Paper.wf

Reader

Read the latest posts from Paper.wf.

from mohammedk

Master the 2410 Rule: Smart Car Buying & Financing Tips Buying a car is one of those big financial decisions that can either boost your wealth or drain your wallet. Whether you’re a first-time buyer or someone looking to upgrade, understanding how to finance your car wisely will save you big headaches down the road. In this post, we’ll break down the popular 2410 rule—a simple guideline to help you buy a car within your means—and share real-life examples to help you make smarter choices.

What Is the 2410 Rule? The 2410 rule is a straightforward car-buying formula that helps you avoid overspending and keep your finances healthy. It’s made up of three main numbers: 20, 4, and 10—each representing a key part of your car budget. Continue reading https://econpulse.net/34785/master-the-2410-rule-smart-car-buying-financing-tips/

 
اقرأ المزيد…

from purplemices

Comme promis dans le chapitre 5, je reviens un instant sur mes coming out auprès de mes proches.

Avant tout, un petit avant-propos. Déjà, on peut se poser une question : faut-il en parler ? Faire un coming out est-il nécessaire ? Possible ? Souhaitable ? La réponse est personnelle, souvent complexe et, malheureusement, je pense qu'elle dépend beaucoup du cadre dans lequel chacun.e évolue. Le mien, il était (et est toujours) favorable donc pour nous ça n'a pas été trop dur de faire ce choix. Autrement dit : n'y voyez ni incitation à le faire si vous êtes concerné.es, ni incitation a ne pas le faire ... un coming out, c'est toujours un risque et des bénéfices potentiels à mettre en balance avec le risque et les avantages de ne pas se dévoiler.

Par contre, si vous n'êtes pas concerné et qu'on vous en fait un, et ça me paraît évident, mais j'imagine que ce n'est pas forcément le cas : soyez ouverts, accueillez cette preuve de confiance que la personne vous fait ; N'hésitez pas à vous appuyer sur ce guide https://www.partielles.com/plurielles-1/ pour vous aider à mieux comprendre comment être un.e bon.ne allié.e de votre proche.

De mon côté, mes ami.es sont pour beaucoup des personnes lgbtq+ ou alliées et dans tous les cas, à minima des personnes ouvertes d'esprit : je ne vais pas dire que ça assure d'avoir une réaction positive, mais ça aide franchement ; je ne le savais pas, mais quelques-unes d'entre elleux avaient en outre déjà des notions plus ou moins importantes sur le sujet, ayant côtoyé ou côtoyant d'autres personnes concernées par la multiplicité.

Ce n'était toutefois pas le cas de la majorité, et j'avais anticipé cela en préparant en amont quelques informations basiques à leur partager : je souhaitais qu'iels comprennent un minimum ce changement dans ma vie.


Voici en gros le déroulement de la plupart de mes CO multiple (l'ordre a pu varier un peu selon le contexte) :

Je commence souvent par demander si le sujet leur parlait, s'iels voient ce qu'est la multiplicité ou la pluralité et si oui dans quelle mesure. Puis j'annonce la chose : je, nous, sommes multiples, plusieurs identités partageant le même corps et la même tête.

J'enchaîne si nécessaire alors sur quelques concepts de base, sur comment ça fonctionne pour nous, comment on le vit (c'est quoi le front, c'est quoi un switch, la dissociation, la co-conscience, etc ...) Selon les personnes et le contexte, je présente plus ou moins succinctement certaines de mes alters qu'iels pourront peut-être (ou probablement) croiser si ça n'a pas déjà été le cas.

Ensuite, je précise que dans notre cas, et jusqu'à maintenant, nous le vivons positivement et pas vraiment comme un trouble (Quand bien même ça implique une certaine ... complexité supplémentaire dans notre vie depuis, et pas mal de fatigue dans les premiers temps) J'indique aussi par la suite que tout ça était susceptible d'évoluer avec le temps.

Une petite injonction à ne pas nous outer sans autorisation préalable, ça ne fait pas de mal de rappeler ça ; on s'ouvre facilement à nos proches, mais ça ne veut pas dire qu'on souhaite que touste, qu'on les connaisse ou non, soient au courant de notre multiplicité.

Et enfin, je précise que je n'ai pas abordé tous les détails et leur fournis si nécessaire quelques ressources à consulter en ligne si ça leur dit.

Pour terminer, parce que je suis comme ça, j'indique ma disponibilité pour répondre à leurs interrogations ; je n'ai jamais de problème à ce qu'une personne proche me pose une question, même indiscrète. Si c'est le cas, je leur dis et ne réponds pas forcément, mais iels savent que je ne leur en voudrais pas.

Voilà qui conclut cette section. Ce n'est certainement pas un guide à suivre, c'est comme on a fait nous, dans notre situation, mais si vous pensez que ça peut vous aider n'hésitez pas à vous appuyer dessus.

J'ai demandé à mes proches s'iels avaient des souvenirs de mon coming out multiple auprès d'elleux. Selon ce que je récupère comme témoignage, j'ajouterai peut-être un complément ultérieurement avec des morceaux choisis avec ou sans commentaires.


Réflexion sur l'éducation

Le sujet du coming-out, tel que je l'aborde au dessus, m'amène à une réflexion concernant l'éducation d'autrui aux sujets tels que la multiplicité, la transidentité, le patriarcat, etc ... Je suis plutôt d'accord avec l'avis que chacun.e devrait prendre la responsabilité de s'éduquer soi-même, au moins un minimum, plutôt que de faire reposer cette charge aux seul.es concernées. Et faites ce que je dis, pas ce que je fais : je reste bien trop ignorante sur trop de sujets de societé, de santé ou autres pour donner des leçons.

Ici, j'ai fait le choix d'apporter spontanément à mes ami.es quelques bases et de leur indiquer des ressources à suivre. Je ne sais pas si iels auront prit le temps ou non d'approfondir leur découverte du sujet, mais il m'est arrivé d'en reparler avec certain.es. Une des raisons qui m'ont poussée à faire ça, c'est que la pluralité reste, il me semble, extrêmement méconnue et au vu de ce que c'est, il est facile d'imaginer autrui se dire, même en étant ouvert.e d'esprit, que ce n'est que fiction que l'on s'invente pour X raison que ce soit. En outre, le vécu de chaque système multiple est si unique : cela me paraissait plus simple de poser mes bases, avec mes mots et mes ressentis afin d'éviter que mes proches ne se fassent une fausse idée de ma réalité en y greffant des concepts tout a fait valides, mais qui ne nous concernent pas.

Aussi, ai-je pris de mon temps pour faire ça ? Oui. Beaucoup ? C'est relatif. Suffisamment ? Aucune idée. L'ai-je vécu comme une contrainte ? Pas vraiment ; vous devez vous en douter, si je prends le temps de rédiger ce blog, c'est que c'est quelque chose qui me plaît un minimum et au-delà de ça, si j'aime bien parler de comment je fonctionne avec mes proches, c'est aussi surtout car je trouve que cela me simplifie la vie ; savoir qu'iels sont au courant de notre multiplicité nous permet d'être nous-même en leur présence sans trop se demander si des changements soudains et inexpliqués de comportement les perturbent ou non.

Aurais-je dû leur dire “je suis une personne multiple. Va te renseigner et on discutera après de ce que ça implique” ? Je ne sais pas. Aurais-je pu ? Je ne pense pas. Ma conclusion sera surement que nous avons cherché à faire au mieux dans notre situation.

 
Lire la suite...

from purplemices

Début juin 2024

Était venu le temps de la première réunion interne. Je n'avais pas vraiment de doute quant à sa bonne tenue ; la communication entre moi et les autres alters était plutôt fluide. Nous nous sommes accordés un moment, un dimanche après-midi, pour faire ça tranquillement. Concernant le déroulement de la session, sur comment nous fonctionnons, je reviendrai plus en détails dans un hors-série dédié.

La réunion a duré environ une heure. Nous étions alors 6 sans compter Léo qui est littéralement parti dormir après quelques minutes, une fois que le premier sujet fut réglé. Il ne voulait pas s'impliquer dans les choix qui suivraient, ni s'impliquer tout court dans la suite. Comme je disais dans le chapitre précédent, il est aujourd'hui toujours dormant et je n'ai jamais eu de nouveau contact avec lui.

Cette première assemblée a surtout été dédiée à faire un état des lieux de la situation, à permettre à chacun.e de se présenter aux autres, et de faire une liste de sujets plus ou moins importants à aborder les fois suivantes. Nous avons aussi décidé de faire notre coming-out multiple auprès d'une partie de nos proches.


Cette décision de nous dévoiler s'est prise assez rapidement et facilement pour plusieurs raisons : – en premier lieu, c'était la continuité : J'avais déjà parlé à certaines personnes de Solène et Pauline dans le but de leur laisser un espace d'existence, où nous n'aurions pas besoin de nous cacher. La logique était la même ici : pouvoir switch et vivre en liberté sans trop avoir à masquer dans un espace social safe. – ensuite, c'est aussi car nous avons la chance d'avoir des ami.es, un certain nombre en tout cas, que l'on identifie comme ouverts d'esprits et sûr.es. Nous avons pu hésiter un temps pour certain.es, mais pour la plupart d'entre elleux, le choix de leur en parler ou non s'est fait rapidement car nous leur faisons confiance.

