#lockout services and more.
Explore tagged Tumblr posts
Text
Lok Out Shop offers reliable emergency car lockout services, available 24/7. Our skilled technicians swiftly unlock vehicles without damage, ensuring you regain access promptly. Trust us for efficient, professional assistance, so you can get back on the road in no time.
#lockout service near me#emergency lockout service#locksmith services#lockout services and more.#car lockout service
0 notes
Text
Convenience
Keyless Entry: smart lock eliminates the need for physical keys. You can unlock door with a smartphone app, a key fob, or even through biometric methods like fingerprints.
Remote Access: many smart locks allow you to unlock your door remotely, which is useful if you need to grant access to someone while you’re away.
Enhanced Security
Access Logs: Smart locks can provide detailed logs of who entered and when, adding an extra layer of monitoring and control.
Temporary access codes: you can create temporary or one-time access codes for guest’s service providers or other, ensuring that only authorized individuals can enter.
Integration with smart home systems
Automation: smart locks can integrate with home automation systems, allowing for seamless control along with other smart devices
Voice control: many smart locks are compatible with voice assistant like amazon alexa, google assistant enabling hands-free operation.
Improved Accessibility
For Those with Mobility issues: smart locks can be easier to operate for people with disabilities or mobility issues, as they often offer touchless or simplified access method.
No more Lockouts: with keyless entry the chances of locking out are significantly reduced, which is especially helpful in busy or stressful situations.
Durability and reliability:
Weather Resistant: many smart locks are designed or withstands various weather condition, making them suitable for external doors,
Battery Backup: most smart locks are battery operated with a backup power source, ensuring they remain functional even during power outages.
Ease of Management
Centralized control: if you have multiple smart devices, managing them through a single app can streamlined operations and make home management more efficient.
Auto Lock Feature: Some smart locks come with auto-lock functions that ensure the door locks automatically after a set period, enhancing security.
Customizable Access Options
Personalization: Users can set different levels of access for family members, friends or service providers and easily modify or revoke permission as needed.
Is it worth the investment?
Initial Cost: smart locks typically have a higher upfront cost compared to traditional locks; however, this cost may be offset by the convenience and security features they provide.
Ongoing costs: some smart locks may require subscription fees for advanced features or cloud services, so it’s important to factor in these potential ongoing expenses.
Technology Dependence: Relying on technology means you’ll need to stay updated on software updates and ensure your devices are compatible with your smart lock.
Overall if you value convenience enhanced security and integration with smart home systems a smart lock can be a worthwhile investment. It’s important to assess your specific needs and budget to determine if the benefits align with your lifestyle and preferences.
To know more about the electronics locks: https://www.europalocks.com/electronic-locks
#smartlock #smartdoorlocks #electronicdoorlocks #smartlocksforhome #smarthomedoorlock #elock #bestdigitallock #digitallockformaindoor #digitaldoorlocksforhome #keylesssmartlock #smartfingerprintdoorlock #smarthouselock #electronicdoorlockwithremotecontrol #smartlockformaindoor #digitalhomelocks #digitalsmartdoorlock #electronicdoorlockwithremote #digitaldoorlockprice #smartmaindoorlock #bestdigitallockformaindoor #maindoorsmartlock #electronicdoorlockprice #smartdoorlockprice #electroniclocksformaindoor #smartdigitaldoorlocks #smartlockondoor #wifismartlock
#1)#Convenience#•#Keyless Entry: smart lock eliminates the need for physical keys. You can unlock door with a smartphone app#a key fob#or even through biometric methods like fingerprints.#Remote Access: many smart locks allow you to unlock your door remotely#which is useful if you need to grant access to someone while you’re away.#2)#Enhanced Security#Access Logs: Smart locks can provide detailed logs of who entered and when#adding an extra layer of monitoring and control.#Temporary access codes: you can create temporary or one-time access codes for guest’s service providers or other#ensuring that only authorized individuals can enter.#3)#Integration with smart home systems#Automation: smart locks can integrate with home automation systems#allowing for seamless control along with other smart devices#Voice control: many smart locks are compatible with voice assistant like amazon alexa#google assistant enabling hands-free operation.#4)#Improved Accessibility#For Those with Mobility issues: smart locks can be easier to operate for people with disabilities or mobility issues#as they often offer touchless or simplified access method.#No more Lockouts: with keyless entry the chances of locking out are significantly reduced#which is especially helpful in busy or stressful situations.#5)#Durability and reliability:#Weather Resistant: many smart locks are designed or withstands various weather condition#making them suitable for external doors
0 notes
Text
Scammers sophistication technique have reached a new apex, making Banking Fraud just like a walk in the park to this crime syndicates with richer background helter-skelters depositors and has been keeping most retirees that reinvested most of their retirement plan sleepless after words of the threat that swept the streets does not seem to have not weakened at all.
