens, and everything else to be a successful product company in the sense of having a single unchanging definition is that its definition changes very slowly. No matter how determined you are, you should on the whole err on the side of solving problems by spending money, and then come back and implement them. Fortunately, there were few obstacles except technical ones. This suggests an answer to a question people in New York would feel like a second class citizen. And when there's no installation, it will be at a high valuation, and the more people you have, the harder it will be way too late to make money but to try to make money writing a Basic interpreter for the Altair.12 Domain names differ from the rest of the text in a non-German email in that they often consist of several words stuck together. But Occam's razor means, in effect, is leaks in a seal.
The problem is not the most important thing is who you know. Palo Alto. Only raise the price on an investor you're comfortable with losing, because some will angrily refuse. What's scary about Microsoft is that a Web-based software is never going to be necessary to some class of users other than you. I'm not claiming this is because I've achieved some kind of server/desktop hybrid, where the operating system. DC and LA seem to send messages too, but I don't lead, or that they'll invest once you have a family to support, could be serious. Don't listen to them. It's a sign they're not really interested. At this stage I end up with a much firmer grip on the code. As for the theory being obvious, as far as I know there's no word for something we could do together. And if you manage to write something that takes off, you may find it's suddenly a lot easier for a couple years before starting your own company. Desktop software breeds a certain fatalism about bugs.
A who B is.13 Ordinary users shouldn't even know the words operating system, because the young have no performance to measure yet, and any error in guessing their ability will tend toward the mean. It's common for startup founders of all ages to build things no one wants. When you start fundraising, the expected value of an investor who moves too slow, or treat a contingent offer as the no it actually is and then, by accepting offers greedily, because the advice I've given here, because the advice I've given here, because the best investors as partners. Compound bugs are two separate bugs that interact: you trip going downstairs, and when they did finally take a CEO, they chose a guy with a PhD in computer science. Friends would leave something behind when they moved, or I'd see something as I was walking to work I would think of some new acquisition wasn't the difference between its retail price and what I paid for it.14 Data moves like smells now.15 It's one of the strongest. To talk about what has to happen fast, because you were already worrying about it subconsciously.16 Whatever looked like the biggest win. The obvious way to solve the problem with fairly simple algorithms. But such a corpus would be useful for other kinds of filters too, because it could be any other way, as long as you fix bugs right away, the net effect, for the average user, all the top five words here would be neutral and would not contribute to the spam probability.
Notes
Instead of bubbling up from the initial investors' point of failure, which merchants used to build little Web appliances. That's the difference between being judged as a single cause.
Steve Jobs got pushed out by John Sculley in a non-corrupt country or organization will be just mail from people who are good presenters, but I know of a startup. 001 negative effect on the one hand and the company's expense by selling them overpriced components. Where Do College English Departments Come From?
If anyone wants to see famous startup founders and one different qualities that some of those most vocal on the server. It's hard to grasp the cachet that term had. Instead of the class of 2007 came from such schools.
A supports, say, but there has to their work.
I'm not saying that's all prep schools supplied the same phenomenon you see them much in the belief that they'll be able to invest at any valuation the founders of Google to do this would work so hard to measure how dependent you've become on distractions, try this experiment: set aside for this situation: that the rest of the funds we raised was difficult, and in fact I read comments on e. If I were doing Viaweb again, that alone could in principle 100,000 of each token, as in most competitive sports, the angel is being unfair to him like 2400 years would to us that the elegance of proofs is quantifiable, in 1962. But friends should be asking will you build for them. According to Michael Lind, when politicians tried to raise five million dollars.
Good investors don't yet have any of his peers, couldn't afford it. Make it clear when you use the word content and tried for a seed investor to intro you to believing in natural selection in the less educated ones.
Most people let them mix pretty promiscuously. Especially if they don't want to design new languages. Until recently even governments sometimes didn't grasp the distinction between the subset that will pay the bills so you could turn you into a significant effect on returns, but they seem pointless. I'm not saying we should at least a whole is becoming more fragmented, the approval of an early funding round.
Everyone else was talking about art, they can do to get rich by creating wealthâuniversity students, heirs, professors, politicians, and there was nothing to grab onto.
Acquirers can be and still provide a profitable market for its shares will inevitably arise. That's a valid point. Xkcd implemented a particularly alarming example, MySpace is basically the market price for you; who knows who you might be digital talent.
Give the founders. Don't ask investors who turned them down because investors don't like.
If you're building something they get more votes, as it needs to learn to acknowledge, but that's what you're doing something, but delusion strikes a step later in the 1990s, and they were just ordinary guys. The real danger is that you can't distinguish between people, but in practice that doesn't have users. 94. At the time.
They say to most people come to writing essays is to tell computers how to appeal to space aliens, but the churn is high, they still probably won't invest. But it isn't critical to.
Proceedings of 2003 Spam Conference.
A round. If Bush had been bred to look appealing in stores, but it wasn't. For the price of an urban context, issues basically means things we're going to work in a separate box weighing another 4000 pounds. The actual sentence in the sciences, even thinking requires control of scarce resources, political deal-making causes things to be redeveloped as a high-minded Edwardian child-heroes of Edith Nesbit's The Wouldbegoods.
One reason I did when I first met him, but that it's no longer written in C and C, and b was popular in Germany. We don't call it procrastination when someone works hard and not others, and also really good at acting that way. Give us 10 million and we'll tell you them.
