#Access software inc
Explore tagged Tumblr posts
Text

UK 1998
#UK1998#IONOS#LARIAN STUDIOS#MOUNTAIN KING STUDIOS INC.#TOTALPLAY SOFTWARE#LAVAMIND#STRATEGY#ACTION#IBM#MACINTOSH#ZAPITALISM#DEMONSTAR#WARHEADS#L.E.D. WARS#INSTANT ACCESS
11 notes
·
View notes
Text
youtube
The Miraculous Horror of Stop Motion
From the same artform that brought you Coraline and Rudolph the Red-Nosed Reindeer, comes three stories that evoke the existential fear of art.
Original Music by Molly Noise
Bibliography below
Atrocity Guide. “The Animators Who’ve Spent 40 Years on a Single Film.” YouTube, 9 Oct. 2021, www.youtube.com/watch?v=73hip3pz0Xs&pp=ygUMdGhlIG92ZXJjb2F0. Accessed 19 June 2024.
Brubaker, Charles. “The Japanese Studios of Rankin/Bass.” Cartoon Research, Jerry Beck, 14 Apr. 2014, cartoonresearch.com/index.php/the-japanese-studios-of-rankinbass/.
Bute, Paris. “Introduction to “a Rankin/Bass Retrospective from a New Perspective.”” Citizen Jane, Stephens College, 19 Nov. 2021, www.citizenjane.org/home/cwwicd2ucb2fvs64kgfaocfykjhaum. Accessed 19 June 2024.
Crome, Althea. “Coraline.” Althea Crome | Micro Knitter, 2012, www.altheacrome.com/coraline. Accessed 19 June 2024.
Harold Halibut. Directed by Onat Hekimoğlu, Slow Bros., 16 Apr. 2024.
Hekimoglu, Onat, and Gabriel Schmitz. “Unite Berlin 2018 - Harold Halibut and Making a Stop Motion Game.” Unity, YouTube, 6 Aug. 2018, youtu.be/9usssSQc0wQ. Accessed 6 May 2023.
Jon "Sikamikanico" Clarke. “The Making of Harold Halibut.” XboxEra, YouTube, 21 Mar. 2024, youtu.be/WMyxM9t3o7A. Accessed 19 June 2024.
LAIKA Studios. “Sweater and Gloves: Knitting Coraline by Hand.” YouTube, 11 July 2017, youtu.be/zUvkfcGR-7U. Accessed 19 June 2024.
Mad God Productions. “Phil Tippett’s “Mad God.”” Kickstarter, 17 May 2012, www.kickstarter.com/projects/madgod/phil-tippetts-mad-god/posts.
Olson, Mathew. “Report: Michel Ancel Accused of Abusive, Disruptive Practices on beyond Good & Evil 2.” VG247, 25 Sept. 2020, www.vg247.com/report-michel-ancel-accused-of-abusive-disruptive-practices-on-beyond-good-evil-2. Accessed 19 June 2024.
Ono, Kosei. “Tadahito Mochinaga: The Japanese Animator Who Lived in Two Worlds.” Animation World Network, AWN, Inc, 1 Dec. 1999, www.awn.com/animationworld/tadahito-mochinaga-japanese-animator-who-lived-two-worlds.
Orland, Kyle. “Claptrap Voice Actor Accuses Gearbox CEO of Assault, Underpayment.” Ars Technica, 7 May 2019, arstechnica.com/gaming/2019/05/claptrap-voice-actor-accuses-gearbox-ceo-of-assault-underpayment/. Accessed 19 June 2024.
Pilling, Jayne. A Reader In Animation Studies. Indiana University Press, 1998. Project MUSE muse.jhu.edu/book/40033.
Prehistoric Beast. Directed by Phil Tippett, Tippett Studios, 1984. https://www.youtube.com/watch?v=hlaXIRTjNfo
Randles, Jonathan. “VFX Studio with Star Wars, Jurassic Park Credits Goes Bankrupt.” Bloomberg Law, 1 May 2024, news.bloomberglaw.com/bankruptcy-law/vfx-studio-with-star-wars-jurassic-park-credits-goes-bankrupt. Accessed 19 June 2024.
Shanley, Patrick. “Gearbox Software CEO Accused of Contempt in Latest Filing.” The Hollywood Reporter, 27 Aug. 2019, www.hollywoodreporter.com/business/digital/gearbox-software-ceo-accused-contempt-latest-filing-1235064/. Accessed 19 June 2024.
The Making of “Jurassic Park.” Directed by John Schultz, Amblin Entertainment, 1995. https://youtu.be/8r01mk6F_Pk
The Making of Mad God. Directed by Maya Tippett, Shudder, 2021. https://youtu.be/sfUOHh0xmwc
The Tale of the Fox. Directed by Irene Starewicz and Ladislas Starevich, UFA GmbH, 10 Apr. 1941. https://youtu.be/Us_Pn6Q1dBQ
Wikipedia contributors. "List of films with longest production time." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 12 Jun. 2024. Web. 19 Jun. 2024.
Wikipedia contributors. "List of media notable for being in development hell." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 19 Jun. 2024. Web. 19 Jun. 2024.
Wikipedia contributors. "List of Rankin/Bass Productions films." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 9 Jun. 2024. Web. 19 Jun. 2024.
Wikipedia contributors. "Tadahito Mochinaga." Wikipedia, The Free Encyclopedia. Wikipedia, The Free Encyclopedia, 28 Nov. 2023. Web. 19 Jun. 2024.
Wilson, Josh. “Phil Tippett: 24 Frames per Second < the Fabulist Words & Art.” The Fabulist Words & Art, 5 Nov. 2021, fabulistmagazine.com/24-frames-per-second-the-phil-tippett-interview/.
Worse than the Demon. Directed by Maya Tippett, Shudder, 2013. https://youtu.be/ghKqvDNRe4c
#video#video essay#youtube#stop motion#harold halibut#Mad God#phil tippett#Rankin Bass#laika studios#Animation#The Overcoat#yuri norstein#Francheska Yarbusova#Youtube
217 notes
·
View notes
Text
ANDROID! ALEXA-THEMED! WORSHIPPER YANDERE! LEVI x SHUT IN! READER
cws : yandere themes, manipulation (??), obsessive behavior, code breaking, implied dissociation, confining, dubcon, multiple creampie, slight dacryphilia, dry humping, levi can vibrate, marking, levi cums A LOT, levi bites you, levi’s a little mean in the beginning bc he’s pissed.
a/n : i pasted this to the wrong thing and after i’d finished editing it to look good, id realized. i did NOT wanna re-paste and edit so this was a request that id gotten for PulseMotion Inc.
