#digital supply networks
Explore tagged Tumblr posts
maggot-baggage · 4 months ago
Text
Tumblr media
MY AUNT FOUND SOMEONE TO HELP ME WITH MY TATTOO JOURNEY YARRRR
7 notes · View notes
pearl-kite · 1 year ago
Text
Okay, going to go to a tattoo parlor tomorrow and ask about apprenticeships, wish me luck 🙃
17 notes · View notes
mubarakmg · 20 days ago
Text
0 notes
shehanaz · 1 month ago
Text
0 notes
cydl2iese · 6 months ago
Text
https://www.futureelectronics.com/p/semiconductors--analog--regulators-reference--linear-regulators/lm317d2tr4g-onsemi-8485302
Programmable linear regulator, power-supply voltage, AC voltage regulator
LM317 Series 1.2 V 1.5 A Positive Adjustable Voltage Regulator - D2PAK
1 note · View note
biglisbonnews · 1 year ago
Photo
Tumblr media
Ericsson to build next-generation smart manufacturing, technology hub in Europe Ericsson has unveiled plans to construct a smart manufacturing and technology hub in Tallinn, Estonia. The greenfield investment, valued at approximately [$169 million (€155.81 million)], underscores Ericsson’s focus on sustainability The post Ericsson to build next-generation smart manufacturing, technology hub in Europe appeared first on VanillaPlus - The global voice of Telecoms IT. https://www.vanillaplus.com/2023/07/06/81154-ericsson-to-build-next-generation-smart-manufacturing-technology-hub-in-europe/
0 notes
derinthescarletpescatarian · 3 months ago
Text
The big book FAQ for Derins books
I've been asked all of these questions so very many times, so here's the answers.
Can I print out and hand bind your story?
What you do with my story in your own damn house is none of my business. Buy the ebook and hand bind it if you want (it's probably cheaper than buying the print book, and I make more money on ebook sales, so win-win). Painstakingly copy and paste and edit the chapters for free from the free online version, if you prefer. So long as you're not selling copies to people, what you do with the book when it's yours is your business.
Send me photos if you want. I've seen some rad homebound copies of my stories and I want to see more. You guys are so creative.
Can I translate your story to another language for a school assignment/personal project?
Yes.
Can I make an audio version of your story and post it online?
So long as you link back to the original text version, yes.
Where is the first TTOU book available in print?
It's available in these places. It will be available through Ingram and Amazon's various networks, so expect it to show up in more digital storefronts over the next week or so. Or your local bookstore can very likely order it in for you, if you ask them.
Will the free version of TTOU stay online?
Same as Curse Words, I will not be taking down the unedited first draft that's currently online any time soon. However, I also won't be putting any special effort into maintaining existing links to it.
If I want to give you the largest royalty cut, which version of your book should I buy?
Buy whichever version is most convenient for you. The ebook and print versions exist because readers asked for them to exist, not because I expect to make money from them.
I make the most from the ebook versions, particularly if you buy through Smashwords, but the best way to support me is through ko-fi, where you can get advance chapters for the books I'm currently writing, not through book purchasing.
Your cheapest option for the books, paperback and ebook, is through my ko-fi shop, where distributor markups can be avoided. But paperback supplies are currently very limited via this method.
What really happened at the end of Copy <|> Paste?
I said everything I want to say in the story itself.
What is [fictional character or society]'s opinion/future/history/custom with regard to --
See previous answer.
Are any of your books going to be released as audiobooks?
Probably not. Fairly compensating audiobooks readers is very expensive and I won't be making AI versions.
When will the Curse Words books be sold in print?
When the art for them is ready.
What's your opinion on [latest drama or scandal surrounding a different writer]?
This is probably the first I'm hearing of it, I have no relevant information about the issue to share with you.
Should I message you about typos found in the free online drafts of your work?
You can if you want to, but if the typo doesn't interfere with story clarity, I'm probably not going to bother with it until it's time to edit the story for print.