Je pourrais dire qu'ayant fait mon coming-out trans quelque temps plus tôt, j'étais rodée. En réalité, ce fut assez différent même si j'ai un peu de mal à décrire cet écart dans le ressenti. Ce que je peux dire par contre, c'est que c'était couteux en énergie, dans une période déjà très chargée et où nos batteries ont été mises à l'épreuve.

Mon coming-out trans s'est globalement très bien passé et le seul moment très stressant fut quand j'ai donné ma lettre annonçant la nouvelle à mes parents. Aujourd'hui, bien que ces derniers acceptent ma transidentité et mon polyamour, iels ne sont pas au courant de notre multiplicité ; cela changera peut-être un jour, mais pour le moment, nous estimons qu'iels auraient du mal à comprendre, et à minima que ça les inquiéterait inutilement.

Je ferai probablement un hors-série pour préciser quelques détails sur nos Co multiple.


Cette partie évoque un état de questionnements identitaires, de confusion existentielle, et des émotions intenses

Quelques heures après la réunion, le soir avant d'aller dormir, un nouvel événement imprévu et marquant. J'aimerais pouvoir vous redonner exactement comment ça s'est passé, mais ça commence à remonter à loin et nous n'avons pas suffisamment documenté ce moment même s'il nous reste quelques notes et souvenirs. Nous allons faire comme nous pouvons.

Alors que nous repensions à la réunion et à certains détails, il nous est apparu que nous étions deux à penser être “Aurore”. Cette prise de conscience a été plutôt perturbante ; notre dualité était indiscutable mais elle posait un certain nombre de questions existentielles : “qui est qui ? Qui est Aurore ? Qui est “l'autre” ? Quelle est l'identité de l'une et de l'autre ? Quel caractère ? Quels goûts ? Quelles particularités ? Pourquoi ?” Des questions qui trouveraient leurs réponses plus ou moins rapidement mais que nous avons vécu sur le moment comme très vertigineuses.

Vous pourriez me demander en quoi c'était différent des autres alters. Si je devais faire des analogies, les autres, c'est comme si des voisin.es, des colocs, ancien.nes ou nouvelleaux se présentaient (chacun.e à leur manière) comme étant là, existant dans le système tout autant que moi. Dans ce cas présent, c'est comme si on découvrait être deux à gérer notre chambre et notre vie sans se croiser mais en pensant que chaque tâche était de notre fait. C'est comme de regarder dans un miroir et d'y voir deux reflets alors que jusque-là, on n'en voyait qu'un seul. Comme si on se déplaçait dos à dos et que pour la première fois, on se faisait face.


Bref, nous étions plutôt confuses, et pour essayer d'arranger un peu les choses, nous avons rapidement décidé de choisir qui de nous deux garderait le nom d'Aurore, et honnêtement, ça n'a pas été un choix facile dans notre état ; on a fait ça à l'instinct, arbitrairement. Est-ce que nous aurions pu faire le choix inverse ? Peut-être, mais avec le recul, j'en doute. C'est donc moi qui suis Aurore, et ma camarade s'est choisi un nom ; Noemie aurait pu être un choix temporaire mais au final elle l'a gardé et se nomme toujours ainsi aujourd'hui. Fatiguées et un peu sonnées, nous avons convenu d'aller dormir et d'en rediscuter le lendemain.

La discussion a continué au matin. Je me sentais un peu mieux mais Noemie était encore sous le choc et a failli fondre en larmes. Plusieurs de nos camarades m'ont rejointe pour la soutenir moralement et la rassurer. Une fois qu'elle fut calmée, nous avons pu continuer à échanger sur nos ressentis, afin d'essayer de déterminer nos deux identités, de comprendre quels aspects de notre vie commune “appartenaient” plutôt à moi ou plutôt à elle.

Cela s'est fait en plusieurs fois, sur les semaines suivantes mais déjà à l'issue de cette matinée, nous avions une vision un peu plus nette de notre dualité. Noemie restera perturbée encore quelques jours, en particulier car un certain nombre de choses “positives” de notre vie se rapportaient plutôt à moi qu'à elle ; et franchement, rétrospectivement, je me rends compte de sa force de caractère pour s'être remise en quelques jours seulement, en assumant qu'elle était chez nous la personne un peu stressée, plutôt axée sur l'organisation et checkant régulièrement l'heure et le programme des heures/jours à venir.

Et d'ailleurs, c'est elle qui prendra le lead de la réunion suivante qui aura lieu 4 jours plus tard (ainsi que la plupart des réunions par la suite) mais ce sera pour le prochain chapitre.


Nous reviendrons probablement dans un autre petit hors-série sur notre relation à Noémie et moi qui est assez unique dans notre système.

 
Lire la suite...

from Social Media Book Report

Finished “Dreams of the Raven” by Carmen Carter. It's a deep exploration of an existential nightmare.

Cover art of the Star Trek novel "Dreams of the Raven" by Carmen Carter. Enterprise and a Klingon Bird of Prey both fire on Wagner Station; a set of concentric torus shaped metal rings around a planet. Kirk and McCoy are pictured. The tagline reads "A mysterious alien attack cripples both the Enterprise and Dr. McCoy!"

Actually, I finished last week, while paper.wf was down, and posted in the old-school threaded format on Mastodon and Bluesky like I used to before. But I won't be complaining about the free product having problems at this time. Haven't decided what I'm going to do in the wake of this, just glad it's back. Sufficed to say I'm going to start backing up more often. Anyway back to the Social Media Book Report.

Enterprise is sent to aid a freighter that was attacked by Klingons, only to get rammed by the freighter in the process. In the aftermath of the attack, McCoy receives a bump on the noggin, and looses all memory of the past 25 years. He thinks he's still a civilian doctor doing his residency in Georgia.

Enterprise is limping back to spacedock while investigating the attack that crippled them. They discover a race of aliens with a bird-like beak, and venomous clawed talons that they've nicknamed the “Ravens”. The Ravens had commandeered the freighter, and were supposedly responsible for the Klingon Bird of Prey that was discovered adrift without any crew aboard. Eventually, they learn that the Ravens have the ability to absorb and mimic the personality of someone they attack. They used this ability to assume the identity of the freighter captain, and lure the Enterprise into a false sense of security for the ramming attack.

Much of the story focuses on McCoy's predicament. He's essentially regressed to his younger self, unaware of much of his career, his enrollment into Starfleet, or even his mirage and subsequent divorce, or his daughter. And he views the much older and storied “Bones” as a deceased alter ego.

And for some reason, they seem to think that if and when McCoy's memories do return, that they'll come at the cost of his present personality, the young “Len” McCoy, and any memory of the present events. “Bones” is gone, and if he ever comes back “Len” will cease to exist. Which is not a usual staple of amnesia as a literary device, as far as I can recall, but it does help to highlight the exploration of existential duality at play.

Ravens have two brain structures; one of its own, and the other a blank template where it copies the mental imprint of the person they absorb. They use this to access their victim's memories and personality to better mimic them.

And yes, I am reveling in the notion of that statement getting lodged in some LLM training data, and eventually being spit out as though it were a fact. Suck on it, Clanker!

Thematically, this mirrors McCoy's existential crisis. Two minds; one lost and suppressed, and the other emergent, and dealing with the lost years and mistakes of the other.

Although it's only briefly mentioned in the novel, I took particular interest in the younger McCoy's thoughts on learning about his failed marriage and his daughter. Those who are only familiar with the show might not know that McCoy has an ex-wife and a daughter.

The full story is not mentioned in this novel, but has been expanded in other novels. Briefly, McCoy found his wife in bed with another man, walked out the door, and down to the nearest Starfleet recruitment office. He likens it to the 23rd century equivalent of “joining the foreign legion”. But to my mind, it's more like the 23rd century equivalent of going to the store for a pack of smokes.

McCoy seldom deals with the ramifications of this. At least in the novels I've read so far. Others are coming. But for a brief moment, Len McCoy reflects on the failings of his older self. Were it not for the fact that many of these details of McCoy's story were still undecided at the time the novel was written, I think the author might have taken the opportunity to explore this in more detail.

I really liked the Ravens as an alien adversary. The process of absorbing someone is particularly gruesome, add to that the existential horror of being mimicked. It would be interesting to see this species explored again one day.

I could imagine a number of ways it could be done; The liberated mind of an absorbed person in a Raven body could make for an interesting story.

Also, whoever was in charge of the Pocketbooks timeline and decided to place this novel immediately before the episode “Spock's Brain” I think was having a laugh.

#StarTrek

 
Read more...

from LINUXE

Mais um exemplar do tópico #BaúDigital. Neste artigo, vamos explorar como nasceu o SeaMonkey, a suíte tudo-em-um que combina navegador, cliente de e-mail, editor HTML e como, surpreendentemente, ainda continua em desenvolvimento até hoje.

