#system decommissioning
Explore tagged Tumblr posts
Text
Future-Proofing Your IT Infrastructure Post-System Decommissioning
In the ever-evolving world of technology, future-proofing your IT infrastructure after system decommissioning is critical for maintaining operational efficiency and staying ahead of the competition. As organizations retire legacy systems, they face the challenge of ensuring that their new infrastructure can adapt to future technological advancements and business needs. This blog explores strategies to future-proof your IT infrastructure post-system decommissioning, ensuring long-term sustainability and success.
Understanding the Importance of Future-Proofing
Future-proofing refers to the process of planning and implementing IT solutions that remain effective and relevant as technology and business environments evolve. It involves anticipating future trends, challenges, and opportunities, and designing systems that can adapt and scale accordingly. For businesses, future-proofing is essential for:
Reducing Long-Term Costs
Investing in adaptable and scalable solutions minimizes the need for frequent overhauls and replacements.
Enhancing Agility
 A future-proof infrastructure enables quick responses to market changes and emerging technologies.
Strategies for Future-Proofing IT Infrastructure
Embrace Cloud Computing
Scale Resources Efficiently
 Easily adjust resources to meet changing demands without significant investments in physical hardware.
Access Cutting-Edge Technology
 Benefit from continuous updates and innovations provided by cloud service providers.
Implement Modular and Scalable Solutions
Interoperability
 Ensure that new components and systems can integrate seamlessly with existing infrastructure.
Standardization
Adopt industry standards to facilitate compatibility and ease of integration with future technologies.
Leverage Artificial Intelligence and Machine Learning
Automate Routine Tasks
 Reduce manual intervention and increase efficiency through automation.
Enhance Predictive Maintenance
Utilize predictive analytics to foresee and address potential issues before they cause disruptions.
Focus on Cybersecurity
Implement Multi-Layered Security
 Deploy multiple security measures, including firewalls, encryption, and intrusion detection systems.
Regularly Update and Patch Systems
Keep all software and systems up-to-date with the latest security patches and updates.
Invest in Employee Training and Development
Continuous Learning
 Provide opportunities for employees to learn about emerging technologies and best practices.
Cross-Training
 Encourage cross-training to build a versatile team capable of managing various aspects of IT infrastructure.
Conclusion
Future-proofing your IT infrastructure post-system decommissioning is a strategic imperative for businesses aiming to thrive in a dynamic technological landscape. By embracing cloud computing, implementing modular solutions, leveraging AI and ML, focusing on cybersecurity, investing in employee training, and adopting a DevOps culture, organizations can ensure their IT infrastructure remains robust, adaptable, and competitive. These strategies not only enhance operational efficiency but also position businesses to seize future opportunities and navigate challenges with confidence.
0 notes
Text
Legacy Systems Inventory Management: Streamlining Data Organization for Efficiency
Introduction
In the realm of archive management, one of the most crucial tasks is effectively managing the inventory of legacy systems data. With the accumulation of historical data over years or even decades, organizations often find themselves grappling with the challenge of cataloging and organizing vast amounts of information stored within legacy systems. "Legacy Systems Inventory Management" represents a strategic approach to streamline data organization, ensuring efficiency, accessibility, and compliance in archive management.
The Challenge of Legacy Data Overload
Legacy systems often contain a plethora of data accumulated over the course of their operation. This data may include historical transaction records, customer information, financial data, and more. However, without proper inventory management strategies in place, organizations risk drowning in a sea of unorganized and unstructured data. The challenge lies in cataloging and organizing this data in a way that facilitates easy retrieval, analysis, and compliance with regulatory requirements.
Adopting a Systematic Approach to Inventory Management
To effectively manage the inventory of legacy systems data, organizations must adopt a systematic approach that encompasses both technology and processes. This begins with conducting a comprehensive inventory audit to identify all legacy systems and the data they contain. Once the inventory is established, organizations can then implement robust cataloging and tagging mechanisms to categorize and organize data based on relevance, sensitivity, and other criteria. This systematic approach not only enhances data organization but also facilitates efficient retrieval and compliance with regulatory requirements.