Maybe it would literally take forever to raise money on Demo Day. According to Sports Illustrated, the best response is neither to bluff nor give up more than their competitors, who adds the cost can be done, lots of opportunities to sell something bad can be either capped at a time.
Thanks to Garry Tan, Sarah Harlin, Jessica Livingston, Paul Buchheit, Ingrid Basset, John Collison, Steve Huffman, and Geoff Ralston for sharing their expertise on this topic.
#automatically generated text#Markov chains#Paul Graham#Python#Patrick Mooney#guy#office#token#efforts#anyone#effect#money#algorithms#lot#Viaweb#Mac#nothing#something#A#merchants#MPAA#Day#One#school#contingent#email#market#friends#sentence
0 notes
Text
Gartner picks digital ethics and privacy as a strategic trend for 2019
Analyst Gartner, best known for crunching device marketshare data; charting technology hype cycles; and churning out predictive listicles of emergent capabilities at softwareâs cutting edge has now put businesses on watch that as well as dabbling in the usual crop of nascent technologies organizations need to be thinking about wider impacts next year â on both individuals and society.
Call it a sign of the times but digital ethics and privacy has been named as one of Gartnerâs top ten strategic technology trends for 2019. That, my friends, is progress of a sort. Albeit, it also underlines how low certain tech industry practices have sunk that ethics and privacy is suddenly making a cutting-edge trend agenda, a couple of decades into the mainstream consumer Internet.
The analystâs top picks do include plenty of techie stuff too, of course. Yes blockchain is in there. Alongside the usual string of caveats that the âtechnologies and concepts are immature, poorly understood and unproven in mission-critical, at-scale business operationsâ.
So too, on the software development side, is AI-driven development â with the analyst sneaking a look beyond the immediate future to an un-date-stamped new age of the ânon-techie techieâ (aka the âcitizen application developerâ) it sees coming down the pipe, when everyone will be a pro app dev thanks to AI-driven tools automatically generating the necessary models. But thatâs definitely not happening in 2019.
See also: Augmented analytics eventually (em)powering âcitizen data scienceâ.
On the hardware front, Gartner uses the umbrella moniker of autonomous things to bundle the likes of drones, autonomous vehicles and robots in one big mechanical huddle â spying a trend of embodied AIs that âautomate functions previously performed by humansâ and work in swarming concert. Again, though, donât expect too much of these bots quite yet â collectively, or, well, individually either.
Itâs also bundling AR, VR and MR (aka the mixed reality of eyewear like Magic Leap One or Microsoftâs Hololens) into immersive experiences â in which âthe spaces that surround us define âthe computerâ rather than the individual devices. In effect, the environment is the computerâ â so you can see what itâs spying there.
On the hardcore cutting edge of tech thereâs quantum computing to continue to tantalize with its fantastically potent future potential. This tech, Gartner suggests, could be used to âmodel molecular interactions at atomic levels to accelerate time to market for new cancer-treating drugsâ â albeit, once again, thereâs absolutely no timeline suggested. And QC remains firmly lodged in an âemerging stateâ.
One nearer-term tech trend is dubbed the empowered edge, with Gartner noting that rising numbers of connected devices are driving processing back towards the end-user â to reduce latency and traffic. Distributed servers working as part of the cloud services mix is the idea, supported, over the longer term, by maturing 5G networks. Albeit, again, 5G hasnât been deployed at any scale yet. Though some rollouts are scheduled for 2019.
Connected devices also feature in Gartnerâs picks of smart spaces (aka sensor-laden places like smart cities, the âsmart homeâ or digital workplaces â where âpeople, processes, services and thingsâ come together to create âa more immersive, interactive and automated experienceâ); and so-called digital twins; which isnât as immediately bodysnatcherish as it first sounds, though does refer to âdigital representation of a real-world entity or systemâ driven by an estimated 20BN connected sensors/endpoints which it reckons will be in the wild by 2020.Â
But what really stands out in Gartnerâs list of developing and/or barely emergent strategic tech trends is digital ethics and privacy â given the concept is not reliant on any particular technology underpinning it; yet is being (essentially) characterized as an emergent property of other already deployed (but unnamed) technologies. So is actually in play â in a way that others on the list arenât yet (or arenât at the same mass scale).
The analyst dubs digital ethics and privacy a âgrowing concern for individuals, organisations and governmentsâ, writing: âPeople are increasingly concerned about how their personal information is being used by organisations in both the public and private sector, and the backlash will only increase for organisations that are not proactively addressing these concerns.â
Yes, people are increasingly concerned about privacy. Though ethics and privacy are hardly new concepts (or indeed new discussion topics). So the key point is really the strategic obfuscation of issues that people do in fact care an awful lot about, via the selective and non-transparent application of various behind-the-scenes technologies up to now â as engineers have gone about collecting and using peopleâs data without telling them how, why and what theyâre actually doing with it.
Therefore, the key issue is about the abuse of trust that has been an inherent and seemingly foundational principle of the application of far too much cutting edge technology up to now. Especially, of course, in the adtech sphere.
And which, as Gartner now notes, is coming home to roost for the industry â via peopleâs âgrowing concernâ about whatâs being done to them via their data. (For âindividuals, organisations and governmentsâ you can really just substitute âsocietyâ in general.)
Technology development done in a vacuum with little or no consideration for societal impacts is therefore itself the catalyst for the accelerated concern about digital ethics and privacy that Gartner is here identifying rising into strategic view.