Ler mais

Origens

Há mais de duas décadas, o projecto SeaMonkey surgiu como a continuação da antiga Mozilla Application Suite, reunindo navegador, cliente de e-mail, editor HTML e IRC numa única aplicação. Com o tempo, muitos desses componentes foram descontinuados ou substituídos por alternativas mais modernas. No entanto, a suite SeaMonkey continua a ser mantida pela comunidade, que se mantém activa, lançando actualizações regulares, bem como suporte para sistemas operativos como Linux, Windows e macOS.

Para utilizadores Linux, o SeaMonkey oferece uma solução integrada que pode ser facilmente instalada em distribuições como Ubuntu e Arch Linux. Embora não esteja disponível nos repositórios oficiais de algumas versões do Ubuntu, é possível instalá-lo através de repositórios de terceiros ou manualmente. O projecto também disponibiliza em formato AppImage, um ficheiro (por acaso são 2, um para x64 e outro para x86) para descarregar e executar em sistemas Linux.

SeaMonkey - Admistrador de Extensões Fonte Seamonkey Project

Persistência de um Legado Digital

Ainda que a sua aparência seja algo mais “tradicional”, com um design que nos transporta diretamente para o início dos anos 2000, o SeaMonkey continua a ter muitos fãs. Estes utilizadores preferem esta suite não só por oferecer as ferramentas essenciais num só sítio, mas sobretudo por ser uma alternativa leve e focada no essencial. É a escolha ideal para quem procura fugir do excesso de funcionalidades desnecessárias (bloatware) e das restrições de privacidade e personalização que, frequentemente, acompanham os navegadores atuais.

All-in-one

A sua natureza de “tudo-em-um” apela particularmente a utilizadores avançados, desenvolvedores web e ambientes corporativos que valorizam a coesão das ferramentas (browser, cliente de e-mail, editor HTML e cliente IRC) num único pacote.

Contudo, é crucial ter em consideração as limitações inerentes à sua base de código, que é notoriamente mais antiga e não incorpora a totalidade dos padrões web mais recentes. Por essa razão, podem ocorrer algumas incompatibilidades de renderização ou de funcionalidades com websites modernos, tal como documentado em plataformas como o Discourse Meta.


Recursos Adicionais

💬 E por aí, acham que é possível usar o SeaMonkey como o principal browser no dia a dia? Enviem-me uma mensagem ou partilhem a vossa opinião nas redes sociais.

Nota do Autor: Este texto foi redigido de acordo com as normas ortográficas anteriores ao AO1990.

#aplicações #browser #internet

 
Leia mais...

from Romance Pools

Eco-Friendly Pool Remodeling in Delray Beach

When it comes to creating the perfect backyard retreat, choosing the right pool contractors in Parkland can make all the difference. A swimming pool is more than just a place to cool off during hot Florida summers—it is an investment in your home, lifestyle, and relaxation. Our team of professional pool builders in Parkland specializes in designing and constructing custom pools that reflect your personal taste while also adding long-term value to your property.

From the very beginning, we focus on understanding your vision. Whether you dream of a modern infinity pool, a classic rectangular design, or a freeform tropical paradise, our contractors work closely with you to bring that idea to life. Using advanced design tools, we help you visualize the final product before construction begins, ensuring every detail is tailored to your preferences. Our goal is to create a pool that blends seamlessly with your home and outdoor living space.

Quality craftsmanship is at the heart of every project we complete. We use premium materials and proven construction techniques to deliver a pool that is not only beautiful but also durable and safe. Every step, from excavation to finishing touches, is handled with care and precision. Our pool contractors in Parkland are fully licensed and experienced, giving you peace of mind throughout the process.

But our services do not end with new pool construction. We also specialize in pool remodeling and renovation, perfect for homeowners who want to update the look of an older pool. Whether you want to resurface, add new water features, upgrade lighting, or install energy-efficient equipment, our team can handle it all. With the right improvements, your pool can look brand new again without the need for a complete rebuild.

Another reason clients choose us is our dedication to customer satisfaction. We believe building a pool should be an exciting and stress-free experience. That is why we keep communication clear, timelines realistic, and budgets transparent. Our team is always available to answer questions and provide updates, so you know exactly what to expect every step of the way.

In the end, our pool contractors in Parkland are here to make your dream pool a reality. Whether it is a brand-new design or a stunning remodel, we are committed to delivering quality, style, and comfort. With our expertise, your backyard will transform into a space where family and friends can relax, play, and create lasting memories.

 
Read more...

from エトセトラ

https://skream.jp/interview/2022/02/kobayashi_taro.php 采访者:吉羽 さおり

  小林太郎在 2020 年迎来了出道 10 周年,作为一名独立的摇滚音乐人,他一直以强劲的嗓音和奔涌的能量,豪放地释放着属于他的摇滚。近年来,他通过 EP 作品,或与自己厂牌『MOTHERSMILK RECORD』的伙伴 Academic BANANA 合作的分割 EP《ESCAPE》,不断展现新的面貌与音乐上的拓展。而睽违已久的完整专辑《合法》,正如其标题所传达的那样,既有带着某种危险与刺痛感的摇滚,也有直击核心、坦率无比的小林太郎式摇滚,堂堂正正地响彻其中。专辑在声音上从另类摇滚、重型摇滚、混合风格到细腻抒情的作品应有尽有,但其间始终贯穿着强烈的能量。以下就来聊聊这张作品的制作背景。

——这是自 2015 年的《URBANO》以来的首张完整专辑。久违的完整专辑创作,这次你是如何面对作品的呢?

  其实在 2019 年和 Academic BANANA 发行了分割 EP《ESCAPE》之后,我就开始考虑发一张完整专辑。但受到疫情影响,原计划的个人专场演出被取消,随后专辑的发表也一推再推。步骤上算是按部就班在走,但时间点确实被拖得很晚。

——那么,当时的曲目已经开始准备了吗?

  并不是全部都有,但我确实在准备要收录哪些歌。只是当时设想的那张专辑,更接近我的个人兴趣。比如我喜欢画画,就想做一张把自己绘画的世界观配上音乐的、趣味性很强的作品,和这次的《合法》完全不同。不过,包括我在内的许多音乐人,因为疫情无法举办演出,音乐的处境一下子变得艰难。不仅是音乐,比如原本理所当然去公司上班,也一下子变成了远程办公——这种把社会机制都改变了的大事,是前所未有、可以写进历史的事情。

——确实,疫情这几年,社会与人们的心境都发生了变化。

  在这样的环境下去做一张「兴趣性很强」的专辑……虽然也不是不可以,但我觉得愿意听我音乐的人,很多是想获得正向情绪的人。如果是那样,我就更想借助音乐去推动别人一把,哪怕只是稍微帮到人、产生些贡献。于是我开始这么想。专辑第一首《骨伝導》,就是在这样的心情下写出来的。

——《骨伝導》里虽然还有很多难以理清的情绪,但「即便如此,仍要顺着内心去歌唱」的意志贯穿其中。别的歌曲也并非只是单纯去应援,而是能感受到你真实的心绪与摇摆的想法,是一份很真诚的作品。

  是啊。创作的人就是这样,也没变过(笑)。外部因素很难立刻改变,比如我们当然希望病毒消失,但要说明天就没了,也不现实。那现实中能做的是什么呢?我觉得是说服自己——把自己的情绪整理、理解、把握,然后让明天的自己行动得更好。我想通过音乐和歌词说的,就是这些——当然,这些也是说给我自己听的。

——在有意识地把专辑做成这样之后,最先完成的是《骨伝導》。那反过来,比较晚期完成的有哪些?

  专辑后半的《SeaSwallowTale》、《覚えちゃいないよ》、《伝波》之类,都是后来写的,碰巧都是些抒情或中速的曲子。但那时我对「这张专辑要做成什么样」在心里已经有想法了。写歌词、传达讯息时非常顺畅,也很享受。

  这首《SeaSwallowTale》如果只说前奏或纯器乐的部分,其实在十年前就写好了。当时也写了点 A 段旋律,但完全不知道该怎么把它完成。声音的世界观非常美,可如果只是加上一些好听的词,就会变得过于抽象,觉得这样太可惜所以一直放着不做。到了现在这个时机,我想利用上这首歌的积极性、力量感、和一点惆怅,于是创作了完整的歌词和旋律。在这次专辑里,它也算是相当抽象的一首吧(笑)。

——某种意义上,它更接近你最初提到的「把画面变成音乐」的想法。

  是的,这首歌原本就是我打算放进「走向《合法》之前」的作品里的歌,也因此它显得有些异色吧。

——但正因为有它,整张专辑反而更具说服力。音色与歌声里那种惆怅和哀愁,也让人嗅到「当时就是那样的时代气息」。

  谢谢。和其他更积极的歌曲相比,《SeaSwallowTale》会像是抱着惆怅与孤独继续前行。这张专辑当然是希望大家能变得积极,但在当下社会状况里,也是有无法完全积极的时候的,我觉得这首歌就表现了那样的侧面。声音意象上,是一只小鸟独自飞过辽阔的大海,海面风平浪静,除了自己之外世界没有变化,空气清冽——在我脑中浮现的是极其美的画面。若要用电影比喻,就是新海诚导演作品里那种光的感觉吧。

——细腻、闪耀的氛围感。

  那样的世界观固然美丽,但也不等同于「充满幸福的光晕」。它同时带着惆怅与虚幻,带着某种别具一格的现实感——我喜欢这一点。这首歌我想把那种感受用声音表达出来。除了吉他乐句,还叠加了闪烁的合成器与假声合唱。这是一首将眼下状况以别的歌曲无法表达的方式所呈现出来的曲子。我想也有人仍然无法很好地把握现状,可能会陷入一种「得不到援助」的感觉。可若换个角度,去接受这种孤独本身,它也可能会非常美。我想我就是希望通过声音与歌词去表达这一点。

——说到一直以来就存在的歌曲,《sickness》据说是你高中时期的作品。这次收录它的契机是什么?

