#data capture software
Explore tagged Tumblr posts
octalsoft · 2 months ago
Text
Clinical Trial Technology and Complexity in the Real World – Why You Need a Flexible EDC System
Tumblr media
The concept of EDC (electronic data capture) systems in clinical trials was first introduced over two decades ago. However, these archaic legacy systems are in no way equipped to deal with the sheer volume of data captured in a modern clinical trial. Over time, software firms offering an EDC system for clinical trials have established a significant market for their solutions, and yet innovative intuitive functionality is still lacking in most.
The idea of “if it isn’t broken, it doesn’t need fixing.” has held back innovation in the EDC tool system segment resulting in inherently flawed systems that could cost sponsors millions, not to mention years of wasted time.
As data management teams cope with the increasing complexity of trial design and protocol amendments, the fragility of legacy EDC software systems is becoming increasingly apparent. An inability to adapt to change and frequent downtimes are issues that can be worked around but they place an unnecessary burden on data management teams, resulting in fatigue, error, and most importantly, delays. In short, “It works well enough” just doesn’t cut it anymore. In short you need a highly efficient yet flexible EDC system.
This is where Octalsoft���s EDC system states its superiority as the best EDC software. Here are four ways Octalsoft's EDC solves these legacy challenges.
1. Capable of including Amendments with zero downtime
Existing EDC software systems are frequently cited as a source of customer dissatisfaction, given the frequency with which they crash anytime there is a change. 
The fundamental database foundations of a traditional/legacy EDC are too rigid, which means that any time there is even the slightest change, the primary data structure needs to be reconstructed from the ground up.
In the fast-paced setting of a modern clinical trial, it is simply no longer acceptable to shut down the EDC software for hours at a time due to a large number of amendments and pivots that frequently take place in clinical investigations.
The contemporary and adaptable data structure of Octalsoft's regulatory compliant EDC system makes it possible for adjustments to be made with no downtime, removing the necessity to migrate data whenever an amendment is made and preventing end users from being kicked out of the system. This is more than just "no system downtime," it is in fact "no downtime for end users." 
2. Maximizing Custom Functions
Every clinical trial is unique and hence requires an EDC that can adapt to the trial's specific requirements. Being forced to invest in additional systems just because the functionality of the EDC is sub-optimal is an expensive and wasteful approach. Octalsoft’s EDC tool includes every functionality that a modern clinical trial could need inclusive of a cloud-native platform and customization opportunities so that your EDC scales in tandem with your objectives. 
Octalsoft's EDC software can handle complex edit checks directly from the system without requiring any external programming. Users can also organically add assessments, set derived values, and override targeted Source Data Verification in addition to emergency protocol deviations with minimal effort. 
3. Intuitive and Effective Study Builds
Building out intuitive and effective studies is yet another essential component of efficient EDC tools. The integrated environment of Octalsoft’s EDC offers a simplified study builder functionality that allows users to do so in much shorter time frames without having to hand over control to development execs to convert protocols to code.
The Event Group functionality allows designers to work collaboratively within a single environment that ranges from individual treatment arms to a full sub-study of the master protocol. Subject Groups support named groups to facilitate seamless tracking and reporting. 
The Octasoft EDC system validation difference report compares two distinct versions of a casebook. It identifies modifications for accurate User Acceptance Testing (UAT) by focusing on specific items, thus significantly reducing time and cost when it comes to including amendments. 
Form Linking allows the user to establish a bi-directional connection between forms so as to easily capture relevant insights without switching between screens. e.g. An adverse event could be connected to its corresponding medication. 
4. Enhanced UX
Handling the need gaps of legacy EDC software systems served as a strong foundation to build upon. Octalsoft identified the opportunity to make the entire user experience of our EDC a lot more streamlined and enjoyable for our users. 
Octalsoft’s EDC user interface is designed to be both modern as well as deeply intuitive so that the user can navigate the system easily without spending hours in training sessions. There are many additional functionalities within our EDC system that make for a stellar UX. 
The Autosave feature allows users to never lose any data, eliminating the stress and data loss) associated with systems timing out.
The EDC’s quick view feature offers CRAs and DMs an expansive yet cohesive view of task statuses. This is a massive upgrade from the form-by-form navigation of a legacy EDC. It does away with cluttered fields that are irrelevant to the task at hand. 
This feature is designed to help users work in a way that is comfortable and yet does not compromise productivity or output quality. CRAS can now work incrementally without having to launch tiresome manual searches for every byte of data.
In Summation 
Better features lead to an enhanced user experience and better UX leads to enhanced productivity and efficiency. This in turn results in better data and thus a better study. But our spirit of consistent innovation doesn’t stop with our EDC. As a core component of our eClinical suite Octalsoft's EDC is simply the starting point for revolutionizing clinical data management. 