It didnât have to be that way though. Unlike âblockchainâ or âdigital twinsâ, ethics and privacy are not at all new concepts. Theyâve been discussion topics for philosophers and moralists for scores of generations and, literally, thousands of years. Which makes engineering without consideration of human and societal impacts a very spectacular and stupid failure indeed.
And now Gartner is having to lecture organizations on the importance of building trust. Which is kind of incredible to see, set alongside bleeding edge science like quantum computing. Yet here we seemingly are in kindergartenâŠ
It writes: âAny discussion on privacy must be grounded in the broader topic of digital ethics and the trust of your customers, constituents and employees. While privacy and security are foundational components in building trust, trust is actually about more than just these components. Trust is the acceptance of the truth of a statement without evidence or investigation. Ultimately an organisationâs position on privacy must be driven by its broader position on ethics and trust. Shifting from privacy to ethics moves the conversation beyond âare we compliantâ toward âare we doing the right thing.â
The other unique thing about digital ethics and privacy is that it cuts right across all other technology areas in this trend list.
You can â and should â rightly ask what does blockchain mean for privacy? Or quantum computing for ethics? How could the empowered edge be used to enhance privacy? And how might smart spaces erode it? How can we ensure ethics get baked into AI-driven development from the get-go? How could augmented analytics help society as a whole â but which individuals might it harm? And so the questions go on.
Or at least they should go on. You should never stop asking questions where ethics and privacy are concerned. Not asking questions was the great strategic fuck-up condensed into Facebookâs âmove fast and break thingsâ anti-humanitarian manifesto of yore. Yâknow, the motto it had to ditch after it realized that breaking all the things didnât scale.
Because apparently no one at the company had thought to ask how breaking everyoneâs stuff would help it engender trust. And so claiming compliance without trust, as Facebook now finds itself trying to, really is the archetypal Sisyphean struggle.
Source: https://bloghyped.com/gartner-picks-digital-ethics-and-privacy-as-a-strategic-trend-for-2019/
0 notes
Text
Gartner picks digital ethics and privacy as a strategic trend for 2019
Analyst Gartner, best known for crunching device marketshare data; charting technology hype cycles; and churning out predictive listicles of emergent capabilities at softwareâs cutting edge has now put businesses on watch that as well as dabbling in the usual crop of nascent technologies organizations need to be thinking about wider impacts next year â on both individuals and society.
Call it a sign of the times but digital ethics and privacy has been named as one of Gartnerâs top ten strategic technology trends for 2019. That, my friends, is progress of a sort. Albeit, it also underlines how low certain tech industry practices have sunk that ethics and privacy is suddenly making a cutting-edge trend agenda, a couple of decades into the mainstream consumer Internet.
The analystâs top picks do include plenty of techie stuff too, of course. Yes blockchain is in there. Alongside the usual string of caveats that the âtechnologies and concepts are immature, poorly understood and unproven in mission-critical, at-scale business operationsâ.
So too, on the software development side, is AI-driven development â with the analyst sneaking a look beyond the immediate future to an un-date-stamped new age of the ânon-techie techieâ (aka the âcitizen application developerâ) it sees coming down the pipe, when everyone will be a pro app dev thanks to AI-driven tools automatically generating the necessary models. But thatâs definitely not happening in 2019.
See also: Augmented analytics eventually (em)powering âcitizen data scienceâ.
On the hardware front, Gartner uses the umbrella moniker of autonomous things to bundle the likes of drones, autonomous vehicles and robots in one big mechanical huddle â spying a trend of embodied AIs that âautomate functions previously performed by humansâ and work in swarming concert. Again, though, donât expect too much of these bots quite yet â collectively, or, well, individually either.
Itâs also bundling AR, VR and MR (aka the mixed reality of eyewear like Magic Leap One or Microsoftâs Hololens) into immersive experiences â in which âthe spaces that surround us define âthe computerâ rather than the individual devices. In effect, the environment is the computerâ â so you can see what itâs spying there.
On the hardcore cutting edge of tech thereâs quantum computing to continue to tantalize with its fantastically potent future potential. This tech, Gartner suggests, could be used to âmodel molecular interactions at atomic levels to accelerate time to market for new cancer-treating drugsâ â albeit, once again, thereâs absolutely no timeline suggested. And QC remains firmly lodged in an âemerging stateâ.
One nearer-term tech trend is dubbed the empowered edge, with Gartner noting that rising numbers of connected devices are driving processing back towards the end-user â to reduce latency and traffic. Distributed servers working as part of the cloud services mix is the idea, supported, over the longer term, by maturing 5G networks. Albeit, again, 5G hasnât been deployed at any scale yet. Though some rollouts are scheduled for 2019.
Connected devices also feature in Gartnerâs picks of smart spaces (aka sensor-laden places like smart cities, the âsmart homeâ or digital workplaces â where âpeople, processes, services and thingsâ come together to create âa more immersive, interactive and automated experienceâ); and so-called digital twins; which isnât as immediately bodysnatcherish as it first sounds, though does refer to âdigital representation of a real-world entity or systemâ driven by an estimated 20BN connected sensors/endpoints which it reckons will be in the wild by 2020.Â
But what really stands out in Gartnerâs list of developing and/or barely emergent strategic tech trends is digital ethics and privacy â given the concept is not reliant on any particular technology underpinning it; yet is being (essentially) characterized as an emergent property of other already deployed (but unnamed) technologies. So is actually in play â in a way that others on the list arenât yet (or arenât at the same mass scale).