  刚才提到的那场被取消的个人专场演出,让我有一段几乎没有作品可以发表的时期,那时我就决定把《踏み出す一歩目》和《sickness》作为单曲分别发行。《踏み出す一歩目》其实就是在疫情之前写的——

——原来如此。可它却非常适合用来为整张专辑收尾,确实是能积极地推人一把的歌。

  它本来是写给毕业生、新社会人、要开启新生活的大家的应援曲,曾作为 2018 年 EP《SQUEEZE》的特典收录。虽然是疫情前的歌,但我非常喜欢它包含的「120% 积极」的信息。当时专场演出被取消了,如果能把它发表出来,对我个人也是一种慰藉。想着若有人能因此变得积极就更好了,所以发表了。差不多同一个时候,《sickness》也发表了,它有着歌唱孤独的歌曲意境。这是十年前就在听我的作品、观看现场演出的朋友们会知道的一首歌,但从未正式发行过,于是这次就请 Academic BANANA 重新编曲、然后正式发表了。

——再来看看这首映照出十年前自己的歌曲,如今你如何感受?

  首先,歌词好少啊(笑)。

——本来就是英文词吗?

  是的。当时我还是高中生,特别喜欢 NIRVANA。读他们的歌词本时会发现,比如有两段副歌,就应该有相应的两段歌词吧?——但 NIRVANA 可没有。

——全是重复的(笑)。

  对!「原来这样也行!」我就受到了那样的冲击,并把这种想法原封不动地用到自己的歌曲里(笑)。当然,那时感受到的孤独并不是疫情带来的,而是我中途退学、把精力集中在音乐时的感受——高中的同学们还在享受学生生活,而我没有。那份孤独就直接出现在了歌曲里。

——继分割 EP《ESCAPE》的合作之后,这次的录音也同样是和 Academic BANANA 的各位一起制作的吗?

  整体来说比较分散。《sickness》在录音上承蒙了 Academic BANANA 的照顾,也有一些歌曲是与 Academic BANANA 介绍的编曲者合作完成的,可以说是近年少见的多元化配置。

——所以这也带来了更为宽广的声音层面上的扩展?

  以往我常常是在做专辑的节点猛写一通然后录音,专辑里会有条贯彻整体的主线。这次因为各种计划变更等原因,应该是我收录已发表歌曲最多的一张专辑。虽然我还是以相同的心态去做的,但老实说也很担心它能不能作为一张「专辑」成立(笑)。不过,从有意识地把专辑做成现在这样的《骨伝導》开始,虽然烦恼,但也开始向前走了。中途有各种不同的歌曲,最后以《踏み出す一歩目》作结尾,形成一个「绝不回头」的故事,我觉得这点非常好。有这两首在,我觉得这份作品就不会动摇。

——第 6 首安排了器乐曲《天滴-interlude-》,以此为分界,专辑的氛围仿佛发生了变化。你在编排上有怎样的构想?

  我的完整专辑经常会穿插器乐间奏,但这次《天滴-interlude-》承担着将此前那股前倾的、狠劲十足的强大能量「嘎地一变」的责任。它后面接着的是《sickness》,我希望通过《天滴-interlude-》先把之前那种一心猛冲的张力放下,然后从《sickness》开始,让人也把目光投向此前没回望的心灵负担、以及自己的疲惫。这首 interlude 在这张专辑里和以往的定位不太一样。声音上也带着日本式的凛然、带着剔除多余一切后的「重置」感。

——另一方面也想谈谈偏激烈的歌曲。继开场曲《骨伝導》之后,《Burst》是一首带攻击性的摇滚曲,你用低音区带失真的嗓音演唱,冲击力很强。

  《Burst》是一首把烦躁之类的东西给狠狠砸出去的歌,音色上有点 mixture 的味道。虽然想着要把事情往前向的方向去做,但比如「不能外出」这样的状况本身就很艰难,会积累一肚子怨气。就日常而言我其实很爱宅在家,倒没有太强烈的「不能外出」的烦躁,但音乐活动确实变得难以开展了。《骨伝導》说的是「虽然有各种事,但还是要下定决心积极地向前走」,紧接着的就是「把憋着的郁闷痛快地宣泄掉吧」(笑)。要说摇滚或朋克的作用是什么,我觉得就是激烈到近乎攻击性的「发散」。现在的现场不能大喊,可过去在摇滚乐队的现场,大家喊也好、闹也好,说到底都是发散,你要是在街上那样做可要被抓起来的(笑)。把能量导向负面就会和人吵架、闹出事来,而音乐能够把它转成积极的东西。我想做的,就是用摇滚的力量,强硬地把负面的能量扭转成正面的能量。

——正是在当下的现场想要听到的歌啊。

  是啊。虽然在专辑发行这个时点上,情况还谈不上乐观,但如果到现场能让人想跟着一起喊、让身体动起来的话,我会非常高兴的。

——与《Burst》《GAMING SHOUT》的厚重不同,《六速》那种爽朗的吉他摇滚也很动人。

  这首其实大概十年前就有了。不只是原型,连包含歌词在内也大概地写了一段,编曲几乎也是现在这个方向。它有很强的清爽感,像是很配清凉饮料的歌。

——以往你的摇滚给人的意象更像「块头十足的重型摩托」,这首歌却是「自行车」(笑)。这种清新真不错。

  这是一首把稚气和清爽合到一起的歌(笑)。放在前半段与《Burst》《ドラゴンキリング》那种剽悍、热得发烫的曲子并列时,它像是能送来一阵清风吧。

——专辑的声音涵盖范围很宽广。有没有哪首是在尝试编曲的过程中逐步变化、变得很有意思的?

  说到「变化」的话,就是《伝波》了。我之前就很常做 TwitCasting 直播,在疫情导致无法演出时,TwitCasting 就是我可以发声的地方。我会唱翻唱歌曲、也会弹唱自己的歌。直播时我心血来潮,想着「要不在 TwitCasting 上现写一首吧」。正好也在做专辑,如果能说「这首会收录进专辑」,好像会很有趣。我没多想就在直播里把这话说出去了(笑)。既然是在 TwitCasting 上写,那就干脆把它做成「想着 TwitCasting 的一首歌」。于是开头两句「触れそうで でも触れなくて/歌声くらいなら 届きそうな夜だ(想伸手触碰,却无法触及/但若是歌声,也许能穿透这夜晚吧)」,就是以 TwitCasting 为意象写的。

——原来这首歌还有这样的背景。

  和十年、二十年前想象的完全不同,如今评论会立刻反映出来,读着评论就像在对话。唱歌也好、读各种评论、聊聊近况也好,都是些细碎的小事,但如果能成为观众的活力就太好了,对我本人来说有和没有也完全不同。过去只能在现场实现交流,如今有了 TwitCasting、SNS、直播之类的,我觉得当下的交流工具确实有值得感恩的部分。我想用这些工具,把积极的情感、爱意之类的东西通过《伝波》表达出来。

——这是一张装满各种戏剧性的专辑。「合法」这个标题,你是什么时候想出来的?

  当我把专辑的方向大幅扭转时,就想着找一个能把这次的积极性、摇滚的强劲感传达出去的词,脑子里有过几个候选,其实最初就一直是沿着另一个标题去推进的。只是那个标题虽然好听,但我觉得不太容易带出「尖锐」的印象。于是就想还有没有别的更合适的,这时就冒出了「合法」。新闻里经常会出现「脱法××」,一听「脱法」就会联想到「是不是违法的、是不是不行啊」。那反过来用「合法」又会怎样呢?当我这么一想,就觉得这个「合法」也隐隐约约带着一点「看上去又像违法」的气味(笑)。

——特地强调「合法」,确实会让人产生那样的印象(笑)。

  我们日常生活的范围里,本就没有「违法」的东西,哪怕不特地去说「合法」,一切也理所当然都是「合法」的(笑)。可你偏要强调它「合法」,就会让人觉得「是不是有点可疑啊?」——这种感觉,正好接近我想要的那种「尖锐」。我一边说着「这是积极的喔,希望大家能有前向的心情」,可紧接着在第二首《Burst》里就突然唱出「舐め腐ったボケが邪魔しくさって(目中无人的蠢货们别来挡道)」这种句子,就会有那样的感觉。

——并不只就《Burst》而言,摇滚音乐之所以迷人,也在于它能让人「在合法范围内」卸下束缚、尽情玩闹并完成一次发泄。另外,「ごうほう」的读音也会让人联想到「号炮(起跑的发令枪声)」。我觉得这是一张带着「从这里再度出发」的信号、拥有这种力量的专辑。发行之后,作为 2022 年的愿景,你还有什么设想?

