#cloud security evolution
Explore tagged Tumblr posts
Text
Oracle cyber maverick dives into cloud security and AI - CyberTalk
New Post has been published on https://thedigitalinsider.com/oracle-cyber-maverick-dives-into-cloud-security-and-ai-cybertalk/
Oracle cyber maverick dives into cloud security and AI - CyberTalk
EXECUTIVE SUMMARY:
David is the Senior Vice President for the Oracle SaaS Cloud Security engineering and operations organization. Previously, David was the public Cloud Security Engineering Director in the Google Security and Privacy organization and his preceding 18 years were spent with Microsoft in numerous security cloud, product and engineering leadership roles. David holds a B.S. in Computer Information Systems as well as an MBA with a Management Information Systems concentration and is a longtime advocate of security application and technology, stemming from his U.S. military service background. In this edited interview excerpt from the CISO’s Secrets podcast, SVP & CISO for Oracle SaaS Cloud Security, David Cross, shares insights into his unique career journey, the cloud security evolution, and artificial intelligence. Don’t miss this!
We are very fortunate to host this interview with David Cross! It’s pretty exciting to be here.
I like to say that I’m just a ‘worker bee’, but one who likes to make things happen. I’m a multi-tasker; a quality that’s inherently relevant to security.
Cyber security is not a single task. It’s multi-tasking. You’ve got to jump into many things, all at the same time.
You’ve got to keep things moving. And that’s why it’s a great fit for some people, like myself.
You know one of the things I’ve said for a long long time is and that’s really so awesome about this industry is that no matter when you get in, you’re getting in at the beginning of something.
Would you like to share a bit about your background, which is quite storied and impressive? Sure thing. At the very beginning of my career, I was in an electronic Navy attack squadron, the EA-6B Prowler. I am very thankful to the United States Service. It really helped me in my career…
This kicked off my passion for security. Electronic warfare. The threats. The offensive attacks, those type of things that are both virtual and electronic.
And that was early too…For you to have been thinking about the intersection of the virtual world and security, at such a point in time, is pretty interesting. Well, going back to my earliest days with the squadron, we didn’t really have network computers. We had embedded weapons systems that were based on DOS.
And as we evolved, in just in a couple of years…we went to Banyan Vines for their computer systems. But then in our plane, we had our prototype — and I can’t go into much more detail than this — but we had the Toshiba laptop, with NT 3.5 on it…And at this point, the world was changing…And the threats and risks changed with it.
You talk about the attack squadron…Here we are 20-30 years later…How do you feel that your experience in the military influences your role today? At that point in time, not a lot of people were thinking about security.
Long story short, we were coming back from our last deployment, I was in an aircraft carrier. I was standing watch in the ready room. My commander wants me to sign-up and do another tour. And my thinking was ‘no, my time is done’.
I then stopped at the naval exchange bookstore, in Naples, Italy, and I picked up Bruce Schneier’s first book, Applied Cryptography. And as I was reading that, I realized ‘this is what I need to do’.
And it wasn’t my domain at that point. I was not a cryptographer and I wasn’t into cyber security. But after my experience and after I saw the transformation in terms of what was going on in the military…I felt that it was the time to jump in.
What are your views on cloud and how the cloud is evolving within the security space?
Absolutely. I spent a lot of my time on the operating system layer and on things like Windows. But then it became clear that the cloud was emerging…And you really just had to jump in.
Otherwise, it would be like saying ‘no, I’ll never use online bill pay, it’s too dangerous!’ Not for me. But, once the gate opened…
Right, otherwise it would be like saying, ‘I’d rather keep buying stamps!’
…It’s not ‘if’ everybody’s moving to the cloud, it’s ‘when’ you’re moving to the cloud. There’s no getting around it. For how long do you think that your favorite mail server on bare hardware is going to be produced and supported at this point? It’s going away. There could be some things that remain on-premise, but let’s look at reality. We have to accept emerging technologies. Just like AI.
Is AI going to go away? We already know the answer to that, don’t we?
Right, not a chance. With your background, I’d love to hear you talk a little bit about your views on AI. With AI, we’ve had ML for a long time, but now we’re witnessing a transformation. Pretty exciting, right? I think that now is the opportune time for us to develop applications, as we did when computer infrastructure came out.
My real question to you is, when are we going to adopt the laws of robotics that Issac Asimov came up with so long ago? Isn’t that the same as AI?
That’s a great question, David… I was born and raised in Detroit, an area home to the auto industry. At one point, it was thought that automation within the auto industry would kill jobs.
But it hasn’t. The auto industry has survived. The manufacturing and the roles have not changed.
AI is likely to have a similar effect. People fear that it’s coming for jobs, but the reality is that it probably won’t make a dent in that regard.
Another element that’s been hinted at a few times is that — whether you’re an engineering leader, a security leader or any other type of leader — things are going to change, and you have to keep learning.
The moment you stop learning is the moment that you’ve plateaued, and then you’re declining into the ocean.
AI is the next big thing — Am I going to reject it? No. Am I going to embrace it and learn it? Yes. It’s just like the cloud. We had to embrace it and learn it…
Another thing that I like to say is that it’s not about how hard you work, it’s about how much you invest in yourself. And that is what really makes a difference in people and the world.
You can choose to ignore the latest technology…But I think your point is spot-on. The fascinating stuff is the unknown; it’s not the stuff we know. And I think that’s what’s exciting about this industry, right? The cloud, IoT, SASE…The list goes on in terms of things that are coming to the fore. Totally, and…
Listen to the full podcast here.
Related resources
#ai#aircraft#amp#applications#artificial#Artificial Intelligence#automation#background#bee#book#Born#career#change#CISO#Cloud#Cloud Security#cloud security evolution#computer#computers#cryptography#cyber#cyber attack#cyber security#deployment#electronic#electronic warfare#emerging technologies#engineering#Evolution#fear
0 notes
Text
Is Cloud Storage Safe Enough for Your Sensitive Data? Unveiling the Security Landscape
The digital age has ushered in a new era of convenience. Cloud storage has become an indispensable tool, offering seemingly limitless space to store photos, documents, and other vital data. But with great convenience comes great responsibility. The question lingers: is cloud storage safe enough for your sensitive data?
This blog delves into the world of cloud storage security. We'll explore the security measures employed by cloud providers, examine potential risks, and ultimately help you decide if the cloud is the right fit for your sensitive information.
The Allure of Cloud Storage: Convenience and Accessibility
Cloud storage offers a multitude of benefits that have revolutionized data management:
Accessibility: Access your data from anywhere, anytime, with an internet connection. This eliminates the need for bulky physical storage devices and ensures your files are readily available across multiple devices.
Scalability: Cloud storage scales seamlessly with your needs. Need more space? Simply upgrade your plan. This flexibility eliminates the hassle of constantly managing physical storage limitations.
Collaboration: Cloud storage facilitates effortless collaboration. Share files and folders with colleagues and teams in real-time, enabling seamless project management and document editing.
Cost-Effectiveness: Compared to traditional storage solutions, cloud storage can be a cost-effective option. Eliminate the need for expensive hardware upgrades and ongoing maintenance of physical storage infrastructure.
Behind the Cloud: Unveiling Security Measures
Cloud storage providers implement various security measures to safeguard your data:
Encryption: Data is encrypted at rest and in transit, rendering it unreadable by unauthorized individuals even if intercepted. Encryption protocols like AES-256 are industry standards, offering robust protection.
Authentication: Multi-factor authentication (MFA) adds an extra layer of security by requiring additional verification steps beyond just a password. This significantly reduces the risk of unauthorized access.
Access Controls: Granular access controls allow you to determine who can access your data and what level of access they have. You can restrict editing, sharing, or even viewing permissions for specific users or groups.
