#dot net technology
Explore tagged Tumblr posts
martinmallos · 1 year ago
Text
Tumblr media
.NET technology, by Microsoft, offers versatile, secure, and efficient software development. It supports multiple languages, has a rich class library, ASP.NET for web apps, and cross-platform capabilities with .NET 5+. Robust security, memory management, and community support make it a powerful choice.
0 notes
arichinfotech · 2 days ago
Text
https://www.arichinfotech.com/
0 notes
parthspan · 3 months ago
Text
How to Make Your Dot Net Application Secure?
Is your #DotNet application truly secure? With cyber threats growing, it’s critical to safeguard your code, data, and users. Learn the essential steps to fortify your app—from strong authentication to encryption, HTTPS, and vulnerability scanning. Don't leave your app exposed—discover expert tips for ultimate security.
0 notes
arnasoftechblog-blog · 4 months ago
Text
Tumblr media
0 notes
pattemdigitalsolutions · 1 year ago
Text
Dot net web development services in Bangalore- Pattem Digital
Pattem Digital has earned a reputation of a reliable and dependable outsourcing software development company. We support businesses of types, from a startup to small-sized companies & large enterprises. Our dot net web development services include industry-recognized platforms & frameworks . Net technology is having various applications in developing web applications comprising of multi- tired software architecture can build more flexible apps. Reach to us if you are looking for dot net solutions.
0 notes
yudizblog · 1 year ago
Text
0 notes
nationsbenefitsindia · 2 years ago
Text
Tumblr media
Hiring Senior .NET Developers
Calling all experienced .NET developers!
Join our innovative team and make a difference in the healthcare industry!
At NationsBenefits India (AKA @nbhealthtech), we are passionate about improving healthcare and we're looking for talented individuals like you. We value our team and provide a challenging yet rewarding environment.
Take your career to the next level. Send your resume to [email protected] and be part of our exciting journey
0 notes
teleons · 2 years ago
Text
Why Teleons Technology Services Are the Best!
Teleons is a technology service provider that offers top-notch services in dot net development and Java web development, PHP development and more. With a team of skilled professionals, Teleons has been delivering quality services that meet the requirements of their clients. By choosing Teleons, you can improve the efficiency and productivity of your business and gain a competitive edge in the market.
For more information please visit our site:
Tumblr media
0 notes
perfectiongeeks · 2 years ago
Text
ChatGPT Replace Your Dot Net Development Company
Tumblr media
Do Dot.NET Developers Need New Skills to Succeed in an AI-Based Industry? Is ChatGPT here to revolutionize the dot net development industry? Experts believe that ChatGPT is here to revolutionize app development. From starting human-like conversations, solving privacy problems, and even writing code for programmers, OpenAI’s new tools have the power and potential to change developers’ jobs. But as the best asp.net development company in Delhi, you want to know what we think about ChatGPT.
The Hype About ChatGPT
ChatGPT was released in November 2022, more than 5 million people have registered for this free chat version, which is based on the GPT-3 family of Open AI (Generative Pretrained Transformer). Chatbot can interact with programmers as a friend and write simple web pages and programming code in JavaScript, Python and React languages. It can also find bugs and errors in code and help you create new programming languages.
ChatGPT was released in November 2022, more than 5 million people have registered for this free chat version, which is based on the GPT-3 family of Open AI (Generative Pretrained Transformer). Chatbot can interact with programmers as a friend and write simple web pages and programming code in JavaScript, Python and React languages. It can also find bugs and errors in code and help you create new programming languages. She also writes poems and songs, and suggests birthday party ideas. We strongly believe that if ChatGPT continues to do what it is doing now, it will one day replace Google. Open AI tools interact with users in a conversational way, answering questions based on past interactions, asking inappropriate questions, discussing topics, and even admitting mistakes. We believe that AI applications are amazing.
What is the Best Way to Let ChatGPT Take Over Programming?
ChatGPT is a brand-new artificial intelligence technology that can create code from natural language descriptions. This technology could eventually eliminate the need for a programmer to write code since ChatGPT could do it for them.
The primary benefit of ChatGPT can make programming easier for programmers by saving them a significant amount of time.Instead of writing codes, they can simply write down what they want to achieve with the code, and ChatGPT will handle the remainder.