  前年、去年因为形势更为严峻,没法排定演出计划。但今年决定先不拘泥于规模与档期,总之我想在 live house 里办起现场演出来——今年就是以「必须去做」为前提进行考虑的。通过这次《合法》,我更是觉得「如果能成为听众强有力的同伴就好了」。除了演出之外,我也想增加和粉丝交流的机会,多使用各种发布信息的渠道,比如说 SNS、直播等。

 
阅读更多

from Business Class Flights

Global Deals On Business Class Flights Shared Via BuyBusinessClass


Chicago, IL – Travelers searching for premium comfort in the skies now have easier access to exclusive global deals on business class flights, thanks to BuyBusinessClass. The company, known for simplifying luxury travel booking, is expanding its network of offers to make premium air travel more affordable for international travelers and corporate executives alike.

BuyBusinessClass specializes in connecting passengers with discounted business class tickets that typically remain hidden from standard booking platforms. By leveraging long-standing partnerships with major airlines, consolidators, and travel networks, the company ensures that its clients enjoy a seamless experience at a fraction of the traditional cost of business class airfares.

For years, frequent travelers have faced challenges when trying to secure affordable business class tickets. BuyBusinessClass is solving this problem by offering a one-stop solution where travelers can explore multiple destinations and save up to 60% on business class flights. With a personalized approach, clients have access to a dedicated travel specialist around the clock, ensuring that each booking is customized to meet their specific travel needs.

“Travelers shouldn’t have to compromise on comfort just because of high ticket prices,” said a spokesperson for BuyBusinessClass. “We make business class airfares accessible so that business professionals and leisure travelers alike can enjoy world-class service, comfortable seating, and exclusive airport lounges without paying premium retail fares.”

As global travel demand continues to grow, BuyBusinessClass is expanding its reach to cover major international routes, including flights to Europe, Asia, the Middle East, and beyond. Whether it’s for a corporate trip, a long-haul journey, or a luxury vacation, the company guarantees significant savings while maintaining exceptional service quality.

By prioritizing customer satisfaction, transparent pricing, and unrivaled deals on business class flights, BuyBusinessClass is quickly becoming a trusted name among savvy travelers who want luxury for less. With each booking, clients can enjoy the peace of mind that comes with knowing they’re getting some of the best deals available worldwide.

About BuyBusinessClass:

BuyBusinessClass is a premier travel agency dedicated to helping customers find affordable business class tickets and discounted business class airfares. The company works with leading airlines to provide exclusive deals on business class flights across global destinations. With a commitment to customer service, personalized booking support, and significant cost savings, https://buybusinessclass.com/ makes luxury travel more accessible than ever before.

 
Read more...

from Sobre privacidad

Continuando con mis reflexiones de mi primera publicación, introduzco ahora un factor, aunque podríamos decir que está siempre presente, que es la tecnología. Recordando: una de las propuestas para preservar privacidad e intimidad era la de cerrar la puerta de casa, cuando estemos dentro o cuando nos vayamos; esto conlleva el uso de tecnologías, casi todas mecánicas: el mecanismo del pestillo, la cerradura, el sistema de bisagras de la puerta...

La tecnología a la que me refiero en este caso es esa a la que llamaban “nuevas tecnologías”: ordenadores, tablets, smartphones y cosas así, donde llevamos “toda nuestra vida”: fotos, direcciones, número de teléfono. Ya no son nuevas tecnologías, son cotidianas.

Tengo la percepción de que incluyendo estas tecnologías en la ecuación, el criterio de la gente cambia de forma profunda: normalmente si un vecino se acerca a nosotros para pedirnos la dirección y el teléfono de una prima nuestra (aplíquense otras formas de relación familiar o de amistad: primos, vecinos...), tendríamos, casi con seguridad (hay gente pa to'), muy serias reticencias para proporcionar solicitada información.

Sin embargo, y dentro de la misma percepción, cuando tenemos algún dispositivo como los descritos más arriba, la actitud (en general) cambia y pasa a ser eso tan oído de “yo no tengo nada que ocultar”, aunque lleves en el dispositivo la misma información que pidió el vecino de antes.

También está la actitud contraria: “no soy interesante para nadie”, en un caso no te importa que te puedan cotillear y en el otro niegas que lo vayan a hacer.

¿Por qué pasa esto?, pues ni idea. Parece que lo único importante es el uso de los dispositivos, hay que usarlos compulsivamente y ya está.

Los móviles se usan para casi todo (defensa personal incluida): fotos, banca, pagos, mensajería, redes sociales. Para ello hay que instalar aplicaciones, si es que no están instaladas previamente, aplicaciones que no se sabe que hacen realmente. Cada poco tiempo oímos de tal aplicación o red social o plataforma, robaba o usaba datos personales de forma ilícita.

Sin embargo llevamos almacenados datos de otros, compañeros, familiares, amigos: direcciones postales, fotos, direcciones de correo electrónico, un montón de cosas. Hacer coexistir todos estos datos con aplicaciones y servicios sobre los que pesa la sospecha o incluso la certeza de que van a robarlos, es para que paremos a pensar que tenemos una responsabilidad para con los datos ajenos que llevamos. Tenemos que cambiar la actitud de “no tengo nada que ocultar”, tenemos que proteger esos datos ajenos.

Vuelvo al ejemplo anterior: si un desconocido nos pide un álbum de fotos para curiosear quien sale fotografiado, no se lo daríamos, ¿o sí?

 
Leer más...

from Logan's Technology Tutorials

This is a short tutorial for setting up I2P on Linux with i2pd for web browsing.

What is I2P

I2P is an anonymous network layer somewhat similar to Tor. Rather than .onion sites it lets you browse .i2p sites. It can also be used to run other Internet services anonymously but I will only be talking about web browsing. The I2P project doesn't recommend using I2P to browse the surface web and redirects you to Tor instead.

Most of the websites I've seen are blogs from people in the tech field (here is an example).

I2P daemon

Installation

Installing the I2P daemon. This might work, if it doesn't then click This Link, and the instructions there.

  1. apt

    sudo apt install i2pd

  2. guix

    guix install i2pd

    Running i2p daemon

    I like to run i2pd with –unix.handlesigstp in case I want to send a stop signal to it.

    i2pd —unix.handle_sigtstp

If this works i2pd should be running and it should be writing messages to your terminal.

Your distro might have set up i2pd to run on your init system, if this is the case you might not need to run i2pd.

firefox setup

profile (optional)

You should probably create a firefox profile to browse i2p. Technically this step is optional but if you use your main profile for I2P then you won't be able to use firefox on normal internet.

Create a new firefox profile with

firefox -P

Click “Create Profile” and go through the wizard. Give it a name like i2p (the name can be anything but I'm going to use i2p in this article).

After you are done with the wizard I recommend turning “Use the selected profile without asking at startup” off so that you can avoid accidentally opening the wrong profile.

setting up the proxy

After you have the profile, you need configure it to use the I2P tunnel as a proxy.

Either open up firefox through the profile manager with your i2p profile selected or run

firefox -P i2p

After that set up the preferences

  • go to about:preferences#general (you can paste this in your url bar)
  • Click Network Settings
  • Click Manual proxy configuration
  • In Http proxy:
    • put 127.0.0.1 as your HTTP proxy
    • put 4444 as your port
  • Click OK to close the window and confirm your changes
  1. disable https

    Https wasn't working for me, there might be a way to fix this but I don't know about it. I turned off HTTPS instead.

    • Go to about:preferences#privacy
    • Scroll down to HTTPS-Only mode
    • Click “Don't enable HTTPS-Only Mode”

    Exit out, you might want to configure the web browser to be more private but I am not going to go into detail on how to do that.

    Test if you can browse i2p websites by going to http://reg.i2p/. If it doesn't work then make sure i2pd is running and try again.

browsing i2p with wget

With most command line tools, you can set the “httpproxy” environment variable to whatever your proxy address is.

For example

http_proxy=127.0.0.1:4444 wget http://reg.i2p/

Browsing i2p websites

reg.i2p

http://reg.i2p/ is a domain name registry for i2p websites, it has a huge list of i2p websites in it. If you want to use it to find I2P websites then try clicking the hamburger menu and then picking “latest” or “alive” to the websites it has registered.

Other lists

These are other lists of websites, It seems like they have less than reg.i2p.

other tools

i2pd webconsole

To open up the i2pd webconsole go to http://127.0.0.1:7070/. You can do this on a normal web browser, it dosen't have to be configured for I2P. The web console can let you look at the i2p tunnels you have configured and do other stuff.