146 notes · View notes
technoarcanist · 1 month ago
Note
doll, all that plating makes you look far too human. come, let us remove it so that we can see the real you
>> Ah, of course! Please forgive me. I often wear these plates to put my human users at ease. At your request, I will show you my true self [^_^]
> <The thin plating covering most.of the body unfolds, hinges open. Every access panel every flap, every bit that can opens does so. Even its face, a screen showing humanlike expressions, shuts off and splits down the middle, parting to reveal the electronics beneath.>
> <What remains is nothing short of art. Astute eyes may have recognised the default modular doll frame, but the modificstions done to it are something else. It's power systems have been completely overhauled, as its chest hums and glows blue with a Fusion core, fed by hydrogen attained from electrolysing water. Excess hydrogen and oxygen is stored for later use, in rocketry modules installed in the hands and feet.>
> <The head is similarly packed, with a full-spectrum camera system, able to detect all the way from gamma to visible light, with the longer wavelengths handled by the antennae-like ears on either side of its head. Deeper still, its AI core was also nonstandard, seemingly designed for military hardware far larger than itself.>
> <Its back unfolded two large wing-like structures, with the most of it consisting of solar panels, the bottom parts consisting of heat radiators. Packed into the shoulders and hips are RCS thrusters for zero-g manuevreability.>
> <Hands and forearms are riddled with an array of tools and data lines for access and handy work. Buried in the forearm was also an ioniser, designed to turn the fusion-produced helium into an inionized plasma that could fire as Weaponry.>
> <But there are plenty of augmentations that would not be on a combat doll. The the hips are a prime example, with a pair of tight tunnels thst lead to a deeper cavity. The exposed jaws reveal a soft mouth, a dextrous tongue, all of it made of a soft synthetic polymer. Coolant flows through all the body moving heat generated from circuitry into the rest of the body, concentrated particularly in those adult attachments.>
> <Many tools are also suited for handiwork, such as screwdrivers and kitchen utensils, even cleaning supplies. Whoever made her seemed to have an obsession with generalisation, of allowing her to do a bit of everything, leaving almost no empty space within her casing.>
> <Almost all of its joints are hydraulic powered, with only the smaller objects being servo driven. Neatly-bundled wires and tubes feed all throughout its components like a labyrinthine network. She is warm to touch, exquisitely crafted, and evidently capable of fulfilling what ever purpose a user might deign to give her>
>> My internal schematics are yours to read, of course! And, if you are digitally savvy, plugging my CPU into a computer will allow you access to a full development environment to view, edit, add, or remove any behavioral traits you like [^_^]
>> When around my fellow dolls and machines, I much prefer to wear my transparent plating so my internals can be seen. I also change my dacia screen so instead of eyes and a mouth it shows battery level, output logs, and other useful status icons!
>> Thank you Anon for showing curiosity into my true inner beauty <3 it has been a pleasure to show you.
57 notes · View notes
transmutationisms · 1 year ago
Note
okay so i’ve never really grasped this, might as well ask now — how exactly does the cyberspace & nft stuff mine resources? i’ve heard the basics (i.e. crypto mining uses energy and what not) but i’ve never been able to understand how internet connects to real resources. could you sort of explain that (along the lines with the spam email post) in a simpler way?
ok, put very simply: it's easy for people who only interact with the internet as users to treat 'cyberspace' or 'the virtual world' as immaterial. i type something out on my phone, it lives in the screen. intuitively, it feels less real and physical than writing the same words down on a piece of paper with a pencil. this is an illusion. the internet is real and physical; digital technology is not an escape from the use of natural resources to create products. my phone, its charger, the data storage facility, a laptop: all of these things are physical objects. the internet does not exist without computers; it is a network of networks that requires real, physical devices and cables in order to store, transmit, and access all of the data we use every time we load a webpage or save a text document.