Masses are appealing for a more stringent countermeasure to be in place as soon as possible, such are adding more authentication request. Although retina scanner can slow down the process with the amount or rather the size of the data, but it also gives us an opportunity of having time to lockout perpetrators. The size of the data makes it at least 70% better than an iris scan and many more folds multiplied compared to a fingerprint.
Several years ago, I foresaw that the mCommerce (mobile commerce) would be ruled out as the mainstay of electronic processing for the sole reason that it is the most affordable business appliance that can serve the majority, representing the poor to medium class and the trending plot of global economic structure just like a triangle.
Having mCommerce | Mobile Technology as our economic transport offers the possibility of catering and adding the biggest chunk of our global population to pitch in the global trade for us to achieve having reserves and surplus will be more conceivable.
To make it a little impenetrable and globally under tighter scrutiny, I proposed that we adopt the universal identification system. We will integrate every other form of identity attached to it using our mobile number as the key index that will permanently our lifetime phone number. In the event of loss, the telco will make a SIM based on a secret code given to the subscriber upon the receipt of your subscription and issuance, which will be honored and will be service by other Telcos if subscriber opt to change carrier. The number coding of telcos should also compliment tracking effort, narrowed down within the radius and range of a few kilometers apart where the last signal was received or transmitted. The succeeding successful connection recorded by cell sites would enable us to speculate the linear direction as it trends.
We will enable the mobile technology to be a conduit of payment gateways or as a payment gateway itself. Our objective is to open the global trade and cover a larger scope and as far-reaching it could service most specially the marginalized poor a chance to lift their social status getting connected and finally be able to join our bandwagon to the brighter future. The fact can't be denied that they have been left without an adequate means to tap the convenience and business opportunity through eCommerce. Through the mobile payment gateway, even in the absence of a banking system in their region, they can now fulfill the checkout process by loading or charging it from your telco which is even less intricate than having a debit card or as to many known financial credibility.
#mobilepaymentgateway
#mobiletechnology
#mCommerce
#onlinefraud
#RetinaScan
Scammers sophistication technique have reached a new apex, making Banking Fraud just like a walk in the park to this crime syndicates with richer background helter-skelters depositors and has been keeping most retirees that reinvested most of their retirement plan sleepless after words of the threat that swept the streets does not seem to have not weakened at all.
Masses are appealing for a more stringent countermeasure to be in place as soon as possible, such are adding more authentication request. Although retina scanner can slow down the process with the amount or rather the size of the data, but it also gives us an opportunity of having time to lockout perpetrators. The size of the data makes it at least 70% better than an iris scan and many more folds multiplied compared to a fingerprint.
Several years ago, I foresaw that the mCommerce (mobile commerce) would be ruled out as the mainstay of electronic processing for the sole reason that it is the most affordable business appliance that can serve the majority, representing the poor to medium class and the trending plot of global economic structure just like a triangle.
Having mCommerce | Mobile Technology as our economic transport offers the possibility of catering and adding the biggest chunk of our global population to pitch in the global trade for us to achieve having reserves and surplus will be more conceivable.
To make it a little impenetrable and globally under tighter scrutiny, I proposed that we adopt the universal identification system. We will integrate every other form of identity attached to it using our mobile number as the key index that will permanently our lifetime phone number. In the event of loss, the telco will make a SIM based on a secret code given to the subscriber upon the receipt of your subscription and issuance, which will be honored and will be service by other Telcos if subscriber opt to change carrier. The number coding of telcos should also compliment tracking effort, narrowed down within the radius and range of a few kilometers apart where the last signal was received or transmitted. The succeeding successful connection recorded by cell sites would enable us to speculate the linear direction as it trends.
We will enable the mobile technology to be a conduit of payment gateways or as a payment gateway itself. Our objective is to open the global trade and cover a larger scope and as far-reaching it could service most specially the marginalized poor a chance to lift their social status getting connected and finally be able to join our bandwagon to the brighter future. The fact can't be denied that they have been left without an adequate means to tap the convenience and business opportunity through eCommerce. Through the mobile payment gateway, even in the absence of a banking system in their region, they can now fulfill the checkout process by loading or charging it from your telco which is even less intricate than having a debit card or as to many known financial credibility.