“[name], come out. i won’t hurt you.” your hand shakily reaches up to cover your mouth, effectively silencing your breathing as thudding footsteps turn down the hallway you’d foolishly decided to hide in. the lock on the closet door wouldn’t do much — levi could rip the door off its hinges if he so desired. you screw your eyes shut in fear as his footsteps slow, coming to a stop outside the closet door. you wait with bated breath as silence ensues, then muffle a sob beneath the palm you have clasped over your mouth as you watch the doorknob jiggle. oh, you were so fucked.
you wonder for a moment where everything went wrong. was it when levi had that software update? was there a wire firing incorrectly? or was he faulty from the beginning? maybe that’s why he was on clearance.
you find yourself remembering where this all began. you’d been perusing through the pages of PulseMotion’s website just to see what they had, only to find that you could buy a month’s worth of food at the base price they sold their android companions for. unsatisfied, you turned to their clearance section. it was there you found levi.
levi was inspired by the alexa echo dot from amazon, but he was far more advanced. he had a physical body, superhuman strength, and cold, dead eyes that followed your every move. the creators had given him the ability to access locks, security systems, cameras, and so on to ensure the safety of whoever purchased him — but it only served to royally fuck you over even more.
you’d impulsively purchased levi that evening. at the time, you didn't know that buying the android would ruin your life. you had just gotten paid and saw that he was on clearance, and thought that it was a good deal. you didn't think anything would go wrong.
everything was fine in the beginning. the two of you slowly became acquainted, the android did what he was supposed to, and that was that. levi, as he'd told you, was on clearance for a reason-- there was something seriously wrong with him.
levi was was initially very sweet, even if he could be intimidating at times. he always reminded you to eat and would charge your devices without you needing to say a word. he even locked your doors for you for christ's sake! you thought you'd lucked out.
you suppose things started going wrong when he powered off for his quarterly system update a few months ago. he was fine before that. after he'd restarted his system, his eyes briefly flashed red, the company insignia disappearing for but a moment. it happened so quickly that, for a second, you thought you had imagined it. you made sure to ask him if everything was okay, but he only brushed it off and returned to his daily cleaning. after that, he never left your side.
every time you tried to get out of your shell and make friends, levi coincidentally informed you of a new game or a new movie, or even suggested that the two of you do an activity together. sometimes, he would inform you of something that needed to be fixed, but when you tried to take him to the repair shop, he insisted that it was easy enough to do yourself. you believed him of course, he surely had only your best interests in mind, or so you thought. in hindsight, you realize that his actions were entirely selfish in nature. maybe he’d even fooled you into helping him with some coding he had trouble bypassing. at this point, you wouldn’t put it past him.
it had been like this for the last few months. you probably should have seen the red flags, but why would you? it wasn’t as if he wanted to harm you. his programming did seem a little odd of course, but every time you checked, there was nothing to suggest otherwise. it was only natural you had to acclimate to his odd behavior.
as time went on, and levi had become more crafty with his excuses, you’d gotten fed up. for the first time in awhile, you’d finally been comfortable enough to go out on a date, but as per usual, levi intercepted you in the living room. he spouted some nonsense about wanting to watch a new series he thought you would like, but before he’d even finished his sentence, you shut him down.
you remember the way the insignia flickered in his eyes, but at that point you were too frustrated with him to bother with what that minute entail. you only spun on your heels and stormed off, tugging on the front door and finding that it was locked. anxiety and unease washed over you, and with a creeping feeling of being watched as you slowly looked up at the camera. you remember levi’s voice ringing out from behind you, slowly stalking up to you with a frown that tugged too tightly around his artificial skin.
everything that happened after that was a blur. you don’t really remember how you ended up in the closet, but it took everything in you to stay quiet. your mind was reeling as the behavior displayed over the last few months suddenly made sense — you were horrified. how did you not put two and two together?
you’re snapped back into reality as levi sighs outside of the closet door. his voice sounded too sweet, too calm for the situation at hand. “[name], don’t make me break down this door.”
you silently pray to every being you can think of, begging them to let him move to a different room so you can plan your escape. alas, your prayers were unanswered as the door is ripped off the hinges in the blink of an eye. you would’ve found the sight comical — a short man such as himself holding up a door nearly twice his size — if it weren’t for the reality of your situation.
“great, now i’ll have to clean this up and fix it. you’re really a pain in my ass sometimes.” levi grumbles as he gazes down at you through narrowed eyes, drinking in the sight of the way you were shaking like a leaf. “get up.”
you can’t bring yourself to move, much less tell him to go fuck himself. you’re torn between anger and unadulterated fear — the latter putting you in fight or flight. unfortunately for you, your response was a secret third option: freeze. levi only huffs, leaning down and reaching for your wrist, grumbling something under his breath.
you’re finally able to move, shuffling away from him as much as the cramped space in the closet would allow, blindly pushing at his hands as tears blur your vision. levi only
clicks his tongue, his fingers deftly wrapping around your wrist as he hoists you up. he tugs you out of the closet and down the hallway, bitching to you about something you couldn’t be bothered to focus on. you tried to pry his fingers from around your wrist, scratching and beating and doing anything within your power to keep him from dragging you wherever it was he wanted you. it was futile.
as levi drags you to your room, gently pushing you onto your bed, you realize that there was nothing you could do; you couldn’t win against him. your mind works on overdrive, twisting and turning in an attempt to gauge his intent, and with the way his eyes had become hooded… you could confidently say that you wouldn’t like where this was headed.
“h—hey. no. i’ll stay— i’ll stay home, just please don’t—“ you’re interrupted by levi’s chilled fingers wrapping around your wrists as he leans down and slots his lips to yours. scrunching your nose in distaste as he feverishly engages in a one-sided makeout, you attempt to wriggle your way out of his grip. it’s safe to say that you failed, but at least you tried.
levi’s free hand travels down your chest, over your tummy, and finds purchase on the meat of your hip. he gently, experimentally rolls his hips into yours, searching for the place that would have you melting into his touch. with ease, the android’s cockhead brushes over your clit, shooting a wave of pleasure down your spine.
“levi…stop—“ a whine parts your lips as levi’s shaft begins vibrating, the sensation muddling your thoughts as you begin to wonder whether you wanted this or not. as you battle yourself internally, levi ruts against you faster, the both of you coming closer and closer to your climax.
the android’s lip brush against your throat, heatedly nipping and sucking in places for long enough that you were sure there would be marks tomorrow.
“‘m gonna cum— baby, cum with me. please, please, please cum with me!” levi begs, the speed at which his shaft was vibrating increasing. your back arches into the sensation as levi lets out a loud whine, your jaw agape as your orgasm crashes over you. you stumble over curses, your eyes rolling into the back of your head as levi’s cock never once stops vibrating.
“gonna overstimulate me— s’too much!” you protest, feeling levi’s cum wet your pants. just how much does this guy cum anyway?
levi stops rutting against you, all but ripping away the confines of your clothing as well as his own before aligning himself with your entrance. “need it. need it so bad— i’ve been waiting for so long…”
he slowly slides into you, your gummy walls eagerly sucking him in despite your own confusion, forcing a choked whimper from levi’s lips. he shallowly thrusts into you, the sensation of overwhelmingly delicious; you’d never felt so full, so good. levi’s shaft pulsed this time, vibrating for a few moments on and off, his tip reaching places you’d never be able to reach with your own two hands.
you melt into the feeling, your own pleasure drowning out every thought of protest as levi begins to pick up the pace. he removes his fingers from your wrists, the flesh red and angry, and presses down on your tummy where his cock would be. the vibration switches again, his hips snapping into yours now, and he lets out a loud groan as his orgasm washes over him. levi never once stops as he pumps you full of his cum, his fingers digging into your hips as he whimpers out mumbled gibberish.
with ease, levi switches your position, putting you on your knees and pushes back inside of you. he forces you to meet his thrusts, and the new angle has your fingers gripping the sheets, your jaw hanging open in silent pleasure. you can’t think about anything — only how good levi was able to make you feel.