Data Centers: Cloud providers invest heavily in securing their data centers, employing physical security measures like access control systems, surveillance, and environmental controls to protect against physical threats.
Backups and Redundancy: Robust backup and redundancy systems ensure your data is safe even in case of hardware failures or natural disasters. Cloud providers typically maintain geographically dispersed data centers, further minimizing the risk of data loss.
Beyond the Encryption: Potential Security Concerns
While cloud storage offers significant security benefits, it's crucial to acknowledge potential risks:
Vendor Lock-In: Switching cloud providers can be complex and time-consuming, leading to vendor lock-in. Carefully consider your needs and long-term goals when choosing a cloud storage provider.
Data Breaches: Although rare, data breaches can occur. Evaluate the cloud provider's track record of security and their response protocols in case of a breach.
Human Error: Accidental data deletion or unauthorized access due to human error remains a risk. Implement strong password management practices and educate yourself and any collaborators on cloud storage best practices.
Government Access: Cloud providers may be subject to government regulations, potentially granting authorities access to your data under certain circumstances. Understand the data privacy laws and regulations applicable to your cloud storage provider.
Mitigating Risks: Building a Secure Cloud Strategy
To maximize cloud storage security, consider these steps:
Choose a Reputable Provider: Research cloud providers and prioritize those with a strong track record of security and compliance with industry standards.
Embrace Strong Passwords: Utilize complex, unique passwords for your cloud storage accounts, and enable MFA wherever available.
Encrypt Sensitive Data: For added peace of mind, consider encrypting your most sensitive data before uploading it to the cloud. This adds an extra layer of security even if the provider experiences a breach.
Regular Backups: Maintain regular backups of your data outside the cloud storage platform. This provides an additional safeguard against potential data loss.
Stay Informed: Educate yourself on evolving cyber security threats and best practices. Consider enrolling in Cyber Security training to gain a deeper understanding of cloud security risks and mitigation strategies.
Investing in Your Future: The Value of Cyber Security Training
In today's digital world, Cyber Security training is no longer a luxury, but a necessity. Cyber Security training equips you with the knowledge and skills to navigate the complexities of cloud storage security and protect your data.
Here's how Cyber Security training empowers you:
Understanding Threats: Cyber Security training gives you a comprehensive understanding of common cloud storage security threats and vulnerabilities.
Learning Mitigation Strategies: The training equips you with
the knowledge and skills to implement effective strategies to mitigate these risks and minimize the potential impact on your data.
Developing Best Practices: Cyber Security training fosters the development of secure cloud storage practices, including password management, data encryption, and access control protocols.
Staying Ahead of the Curve: The cyber security landscape is constantly evolving. Cyber Security training helps you stay informed about emerging threats and adapt your security measures accordingly.
The Verdict: Cloud Storage - A Secure Option with a Caveat
Cloud storage offers a secure and convenient solution for a wide range of data storage needs. However, a well-informed approach is crucial. By understanding the security measures employed by cloud providers, acknowledging potential risks, and implementing best practices, you can leverage the benefits of cloud storage with confidence.
Embrace a Secure Future: Go Beyond Cloud Storage Security
Cloud storage security is just one piece of the puzzle. A comprehensive cyber security posture requires a multi-layered approach. Here are some additional tips:
Secure Your Devices: Implement robust security measures on your devices, including antivirus software, firewalls, and regular software updates.
Beware of Phishing Attacks: Be cautious of suspicious emails and links. Do not click on suspicious attachments or download files from untrusted sources.
Maintain Strong Password Hygiene: Regularly update your passwords and avoid using the same password across multiple accounts. Consider using a password manager to ensure strong, unique passwords for all your online accounts.
Conclusion: Building a Secure Digital Life
By prioritizing cloud storage security, investing in Cyber Security training, and adopting a broader cyber security awareness, you can take charge of your digital safety. In today's interconnected world, vigilance and knowledge are paramount. Embrace continuous learning and proactive security measures to protect your data and navigate the digital landscape with confidence.
#technology#cybersecurity#cyber security#cyber attack#cyber security course#data security#digital evolution#phishing#phishing attacks#phishing prevention#cloud storage#cloud security#Security
0 notes
Note
Can you do How would nct dream members would want to be loved?
★ — how nct dream would want to be loved ?
jaemin: he's such a hopeless romantic. i see that he wants to be loved exactly the way he's willing to love: embracing the mistakes and flaws of the person, adapting to them, and being a supportive presence if the other person feels the need to change. evolution together – jaemin wants someone to stay with him, not shy away from the intensity of his feelings, and not be afraid to form a bond with him.
jisung: these violent delights have violent ends / triumph, like fire and powder, / which, as they kiss, consume." this excerpt was the first thing that came to my mind reading his cards. jisung is somewhat disenchanted with love, so he's searching for someone who makes his heart burn: startling love at first sight, mutual seduction, and the feeling of being challenged not to fall in love easily.
jeno: desires a love that is calm and stable, making him feel secure and comfortable in a relationship. he can get anxious and insecure easily, so he needs someone mature with a future vision. jeno wants to be loved fully, facilitating healing from past wounds and promoting emotional growth.
renjun: is looking for a love that, above all, is solid. a relationship free of problems and easily manageable, where his and his partner's personalities are compatible but not in a way where they "merge" into one. he wants to be with someone who has originality and also respects his tastes and need for individuality at times.
chenle: wants to be loved passionately. someone with their head in the clouds enough to accept his imperfections and faults without running away – at least that's what he's looking for. he wants someone who can truly know and love him, even in his worst moments, and has patience with him as he strives to become a more confident and responsive person.
haechan: wants someone to take his breath away. he seeks someone who makes him feel out of orbit and elicits a sensation different from anything he has felt before. that's how he'll know he found "the one." someone who makes him laugh even when he wants to cry, warm, and with whom he envisions marrying. he doesn't want to waste time with just anyone; he wants someone he feels will be forever.
mark: is seeking a love that reflects maturity. i see that he's looking for someone who connects with him in a way that makes him feel they both have a purpose together. he wants someone who makes him think of family, dream of quieter times, someone whose company he truly appreciates, and who makes him admire all the little things that a stable and loving relationship can bring to his life. he wants someone willing to start an entirely new chapter in life with him through this relationship.
#— duckie notes ⪩♡⪨#kpop readings#nct dream tarot#jaemin#chenle#mark#jisung#jeno#renjun#haechan#kpop reading#kpop tarot#kpop astrology
185 notes
·
View notes
Text
Esoteric Christianity
Part 2: Shedding the Ego and Attaching to the Divine
Previously, we looked at the concept of the inner light, which lies at the core of Christianity. This light is not of external force, but rather the reality that is embedded within our own existence. It is the true nature of who we are in Christ, and it is through this inner awakening that we can undergo true spiritual transformation.
Here, we will look at a crucial step in this transformation: shedding the ego and detaching from the material world. These are not just theological concepts; they are practical stages in our spiritual evolution. To embody the light within, we must remove the barriers that prevent its expression - ego and attachments to the temporal world.
The Ego: A False Identity
In esoteric Christianity, the ego isn't an inherent part of the self, but rather a false identity - a constructed sense of "I" that is shaped by worldly desires, fears, and influences. This false sense of self clouds our true nature and keeps us trapped in a cycle of illusion. The ego is driven by pride, fear, selfishness, and desire for control, all which cast shadow on the divine light within.
Christ's teachings challenges us to move beyond the false self and recognise the true identity as beings created in God's image. In Matthew 16, Christ calls His followers to deny themselves and take up their cross, saying, "Whoever wants to be my disciple must deny themselves and take up their cross and follow me. For whoever wants to save their life will lose it, but whoever loses their life for me will find it."
