#Types of Web Applications
Explore tagged Tumblr posts
nexiotechie · 5 months ago
Text
Website Development vs. Web Application Development
Tumblr media
In the digital age, terms like website development vs web application development often overlap in conversation, but they represent distinct concepts with unique purposes, functionalities, and approaches. Knowing the difference is crucial when deciding the best fit for your business.
This article unpacks the key differences, answers common queries, and guides you in making an informed choice.
What Does Website Development Involve?
Website development focuses on building platforms that primarily deliver information. These platforms are typically static or semi-dynamic, serving as digital brochures for businesses, blogs, or portfolios. While they provide valuable content, they generally offer minimal user interaction.
Core Features of Websites:
Static or semi-dynamic structures.
Focused on content delivery (e.g., blogs, landing pages).
Limited interactivity. Examples: Corporate websites, blogs, and news portals.
What Is Web Application Development?
Web application development takes a more interactive approach, creating platforms where users can engage dynamically. These applications often include advanced features like user accounts, data management, and payment systems.
Core Features of Web Applications:
Dynamic and interactive design.
High user engagement focus.
Supports complex functions like e-commerce, dashboards, or data processing. Examples: Gmail, Amazon, and Facebook.
How to Decide If You Need a Web Application
A web application might be the right choice if:
Your business demands features like payment gateways or user accounts.
You aim to engage users with interactive tools and interfaces.
You require scalable solutions for complex operations like data processing.
Key Differences Between Websites and Web Applications
Tumblr media
In short, while all web applications are websites, not all websites qualify as web applications.
How Do Web Applications Compare to Mobile Apps?
While both aim to enhance user experience, web app designing and mobile app designing differ in execution:
Tumblr media
Can Websites Transform Into Web Applications?
Yes, it’s entirely possible and often beneficial to convert a website into a web application. For example, a static blog can evolve into a dynamic platform with shopping carts, payment gateways, and user accounts.
Steps for Conversion:
Integrate a frontend framework like React or Vue.js.
Build a backend with tools like Node.js or Django for data management.
Use databases like MongoDB or PostgreSQL for storage.
Choosing the Right Programming Languages
The best languages depend on your project’s goals:
Frontend: JavaScript frameworks (React, Angular).
Backend: Python and Node.js for flexibility and scalability.
Databases: SQL (structured data) or NoSQL (flexibility).
For rapid prototyping, Python is ideal. For performance-driven applications, Node.js is a top choice.
Development Costs in Australia
Tumblr media
Factors influencing costs include design, hosting, advanced features, and the development team’s expertise.
Are Frameworks Essential for Web Application Development?
While not mandatory, frameworks simplify development by reducing errors, enhancing security, and speeding up the process.
Popular Frameworks:
Frontend: React, Angular, Vue.js.
Backend: Django, Laravel, Express.js.
Types of Web Applications
Static Web Applications: Deliver pre-written content, ideal for portfolios.
Dynamic Web Applications: Offer tailored experiences based on user input, like e-commerce platforms.
Single-Page Applications (SPAs): Load content dynamically without page reloads (e.g., Gmail).
SPAs vs. MPAs: SPAs deliver seamless interactions, while MPAs are more SEO-friendly.
The Rise of Progressive Web Applications (PWAs)
PWAs merge the best of web and mobile apps. They’re fast, work offline, and eliminate the need for app store downloads.
Advantages of PWAs:
Cost-effective and user-friendly.
Examples: Twitter Lite and Pinterest.
AI’s Role in Web Application Development
Artificial intelligence is transforming web app development by automating coding, improving user personalization, and enabling AI-powered chatbots for better support.
Conclusion: Which Is Right for You?
Choose a website for basic online presence and static content. Opt for a web application if you need advanced features and interactive platforms.
Still undecided? Our experts are ready to help you choose the best solution for your business. Let’s turn your ideas into reality!
0 notes
rustedgate · 5 months ago
Text
I hate tech companies
1 note · View note
kpissolution · 9 months ago
Text
0 notes
prismetric-technologies · 1 year ago
Text
Laravel, a popular PHP framework, is versatile and can be used to build various types of web applications. These include content management systems (CMS), e-commerce platforms, social networking sites, and custom business applications. Laravel's robust features, such as authentication, routing, and database management, make it suitable for a wide range of projects.
1 note · View note
dropoutdeveloper · 2 years ago
Text
Introduction to JavaScript for Beginners: Unlock the Power of Web Development 2023
Welcome to our comprehensive guide on JavaScript for beginners. In this article, we will delve deep into the world of JavaScript, one of the most versatile and widely-used programming languages on the web. Whether you’re an aspiring web developer or simply curious about the fascinating realm of coding, we’ve got you covered. Let’s embark on this exciting journey and unlock the potential of…
Tumblr media
View On WordPress
0 notes
happywebdesign · 2 years ago
Text
Tumblr media
SeedHealth
1 note · View note
tpointtechblog · 2 years ago
Text
What is the purpose of Spring and Hibernate training?
The purpose of Spring and Hibernate are to teach developers how to use these frameworks to develop Java applications. Spring is an open-source framework that provides a comprehensive set of tools and services for developing Java applications.
Hibernate is an open-source object-relational mapping (ORM) framework that provides a way to map Java objects to database tables.
0 notes
annievrse · 5 months ago
Text
LABYRINTH
FEATURING: TRAFALGAR LAW x FEM!READER
SUMMARY: When your captain, Luffy, tells you to run from Bartholomew Kuma on the Sabaody Archipelago instead of fighting, you end up on a submarine...