The analyst dubs digital ethics and privacy a âgrowing concern for individuals, organisations and governmentsâ, writing: âPeople are increasingly concerned about how their personal information is being used by organisations in both the public and private sector, and the backlash will only increase for organisations that are not proactively addressing these concerns.â
Sure, people are increasingly concerned about privacy. Though ethics and privacy are hardly new concepts (or indeed new discussion topics). So the key point is really the strategic obfuscation of issues that people do in fact care an awful lot about, via the selective and non-transparent application of various behind-the-scenes technologies up to now â as engineers have gone about collecting and using peopleâs data without telling them how, why and what theyâre actually doing with it.
Therefore, the key issue is about the abuse of trust that has been an inherent and seemingly foundational principle of the application of far too much cutting edge technology til now. Especially, of course, in the adtech sphere.
And which, as Gartner now notes, is coming home to roost for the industry â via peopleâs âgrowing concernâ about whatâs being done to them via their data. (For âindividuals, organisations and governmentsâ you can really just substitute âsocietyâ in general.)
Technology development done in a vacuum with little or no consideration for societal impacts is therefore itself the catalyst for the accelerated concern about digital ethics and privacy that Gartner is here identifying rising into strategic view.
It didnât have to be that way though. Unlike âblockchainâ or âdigital twinsâ, ethics and privacy are not at all new concepts. Theyâve been discussion topics for philosophers and moralists for scores of generations and, literally, thousands of years. Which makes engineering without consideration of human and societal impacts a very spectacular and stupid failure indeed.
And now Gartner is having to lecture organizations on the importance of building trust. Which is kind of incredible to see, set alongside bleeding edge science like quantum computing. Yet here we are seemingly in kindergartenâŠ
It writes: âAny discussion on privacy must be grounded in the broader topic of digital ethics and the trust of your customers, constituents and employees. While privacy and security are foundational components in building trust, trust is actually about more than just these components. Trust is the acceptance of the truth of a statement without evidence or investigation. Ultimately an organisationâs position on privacy must be driven by its broader position on ethics and trust. Shifting from privacy to ethics moves the conversation beyond âare we compliantâ toward âare we doing the right thing.â
The other unique thing about digital ethics and privacy is that it cuts right across all other technology areas in this trend list.
You can â and should â rightly ask what does blockchain mean for privacy? Or quantum computing for ethics? How could the empowered edge be used to enhance privacy? And how might smart spaces erode it? How can we ensure ethics get baked into AI-driven development from the get-go? How could augmented analytics help society as a whole â but which individuals might it harm? And so the questions go on.
Or at least they should go on. You should never stop asking questions where ethics and privacy are concerned. Not asking questions was the great strategic fuck-up condensed into Facebookâs âmove fast and break thingsâ anti-humanitarian manifesto of yore. Yâknow, the motto it had to ditch after it realized that breaking all the things didnât scale.
Because apparently no one at the company had thought to ask how breaking everyoneâs stuff would help it engender trust. And so claiming compliance without trust, as Facebook now is, really is the archetypal Sisyphean struggle.
Via Natasha Lomas https://techcrunch.com
0 notes
Text
How to Stay Safe When You Travel as a Female
Updated: 8/21/2018 | August 21st, 2018
Kristin Addis from Be My Travel Muse is our go to solo female travel expert and writes a guest column featuring tips and advice. Itâs an important topic I canât adequately cover, so I brought in an expert to share her advice. This month her column is on safety tips since itâs been a common question among women travelers.
One of the chief concerns for most would-be solo travelers is safety. Can I stay safe on my own? How can I convince my friends and family that Iâll be okay? The good news is: yes, you will be safe on the road. Itâs easier than you think because you already have the skills you need â the same methods you use to stay safe at home are relevant abroad as well.
Most people are scared before taking off on their first solo adventure (or in my case, 30th solo adventure). Itâs easy to be nervous before heading somewhere new. There are a lot of unknown factors (will you make friends? will you be safe?) that youâll turn over and over in your brain.
But itâs all in your head. Your brain is creating worst-case scenarios that arenât likely to happen. Iâve found that following a few simple rules is enough to keep me (and you) safe on the road.
Safety Tip #1: Trust your gut instincts
Thereâs much to be said about the power of intuition. If something or someone gives you an uneasy vibe, thereâs no shame in walking away or saying no. If your gut is telling you that something doesnât feel right, listen to it. This sense naturally becomes more heightened over time as a solo traveler.
Some people thought I was crazy and even stupid to hitchhike through China, but after years on the road, I trusted my intuition enough to sound the alarm bells if something didnât feel right. There were times, such as late at night in Rome when Iâve been offered a ride and immediately said no because I knew something was off. Itâs surprising how much listening to that little voice in the back of your mind can steer you in the right direction.
Safety Tip #2: Donât be afraid to say no
Donât be afraid that you will disappoint people by only saying yes when it feels right. Your solo journey is about you and nobody else.
Sometimes in bars and hostels, the group mentality to keep drinking and the pressure to partake in yet another round of shots is present on a daily basis.