This is an invitation to let go of the ego-driven need to control our destiny and to align ourselves with God's will. Self-denial in this context is not about punishing the self or diminishing one's worth, but rather surrendering the false ego that perpetuates suffering and separation from the divine.
The Cross: A Symbol Of Transcendence
The cross that Christ speaks of here is symbolic of the ego crucifixion. It is through the cross that Christ invites us into the process of killing off the false self in order to be reborn into the truth. The act of taking up the cross isn't about physical suffering, but rather about the spiritual death of the ego - the complete surrender of the self that constantly resists God's transformative power.
In Galatians 2:20, Paul echoes this concept: "I have been crucified with Christ and I no longer live, but Christ lives in me." This passage reflects the esoteric understanding of this specific spiritual journey: the ego must be crucified so that the Christ-self may emerge. This is the paradox of the Christ path - the more we surrender our attachment to ego, the more we fully come to embody the nature of Christ, the light that was always within us.
Detachment from the Material World
Esoteric Christianity teaches that while the material world is not inherently evil, it can become a source of distraction and attachment that pulls us away from our true nature and purpose. The desire for wealth, status, and security can enslave the soul, causing us to seek fulfilment in things that are fleeting, rather than in the eternal, unchanging truth.
Christ's words in Matthew 6:19-21 urge us to reanalyse our priorities: "Do not store up for yourselves treasures on earth, where moths and vermin destroy, and where thieves break in and steal. But store up for yourselves treasures in heaven, where moths and vermin do not destroy, and where thieves do not break in and steal. For where your treasure is, your heart will be there also."
This teaching encourages us to shift our focus from external accumulation to internal spiritual wealth. Detachment is not the giving up of the world altogether, but rather the refusal to allow the material world define our worth, our purpose, or our sense of identity. It means that recognising the true treasure is within - that the inner light of Christ is far more valuable than any amount of gold.
The process of detachment involves reordering our relationship with the world, seeing it not as something to possess, control, or compete against, but as a reflection of the divine and a tool for spiritual growth. By letting go of our attachment to the material world, we allow space for God to work in our lives.
The Role of Faith and Surrender
We must also learn to deepen our faith in God's plans for us. The ego constantly seeks to control, where faith surrenders to God's will, trusting that His plan is greater than any temporary desires or fears we may have. In the act of surrender, we open ourselves up to the grace of God, which nourishes the soul and leads us to the path of transformation.
In Romans 12:1-2, Paul urges believers: "Therefore, I urge you, brothers and sisters, in view of God's mercy, to offer your bodies as a living sacrifice, holy and pleasing to God - this is your true and proper worship. Do not conform to the pattern of this world, but be transformed by the renewing of your mind."
The living sacrifice Paul is talking about here is the willingness to offer our lives to God - not as an external sacrifice, but a spiritual one, where the ego and its attachments are surrendered in love and trust. The renewing of the mind is an ongoing process of aligning our thoughts, emotions, and actions with the divine truth. In doing so, we experience the awakening of the inner light that Christ promised.
The Awakening of the Inner Light
As we surrender the ego and detach from the material world, we create space within ourselves for the inner light of Christ to shine more fully. This process of awakening is not a one-time event, but an ongoing journey of spiritual growth and transformation. It requires continuous faith, self-reflection, and a willingness to let go of the illusions that keep us bound to the false self.
The inner light is the divine spark within each of us, the presence of Christ that dwells in the deepest parts of our being. When we release the ego's grip and allow the light to emerge, we begin to live from a place of authenticity, love, and compassion. Our actions become aligned with the will of God, and we experience a deep sense of peace and unity with all of creation.
This is the ultimate goal of esoteric Christianity: to shed the layers of false identity and attachments that separate us from God, and to embody the divine light that has always been within us. Through this process, we come to understand that we are not separate from God, but rather, we are divine beings who are called to manifest God's love and grace in the world.
Living in the Light
Living in the light means living in accordance with the divine nature that we were created to embody. It means recognizing that we are not defined by the ego or the material world, but by the eternal truth of our being in Christ. As we continue on this path of transformation, we learn to navigate the challenges of life with grace and wisdom, trusting in God's guidance and surrendering our personal will to the divine will.
This does not mean that we are free from difficulties or suffering, but it does mean that we approach life with a deeper sense of purpose and meaning. We understand that every experience, whether joyful or painful, is an opportunity for growth and spiritual evolution. By living in the light, we become vessels of God's love, spreading the light of Christ to those around us and contributing to the healing and transformation of the world.
hedding the ego and detaching from the material world are essential steps in the journey of spiritual awakening in esoteric Christianity. By releasing the false self and its attachments, we open ourselves to the transformative power of the divine and allow the inner light of Christ to shine more fully in our lives.
This process requires faith, surrender, and a willingness to embrace the unknown, trusting that God's plan for us is far greater than anything the ego could imagine. As we walk this path, we experience the profound truth of our identity as divine beings, created in the image of God and called to embody His love and light in the world.
The journey is ongoing, but with each step, we move closer to the ultimate goal: union with the divine, the realisation of our true nature, and the full expression of the light within us.
#christianity#conservatives#christian faith#jesus christ#esoterist#esoteric#faith#religionblr#religion#religious imagery#christian living#christian blog#studyblr#study motivation#study blog#autism#actually autistic#autistic adult#learning#education#research
17 notes
·
View notes
Photo
2023 August 5
NGC 1360: The Robin's Egg Nebula Image Credit & Copyright: Dong Liang
Explanation: This pretty nebula lies some 1,500 light-years away, its shape and color in this telescopic view reminiscent of a robin's egg. The cosmic cloud spans about 3 light-years, nestled securely within the boundaries of the southern constellation Fornax. Recognized as a planetary nebula, egg-shaped NGC 1360 doesn't represent a beginning though. Instead it corresponds to a brief and final phase in the evolution of an aging star. In fact, visible at the center of the nebula, the central star of NGC 1360 is known to be a binary star system likely consisting of two evolved white dwarf stars, less massive but much hotter than the Sun. Their intense and otherwise invisible ultraviolet radiation has stripped away electrons from the atoms in their mutually surrounding gaseous shroud. The predominant blue-green hue of NGC 1360 seen here is the strong emission produced as electrons recombine with doubly ionized oxygen atoms.
∞ Source: apod.nasa.gov/apod/ap230805.html
104 notes
·
View notes
Text
Cloud Divination: Mystical Meanings Behind These 100 Cloud Shapes! ☁️✨
Ever wondered what those cool cloud shapes could be revealing about your own future in a psychic reading? Here are 100 different cloud formations and their hidden messages!
Read the full tutorial here: https://psychics4u.net/cloud-divination/
(It also called Nepholomancy and Aeromancy).
Heart ❤️: Love and emotional connection.
Cross ✝️: Spiritual guidance or a significant life choice.
Circle 🔵: Completion, wholeness, or unity.
Triangle 🔺: Change or transformation.
Square ⬛: Stability and security.
Star ⭐: Inspiration and guidance.
Arrow ➡️: Direction and progress.
Wave 🌊: Change and movement.
Spiral 🌀: Growth and personal development.
Butterfly 🦋: Transformation and beauty.
Dragon 🐉: Power and strength.
Anchor ⚓: Stability and grounding.
Tree 🌳: Growth and connection to nature.
Sun ☀️: Joy and positivity.
Moon 🌕: Intuition and reflection.
Lightning Bolt ⚡: Sudden change or insight.
Bird 🕊️: Freedom and perspective.
Fish 🐟: Abundance and emotional depth.
Flower 🌸: New beginnings and beauty.
Key 🗝️: Solutions and unlocking potential.
Castle 🏰: Security and aspirations.