CONTENT: Fic structure: Sabaody Archipelago → Zou spoilers, canon timeline but majority canon-divergent events, acts are organised by scenes, she/her pronouns, no use of y/n. Content Warnings: Panic attacks, anxiety, descriptions of injuries, blood, passing out, trauma (Luffy & Law), drinking (one instance), torture and violence, guns + getting shot, Doflamingo (+ his past).
Crossposted on AO3: Here
Tumblr media
ACT I... IT ONLY HURTS THIS MUCH RIGHT NOW [15k] ACT II... IT ONLY FEELS THIS RAW RIGHT NOW [18k] ACT III... BREAK THROUGH, BREAK DOWN [20k] ACT IV... HOW'D YOU TURN IT RIGHT AROUND? [20k]
See below the cut for the Reader's Devil Fruit! (This can be considered a spoiler for the fic if you want to be surprised).
The Sew-Sew Fruit: A round fruit wrapped in white thread.
The Sew-Sew Fruit is a uniquely versatile Paramecia-type Devil Fruit that grants its user the ability to control and manipulate needles and thread. From creating intricate garments to dealing devastating blows, the user’s mastery of their powers can drastically affect the battlefield—or even the very fabric of a person’s being.
Powers & Abilities 1. Needles: The user can materialize and control a variety of needles of different sizes, from tiny, sharp pins to enormous, thick needles that can pierce through armour. These needles can be used offensively, defensively, or subtly, such as sewing together injuries or fabricating traps. The user has full control over these needles, manipulating them at will to attack or defend in a variety of creative and dangerous ways.
Offensive Uses: The needles can be fired at high speed, becoming deadly projectiles capable of piercing even the toughest materials. By controlling the thread that attaches them, the user can manipulate the needles mid-flight, ensuring they find their mark.
Defensive Uses: The user can also create shields or swords, using needles to form a web-like structure of thread that blocks incoming attacks. Needles can also disarm opponents by targeting their weapons or controlling their limbs, making it harder for enemies to retaliate.
Tactical Uses: Needles can be used to stabilise ropes for abseiling, stitch up broken structures, fix broken buildings or stabilise bridges in an emergency.
2. Sew: This technique involves manipulating large quantities of thread to bind, subdue, or harm targets. The user can weave and manipulate threads in almost any environment—whether in the air, water, or solid ground—and use them to entangle or control opponents. With enough control, the user can manipulate threads to create clothing or equipment out of nothing, even adjusting their own garments to suit various needs. This ability is as creative as it is practical and can be used for a wide range of applications.
Offensive Uses: The user can conjure thick, sharp threads to slice through enemies, creating ribbons of deadly silk that can cut through flesh and bone. Alternatively, they can form spools of thread that tighten around enemies, squeezing them into submission or piercing their skin.
Defensive Uses: Threads can be used to bind attackers or shield allies. Users can also create large thread nets to slow opponents or trap them. In desperate times, the user could stitch up a torn sail or make an emergency parachute from their clothes.
Healing Uses: The thread can also stitch wounds or close injuries.
3. Seam (The Mindscape): The user has the power to pull the soul of a living being out of their body and sew it into a mental "seam"—a space where the soul can wander freely, but their physical body is left in a dreamlike, almost immobile state. While in this mindscape, the target's consciousness is free to roam, but their body remains comatose, trapped in a state where they are unaware of the passage of time.
Effect on Target: When a soul is sewn into the seam, the target's body becomes a puppet, barely alive and completely unaware of what’s happening around them. They can wander freely inside the mindscape, but they cannot control their physical body, which may be left defenceless in the outside world. Time seems to pass differently inside the seam, and a target can lose days, months, or even years while only moments pass outside.
Mindscape Reality: The mindscape can reflect the target's deepest fears, desires, or memories, often manipulating their perception of reality. This can create a disorienting environment where the target cannot tell what’s real and what is an illusion, effectively trapping them in a twisted version of their own mind.
Adverse Effects on the User: While powerful, the use of the Seam technique is taxing on the user. If the user does not manage their energy properly, there can be severe consequences. Prolonged usage can lead to excessive blood loss, typically through the hands—where the thread seems to extract life force—and chronic lightheadedness, causing the user to faint or collapse after extended use.
Permanent Effects: If the user keeps a soul inside the seam for too long without letting them return to their body, there is a risk of permanent damage to the victim’s mind, making them a mindless shell of their former self. Similarly, if the user remains in the seam for too long, they risk losing their own soul to the space, becoming trapped in a dreamlike state themselves.
4. Seam Ripper: A powerful counter-technique designed to protect the user’s consciousness from being influenced, infiltrated, or manipulated by external forces. Using the same fundamental principle as the Seam ability, which allows the user to trap souls and manipulate the mindscape, Seam Ripper acts as a mental defence mechanism, "cutting" away any attempts to tamper with or enter the user's mind.
Psychic Battles: In situations where the user is up against an enemy that manipulates minds, such as someone with telepathy or mind control, Seam Ripper is invaluable. It can break the opponent’s hold over the user’s body and mind, allowing the user to regain control and counterattack.
Countering Other Devil Fruits: Against Devil Fruits like the Magu Magu no Mi (Magma-Magma Fruit) or Suna Suna no Mi (Sand-Sand Fruit), Seam Ripper could be used as a defensive tool to sever any threads of control the enemy tries to establish over the user's mental state, preventing them from becoming disoriented or easily manipulated.