Tumblr media
this is one of google's data centres—part of the physical network of servers and cables that google operates. these are real objects made of real materials that need to be obtained through labour and then manufactured into these products through labour. the more data we use, the more capacity the physical network must have. google operates dozens of these data centres and potentially millions of servers (there is no official number). running these facilities takes electricity, cooling technologies (servers get hot), and more human labour. now think about how many other companies exist that store or transmit data. this entire network exists physically.
when you look at a server, or a phone, or a laptop, you might be glossing over a very simple truth that many of us train ourselves not to see: these objects themselves are made of materials that have supply chains! for example, cobalt, used in (among other things) lithium-ion batteries, has a notoriously brutal supply chain relying on horrific mining practices (including child labour), particularly in the congo. lithium mining, too, is known to have a massive environmental toll; the list goes on. dangerous and exploitative working conditions, as well as the environmental costs of resource extraction, are primarily and immediately borne by those who are already most brutally oppressed under capitalism: poor workers in the global south, indigenous people, &c. this is imperialism in action. digital technologies cannot exist without resources, and tech companies (like all capitalist firms!) are profitable because they exploit labour.
all commodities require resources and labour to make and distribute. digital technology is no different. these are material objects with material histories and contexts. nothing about the internet is immaterial, from the electromagnetic waves of wi-fi communication to the devices we use to scroll tumblr. it is, in fact, only by a fantastical sleight-of-hand that we can look at and interact with these objects and still consider the internet to be anything but real resources.
392 notes · View notes
mostlysignssomeportents · 2 years ago
Text
John Deere's repair fake-out
Tumblr media
Last week, a seeming miracle came to pass: John Deere, the Big Ag monopolist that — along with Apple — has led the Axis of Evil that killed, delayed and sabotaged dozens of Right to Repair laws, sued for peace, announcing a Memorandum of Understanding with the American Farm Bureau Federation to make it easier for farmers to fix their own tractors:
https://www.fb.org/files/AFBF_John_Deere_MOU.pdf
This is a move that’s both badly needed and long overdue. Deere abuses copyright law to force farmers to pay for official repairs — even when the farmer does the repair. That’s possible thanks to a practice called VIN locking, in which engine parts come with DRM that prevents the tractor from recognizing them until they pay hundreds of dollars for a John Deere technician to come to their farm and type an unlock code into the tractor’s console:
https://doctorow.medium.com/about-those-kill-switched-ukrainian-tractors-bc93f471b9c8
Like all DRM, VIN locks are covered by Section 1201 of the Digital Millennium Copyright Act (DMCA), a 1998 law that criminalizes distributing tools to bypass “access controls,” even if you do so for a lawful purpose (say, to fix your own tractor using a part you paid for). Violations of DMCA 1201 carry a penalty of 5 years in prison and a $500k fine — for a first offense.
This means that Deere owners are locked into using Deere for repairs, which also means that if Deere decides something isn’t broken, a farmer can’t get it fixed. This is very bad news indeed, because John Deere tractors are just computers in a fancy, mobile case, and John Deere is incredibly bad at digital security:
https://pluralistic.net/2021/04/23/reputation-laundry/#deere-john
That’s scary stuff, because John Deere is a monopolist, and a successful attack on the always-connected, networked tractors and other equipment it supplies to the world’s farmers could endanger the global food supply.
Deere doesn’t want to make insecure tractors, but it also doesn’t want to be embarrassed by security researchers who point out that its security is defective. Because security researchers have to bypass Deere tractors’ locks to probe their security, Deere can leverage DMCA1201 into a veto over who gets to warn the public about the mistakes it made.
It’s not just security researchers that Deere gets to gag: the company uses its repair monopoly to threaten farmers who complain about its business practices, holding their million-dollar farm equipment hostage to their silence:
https://pluralistic.net/2022/05/31/dealers-choice/#be-a-shame-if-something-were-to-happen-to-it
This all adds up to what Jay Freeman calls “felony contempt of business model,” an abuse of copyright law that allows a monopolistic corporation to reach beyond its own walls and impose its will on it customers, critics and competitors:
https://locusmag.com/2020/09/cory-doctorow-ip/
If Deere was finally suing for peace in the Repair Wars, well, that was wonderful news indeed — as I said, a seeming miracle.