Leveraging Automation and Technology Solutions
In the digital age, organizations have access to a wide range of automation and technology solutions that can streamline inventory management processes. Automated inventory management tools can scan legacy systems, identify data assets, and generate detailed inventory reports automatically. Additionally, organizations can leverage metadata management solutions to enrich data with descriptive tags and attributes, making it easier to search, filter, and retrieve information. By harnessing the power of automation and technology, organizations can significantly reduce the manual effort required for inventory management while improving accuracy and efficiency.
Implementing Governance and Compliance Measures
Effective inventory management goes hand in hand with governance and compliance measures to ensure the integrity, security, and privacy of legacy systems data. Organizations must establish policies and procedures for data access, storage, retention, and disposal, aligning with regulatory requirements and industry best practices. Additionally, regular audits and reviews of inventory data are essential to identify any discrepancies or vulnerabilities and address them promptly. By implementing robust governance and compliance measures, organizations can mitigate risks and ensure the integrity and security of their legacy systems inventory.
Conclusion: Optimizing Efficiency and Compliance in Archive Management
In conclusion, legacy systems inventory management is a critical component of archive management, ensuring efficiency, accessibility, and compliance with regulatory requirements. By adopting a systematic approach, leveraging automation and technology solutions, and implementing governance and compliance measures, organizations can streamline data organization processes, enhance data integrity and security, and unlock the full potential of their legacy systems data. In doing so, they pave the way for more efficient and effective archive management practices, enabling them to derive maximum value from their historical data assets.
#carve-out#it application decommissioning#mergers and acquisitions#system decommissioning#sap system#insolvency#legacy system#liquidation
0 notes
Text
SAP system decommissioning refers to the process of retiring or retiring SAP systems that are no longer needed or relevant for an organizationâs operations. It involves systematically removing and shutting down SAP landscapes, including servers, databases, and associated applications, in a controlled and planned manner.
Here are the top five areas that must not be overlooked during a SAP system decommissioning. These areas form the basis for being able to prove the completeness of archiving at the end. Cluster tables, GOS documents, and ADK files, in particular, are always a challenge.
Please click Below link to read more: https://avendata.com/blog/top-5-data-areas-during-a-sap-system-decommissioning
0 notes
Text
Systemstilllegung â So archivieren wir IT-Altsysteme
In der Welt der Informationstechnologie sind Altsysteme ein hĂ€ufiges Problem. Sie stellen ein Risiko fĂŒr Unternehmen dar, da sie veraltet sind und potenziell unzureichende Sicherheitsfunktionen bieten. Aus diesem Grund mĂŒssen IT-Altsysteme systematisch stillgelegt und archiviert werden, um die Sicherheit und Effizienz des IT-Betriebs zu gewĂ€hrleisten.
Die IT-Systemstilllegung ist ein wichtiger Prozess, der nicht nur die physische Stilllegung der Hardware umfasst, sondern auch die Entfernung aller Daten aus dem System und deren sichere Archivierung. Eine ordnungsgemĂ€Ăe Stilllegung ist entscheidend, um die IntegritĂ€t der Daten und die Einhaltung von Vorschriften wie der DSGVO zu gewĂ€hrleisten.
Bei der Stilllegung von Altsystemen sollten Unternehmen sicherstellen, dass sie die richtigen Schritte unternehmen. Eine grĂŒndliche Planung und DurchfĂŒhrung der Stilllegung ist unerlĂ€sslich, um mögliche Störungen im IT-Betrieb zu minimieren. Die Stilllegung sollte in Zusammenarbeit mit IT-Spezialisten und der GeschĂ€ftsleitung erfolgen, um sicherzustellen, dass alle Anforderungen erfĂŒllt sind.