Ship 🚢: Journey and adventure.
Crown 👑: Achievement and leadership.
Crescent Moon 🌙: New beginnings and potential.
Sword ⚔️: Conflict and resolution.
Shield 🛡️: Protection and defense.
Chalice 🍷: Emotional fulfillment and nourishment.
Door 🚪: Opportunities and new experiences.
Pathway 🛤️: Life journey and decisions.
Mountain 🏔️: Challenges and accomplishments.
Wave 🌊: Emotional highs and lows.
Lock 🔒: Secrets or obstacles.
Map 🗺️: Guidance and direction.
Eye 👁️: Awareness and perception.
Ladder 🪜: Progress and advancement.
Hourglass ⏳: Time and patience.
Wings 🕊️: Freedom and transcendence.
Tornado 🌪️: Disruption and change.
Raindrop 💧: Emotional release or cleansing.
Vase 🏺: Creativity and receptivity.
Moon Crescent 🌙: Foresight and change.
Sunburst 🌟: New energy and enthusiasm.
Helmet ⛑️: Protection and readiness.
Ring 💍: Unity and commitment.
Bell 🔔: Alertness and awakening.
Rainbow 🌈: Hope and promise.
Starfish ⭐️: Healing and regeneration.
Leaf 🍃: Renewal and growth.
Pyramid 🔺: Strength and stability.
Hammer 🔨: Building and creating.
Cloudburst 🌧️: Emotional release or a sudden insight.
Bridge 🌉: Connection and transition.
Diamond 💎: Clarity and strength.
Feather 🪶: Lightness and spiritual connection.
Waves 🌊: Emotional cycles and flow.
Horizon 🌅: New opportunities and perspectives.
Footprint 👣: Personal journey and progress.
Puzzle Piece 🧩: Solutions and completeness.
Silhouette 🕵️: Hidden aspects or potential.
Jigsaw 🧩: Complexity and problem-solving.
Rocket 🚀: Ambition and exploration.
Candle 🕯️: Illumination and hope.
Jewel 💍: Value and uniqueness.
Puzzle Piece 🧩: Finding missing elements in life.
Zodiac Signs ♈️♉️♊️: Astrological influences and guidance.
Paw Print 🐾: Companionship and loyalty.
Guitar 🎸: Creativity and expression.
Yin-Yang ☯️: Balance and harmony.
Magnifying Glass 🔍: Focus and clarity.
Compass 🧭: Direction and guidance.
Iceberg 🧊: Hidden aspects or challenges.
Giraffe 🦒: Perspective and vision.
Moon Phases 🌑🌒🌓🌔🌕🌖🌗🌘: Cycles and transitions.
Scales ⚖️: Balance and fairness.
Telescope 🔭: Exploration and foresight.
Sunglasses 🕶️: Perception and clarity.
Infinity Symbol ∞: Endless possibilities and continuity.
Anchor ⚓: Security and grounding.
Caterpillar 🐛: Transformation and growth.
Mosaic 🧩: Diversity and complexity.
Trampoline 🏆: Ups and downs or bouncing back.
Archway 🌉: Transition and passage.
Windmill 🌬️: Energy and movement.
Maze 🧩: Challenges and problem-solving.
Train 🚂: Progress and movement.
Dove 🕊️: Peace and harmony.
Trophy 🏆: Achievement and recognition.
Scissors ✂️: Cutting ties or new beginnings.
Books 📚: Knowledge and learning.
Helix 🧬: Evolution and development.
Grapes 🍇: Abundance and prosperity.
Canoe 🛶: Journey and self-discovery.
Zeppelin 🛩️: High aspirations and visionary goals.
Chimney 🏠: Release and cleansing.
Footprints 👣: Guidance and direction.
Mirrors 🪞: Reflection and self-awareness.
Lantern 🏮: Guidance and illumination.
Dreamcatcher 🪶: Protection and dreams.
Hourglass ⏳: Patience and time management.
Wind 🌬️: Change and movement.
#cloud divination#cloud#clouds#divination#cloud reading#Aeromancy#Nepholomancy#cloud shape symbolism meaning#cloud shapes#cloud symbolism spiritual
16 notes
·
View notes
Text
Dyḗus Pətḗr
or as I write it, Dyéus Patér. Also Dyḗus ph₂tḗr
Dyéus is the god of the Sky. The blue, bright sky of day, daylight and clouds are his natural dominion. He also fulfills the role of a Father and is the Leader of the whole pantheon (my own UPG is that he leads the déiwōs not like a king but like a father).
Dyéus is also connected to the concept of the Ártus or Hártus (with a strong h like the ch in loch). The Ártus is the universal law that underlies the cosmos, the order and beauty of it that makes life possible. Dyéus, then, upholds the Ártus and represents the concept of justice but in a cosmic and natural way (justice as in the laws of society are the dominion of another déiwos). In the trifunctional view of Proto Indo-european society, he fulfills the role of the priest-king. He's a patron of priests and the idea of doing rituals in respectful ways.
The first part of his name, Dyéus, derives from déiwos, which is the generic term for a god. So in a way he is THE god. The second part of his name, Patér, means father. Thus, seeing him as your father in the sky is totally valid (traditional even ;)!
In english his name literally means "father daylight-sky-god"
He seems to have had a connection to oaths, coming from his connection with the natural law of the Ártus.
The sun (which has its own déiwos) is sometimes referred to as "the eye of Dyéus"
Dyéus also has other names like Olyópətēr, which means All-Father, and Mitrós, which is associated with a role he had as a double deity with another god that we will see later)
Offerings
Taken from here
Feathers of either eagles or of your local highest flying birds
Depictions or imagery of clouds
Depictions or imagery of oxen
Depictions or imagery of eagles
Depictions or imagery related to fatherhood
Golden beads
Devotional acts
Mostly UPG
Cloud watching
Wearing blue
Learning about different types of clouds
Collecting feathers
Climbing a hill or mountain
Doing things related to fatherhood or leadership
Associations
Taken from here and here
Oxen
Mountain tops
The open sky
Clouds as his herd
Eagles
Feathers of high flying birds
Eye
Gold threads
Obelisk (white)
Alder
Thursday
January
Descendants in later pantheons
The deities of the Proto Indo-European (PIE) pantheon are reconstructed based on the cognates (similar names, myths and such) between later deities in different pantheons of indo-european peoples (Greek, Roman, Germanic, Nordic, Vedic, Iranian, Celtic, Slavic, Baltic, among others). As these people spread out they took their gods with them which got reshaped through generations and the evolution of language.
Dyéus is the most securely reconstructed deity of the proto indo-europeans. Here are some of his most famous descendants or versions in later pantheons:
Zeus (Greek)
Jupiter (Roman)
Tyr (Nordic)
Tiwaz (Germanic)
Diēvas (Lithuanian)
Dyaus Pitar (Vedic)
The Dagda (Celtic)
Mitra (Vedic and Iranian)
Finally, here's his wikipedia article
#proto indo eauropean religion#proto indo european religion#proto indo european#proto indo european pantheon#proto indo-european#proto indo european gods#dyeus#dyeus pater#sky father#sky deity#deity#god#pagan#paganism#polyethism#polytheist#pagan reconstructionism#reconstructionist paganism#pagan revivalism#paganblr#pantheon#pie pantheon#pie paganism#pie polytheism#pie reconstructionism#pie religion#deity devotion#deity worship#deity work#dyeus deity
12 notes
·
View notes
Text
The Race for the Everything App in the West: Unraveling the Quest for Digital Domination
In the neon-drenched, cyberpunk reality of the 21st century, the digital realm is witnessing a colossal battle, reminiscent of Neal Stephenson's speculative universes. Tech corporations, with their sights set on the horizon, are not just competing but are on an ambitious quest to forge the "Everything App"—a digital El Dorado that promises to centralize our online lives. This pursuit, led vigorously by X (formerly known as Twitter) and echoed by a symphony of other platforms, is transforming the way we interact with digital services.