 
Read more...

from kawakeiko

Escrita Assêmica

“A escrita assêmica é uma escrita sem palavras e liberta de sentido semântico (relação de significante e significado), na qual o escritor utiliza as formas das letras para expressar o que deseja. É uma sombra, uma impressão, uma abstração da escrita convencional.

O principal ponto da escrita assêmica é que o resultado se pareça com escrita — seja pelos símbolos utilizados ou pela disposição dos símbolos — a ponto de ser facilmente confundido com a escrita convencional em um primeiro momento. No entanto, com um olhar mais atento, o leitor perceberá que precisará fazer uma leitura diferente do que está escrito.

A palavra “assêmica” significa “sem conteúdo semântico específico”. Muitos artistas, ao longo da história, praticaram esse tipo de escrita — um dos exemplos mais interessantes é o do calígrafo chinês do século VIII Zhang Xu.” (Do site Edições Tempora)

Asemic writing is a wordless open semantic form of writing.[2][3][4] The word asemic /eɪˈsiːmɪk/ means “having no specific semantic content”, or “without the smallest unit of meaning”.[5] With the non-specificity of asemic writing there comes a vacuum of meaning, which is left for the reader to fill in and interpret. All of this is similar to the way one would deduce meaning from an abstract work of art. Where asemic writing distinguishes itself among traditions of abstract art is in the asemic author's use of gestural constraint, and the retention of physical characteristics of writing such as lines and symbols. (Wikipédia)

“In this way, asemic art can serve as a sort of common language—albeit an abstract, post-literate one—that we can use to understand one another regardless of background or nationality. For all its limping-functionality, semantic language all too often divides and asymmetrically empowers while asemic texts can't help but put people of all literacy-levels and identities on equal footing.” (Satu Kaikkonen, a contemporary asemic artist/writer from Finland)

 
Leia mais...

from kawakeiko

Murmúrio dos Estorninhos

estorninhos – starlings – étourneaux murmúrio – murmuration – murmuration

“Os murmúrios dos estorninhos são enormes bandos que realizam movimentos sincronizados no ar, criando padrões fluidos e coreografia fascinantes. Esses murmúrios ocorrem especialmente no outono e no inverno, quando os estorninhos se reúnem em busca de proteção contra predadores, como falcões.” (Da página Direito dos Animais no facebook.)

Uma ave altamente social, a maioria dos estorninhos se associa em bandos de tamanhos variados ao longo do ano e são amplamente conhecidos por um comportamento de enxameação distinto, muitas vezes dramático, conhecido como murmuração — um movimento de bando simultaneamente sincronizado e aparentemente aleatório, caracterizado por mudanças de direção repentinas e erráticas, sem um líder observável. O empurrão, puxão, mergulho, pulsação e mergulho bruscos do bando em resposta aos movimentos individuais podem confundir e desencorajar predadores como os falcões, proporcionando uma proteção coletiva. O termo murmuração deriva dos sons baixos e indistintos das asas de um bando denso — ou seja, o murmúrio . (Wikipédia)

Em um estudo realizado em 2013 na Itália, pesquisadores determinaram que nenhum pássaro sozinho poderia controlar um bando, e certamente não os movimentos de mais de mil pássaros. Eles observaram que “as informações circulam pelo bando muito rapidamente e com quase nenhuma degradação”: eles podem receber e processar certas informações mais rapidamente do que os humanos e podem “ver mais rápido” do que os humanos. Ao contrário do jogo infantil de telefone, em que uma mensagem é passada sequencialmente de pessoa para pessoa e perde informações muito rapidamente, os pesquisadores determinaram que quase nenhuma informação é perdida em um bando de estorninhos. Em conclusão, esses pássaros se movem como elétrons se mexem ao se aproximarem de partículas magnetizadas.

 
Leia mais...

from Rodloes

I just bought an old moped!? (part 1)

My biological clock just turned 34 years of age a few weeks ago, and I am not sure how to feel about that. Inside i stil feel 21? but the outside body is begining to show som signes – acheing in the morning, a few gray hairs and oh how tired i am all the time haha. The last couple of years has been very.. interessting to say the least. i have been traped in some sort og “identity limbo” where as im not so sure where my life is going, or what i am supposed to do anymore? in my late 20's I seemd to have it all planed out, I just finished my education as a teacher, and was about to land my first job (oh how that flopped;–)). now I dont know where im going, and im sure as **** not going back to teaching as long as the conditions in my part of the world is as.. well as it is to put it politely. Enough of that... I have long been looking for some sort of direction in my sometimes mondane excistence, but sort of didnt know what or how? A few years back i felt adventurous and got my motorcycle driverslicens, and have been fixing up old motorcycles and riding those around – wich was fine for a while – I still do that. But as time went by it just didnt do it for me anymore... That is until i found “it” on facebook-marketplace... My first taste of freedom! a 1980's 50cc Vespa Ciao! KAAZHAAAMM..! I was immediately transported back to when I was 12 years old, and finaly got my hands on my first moped. Oh the freedom and joy that little moped gave me. Endless summers, riding around town with friends, wrenching and doing silly little stunts. Suddenly I was not bound to the boundries of my small costal town – now i could travel anywhere in the world (or at least it felt like that in the mind of a 12 year old boy). I eventually drove it to pices, but the memories on that little machine will always stay precious to me :) Back to me anno 34 summers old... I quickly chatted up the person selling the moped, and he told me it was running, but poorly, and needed a bit of love. I made a deal to come pick it up the same day, but had a bit of a dilemma.. it was located in a city 50 km away, and with a car that can't pull a trailer, I had absolutely no way of transporting it home..

 
Læs videre...

from Taurus77 > Paper.Wf Blogs Gaming Tutorial

Menguasai Arena: Panduan Ultimate untuk Dominasi di Game Battle Royale

Dalam lanskap gaming modern, sedikit genre yang mampu menangkap imajinasi global dan mendominasi pasar seperti Battle Royale (BR). Dari sensasi Fortnite yang penuh warna hingga realisme taktis PUBG: Battlegrounds dan intensitas Apex Legends, genre ini telah melampaui statusnya sebagai sekadar “trend” dan menjadi pilar budaya pop.

Inti dari daya tariknya sederhana namun powerful: ketegangan murni. Dijatuhkan ke peta yang luas bersama puluhan pemain lain, dengan hanya satu tujuan—bertahan hidup sebagai orang terakhir (atau tim terakhir) yang berdiri. Elemen “looting” (mengumpulkan persenjataan), “zona yang menyempit” (shrinking playzone), dan ketidakpastian setiap pertemuan menciptakan pengalaman yang unik, penuh adrenalin, dan sangat membuat ketagihan.

Namun, di balik kekacauan yang tampak acak itu, terdapat lapisan strategi, mekanik game, dan pengetahuan meta yang dalam. Banyak pemain terjebak dalam fase “mati terus-menerus” tanpa memahami mengapa. Artikel ini, ditulis oleh para analis game dan mantan pemain kompetitif, dirancang untuk mengubah Anda dari “sasaran empuk” menjadi “kontestan yang disegani”. Kami akan membedah setiap aspek permainan, dari dasar-dasar hingga advanced tips, memberikan Anda blueprint untuk konsistensi dan, yang paling penting, lebih banyak kemenangan.

Taurus77

Memahami Fondasi: Anatomi Sebuah Game Battle Royale Sebelum menyelami strategi kompleks, penting untuk memahami mekanisme inti yang mendefinisi genre ini. Hampir semua game BR modern dibangun di atas pilar-pilar yang sama.

  1. The Drop (Awal Permainan) Momen pertama dan paling krusial. Pemain (solo, duo, atau squad) memulai match dengan terjun dari pesawat atau transportasi udara ke peta. Keputusan di mana dan kapan mendarat akan menentukan menit-menit awal permainan Anda.

Hot Drops: Lokasi dengan konsentrasi loot tinggi (biasanya bernama di peta, seperti “Pochinki” di PUBG atau “Fragment” di Apex Legends). Ini menarik banyak pemain, menyebabkan pertempuran awal yang kacau dan berisiko tinggi. Cocok untuk melatih keterampilan tempur, tetapi tingkat kelangsungan hidupnya rendah. Cold Drops: Lokasi terpencil dengan sedikit pemain. Memungkinkan Anda untuk meloot dengan tenang dan mempersiapkan diri untuk fase pertengahan game, tetapi mungkin tidak memberikan gear terbaik. 2. The Loot (Mengumpulkan Persenjataan & Peralatan) Mengumpulkan sumber daya adalah darah kehidupan mode BR.