Es ist auch wichtig, dass alle Daten aus den Altsystemen sicher archiviert werden. Unternehmen mĂŒssen sicherstellen, dass alle Daten gemÀà den geltenden Vorschriften und Best Practices archiviert werden. Daten können auf verschiedenen Arten archiviert werden, darunter die Ăbertragung auf ein neues System oder die Speicherung auf externen Festplatten oder in der Cloud.
Ein weiterer wichtiger Aspekt bei der Stilllegung von Altsystemen ist die Schulung von Mitarbeitern. Mitarbeiter mĂŒssen ĂŒber die Stilllegung informiert werden und ĂŒber alternative Systeme, auf die sie zugreifen können. Es ist wichtig sicherzustellen, dass alle Mitarbeiter ĂŒber die Stilllegung informiert werden, um mögliche AusfĂ€lle zu vermeiden.
Insgesamt ist die Stilllegung von Altsystemen ein wichtiger Prozess, der sorgfĂ€ltig geplant und durchgefĂŒhrt werden muss. Unternehmen mĂŒssen sicherstellen, dass sie die richtigen Schritte unternehmen, um DatenintegritĂ€t und Sicherheit zu gewĂ€hrleisten. Durch eine ordnungsgemĂ€Ăe Stilllegung und Archivierung können Unternehmen potenzielle Risiken minimieren und ihre IT-Systeme effektiv verwalten.
0 notes
Video
youtube
Enterprise Legacy System Application (ELSA) by TJC Group
ELSA is an SAP BTP-certified cloud platform available with special features to make Your day-to-day business transactions as simple as possible. It allows users to access information from any legacy application, or from SAP S/4 HANA or other current ERP systems.TJC Group supports organizations to overcome complex challenges and save their time and efforts with SAP Data management, Enterprise legacy System application (ELSA), GDPR, and SAP data extraction for tax, audit, and SAF-T requirements.ELSA offers a very straightforward interface - easy to use, even for users who are unfamiliar with SAP GUI transactions.
1 note
·
View note
Text
english jinriki utau is coming along!! hes based on a tts so he sounds kinda harsh and choppy (so im tuning him more robotically than i usually do). im actually enjoying working on his design. which is rare! so theres a wip of that too. his name is J, hes a decommissioned aquarium tour android. and hes just a little guy. he likes going to the beach and pointing out all the animal species he can find. hes not supposed to be able to sing And his vocal system is damaged, but he hangs out with androids who can sing and hes enamored with music so he tries his best
#spooksposting#oc#my art#vocal synth#utau#J#video#its almost 6 am......... i fucked up bigtime#u know i had to use a mili song....... i rly need to play library of ruina actually its so intimidating though đđđ#i love this dude#most of his memory got corrupted so he really only knows what his model was intended for but based on bits and pieces#there was a long time between his decommissioning and abt a decade before the present where he was cared for by someone#and there were definitely alterations made to some of his systems but hes unsure what#he has his own kind of grief abt not being able to remember any of that bc he knows he was happy. whatever that means for him#i dont think even he knows#but hes chillin bc hes still alive after all this time#sorry i got back into vocal synth stuff recently and immediately started worldbuilding and shit w my utaus#and ofc they ended up way more personal than most of my ocs bc they all involve my own voice or directly interacting w characters who do đ« #theyre all androids or computer programs so far in-universe and im like ah! perfect for dissecting all my brain processes#oooh i get chatty when im tired#anyawy my head hurts goot bye#spooks vsynth
11 notes
·
View notes
Text
Tehe *turns the thing people hate about Monty into sweet, sweet angst*
(Read the tags for context)
#so theres this pretty popular theory with sb where Monty decommissioned Bonnie just so he could take his place in the band#right? well I got smth even better for u#Basically Vanny hacks into Bonnie's system and forces Bonnie to go after Monty in order to turn him into Vanny's servant also#Monty wouldn't survive without killing Bonnie. He HAD to do it for self defense#to end his friends suffering and to keep the virus from spreading (ofc that doesn't work but he doesn't know that). Monty feels real REAL#bad for doing this to his friend and feels even WORSE when he realizes he'll have to replace Bonnie. Sure he's always wanted to be in the#main band but he wanted to be a DRUMMER#anyway thatâs all#fnaf security breach#montgomery gator#fnaf#five night's at freddy's#fnaf sb#glamrock bonnie#bonnie#monty#ALSO I wanna imagine that before the Bonnie Accident Monty was like a really cool and chill guy but he developed his anger problems after#as like a trauma response or getting violent with inanimate objects as a coping mechanism#security breach
15 notes
·
View notes
Text
Leading the Way in Solar Panel Recycling Innovation
Discover sustainable solutions with top solar panel recycling companies. These pioneers are shaping a greener future by specializing in reclaiming valuable materials, reducing waste, and promoting eco-friendly practices. From end-of-life panel management to advanced recycling technologies, they ensure your solar investments remain environmentally responsible.