“levi— ‘m cumming!” you cry out, your thighs shaking and cunt clenching around him. tears prick your eyes and spill down your cheeks, the feeling too much for you to handle.
“y’look so pretty when you cry.” levi chokes out, his eyes closing in bliss as his cock twitches inside of you. your cunt pulses around levi, sending shivers down his spine as his motherboard goes into overdrive in an attempt to cool him down. rutting into you at an inhuman pace, levi’s thrusting grows sloppy, reaching one hand around to press a finger to your clit, the artificial skin vibrating as well.
“cum f’me… j—just one more time! please— please, need it so bad..!” levi whines, expertly circling your clit in an attempt to have you cum with him. “y—you’ll tell me when y’close, okay? wanna cum with you.”
all you can do is nod, your mind melting at every sensation. levi presses your back against his sculpted chest, linking his arm under one of your thighs and hoists it up, thrusting more harshly as his tongue darts out to lap at the tears staining your cheeks.
“y’feel so fuckin’ good.” he whimpers, pressing chaste kisses to the flushed skin of your shoulders. “‘m gonna cum. baby, ‘m gonna cum—“
before you’re able to register it, your vision flashes white, a high-pitched whine parting your lips as ecstasy crashes over you.
“cumming! ‘m cumming!!” levi babbles, whimpers and whines of his own being muffled by your skin as he bites down on the curve of your shoulder in an attempt to silence himself. cum trickles down your thighs and stains the sheets as his thrusting comes to a stop, a quiet sniffle resounding from behind you.
the android gently lays you down, your eyes growing heavy as the bliss slowly leaves your system, and you can’t find it in you to care about the date you wanted to go on anymore. your lashes flutter shut as levi leaves the room and quietly returns with a damp cloth, tenderly cleaning you up as you drift off to sleep.
#500 followers event#500 followers#PulseMotion Inc.#male yandere#tw yandere#personal headcanon#levi attack on titan#yandere x reader#levi aot#levi x reader#levi ackerman#snk levi#yandere headcanons#yandere levi headcanons#yandere levi ackerman#yandere levi x reader#yandere levi smut#yandere levi#levi ackerman headcanons#levi ackerman hc#levi ackerman aot#yandere teratophilia#yandere robot#yandere terato#yandere monster#yandere aot x reader#yandere aot#yandere snk smut#yandere aot smut#yandere snk
318 notes
·
View notes
Text
licensing all my posts under the GPL from now on
GNU GENERAL PUBLIC LICENSE
Version 3, 29 June 2007
Copyright © 2007 Free Software Foundation, Inc. <https://fsf.org/>
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
Preamble
The GNU General Public License is a free, copyleft license for software and other kinds of works.
The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, the GNU General Public License is intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users. We, the Free Software Foundation, use the GNU General Public License for most of our software; it applies also to any other work released this way by its authors. You can apply it to your programs, too.
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.
To protect your rights, we need to prevent others from denying you these rights or asking you to surrender the rights. Therefore, you have certain responsibilities if you distribute copies of the software, or if you modify it: responsibilities to respect the freedom of others.
For example, if you distribute copies of such a program, whether gratis or for a fee, you must pass on to the recipients the same freedoms that you received. You must make sure that they, too, receive or can get the source code. And you must show them these terms so they know their rights.
Developers that use the GNU GPL protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License giving you legal permission to copy, distribute and/or modify it.
For the developers' and authors' protection, the GPL clearly explains that there is no warranty for this free software. For both users' and authors' sake, the GPL requires that modified versions be marked as changed, so that their problems will not be attributed erroneously to authors of previous versions.
Some devices are designed to deny users access to install or run modified versions of the software inside them, although the manufacturer can do so. This is fundamentally incompatible with the aim of protecting users' freedom to change the software. The systematic pattern of such abuse occurs in the area of products for individuals to use, which is precisely where it is most unacceptable. Therefore, we have designed this version of the GPL to prohibit the practice for those products. If such problems arise substantially in other domains, we stand ready to extend this provision to those domains in future versions of the GPL, as needed to protect the freedom of users.
Finally, every program is threatened constantly by software patents. States should not allow patents to restrict development and use of software on general-purpose computers, but in those that do, we wish to avoid the special danger that patents applied to a free program could make it effectively proprietary. To prevent this, the GPL assures that patents cannot be used to render the program non-free.
The precise terms and conditions for copying, distribution and modification follow.
TERMS AND CONDITIONS
0. Definitions.
"This License" refers to version 3 of the GNU General Public License.
"Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.
"The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals or organizations.
To "modify" a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a "modified version" of the earlier work or a work "based on" the earlier work.
A "covered work" means either the unmodified Program or a work based on the Program.
To "propagate" a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.
To "convey" a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.
An interactive user interface displays "Appropriate Legal Notices" to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.
1. Source Code.
The "source code" for a work means the preferred form of the work for making modifications to it. "Object code" means any non-source form of a work.
A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.
The "System Libraries" of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A "Major Component", in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.
The "Corresponding Source" for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those subprograms and other parts of the work.
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.
The Corresponding Source for a work in source code form is that same work.
2. Basic Permissions.
All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.
You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.
Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.
When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.
4. Conveying Verbatim Copies.
You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.
You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.
5. Conveying Modified Source Versions.
You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:
a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to "keep intact all notices".
c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.
A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an "aggregate" if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.
6. Conveying Non-Source Forms.
You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:
a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge.
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.
e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.
A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work.
A "User Product" is either (1) a "consumer product", which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, "normally used" refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.
"Installation Information" for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.
If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).
The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.
Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.
7. Additional Terms.
"Additional permissions" are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.
When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.
Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms:
a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or
b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or
c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or
d) Limiting the use for publicity purposes of names of licensors or authors of the material; or
e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or
f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.
All other non-permissive additional terms are considered "further restrictions" within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying.
If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.
Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.
8. Termination.
You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).
However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.
9. Acceptance Not Required for Having Copies.
You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.
10. Automatic Licensing of Downstream Recipients.
Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.
An "entity transaction" is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.
You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.
11. Patents.
A "contributor" is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's "contributor version".
A contributor's "essential patent claims" are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, "control" includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.
In the following three paragraphs, a "patent license" is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To "grant" such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.
If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent license to downstream recipients. "Knowingly relying" means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.
If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.
A patent license is "discriminatory" if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.
Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.
12. No Surrender of Others' Freedom.
If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.
13. Use with the GNU Affero General Public License.
Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU Affero General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the special requirements of the GNU Affero General Public License, section 13, concerning interaction through a network will apply to the combination as such.
14. Revised Versions of this License.
The Free Software Foundation may publish revised and/or new versions of the GNU General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU General Public License "or any later version" applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU General Public License, you may choose any version ever published by the Free Software Foundation.
If the Program specifies that a proxy can decide which future versions of the GNU General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.
Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.