Interested in knowing how you can streamline capture, analyze, and report clinical trial data with the utmost precision? To find out, Book a Demo with us NOW!
0 notes
insurance-brokers-india · 6 months ago
Text
What are the next steps after obtaining an insurance broker license, and how can you generate potential leads using Mzapp CRM software?
Congratulations on securing your insurance broker license! The journey doesn’t end here; it’s just the beginning of building a successful insurance brokerage. Here’s how you can proceed and leverage Mzapp CRM software to find potential leads:
Steps After Getting Your Insurance Broker License
Understand Your Market: Research your target audience (individuals, businesses, or specific sectors).
Develop a Business Plan: Set goals for client acquisition, revenue, and operational processes.
Build a Network: Partner with insurance providers and attend industry events to establish your presence.
Create an Online Presence: Build a professional website and maintain active profiles on social platforms.
Offer Value-Added Services: Educate customers on policies, claims management, and risk assessments.
Using Mzapp CRM Software to Generate Leads
Lead Capture: Utilize Mzapp’s integrated forms and web tracking tools to capture inquiries from your website or social media.
Automated Follow-Ups: Set up personalized email and SMS follow-ups to nurture leads effectively.
Lead Scoring: Prioritize leads based on their interaction history, ensuring you focus on high-potential prospects.
Data-Driven Campaigns: Use analytics to identify what works and launch targeted campaigns.
Seamless Policy Management: Impress leads by showcasing how smoothly you manage policies and claims through Mzapp.
Why Choose Mzapp CRM?
Mzapp CRM simplifies lead management, streamlines operations, and provides insights into customer behavior, making it easier to convert prospects into loyal clients.
Learn more about how Mzapp can transform your insurance business here.
#Question:#What are the next steps after obtaining an insurance broker license#and how can you generate potential leads using Mzapp CRM software?#Answer:#Congratulations on securing your insurance broker license! The journey doesn’t end here; it’s just the beginning of building a successful i#Steps After Getting Your Insurance Broker License#Understand Your Market: Research your target audience (individuals#businesses#or specific sectors).#Develop a Business Plan: Set goals for client acquisition#revenue#and operational processes.#Build a Network: Partner with insurance providers and attend industry events to establish your presence.#Create an Online Presence: Build a professional website and maintain active profiles on social platforms.#Offer Value-Added Services: Educate customers on policies#claims management#and risk assessments.#Using Mzapp CRM Software to Generate Leads#Lead Capture: Utilize Mzapp’s integrated forms and web tracking tools to capture inquiries from your website or social media.#Automated Follow-Ups: Set up personalized email and SMS follow-ups to nurture leads effectively.#Lead Scoring: Prioritize leads based on their interaction history#ensuring you focus on high-potential prospects.#Data-Driven Campaigns: Use analytics to identify what works and launch targeted campaigns.#Seamless Policy Management: Impress leads by showcasing how smoothly you manage policies and claims through Mzapp.#Why Choose Mzapp CRM?#Mzapp CRM simplifies lead management#streamlines operations#and provides insights into customer behavior#making it easier to convert prospects into loyal clients.#Learn more about how Mzapp can transform your insurance business here.
1 note · View note
franchisesales · 9 months ago
Text
Details Presentation Belltree Ltd
We are a global software provider with a supporting consultancy business within the Upstream Oil and Gas Industry. Our team consists of reservoir engineers, geologists and data scientists. For 15 years, we have been a trusted partner of government regulators, NOCs and IOCs to maximize asset performance and identify hidden reserves potential in a sustainable manner.
22A/4 Calton Road,Edinburgh UK,EH8 8DP
+44 (0)131 225 3796
0 notes
omrhome1 · 9 months ago
Text
Tumblr media
Transform Data Capture with OMR Home’s Precision Software Solutions
0 notes
nasa · 20 days ago
Text
Tumblr media
Hubble Space Telescope: Exploring the Cosmos and Making Life Better on Earth
In the 35 years since its launch aboard space shuttle Discovery, the Hubble Space Telescope has provided stunning views of galaxies millions of light years away. But the leaps in technology needed for its look into space has also provided benefits on the ground. Here are some of the technologies developed for Hubble that have improved life on Earth.
Tumblr media
Image Sensors Find Cancer
Charge-coupled device (CCD) sensors have been used in digital photography for decades, but Hubble’s Space Telescope Imaging Spectrograph required a far more sensitive CCD. This development resulted in improved image sensors for mammogram machines, helping doctors find and treat breast cancer.
Tumblr media
Laser Vision Gives Insights
In preparation for a repair mission to fix Hubble’s misshapen mirror, Goddard Space Flight Center required a way to accurately measure replacement parts. This resulted in a tool to detect mirror defects, which has since been used to develop a commercial 3D imaging system and a package detection device now used by all major shipping companies.