#Solar Panel Recycling#Solar Panel Disposal#Solar Module Recycling#Solar Panel Recycling near me#Solar Panel Recycling companies#ESG report#environmental social and governance report#Commercial Solar Site#Solar Recycling#ESG report consulting#We recyle solar#Recycle solar panel near me#ESG Reporting Companies#ESG sustainbility report#end of life solar panels#Decommission#Decommissioning Solar Panels#Decommission Solar Systems#Solar Panel Decommissioning#Decommissioning Solar Power Plants#Solar Farm Decommissioning#Utility Scale Solar Projects#Utility Scale Projects#Solar waste management companies#Solar Waste Management Consulting Services#Solar Panel Disposal near me#Solar Panel Removal near me#Waste from solar panels#Solar Panel Removal & reinstall near me#Solar panel waste
0 notes
Link
The article by Peter Suciu on "The Armory Life" discusses the USS Long Beach (CGN-9), America's first nuclear-powered cruiser, highlighting its significance in naval history and its challenges. The USS Long Beach, built by Bethlehem Steel and commissioned in 1961, was notable for being the first all-missile ship and having a nuclear power plant. It played significant roles in operations like Operation Sea Orbit and the Vietnam War. Despite its advanced design, its retirement and dismantling highlight the substantial costs and issues associated with nuclear-powered vessels. The article underscores the legacy of the USS Long Beach and its impact on subsequent naval strategies, ending the experiment with nuclear-powered surface combatants and reserving nuclear power for submarines and aircraft carriers in modern navies.
#USS Long Beach#nuclear cruiser#U.S. Navy#Cold War#missile systems#nuclear propulsion#guided-missile cruiser#Long Beach Naval Shipyard#operational history#technological innovations#naval warfare#radar systems#Talos missiles#Terrier missiles#Tartar missiles#combat operations#Mediterranean Sea#Vietnam War#Operation Sea Dragon#aircraft carrier support#decommissioning.
0 notes
Text
Developing a Comprehensive System Decommissioning Plan
In the ever-evolving landscape of technology, organizations constantly seek ways to streamline operations and optimize their IT infrastructure. One critical aspect of this optimization is system decommissioning. Successfully decommissioning a legacy system requires a well-thought-out, comprehensive plan that addresses all aspects of the process. This article delves into the essential components of developing a robust system decommissioning plan to ensure a smooth transition and minimize operational disruptions.
Understanding the Need for System Decommissioning
Before diving into the planning process, itâs crucial to understand why system decommissioning is necessary. Legacy systems can become outdated, inefficient, and costly to maintain. They may pose security risks and hinder the adoption of new technologies. Decommissioning these systems can lead to cost savings, improved security, and enhanced operational efficiency. Recognizing these benefits underscores the importance of a strategic approach to decommissioning.