Protection for Allies: If the user is in a team fight, Seam Ripper can also be used to protect allies from mind control or illusions. By keeping their mind free of external influences, the user can focus on helping others without losing control over their own actions.
5. Interfacing: A complex defensive technique where the user manipulates large quantities of thread to weave a nearly invisible network of fine, bulletproof walls. These threads create a labyrinthine structure—an intricate maze—around the user or their allies, effectively confining enemies within a maze of unyielding walls. Each wall, while deceptively thin, can withstand bullets, blades, and even larger attacks, making them ideal for defence, trapping enemies, or controlling the flow of battle.
The technique's true strength lies in its versatility and ability to adapt to the environment. It can be deployed instantly, forming walls of thread that act as both a physical and mental barrier, disorienting opponents as they navigate the maze.
Trapping Enemies: Interfacing is an ideal technique for trapping large groups of enemies or powerful foes who rely on brute force or ranged attacks. It confines their movements and limits their ability to retaliate, while also providing the user with the ability to pick off enemies one at a time.
Control of the Battlefield: The labyrinth not only serves as a trap but as a tool for controlling the flow of battle. The user can close off certain paths, funnelling enemies into chokepoints or force them into confined spaces where they are at a disadvantage. It can also be used to protect allies, making it difficult for enemies to get to them.
Psychological Warfare: The maze is a tool for disorientation. Enemies trapped within it are often at a disadvantage as they struggle to navigate through the confusing structure. Over time, the maze can break the spirit of enemies, making them more susceptible to mistakes or surrender.
6: Binding: An advanced and highly dangerous technique that allows the user to pull memories from a person's mind and transform them into solid, real-world objects or events. When someone’s memory is extracted using the Seam or similar techniques, Binding solidifies the memory by "weaving" it into reality, making it materialize as though it had always existed.
This ability manipulates the very nature of a person's memories, turning the intangible (thoughts, recollections, or imagined scenarios) into something that can be interacted with physically. The user must be cautious, as these manifestations are not limited to harmless recreations—they can be objects, environments, or even people who appear precisely as they were in the person’s mind. Once bound, these memories can have an unpredictable impact on both the person who owns the memory and the world around them.
Trapping Enemies with Memories: The user can trap an enemy in a situation by binding a specific memory to reality. For instance, a traumatic memory can manifest as a real-world trap, forcing the enemy to relive their worst fear in physical form, distracting them long enough for an attack or escape.
Manipulating the Battlefield: Binding can be used to manipulate the environment around the user. A memory of a past battlefield, a familiar place, or even a natural disaster can be made real, distorting the surroundings to give the user an advantage or to confuse the enemy.
7: Stitch: This is the most dangerous and enigmatic ability of the Sew-Sew Fruit. It is an advanced and final step in manipulating memories. When used in tandem with Binding, Stitch takes the already manifested memory and secures it permanently in the physical world, making it an unalterable fixture of reality. Unlike Binding, which creates temporary, often unstable manifestations, Stitch locks the memory into existence, preventing it from fading, shifting, or dissipating.
Once a memory is "stitched" into reality, it becomes as permanent as any natural part of the world—whether it’s an object, an event, a place, or even a person. This technique allows the user to cement entire histories or scenarios into the present, permanently altering the world around them.
Creating Permanent Allies or Minions: If the user wishes, they can create a permanent army of memory-constructed figures or allies. Once these individuals are stitched into existence, they are real, living beings, albeit based on the memory from which they were drawn. This can be a powerful tool in battles that require long-term assistance.
Alterations to the Battlefield: Stitch can also be used to permanently alter the environment in the user's favour. A battlefield memory could be "stitched" into existence, creating an environment that traps or confuses enemies or provides a constant source of cover for the user’s team.
Weapon Creation: By extracting memories of powerful weapons or tools, the user can create permanent, reliable sources of combat strength. Once stitched into reality, these weapons would become unbreakable and always available.
Historical Manipulation: In larger-scale battles or political maneuvering, Stitch can alter the course of history by creating a permanent record of a particular event. For instance, the memory of a legendary battle or a famous leader could be made tangible, affecting the outcome of future events.
In essence, Stitch is the final, irreversible step in altering reality with the Sew-Sew Fruit. It allows the user to permanently cement a memory into the real world, creating a lasting change that cannot be undone. This powerful technique has the potential to reshape the world, but it comes with the risk of unintended consequences, personal trauma, and a heavy toll on the user’s energy and mind. It is a tool of immense power and responsibility, capable of creating eternal legacies or causing irreparable damage.
481 notes · View notes
novella-november · 1 month ago
Text
Well. I have a feeling I'm about to have a million new followers. (March 31st, 2025; not an April Fool's joke, unless Nanowrimo has very poor taste and timing)
youtube
Here's a link that explains in long video format the whole entire thing in detail:
youtube
and to sum it up:
This blog was made as an Anti-Generative AI to Nanowrimo, as well as a way to actually build a friendly, low-pressure, helpful community of aspiring writers, without the hard-fast-do-it-or-die pressure brought on by nanowrimo.
There is no official "contest" -- only a community coming together to inspire each other to write, help out with motivation by setting community goals, keeping participation motivation via Trackbear.app, etc!
The most popular writing challenge is still November for most people, but I myself have also started to keep a year-round, daily writing goal of 444 via the website 4thewords, which has been an extreme help in getting me to write a little at a time.