Getting too intoxicated can lead to serious problems. Keep it to a few drinks at most if youâre alone without anyone to look out for you. I canât tell you how long my list is of friends who have been robbed in alleyways in Spain or mugged in an otherwise safe Berlin because they became too intoxicated. It can happen easily, especially when in party areas or with party people. For this and other personal reasons, I have quit drinking alcohol completely, at home and on the road, and that not only has kept me safer but also led me to meeting people on my travels who are interested in things other than partying, and thatâs led to more enriching experiences overall.
Safety Tip #3: Keep a dummy wallet and whistle
In order to keep your most important valuables safe, some travelers suggest using a dummy wallet, which is a fake wallet that contains some canceled credit cards and a little bit of cash. Itâs enough to make a would-be thief think heâs getting something worthwhile while keeping your real valuables well hidden (like under the insole of your shoe).
Another important tool is something that makes noise. A whistle has come in handy more than once for me, especially when I remembered the tale of another solo female traveler who once used it to ward off rabid monkeys in Indonesia. I did the very same several months later when, in a split second, I remembered to use my whistle as an angry monkey was lunging toward me. It goes to show that you never know how useful something so small can be.
Safety Tip #4: Get advice from locals
Make full use of the platforms available online to understand what to look out for in the area you are traveling to, especially if itâs your very first time traveling solo in the area. There are many online communities such as TripAdvisor, Lonely Planet, and Facebook groups where updates are shared by locals, expats, and experts. I find asking safety questions on these platforms is sometimes more reliable than some travel information websites as they are much more current, though it wouldnât hurt to research common scams and dangers in your destination on them. For Americans, that would be the Bureau of Consular Affairs.
Ask employees at your hotel or guesthouse which scams to look out for. Find out not only what you should see during your visit but also which areas to avoid. Nobody knows this better than the people who live there year-round. Finally, a reputable walking tour at the beginning of your trip in a new city is not only a great way to have a proper introduction to the area, but also an opportunity to ask questions get more safety tips from your local guide.
Safety Tip #5: Dress appropriately
Dress like a local in order to blend in. By standing out, you risk more than just annoying catcalls. Itâs a sad reality, but in some countries, women canât dress as they please and need to cover up.
In traditionally Muslim countries, for example, wearing shorts and tank tops is not advisable and can be perceived as offensive. Itâs best to at least cover the shoulders and the knees. Do some research on whatâs appropriate to wear before packing.
That seems obvious, but itâs still all too common to see topless girls on the beaches in Thailand, or super short shorts and crop tops in Malaysia and Indonesia. In order to be respected, itâs important to respect the localsâ customs and modesty levels.
Safety Tip #6: Donât walk alone at night
In some countries, itâs perfectly safe to walk alone at night. In others, it could be dangerous. Going out at night in groups or asking to be accompanied by someone else at your guesthouse or hotel is always smart.
Unfortunately I learned this the hard way after someone grabbed me in the dark as I walked along a dirt path in Nepal. The local police and my guesthouse owner were both bewildered, saying that kind of thing never happens there. Well, it turns out that it does, and I made sure never to be alone at night thereafter in Nepal, and now I make sure to not walk alone late at night.
Safety Tip #7: Make copies of your important documents
Although we always hope nothing will happen, itâs important to be prepared for a worst case scenario. Make copies of your important documents, including your passport, identity card, and insurance cards, and keep them in all of the bags you carry. Keep electronic copies as well, should the worst occur and you lose the paper copy along with the physical document. Take photos of all of your important documents and store them on your phone and laptop, in addition to uploading them to a secure cloud server.
I also recommend taking photos of electronics you are traveling with and uploading them to a cloud server. This will help prove you owned the item in case you need to make a travel insurance claim.
Safety Tip #8: Know the local emergency numbers
Look up the local emergency number online before you depart or ask the staff at the front desk wherever youâre staying. There are also apps, like TripWhistle, that provide emergency numbers from all over the world. Of course, the best-case scenario is that you never have to use it, but itâs always smart to be prepared in case you do need it.
Safety Tip #9: Let friends know where you are
Make sure someone (a friend, family member, or fellow traveler) knows your itinerary and where you should be at any given time. Try not to go off the grid completely or for long periods of time, especially if you have worried parents back home. If you do change your plans â because itâs bound to happen sometime â donât forget to let someone know. Internet cafes are generally easy to find, and many countries have inexpensive SIM cards ($20 or less) that will help you keep in touch if you have an unlocked phone. Besides, if youâre on the move, having Internet access for booking travel arrangements and finding directions is often a godsend.
*** In closing, traveling solo is marvelous. It allows you to make all of your own travel decisions, promotes personal growth and independence, and can even be a bit safer since you can take in more of your surroundings than if a friend were around distracting you. Solo traveling helps to sharpen intuition and, despite typical worries, is often no more dangerous than your hometown.
The same common sense you use at home is relevant abroad. Itâs not rocket science, and as long as youâre smart about it and follow these simple tips, youâre in for a positive adventure.
Kristin Addis is a solo female travel expert who inspires women to travel the world in an authentic and adventurous way. A former investment banker who sold all of her belongings and left California in 2012, Kristin has solo traveled the world for over four years, covering every continent (except for Antarctica, but itâs on her list). Thereâs almost nothing she wonât try and almost nowhere she wonât explore. You can find more of her musings at Be My Travel Muse or on Instagram and Facebook.