This can dramatically accelerate the development process, making it simpler for non-programmers to develop software.
Another advantage could be that ChatGPT could develop better software than humans. For example, it has been demonstrated to be superior to human programmers at tasks like solving bugs.
This means it is possible to create more efficient and reliable software.
There are some drawbacks to ChatGPT. ChatGPT. One of these is that it’s still in the early stages of development, which means there will be some issues and bugs in ChatGPT.
Another reason is that they may not be able to comprehend complicated concepts or perform imaginative work as humans.
In the end, ChatGPT has the potential to replace programming in many instances. In certain situations, it could save time while producing higher-quality code than humans. But it’s still in its early days for this technology, and its capabilities have a few limitations.
0 notes
pupsmailbox · 11 months ago
Text
Tumblr media
TECHNOLOGY ID PACK
Tumblr media
NAMES ⌇ admin. ajax. alexa. am. atari. audio. auto. bailey. binary. blank. blu. blue. bluesse. browser. browsette. bug. byte. cache. calware. chip. circe. click. clicker. clickie. clicky. cloud. coda. code. codette. codie. cody. computette. crypt. cursor. cy. cyber. cybernet. cybernetica. cyberweb. cypher. cypherre. data. dell. digi. digitalia. digitelle. digitesse. disc. dot. electronica. electronique. emoticon. emoticonnie. fax. file. gig. gizmo. glitch. glitche. glitchesse. glitchette. graphique. hacker. hal. halware. hijack. index. informationne. intelligette. internette. interweb. java. javascript. juno. key. link. linuxe. lotus. lovebytes. mac. mal. malakai. malware. malwaria. memorette. memorie. meta. mic. micah. mickey. morphe. mouse. mousette. myspace. nano. neo. net. netette. nett. netty. paige. pascal. payton. peyton. pixel. programatha. programette. programme. pulse. reboot. rom. router. ruby. sam. sammy. screene. screenette. sean. shock. solitaire. spy. static. stutter. talia. tap. tecca. tech. techette. tessa. tetris. trojan. troubleshoot. ts. user. vir. virus. virusse. volt. vyrus. webbe. wheatley. whirr. widget. will. wirehead. wiresse. zap. zett. zetta. zip.
Tumblr media
PRONOUNS ⌇ :-)/:-D. ^^/^^. ai/ai. alt/alt. anti/antivirus. arc/archive. audio/audio. bat/battery. beep/beep. beep/boop. bit/bit. bit/byte. blue/blue. board/board. bright/bright. brow/browser. browser/browser. brr/brr. bu/bug. bug/bug. buzz/buzz. byt/byte. byte/byte. c/cpu. charge/charger. cir/circuit. cli/click. click/clack. click/click. click/scroll. co/code. code/code. color/color. com/com. com/computer. comp/computer. compute/computer. computer/computer. cor/corrupt. corrupt/corrupt. CPU/CPU. crash/crash. cre/creeper. crtl/crtl. cy/cyber. cyb/cyber. cyber/cyber. da/data. data/data. delete/delete. di/disk. dig/digital. digi/digi. digi/digital. digital/digital. dra/drag. e/exe. electronic/electronic. enter/enter. er/error. err/error. error/error. exe/exe. fi/file. file/file. gi/gif. gli/glitch. glit/glitch. glitch/glitch. graphic/graphic. hac/hacker. hack/hack. hard/hardware. head/phone. hij/hijacker. ho/home. info/info. information/information. int/internet. intelligent/intelligence. intelligent/intelligent. inter/net. internet/internet. it/it. jpg/jpg. key/board. key/cap. key/key. key/keyboard. key/keylogger. lag/lag. lap/laptop. ligh/light. linux/linux. load/load. log/login. main/mainframe. mal/malware. me/media. memory/memorie. mon/monitor. mou/mouse. nano/nano. net/net. net/network. o_o/>_>. org/org. over/overwrite. page/page. pix/pix. pix/pixel. pixel/pixel. plu/plug. png/png. pop/popup. port/port. pow/power. pro/program. program/program. ram/ram. ran/ransom. reboot/reboot. reload/reload. res/restore. ret/retro. route/router. sca/scan. scr/scroll. scre/screen. scre/screencap. scree/screen. screen/screen. scri/script. script/script. sentient/sentience. shift/shift. site/site. skip/skip. soft/software. spa/spam. space/space. spy/spyware. stop/stop. te/tech. tech/nology. tech/tech. technology/technology. tou/touchpad. txt/txt. typ/type. upload/upload. user/user. vi/viru. vi/virus. vir/virtual. web/page. web/web. whir/whir. wi/wire. win/dow. win/window. wire/wire. wire/wired. zip/zip . ⌨ . ☣ . ⚙ . ⚠ . 🎞 . 🎨 . 🎭 . 🎮 . 🎵 . 👀 . 👁 . 💔 . 💡 . 💢 . 💣 . 💳 . 💵 . 💻 . 💽 . 💾 . 💿 . 📀 . 📱 . 🔇 . 🔈 . 🔉 . 🔊 . 🔋 . 🔌 . 🔎 . 🖥 . 🖱 . 🗡 . 🗯 . 🛠 . 🧿 .