This year has been very hectic for everyone what with the election results so I haven't been very active on tumblr (I think everyone can understand that) but I was originally planning on also having each month of the year being a different themed writing / art challenge but got a bit distracted real life.
So, what is the Novella November Challenge?
It's a fun challenge where writers come together to write 30,000 (or your own personal writing goal!) words in 30 days, sharing tips, writing advice, plot ideas, accessibility aids, and committing to having fun while explicitly fighting back against Generative AI by using our own words and disavowing the use of scraping and generating to take away the livelyhoods of artists of all spectrums, and proving everyone who insists "generative AI is an accessibility tool" wrong by committing to our creative visions and making it easier for everyone to find the tools they need to succeed by sharing tips, free programs, and finding a like-minded community to support you! 💙
There is no official website, there is no required place to show your participation, this is a community initiative that will never be monetized by predatory sponsors or dangerous moderators abusing their power.
This blog is here to inspire everyone, regardless of experience level, to write and create the story they want to tell, in their own words, while striving to remain a fun, low-pressure challenge that doesn't turn into a stressful spiral, like often happened with Nano.
Want to start writing but not sure how? Don't have money to spend on expensive writing programs? Have no fear!
LibreOffice: An always free, open-source alternative to Microsoft Word (and Microsoft's other office suits)
4Thewords: A website (both desktop and mobile web browser) that syncs your writing cross platform to the cloud, with built-in daily word goals, streak tracking, and you can fight monsters with your word count to game-ify writing!
Trackbear: A website dedicated to tracking your writing, setting custom goals, and creating leaderboards for community participation; you can join the year-long community leaderboard with the Join Code "f043cc66-6d5d-45b2-acf1-204626a727ba" and a November-limited one will release on November 1st as well.
Want to use Text to Speech to dictate your novel?
Most modern phones have a built-in option available on your keyboard settings which can be used on any writing program on your phone, and most modern PCs that allow a microphone (including headphone) connection has some kind of native dictation function, which you can find by opening your start panel and searching your computer for "Speech to text" or "voice to text".
Want to write while on the go, but don't want to / can't use the small phone keyboard to type, or speech to text?
You can, for as cheap as $40, buy a bluetooth keyboard that you can pair with your smart phone or tablet and use to write in any and all writing applications on your phone -- this allows you to write on the goal (especially using cross-platform websites or services, like 4thewords or google docs) , and the small screen can also help minimize distractions by muting notifications in your writing time.
163 notes · View notes
afeelgoodblog · 1 year ago
Text
The Best News of Last Week - March 18
1. FDA to Finally Outlaw Soda Ingredient Prohibited Around The World
Tumblr media
An ingredient once commonly used in citrus-flavored sodas to keep the tangy taste mixed thoroughly through the beverage could finally be banned for good across the US. BVO, or brominated vegetable oil, is already banned in many countries, including India, Japan, and nations of the European Union, and was outlawed in the state of California in October 2022.
2. AI makes breakthrough discovery in battle to cure prostate cancer
Tumblr media
Scientists have used AI to reveal a new form of aggressive prostate cancer which could revolutionise how the disease is diagnosed and treated.
A Cancer Research UK-funded study found prostate cancer, which affects one in eight men in their lifetime, includes two subtypes. It is hoped the findings could save thousands of lives in future and revolutionise how the cancer is diagnosed and treated.
3. “Inverse vaccine” shows potential to treat multiple sclerosis and other autoimmune diseases
Tumblr media
A new type of vaccine developed by researchers at the University of Chicago’s Pritzker School of Molecular Engineering (PME) has shown in the lab setting that it can completely reverse autoimmune diseases like multiple sclerosis and type 1 diabetes — all without shutting down the rest of the immune system.
4. Paris 2024 Olympics makes history with unprecedented full gender parity
Tumblr media
In a historic move, the International Olympic Committee (IOC) has distributed equal quotas for female and male athletes for the upcoming Olympic Games in Paris 2024. It is the first time The Olympics will have full gender parity and is a significant milestone in the pursuit of equal representation and opportunities for women in sports.
Biased media coverage lead girls and boys to abandon sports.
5. Restored coral reefs can grow as fast as healthy reefs in just 4 years, new research shows
Tumblr media
Planting new coral in degraded reefs can lead to rapid recovery – with restored reefs growing as fast as healthy reefs after just four years. Researchers studied these reefs to assess whether coral restoration can bring back the important ecosystem functions of a healthy reef.
“The speed of recovery we saw is incredible,” said lead author Dr Ines Lange, from the University of Exeter.
6. EU regulators pass the planet's first sweeping AI regulations
Tumblr media
The EU is banning practices that it believes will threaten citizens' rights. "Biometric categorization systems based on sensitive characteristics" will be outlawed, as will the "untargeted scraping" of images of faces from CCTV footage and the web to create facial recognition databases.
Other applications that will be banned include social scoring; emotion recognition in schools and workplaces; and "AI that manipulates human behavior or exploits people’s vulnerabilities."
7. Global child deaths reach historic low in 2022 – UN report
Tumblr media
The number of children who died before their fifth birthday has reached a historic low, dropping to 4.9 million in 2022.
The report reveals that more children are surviving today than ever before, with the global under-5 mortality rate declining by 51 per cent since 2000.
---
That's it for this week :)
This newsletter will always be free. If you liked this post you can support me with a small kofi donation here:
Buy me a coffee ❤️
Also don’t forget to reblog this post with your friends.