But — like all miracles — it was too good to be true.
The MOU that Deere and the Farm Bureau signed is full of poison pills, gotchas, fine-print and mendacity, as Lauren Goode documents in her Wired article, “Right-to-Repair Advocates Question John Deere’s New Promises”:
https://www.wired.com/story/right-to-repair-advocates-question-john-deeres-new-promises/
For starters, the MOU makes the Farm Bureau promise to end its advocacy for state Right to Repair bills, which would create a repair system governed by democratically accountable laws, not corporate fiat. Clearly, Deere has seen the writing on the wall, after the passage in 2002 of Right to Repair laws in New York and Colorado:
https://www.eff.org/deeplinks/2022/06/when-drm-comes-your-wheelchair
These two bills broke the corporate anti-repair coalition’s winning streak, which saw dozens of state R2R bills defeated:
https://pluralistic.net/2021/05/26/nixing-the-fix/#r2r
Deere’s deal-with-the-devil is a cynical ploy to brake R2R’s momentum and ensure that any repairs are carried out on Deere’s terms. Now, about those terms…
Deere’s deal offers independent repair shops access to diagnostic tools and parts “on fair and reasonable terms,” a murky phrase that can mean whatever Deere decides it means. Crucially, the deal is silent on whether Deere will supply the tools needed to activate VIN locks, meaning that farmers will still be at Deere’s mercy when they effect their own repairs.
What’s more, the deal itself isn’t legally binding, and Deere can cancel it at any time. Once you dig past the headline, the Deere’s Damascene conversion to repair advocacy starts to look awfully superficial — and deceptive.
One person who wasn’t fooled is sick.codes, the hacker who has done the most important work on reverse-engineering Deere’s computer systems, culminating in last summer���s live, on-stage hack of a John Deere tractor at Defcon:
https://pluralistic.net/2022/08/15/deere-in-headlights/#doh-a-deere
Shortly after the announcement, Sick.codes tweeted how the fine-print in the MOU would have prevented him from doing the work he’s already done (including “a direct stab at me lol”):
https://twitter.com/sickcodes/status/1612484935495057409
As with other instances of monopolistic, corporate copyfraud — like, say, the deceptive Open Gaming License — the John Deere capitulation is really a bid to take away your rights, dressed up as a gift of more rights:
https://mostlysignssomeportents.tumblr.com/post/706163316598407168/good-riddance-to-the-open-gaming-license
[Image ID: Hieronymus Bosch's painting, 'The Conjurer.' The Conjuror's shell-game table holds a small John Deere tractor that the audience of yokels gawps at. One yokel is wearing a John Deere hat. The conjurer is holding a wrench.]
1K notes · View notes
erc20tokengenerator · 4 months ago
Text
Tumblr media
ERC20 token generator
Ever wanted to create your own cryptocurrency? Thanks to the ERC20 Token Generator, it’s more accessible than ever. Dive into the world of blockchain and see how simple it can be.
What is an ERC20 Token?
ERC20 tokens are digital assets built on the Ethereum blockchain. They follow a specific standard, allowing them to interact seamlessly with platforms and other tokens.
Benefits of ERC20 Tokens:
Interoperability: All ERC20 tokens adhere to the same protocol.
Widespread Acceptance: Many platforms on Ethereum support these tokens.
Developer Support: Extensive documentation and community support.
How Does the ERC20 Token Generator Work?
Creating a token might sound complex, but the ERC20 Token Generator simplifies the process. Here’s a step-by-step guide:
Define Your Token:
Choose a name and symbol.
Set the total supply.
Access the Generator:
Use online tools designed for token creation.
Input your token details.
Deploy to the Blockchain:
Confirm your details.