Key Components of a Comprehensive Decommissioning Plan
Assessment and Inventory
The first step in developing a decommissioning plan is to conduct a thorough assessment and inventory of the legacy systems. This involves identifying all systems targeted for decommissioning, understanding their functions, dependencies, and the data they hold. An accurate inventory ensures no critical components are overlooked and provides a clear picture of the scope of the decommissioning project.
Stakeholder Engagement
Engaging stakeholders from the outset is crucial for the success of the decommissioning plan. Stakeholders include IT staff, business unit leaders, and end-users who rely on the legacy systems. Their input helps identify potential risks, requirements, and impacts on business operations. Regular communication ensures alignment and support throughout the decommissioning process.
Risk Assessment and Mitigation
A comprehensive risk assessment identifies potential challenges and issues that may arise during the decommissioning process. Common risks include data loss, downtime, and disruption to business operations. Developing a mitigation strategy for each identified risk ensures the organization is prepared to handle any issues that arise, minimizing their impact.
Data Migration and Archiving
Data migration is a critical component of system decommissioning. The plan should outline the process for securely migrating data from the legacy system to a new system or archive. Itâs essential to ensure data integrity and compliance with regulatory requirements. Archiving important data for future reference while securely disposing of unnecessary data helps maintain an organized and compliant data environment.
Timeline and Milestones
Establishing a clear timeline with defined milestones helps keep the decommissioning project on track. The timeline should include key activities such as data migration, system testing, and final shutdown. Setting realistic deadlines for each milestone ensures the project progresses smoothly and helps manage expectations.
Testing and Validation
Before fully decommissioning a system, thorough testing and validation are essential. This involves ensuring that data has been accurately migrated, new systems are functioning correctly, and no critical dependencies have been overlooked. Testing provides an opportunity to identify and address any issues before the final shutdown.
Communication Plan
Effective communication is vital throughout the decommissioning process. The communication plan should outline how updates, progress, and any issues will be communicated to stakeholders. Keeping everyone informed helps manage expectations and ensures that all parties are prepared for the changes.
Final Decommissioning and Disposal
The final stage involves the actual decommissioning and disposal of the legacy system. This includes shutting down the system, securely disposing of hardware, and ensuring that all data has been migrated or archived. Proper disposal of hardware and data is critical for maintaining security and compliance.
Conclusion
Developing a comprehensive system decommissioning plan is essential for ensuring a smooth transition from legacy systems to modern IT infrastructure. By following these key componentsâassessment and inventory, stakeholder engagement, risk assessment, data migration, timeline and milestones, testing and validation, communication, and final decommissioningâorganizations can effectively manage the complexities of system decommissioning.
A well-executed decommissioning plan not only minimizes disruptions but also maximizes the benefits of transitioning away from outdated technology. Embracing a strategic approach to decommissioning allows organizations to optimize their IT environment, enhance security, and pave the way for future technological advancements.
0 notes
Text
Legacy Systems Migration: Strategies for Seamless Transition to Modern Platforms
Introduction
In the ever-evolving landscape of technology, legacy systems migration represents a critical juncture for organizations seeking to modernize their IT infrastructure and stay competitive in today's digital marketplace. However, the transition from legacy systems to modern platforms is not without its challenges. In this article, we explore strategies for achieving a seamless and successful migration, ensuring that organizations can leverage the benefits of modern technology while preserving the value of their legacy systems.
Assessing the Landscape: Understanding the Scope and Complexity
The first step in any legacy systems migration project is to assess the landscape and understand the scope and complexity of the undertaking. This involves conducting a comprehensive inventory of existing systems, applications, and data, as well as identifying dependencies, interdependencies, and potential roadblocks. By gaining a clear understanding of the current state of the IT environment, organizations can develop a roadmap for migration that addresses key challenges and priorities.