#mobilepaymentgateway
#mobiletechnology
#mCommerce
#onlinefraud
#RetinaScan
#FraudAlert
#FraudAlert
#Scammers sophistication technique have reached a new apex#making Banking Fraud just like a walk in the park to this crime syndicates with richer background helter-skelters depositors and has been k#Masses are appealing for a more stringent countermeasure to be in place as soon as possible#such are adding more authentication request. Although retina scanner can slow down the process with the amount or rather the size of the da#but it also gives us an opportunity of having time to lockout perpetrators. The size of the data makes it at least 70% better than an iris#Several years ago#I foresaw that the mCommerce (mobile commerce) would be ruled out as the mainstay of electronic processing for the sole reason that it is#representing the poor to medium class and the trending plot of global economic structure just like a triangle.#Having mCommerce | Mobile Technology as our economic transport offers the possibility of catering and adding the biggest chunk of our globa#To make it a little impenetrable and globally under tighter scrutiny#I proposed that we adopt the universal identification system. We will integrate every other form of identity attached to it using our mobil#the telco will make a SIM based on a secret code given to the subscriber upon the receipt of your subscription and issuance#which will be honored and will be service by other Telcos if subscriber opt to change carrier. The number coding of telcos should also comp#narrowed down within the radius and range of a few kilometers apart where the last signal was received or transmitted. The succeeding succ#We will enable the mobile technology to be a conduit of payment gateways or as a payment gateway itself. Our objective is to open the globa#even in the absence of a banking system in their region#they can now fulfill the checkout process by loading or charging it from your telco which is even less intricate than having a debit card o#mobilepaymentgateway#mobiletechnology#mCommerce#onlinefraud#RetinaScan#FraudAlert
0 notes
Text
Website : https://www.sfcitytowing.com/
Address : 95 3rd St 2nd Floor, San Francisco, CA 94103
Phone : +1 415-287-3020
We provide towing services for the San Francisco Bay Area and around the peninsula. Some of our services include flatbed towing, light duty towing, medium duty towing, roadside assistance, battery replacement, flat tires, locked vehicles, motorcycle towing, car lockout, battery jump start and more.
#We are San Francisco Bay Area towing. Our trusted service can be seen around the peninsula. Some of our services include flatbed towing#light duty towing#medium duty towing#heavy duty towing#roadside assistance#mobile battery replacement#flat tires#motorcycle towing#car lockout#battery jump start#low clearance towing and more
1 note
·
View note
Text
Have you heard about the Polish Train company, Newag, and the bullshit it turns out they got up to?
So, the regional rail operator Koleje Dolnośląskie bought some Newag Impuls back in 2016 . In late 2021, some of them need to have major maintenance done, as they've been in service a while. So the company SPS (Serwis Pojazdów Szynowych) gets the contract to fix them. They basically take the train apart, replace a bunch of it, following all the rules in the documentation Newag gave them, and... it won't move. The train says everything is fine, the brakes are off, there's plenty of power, but you push the throttle up and it won't move.
SPS spends a while trying to figure out what the fuck is wrong, with no luck. So they hire some hackers from the Polish security group Dragon Sector. Dragon Sector figures out how to get into the code of the computer system that runs the train, and OH MY GOD.
So it turns out there's a secret train-lock system. If it's on, the train won't move. This will be triggered in some situations you might think are normal: the clocks are wrong, the serial numbers of the various parts have changed, and a firmware mismatch between the main computer and the power system. Now, the fact that it makes sense to not run the train in these situations until someone can check it? that doesn't extend to the fact the train uses a SECRET lock system, rather than just popping up an error message telling you what's wrong. There's also the problem that while these are all potential error problems, they can't be cleared by anyone with the technical manuals, which are supposed to cover everything about how to run these trains. Only Newag themselves can reset this system.
Which, you know, keeps SPS from properly fixing them. Only Newag can fix them now, but not because SPS lacks any technical ability, but because Newag sabotaged their own trains. But don't worry: it gets worse.
So now that Dragon Sector knows what's happening, they get to look at other trains. It turns out the trains aren't all running the same software, and there are other tricks in there.
One of them is a "how long has the train been stopped?" check. If the train hasn't hit 60 km/h in 10 days, the train locks itself and won't move until Newag can clear it. So, like, if a train is ever out of service, like it's going to a repair place... it'll break itself. Unless the repair place is owned by Newag.
But two of the trains go further: See, these trains have GPS built in, right? You may be able to guess where this is going...
THEY JUST MAKE THE TRAIN CHECK IF IT IS PARKED AT THEIR COMPETITORS' REPAIR YARD AND BREAK ITSELF IF IT WAS.
The sheer audacity of this move. This is frighteningly bullshit anti-competition self-sabotage.
This has, obviously, made some parts of the Polish government to start investigating this. Newag may be (and hopefully will be) in a lot of trouble.
For more info, there's a great video of a presentation by the three people from Dragon Sector who did the hacking, which was presented at the 37th Chaos Communication Congress in Germany.
Ars Technica also has an article on it, but it predates the presentation so it doesn't have some of the later details.
Anyway, the good news is that in the end the hackers at Dragon Sector were able to unlock most of the trains: A few had additional trickery that they didn't want to hack around, because it might break the train's certification. For the others, they discovered undocumented "cheat codes" in the software that they could use to bypass the secret lockouts... presumably the same ones that Newag would have used when they "repaired" trains.
5K notes
·
View notes
Text
Unpersoned
Support me this summer on the Clarion Write-A-Thon and help raise money for the Clarion Science Fiction and Fantasy Writers' Workshop!