Tumblr media
Optimized Hospital Scheduling
A computer scientist who helped design software for scheduling Hubble’s observations adapted it to assist with scheduling medical procedures. This software helps hospitals optimize constantly changing schedules for medical imaging and keep the high pace of emergency rooms going.
Tumblr media
Optical Filters Match Wavelengths and Paint Swatches
For Hubble’s main cameras to capture high-quality images of stars and galaxies, each of its filters had to block all but a specific range of wavelengths of light. The filters needed to capture the best data possible but also fit on one optical element. A company contracted to construct these filters used its experience on this project to create filters used in paint-matching devices for hardware stores, with multiple wavelengths evaluated by a single lens.
Make sure to follow us on Tumblr for your regular dose of space!
Tumblr media
2K notes · View notes
pathquestsolutions · 1 year ago
Text
Rise Above Paper Trail: Switch to Automation for Error-free Invoice Scanning
Tumblr media
Given the need for Accounts Payable (AP) teams to manually input data from paper invoices, the task of scanning diverse bills becomes arduous and prone to errors. Therefore, problems like slow approvals, excessive paper use, and numerous manual processes now top the list of AP concerns.
These persistent accounts payable challenges don’t seem to be going away any time soon. Recent statistics tell a harsh truth – almost 40% of businesses are still grappling with paper invoices. In a world where time is of the essence, the burden of slow approvals, manual tasks, and paper overload weighs heavily on AP teams. And there’s more to come – a whopping 80% of AP representatives are bracing for a surge of invoices, with 53% anticipating increased complexity. 
The need for change could not be any more urgent, especially in a fast-paced business landscape where time translates directly into monetary value.
Against this backdrop, this blog delves into the potential of data capture in AP Automation, shedding light on the integral role played by Optical Character Recognition (OCR) in streamlining invoice scanning and indexing processes. Read more at https://pathquest.com/knowledge-center/blogs/error-free-invoice-scanning-with-ap-automation/
0 notes
timechampblogs · 2 years ago
Text
1 note · View note
apod · 25 days ago
Photo
Tumblr media
2025 April 19
Painting with Jupiter Image Credit: NASA, JPL-Caltech, SwRI, MSSS; Processing: Rick Lundh
Explanation: In digital brush strokes, Jupiter's signature atmospheric bands and vortices were used to form this interplanetary post-impressionist work of art. The creative image from citizen scientist Rick Lundh uses data from the Juno spacecraft's JunoCam. To paint on the digital canvas, a JunoCam image with contrasting light and dark tones was chosen for processing and an oil-painting software filter applied. The image data was captured during perijove 10. That was Juno's December 16, 2017 close encounter with the solar system's ruling gas giant. At the time the spacecraft was cruising about 13,000 kilometers above northern Jovian cloud tops. Now in an extended mission, Juno has explored Jupiter and its moons since entering orbit around Jupiter in July of 2016.
∞ Source: apod.nasa.gov/apod/ap250419.html
99 notes · View notes
olive-pup · 10 months ago
Text
Okay this is a huge step towards my goals. What it looks like is just a servo randomly moving but what you can't see in the background is an esp32 receiving a stream from my phone which is connected to an EEG headband. Specifically this is tracking gamma brain waves. The lower the number the less I'm actively thinking. There's a very long road ahead before I'm ready to integrate this into my ears and tail, but this is the first step, and since I'm not a software doggy, it's a big step. Next steps will be to capture the raw data and implement floating point average and servo smoothing to get a more consistent "animation" then it's just up to me to train my brain on how to make it do it's thing.
337 notes · View notes
beautifulmars · 19 days ago
Text
Tumblr media
Sunrise to Sunset on the Martian Mimetolith
Scattered mesas, such as this one, are common in the Cydonia region, where the heavily cratered Southern highlands of Mars transition into the smooth Northern lowlands. Many midlatitude locations like this have also experienced glacial activity, which probably reduced the size of this mesa and created the stubby valleys around its highest level. Patches of smooth material (especially on its east- and north-facing sides) are likely to be remnants of dusty water ice.
This particular mesa acquired a certain notoriety when an image was captured by the Viking 1 orbiter on 25 July 1976. The shadows cast across the feature created a pareidolic perception of a human face. This feature became one of the most famous examples of a “mimetolith,” a pattern created by rocks that may come to mimic recognizable forms through the random processes of formation, weathering and erosion.
A stereo pair of this feature taken by HiRISE was turned into a digital terrain model. HiRISE DTMs are made from two images of the same area on the ground, taken from different angles, on different orbits. HiRISE DTMs provide valuable data, not only for researchers, but also for visualizing the terrain.