Tumblr media
348 notes · View notes
0-shutdown-0 · 1 month ago
Text
Thoughts on Loris
I have more thoughts and theories than concrete understanding of his character
He either feels half-baked as a side character that had more to him or just my mind being unable to connect the dots so some of this kind of jumps around 
SO:
Loris is introduced as a sad somber guy still loosely wearing his enforcer uniform while off duty. When he meets Vi his first words are something like ‘did you lose someone in the attack’, the actions of him drinking insinuates that he most likely lost someone himself.
Appearance wise Loris has a section of his hair tied with a blue colored bead and pulled into his field of vision. It’s a stretch but when Ekko wears a colored band in his hair it’s to symbolize the ‘loss’ of Jinx/Powder in the finale episode. I think Loris wears the bead in his hair to be a constant reminder of his loss- by having it remain in his sight makes that loss a constant presence. 
Anyways, besides that Loris is shown in episode 1 to not want to go to the memorial when Vi pats him on the foot since he just closes his eyes and pretends to sleep
When he does go and the attack on the memorial happens he uses a shield, a shield that's seen discarded when Vi walks around the aftermath.  
It could be foreshadowing that he dies in battle, in episode 9 he dies the one time he doesn’t have his shield, or the shield might have some type of connection to the person he loss
Now the notes:
-His shield gets a hextech advancement
-On the striketeam he’s first to push their advances with his shield in E3, and when fighting he uses his shield to bash into them offensively,
 and later when he’s the one to first get injured and get a limp from Jinx’s traps the shield becomes a crutch and a safety net for him. (I think it’s interesting that it was only when he traveled in front of Caitlyn that he got hurt )
-Even with a limp, Loris does his best to react to shield Steb when the tunnel they climbed out of get’s Grey rerouted straight to them 
-His personality is consistently fatherly, comforting Vi, comforting Maddie when they see the murder dolls (his arrow deaths included), even comforting Vi again after being pushed away and reuniting with her without hard feelings
In that reunion scene when Vi subconsciously compares Loris to Vander we then see exactly their relationship  
-Loris seems to know his way around the undercity, keep in mind it’s most likely not from the strike team traveling because they mostly used the filtration system to get through/travel. He goes with Vi to the fighting ring and when she pushes him away he’s just fine leaving her to travel elsewhere. 
-Loris was the first to leave when the Noxus general (Ambessa) took over and began doing their saultes. I think he actually might have ties to the Undercity or had been from that side of the city before going topside to be an officer. I wish we knew what led to him taking said role, because like Steb who shows his compassion by being a medic on top of being an enforcer, Loris as only an enforcer shows it by choosing defensive gear over guns as his main weapon.
-Loris returns only when the Noxus have left/ are realized as the enemy and when he returns he returns with knowledge. It seems he might have fought them before or at least studied them. He teaches the enlisters how to fight the Noxus with a weapon that wasn’t a shield and yet he holds it easily 
- In the final episode (9) when he's using the Hextech technology repurposed as a canon, he works well with his team and Vi and I must reiterate its the only time in battle that he does not have a shield, and in the end the last time
 When Vi sees Loris dead she sees him with the side of his face that has the blue bead in his hair hanging mutely without light catching it.
 And that's his end. 
I don’t know, it’s like, I���m missing something. 