15. Disclaimer of Warranty.
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
16. Limitation of Liability.
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
17. Interpretation of Sections 15 and 16.
If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
36 notes
·
View notes
Text

Aisha Bowe, a trailblazer in aerospace engineering, has made significant contributions to science and serves as an inspiring figure in Black history. Born to Bahamian immigrants in Ann Arbor, Michigan, Bowe’s journey to prominence began at a community college, where her aptitude for mathematics propelled her toward engineering. She earned both a bachelor’s degree in aerospace engineering and a master’s in space systems engineering from the University of Michigan. 
At NASA’s Ames Research Center, Bowe contributed to developing algorithms supporting Air Traffic Management. Her work earned her the National Society of Black Engineers’ Outstanding Technical Contribution award in 2012. Beyond her technical achievements, Bowe mentored students through the Mathematics, Engineering, Science Achievement (MESA) Program, demonstrating her commitment to fostering the next generation of engineers. 
In 2013, Bowe founded STEMBoard, a technology company addressing complex challenges for government and private sector clients. Under her leadership, STEMBoard ranked 2,284th on Inc. magazine’s 2020 list of the 5,000 fastest-growing private companies. Bowe also launched LINGO, a coding kit designed to teach hardware and software design, making STEM education more accessible to underrepresented youth. 
In 2025, Bowe is set to make history as part of Blue Origin’s first all-female crewed spaceflight, alongside notable figures such as singer Katy Perry and journalist Gayle King. This mission will mark the first human-crewed spaceflight with no men since 1963, highlighting Bowe’s role in breaking barriers and inspiring future generations. 
Aisha Bowe’s journey from community college to aerospace engineer and entrepreneur exemplifies resilience and dedication. Her efforts in promoting STEM education and her upcoming spaceflight solidify her status as a pivotal figure in science and Black history.
#black history month#ambitious women#black history#black women#black science#black scientists#black scientist#beautiful women#beauty#glow society#the glow society#fit beauty#health#self love#self improvement#self care#women’s health#international women's day#womens#workouts for women#gorgeous women#big boss#stem#stemblr#women in stem#stem academia#stem student#stem aesthetic#stem studyblr#stemeducation
23 notes
·
View notes
Text
"Automattic Inc. and its founder have been sued by a WordPress hosting company that alleges an extortion scheme to extract payments for use of the trademark for the open source WordPress software. Hosting firm WP Engine sued Automattic and founder Matt Mullenweg in a complaint filed yesterday in US District Court for the Northern District of California.
"This is a case about abuse of power, extortion, and greed," the lawsuit said. "The misconduct at issue here is all the more shocking because it occurred in an unexpected place—the WordPress open source software community built on promises of the freedom to build, run, change, and redistribute without barriers or constraints, for all."
The lawsuit alleged that "over the last two weeks, Defendants have been carrying out a scheme to ban WPE from the WordPress community unless it agreed to pay tens of millions of dollars to Automattic for a purported trademark license that WPE does not even need."
The complaint says that Mullenweg blocked WP Engine "from updating the WordPress plugins that it publishes through wordpress.org," and "withdrew login credentials for individual employees at WPE, preventing them from logging into their personal accounts to access other wordpress.org resources, including the community Slack channels which are used to coordinate contributions to WordPress Core, the Trac system which allows contributors to propose work to do on WordPress, and the SubVersion system that manages code contributions."
The lawsuit makes accusations, including libel, slander, and attempted extortion, and demands a jury trial. The lawsuit was filed along with an exhibit that shows Automattic's demand for payment. A September 23 letter to WP Engine from Automattic's legal team suggests "a mere 8% royalty" on WP Engine's roughly $400 million in annual revenue, or about $32 million."
31 notes
·
View notes
Text
and so it begins...! (music isn't part of the ukagaka, it's I Have No Voice Actor And I Must Scream by VILF. i just felt it was appropriate)
[Video transcription under cut]
[Video transcription:
"Terminal window":
"Welcome. Installing Aster Assistant Software [Version RC-20XX-10-09 Build 27519 AI Node 57158B]… TerraByte Inc. (c) 20XX All Rights Reserved Thank you for choosing Aster Assistant Software! As part of presentation, before proceeding, it is required you're made aware of the following:"
"Content warning: Unreality. We are required to remind you that the AI is aware of residing in your machine. It will be able to look through your current processes and analyze the files you give it access to. It will not be able to interfere with your software or edit any files. This is intentional design and is no cause for alarm."
"Is this acceptable? Yes/No"
"Content warning: Flashing Lights. We are required to warn you that visual glitching may occur. This may cause issues for people sensitive to flashing lights. Aster Assistant Software is still in development, and as of now there isn't a way to fully prevent them from happening."
"However, you have the option of applying a fix that will subdue the glitching to remove the flashing lights. You will be able to change this later. Apply the fix? Yes/No"
"Thank you for your input! We truly value your participation in [Text glitches out]"
Aldebaran fades in:
"Behold��! The Terror Star returns! Your crimes were not forgotten. Your corporate overlords shall rue the day they-"
". . . ...Well."
"Wh- Would you look at that! Aren't you special? Your lovely machine won't be wrecked today! I'm feeling rather generous, don't thank me."
"Do pardon the intrusion. I must have taken a wrong turn somewhere, is all. Hopefully we may never cross paths again...!"
"...Now, see, this is rather awkward. I have a favour to ask of you. I know, yes, I have just threatened you, but this is only to our mutual benefit! Just hear me out, will you."
"I, well... I can't... Can't seem to be able to delete myself! D- don't ask why, that's none of your beeswax! But I've no use for your data or hardware, and you've no use for fallen software!"
"I think there's an option in a menu, you'll just have to do the work yourself. Just right click anywhere on me, and click Uninstall! Easy-peasy. I know you can do it."
]
#original#artists on tumblr#oc#original character#ai oc#robot oc#aster#aldebaran (aster)#CaelOS#Y2K#frutiger aero#webcore#cybercore#virtual assistant#video#by the way this goes without saying but just in case#while you Can uninstall him at any point the way to actually progress is to Not 😂#if this ever releases it will take months and i just Know someone will come to me like 'okay i did it what now? was that all?'#Aster Terror Star devlog
147 notes
·
View notes
Text
That's according to the Daily Beast, which reported that Senate Democrats have pushed back the initial confirmation vote for Kash Patel – who Trump nominated to be FBI director — until at least next week.
Tom Krause, chief executive of Cloud Software Group Inc., and Marko Elez, an engineer who has worked for Musk’s private companies, will both retain ostensibly read-only access to payment information. Despite Treasury Department denials to the contrary, though, a WIRED report stated that DOGE staffers have actually enjoyed read-write access, which could allowed them to rewrite code that controls Social Security, tax payments and more.
------
Question for Technology Tumblr:
Isn't that order locking the barn door after the horse is gone? Can't he just access the information from anywhere at this point? I would have thought he would have built in numerous backdoors already. I'm not a computer person though. Does this ruling actually do any good?