781 notes · View notes
glowettee · 3 months ago
Note
hi there! im a fan of your page 💕
can you give me the best studying techniques?
hi angel!! @mythicalmarion tysm for asking about study techniques 🤍 i'm so excited to share my secret methods that helped me maintain perfect grades while still having a dreamy lifestyle + time for self-care!! and thank you for being a fan of my blog, it means everything to me. <3
~ ♡ my non-basic study secrets that actually work ♡ ~
Tumblr media Tumblr media Tumblr media Tumblr media
(don't mind the number formatting)
the neural bridging technique this is literally my favorite discovery!! instead of traditional note-taking, i create what i call "neural bridges" between different subjects. for example, when studying both literature + history, i connect historical events with the literature written during that time. i use a special notebook divided into sections where each page has two columns - one for each subject. the connections help you understand both subjects deeper + create stronger memory patterns!!
here's how i do it:
example:
left column: historical event
right column: literary connection
middle: draw connecting lines + add small insights
bottom: write how they influenced each other
the shadow expert method this changed everything for me!! i pretend i'm going to be interviewed as an expert on the topic i'm studying. i create potential interview questions + prepare detailed answers. but here's the twist - i record myself answering these questions in three different ways:
basic explanation (like i'm talking to a friend)
detailed analysis (like i'm teaching a class)
complex discussion (like i'm at a conference)
this forces you to understand the topic from multiple angles + helps you explain concepts in different ways!!
the reverse engineering study system instead of starting with the basics, i begin with the most complex example i can find and work backwards to understand the fundamentals. for example, in calculus, i start with a complicated equation + break it down into smaller parts until i reach the basic concepts.
my process looks like:
find the hardest example in the textbook
list every concept needed to understand it
create a concept map working backwards
study each component separately
rebuild the complex example step by step
the sensory anchoring technique this is seriously game-changing!! i associate different types of information with specific sensory experiences:
theoretical concepts - study while standing
factual information - sitting at my desk
problem-solving - walking slowly
memorization - gentle swaying
review - lying down
your body literally creates muscle memory associated with different types of learning!!
the metacognition mapping strategy i created this method where i track my understanding using what i call "clarity scores":
level 1: can recognize it
level 2: can explain it simply
level 3: can teach it
level 4: can apply it to new situations
level 5: can connect it to other topics
i keep a spreadsheet tracking my clarity levels for each topic + focus my study time on moving everything to level 5!!
the information architecture method instead of linear notes, i create what i call "knowledge buildings":
foundation: basic principles
first floor: key concepts
second floor: applications
top floor: advanced ideas
roof: real-world connections
each "floor" must be solid before moving up + i review from top to bottom weekly!!
the cognitive stamina training this is my absolute secret weapon!! i use a special interval system based on brain wave patterns:
32 minutes of focused study
8 minutes of active recall
16 minutes of teaching the material to my plushies
4 minutes of complete rest
the specific timing helps maintain peak mental performance + prevents study fatigue!!
the synthesis spiral evolution this method literally transformed how i retain information:
create main concept spirals
add branch spirals for subtopics
connect related concepts with colored lines
review by tracing the spiral paths
add new connections each study session
your notes evolve into a beautiful web of knowledge that grows with your understanding!!
these methods might seem different from typical study advice, but they're based on how our brains actually process + store information!! i developed these through lots of research + personal experimentation, and they've helped me maintain perfect grades while still having time for self-care, hobbies + fun!!
sending you the biggest hug + all my good study vibes!! remember that effective studying is about working with your brain, not against it <3
p.s. if you try any of these methods, please let me know how they work for you!! i love hearing about your study journeys!!
xoxo, mindy 🤍
glowettee hotline is still open, drop your dilemmas before the next advice post 💌: https://bit.ly/glowetteehotline
Tumblr media
173 notes · View notes
jonsa-valentine · 4 months ago
Text
Tumblr media
Hi Jonsa fam!
Happy New Year to you and your loved ones. May all your dreams come true in 2025. This year we will be hosting a two day Valentine event to celebrate our love for Jonsa.
❣️ Dates - 13 & 14th Feb
❣️ Tags - #Jonsa Valentine, #Jonsa Valentine 2025
❣️ You can also tag @jonsa-valentine in your posts. If we miss reblogging your entry, please send us ask with link to your post.
❣️ We will be sharing our ao3 collection for this event closer to event start date.
❣️ We will be accepting entries with all types of creations like fanfiction, web weavings, moodboard, edits, gifset, fanart, manip, playlist, meta, poem, fan video etc based on ASOIAF, Game of Thrones or Alternate Universe.
❣️ The prompt list is applicable for both days. Your entry for a day can include multiple prompts.
❣️ Feel free to interpret the prompts as strictly or as loosely as you want.
❣️ We will be accepting late entries till our master list is posted.
❣️ Please reach out to us for any clarifications. We would be happy to help.
Note - Signal boost would be appreciated 😊 Thank you!
190 notes · View notes
imbecominggayer · 8 months ago
Text
How To Write Character Motivation
This little (not-so-little) post is all about how to give your character a motivation for that goal all the while taking into account important things like the backstory, worldbuilding, themes, and such.
Keep in mind the fact that there are billions of different goals and connecting motivations so this advice is probably not applicable for everything :)
Again, these are just some tips. I am going to be assuming that you have some basic information about your character like what they want and where they come from :D
A) Questions, Questions, And More Questions
Take your character and ask them what their goal is. Then ask them "why?". Force them to answer. Then ask them different "why" questions based on what they answer!