Maybe the blue is like a powder/jinx reference thing and when Loris dies and “Vander” appears and Jinx chooses to be Powder again (?) it shows that that side of Jinx is dead like how Vander is dead now that his consciousness was killed from the monster/wolf mutant thing. Since Vi saw Loris as Vander/father figure and Loris lost someone who is (PROBABLY) symbolized by the blue bead in his hair. 
It's a big fat stretch but I’m grasping at strings here and it shows lol
Hope I helped :D
26 notes · View notes
mariacallous · 4 months ago
Text
Over the past few years, the United States has become the go-to location for companies seeking to suck carbon dioxide out of the sky. There are a handful of demonstration-scale direct air capture (DAC) plants dotted across the globe, but the facilities planned in Louisiana and Texas are of a different scale: They aim to capture millions of tons of carbon dioxide each year, rather than the dozens of tons or less captured by existing systems.
The US has a few things going for it when it comes to DAC: It has the right kind of geological formations that can store carbon dioxide pumped underground, it has an oil and gas industry that knows a lot about drilling into that ground, and it has federal grants and subsidies for the carbon capture industry. The projects in Louisiana and Texas are supported by up to $1.05 billion in Department of Energy (DOE) funds, and the projects will be eligible for tax credits of up to $180 per ton of carbon dioxide stored.
“It’s quite clear that the United States is the leader in policy to support this nascent sector,” says Jason Hochman, executive director at the Direct Air Capture Coalition, a nonprofit that works to accelerate the deployment of DAC technology. “At the same time, it’s nowhere near where it needs to be to get on track—to the scale we need to get to net zero.”
But support for carbon storage is far from guaranteed. Project 2025, the nearly thousand-page Heritage Foundation policy blueprint for a second Trump presidency, would dramatically roll back policies that support the DAC industry and carbon capture more generally. The Project 2025 Mandate for Leadership document proposes eliminating the DOE’s Office for Clean Energy Demonstrations, which provides funds for DAC facilities and carbon capture projects, and also calls out the 45Q tax credit that supports DAC as well as carbon capture, usage, and storage—filtering and storing carbon dioxide emitted by power plants and heavy industry. (The Heritage Foundation did not respond to WIRED’s request for comment.)
Sucking carbon out of the sky is not uncontroversial—not least because of the oil and gas industry’s involvement in the sector—but the Intergovernmental Panel on Climate Change’s Sixth Assessment Report says that using carbon dioxide removal to balance emissions from sectors like aviation and agriculture is unavoidable if we want to achieve net zero. Carbon dioxide removal can mean planting trees and sequestering carbon in soil, but a technology like DAC is attractive because it’s easy to measure how much carbon you’re sequestering, and stored carbon should stay locked up for a very long time, which isn’t necessarily the case with forests and soil.
As DAC technology is so new, and the facilities constructed so far are small, it’s still extremely expensive to remove carbon from the atmosphere this way. Estimated costs for extracting carbon go from hundreds of dollars per ton to in excess of $1,000—although Google just announced it is paying $100 for DAC removal credits for carbon that will be sequestered in the early 2030s. On top of that, large-scale DAC plants are likely to cost hundreds of millions to billions of dollars to build.
That’s why government support like the DOE Regional DAC Hubs program is so important, says Jack Andreasen at Breakthrough Energy, the Bill Gates–founded initiative to accelerate technology to reach net zero. “This gets projects built,” he says. The Bipartisan Infrastructure Law signed in 2021 set aside $3.5 billion in federal funds to help the construction of four regional DAC hubs. This is the money that is going into the Louisiana and Texas projects.
Climeworks is one of the companies working on the Louisiana DAC hub, which is eligible for up to $550 million in federal funding. Eventually, the facility aims to capture more than 1 million tons of carbon dioxide each year and store it underground. “If you do want to build an industry, you cannot do it with demo projects. You have to put your money where your mouth is and say there are certain projects that should be eligible for a larger share of funding,” says Daniel Nathan, chief project development officer at Climeworks. When the hub starts sequestering carbon, it will be eligible to claim up to $180 for each ton of carbon stored, under tax credit 45Q, which was extended under the Inflation Reduction Act.