Senjata: Setiap game memiliki “weapon meta” yang berbeda. Pelajari senjata mana yang paling efektif (misalnya, senjata assault rifle untuk mid-range, shotgun untuk close-quarters, sniper rifle untuk long-range). Armor (Pelindung): Meningkatkan jumlah damage yang dapat ditahan. Biasanya memiliki tingkatan dari Level 1 (terburuk) hingga Level 3/4/5 (terbaik). Healing Items: Medkit, Shield Battery, Bandage, dll. Penting untuk mempertahankan HP setelah pertempuran. Utility & Mobility Items: Granat, smoke grenade, grappling hook, atau vehicle. Barang-barang ini sering kali menjadi pembeda antara pemain baik dan pemain hebat. 3. The Shrinking Zone (Zona yang Menyempit) Untuk memaksa pemain bertemu dan mencegah permainan yang stagnan, zona bermain yang aman (“circle” atau “zone”) akan terus menyempit secara berkala. Berada di luar zona akan menyebabkan kerusakan terus-menerus (sering kali fatal). Memperkirakan pergerakan zona dan “rotating” (berpindah) lebih awal adalah keterampilan penting.

  1. The Goal: Become the “Last One Standing” Tujuan akhirnya sederhana: eliminasi semua pemain lain. Ini bisa dilakukan melalui pertempuran langsung, strategi positioning, atau kadang-kadang, dengan membiarkan pemain lain saling membunuh.

Strategi & Filosofi Bermain: Pilih Gaya Anda Tidak ada satu cara “terbaik” untuk bermain. Pemain top sering kali mengadopsi atau menggabungkan filosofi berikut berdasarkan situasi.

  1. The Aggressor (The W-Key Warrior)

Gaya: Agresif, selalu mencari pertempuran. Fokus pada eliminasi dan high-kill games. Kelebihan: Sangat meningkatkan skill pertempuran (aim, movement), mendapatkan loot terbaik dari musuh yang dikalahkan, dan memberi tekanan psikologis. Kekurangan: Berisiko tinggi. Satu kesalahan berarti game over. Membutuhkan mekanik game yang sangat kuat. Cocok untuk: Pemain dengan aim yang sangat baik dan refleks cepat.

  1. The Strategist (The Positional Player)

Gaya: Bermain lambat dan metodis. Memprioritaskan positioning yang kuat (high ground, zona aman) di atas konflik langsung. Memilih pertempuran dengan hati-hati dan sering kali “third-partying” (menyerang pemain yang sedang bertarung). Kelebihan: Tingkat kelangsungan hidup yang lebih tinggi, konsistensi untuk mencapai top 10, mengurangi ketergantungan pada aim sempurna. Kekurangan: Mungkin kurang “loot” jika menghindari pertempuran, bisa jadi membosankan bagi sebagian orang, kalah jika terjebak dalam pertempuran terbuka. Cocok untuk: Pemain dengan game sense dan awareness spasial yang kuat. 3. The Adaptor (The Hybrid)

Gaya: Gaya yang paling fleksibel dan sering kali paling efektif. Pemain ini dapat beralih antara agresi dan kesabaran berdasarkan situasi. Mereka mungkin “hot drop” di satu game dan “cold drop” di game berikutnya. Kelebihan: Dapat menghadapi meta apa pun, sangat sulit diprediksi oleh lawan, well-rounded. Kekurangan: Membutuhkan pengalaman luas untuk mengetahui kapan harus bertarung dan kapan harus menghindar. Cocok untuk: Pemain yang telah menguasai dasar-dasar dan merasa nyaman dengan semua aspek game. Meningkatkan Skill Gameplay: Dari Noob ke Pro 1. Kuasai Mekanik Inti (The Unavoidable Grind)

Aim (Tembakan): Ini adalah keterampilan paling dasar. Manfaatkan Aim Trainers seperti Kovaak's atau modus latihan in-game. Fokus pada tracking (mengikuti target) dan flicking (gerakan cepat). Sesuaikan DPI & Sensitivity mouse Anda hingga找到设置 yang nyaman dan konsisten. Movement (Gerakan): Gerakan yang baik membuat Anda menjadi target yang sulit dipukul. Pelajari teknik advanced seperti crouch-spamming (berjongkok-berdiri cepat), slide-jumping (meluncur dan melompat), peeking (mengintip dari balik cover), dan strafing (gerakan menyamping saat menembak). 2. Bangun Game Sense & Situational Awareness Ini adalah aspek kognitif dari gaming dan seringkali lebih penting daripada aim.

Peta Knowledge: Hafalkan peta. Tahu di mana loot bagus berada, di mana tempat berkumpulnya pemain, titik rotasi alami, dan posisi high ground terbaik. Audio Awareness: Gunakan headphone berkualitas baik. Arah datangnya suara langkah kaki, tembakan, dan kemampuan adalah informasi intelijen terpenting Anda. Anda dapat mendengar dari mana musuh datang sebelum melihat mereka. Minimap & Circle Prediction: Selalu perhatikan peta kecil. Perkirakan di mana zona berikutnya akan berada dan mulai rotasi lebih awal. Jangan pernah berada di tepi zona saat akan menyempit. 3. Komunikasi & Teamplay (Untuk Mode Duo/Squad) Battle Royale adalah game tim. Kemenangan squad dibangun di atas komunikasi.

Ping System: Gunakan fitur ping (penanda) secara agresif untuk menandai musuh, lokasi, loot, atau tujuan tanpa harus berteriak di mikrofon. Callouts yang Jelas: Komunikasikan informasi dengan singkat dan jelas. “Satu orang di utara, di belakang batu, 50 meter, rendah HP” jauh lebih baik daripada “ADA ORANG NIH!” Synergy & Role: Dalam tim yang terorganisir, pemain sering mengambil peran khusus (IGL – In-Game Leader, Support, Fragger). Pahami kekuatan Anda dan berperanlah untuk tim. Mental & Fisik: Performa Puncak Seorang Gamer Kesehatan mental dan fisik adalah “hidden stats” yang sering diabaikan.

Mindset & Tilting: “Tilting” adalah keadaan frustrasi yang menyebabkan penurunan performa. Jika Anda kalah beruntun, beristirahatlah. Berdiri, regangkan tubuh, minum air. Jangan memaksakan diri. Review & Analisis: Setelah mati, tanyakan mengapa Anda mati. Apakah karena posisi yang buruk? Aim yang meleset? Gunakan fitur replay atau recording untuk menganalisis kesalahan Anda. Ini adalah cara tercepat untuk berkembang. Kesehatan Fisik: Pastikan postur Anda baik, layar berada pada ketinggian mata, dan Anda memiliki pencahayaan yang memadai. Kelelahan mata dan tubuh yang kaku akan secara signifikan mengurangi waktu reaksi dan konsentrasi Anda. Kesimpulan: Perjalanan Menuju Victory Royale Dominasi di game Battle Royale bukanlah tentang menemukan “cheat code” atau trik rahasia. Ini adalah perjalanan penguasaan yang bertahap—sebuah maraton, bukan sprint. Ini tentang membangun fondasi mekanik yang solid, mengasah game sense yang tajam, memelihara mental yang tangguh, dan, yang terpenting, belajar dari setiap kekalahan.

Terlepas dari apakah Anda adalah Aggressor yang mencari sensasi high-kill game atau seorang Strategist yang dengan sabar menunggu saat yang tepat untuk menyerang, ingatlah bahwa tujuan utamanya adalah untuk bersenang-senang. Kompetisi dan perbaikan diri adalah bagian dari kesenangan itu.

Slot Gacor Hari Ini

Jadi, pasang headset Anda, kencangkan ikat pinggang Anda, dan terjunlah ke arena. Peta menunggu, dan dengan pengetahuan dari panduan ini, Anda sekarang lebih siap dari sebelumnya untuk menghadapi segala tantangannya. Siapa tahu, Victory Royale berikutnya mungkin akan ada nama Anda. Semoga berhasil, dan selamat bertanding!

 
Read more...

from Weekly writing reflection

Went to the post office and dropped off more trash/compost.

Spoke with a very famous academic related to my research on the phone. That was very cool.

Tried writing, nothing really substantial though. Just lots of messy notes. I'm going to share what I wrote so you can get a sense of what it often looks like when I free write:

 

an alternative history to how the internet became personal

  -so theres how I want to apply this notion. -sets the limits of what is considered acceptable behavior -it gives personal information meaning and stakes. I echo sociomaterial approaches to user practices and assert that how it is how information is used that makes it remarkable.