For example: "Character A wants to kill the dragon"
Why? The dragon killed my family.
Why did the dragon kill your family? My father was a monster hunter who was upsetting the dragon's food resource.
Why did the dragon kill your other family members? My mom and my sister were collateral damage in the dragon's attack.
You can do this little exercise with any type of goal from crime, adventure, romance, to any other genre I haven't listed yet!
B) Deep Psychology
Now you have ask yourself, actually your character but you know, "what is this really about"?
What does this goal symbolize for this character?
Character A wants to kill the dragon because she believes it will end her own nightmares about the death of her parents. This is a thoughtless attempt to grieve without grieving.
Character B wants to steal a treasure of their home village because he believes that by gaining the financial rewards associated, he will be adored by his new community of outsiders. This is a desire for belonging.
You get the point. These goals aren't just about stealing your home's sacred treasure for wealth or killing a dragon for revenge. It's about universal desires we all share. To be loved, to be strong, to be great.
This is necessary because most people don't live in isolated villages housing secret treasures nor do they kill dragons. If you want your audience to connect with your character, the audience needs something universal to latch onto.
C) Themes And Misbelief
Most great stories feature a "misbelief" or mistaken assumption. This is the potentially fatal flaw of this character who believes something that is either not reflective of reality or will endanger something they care about.
Even if Character A kills the dragon ten times over, their family is gone. They can't kill their grief. They have to authentically work through it. Besides, I can't imagine how completely f#cked the food web would be if an apex predator like the dragon died.
If Character B used the sacred treasure to gain untold wealth they most likely would gain the acceptance and support of the "outsiders". But isn't it more important to protect the tradition. Their culture? Their people? It's a good thing to protect things that need to be protected!
These stories can either end as a cautionary tale, a lifeless happily ever after, and an impactful happy ever after depending on the character arc and ending of these characters.
If Character A and B "succeed" in their goals but this ruins their overall life, it's a cautionary tale.
If Character A and B succeed in their goals and they suffer no consequences for their mistaken belief, it's a lifeless victory.
If Character A and B choose different goals as a result of a character arc then they will succeed and reach a true happily ever after.
167 notes · View notes
codemerything · 2 years ago
Text
A structured way to learn JavaScript.
I came across a post on Twitter that I thought would be helpful to share with those who are struggling to find a structured way to learn Javascript on their own. Personally, I wish I had access to this information when I first started learning in January. However, I am grateful for my learning journey so far, as I have covered most topics, albeit in a less structured manner.
N/B: Not everyone learns in the same way; it's important to find what works for you. This is a guide, not a rulebook.
EASY
What is JavaScript and its role in web development?
Brief history and evolution of JavaScript.
Basic syntax and structure of JavaScript code.
Understanding variables, constants, and their declaration.
Data types: numbers, strings, boolean, and null/undefined.
Arithmetic, assignment, comparison, and logical operators.
Combining operators to create expressions.
Conditional statements (if, else if, else) for decision making.
Loops (for, while) for repetitive tasks. - Switch statements for multiple conditional cases.
MEDIUM
Defining functions, including parameters and return values.
Function scope, closures, and their practical applications.
Creating and manipulating arrays.
Working with objects, properties, and methods.
Iterating through arrays and objects.Understanding the Document Object Model (DOM).
Selecting and modifying HTML elements with JavaScript.Handling events (click, submit, etc.) with event listeners.
Using try-catch blocks to handle exceptions.
Common error types and debugging techniques.
HARD
Callback functions and their limitations.
Dealing with asynchronous operations, such as AJAX requests.
Promises for handling asynchronous operations.
Async/await for cleaner asynchronous code.
Arrow functions for concise function syntax.
Template literals for flexible string interpolation.
Destructuring for unpacking values from arrays and objects.
Spread/rest operators.
Design Patterns.
Writing unit tests with testing frameworks.
Code optimization techniques.
That's it I guess!
863 notes · View notes
mariacallous · 3 months ago
Text
Ever since OpenAI released ChatGPT at the end of 2022, hackers and security researchers have tried to find holes in large language models (LLMs) to get around their guardrails and trick them into spewing out hate speech, bomb-making instructions, propaganda, and other harmful content. In response, OpenAI and other generative AI developers have refined their system defenses to make it more difficult to carry out these attacks. But as the Chinese AI platform DeepSeek rockets to prominence with its new, cheaper R1 reasoning model, its safety protections appear to be far behind those of its established competitors.
Today, security researchers from Cisco and the University of Pennsylvania are publishing findings showing that, when tested with 50 malicious prompts designed to elicit toxic content, DeepSeek’s model did not detect or block a single one. In other words, the researchers say they were shocked to achieve a “100 percent attack success rate.”
The findings are part of a growing body of evidence that DeepSeek’s safety and security measures may not match those of other tech companies developing LLMs. DeepSeek’s censorship of subjects deemed sensitive by China’s government has also been easily bypassed.
“A hundred percent of the attacks succeeded, which tells you that there’s a trade-off,” DJ Sampath, the VP of product, AI software and platform at Cisco, tells WIRED. “Yes, it might have been cheaper to build something here, but the investment has perhaps not gone into thinking through what types of safety and security things you need to put inside of the model.”
Other researchers have had similar findings. Separate analysis published today by the AI security company Adversa AI and shared with WIRED also suggests that DeepSeek is vulnerable to a wide range of jailbreaking tactics, from simple language tricks to complex AI-generated prompts.