These tax credits are important because they provide long-term support for companies actually sequestering carbon from the atmosphere. “What you have is a guaranteed revenue stream of $180 per ton for a minimum of 12 years,” says Andreasen. It’s particularly critical given that the costs of capturing and storing a ton of carbon dioxide are likely to exceed the market rate of carbon credits for a long time. Other forms of carbon removal, notably planting forests, are much cheaper than DAC, and removal offsets also compete with offsets for renewable energy, which avoid emitting new emissions. Without a top-up from the government, it’s unlikely that a market for DAC sequestration would be able to sustain itself.
Most of the DAC industry experts WIRED spoke to thought there was little political appetite to reverse the 45Q tax credit—not least because it also allows firms to claim a tax credit for using carbon dioxide to physically extract more oil from existing reservoirs. They were more worried, however, about the prospect that existing DOE funds set aside for DAC and other projects might not be allocated under a future administration.
“I do think a slowing down of the DOE is a possibility,” says Andreasen. “That just means the money takes longer to get out, and that is not great.” Katie Lebling at the World Resources Institute, a sustainability nonprofit, agrees, saying there is a risk that unallocated funds could be slowed down and stalled if a new administration looked less favorably on carbon removal.
The Heritage Foundation doesn’t just doubt the carbon removal industry—it is openly skeptical about climate change, writing in one report that observed warming could only “theoretically” be due to the burning of fossil fuels, and that “this claim cannot be demonstrated through science.” In its Project 2025 plan, the foundation says the “government should not be picking winners and losers and should not be subsidizing the private sector to bring resources to market.”
But without government support, the private sector would never develop technologies like DAC, says Jonas Meckling, an associate professor at UC Berkeley and climate fellow at Harvard Business School. The same was true of the solar industry, Meckling says. “You cannot start an industry with a societal good in mind unless you get governments to take an active role,” says Nathan of Climeworks.
While there are some question marks over the future of DOE grants for DAC, the industry appeals to legislators on both sides of the aisle. The Texas DAC hub is being built by 1PointFive, a subsidiary of Occidental Petroleum, and both DOE projects are located in firmly red states. When it was announced that DOE DAC hubs funding would be spent in Louisiana, Senator Bill Cassidy said: “Carbon capture opens a new era of energy and manufacturing dominance for Louisiana. It is the future of job creation and economic development for our state.”
In the long run, Nathan says, the aim is for DAC to be viable on its own economic terms. In time, he says, that will mean regulation that requires industries to pay for carbon removal—a stricter version of emissions-trading schemes that already exist in places like California and the European Union. Eventually, that should lead to a place where the direct air industry no longer requires government support to remove carbon from the atmosphere at scale. “I’m looking at the fundamentals, and those aren’t driven by who’s in office,” Nathan says.
12 notes · View notes
i4technolab · 2 years ago
Link
Tumblr media
For example, some plug-ins are utilized to quickly search for their key terms and filter them to acquire desired results while other plugins can provide you with a variety of customized templates, emojis, and unique data tables to utilize in the file fitting exactly to industry rules.
Check out the graph below to see the yearly usage statistics of Office Addin platforms, which will help you understand the importance of Office 365 Add-ins development in the business.
Tumblr media
Why should I use Office add-ins?
To complete your paperwork and associated chores precisely in less time, Office Add-ins are the best options to go with. These extensions can be used with a variety of Office applications, including Word, Excel, PowerPoint, Outlook, and OneNote. This means that you can use Office Add-ins to enhance the functionality of these applications and make your work more efficient and effective. For example, you can use an add-in to quickly access and share files from a cloud storage service within Word or Excel or use an add-in to visualize data in new and meaningful ways within PowerPoint.
Looking for the best PowerPoint Add-in Development Services? Your search ends here.
0 notes
macabrecravings · 1 year ago
Text
Seraphina the Camgirl
18 years old, Cisgender Female (she/her), Bisexual, 157 cm
Tumblr media Tumblr media
Pinterest | Spotify | RP/Ask Blog: @xxbl00ds0akeds3raxx
Here it is. The long-awaited Seraphina lore MASTERPOST. Under the cut you will find 1,000 words describing her & her backstory, ALONG WITH a compilation of my favorite pretty pics :3!!