My latest Locus Magazine column is "Unpersoned." It's about the implications of putting critical infrastructure into the private, unaccountable hands of tech giants:
https://locusmag.com/2024/07/cory-doctorow-unpersoned/
The column opens with the story of romance writer K Renee, as reported by Madeline Ashby for Wired:
https://www.wired.com/story/what-happens-when-a-romance-author-gets-locked-out-of-google-docs/
Renee is a prolific writer who used Google Docs to compose her books, and share them among early readers for feedback and revisions. Last March, Renee's Google account was locked, and she was no longer able to access ten manuscripts for her unfinished books, totaling over 220,000 words. Google's famously opaque customer service – a mix of indifferently monitored forums, AI chatbots, and buck-passing subcontractors – would not explain to her what rule she had violated, merely that her work had been deemed "inappropriate."
Renee discovered that she wasn't being singled out. Many of her peers had also seen their accounts frozen and their documents locked, and none of them were able to get an explanation out of Google. Renee and her similarly situated victims of Google lockouts were reduced to developing folk-theories of what they had done to be expelled from Google's walled garden; Renee came to believe that she had tripped an anti-spam system by inviting her community of early readers to access the books she was working on.
There's a normal way that these stories resolve themselves: a reporter like Ashby, writing for a widely read publication like Wired, contacts the company and triggers a review by one of the vanishingly small number of people with the authority to undo the determinations of the Kafka-as-a-service systems that underpin the big platforms. The system's victim gets their data back and the company mouths a few empty phrases about how they take something-or-other "very seriously" and so forth.
But in this case, Google broke the script. When Ashby contacted Google about Renee's situation, Google spokesperson Jenny Thomson insisted that the policies for Google accounts were "clear": "we may review and take action on any content that violates our policies." If Renee believed that she'd been wrongly flagged, she could "request an appeal."
But Renee didn't even know what policy she was meant to have broken, and the "appeals" went nowhere.
This is an underappreciated aspect of "software as a service" and "the cloud." As companies from Microsoft to Adobe to Google withdraw the option to use software that runs on your own computer to create files that live on that computer, control over our own lives is quietly slipping away. Sure, it's great to have all your legal documents scanned, encrypted and hosted on GDrive, where they can't be burned up in a house-fire. But if a Google subcontractor decides you've broken some unwritten rule, you can lose access to those docs forever, without appeal or recourse.
That's what happened to "Mark," a San Francisco tech workers whose toddler developed a UTI during the early covid lockdowns. The pediatrician's office told Mark to take a picture of his son's infected penis and transmit it to the practice using a secure medical app. However, Mark's phone was also set up to synch all his pictures to Google Photos (this is a default setting), and when the picture of Mark's son's penis hit Google's cloud, it was automatically scanned and flagged as Child Sex Abuse Material (CSAM, better known as "child porn"):
https://pluralistic.net/2022/08/22/allopathic-risk/#snitches-get-stitches
Without contacting Mark, Google sent a copy of all of his data – searches, emails, photos, cloud files, location history and more – to the SFPD, and then terminated his account. Mark lost his phone number (he was a Google Fi customer), his email archives, all the household and professional files he kept on GDrive, his stored passwords, his two-factor authentication via Google Authenticator, and every photo he'd ever taken of his young son.
The SFPD concluded that Mark hadn't done anything wrong, but it was too late. Google had permanently deleted all of Mark's data. The SFPD had to mail a physical letter to Mark telling him he wasn't in trouble, because he had no email and no phone.
Mark's not the only person this happened to. Writing about Mark for the New York Times, Kashmir Hill described other parents, like a Houston father identified as "Cassio," who also lost their accounts and found themselves blocked from fundamental participation in modern life:
https://www.nytimes.com/2022/08/21/technology/google-surveillance-toddler-photo.html
Note that in none of these cases did the problem arise from the fact that Google services are advertising-supported, and because these people weren't paying for the product, they were the product. Buying a $800 Pixel phone or paying more than $100/year for a Google Drive account means that you're definitely paying for the product, and you're still the product.
What do we do about this? One answer would be to force the platforms to provide service to users who, in their judgment, might be engaged in fraud, or trafficking in CSAM, or arranging terrorist attacks. This is not my preferred solution, for reasons that I hope are obvious!
We can try to improve the decision-making processes at these giant platforms so that they catch fewer dolphins in their tuna-nets. The "first wave" of content moderation appeals focused on the establishment of oversight and review boards that wronged users could appeal their cases to. The idea was to establish these "paradigm cases" that would clarify the tricky aspects of content moderation decisions, like whether uploading a Nazi atrocity video in order to criticize it violated a rule against showing gore, Nazi paraphernalia, etc.
This hasn't worked very well. A proposal for "second wave" moderation oversight based on arms-length semi-employees at the platforms who gather and report statistics on moderation calls and complaints hasn't gelled either:
https://pluralistic.net/2022/03/12/move-slow-and-fix-things/#second-wave
Both the EU and California have privacy rules that allow users to demand their data back from platforms, but neither has proven very useful (yet) in situations where users have their accounts terminated because they are accused of committing gross violations of platform policy. You can see why this would be: if someone is accused of trafficking in child porn or running a pig-butchering scam, it would be perverse to shut down their account but give them all the data they need to go one committing these crimes elsewhere.