At the heart of this evolution lies a simple, yet profound strategy: expansion beyond core functionalities. Apps that once specialized in specific domains are now crossing into territories uncharted, offering a suite of services that range from messaging and social networking to financial transactions and beyond. This trend is not a mere coincidence but a calculated move towards creating a digital ecosystem where users can perform every conceivable online activity within a single app.
The Vanguard of the Everything App
X, under the stewardship of Elon Musk, is potentially the most audacious contender in the race. Initially a platform for microblogging, X is now venturing into areas like payment processing and content creation, aiming to transform itself into an indispensable tool for its users. However, X is not alone in this pursuit. Apps like WeChat in China have already demonstrated the viability of the "everything app," serving as a model for Western counterparts.
Facebook (now Meta), with its vast suite of services including Instagram, WhatsApp, and Oculus, is another titan striving to stitch together a comprehensive digital tapestry. Google, through its ecosystem encompassing Gmail, Google Pay, and YouTube, is also inching towards creating a unified experience. Meanwhile, Amazon's expansion into cloud services, media streaming, and even groceries underscores the same ambition: to be the one-stop digital shop for its users.
The Siren Song of Convenience
The allure of an everything app lies in its promise of unparalleled convenience. Imagine a digital Swiss Army knife that not only connects you with friends and family but also handles your finances, entertains, educates, and even shops for you. The potential benefits are immense, offering a seamless integration of digital services that could simplify user experience, enhance efficiency, and possibly even reduce the digital clutter of having multiple apps for different needs.
A Dystopian Shadow
However, beneath the glossy surface of convenience, there lurks a more sinister possibility. The consolidation of services into a single platform raises alarming concerns about privacy, data security, and monopolistic control over the digital lives of billions. The more we rely on a single app for our daily needs, the more we risk creating a digital monoculture vulnerable to surveillance, censorship, and exploitation. In a dystopian twist, the everything app could become the ultimate tool for digital hegemony, where choice is an illusion, and autonomy is traded for convenience.
The Unstoppable Momentum
Despite the dichotomy of potential outcomes, the race towards the everything app is unlikely to slow down. The convergence of services into unified platforms reflects a broader trend in digital evolution, driven by user demand for efficiency and the corporate quest for dominance. As this race accelerates, we find ourselves at a crossroads, navigating between the utopian dream of digital convenience and the dystopian nightmare of centralized control.
The everything app is both a looming threat and a beacon of progress in our communications landscape. Its emergence is a testament to our insatiable appetite for innovation and our willingness to explore the unknown. As we venture further into this digital frontier, the decisions we make today will shape the cybernetic world of tomorrow. The everything app is not just a possibility; it is an inevitability. Time will tell whether it becomes a tool for liberation or an instrument of control.
In the words of Neal Stephenson, we are coding our own new world, and in this world, the everything app stands as both the zenith of our aspirations and the nadir of our fears. As we hurtle towards this uncertain future, one thing is clear: the digital landscape will never be the same again. - REV1
#everythingapp#x#elon musk#elon#cyberpunk#neal stephenson#tumblr#technology#tech#communications#comms#digital
18 notes
·
View notes
Text
The Evolution of PHP: Shaping the Web Development Landscape
In the dynamic world of web development, PHP has emerged as a true cornerstone, shaping the digital landscape over the years. As an open-source, server-side scripting language, PHP has played a pivotal role in enabling developers to create interactive and dynamic websites. Let's take a journey through time to explore how PHP has left an indelible mark on web development.
1. The Birth of PHP (1994)
PHP (Hypertext Preprocessor) came into being in 1994, thanks to Rasmus Lerdorf. Initially, it was a simple set of Common Gateway Interface (CGI) binaries used for tracking visits to his online resume. However, Lerdorf soon recognized its potential for web development, and PHP evolved into a full-fledged scripting language.
2. PHP's Role in the Dynamic Web (Late '90s to Early 2000s)
In the late '90s and early 2000s, PHP began to gain prominence due to its ability to generate dynamic web content. Unlike static HTML, PHP allowed developers to create web pages that could interact with databases, process forms, and provide personalized content to users. This shift towards dynamic websites revolutionized the web development landscape.
3. The Rise of PHP Frameworks (2000s)
As PHP continued to grow in popularity, developers sought ways to streamline and standardize their development processes. This led to the emergence of PHP frameworks like Laravel, Symfony, and CodeIgniter. These frameworks provided structured, reusable code and a wide range of pre-built functionalities, significantly accelerating the development of web applications.
4. PHP and Content Management Systems (CMS) (Early 2000s)
Content Management Systems, such as WordPress, Joomla, and Drupal, rely heavily on PHP. These systems allow users to create and manage websites with ease. PHP's flexibility and extensibility make it the backbone of numerous plugins, themes, and customization options for CMS platforms.
5. E-Commerce and PHP (2000s to Present)
PHP has played a pivotal role in the growth of e-commerce. Platforms like Magento, WooCommerce (built on top of WordPress), and OpenCart are powered by PHP. These platforms provide robust solutions for online retailers, allowing them to create and manage online stores efficiently.
6. PHP's Contribution to Server-Side Scripting (Throughout)
PHP is renowned for its server-side scripting capabilities. It allows web servers to process requests and deliver dynamic content to users' browsers. This server-side scripting is essential for applications that require user authentication, data processing, and real-time interactions.
7. PHP's Ongoing Evolution (Throughout)
PHP has not rested on its laurels. It continues to evolve with each new version, introducing enhanced features, better performance, and improved security. PHP 7, for instance, brought significant speed improvements and reduced memory consumption, making it more efficient and appealing to developers.
8. PHP in the Modern Web (Present)
Today, PHP remains a key player in the web development landscape. It is the foundation of countless websites, applications, and systems. From popular social media platforms to e-commerce giants, PHP continues to power a significant portion of the internet.
9. The PHP Community (Throughout)
One of PHP's strengths is its vibrant and active community. Developers worldwide contribute to its growth by creating libraries, extensions, and documentation. The PHP community fosters knowledge sharing, making it easier for developers to learn and improve their skills.
10. The Future of PHP (Ongoing)
As web technologies continue to evolve, PHP adapts to meet new challenges. Its role in serverless computing, microservices architecture, and cloud-native applications is steadily increasing. The future holds exciting possibilities for PHP in the ever-evolving web development landscape.
In conclusion, PHP's historical journey is interwoven with the evolution of web development itself. From its humble beginnings to its current status as a web development powerhouse, PHP has not only shaped but also continues to influence the internet as we know it. Its versatility, community support, and ongoing evolution ensure that PHP will remain a vital force in web development for years to come.
youtube
#PHP#WebDevelopment#WebDev#Programming#ServerSide#ScriptingLanguage#PHPFrameworks#CMS#ECommerce#WebApplications#PHPCommunity#OpenSource#Technology#Evolution#DigitalLandscape#WebTech#Coding#Youtube
30 notes
·
View notes
Text
Recent Activities of Transparent Tribe (APT36)
Transparent Tribe, also known as APT36, is a Pakistan-based threat group active since at least 2013. They have consistently targeted Indian government, defence, and aerospace sectors. Recent activities indicate a significant evolution in their tactics and tools.
May 2024: Targeting Indian Defence and Aerospace Sectors
In May 2024, Transparent Tribe intensified cyber-espionage operations against India's defence and aerospace sectors. They employed phishing emails containing malicious attachments or links to deploy various tools, including:
Crimson RAT: A remote access Trojan used for data theft and surveillance.