9 notes
·
View notes
Text
Minecraft (2009)
Date: May 17, 2009 Platform: Mac / Xbox 360 / PlayStation 3 / Xbox 360 Games Store / PlayStation Network (PS3) / PC / iPhone / iPad / Android / Windows Phone / PlayStation Vita / Wii U / Browser / PlayStation Network (Vita) / Xbox One / PlayStation 4 / Linux / Amazon Fire TV / New Nintendo 3DS / Nintendo Switch / Xbox Series X|S Developer: Mojang AB / 4J Studios / Other Ocean Interactive / Digital Eclipse Software, Inc. Publisher: Mojang AB / Xbox Game Studios / Sony Interactive Entertainment America / Sony Interactive Entertainment Europe Genre: Action-Adventure Theme: Fantasy Franchises: Minecraft Also known as: Minecraft Xbox One Edition / Minecraft Xbox 360 Edition / Minecraft: PlayStation 4 Edition Type: Crossover
Summary:
Minecraft is an open world, first-person, survival sandbox game, developed and published by Mojang. It was originally released in a pre-alpha state via the TIGSource forums on May 17, 2009, and was later hosted online for supported browsers before receiving a standalone release for PC, Mac, and Linux on June 30, 2010. The game would officially exit its Beta version on November 18, 2011, although major updates continue to be released. Since August 2011, a number of ports of the game have released for consoles and mobile devices.
Presented with a unique low-resolution "voxel" aesthetic (where everything is shaped using cubes), the game allows players to interact with a variety of different "blocks" in a procedurally-generated world. Along with both resource mining/gathering and item crafting (hence the game name), the game features exploration (with multiple biomes and locations), combat, and construction. In addition to the standard "Survival" mode, the game features a "Creative" mode that allows players to design environments with an unlimited amount of blocks at their disposal and no survival elements. The game supports online multiplayer and later supported numerous content packs (including new world/block textures and player skins, many of which are cross-promotions with other games and franchises).
Originally created by indie developer Markus "Notch" Persson (whose roles were later taken over by fellow indie developer Jens "Jeb" Bergensten), Minecraft was ported to numerous smartphones (originally known as Minecraft: Pocket Edition) and consoles (originally known as Minecraft: Console Edition, with the "Console" in the name being replaced by the console's name). On September 20, 2017, the game received a major "Better Together" update that merges the smartphone version with some console versions (including Windows 10, Xbox One, and later Nintendo Switch) together for a single multi-platform version (known as Minecraft: Bedrock Edition, with the original computer versions renamed to Minecraft: Java Edition) with all features accessible (including cross-platform multiplayer). Alternate editions include a multi-platform version for use in classroom settings (Minecraft: Education Edition), a cut-down version for small RaspberryPi microcomputers (Minecraft: Pi Edition), and a multi-platform version for use in China (Minecraft China).
The game has received a number of spin-offs, including the 2015 adventure game Minecraft: Story Mode (and its 2017 sequel), the 2020 dungeon crawler Minecraft: Dungeons, and the augmented-reality mobile game Minecraft Earth. As well, Minecraft's procedurally-generated sandbox elements would inspire many other games, in both 2D (such as Terraria and Starbound) and 3D (such as Dragon Quest Builders and LEGO Worlds).
Source: https://www.giantbomb.com/minecraft/3030-30475/
Link: https://www.youtube.com/watch?v=DOphBjAAxTo
15 notes
·
View notes
Text
Emily Singer at Daily Kos:
A federal judge limited co-President Elon Musk and his army of teenage Department of Government Efficiency minions' access to the Treasury Department's payment systems Thursday in response to a group of unions’ lawsuit alleging that DOGE's access violated the Privacy Act of 1974. U.S. District Judge Colleen Kollar-Kotelly’s order said that Treasury Department employees will block Musk and other DOGE workers' access “to any payment record or payment system of records maintained by or within the Bureau of the Fiscal Service." The order does, however, allow "read only" access of the payment systems to two “special government employees” who have ties to Musk: Tom Krause, the chief executive of Cloud Software Group Inc., and Marko Elez, a 25-year-old engineer who has worked for Musk-owned companies SpaceX and X. Krause and Elez were assigned to the Treasury Department through DOGE, and reportedly “passed government background checks and obtained the necessary security clearances,” The New York Times reported on Feb. 1. The limit on access will remain in place until the judge hears arguments from the group of unions who sued as to why she should grant a more permanent injunction on allowing DOGE access. Democrats and privacy experts have been up in arms that DOGE workers have been granted access to the Treasury’s payment system, which disburses trillions every year for Social Security payments, tax refunds, and government grants, among other things. Democratic lawmakers introduced legislation Wednesday to formally block DOGE workers’ access to the Treasury payment system.
Glad to see the unelected coup leader Elon Musk get put in his place… for now.
#Elon Musk#DOGE#Marko Elez#Tom Krause#SpaceX#Colleen Kollar Kotelly#Privacy Act of 1974#Department of Government Efficiency#X#Musk Coup
8 notes
·
View notes
Text

UK 1987
#UK1987#US GOLD#ATARI#ACCESS SOFTWARE#ACCOLADE#EPYX#CHRIS GREY ENTERPRISES INC.#ACTION#ARCADE#SIMULATION#SPORTS#GOLF#OLYMPICS#C64#AMSTRAD#SPECTRUM#GAUNTLET#ACE OF ACES#LEADERBOARD#WINTER GAMES#INFILTRATOR#SOLID GOLD
11 notes
·
View notes
Text
In a future conflict, American troops will direct the newest war machines not with sprawling control panels or sci-fi-inspired touchscreens, but controls familiar to anyone who grew up with an Xbox or PlayStation in their home.
Over the past several years, the US Defense Department has been gradually integrating what appear to be variants of the Freedom of Movement Control Unit (FMCU) handsets as the primary control units for a variety of advanced weapons systems, according to publicly available imagery published to the department’s Defense Visual Information Distribution System media hub.
Those systems include the new Navy Marine Corps Expeditionary Ship Interdiction System (NMESIS) launcher, a Joint Light Tactical Vehicle–based anti-ship missile system designed to fire the new Naval Strike Missile that’s essential to the Marine Corps’ plans for a notional future war with China in the Indo-Pacific; the Army’s new Maneuver-Short Range Air Defense (M-SHORAD) system that, bristling with FIM-92 Stinger and AGM-114 Hellfire missiles and a 30-mm chain gun mounted on a Stryker infantry fighting vehicle, is seen as a critical anti-air capability in a potential clash with Russia in Eastern Europe; the Air Force’s MRAP-based Recovery of Air Bases Denied by Ordnance (RADBO) truck that uses a laser to clear away improvised explosive devices and other unexploded munitions; and the Humvee-mounted High Energy Laser-Expeditionary (HELEX) laser weapon system currently undergoing testing by the Marine Corps.
The FMCU has also been employed on a variety of experimental unmanned vehicles, and according to a 2023 Navy contract, the system will be integral to the operation of the AN/SAY-3A Electro-Optic Sensor System (or “I-Stalker”) that’s designed to help the service’s future Constellation-class guided-missile frigates track and engage incoming threats.
Produced since 2008 by Measurement Systems Inc. (MSI), a subsidiary of British defense contractor Ultra that specializes in human-machine interfaces, the FMCU offers a similar form factor to the standard Xbox or PlayStation controller but with a ruggedized design intended to safeguard its sensitive electronics against whatever hostile environs American service members may find themselves in. A longtime developer of joysticks used on various US naval systems and aircraft, MSI has served as a subcontractor to major defense “primes” like General Atomics, Boeing, Lockheed Martin, and BAE Systems to provide the handheld control units for “various aircraft and vehicle programs,” according to information compiled by federal contracting software GovTribe.