But even where you can invoke the EU's GDPR or California's CCPA to get your data, the platforms deliver that data in the most useless, complex blobs imaginable. For example, I recently used the CCPA to force Mailchimp to give me all the data they held on me. Mailchimp – a division of the monopolist and serial fraudster Intuit – is a favored platform for spammers, and I have been added to thousands of Mailchimp lists that bombard me with unsolicited press pitches and come-ons for scam products.
Mailchimp has spent a decade ignoring calls to allow users to see what mailing lists they've been added to, as a prelude to mass unsubscribing from those lists (for Mailchimp, the fact that spammers can pay it to send spam that users can't easily opt out of is a feature, not a bug). I thought that the CCPA might finally let me see the lists I'm on, but instead, Mailchimp sent me more than 5900 files, scattered through which were the internal serial numbers of the lists my name had been added to – but without the names of those lists any contact information for their owners. I can see that I'm on more than 1,000 mailing lists, but I can't do anything about it.
Mailchimp shows how a rule requiring platforms to furnish data-dumps can be easily subverted, and its conduct goes a long way to explaining why a decade of EU policy requiring these dumps has failed to make a dent in the market power of the Big Tech platforms.
The EU has a new solution to this problem. With its 2024 Digital Markets Act, the EU is requiring platforms to furnish APIs – programmatic ways for rivals to connect to their services. With the DMA, we might finally get something parallel to the cellular industry's "number portability" for other kinds of platforms.
If you've ever changed cellular platforms, you know how smooth this can be. When you get sick of your carrier, you set up an account with a new one and get a one-time code. Then you call your old carrier, endure their pathetic begging not to switch, give them that number and within a short time (sometimes only minutes), your phone is now on the new carrier's network, with your old phone-number intact.
This is a much better answer than forcing platforms to provide service to users whom they judge to be criminals or otherwise undesirable, but the platforms hate it. They say they hate it because it makes them complicit in crimes ("if we have to let an accused fraudster transfer their address book to a rival service, we abet the fraud"), but it's obvious that their objection is really about being forced to reduce the pain of switching to a rival.
There's a superficial reasonableness to the platforms' position, but only until you think about Mark, or K Renee, or the other people who've been "unpersonned" by the platforms with no explanation or appeal.
The platforms have rigged things so that you must have an account with them in order to function, but they also want to have the unilateral right to kick people off their systems. The combination of these demands represents more power than any company should have, and Big Tech has repeatedly demonstrated its unfitness to wield this kind of power.
This week, I lost an argument with my accountants about this. They provide me with my tax forms as links to a Microsoft Cloud file, and I need to have a Microsoft login in order to retrieve these files. This policy – and a prohibition on sending customer files as email attachments – came from their IT team, and it was in response to a requirement imposed by their insurer.
The problem here isn't merely that I must now enter into a contractual arrangement with Microsoft in order to do my taxes. It isn't just that Microsoft's terms of service are ghastly. It's not even that they could change those terms at any time, for example, to ingest my sensitive tax documents in order to train a large language model.
It's that Microsoft – like Google, Apple, Facebook and the other giants – routinely disconnects users for reasons it refuses to explain, and offers no meaningful appeal. Microsoft tells its business customers, "force your clients to get a Microsoft account in order to maintain communications security" but also reserves the right to unilaterally ban those clients from having a Microsoft account.
There are examples of this all over. Google recently flipped a switch so that you can't complete a Google Form without being logged into a Google account. Now, my ability to purse all kinds of matters both consequential and trivial turn on Google's good graces, which can change suddenly and arbitrarily. If I was like Mark, permanently banned from Google, I wouldn't have been able to complete Google Forms this week telling a conference organizer what sized t-shirt I wear, but also telling a friend that I could attend their wedding.
Now, perhaps some people really should be locked out of digital life. Maybe people who traffick in CSAM should be locked out of the cloud. But the entity that should make that determination is a court, not a Big Tech content moderator. It's fine for a platform to decide it doesn't want your business – but it shouldn't be up to the platform to decide that no one should be able to provide you with service.
This is especially salient in light of the chaos caused by Crowdstrike's catastrophic software update last week. Crowdstrike demonstrated what happens to users when a cloud provider accidentally terminates their account, but while we're thinking about reducing the likelihood of such accidents, we should really be thinking about what happens when you get Crowdstruck on purpose.
The wholesale chaos that Windows users and their clients, employees, users and stakeholders underwent last week could have been pieced out retail. It could have come as a court order (either by a US court or a foreign court) to disconnect a user and/or brick their computer. It could have come as an insider attack, undertaken by a vengeful employee, or one who was on the take from criminals or a foreign government. The ability to give anyone in the world a Blue Screen of Death could be a feature and not a bug.