Conquering Mountains: The Guide to Solo Female Travel
For a complete A-to-Z guide on solo female travel, check out Kristinâs new book, Conquering Mountains. Besides discussing many of the practical tips of preparing and planning your trip, the book addresses the fears, safety, and emotional concerns women have about traveling alone. It features over 20Â interviews with other female travel writers and travelers. Click here to learn more about the book, how it can help you, and you can start reading it today!
The post How to Stay Safe When You Travel as a Female appeared first on Nomadic Matt's Travel Site.
from Traveling News https://www.nomadicmatt.com/travel-blogs/female-travel-safety/
0 notes
Photo
Updated: 8/21/2018 | August 21st, 2018
Kristin Addis from Be My Travel Muse is our go to solo female travel expert and writes a guest column featuring tips and advice. Itâs an important topic I canât adequately cover, so I brought in an expert to share her advice. This month her column is on safety tips since itâs been a common question among women travelers.
One of the chief concerns for most would-be solo travelers is safety. Can I stay safe on my own? How can I convince my friends and family that Iâll be okay? The good news is: yes, you will be safe on the road. Itâs easier than you think because you already have the skills you need â the same methods you use to stay safe at home are relevant abroad as well.
Most people are scared before taking off on their first solo adventure (or in my case, 30th solo adventure). Itâs easy to be nervous before heading somewhere new. There are a lot of unknown factors (will you make friends? will you be safe?) that youâll turn over and over in your brain.
But itâs all in your head. Your brain is creating worst-case scenarios that arenât likely to happen. Iâve found that following a few simple rules is enough to keep me (and you) safe on the road.
Safety Tip #1: Trust your gut instincts
Thereâs much to be said about the power of intuition. If something or someone gives you an uneasy vibe, thereâs no shame in walking away or saying no. If your gut is telling you that something doesnât feel right, listen to it. This sense naturally becomes more heightened over time as a solo traveler.
Some people thought I was crazy and even stupid to hitchhike through China, but after years on the road, I trusted my intuition enough to sound the alarm bells if something didnât feel right. There were times, such as late at night in Rome when Iâve been offered a ride and immediately said no because I knew something was off. Itâs surprising how much listening to that little voice in the back of your mind can steer you in the right direction.
Safety Tip #2: Donât be afraid to say no
Donât be afraid that you will disappoint people by only saying yes when it feels right. Your solo journey is about you and nobody else.
Sometimes in bars and hostels, the group mentality to keep drinking and the pressure to partake in yet another round of shots is present on a daily basis.
Getting too intoxicated can lead to serious problems. Keep it to a few drinks at most if youâre alone without anyone to look out for you. I canât tell you how long my list is of friends who have been robbed in alleyways in Spain or mugged in an otherwise safe Berlin because they became too intoxicated. It can happen easily, especially when in party areas or with party people. For this and other personal reasons, I have quit drinking alcohol completely, at home and on the road, and that not only has kept me safer but also led me to meeting people on my travels who are interested in things other than partying, and thatâs led to more enriching experiences overall.
Safety Tip #3: Keep a dummy wallet and whistle
In order to keep your most important valuables safe, some travelers suggest using a dummy wallet, which is a fake wallet that contains some canceled credit cards and a little bit of cash. Itâs enough to make a would-be thief think heâs getting something worthwhile while keeping your real valuables well hidden (like under the insole of your shoe).
Another important tool is something that makes noise. A whistle has come in handy more than once for me, especially when I remembered the tale of another solo female traveler who once used it to ward off rabid monkeys in Indonesia. I did the very same several months later when, in a split second, I remembered to use my whistle as an angry monkey was lunging toward me. It goes to show that you never know how useful something so small can be.
Safety Tip #4: Get advice from locals
Make full use of the platforms available online to understand what to look out for in the area you are traveling to, especially if itâs your very first time traveling solo in the area. There are many online communities such as TripAdvisor, Lonely Planet, and Facebook groups where updates are shared by locals, expats, and experts. I find asking safety questions on these platforms is sometimes more reliable than some travel information websites as they are much more current, though it wouldnât hurt to research common scams and dangers in your destination on them. For Americans, that would be the Bureau of Consular Affairs.
Ask employees at your hotel or guesthouse which scams to look out for. Find out not only what you should see during your visit but also which areas to avoid. Nobody knows this better than the people who live there year-round. Finally, a reputable walking tour at the beginning of your trip in a new city is not only a great way to have a proper introduction to the area, but also an opportunity to ask questions get more safety tips from your local guide.
Safety Tip #5: Dress appropriately
Dress like a local in order to blend in. By standing out, you risk more than just annoying catcalls. Itâs a sad reality, but in some countries, women canât dress as they please and need to cover up.
In traditionally Muslim countries, for example, wearing shorts and tank tops is not advisable and can be perceived as offensive. Itâs best to at least cover the shoulders and the knees. Do some research on whatâs appropriate to wear before packing.
That seems obvious, but itâs still all too common to see topless girls on the beaches in Thailand, or super short shorts and crop tops in Malaysia and Indonesia. In order to be respected, itâs important to respect the localsâ customs and modesty levels.
Safety Tip #6: Donât walk alone at night
In some countries, itâs perfectly safe to walk alone at night. In others, it could be dangerous. Going out at night in groups or asking to be accompanied by someone else at your guesthouse or hotel is always smart.
Unfortunately I learned this the hard way after someone grabbed me in the dark as I walked along a dirt path in Nepal. The local police and my guesthouse owner were both bewildered, saying that kind of thing never happens there. Well, it turns out that it does, and I made sure never to be alone at night thereafter in Nepal, and now I make sure to not walk alone late at night.