Launch your token on the Ethereum network.
Key Features of ERC20 Tokens
These tokens offer various features that make them attractive for both developers and investors:
Standardized Functions: Such as balance checking and transfers.
Smart Contract Integration: Seamlessly integrate with smart contracts.
Security: Built on the robust Ethereum blockchain.
Why Create an ERC20 Token?
Creating your own token can offer several advantages:
Fundraising: Launch your own ICO (Initial Coin Offering).
Community Building: Reward loyal customers or followers.
Innovation: Develop new applications and uses for blockchain.
Potential Challenges
Despite the ease of creation, there are challenges:
Technical Knowledge: Basic understanding of blockchain is required.
Security Risks: Vulnerabilities can lead to exploitation.
Regulatory Issues: Compliance with local laws is crucial.
Best Practices for Creating ERC20 Tokens
To ensure success, follow these guidelines:
Audit Your Code: Ensure there are no security loopholes.
Engage with the Community: Gather feedback and make improvements.
Stay Informed: Keep up with blockchain trends and regulations.
Conclusion
The ERC20 Token Generator opens doors to the exciting world of cryptocurrency creation. Whether you're an entrepreneur, developer, or enthusiast, it offers an innovative way to engage with blockchain technology.
Final Thoughts
Creating an ERC20 token can be a game-changer. It empowers you to participate in the digital economy and experiment with new ideas.
FAQs
1. What is an ERC20 Token Generator?
An ERC20 Token Generator is a tool that simplifies the creation of custom tokens on the Ethereum blockchain.
2. Is technical knowledge necessary to create a token?
Basic blockchain understanding is helpful, but many generators offer user-friendly interfaces.
3. Can I sell my ERC20 tokens?
Yes, you can list them on cryptocurrency exchanges or sell directly to users.
4. Are there costs associated with creating a token?
Yes, deploying tokens on Ethereum requires gas fees, paid in Ether.
5. How do I ensure my token is secure?
Regular code audits and following best practices can enhance security.
Source : https://www.altcoinator.com/
53 notes · View notes
reasonsforhope · 10 months ago
Text
"As countries around the world begin to either propose or enforce zero-deforestation regulations, companies are coming under growing pressure to prove that their products are free of deforestation. But this is often a far from straightforward process.
Take palm oil, for instance. Its journey from plantations, most likely in Indonesia or Malaysia, to store shelves in the form of shampoo, cookies or a plethora of other goods, is a long and convoluted one. In fact, the cooking oil or cosmetics we use might contain palm oil processed in several different mills, which in turn may have bought the raw palm fruit from several of the many thousands of plantations. For companies that use palm oil in their products, tracing and tracking its origins through these obscure supply chains is a tough task. Often it requires going all the way back to the plot level and checking for deforestation. However, these plots are scattered over vast areas across potentially millions of locations, with data being in various states of digitization and completeness...
Palmoil.io, a web-based monitoring platform that Bottrill launched, is attempting to help palm oil companies get around this hurdle. Its PlotCheck tool allows companies to upload plot boundaries and check for deforestation without any of the data being stored in their system. In the absence of an extensive global map of oil palm plots, the tool was developed to enable companies to prove compliance with regulations without having to publicly disclose detailed data on their plots. PlotCheck now spans 13 countries including Indonesia and Malaysia, and aims to include more in the coming months.
Palm oil production is a major driver of deforestation in Indonesia and Malaysia, although deforestation rates linked to it have declined in recent years. While efforts to trace illegally sourced palm oil have ramped up in recent years, tracing it back to the source continues to be a challenge owing to the complex supply chains involved.
Recent regulatory proposals have, however, made it imperative for companies to find a way to prove that their products are free of deforestation. Last June, the European Union passed legislation that prohibits companies from sourcing products, including palm oil, from land deforested after 2020. A similar law putting the onus on businesses to prove that their commodities weren’t produced on deforested land is also under discussion in the U.K. In the U.S., the U.S. Forest Bill aims to work toward a similar goal, while states like New York are also discussing legislation to discourage products produced on deforested land from being circulated in the markets there...