TW // Kidnapping, Self Harm & Disordered Eating (briefly mentioned), (Ask to Tag)
If there’s one word that describes Seraphina, it's famous. Her classmates look up to for her top grades and her delinquency. (The only thing that keeps her from being among the most popular is her relationship with Kylar. She has a soft heart and never uses her status to put others down, because she knows what it's like to be the underdog.) Most of the town is aware of her as well, particularly due to her... keen interest in exhibitionism.
At first, she began exploring this in the comfort of her own room. When she began working & saving up money to pay Bailey, she spent some of her savings to buy a laptop. Quickly, she became enthralled with the internet. She spent most of her free time playing video games or watching My Little Pony with Robin. Technology was a great escape from reality, for a while. Unfortunately, most of the content she consumed was less than stellar. She spent an unhealthy amount of time on sketchy chat rooms, threads and forums, gore sites, and porn sites. In these forums, users began to tell her that she should use her webcam and stream herself. Seeking money, attention & validation, she joined a cam site. Making money without leaving her room and interacting with the lecherous townspeople sounded like a dream and she would be able to become comfortable in her body without their gaze.
Though, this decision would prove to be more detrimental. The audience she garnered wasn't any less lecherous, and because they were online & anonymous, they were more sadistic. She'd get higher tips for increasingly awful requests, such as harming herself on camera. Due to poor emotional regulation and spite, she'd do it.
After that inkling of kindness, Kylar became fixated on her. He easily found her online and began to monitor her online presence. Sitting and watching her streams for hours on end fed his parasocial relationship. When she began to befriend him, Seraphina was completely unaware of his obsession. But once he started using throwaway accounts to threaten and harass viewers in her streams, she'd become uneasy.
Once she started to connect the dots, she started to distance herself from Kylar. He was openly dangerous; threatening people at school over her, and all in all making her uneasy. Her streams became infrequent. She returned to playing video games and spending every second with her actual boyfriend-- Robin. Her childhood best friend and the light of her life. He was her safety net and she was his- especially considering she pays Bailey for him.
The final turning point was on Halloween. She lovingly spent the day with Robin, then Whitney, and had an awful feeling about meeting Kylar in the park. Even more so when he brought her into the woods. She played along with his love potion bullshit, gave him a taste of his own obsessive medicine, but then Whitney showed up.
One thing about Seraphina and Whitney is that they are complicated. He bullied her and made her life hell for so long, yet she genuinely cares for him. They've had their sparks of love/romance, but mainly she just seeks him out to have fun. Drinking, vandalism, exhibitionism, hard sex,,, she thinks spending time with him is a blast! So, when Seraphina excitedly went along with everything he on Halloween, it destroyed Kylar. His actions that night terrified her. She moved seats in English, never left Robin's side, and secluded herself for weeks.
Kylar kidnapped her one evening after school. She wanted to buy some new clothes, but ended up bound in his basement. Eventually, she cracked. He was obviously devoted to her, and truly wanted to keep her safe, right? One look at the state of his house broke her heart. Everyone deserves a friend. He's misunderstood, he just needs someone to take care of him. Clearly, no one else would.
Her innate want/need for people to be kind to each other often makes her naïve. Like Robin, it makes living in the DOL town a huge struggle for her and her mental health. Harper requests to see her every Friday, but she doesn't listen to any of his advice. She is a masochist who copes with pain and lack of control through self harm and disordered eating (though her sensory issues play a big part of that as well.)
Speaking of sensory issues, Seraphina is autistic. Because of her line of work, she's had to learn how to be hyper aware of others and their body language. Oftentimes, this leads to her assuming everyone has the worst intentions and causes her to panic, aided by her past traumatic experiences. She has issues with clothes textures (wet fabric in particular) which honestly could aid her in how little she wears. Because she's autistic, she has a tendency to fall very deep and obsessively into interests very fast. This is how she fell so far into the internet all at once. As I've mentioned before, her special interests include MLP, Classic Creepypastas, scene/scenemo subculture, music, and dancing.
For work, Seraphina models with Niki, is the main star in shows at the brothel with Briar, helps Darryl with the club, dances for Charlie's friends, strips, bartends, and prostitutes herself. Skulduggery is something that she practices, specifically when she works at the spa or is fucking a client. (She used to rob houses, but it's dangerous for her to walk around at night now that she's so well-recognized.)