Developing a Migration Strategy: Prioritizing Objectives and Milestones
Once the landscape has been assessed, the next step is to develop a migration strategy that prioritizes objectives and milestones. This involves defining clear goals for the migration, such as improving performance, enhancing security, reducing costs, or enabling new capabilities. Additionally, organizations should establish measurable milestones and timelines to track progress and ensure alignment with business objectives. By developing a strategic approach to migration, organizations can minimize risks and disruptions while maximizing the benefits of modern platforms.
Choosing the Right Tools and Technologies: Leveraging Automation and Integration
In the age of digital transformation, organizations have access to a wide range of tools and technologies that can facilitate the migration process. From automated migration tools to integration platforms and cloud services, these technologies offer efficient and cost-effective ways to migrate legacy systems to modern platforms. By leveraging automation and integration, organizations can streamline the migration process, reduce manual effort, and mitigate the risk of errors or inconsistencies.
Ensuring Data Integrity and Security: Safeguarding Valuable Assets
Throughout the migration process, ensuring data integrity and security is paramount. This involves implementing robust data validation and verification procedures to ensure that data is transferred accurately and securely from legacy systems to modern platforms. Additionally, organizations should implement stringent security measures to protect sensitive information and mitigate the risk of data breaches or cyber attacks. By prioritizing data integrity and security, organizations can safeguard their valuable assets and maintain trust and confidence among stakeholders.
Conclusion: Embracing the Future with Confidence
In conclusion, legacy systems migration represents a transformative journey for organizations seeking to modernize their IT infrastructure and embrace the benefits of modern technology. By assessing the landscape, developing a strategic migration strategy, choosing the right tools and technologies, and ensuring data integrity and security, organizations can achieve a seamless transition to modern platforms. In doing so, they position themselves for continued success and innovation in today's dynamic digital landscape.
#carve-out#it application decommissioning#mergers and acquisitions#sap system#system decommissioning#insolvency#legacy system#liquidation
0 notes
Text
Navigating the Legacy Systems Sunset: Best Practices for Decommissioning
0 notes
Text
You know, I'm never letting those fucking cops who parked their car with a lady in it on the train tracks and it got hit by a train live that down (thankfully she lived)
Anytime I see train tracks I tell whoever's with me that they need to pull over to the perfect parking spot, that they need to think like a cop
I will never stop making fun of them for it, not even because it's funny, but because fuck them, they were so stupid they nearly killed someone and it's only good fortune that saved her from them. I legitimately don't know how they manage to remember to breath while being that stupid
#like the rails they parked her on go right along the highway I usually take anytime I need to go anywhere#those are not abandoned rails; there's a train pretty much every time I go along it; at least one#I legit wouldn't be surprised if it's one of the most heavily trafficked lines in the state#they 100% knew that trains went along there if they were with that town; cause the tracks cut through it#it is impossible for them not to understand that; and I don't understand how any adult can not understand train tracks = danger#I get a few people don't get that... but maybe a cop shouldn't be one of them (I get the standards are low)#unless it says the track is decommissioned (however it's phrased; I forget); you never ever ever ever stop on it; always before or behind i#so the cops should have known it was active and they should have known... not to park on a fucking train track#so... so I can't tell if they're so stupid they literally need medical care because they're non fucking functional with their stupid#or if they were setting up the most elaborate murder attempt against a random lady#cause I don't see how it's any other option and neither of those makes much sense#...what do you bet they got qualified immunity#'nowhere does it explicitly say cops can leave you on train tracks and fail to even try to save you'#they should either be in a institutional setting because they legit are stupid to a degree that impairs their ability to function#or they should be in jail because that's still true about them; but they also attempted murder in a real stupid way#fucking hate cops honestly; zero respect for most of them#and the good ones get driven out; whole system needs to be pulled up by the roots
1 note
·
View note
Text
Relentless direct action has secured another victory in the fight against Israelâs arms trade, as Elbit Systems are forced to sell their âElite KLâ factory in Tamworth.