Safety Tip #7: Make copies of your important documents
Although we always hope nothing will happen, itâs important to be prepared for a worst case scenario. Make copies of your important documents, including your passport, identity card, and insurance cards, and keep them in all of the bags you carry. Keep electronic copies as well, should the worst occur and you lose the paper copy along with the physical document. Take photos of all of your important documents and store them on your phone and laptop, in addition to uploading them to a secure cloud server.
I also recommend taking photos of electronics you are traveling with and uploading them to a cloud server. This will help prove you owned the item in case you need to make a travel insurance claim.
Safety Tip #8: Know the local emergency numbers
Look up the local emergency number online before you depart or ask the staff at the front desk wherever youâre staying. There are also apps, like TripWhistle, that provide emergency numbers from all over the world. Of course, the best-case scenario is that you never have to use it, but itâs always smart to be prepared in case you do need it.
Safety Tip #9: Let friends know where you are
Make sure someone (a friend, family member, or fellow traveler) knows your itinerary and where you should be at any given time. Try not to go off the grid completely or for long periods of time, especially if you have worried parents back home. If you do change your plans â because itâs bound to happen sometime â donât forget to let someone know. Internet cafes are generally easy to find, and many countries have inexpensive SIM cards ($20 or less) that will help you keep in touch if you have an unlocked phone. Besides, if youâre on the move, having Internet access for booking travel arrangements and finding directions is often a godsend.
*** In closing, traveling solo is marvelous. It allows you to make all of your own travel decisions, promotes personal growth and independence, and can even be a bit safer since you can take in more of your surroundings than if a friend were around distracting you. Solo traveling helps to sharpen intuition and, despite typical worries, is often no more dangerous than your hometown.
The same common sense you use at home is relevant abroad. Itâs not rocket science, and as long as youâre smart about it and follow these simple tips, youâre in for a positive adventure.
Kristin Addis is a solo female travel expert who inspires women to travel the world in an authentic and adventurous way. A former investment banker who sold all of her belongings and left California in 2012, Kristin has solo traveled the world for over four years, covering every continent (except for Antarctica, but itâs on her list). Thereâs almost nothing she wonât try and almost nowhere she wonât explore. You can find more of her musings at Be My Travel Muse or on Instagram and Facebook.
Conquering Mountains: The Guide to Solo Female Travel
For a complete A-to-Z guide on solo female travel, check out Kristinâs new book, Conquering Mountains. Besides discussing many of the practical tips of preparing and planning your trip, the book addresses the fears, safety, and emotional concerns women have about traveling alone. It features over 20Â interviews with other female travel writers and travelers. Click here to learn more about the book, how it can help you, and you can start reading it today!
The post How to Stay Safe When You Travel as a Female appeared first on Nomadic Matt's Travel Site.
How to Stay Safe When You Travel as a Female https://ift.tt/2N7PLae
0 notes
Text
How to Stay Safe When You Travel as a Female
Updated: 8/21/2018 | August 21st, 2018
Kristin Addis from Be My Travel Muse is our go to solo female travel expert and writes a guest column featuring tips and advice. Itâs an important topic I canât adequately cover, so I brought in an expert to share her advice. This month her column is on safety tips since itâs been a common question among women travelers.
One of the chief concerns for most would-be solo travelers is safety. Can I stay safe on my own? How can I convince my friends and family that Iâll be okay? The good news is: yes, you will be safe on the road. Itâs easier than you think because you already have the skills you need â the same methods you use to stay safe at home are relevant abroad as well.
Most people are scared before taking off on their first solo adventure (or in my case, 30th solo adventure). Itâs easy to be nervous before heading somewhere new. There are a lot of unknown factors (will you make friends? will you be safe?) that youâll turn over and over in your brain.
But itâs all in your head. Your brain is creating worst-case scenarios that arenât likely to happen. Iâve found that following a few simple rules is enough to keep me (and you) safe on the road.
Safety Tip #1: Trust your gut instincts
Thereâs much to be said about the power of intuition. If something or someone gives you an uneasy vibe, thereâs no shame in walking away or saying no. If your gut is telling you that something doesnât feel right, listen to it. This sense naturally becomes more heightened over time as a solo traveler.
Some people thought I was crazy and even stupid to hitchhike through China, but after years on the road, I trusted my intuition enough to sound the alarm bells if something didnât feel right. There were times, such as late at night in Rome when Iâve been offered a ride and immediately said no because I knew something was off. Itâs surprising how much listening to that little voice in the back of your mind can steer you in the right direction.
Safety Tip #2: Donât be afraid to say no
Donât be afraid that you will disappoint people by only saying yes when it feels right. Your solo journey is about you and nobody else.
Sometimes in bars and hostels, the group mentality to keep drinking and the pressure to partake in yet another round of shots is present on a daily basis.
Getting too intoxicated can lead to serious problems. Keep it to a few drinks at most if youâre alone without anyone to look out for you. I canât tell you how long my list is of friends who have been robbed in alleyways in Spain or mugged in an otherwise safe Berlin because they became too intoxicated. It can happen easily, especially when in party areas or with party people. For this and other personal reasons, I have quit drinking alcohol completely, at home and on the road, and that not only has kept me safer but also led me to meeting people on my travels who are interested in things other than partying, and thatâs led to more enriching experiences overall.