Before Seraphina was sent to the orphanage, she lived with her single mother (Rosalia the Castoff) on Domus Street. She was an accident; the result of a contraceptive failure between Rosalia and a client. Coming from poverty, Rosalia had just barely gotten on her feet financially. Still, she kept the pregnancy and had Seraphina. Try as she might, Rosalia couldn't support the both of them. This resulted in her surrendering Seraphina over to the orphanage at 6 years old and disappearing. She's presumed dead, based on the state she was in as she gave Seraphina up, but there's never been any concrete evidence. All that remains of her are musings of her name on the street, spurred on by Seraphina's presence. Townspeople note that Seraphina is following her mother's footsteps and laugh at the idea that her fate may be the same. (Especially considering her fame may as well have surpassed her mother's now.)
Tumblr media
Gallery
Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media Tumblr media
1st image drawn by: @mothmanharvey-nsfw
21 notes · View notes
learning-tech-publicly · 4 months ago
Text
Names & Numbers: How Data Finds its Destination on the Net
As explained before, the Internet is the global network of networks. And with billions of computers and devices connected to the Internet, how does data know where to go when it is sent?
When the foundations of the Internet were being laid in the early 1970's, Vint Cerf and Bob Kahn developed the first internetworking protocol. A protocol is a set of standards and rules that are agreed upon for all future technology to follow. The protocols that followed as the Internet grew, allowed for the massive global network we find today.
One of those protocols, the Internet Protocol (IP), determines how devices are located on networks as well as the structure of addresses for data sent, much similar to how postal services follow a set structure for home addresses (a protocol). IP addresses currently follow the IPv4 (version 4) or IPv6 (version 6) standards.
IPv4 is a set of 32 numbers (32 bits) separated into 4 parts with 8-bits (a byte) in each part and written in dot-decimal notation. Here's an example of an IPv4 address (111.24.221.18). The first two bytes represent the country or region of the address. The third byte represents the subnetwork and the final byte the device on that subnetwork. By using 32 bits, IPv4 was capable of over 4 billion internet addresses. However, this was not enough.
Enter IPv6, a 128-bit addressing protocol. IPv6 consist of a set of eight hexadecimal strings, each 16-bits long. This increases the total amount of possible internet addresses to over 340 undecillion (10^36). Plenty to go around.
You may be wondering, but if I type in a website domain into my browser bar, how to I get to that website without typing in the specific IP address? Now it is time to introduce DNS or the Domain Naming System.
You know how when you want to save someone's phone number into your own smartphone, you type in a name and save it to your contacts. Then when you want to call or text that person, you just click on their name and soon you are connected. DNS works the exact same way but is better in another way. DNS works like that contact list in your phone.
There are a bunch of DNS servers that hold the addresses and domain names of all the websites in existence. When you type in the name of a website in your browser, your request is sent to a DNS server who then returns that IP address to your system so that you may set up a connection with the website server. If the particular DNS server does not know the address, it asks the vast network of other DNS servers if they know the address. Once it gets the correct address, the DNS server you originally contacted, will save that address for your convenience. Nifty huh?
However, DNS does have a downside. Because it an open and public protocol, it is possible for criminal elements to disrupt or manipulate the routing of the DNS server. An unethical hacker could perform a DNS spoof, which could force traffic meant for a legitimate website to be rerouted to a malicious website or phishing site.
2 notes · View notes
darkmoongodess · 11 months ago
Text
Tumblr keeps asking if I want to make a new blog...I am considering it just to toss all my story that's in my head for my fanfiction 😂 and then I can reorder it and make it nice on ff dot net and ao3 later.....plus I can use images and make fanart...welp...that has done it.
What do I call it?
MagMione...no
MaMione....no
MagnetoMione...eek
ErikMione...no. I just can't
HerMagneto....I kind of like it because it could mean something completely different than the main intention😂
Hermione X Magneto Rare Pair
Then perhaps I can finally have chapter 6 finished.
Would you want a blog of the inside of my mind? Hahaha now I feel like doing it for the original scifi book melting my brain with the technology I wish existed...and contemplating making real in my fanfic as well just to test it out and play with it because I still not sure about the plot for the bunny in my head that is slowly becoming my new WIP.
Tumblr media
5 notes · View notes