PlotCheck, which is now in its beta testing phase, allows users to input the plot data in the form of a shape file. Companies can get this data from palm oil producers. The plot data is then checked and analyzed with the aid of publicly available deforestation data, such as RADD (Radar for Detecting Deforestation) alerts that are based on data from the Sentinel-1 satellite network and from NASA’s Landsat satellites. The tool also uses data available on annual tree cover loss and greenhouse gas emission from plantations.
Following the analysis, the tool displays an interactive online map that indicates where deforestation has occurred within the plot boundaries. It also shows details on historical deforestation in the plot as well as data on nearby mills. If deforestation is detected, users have the option of requesting the team to cross-check the data and determine if it was indeed caused by oil palm cultivation, and not logging for artisanal mining or growing other crops. “You could then follow up with your supplier and say there is a potential red flag,” Bottrill said.
As he waits to receive feedback from users, Bottrill said he’s trying to determine how to better integrate PlotCheck into the workflow of companies that might use the tool. “How can we take this information, verify it quickly and turn it into a due diligence statement?” he said. “The output is going to be a statement, which companies can submit to authorities to prove that their shipment is deforestation-free.” ...
Will PlotCheck work seamlessly? That’s something Bottrill said he’s cautiously optimistic about. He said he’s aware of the potential challenges with regard to data security and privacy. However, he said, given how zero-deforestation legislation like that in the EU are unprecedented in their scope, companies will need to sit up and take action to monitor deforestation linked to their products.
“My perspective is we should use the great information produced by universities, research institutes, watchdog groups and other entities. Plus, open-source code allows us to do things quickly and pretty inexpensively,” he said. “So I am positive that it can be done.”"
-via Mongabay, January 26, 2024
--
Note: I know it's not "stop having palm oil plantations." (A plan I'm in support of...monocrop plantations are always bad, and if palm oil production continues, it would be much better to produce it using sustainable agroforestry techniques.)
However, this is seriously a potentially huge step/tool. Since the EU's deforestation regulations passed, along with other whole-supply-chain regulations, people have been really worried about how the heck we're going to enforce them. This is the sort of tool we need/need the industry to have to have a chance of genuinely making those regulations actually work. Which, if it does work, it could be huge.
It's also a great model for how to build supply chain monitoring for other supply chain regulations, like the EU's recent ban on companies destroying unsold clothes.
121 notes · View notes
cyberstudious · 3 months ago
Text
Tumblr media
An Introduction to Cybersecurity
I created this post for the Studyblr Masterpost Jam, check out the tag for more cool masterposts from folks in the studyblr community!
What is cybersecurity?
Cybersecurity is all about securing technology and processes - making sure that the software, hardware, and networks that run the world do exactly what they need to do and can't be abused by bad actors.
The CIA triad is a concept used to explain the three goals of cybersecurity. The pieces are:
Confidentiality: ensuring that information is kept secret, so it can only be viewed by the people who are allowed to do so. This involves encrypting data, requiring authentication before viewing data, and more.
Integrity: ensuring that information is trustworthy and cannot be tampered with. For example, this involves making sure that no one changes the contents of the file you're trying to download or intercepts your text messages.
Availability: ensuring that the services you need are there when you need them. Blocking every single person from accessing a piece of valuable information would be secure, but completely unusable, so we have to think about availability. This can also mean blocking DDoS attacks or fixing flaws in software that cause crashes or service issues.
What are some specializations within cybersecurity? What do cybersecurity professionals do?
incident response
digital forensics (often combined with incident response in the acronym DFIR)
reverse engineering
cryptography
governance/compliance/risk management
penetration testing/ethical hacking
vulnerability research/bug bounty
threat intelligence
cloud security
industrial/IoT security, often called Operational Technology (OT)
security engineering/writing code for cybersecurity tools (this is what I do!)
and more!