Poseidon: A Golang-based agent compatible with Linux and macOS systems.
Python-based downloaders: Compiled into ELF binaries to target Linux environments.
The group also exploited India's development of indigenous Linux-based operating systems, such as MayaOS, by distributing Executable and Linkable Format (ELF) binaries to compromise these systems. [Source]
Late 2023 to Early 2024: Evolution of ElizaRAT Malware
Between late 2023 and early 2024, Transparent Tribe advanced their malware capabilities by developing ElizaRAT, a Windows Remote Access Tool. ElizaRAT's evolution included:
Enhanced Evasion Techniques: Improved methods to avoid detection by security systems.
Cloud-Based Command and Control (C2): Utilisation of services like Google Drive, Telegram, and Slack for C2 communications.
Modular Payloads: Deployment of additional payloads such as ApoloStealer for targeted data exfiltration.
These developments indicate a strategic shift towards more sophisticated and flexible attack methodologies. [Source]
September 2023: Infrastructure Expansion and Linux Targeting
In September 2023, investigations revealed that Transparent Tribe expanded their infrastructure, employing Mythic C2 servers hosted on platforms like DigitalOcean. They also began targeting Linux environments by distributing malicious desktop entry files disguised as PDFs. This approach aimed to compromise systems running Linux-based operating systems, aligning with India's adoption of such systems in government sectors. [Source]
June 2023: Focus on Indian Education Sector
By June 2023, Transparent Tribe shifted focus to India's education sector, distributing education-themed malicious documents via phishing emails. These campaigns aimed to deploy Crimson RAT, enabling the group to exfiltrate sensitive information from educational institutions. [Source]
These recent activities demonstrate Transparent Tribe's persistent efforts to adapt and refine their tactics, expanding their target spectrum and enhancing their malware arsenal to effectively compromise systems across various sectors.
Author: Kelly Hector
Blog: Digitalworldvision
2 notes
·
View notes
Text
The Evolution of Generative AI in 2025: From Novelty to Necessity
New Post has been published on https://thedigitalinsider.com/the-evolution-of-generative-ai-in-2025-from-novelty-to-necessity/
The Evolution of Generative AI in 2025: From Novelty to Necessity
The year 2025 marks a pivotal moment in the journey of Generative AI (Gen AI). What began as a fascinating technological novelty has now evolved into a critical tool for businesses across various industries.
Generative AI: From Solution Searching for a Problem to Problem-Solving Powerhouse
The initial surge of Gen AI enthusiasm was driven by the raw novelty of interacting with large language models (LLMs), which are trained on vast public data sets. Businesses and individuals alike were rightfully captivated with the ability to type in natural language prompts and receive detailed, coherent responses from the public frontier models. The human-esque quality of the outputs from LLMs led many industries to charge headlong into projects with this new technology, often without a clear business problem to solve or any real KPI to measure success. While there have been some great value unlocks in the early days of Gen AI, it is a clear signal we are in an innovation (or hype) cycle when businesses abandon the practice of identifying a problem first, and then seeking a workable technology solution to solve it.
In 2025, we expect the pendulum to swing back. Organizations will look to Gen AI for business value by first identifying problems that the technology can address. There will surely be many more well funded science projects, and the first wave of Gen AI use cases for summarization, chatbots, content and code generation will continue to flourish, but executives will start holding AI projects accountable for ROI this year. The technology focus will also shift from public general-purpose language models that generate content to an ensemble of narrower models which can be controlled and continually trained on the distinct language of a business to solve real-world problems which impact the bottom line in a measurable way.
2025 will be the year AI moves to the core of the enterprise. Enterprise data is the path to unlock real value with AI, but the training data needed to build a transformational strategy is not on Wikipedia, and it never will be. It lives in contracts, customer and patient records, and in the messy unstructured interactions that often flow through the back office or live in boxes of paper.. Getting that data is complicated, and general purpose LLMs are a poor technology fit here, notwithstanding the privacy, security and data governance concerns. Enterprises will increasingly adopt RAG architectures, and small language models (SLMs) in private cloud settings, allowing them to leverage internal organizational data sets to build proprietary AI solutions with a portfolio of trainable models. Targeted SLMs can understand the specific language of a business and nuances of its data, and provide higher accuracy and transparency at a lower cost point – while staying in line with data privacy and security requirements.
The Critical Role of Data Scrubbing in AI Implementation
As AI initiatives proliferate, organizations must prioritize data quality. The first and most crucial step in implementing AI, whether using LLMs or SLMs, is to ensure that internal data is free from errors and inaccuracies. This process, known as “data scrubbing,” is essential for the curation of a clean data estate, which is the lynchpin for the success of AI projects.
Many organizations still rely on paper documents, which need to be digitized and cleaned for day to day business operations. Ideally, this data would flow into labeled training sets for an organization’s proprietary AI, but we are early days in seeing that happen. In fact, in a recent survey we conducted in collaboration with the Harris Poll, where we interviewed more than 500 IT decision-makers between August-September, found that 59% of organizations aren’t even using their entire data estate. The same report found that 63% of organizations agree that they have a lack of understanding of their own data and this is inhibiting their ability to maximize the potential of GenAI and similar technologies. Privacy, security and governance concerns are certainly obstacles, but accurate and clean data is critical, even slight training errors can lead to compounding issues which are challenging to unwind once an AI model gets it wrong. In 2025, data scrubbing and the pipelines to ensure data quality will become a critical investment area, ensuring that a new breed of enterprise AI systems can operate on reliable and accurate information.
The Expanding Impact of the CTO Role
The role of the Chief Technology Officer (CTO) has always been crucial, but its impact is set to expand tenfold in 2025. Drawing parallels to the “CMO era,” where customer experience under the Chief Marketing Officer was paramount, the coming years will be the “generation of the CTO.”
While the core responsibilities of the CTO remain unchanged, the influence of their decisions will be more significant than ever. Successful CTOs will need a deep understanding of how emerging technologies can reshape their organizations. They must also grasp how AI and the related modern technologies drive business transformation, not just efficiencies within the company’s four walls. The decisions made by CTOs in 2025 will determine the future trajectory of their organizations, making their role more impactful than ever.
The predictions for 2025 highlight a transformative year for Gen AI, data management, and the role of the CTO. As Gen AI moves from being a solution in search of a problem to a problem-solving powerhouse, the importance of data scrubbing, the value of enterprise data estates and the expanding impact of the CTO will shape the future of enterprises. Organizations that embrace these changes will be well-positioned to thrive in the evolving technological landscape.
#2025#ai#ai model#AI systems#ai use cases#Artificial Intelligence#Business#chatbots#Cloud#code#code generation#Collaboration#content#CTO#customer experience#data#Data Governance#Data Management#data privacy#data privacy and security#data quality#decision-makers#emerging technologies#enterprise#enterprise AI#Enterprises#Evolution#executives#focus#Future
0 notes
Text
The Future of Customer Relationship Management: Why Your Business Needs a Cutting-Edge CRM System
Introduction
In today’s fast-paced business environment, the importance of customer relationship management (CRM) cannot be overstated. As companies strive to build lasting relationships with their customers, embracing a cutting-edge CRM system is no longer a luxury; it's a necessity. The future of customer relationship management promises exciting developments and innovative approaches that can elevate businesses to new heights. In this article, we’ll delve deep into why your business needs a top-tier CRM system and how it can transform your approach to managing customer relationships.
The Future of Customer Relationship Management: Why Your Business Needs a Cutting-Edge CRM System
A robust CRM system has evolved from merely being a tool for storing customer data. Today, it serves as an integrated platform that enhances communication, streamlines processes, and ultimately drives sales performance. But what does the future hold for CRM systems?