Safety Tip #3: Keep a dummy wallet and whistle
In order to keep your most important valuables safe, some travelers suggest using a dummy wallet, which is a fake wallet that contains some canceled credit cards and a little bit of cash. Itâs enough to make a would-be thief think heâs getting something worthwhile while keeping your real valuables well hidden (like under the insole of your shoe).
Another important tool is something that makes noise. A whistle has come in handy more than once for me, especially when I remembered the tale of another solo female traveler who once used it to ward off rabid monkeys in Indonesia. I did the very same several months later when, in a split second, I remembered to use my whistle as an angry monkey was lunging toward me. It goes to show that you never know how useful something so small can be.
Safety Tip #4: Get advice from locals
Make full use of the platforms available online to understand what to look out for in the area you are traveling to, especially if itâs your very first time traveling solo in the area. There are many online communities such as TripAdvisor, Lonely Planet, and Facebook groups where updates are shared by locals, expats, and experts. I find asking safety questions on these platforms is sometimes more reliable than some travel information websites as they are much more current, though it wouldnât hurt to research common scams and dangers in your destination on them. For Americans, that would be the Bureau of Consular Affairs.
Ask employees at your hotel or guesthouse which scams to look out for. Find out not only what you should see during your visit but also which areas to avoid. Nobody knows this better than the people who live there year-round. Finally, a reputable walking tour at the beginning of your trip in a new city is not only a great way to have a proper introduction to the area, but also an opportunity to ask questions get more safety tips from your local guide.
Safety Tip #5: Dress appropriately
Dress like a local in order to blend in. By standing out, you risk more than just annoying catcalls. Itâs a sad reality, but in some countries, women canât dress as they please and need to cover up.
In traditionally Muslim countries, for example, wearing shorts and tank tops is not advisable and can be perceived as offensive. Itâs best to at least cover the shoulders and the knees. Do some research on whatâs appropriate to wear before packing.
That seems obvious, but itâs still all too common to see topless girls on the beaches in Thailand, or super short shorts and crop tops in Malaysia and Indonesia. In order to be respected, itâs important to respect the localsâ customs and modesty levels.
Safety Tip #6: Donât walk alone at night
In some countries, itâs perfectly safe to walk alone at night. In others, it could be dangerous. Going out at night in groups or asking to be accompanied by someone else at your guesthouse or hotel is always smart.
Unfortunately I learned this the hard way after someone grabbed me in the dark as I walked along a dirt path in Nepal. The local police and my guesthouse owner were both bewildered, saying that kind of thing never happens there. Well, it turns out that it does, and I made sure never to be alone at night thereafter in Nepal, and now I make sure to not walk alone late at night.
Safety Tip #7: Make copies of your important documents
Although we always hope nothing will happen, itâs important to be prepared for a worst case scenario. Make copies of your important documents, including your passport, identity card, and insurance cards, and keep them in all of the bags you carry. Keep electronic copies as well, should the worst occur and you lose the paper copy along with the physical document. Take photos of all of your important documents and store them on your phone and laptop, in addition to uploading them to a secure cloud server.
I also recommend taking photos of electronics you are traveling with and uploading them to a cloud server. This will help prove you owned the item in case you need to make a travel insurance claim.
Safety Tip #8: Know the local emergency numbers
Look up the local emergency number online before you depart or ask the staff at the front desk wherever youâre staying. There are also apps, like TripWhistle, that provide emergency numbers from all over the world. Of course, the best-case scenario is that you never have to use it, but itâs always smart to be prepared in case you do need it.
Safety Tip #9: Let friends know where you are
Make sure someone (a friend, family member, or fellow traveler) knows your itinerary and where you should be at any given time. Try not to go off the grid completely or for long periods of time, especially if you have worried parents back home. If you do change your plans â because itâs bound to happen sometime â donât forget to let someone know. Internet cafes are generally easy to find, and many countries have inexpensive SIM cards ($20 or less) that will help you keep in touch if you have an unlocked phone. Besides, if youâre on the move, having Internet access for booking travel arrangements and finding directions is often a godsend.
*** In closing, traveling solo is marvelous. It allows you to make all of your own travel decisions, promotes personal growth and independence, and can even be a bit safer since you can take in more of your surroundings than if a friend were around distracting you. Solo traveling helps to sharpen intuition and, despite typical worries, is often no more dangerous than your hometown.
The same common sense you use at home is relevant abroad. Itâs not rocket science, and as long as youâre smart about it and follow these simple tips, youâre in for a positive adventure.
Kristin Addis is a solo female travel expert who inspires women to travel the world in an authentic and adventurous way. A former investment banker who sold all of her belongings and left California in 2012, Kristin has solo traveled the world for over four years, covering every continent (except for Antarctica, but itâs on her list). Thereâs almost nothing she wonât try and almost nowhere she wonât explore. You can find more of her musings at Be My Travel Muse or on Instagram and Facebook.
Conquering Mountains: The Guide to Solo Female Travel
For a complete A-to-Z guide on solo female travel, check out Kristinâs new book, Conquering Mountains. Besides discussing many of the practical tips of preparing and planning your trip, the book addresses the fears, safety, and emotional concerns women have about traveling alone. It features over 20Â interviews with other female travel writers and travelers. Click here to learn more about the book, how it can help you, and you can start reading it today!
The post How to Stay Safe When You Travel as a Female appeared first on Nomadic Matt's Travel Site.
0 notes