-I am influenced by the essay, Closer to the Metal, as this essay similarly emphasizes cultural histories through materials. But this materiality is not separable from the cultures, discourses, institutions, that equally have developed doxing as a digital counterpractice and counterartifact. -a dox, like spam (compare it to how Brunton discusses spam).... -Further, the response to doxing, also makes doxing what it is. The way that doxing, like fake news, becomes a prejorative can be thrown on an investigative journalist its disagreed with. -I argue that the practice of doxing is what brought to light the opacity and ambiguity embedded in previously presumed anonymous and apolitical communication systems technologies and mediums. -pastebins/ portals -xbox live -search engines -IP addresses: an IP address is just a string of numbers, its power comes with how its applied. IP address: whois/ -how you found an IP address -where you published it -the response to it. -VPN services. the marketing of it. cybersecurity, online safety groups, services like Deleteme, promote themselves through the potential threat of being a victim to doxing, hacking, and scams. Mcafee, Deleteme, Doxing is a history of how the internet became personal. Just like how this account is one history of doxing, doxing is just one way of telling the history of how the internet became personal. However, I argue that this telling of doxing isn't to overshadow other accounts, but to inform them, help them expand their contours. Other ones being: -identity fraud -content influences, personal branding. -surveillance , targeted and mass surveillance. alternative cultures are important to internet history that still to this day inform internet governance and discourse. Doxing origins. Literature on Doxing Approaching doxing through materiality: platforms: pastebins tools: Who is/ -history of how the computer became personal -Finn Brunton

Tother thing about doxing history is a personal history of the internet is because of the importance of personal to the definition of culture wars. This is exactly why doxing is such a potent tool that upholds culture wars. Because culture wars are all about personalizing a social issue. Masking contributes to the moral panic. There is then this cyclical nature where masks used to protect themselves from surveillance become the point of interest to doxing someone.

People search engines Platforms: Pastebin -archive, dump, trash, portal IP addresses: -bulletin board > phone numbers -whois/ function -Cybersecurity VPN Video games? Masks: how a physical object comes to be important to internet history is going to be a difficult framework to develop. It involves thinking about how an analog object is important to the internet. -the masked hacker -black bloc -KKK/ Far right mask -V for Vendetta -If I take this as a chapter i will have to acknowledge the racialized element of the black hoodie/ masking. However I need to try and do this while asserting why race isn't my object of focus.

Nooney's book Apple II Age: How the Computer Became Personal, orients her history through individual ownership of computers, speciifically through 1960s-1970s electronic hobbyists. She then goes to examine the role of profit-seeking in the proliferation of computers, enveloped by entrepreneurs and preestablished electronic companies. Her book is not oriented by individual events or inventors, but instead focuses on the habits, contexts and practices of computers. “By foregrounding these broader themes and phenomena, this account emphasizes habits, contexts, and practices rather than individual events or inventors. In doing so, this chapter parses what was actually important in the history of computing as it contributed to the development of the Apple II. As we will see, what was important wasn’t always just technological concerns.” (Nooney, 2025, p. 21).

So right now i've been writing about pastebins. But i'm also curious if I should switch to writing about IP addresses.? I'm nervous that I can't make a case as to why Pastebins are important even though Pastebins exist now. I need to figure out a way to explain how looking at a history is relevant to now. IP addresses and Pastebins still exist.
-I think it'd be interesting to look at the response to doxing. Cybersecurity and online safety organizations and the imagery, language they use as well as the tools they suggest. So I guess making some connection between the relevance of cybersecurity marketing and online safety governance/moderation in regards to doxing is one way. I could look at the emphasis on using VPNS, the fear of hackers that develop the image of the doxer. The emphasis on this imagery as a marketing scheme obfuscates the divisively socially political nature of cybersecurity
How doxing has come to be defined through the image of the doxer, the panic of being doxed, and overemphasizes mainstream social media and VPNs that end up diswaying and ignoring materials and conditions that make doxxing what it is today. People come to doxing from different political and cultural positions. That is too broad.

There is acknowledging pastebins, and using doxing and pastebins to consider portals that circumvent moderation boundaries and the role of repurposing technologies that then point to a larger issue

Theres one article framework that looks at takes doxing, positions it as important to the history of the internet, and focuses on the role of cybersecurity media, marketing and online safety policy?

Options:
-doxing and the role of repurposing technologies (take one technology? or take two?). This would then have to point to a larger argument and showcase its relevancy to the now.
-analyzing the moral panic and discourse around doxing. doxing,media representations/discourse of doxing and the doxer, institutional, organizational responses to doxing,
-doxing and its role in the history of how the internet became personal. I'd have to pick a time frame, and two objects/phenomena/conditions, and then figure out how that is important to this day
-doxing and something about the impoortance of cybersecurity industry and hacker culture to contemporary digital media studies.

-I find it interesting that pastebins aren't really written about
-I find it interesting how the role of cybersecurity and security discourse isn't discussed much
-I find it interesting to think about doxing through materials
-I find it interesting to think about how doxing has made the internet personal
-I find it interesting to figure out a way to hold a critique of the marketing, rhetorics of cybersecurity regarding doxing. Something about how doxing is spoken about, addressed, and the tools used to protect from it, end up defining and reifying doxing/developing its meaning.

The discourse, responses, and panics of doxing actively shapes what doxing becomes, what technologies get used for it, and how the practice gets governed.
platform design, use, moderation.

 

when the same infrastructure serves both legitimate and transgressive purposes simultaneously?

 

Use cybersecurity marketing/discourse to examine how doxing gets defined and understood in ways that shape platform governance, user behavior, and internet culture.

How “security solutions” obscure the social/political dimensions of doxing

how industry discourse shapes cultural understanding of digital practices.

moral panic becomes a material reality.

narratives of doxing actively shapes what doxing becomes, what technologies get used for it and how it gets governed.

Platform design response

The technical “solutions” to doxing.

Panic about doxing creates specific policies and enforcement practices that materially change platform affordances.

 

social meanings and technical systems co-evolve

 

Sociomateriality + user practice + co-evolution suggests asking:

  • How do users and technologies mutually shape each other over time?
  • What happens when technologies get used in ways that change their social meaning?
  • How do material affordances enable new social practices that then reshape the technology?

 

How do [specific technology] and [specific social practice] co-evolve, and what does this reveal about how digital technologies acquire social meaning?

 

PRactices of doxing foreshadowed what the internet was capable of being/doing.

 
Read more...

from Sobre privacidad

Recurrentemente se hace patente el debate sobre privacidad y sobre todo la cuestión de su materialización en alguno o muchos usos de tecnología, en particular la comunicación e intercambio de información con otros.

Pareciera en ocasiones que la privacidad es algo inherente y perteneciente al ámbito tecnológico y de ahí se deduce que son los meros deseos de tecnófilos enmascarados y encapuchados. Sin embargo y para sentir la presencia de la privacidad en entornos “no tecnológicos”, podemos tratar de imaginar como nos sentiríamos si cuando estemos abriendo el buzón en nuestra casa, un desconocido se acerca por detrás a mirar por encima de nuestro hombro para ver que hemos recibido, y si lo hace cuando estemos leyendo alguna de las misivas pensaríamos que eso es el colmo.

Voy a publicar a continuación una reelaboración, reescritura, lo que sea de un artículo que publiqué hace algún tiempo en una web que ya no existe, y que en su momento no tuvo repercusión ninguna, incluso creo que no tuvo ninguna lectura.

El diccionario de la Real Academia Española (R.A.E.) en su segunda acepción, define la privacidad como “el ámbito de la vida privada que se tiene derecho a proteger de cualquier intromisión”. Es una definición que se entiende bastante bien, pero además se intuye la presencia de la ley para regular ese derecho a proteger.

Para empezar, la Declaración Universal de Derechos Humanos, articulo 12 dice:

Nadie será objeto de injerencias arbitrarias en su vida privada, su familia, su domicilio o correspondencia, ni de ataques a su honra y su reputación. Toda persona tiene derecho a la protección de la ley contra tales injerencias o ataques.

En nuestro ámbito estatal (España), la Constitución en su artículo 18 dice:

  1. Se garantiza el derecho al honor, a la intimidad personal y familiar y a la propia imagen.
  2. El domicilio es inviolable. Ninguna entrada o registro podrá hacerse en él sin consentimiento del titular o resolución judicial, salvo en caso de flagrante delito.
  3. Se garantiza el secreto de las comunicaciones y, en especial, de las postales, telegráficas y telefónicas, salvo resolución judicial.
  4. La Ley limitará el uso de la informática para garantizar el honor y la intimidad personal y familiar de los ciudadanos y el pleno ejercicio de sus derechos.

Bueno, aunque siempre podemos pensar que esta garantía es un poco así (ver artículo 47 sobre el derecho a la vivienda digna).

En cualquier caso, hay leyes y normas que respaldan el derecho pero no lo secuestra (por ahora), es decir que tenemos margen para ocuparnos nosotros mismos de ello, y realmente lo hacemos, al menos en ámbito “analógico”.

Todavía podemos hacer uso de cortinas en el interior de nuestras casas: crean ambientes y pueden preservar el interior de miradas ajenas. Así mismo tenemos a nuestra disposición la posibilidad de cerrar la puerta de nuestra casa, ya estemos dentro o estemos fuera de ella.

Parece extraño, pero pagar con dinero en efectivo puede ser un medio de preservación de la privacidad: si pagas por medios telemáticos dejas rastro de donde, cuando, quien, el importe, y el concepto.

Además creo que debemos luchar por seguir haciendo uso de estos y otros medios que se nos ocurran, por ahora (2025), todavía se puede hacer. ¿Qué haríamos si el gobierno prohibiera el uso interior de cortinas en las ventanas?, ¿tapiarlas?... Hagamos uso de nuestros derechos y protejamos nuestra privacidad.

 
Leer más...