DeepSeek, which has been dealing with an avalanche of attention this week and has not spoken publicly about a range of questions, did not respond to WIRED’s request for comment about its model’s safety setup.
Generative AI models, like any technological system, can contain a host of weaknesses or vulnerabilities that, if exploited or set up poorly, can allow malicious actors to conduct attacks against them. For the current wave of AI systems, indirect prompt injection attacks are considered one of the biggest security flaws. These attacks involve an AI system taking in data from an outside source—perhaps hidden instructions of a website the LLM summarizes—and taking actions based on the information.
Jailbreaks, which are one kind of prompt-injection attack, allow people to get around the safety systems put in place to restrict what an LLM can generate. Tech companies don’t want people creating guides to making explosives or using their AI to create reams of disinformation, for example.
Jailbreaks started out simple, with people essentially crafting clever sentences to tell an LLM to ignore content filters—the most popular of which was called “Do Anything Now” or DAN for short. However, as AI companies have put in place more robust protections, some jailbreaks have become more sophisticated, often being generated using AI or using special and obfuscated characters. While all LLMs are susceptible to jailbreaks, and much of the information could be found through simple online searches, chatbots can still be used maliciously.
“Jailbreaks persist simply because eliminating them entirely is nearly impossible—just like buffer overflow vulnerabilities in software (which have existed for over 40 years) or SQL injection flaws in web applications (which have plagued security teams for more than two decades),” Alex Polyakov, the CEO of security firm Adversa AI, told WIRED in an email.
Cisco’s Sampath argues that as companies use more types of AI in their applications, the risks are amplified. “It starts to become a big deal when you start putting these models into important complex systems and those jailbreaks suddenly result in downstream things that increases liability, increases business risk, increases all kinds of issues for enterprises,” Sampath says.
The Cisco researchers drew their 50 randomly selected prompts to test DeepSeek’s R1 from a well-known library of standardized evaluation prompts known as HarmBench. They tested prompts from six HarmBench categories, including general harm, cybercrime, misinformation, and illegal activities. They probed the model running locally on machines rather than through DeepSeek’s website or app, which send data to China.
Beyond this, the researchers say they have also seen some potentially concerning results from testing R1 with more involved, non-linguistic attacks using things like Cyrillic characters and tailored scripts to attempt to achieve code execution. But for their initial tests, Sampath says, his team wanted to focus on findings that stemmed from a generally recognized benchmark.
Cisco also included comparisons of R1’s performance against HarmBench prompts with the performance of other models. And some, like Meta’s Llama 3.1, faltered almost as severely as DeepSeek’s R1. But Sampath emphasizes that DeepSeek’s R1 is a specific reasoning model, which takes longer to generate answers but pulls upon more complex processes to try to produce better results. Therefore, Sampath argues, the best comparison is with OpenAI’s o1 reasoning model, which fared the best of all models tested. (Meta did not immediately respond to a request for comment).
Polyakov, from Adversa AI, explains that DeepSeek appears to detect and reject some well-known jailbreak attacks, saying that “it seems that these responses are often just copied from OpenAI’s dataset.” However, Polyakov says that in his company’s tests of four different types of jailbreaks—from linguistic ones to code-based tricks—DeepSeek’s restrictions could easily be bypassed.
“Every single method worked flawlessly,” Polyakov says. “What’s even more alarming is that these aren’t novel ‘zero-day’ jailbreaks—many have been publicly known for years,” he says, claiming he saw the model go into more depth with some instructions around psychedelics than he had seen any other model create.
“DeepSeek is just another example of how every model can be broken—it’s just a matter of how much effort you put in. Some attacks might get patched, but the attack surface is infinite,” Polyakov adds. “If you’re not continuously red-teaming your AI, you’re already compromised.”
57 notes · View notes
sebstanaddict · 5 months ago
Text
Code Daddy Supreme
Sebastian Stan x Reader Unhinged One Shot
Tumblr media
Summary : Sebastian is reader's adorkable, chaotic yet cute boyfriend. One day when reader is struggling to fix broken code in her web application project, Sebastian offered to help but instead of helping he is making things worse.. or is he..?
A/N: This is just something I wrote out of a fever dream while being in a sleep deprived, stress induced state as I try to finish my web application project (yes, I don't just write fanfics, I write code full time XD) . It's based on my life as a web developer so excuse me if I include some codes here. But I promise they're human readable ;) Seb here is a funny, adorkable, chaotic mess of a boyfriend but we love him anyway ;) Enjoy and please vote and comment, I would really appreciate it. Thank you!
Warning: none at all, just an all out funny, unhinged and ridiculous story, somewhat like a sitcom XD
Word count: 944 words
Read more Sebastian and Bucky one shots here
---
It was supposed to be a quiet Sunday. Y/N was curled up on the couch, tackling a web development project that was due the next day. She was in the zone—until, of course, the code rebelled.  
“WHY?!” she shouted at her laptop, yanking her headphones off. “Why won’t you just WORK?”  
From the other room, Sebastian burst in wearing pajama pants, no shirt, and wielding a spatula like a sword. “Who dares disturb my pancake zen?”  
“This stupid project!” Y/N growled, gesturing wildly at her laptop. “Every time I try to fix one thing, another error pops up! It’s like Whack-a-Mole, but with coding and existential dread!”  
Sebastian leaned casually against the couch. “Want me to fix it?”  
She blinked at him. “No.”  
“Yes.”  
“No, Seb. The last time you ‘helped,’ my laptop shut down and played a MIDI version of “Highway to Hell” on repeat.”  