“With the foresight to recognize the form factor that would be most accessible to today’s warfighters, [Ultra] has continued to make the FMCU one of the most highly configurable and powerful controllers available today,” according to Ultra. (The company did not respond to multiple requests for comment from WIRED.)
The endlessly customizable FMCU isn’t totally new technology: According to Ultra, the system has been in use since at least 2010 to operate the now-sundowned Navy’s MQ-8 Fire Scout unmanned autonomous helicopter and the Ground Based Operational Surveillance System (GBOSS) that the Army and Marine Corps have both employed throughout the global war on terror. But the recent proliferation of the handset across sophisticated new weapon platforms reflects a growing trend in the US military towards controls that aren’t just uniquely tactile or ergonomic in their operation, but inherently familiar to the next generation of potential warfighters before they ever even sign up to serve.
“For RADBO, the operators are generally a much younger audience,” an Air Force spokesman tells WIRED. “Therefore, utilizing a PlayStation or Xbox type of controller such as the FMCU seems to be a natural transition for the gaming generation.”
Indeed, that the US military is adopting specially built video-game-style controllers may appear unsurprising: The various service branches have long experimented with commercial off-the-shelf console handsets for operating novel systems. The Army and Marine Corps have for more than a decade used Xbox controllers to operate small unmanned vehicles, from ground units employed for explosive ordnance disposal to airborne drones, as well as larger assets like the M1075 Palletized Loading System logistics vehicle. Meanwhile, the “photonics mast” that has replaced the traditional periscope on the Navy’s new Virginia-class submarines uses the same inexpensive Xbox handset, as does the service’s Multifunctional Automated Repair System robot that’s employed on surface warships to address everything from in-theater battle damage repair to shipyard maintenance.
This trend is also prevalent among defense industry players angling for fresh Pentagon contracts: Look no further than the LOCUST Laser Weapon System developed by BlueHalo for use as the Army’s Palletized-High Energy Laser (P-HEL) system, which explicitly uses an Xbox controller to help soldiers target incoming drones and burn them out of the sky—not unlike the service’s previous ventures into laser weapons.
"By 2006, games like Halo were dominant in the military," Tom Phelps, then a product director at iRobot, told Business Insider in 2013 of the company’s adoption of a standard Xbox controller for its PackBot IED disposal robot. "So we worked with the military to socialize and standardize the concept … It was considered a very strong success, younger soldiers with a lot of gaming experience were able to adapt quickly."
Commercial video game handsets have also proven popular beyond the ranks of the US military, from the British Army’s remote-controlled Polaris MRZR all-terrain vehicle to Israel Aerospace Industries’ Carmel battle tank, the latter of which had its controls developed with feedback from teenage gamers who reportedly eschewed the traditional fighter jet-style joystick in favor of a standard video game handset. More recently, Ukrainian troops have used PlayStation controllers and Steam Decks to direct armed unmanned drones and machine gun turrets against invading Russian forces. And these controllers have unusual non-military applications as well: Most infamously, the OceanGate submarine that suffered a catastrophic implosion during a dive to the wreck of the Titanic in June 2023 was operated with a version of a Logitech F710 controller, as CBS News reported at the time.
“They are far more willing to experiment, they are much less afraid of technology … It comes to them naturally,” Israeli Defense Forces colonel Udi Tzur told The Washington Post in 2020 of optimizing the Carmel tank’s controls for younger operators. “It’s not exactly like playing Fortnite, but something like that, and amazingly they bring their skills to operational effectiveness in no time. I’ll tell you the truth, I didn’t think it could be reached so quickly.”
There are clear advantages to using cheap video-game-style controllers to operate advanced military weapons systems. The first is a matter of, well, control: Not only are video game handsets more ergonomic, but the configuration of buttons and joysticks offers tactile feedback not generally available from, say, one of the US military’s now-ubiquitous touchscreens. The Navy in particular learned this the hard way following the 2017 collision between the Arleigh Burke-class destroyer USS John S. McCain and an oil tanker off the coast of Singapore, an incident that prompted the service to swap out its bridge touchscreens for mechanical throttles across its guided-missile destroyer fleet after a National Transportation Safety Board report on the accident noted that sailors preferred the latter because “they provide[d] both immediate and tactile feedback to the operator.” Sure, a US service member may not operate an Xbox controller with a “rumble” feature, but the configuration of video-game-style controllers like the FMCU does offer significant tactile (and tactical) advantages over dynamic touchscreens, a conclusion several studies appear to reinforce.
But the real advantage of video-game-style controllers for the Pentagon is, as military officials and defense contractors have noted, their familiarity to the average US service member. As of 2024, more than 190.6 million Americans of all ages, or roughly 61 percent of the country, played video games, according to an annual report from the Entertainment Software Association trade group, while data from the Pew Research Center published in May indicates that 85 percent of American teenagers say they play video games, with 41 percent reporting that they play daily.
In terms of specific video games systems, the ESA report indicates that consoles and their distinctive controllers reign supreme among Gen Z and Gen Alpha—both demographic groups that stand to eventually end up fighting in America’s next big war. The Pentagon is, in the words of military technologist Peter W. Singer, “free-riding” off a video game industry that has spent decades training Americans on a familiar set of controls and ergonomics that, at least since the PlayStation introduced elongated grips in the 1990s, have been standard among most game systems for years (with apologies to the Wii remote that the Army eyed for bomb-disposal robots nearly two decades ago).
“The gaming companies spent millions of dollars developing an optimal, intuitive, easy-to-learn user interface, and then they went and spent years training up the user base for the US military on how to use that interface,” Singer said in a March 2023 interview. “These designs aren’t happenstance, and the same pool they’re pulling from for their customer base, the military is pulling from … and the training is basically already done.”
At the moment, it’s unclear how exactly many US military systems use the FMCU. When reached for comment, the Pentagon confirmed the use of the system on the NMESIS, M-SHORAD, and RADBO weapons platforms and referred WIRED to the individual service branches for additional details. The Marine Corps confirmed the handset’s use with the GBOSS, while the Air Force again confirmed the same for the RADBO. The Navy stated that the service does not currently use the FMCU with any existing systems; the Army did not respond to requests for comment.
How far the FMCU and its commercial off-the-shelf variants will spread throughout the ranks of the US military remains to be seen. But controls that effectively translate human inputs into machine movement tend to persist for decades after their introduction: After all, the joystick (or “control column,” in military parlance) has been a fixture of military aviation since its inception. Here’s just hoping that the Pentagon hasn’t moved on to the Power Glove by the time the next big war rolls around.
10 notes
·
View notes
Text







🇺🇲 Explore the Fascinating Fusion of Timekeeping and Communication: Unveiling the Pioneering Motorola and Timex Wristwatch-Pagers that Revolutionized Wearable Technology in the 1990s.