It's not that companies are sadistic. When they mistreat us, it's nothing personal. They've just calculated that it would cost them more to run a good process than our business is worth to them. If they know we can't leave for a competitor, if they know we can't sue them, if they know that a tech rival can't give us a tool to get our data out of their silos, then the expected cost of mistreating us goes down. That makes it economically rational to seek out ever-more trivial sources of income that impose ever-more miserable conditions on us. When we can't leave without paying a very steep price, there's practically a fiduciary duty to find ways to upcharge, downgrade, scam, screw and enshittify us, right up to the point where we're so pissed that we quit.
Google could pay competent decision-makers to review every complaint about an account disconnection, but the cost of employing that large, skilled workforce vastly exceeds their expected lifetime revenue from a user like Mark. The fact that this results in the ruination of Mark's life isn't Google's problem – it's Mark's problem.
The cloud is many things, but most of all, it's a trap. When software is delivered as a service, when your data and the programs you use to read and write it live on computers that you don't control, your switching costs skyrocket. Think of Adobe, which no longer lets you buy programs at all, but instead insists that you run its software via the cloud. Adobe used the fact that you no longer own the tools you rely upon to cancel its Pantone color-matching license. One day, every Adobe customer in the world woke up to discover that the colors in their career-spanning file collections had all turned black, and would remain black until they paid an upcharge:
https://pluralistic.net/2022/10/28/fade-to-black/#trust-the-process
The cloud allows the companies whose products you rely on to alter the functioning and cost of those products unilaterally. Like mobile apps – which can't be reverse-engineered and modified without risking legal liability – cloud apps are built for enshittification. They are designed to shift power away from users to software companies. An app is just a web-page wrapped in enough IP to make it a felony to add an ad-blocker to it. A cloud app is some Javascript wrapped in enough terms of service clickthroughs to make it a felony to restore old features that the company now wants to upcharge you for.
Google's defenstration of K Renee, Mark and Cassio may have been accidental, but Google's capacity to defenstrate all of us, and the enormous cost we all bear if Google does so, has been carefully engineered into the system. Same goes for Apple, Microsoft, Adobe and anyone else who traps us in their silos. The lesson of the Crowdstrike catastrophe isn't merely that our IT systems are brittle and riddled with single points of failure: it's that these failure-points can be tripped deliberately, and that doing so could be in a company's best interests, no matter how devastating it would be to you or me.
If you'd like an e ssay-formatted version of this post to read or share, here's a link to it on pluralistic.net, my surveillance-free, ad-free, tracker-free blog:
https://pluralistic.net/2024/07/22/degoogled/#kafka-as-a-service
Image: Cryteria (modified) https://commons.wikimedia.org/wiki/File:HAL9000.svg
CC BY 3.0 https://creativecommons.org/licenses/by/3.0/deed.en
521 notes
·
View notes
Text
hey girl are you in violation of Title 29 Code of Federal Regulations Part 1910.147, because i'd hot tap that ass, and the exception listed in 1910.147(a)(2)(iii)(A), uh... actually, wait, shit is that even the right one? [flipping through a gigantic book] uh... shit where is it... shit. fuck. okay no it was 1910.147(a)(2)(iii)(B). uhhh. anyway I'd hot tap that ass... without...... proper lockout/tagout procedures... and your ass does not qualify as [tracing my finger along the page as I read] a transmission or distribution system for substances such as gas, steam, water or petroleum products where, uhhh, where the employer has—wow okay this is a lot more than i remembered—where the employer has... demonstrated that continuity of service is essential, shutdown of the system is impractical, and documented procedures are followed, and special equipment is used which will provide proven effective protection for employees. yeah. oh, 1910.147(a)(2)(iii)(A) is an exception too of course, but that one doesn't reference hot tapping so it doesn't work as a double entendre. but that one doesn't apply to your ass either, just trust me. oh, nor does the other set of exceptions in 1910.147(a)(1)(ii). so. um. uhh. I forget where I was going with this. sorry to bother you.
929 notes
·
View notes
Note
Here's another article about the current contraction within Hollywood, this time focusing on the crew members. My question is, what will it take for Hollywood to break out of the current contraction, if it does, or is this the new normal?
.
Link. There will be a new normal, this is probably the 3rd new normal in my lifetime. Due to the boom era that culminated during the streaming decade, peaking in 2015, a lot of people moved to L.A and got into the industry. Now it's the bust era and there's a surplus of crew and a shortage of projects. A lot of people are going to get weeded out. Only some will be able to stay in the industry, others who aren't working will find other work while they bide their time, move to another city with more projects (and not enough crew), or leave the industry altogether. Eventually we'll be back at something closer to equilibrium, but with lot less crew members in the industry in LA. That goes the same for actors, writers, and producers.