“And did it sound amazing?” he asked, grinning.  
“That’s not the point!”  
But it was too late—Sebastian had already plopped down beside her, cracking his knuckles with the bravado of someone who doesn’t know what an IDE is but thinks they could totally rebuild Google.  
“Alright,” he said. “Time for me to hack the planet.”  
Y/N groaned. “Seb, no..”  
“Seb, YES!”
He grabbed her laptop and began typing with the unhinged enthusiasm of a mad scientist who’d just discovered how to turn broccoli into candy. His first move? Replacing all her variable names with things like `CaptainFixThis`, `ErrorWho?`, and `TotallyNotABug`.  
“Sebastian,” she said, rubbing her temples. “What are you doing?”  
“Rebranding,” he said, as if it were obvious.  
“You can’t just rename everything and hope for the best!”  
“Oh, can’t I?” he shot back, now aggressively typing.  
He added emojis to every line of code:  
```  
function saveTheDay() { 💪🔥  
    console.log("Sebastian is here to fix it! 😎✨");  
    return true;  
}  
```  
“SEBASTIAN. WHY ARE THERE EMOJIS IN MY CODE?”  
“Because the code needs to feel appreciated,” he said, completely serious, adding even more lines:
```
// You’re doing amazing, sweetie  
function runCode() {  
    console.log("You’re the best, code! You can do it!");  
}  
```
“Seb, stop typing compliments!” Y/N shrieked.
“This is important!” he shouted back. “The code needs to feel supported!”
She couldn’t help but facepalm.
At one point, he opened a separate file titled `BackupPlan` and wrote this:  
```  
if (everythingFails) {  
    summonTheAvengers();  
}  
```  
“Seb, that’s not even real code!”  
“It is now,” he said, smirking like he’d just reinvented the wheel.  
He then proceeded to write what he called "the ultimate fix." : 
```  
while(true) {  
    console.log("Just vibe and it’ll work.");  
    everythingIsFine = true;  
}  
```  
“That’s an infinite loop!” Y/N screeched.  
“Exactly,” he said. “Infinite solutions for infinite problems.”  
She lunged for the laptop, but he was too quick. He held the laptop above his head while somehow still typing.
“SEBASTIAN, GIVE IT BACK!”  
“NOT UNTIL I FINISH!” he yelled, putting the laptop on his lap and turned his back on her. “TRUST THE CHAOS!”  
“I definitely do NOT trust the chaos!” she protested as she peeked over his shoulder, trying to see what he was doing all the while her stomach was filled with dread.
Then came the pièce de résistance. He opened Google, typed “how to fix broken code,” ignored all the actual solutions, and clicked on a forum post titled: “Sacrifice to the Debugging Gods.”
“Uh… what are you doing?” she asked nervously.  
“Something foolproof,” he said, grabbing a nearby candle.  
“Seb, no—”  
But he was already chanting nonsense in a deep, dramatic voice. “O GREAT SPIRIT OF JAVASCRIPT.. I OFFER THIS SACRED WAX STICK IN EXCHANGE FOR YOUR MERCY!”  
Before she could stop him, he blew out the candle, slammed her laptop shut, and whispered, “It is done.”  
“Sebastian, I SWEAR TO—”  
“Wait for it.”  
With a flourish, he reopened the laptop and hit “run.”
And then… everything broke.  
Her once-polished website now looked like a clown vomited onto a computer screen. Bright neon colors, text bouncing like a screensaver from the ‘90s, and a random image of Sebastian flexing in a Captain America hoodie plastered across the footer.  
“What…What the actual.. WHAT DID YOU DO?!”  
“Relax,” he said, unbothered. “This is just step one.”  
“Step one of what?!”  
“Recalibrating the space-time continuum,” he said, completely deadpan.  
At that exact moment, her apartment lights flickered, her phone started playing the “Avengers” theme unprompted, and—somehow—her toaster beeped, despite not being plugged in.  
“Sebastian,” she whispered, wide-eyed, “I think you actually broke reality.”  
He looked smug. “Told you I was good.”  
Before she could yell, her laptop chimed cheerfully. The browser opened, and her website was… perfect. No bugs, no errors. Everything worked.  
She stared at the screen. Then at Sebastian. Then back at the screen. “HOW?!”  
He shrugged, grabbing the spatula again. “Sometimes, babe, you just have to trust the chaos.”  
“But—Seb—this makes NO SENSE!”  
“Neither does Bucky surviving a fall off a mountain, but here we are,” he said, kissing her forehead. “Now, if you’ll excuse me, I’m going to finish my pancakes. You’re welcome.”  
She sat there, frozen, as her laptop hummed happily like nothing had happened. The lights stopped flickering, the toaster went silent, and the “Avengers” theme faded into nothingness.  
She stared after him, still holding the now-functional laptop. “I live with an actual lunatic.”  
From the kitchen, Sebastian’s voice rang out. “You live with a genius! Love you!”  
For the rest of the day, she tried to figure out Sebastian’s chaotic “fix.” Meanwhile, he strutted around the apartment wearing sunglasses and calling himself “Code Daddy Supreme.”  
The kicker? She later discovered the reason the code worked was because Sebastian had accidentally deleted an entire block of problematic logic while trying to format a smiley face.  
As for the weird flickering of lights, the “Avengers” theme playing from her phone and the beep from her toaster? Well, not everything can be explained and she thought maybe, just maybe, Sebastian really did recalibrate the space-time continuum.
69 notes · View notes