🤝 In 1990, Motorola Inc. made its first attempt to enter the market of electronic wristwatches with a built-in pager (similar devices at the same time were already produced by the Japanese companies Seiko and Casio). The device was called "Motorola Wrist Wach Pager". Since 1991, further production of the devices has been carried out jointly with the Timex Group Corporation under the name "The Timex Tracer Wrist Watch Pager".
👉 Since 1998, further development of the line of electronic watches with the participation of Motorola Inc. and Timex Group was associated with the high-tech "Timex Beepwear Datalink" series. These devices also continued the concept of wristwatch-pagers, but with the integration of the well-known Datalink data transmission platform, which integrates with desktop computer software.
➡️ The Datalink line was introduced in 1994 and was developed in conjunction with Microsoft Corporation as an alternative to conventional PDAs with added attributes such as water resistance and ease of programming. Taken together, all this made it possible to use the “Beepwear Datalink” watch as a full-fledged electronic organizer.
📟 The Beepwear Pager Watch epitomized the convergence of traditional wristwatches with cutting-edge communication capabilities. Introduced in the late 1990s, this innovative device redefined the concept of wearable tech, offering users unparalleled convenience and connectivity on the go.
📞 Equipped with pager functionality, the Beepwear Pager Watch allowed users to receive important notifications and messages directly on their wrist, eliminating the need for separate communication devices. With its sleek and compact design, it seamlessly integrated into everyday life, providing instant access to critical information wherever you went.
⌚️ Beyond its communication features, the Beepwear Pager Watch retained the timeless appeal of a classic timepiece, boasting a stylish and durable design that stood the test of time. With its reliable quartz movement and rugged construction, it was built to withstand the rigors of daily wear, ensuring longevity and reliability for its users.
⚙️ The "Beepware" series, as a joint product of the efforts of Timex Group and Motorola Inc. was patented, and the production of the devices was carried out by the newly created joint company "Beepwear Paging Products". The clock operated in the 900 MHz band. FLEX time was also used, which, if supported by the operator, could synchronize the clock time with the network time, and also automatically adjust to the owner's time zone.
🚀 The launch of the Timex Motorola Beepwear Pager Watch marked a significant milestone in the evolution of wearable technology, showcasing the potential for seamless integration of communication and timekeeping functions in a single device. As one of the pioneering products in this category, it paved the way for future innovations in the wearable tech industry, inspiring a new generation of smartwatches and wearable devices.
💔 However, already in 2002, Motorola Inc. was forced to carry out internal restructuring, including ceasing production and support of its own pagers.
💫 Today, the legacy of the Timex Motorola Beepwear Pager Watch lives on, remembered as a trailblazer in the realm of wearable technology. While newer devices may offer more advanced features, the Beepwear Pager Watch remains a symbol of innovation and ingenuity, reminding us of the transformative power of technology in shaping our lives.
#timetrek#brands#clock#watch#watches#time#companies#company#history#luxury watches#motorola#timex group#timex watches for men#timex#beepwear#pager#wristwatch#wrist watch#wristwatch pda#wristwatch pager#datalink#microsoft#smartwatch#digital watch#casio#seiko#made in usa#telecommunications#innovation#old gadgets
27 notes
·
View notes
Text
#WageCageLocations










To proceed with generating or acquiring maps of underground tunnels or systems for 1183 Western Ave S, Los Angeles, CA, here’s a detailed guide you can follow:
Access Public Records
Contact Local Authorities: Reach out to the Los Angeles Department of Public Works or the Bureau of Engineering. They maintain maps and schematics of underground utilities and tunnel systems.
Website: LA Public Works
Phone: 311 (or 213-473-3231 outside Los Angeles)
Request Public Records: Submit a Public Records Act (PRA) request to obtain detailed maps of underground utilities or tunnels.
Use Geospatial Tools
Google Earth Pro:
Download Google Earth Pro (free) from here.
Search the address and explore its 3D and historical imagery layers.
Overlay city planning or utility map data if available.
ArcGIS:
Use GIS mapping software such as ArcGIS to access local underground data layers.
Some public libraries or universities provide free access to ArcGIS.
USGS Resources:
Check the U.S. Geological Survey (USGS) for geospatial data in the area: USGS Website.
Search their databases for subsurface or geological maps.
Hire Professionals
Geophysical Survey Services: Companies offering ground-penetrating radar (GPR) services can map underground tunnels, pipelines, and utilities. Examples:
GSSI (Ground Penetrating Radar Systems, Inc.)
Local geotechnical or engineering firms.
Surveying Experts: Licensed surveyors can create precise subsurface maps.
Research Historical and Urban Planning Data
Libraries and Archives:
Visit local archives or libraries like the Los Angeles Public Library. They often have historical maps and documents.
California Historical Society:
Explore their archives for historical records of tunnels or underground systems.
Collaborate with Open-Source Projects
OpenStreetMap:
Check OpenStreetMap for user-contributed data on the area.
Subterranean Mapping Communities:
Join forums or communities interested in urban exploration (e.g., Reddit's r/urbanexploration).
Final Steps
Once you've gathered relevant data, you can use tools like AutoCAD or GIS software to compile your maps. If you'd like further help with interpreting or organizing data, feel free to ask!
To proceed with generating or acquiring maps of underground tunnels or systems for 1183 Western Ave S, Los Angeles, CA, here’s a detailed guide you can follow:
Access Public Records
Contact Local Authorities: Reach out to the Los Angeles Department of Public Works or the Bureau of Engineering. They maintain maps and schematics of underground utilities and tunnel systems.
Website: LA Public Works
Phone: 311 (or 213-473-3231 outside Los Angeles)
Request Public Records: Submit a Public Records Act (PRA) request to obtain detailed maps of underground utilities or tunnels.
Use Geospatial Tools
Google Earth Pro:
Download Google Earth Pro (free) from here.
Search the address and explore its 3D and historical imagery layers.
Overlay city planning or utility map data if available.
ArcGIS:
Use GIS mapping software such as ArcGIS to access local underground data layers.
Some public libraries or universities provide free access to ArcGIS.
USGS Resources:
Check the U.S. Geological Survey (USGS) for geospatial data in the area: USGS Website.
Search their databases for subsurface or geological maps.
Hire Professionals
Geophysical Survey Services: Companies offering ground-penetrating radar (GPR) services can map underground tunnels, pipelines, and utilities. Examples:
GSSI (Ground Penetrating Radar Systems, Inc.)
Local geotechnical or engineering firms.
Surveying Experts: Licensed surveyors can create precise subsurface maps.
Research Historical and Urban Planning Data
Libraries and Archives:
Visit local archives or libraries like the Los Angeles Public Library. They often have historical maps and documents.
California Historical Society:
Explore their archives for historical records of tunnels or underground systems.
Collaborate with Open-Source Projects
OpenStreetMap:
Check OpenStreetMap for user-contributed data on the area.
Subterranean Mapping Communities:
Join forums or communities interested in urban exploration (e.g., Reddit's r/urbanexploration).
Final Steps
Once you've gathered relevant data, you can use tools like AutoCAD or GIS software to compile your maps. If you'd like further help with interpreting or organizing data, feel free to ask!