The company had previously manufactured cooling and power management systems for military vehicles, but was sold on after stating that it faced falling profits and increased security costs resulting from Palestine Actionâs efforts.Â
After the sale was completed last month, Elite KLâs new owners, listed as Griffin Newco Ltd, confirmed in an email to Palestine Action that they will have nothing to do with the previous owners, Elbit, and have discontinued any arms manufacturing:
âFollowing the recent acquisition of Elite KL Limited by a UK investment syndicate, the newly appointed board has unanimously agreed to withdraw from all future defence contracts and terminate its association with its former parent companyâ.
This victory is a direct result of sustained direct action which has sought, throughout Palestine Actionâs existence, to make it impossible for Elbit to afford to operate in Britain. Before they sold the enterprise to a private equity syndicate, Elbit had reported that Elite KL operating profits had been slashed by over three-quarters, with Palestine Action responsible: Elbit directly cited the increased expenditure on security theyâd been forced to make, and higher supply chain costs they faced.
And these actions did, indeed, cost them. The first action at the site, in November 2020, saw Elite KLâs premises smashed into, the building covered in blood-red paint. Between March and July 2021, the site was put out of action three times by roof-top occupations â drenched red in March 2021, with the factoryâs camera systems dismantled, before again being occupied in in May. Another roof-top occupation in July, despite increased security, saw the site forced closed â once again painted blood-red, and with its windows and fixings smashed through.
In February 2022, activists decommissioned the site for weeks â closed off after an occupation that saw over ÂŁ250,000 of damages caused, the roof tiles removed one-by-one. After this, Elbit erected a security perimeter around the site â but to no avail. One month later, six were arrested after Palestine Action returned to Tamworth â again taking the roof and smashing through, preventing the production of parts for Israelâs military machine.
Elite KL is a âspecialist thermal management businessâ. Since the sale, the company focuses on cooling systems for buses and trains, but it had, under Elbit, manufactured these systems for military vehicles. Until December of last year, Elite KLâs website was advertising its military and defence products, and it was known to provide parts for Israelâs deadly Merkava tanks, with export license records demonstrating its provision of âML6aâ components for military ground vehicles to Israel. The company was also known to manufacture crew cooling systems, for the military vests of tank operators.
Elbit Systems itself provides 85% of the drones and land-based military equipment for the Israeli military, along with a wide range of the munitions and armaments currently being used against Gazaâs beseiged population. Its CEO, Bazhalel Machlis, has claimed that the Israeli military has offered the company its thanks for their âcrucialâ services during the ongoing genocide in Gaza
A Palestine Action spokesperson has stated:
âEach activist who occupied and dismantled Tamworthâs Israeli weapons factory did so in order to bring an end to Israelâs weapons trade, and to end the profiteering from Palestinian repression. Every defeat Elbit faces is a victory for the Palestinian people.
Kicking Elbit out of Tamworth shows once again that direct action is a necessary tactic. It is one which must be utilised and amplified in the face of the Gaza genocide.â
3K notes
·
View notes
Text
Adults nâ babies.
Info below.
Villagers (and all Testificates)
- Children have tufts of hair, and bald during puberty.
- The darker pigment in their proboscis occurs during puberty. They also grow into their noses.
- Kids are kind of scrunkly and wrinkly, like Sphinx cat kittens. Theyâre also very small, and have huge growth spurts once they hit their teenage years.
- Adult villagers are incredibly tall, and lack much visible hair aside from fine body hair, light facial hair (like stubble) and eyebrows, which are bristly and whisker-like. Another noticeable feature is their short philtrum and near lack of a visible upper lip. Their noses are as sensitive as human lips, and are typically used in the same way for affection and gesture. Villager proboscis can scrunch, wrinkle and twitch, moving to follow scents like the noses of elephant shrews.
- Villagers have much keener senses of smell than humans, and can produce a wider range of sounds.
Piglin
- Much like villagers, piglets start fuzzy and bald into wrinkly adult piglin.