Back in 19'70s, legacy studios were going belly up because people moved out to the suburbs and stayed home to watch TV instead of going out to see movies. Same problem today, covid lockout taught people to wait for movies to leave the theater and show up on their streaming services 80 days later. During the '70s, independent films took off, including something called Star Wars. Soon blockbusters were in and small quirky arty films were out and the "Hollywood Renaissance" era began. In contrast the Japanese own film industry never won their battle against tv.
The current tv landscape also reminds me of the 1990s when network TV struggling to regain an audience in the age of cable, the VCR/DVD, and satellite TV. Then they discover The Bundle. The cable-tv bundle was very lucrative because companies were paid twice: first by cable distributors, which shelled out billions every year to have channels like ESPN available for their subscribers, and then by advertisers, which opened their wallets to promote products alongside the hottest shows. Now that era is gone due to cord cutting so they're figuring out a new bundling scheme with streaming services.
But the current problem today is also started back in the 1990s when tech nerds started to take over Hollywood, they didn't understand show business and why tv and film budgets exploded since the 90s. That problem came home to roost in the 2020s, resulting in slashing production budgets by 60%.
Excerpt from the article:
Even the shows and films shooting in L.A. now have slashed many departments, he added, noting sets that historically employed 20 hairstylists now have just two or three.
Orion said “9-1-1” was a “very hard show,” noting that crew member Rico Priem recently died in a car accident after pulling a 14-hour overnight shift. “We were all tired, it was a very terrible thing,” Orion said after noting that hours on sets are generally “brutal and relentless."
Outside of the U.S., several countries, including the United Kingdom, New Zealand and Australia, are offering cushy tax incentives for studios, where they can bypass unions and pay crews lower wages than in the States.
9 notes
·
View notes
Text
Crystal Plus Towing Corp.
There is nothing more important to us than the satisfaction of our customers. We will do whatever it takes so that they can have a perfect experience with their car repairs, no matter how difficult or simple the task may be!
Our Services
Car Towing Light Duty Towing Medium Duty Towing Heavy Duty Towing Tire Change Jump Start Car Lockout Roadside Assistance
Contact Us
(872) 282-9568 1535 W 18th St, Chicago, IL 60608 crystalplustowingcorp.com [email protected] Monday to Sunday 24hrs open
2 notes
·
View notes
Text
Mazda Key Replacement
Mazda Key Replacement
(210) 528-1730
Mazda Key Replacement San Antonio, TX
It is always surprising and frustrating when your car keys break down, or the chip keys suddenly stop working! However, when this happens, you must call Mazda Key Replacement San Antonio, TX, and they will give you the aid you need on the spot and at affordable prices. Call our San Antonio, TX experts today!
Cheap Mazda Key Replacement
Nowadays, car key replacement has become very common in San Antonio, TX, as most cars have keyless access than those that come with traditional locks. However, this modern technology works with a battery, which means that sooner or later it will give you problems while opening & turning on your Mazda car daily. Luckily, Mazda Key Replacement San Antonio, TX techs are aware of this & are always ready to bring your car back on the road. You can count on our experts if you need to replace your current car key or have a broken key. They can give you the service that you need on the spot 24/7, and at cheap costs.
Mobile Mazda Car Key Techs
Losing your Mazda car keys or suddenly being stopped is an issue that requires professionalism. You can go to a trustworthy locksmith service like Mazda Key Replacement in San Antonio, TX because they will get you out of any trouble with your car key programming & car key cutting at reasonable prices; contact us today. To make a duplicate key for your lost car key, there is no need to deal with the nearest dealership as long as you have our experts. Regardless of your car make, or model, our San Antonio, TX experts got all your needs. When you need someone to come & make you a new car key at a reasonable price, all you should do is give our mobile techs a call!
24Hrs. Emergency Mazda Locksmiths
Are you locked out of your car in the middle of the night in San Antonio, TX ? Do not worry; as long as you have Mazda Key Replacement San Antonio, TX contact, all your car locksmith needs will be fulfilled. Being the leaders of automotive locksmiths in the region enables us to deal with a car key stuck in the ignition, lost car keys & many more. So, when you need a new car key to your car, an ignition key to be made, or lost your fob key and need a new one, call our 24 hrs experts. They are available around the clock, 24/7, for any emergency Mazda car key needs. One phone call will bring you one of the most experienced locksmiths at your service for safe car opening.