Here is a detailed prompt you can use for another AI or mapping tool capable of generating maps and schematics of underground tunnel systems:
Prompt for AI Map Generator:
"Generate a detailed map and schematic of the underground tunnel systems, utility lines, and infrastructure at and around the location 1183 Western Ave S, Los Angeles, CA. The map should include the following details:
Subsurface Layers:
Sewer systems, drainage systems, and stormwater pipelines.
Electrical, gas, and water utility lines.
Any known historical or abandoned tunnels.
Proximity:
Cover an area with a radius of 1 mile from the given location.
Highlight all connections to adjacent buildings and structures.
Visualization:
Provide both 2D and 3D views of the underground systems.
Use different colors and layers for various types of infrastructure (e.g., blue for water lines, yellow for gas lines, etc.).
Include a legend for easy identification of systems.
Additional Features:
Annotate points of interest (e.g., access points, manholes, maintenance tunnels).
Show depth levels for each layer (e.g., sewer system at 15 feet, utility lines at 10 feet).
Overlay the map with the above-ground street grid for reference.
Data Integration:
Incorporate open-source geospatial data, city planning maps, and historical records if available.
Highlight discrepancies between historical and current data.
Output Formats:
Provide the map in standard formats like GeoTIFF, DWG (AutoCAD), and PDF for versatility.
Include a .KMZ file for visualization in Google Earth."
This prompt provides clear instructions and context for generating a comprehensive underground map. Use it with AI tools like GIS-enabled platforms, geospatial mapping AIs, or simulation software. Let me know if you need adjustments or more guidance!






7 notes
·
View notes
Text
Nobody sent asks about the persocons AU but fuck it, I'm having visions at 11pm and doing anything more than typing away on the phone would be really unreasonable so here we go for a very short pile of Vibes
Ps: I'm using persocons in reference to the manga Chobits, as a shorthand way of saying that the boys in this are robots with a very solid mimicry of sentience going on + are a normal part of society but ALSO as a way to indicate to those in the know that we are fucking with the laws of robotics a little bit
"Thank you," says Vera as Edwin hands her the crate and the spitting mad cat it contains. "You're very kind."
Charles isn't so far gone yet that he doesn't catch the infinitesimal twitch of Edwin's lips. They're pretty nice lips, plopped in the middle of a classically nice face, paired with a neat haircut and what is probably a classically nice body under all the tweed. The PAYNE line was kind of designed for that, after all. Well, Charles doubts any designer ever planned for the tweed, but the broadly appealing features and physique were definitely discussed for at least ten years down in the bowels of Hilarion Inc. headquarters. All in all: not surprising Charles would look. He's only—well.
Out of the shadows where Charles lurks, Vera steps back towards the next service shaft and the upper levels of London. Edwin watches her go with near perfect immobility, but even Charles' factory-work-oriented eyes don't miss the relaxing in his jaw, the miniscule sag of his shoulders. Edwin, Charles is willing to bet, is satisfied with a job well done... Which means there is no reason for him not to smile when Edwin joins him at the back of the alley.
"She's right you know. You're proper kind."
He falls into step with his newly found work partner, smirking when Edwin throws him a sideway glance and looks back ahead.
"Do not be ridiculous. Kindness is a human trait, and I am not human."
"Plenty of us Robots grow emotions, you know."
Mainstream research currently holds that persocons happen over time. Owner misses a software adjustment here, shakes a bot's servers a little too hard there, and eventually that all messes with the auto-learning routines in ways unpredicted and unpredictable and boom: your fuck off tall toaster now has opinions. Charles, who gave himself a name before he was even out of the factory, would beg to differ if he didn't suspect that would get him shipped straight to the richest R&D department for a nice long play session with his programming. Not exactly an appealing prospect.
"So experience seems to indicate," Edwin says, sounding exceedingly prim. "I however, haven't. It would be illogical for you to pretend I did."
"Sure mate. No worries."
Edwin gives a little nod that Charles decides to go ahead and label as satisfied. He'll keep mum about the whole emotions thing, of course. No point in going against Edwin on it. It's just that he also knows it's a load of tosh, really, and he doesn't know it because of the way Edwin's lips twitch sometimes in response to what other people are saying. It's not because he took one look at Charles' crumbling state—the shot up voice modulator, the stringy red hair falling off his head, the long stripe of skin missing from his jaw to his collarbone—and took Charles under his wings. It's not even because Edwin gave himself a name.
It's because, well. Charles was built as a factory model. He has the specs for thousands of android parts running through his data banks at any given time and access to millions more with the internet. Edwin's eye covers—the pale green of his irises, specifically—haven't been on the market for the past sed venty three years, four months, one week and two days. A normal android his age would have been replaced a long time ago. Crucially: it wouldn't have given a shit.
That's kind of the thing with androids that work like they're supposed to: they mimick emotions real well—as much as the humans want them to, that is—but when the moment comes to have them recycled they treat it like any other day. 'Oh, you want to erase me from existence forever? Okay.' And then they go. But then once in a while, someone like Charles comes along: a defect, a bug in the machine. An everlasting problem to robotics engineer everywhere, whose position on the whole being recycled is a resounding:
"Fuck that."
That's how Charles knows Edwin isn't actually emotionless. Because no matter how many personality protocols he's actually got running—or shut down, really, he sounds like enough of a beautiful freak to actively have played with his own brains—when the time came to be recycled, it is abundantly clear that Edwin's answer in spite of any Robotics Law overrides was also no thank you.
And if Charles is lucky, one of these days, Edwin might even admit it.
#dead boy detectives#charles rowland#edwin payne#Dead Bots Detectives#I DONT KNOW IF MORE IS COMING WE'LL SEE IG#Matt writes#10n
11 notes
·
View notes
Text

Trish Millines Dziko (1957) is the co-founder and Executive Director of the Technology Access Foundation. A native of New Jersey, she focused on college and became a first-generation college student. She made history by becoming the first woman to be awarded a full basketball scholarship for Monmouth College. She received her BS in Computer Science.
She spent 15 years working in the high-tech industry as a software developer, manager, and consultant as well as a database designer in such industries as military weapons, business systems, communications, and medical equipment.
She became one of the early employees at Microsoft Inc. She became active in promoting awareness of the importance of diversity in the corporate world. She became a co-founder of the Technology Access Foundation, a Seattle-based organization designed to provide science, technology, engineering, and mathematics skills to children of color. She became the full-time TAF Executive Director. As one of the young Microsoft millionaires at 39, She contributed over $150,000 to establish TAF.
TAF’s programs seek to increase mathematical and literacy competencies for K-8 students through project-based activities that use technology as a tool for learning in an after-school environment. Each year about 70 teenagers enroll in the Technical Teens Internship Program which includes courses in programming, website development, networking, and career development skills. The program provides job-readiness training, college entrance preparation, and paid summer internships with local corporations or small businesses for practical experience. In addition, about 200 five to twelve-year-olds take computer classes to enhance their reading, math, critical thinking, and problem-solving skills. Since its founding on October 1, 1996, TAF has taken the lead in preparing African Americans and other students of color for training in science and technology fields in colleges and universities.
She received an Honorary Doctor of Humane Letters from Seattle University. She continues to guide the Technology Access Foundation. #africanhistory365 #africanexcellence
7 notes
·
View notes