- Piglets learn to vocally emote first, then sign phrases later on. Piglin use vocalisations as emotional context cues for the more complex sentences they sign.
- Piglin sows have litters of up to six piglets. Most of these piglets will die, particularly if itâs a nomadic horde, so they only receive proper names at one and a half nether years, or when they begin to grow out of their camouflage stripes.
- Piglets are born with stripes and an earthier pigment to help them hide from Infernal predators.
Endermen
- Endermen give birth through their mouth. They do breed asexually, though some Endermen do recreationally partake in what is possibly intercourse. Itâs hard for Enderologists to tell.
- The offspring spends ten years inside of a nutrient sac before emerging as an Ender-child. The Ender-child will slowly develop features like limbs and a complex digestive system, though it begins with only a torso, a brain and a pair of eyes. These eyes are non-functional as psionic communicators, which is their secondary purpose in adults.
- They excrete an oily substance that repels Endermites and keeps them moisturized enough to move. As the larvae matures, it will develop the velvety exoskeleton of an adult Enderman. It will also begin to omit psionic frequencies, though these begin as nonsensical bursts of information.
- They mature at 100 years old. Most of this 100 years is spend engorging on chorus fruit, stem and endstone mineral salts. They have no emotional connection to their parent, as eventually they will develop enough to join the Chorus and become one conscious Being. Alternatively, they can worship a void God and become an Endersent.
Players
- Players were primarily constructed by Rana of the Elphar Senate of Builders, or artificers under her command. Most players were raised either in the Garden, an enclosed sterilized âmeadowâ next to the Senate building, or within the ancient city.
- They have three brains. The Animal, aka a normal human brain, the Purpose, an information tablet which dictates their robotic instincts, Basic Information and function, and the Soul, which enables emotion and sapience.
- Steve was constructed as The Builder, Alex was constructed as The Hunter, and Hero was constructed as The Friend, but is commonly referred to simply as the first. Hero destroyed two other players before he was supposedly decommissioned.
- Players begin existence as entirely androgynous beings, and may transition into genders upon discovering them. Gender is not encoded onto the Basic Information tablet, so they may struggle to understand it. Steve has adopted a masculine identity, enjoys it, though expresses confusion at being called a âmaleâ.
#minecraft#mineblr#my art#minecraft art#minecraft fanart#minecraft lore#minecraft abiogenesis#minecraft villager#minecraft enderman#minecraft piglin#minecraft steve#minecraft player#worldbuilding#my minecraft lore#minecraft headcanons#fantasy#body horror#my writing
748 notes
·
View notes
Text
humans. can also lick things :)
[Disco Elysium]
Detective Double Yefreitor Harrier Du Bois and His Android Partner K1M-57 or something idk
#replies#also u don't understand kim is broken#his visual systems need glasses to work properly#he can't access a lot of his memory bank for plot purposes so he has to write everything down in a notebook#he lives in an apartment that was willed to him by his last now dead partner#that apartment is full of filing cabinets that are stuffed full of notebooks#they're organized in a way that only makes sense to him and that is what takes up most of his useable memory#he has to look things up on an external device (phone/pc/tablet)#he cannot connect to the internet#the kitsuragi model is so fucken rare that no one can or will attempt to do maintenance on any of them#there were 3 of this model that were released and the other 2 got decommissioned for reasons. kim is the last one.#his user manual is corrupted. he and his last partner taught themselves how to do the maintenance through trial and error.#kim maintains and repairs himself in his own apartment. he's jury rigged to hell and back.#the kineema was also willed to him. don't ask me how the law works with androids owning property just know that kim does lmao#kim is broken af and that's really the whole point of this but all of this really just exists in my head so nobody knows this just by#looking at this drawing#will i ever write it? probably not.#but the point is kim is broken and harry doesn't care and loves him anyway bc harry is also broken#the other point is that harry is weirder than his android#thanks for coming to my ted talk :)#disco elysium
30 notes
·
View notes