1. Understanding CRM Systems 1.1 What Is a CRM System?
At its core, a CRM system is software designed to manage interactions with current and potential customers. CRM system It helps businesses streamline processes by gathering customer information across various channels—like email, social media, and phone calls—into one comprehensive database.
1.2 Types of CRM Systems
There are three main types of CRM systems:
Operational CRM: Focuses on automating business processes such as sales automation and marketing automation. Analytical CRM: Analyzes customer data to improve decision-making. Collaborative CRM: Facilitates communication between different departments within an organization. 2. The Evolution of Customer Relationship Management 2.1 Historical Perspective
Understanding the evolution of CRM helps contextualize its current state and future trajectory. Early methods relied heavily on manual processes and paper-based records.
2.2 Technological Advancements
With the advent of the internet and cloud computing, the landscape shifted dramatically in the late 1990s, leading to more sophisticated solutions that enable real-time data analysis.
3. The Importance of a Cutting-Edge CRM System 3.1 Enhancing Customer Experience
Customers today expect personalized experiences tailored to their preferences. A cutting-edge CRM system allows businesses to offer just that by analyzing past interactions and predicting future needs.
3.2 Boosting Sales Efficiency
By automating repetitive tasks like lead scoring and follow-ups, sales teams can focus on closing deals rather than administrative work.
4. Key Features of Modern CRM Systems 4.1 Cloud-Based Solutions
Cloud technology offers flexibility and accessibility, enabling team members to access customer data from anywhere at any time.
4.2 AI Integration
Artificial Intelligence (AI) is revolutionizing how businesses interact with customers by providing insights derived from massive datasets.
5. Data Security in Customer Relationship Management
2 notes
·
View notes
Text
The Future of Jobs in IT: Which Skills You Should Learn.
With changes in the industries due to technological changes, the demand for IT professionals will be in a constant evolution mode. New technologies such as automation, artificial intelligence, and cloud computing are increasingly being integrated into core business operations, which will soon make jobs in IT not just about coding but about mastering new technologies and developing versatile skills. Here, we cover what is waiting to take over the IT landscape and how you can prepare for this future.
1. Artificial Intelligence (AI) and Machine Learning (ML):
AI and ML are the things that are currently revolutionizing industries by making machines learn from data, automate processes, and predict outcomes. Thus, jobs for the future will be very much centered around these fields of AI and ML, and the professionals can expect to get work as AI engineers, data scientists, and automation specialists.
2. Cloud Computing:
With all operations now moving online, architects, developers, and security experts are in high demand for cloud work. It is very important to have skills on platforms such as AWS, Microsoft Azure, and Google Cloud for those who wish to work on cloud infrastructure and services.
3. Cybersecurity:
As dependence on digital mediums continues to increase, so must cybersecurity measures. Cybersecurity, ethical hacking, and network security would be skills everyone must use to protect data and systems from all the continuous threats.
4. Data Science and Analytics:
As they say, the new oil in this era is data. Therefore, organisations require professionals who would be able to analyze humongous datasets and infer actionable insights. Data science, data engineering, as well as advanced analytics tools, will be your cornucopia for thriving industries in the near future.
5. DevOps and Automation:
DevOps engineers are the ones who ensure that continuous integration and deployment work as smoothly and automatically as possible. Your knowledge of the business/operations will orient you well on that terrain, depending on how that applies to your needs.
Conclusion
IT job prospects rely heavily on AI, cloud computing, cybersecurity, and automation. It means that IT professionals must constantly innovate and update their skills to stay in competition. Whether an expert with years of experience or a newcomer, focusing on the following in-demand skills will gather success in this diverse land of IT evolution.
You might also like: How to crack interview in MNC IT
2 notes
·
View notes
Note
✏️ and ❤️ for the wip ask game?
For the BTS writing ask game
✏️"what are your current WIPs about?"
Oh gosh -- I don't think anything's changed but Criminal Minds have added to it.
I want to write a case fic for Criminal Minds with a more Emily-centric where the story goes back and forth between Emily as a teen and the present where something of her punk past is relevant to the case.
An Elle Greenaway story where she comes back to see Evolution-era BAU. (Apart from my other Elle gets to see the BAU team story).
And the AU where Emily gets to the BAU team several episodes earlier and prevents the events where Elle has to leave the BAU. (Or maybe it's inevitable but at least she won't leave the BAU under a dark cloud).
For Star Trek: I really wish I had the energy to write a good episode of the week story for Star Trek Legacy ala Domenika Marzione writes for Stargate Atlantis. ('episode' ideas: Seven Pulls a Die Hard but it's via Dutch (Killjoys) -- there's no other Monster like me. |
In the same vein as Star Trek Voyager -- where I can flesh out more of the unseen episodes and decks of Voyager.
Also, honestly, I kind of want to do a full Year of Hell virtual season. Where both Voyager and Janeway survive ramming the timeship. Badly damaged but fixable.
It would start with Janeway heavily out of commission, and rebuilding Voyager parallels Janeway getting healthy.
Also, I love past self meeting future self -- so there's a story just in the very beginning where Drone Seven appears on Enterprise G, much to Seven's horror.
Oh, and there's the Seven and Agnes Jurati bonding.
❤️"what are your favorite scenes from your WIPs?"
I kind of like a scene I wrote where Janeway-B'Elanna-Tom landed in the future and straight into the former Neutral Zone, and Fenris Ranger post- Stardust City Rag rescues the Voyager trio:
"Hide your uniforms," Seven told them. She secured a knife to her gun belt and checked her guns. "People here have no love for Starfleet." "We got that message in the last place," Tom said drily. "I know how to play this game," B'Elanna said turning her tunic inside out before taking the poncho. "What happened that they hate Starfleet so much?" Janeway asked. B'Elenna snorted and said, "You don't have to look far from the Maquis, Captain." Seven slapped a button open and the door opened, she lifted her ocular implant at Janeway's question. "Temporal Prime Directive, Captain. And don't tell me to 'hell with the temporal prime directive', there's still another Janeway around here. And in the years from where you were and where we are, you have not mellowed. Headache or no headache." Tom and B'Elenna chuckled, Janeway felt a little skewered but also took that one on the chin. "No questioning the Temporal Prime Directive, copy that."
#answered#tea-earl-grey#ask game#star trek voyager#wip ask game#meme sheep#seven of nine#kathryn janeway#b'elanna torres#tom paris
4 notes
·
View notes
Text
Scarecrow Pokémon Team
Alright time for a more in-depth look at the Pokémon team I put together for the Scarecrow, this is more of just a generic team idea rather than being for a specific Scarecrow interaction
Also none of them have names cause I suck at that so feel free to suggest some 👍
And their all in costume, some are random, and some are specific
Starting from the newest team members:
Weezing
Caught as a Koffin hiding in one of the back rooms of Jonathan’s numerous hideouts, he found it absorbing stray fear toxin fumes. Because of the way Weezing’s biology works it can produce its own weak version of fear toxin which it can expel out its body in large, voluminous clouds of orange vapours.
All poison Pokémon have some form of immunity to poisons/toxins but it can vary wildly between individuals.
Although it can fight Jonathan prefers to use it in bank/chemical heists, where it can envelope an entire building in fumes faster than his own fear toxin can.
Crobat
She was caught as a common Gotham Zubat soon after Scarecrows first run in with the Batman, and although it hasn’t been long, being trusted partners in crime has lead to a strong bond forming allowing Zubat to evolve into the Crobat she is today in a few short years.
She is probably the strongest Pokémon on Scarecrows team, she’s smart enough to solve basic puzzles, is strong enough to lift Jonathan around if he needs an exit, can go toe to toe with the main Pokémon on Batman’s team, and can do it all while being quite as a mouse.