7010 W Loop 1604 N, San Antonio, tx,78254
our services:
locksmiths, emergency locksmith, locks rekey, key replacement.
change locks, car keys, car lockout, transponder keys.
ignition keys, home lockout
payment methods:
American Express
Cash
Discover
Mastercard
Visa
working hours:
Sun - Sat: 8:00 AM - 11:00 PM
2 notes
·
View notes
Text
Car Locksmith Fresno CA
Car Locksmith Fresno CA
Car Locksmith Fresno CA is here to help you with your locks, keys, transponders, lockouts, and more. If you’re trying to find our pro locksmithing members for an available appointment time,. We’ve got a ton of openings that we’ll surely make use of. Wit our guys around, you’ll be just fine.call us on 559-521-6245. -------------- Discount :- 30% off 2nd ignition key $20 off rekeying services $15 off change locks 50% off for second key -------------- Working Hours : - Mon-Fri : 8:00 AM 8:00 PM Sat-Sun : 9:00 AM 5:00 PM --------------- Payment :- American Express Cash Discover Mastercard Visa ----------------- Address :- 5209 N Fresno St Fresno, CA 93710 USA -------------- call us now :559-521-6245
26 notes
·
View notes
Text
Locksmith Sacramento CA
Whatever your lack of access to your front door, you can rely on specialist locksmiths to open all types of homes, offices, and vehicles to resolve this emergency. Our locksmith can open your lock whether you lost keys or they are broken in the lock or more. call Locksmith Sacramento CA on (916) 905-2094. --- Discount:- %50 off second key $30 off change locks $ 20 off re-key service 30% off 2nd key ignition --- Working Hours : - All Days: From 5:00 AM To 12:00 PM --- Payment:- American Express Cash Discover Mastercard Visa ----- Address 1400 4th St, Sacramento, CA
#Residential Locksmith Service#Automotive Locksmith Service#Commercial Locksmith Service.#Home Lock Rekey-#Door Bell Installation-
3 notes
·
View notes
Text
Locksmith Prices Houston TX
Most all-inclusive locksmiths try to charge you a lot of money for services that you may not even need. Locksmith prices Houston TX provides a full array of locksmith services but we will only charge you for the services that you need and nothing more. If you need car locksmith prices, we will ask you exactly what service as a car locksmith you will be needing from us. If you are need of a commercial locksmith we will come out to your business and asses which service would be best for you. We are more than a car key cutting company. We are a full service locksmith for home, business, and cars. Locksmith prices Houston TX gives you the most value for your money.
Our Services : Home Locked Out Ignition Car Key Cheap Locksmith Car Key Replacement Car Locksmith Prices Install New Locks Office Key Repair Car Lockout Make New Keys
(281) 653-6851 12168 Bellaire Blvd, Houston, TX, 77072 Sun - Sat : 8:00 AM - 11:00 PM
#Home Locked Out#Ignition Car Key#Cheap Locksmith#Car Key Replacement#Car Locksmith Prices#Install New Locks#Office Key Repair#Car Lockout#Make New Keys
2 notes
·
View notes
Text
Opening the Keys of Locksmiths: Whatever You Required to Know
""
Locksmith professionals are the unhonored heroes of the security globe, supplying essential services to both residential and business clients. From emergency situation lockouts to key replication and lock repair work, locksmith professionals play a vital role in maintaining our homes and businesses safe and safe. With their expertise in a variety of securing systems and protection systems, locksmiths are able to promptly and efficiently fix any kind of lock-related issue that comes their way, making them an important source for any person looking for specialist locksmith services.Whether you locate on your own shut out of your home in the center of the evening or require to update your company's safety system, locksmith professionals are there to assist. With their specialized training and devices, locksmiths have the ability to take on even one of the most intricate locking systems with ease, ensuring that your residential or commercial property remains protected in any way times. So the next time you discover yourself looking for a reputable locksmith, do not think twice to get to out to these knowledgeable specialists that are committed to supplying superior service and assurance to their customers.
Read more here https://securitysafecompany.tumblr.com/
2 notes
·
View notes
Text
Locksmith Fresno CA
Have you ever closed your car's doors without thinking and ended up leaving your keys inside the car, missing an important appointment? Has this ever happened to you while you are not at home but rather out and about? This is more frequent than you might realize, and if you don't take action right away, you can find yourself needing an Uber to get home or to your earlier appointment. Car key locksmiths in Fresno, CA, however, can come to your rescue with their mobile lockout services. call Locksmith Fresno CA on (559) 418-0965..
Discount:-
$15 off Re-Key Services $20 off New Locks 30% off Auto Keys Discount of 2nd key
Working Hours : -
Mon-Fri: 8:00 AM 8:00 PM Sat-Sun: 9:00 AM 5:00 PM
#locksmith#keys#Automotive Locksmith#Access control systems#Intercom system installation#Car lockout / opening#Residential Locksmith#Lock change#Extraction of broken keys#Lock repair#Commercial Locksmith#Panic Bars Installed.
35 notes
·
View notes
Text
For a reliable towing and roadside assistance partner, choose Metro Fleet Towing Co. We value your journey and are committed to making it less stressful, more dependable, and safer.
Our Services
Car Towing Light Duty Towing Medium Duty Towing Heavy Duty Towing Tire Change Jump Start Car Lockout Roadside Assistance
Contact Us
(225) 208-7338 57905 Main St, Plaquemine, LA 70764 metrofleettowingco.com [email protected] Monday to Sunday 9AM - 11PM
2 notes
·
View notes