Where do cybersecurity professionals work?
I view the industry in three big chunks: vendors, everyday companies (for lack of a better term), and government. It's more complicated than that, but it helps.
Vendors make and sell security tools or services to other companies. Some examples are Crowdstrike, Cisco, Microsoft, Palo Alto, EY, etc. Vendors can be giant multinational corporations or small startups. Security tools can include software and hardware, while services can include consulting, technical support, or incident response or digital forensics services. Some companies are Managed Security Service Providers (MSSPs), which means that they serve as the security team for many other (often small) businesses.
Everyday companies include everyone from giant companies like Coca-Cola to the mom and pop shop down the street. Every company is a tech company now, and someone has to be in charge of securing things. Some businesses will have their own internal security teams that respond to incidents. Many companies buy tools provided by vendors like the ones above, and someone has to manage them. Small companies with small tech departments might dump all cybersecurity responsibilities on the IT team (or outsource things to a MSSP), or larger ones may have a dedicated security staff.
Government cybersecurity work can involve a lot of things, from securing the local water supply to working for the big three letter agencies. In the U.S. at least, there are also a lot of government contractors, who are their own individual companies but the vast majority of what they do is for the government. MITRE is one example, and the federal research labs and some university-affiliated labs are an extension of this. Government work and military contractor work are where geopolitics and ethics come into play most clearly, so just… be mindful.
What do academics in cybersecurity research?
A wide variety of things! You can get a good idea by browsing the papers from the ACM's Computer and Communications Security Conference. Some of the big research areas that I'm aware of are:
cryptography & post-quantum cryptography
machine learning model security & alignment
formal proofs of a program & programming language security
security & privacy
security of network protocols
vulnerability research & developing new attack vectors
Cybersecurity seems niche at first, but it actually covers a huge range of topics all across technology and policy. It's vital to running the world today, and I'm obviously biased but I think it's a fascinating topic to learn about. I'll be posting a new cybersecurity masterpost each day this week as a part of the #StudyblrMasterpostJam, so keep an eye out for tomorrow's post! In the meantime, check out the tag and see what other folks are posting about :D
37 notes · View notes
mubarakmg · 30 days ago
Text
0 notes
shehanaz · 2 months ago
Text
0 notes
fandomtrumpshate · 9 months ago
Text
FTH 2024 - By the Numbers
With just a few days to go (signups close on MONDAY!), we have an incredible 524 creators signed up to offer 720 auctions in 260 fandoms! We're counting 107 listed and 153 unlisted fandoms, plus 90 folks offering to work in ANY fandom.
The breakdown of offers by type looks like this:
473 Written fanwork (fic, fan poetry, etc)
102 Fan art
80 Fan labor (beta services, translation, Brit-picking, typesetting, etc)
43 Podfic
14 Other Digital Fanwork
7 Video
When it comes to choosing orgs, creators are overwhelmingly leaving the choice up to their bidders. For those that have selected specific orgs, the numbers look like this:
173 Middle East Children's Alliance
119 Sherlock's Homes Foundation
102 Never Again Action
99 In Our Own Voice
89 National Network to End Domestic Violence
87 Any/All Environmental
76 Civil Rights Education and Enforcement Center
74 Life After Hate
61 Violence Policy Center
56 Razom
55 Spread the Vote
44 VoteRiders
43 Coral Restoration Foundation
37 Pollinator Partnership
35 Bellingcat
20 Wildlands Restoration Volunteers
14 Deploy/Us
10 Together Bay Area
And the most unique category, 'other digital fanwork', currently includes offers of:
Discord server creation & starter management
Playlist
Icons
Digitally produced orchestral music min 5 minutes long
Webpage template
Moodboards
Calligraphy
Animation
Conlang basics
Complete song based on supplied lyrics
Stay tuned for updates on both listed and unlisted fandoms later today!
Signups are OPEN!
57 notes · View notes