The only downside she has is she is a rather large Crobat, making it hard for her to fight in enclosed spaces. Jonathan still takes her on small scale heists though and has her be surveillance outside.
Banette
One of the two trouble makers of Jonathan’s Pokémon team, he found them hanging out in the closet of his first Gotham apartment.
Banette mainly works as an intel gathering Pokémon, either tailing people Scarecrow wants to use as test subjects, or sneaking around select buildings to make a note of security and exit points.
Surprisingly Banette itself is rarely seen when Scarecrow is actively robbing places, since it seems to have a rather strong reaction to fear toxin that Jonathan has been unable to help with.
Rapidash
The Scarecrows trusty nightmare steed, Rapidash was first acquired as a Ponyta from a farm at the boarder’s of Georgia. The farm they first came from wasn’t a good place, which is why Jonathan at the time had no issues stealing them from that place. After Jonathan had been a villain for a couple of years he sent the farmer a letter, apologising for stealing their Pokémon and laced to the brim with his strongest fear toxin to date.
Although Rapidash is a common sight when Scarecrow is around, he is also the hardest to spot when out of costume. Since the majority of Gotham mounted police force also use Rapidash as their trusted steeds.
There is actually a picture in Gotham gazette of Boy Wonder being flung head over arse when he tried to hop on to Scarecrows Rapidash, mistaking it for a police horse.
Murkrow
The second trouble maker of the group, Murkrow has known Jonathan for a long time. Originally this is one of the many Murkrows that used to attack Jonathan when he was younger. But unlike the most of this other Murkrow this one was one of a few that actually felt bad about what they were doing. Leading to this and a small flock of other Murkrow being outcast as well.
This is the only Murkrow that followed Jonathan from his family home.
Despite having being a team for years Murkrow has never evolved and never plans to. Great Granny had a nasty Honchkrow that struck fear into the both of them, to many bad memories to make evolution worth it.
Cacturne
No one knows when this Pokémon showed up in the small Georgian town Jonathan lived in, it isn’t native to the area, and no trainer would release such a rare coloured Pokémon.
It used to watch people as a Cacnea from the fields, hiding from sight but following those entered. It spent a lot of time watching Jonathan while he worked during the harsh midday sun, and they first meet when it fetch Jonathan some water after he collapsed from the over bearing heat.
No one saw it evolve, just that it strolled out of town beside Jonathan the day he left. The large Honchkrow that used to fly round the town disappeared that day also, none were sad to see it gone.
Hope you enjoyed this sorry if it’s long, not very coherent, and there’s any mistakes. This took me an hour and a half to write.
See ya ✌️
#my art#scarecrow#jonathan crane#pokemon#weezing#crobat#banette#rapidash#murkrow#cacturne#dc comics#rat does art
33 notes
·
View notes
Text
Boost Your Earnings and Career Prospects With AWS Certification
In today's digital age, the cloud has become an integral part of businesses and organizations, transforming the way data is stored, processed, and managed. Amazon Web Services (AWS), as one of the leading cloud computing platforms globally, has played a key role in this evolution. AWS offers a comprehensive certification program that serves as a testament to your expertise in cloud technologies.
Whether you're a newcomer interested by the world of cloud computing or a seasoned professional aiming to elevate your skills and career prospects, AWS certification can be a game-changing step on your journey.
In this comprehensive guide, we will explore the complexities of AWS certification, from its various levels to its significance in the tech industry. We'll also discuss how ACTE Technologies can be your trusted partner in achieving AWS certification excellence.
Understanding AWS Certification: A Closer Look
AWS certification is a badge of honor for professionals who work with AWS cloud technologies. It validates your knowledge and skills, making you stand out in a competitive job market. AWS offers certifications at different levels, catering to diverse roles and skillsets within the cloud computing ecosystem. Let's delve into these certification levels:
1. Foundational Level: AWS Certified Cloud Practitioner
The AWS Certified Cloud Practitioner certification is designed for individuals who are new to cloud computing or AWS. It's an ideal starting point for those looking to understand the basics of AWS and cloud technology. Even if you lack a technical background, this certification can serve as your entry ticket into the world of AWS.
2. Associate Level: Building Expertise
The Associate level certifications are tailored for professionals with hands-on experience in working with AWS. Here are three popular AWS Associate certifications:
AWS Certified Solutions Architect - Associate: The design of distributed systems on AWS is the main topic of this certification. It's suitable for professionals involved in solution architecture.
AWS Certified Developer - Associate: If your role involves developing applications on AWS, this certification is a perfect fit. It validates your ability to build, deploy, and maintain applications.
AWS Certified SysOps Administrator - Associate: SysOps Administrators who manage AWS operations can benefit from this certification. It covers topics like deployment, management, and operations on AWS.
3. Professional Level: Advanced Expertise
For those seeking to reach the pinnacle of AWS expertise, the Professional level certifications offer a challenging yet rewarding path. Two prominent certifications at this level include:
AWS Certified Solutions Architect - Professional: This certification is designed for individuals with extensive experience in designing distributed systems. It goes deep into advanced architectural concepts and best practices.
AWS Certified DevOps Engineer - Professional: DevOps professionals who manage and implement continuous delivery systems on AWS can validate their expertise through this certification. It covers a range of DevOps practices and tools.
4. Specialty Level: Specialized Expertise
AWS also offers specialty certifications for professionals who specialize in specific areas of cloud computing. Examples of AWS Specialty certifications include AWS Certified Security - Specialty and AWS Certified Machine Learning - Specialty.
Why AWS Certification Matters: Elevating Your Career
Now that we've explored the different AWS certification levels, it's essential to understand why AWS certification holds such significance in the tech industry:
1. Validation of Skills: AWS certification provides tangible proof of your skills and expertise in cloud technologies. It's an official endorsement of your abilities, making you a more attractive candidate to employers.
2. Career Advancement: AWS-certified professionals often enjoy accelerated career growth. With certification in hand, you're better positioned to secure promotions and higher-paying roles.
3. Global Recognition: AWS certifications are recognized globally. Whether you're seeking opportunities in your home country or looking to work abroad, AWS certification opens doors to various job markets.
4. Increased Earning Potential: AWS-certified professionals tend to earn higher salaries than their non-certified counterparts. The investment you make in certification can yield substantial financial returns.
5. Job Security: As businesses increasingly migrate to the cloud, the demand for AWS expertise continues to rise. Being AWS-certified enhances your job security in an ever-changing tech landscape.
Preparing for AWS Certification: Your Path to Success
Earning an AWS certification requires dedication and preparation. Here is a guide to success:
1. Self-Study: Start by exploring AWS documentation, whitepapers, and online resources. Familiarize yourself with AWS services and best practices.
2. Hands-On Experience: Practical experience is crucial. Create AWS accounts, experiment with services, and build projects to solidify your understanding.
3. Formal Training: Many professionals find formal AWS certification training courses invaluable. These courses offer structured learning and often provide hands-on labs and practice exams.
4. Practice Exams: Utilize practice exams to assess your knowledge and identify areas where you need improvement. AWS provides sample questions and practice exams for each certification.
5. Community Engagement: Join AWS forums, communities, and attend AWS-related events to connect with peers and experts. Learning from others' experiences can be invaluable.
In a rapidly evolving tech landscape, AWS certification is your key to unlocking a successful and fulfilling career in cloud computing. The recognition and opportunities it brings are well worth the effort. If you're considering pursuing AWS certification, ACTE Technologies can be your trusted partner on this journey. Their expert guidance, comprehensive courses, and hands-on learning experiences will not only help you pass the exams but also excel in your cloud computing career. Start your journey to becoming a certified AWS professional today, and open doors to a world of possibilities in the cloud!
8 notes
·
View notes