For example, with the DTM we can recreate the shadows on the day of the original 1976 Viking image. By modeling the sun angle as it would have appeared on 25 July 1976 throughout the day, the features of the mimetolith only take shape when the lighting is lowest just before sunset. This video and color perspective views were created by our team using the DTM data input into open source visualization software. Visualizations such as these provide an accurate view of what could be seen by a ground-based or aerial explorer.
ID: ESP_080970_2210 date: 4 November 2023 altitude: 299 km
NASA/JPL-Caltech/University of Arizona
53 notes · View notes
mariacallous · 2 days ago
Text
These days, when Nicole Yelland receives a meeting request from someone she doesn’t already know, she conducts a multi-step background check before deciding whether to accept. Yelland, who works in public relations for a Detroit-based non-profit, says she’ll run the person’s information through Spokeo, a personal data aggregator that she pays a monthly subscription fee to use. If the contact claims to speak Spanish, Yelland says, she will casually test their ability to understand and translate trickier phrases. If something doesn’t quite seem right, she’ll ask the person to join a Microsoft Teams call—with their camera on.
If Yelland sounds paranoid, that’s because she is. In January, before she started her current non-profit role, Yelland says she got roped into an elaborate scam targeting job seekers. “Now, I do the whole verification rigamarole any time someone reaches out to me,” she tells WIRED.
Digital imposter scams aren’t new; messaging platforms, social media sites, and dating apps have long been rife with fakery. In a time when remote work and distributed teams have become commonplace, professional communications channels are no longer safe, either. The same artificial intelligence tools that tech companies promise will boost worker productivity are also making it easier for criminals and fraudsters to construct fake personas in seconds.
On LinkedIn, it can be hard to distinguish a slightly touched-up headshot of a real person from a too-polished, AI-generated facsimile. Deepfake videos are getting so good that longtime email scammers are pivoting to impersonating people on live video calls. According to the US Federal Trade Commission, reports of job and employment related scams nearly tripled from 2020 to 2024, and actual losses from those scams have increased from $90 million to $500 million.
Yelland says the scammers that approached her back in January were impersonating a real company, one with a legitimate product. The “hiring manager” she corresponded with over email also seemed legit, even sharing a slide deck outlining the responsibilities of the role they were advertising. But during the first video interview, Yelland says, the scammers refused to turn their cameras on during a Microsoft Teams meeting and made unusual requests for detailed personal information, including her driver’s license number. Realizing she’d been duped, Yelland slammed her laptop shut.
These kinds of schemes have become so widespread that AI startups have emerged promising to detect other AI-enabled deepfakes, including GetReal Labs, and Reality Defender. OpenAI CEO Sam Altman also runs an identity-verification startup called Tools for Humanity, which makes eye-scanning devices that capture a person’s biometric data, create a unique identifier for their identity, and store that information on the blockchain. The whole idea behind it is proving “personhood,” or that someone is a real human. (Lots of people working on blockchain technology say that blockchain is the solution for identity verification.)
But some corporate professionals are turning instead to old-fashioned social engineering techniques to verify every fishy-seeming interaction they have. Welcome to the Age of Paranoia, when someone might ask you to send them an email while you’re mid-conversation on the phone, slide into your Instagram DMs to ensure the LinkedIn message you sent was really from you, or request you text a selfie with a timestamp, proving you are who you claim to be. Some colleagues say they even share code words with each other, so they have a way to ensure they’re not being misled if an encounter feels off.
“What’s funny is, the low-fi approach works,” says Daniel Goldman, a blockchain software engineer and former startup founder. Goldman says he began changing his own behavior after he heard a prominent figure in the crypto world had been convincingly deepfaked on a video call. “It put the fear of god in me,” he says. Afterwards, he warned his family and friends that even if they hear what they believe is his voice or see him on a video call asking for something concrete—like money or an internet password—they should hang up and email him first before doing anything.
Ken Schumacher, founder of the recruitment verification service Ropes, says he’s worked with hiring managers who ask job candidates rapid-fire questions about the city where they claim to live on their resume, such as their favorite coffee shops and places to hang out. If the applicant is actually based in that geographic region, Schumacher says, they should be able to respond quickly with accurate details.
Another verification tactic some people use, Schumacher says, is what he calls the “phone camera trick.” If someone suspects the person they’re talking to over video chat is being deceitful, they can ask them to hold up their phone camera to their laptop. The idea is to verify whether the individual may be running deepfake technology on their computer, obscuring their true identity or surroundings. But it’s safe to say this approach can also be off-putting: Honest job candidates may be hesitant to show off the inside of their homes or offices, or worry a hiring manager is trying to learn details about their personal lives.
“Everyone is on edge and wary of each other now,” Schumacher says.
While turning yourself into a human captcha may be a fairly effective approach to operational security, even the most paranoid admit these checks create an atmosphere of distrust before two parties have even had the chance to really connect. They can also be a huge time suck. “I feel like something’s gotta give,” Yelland says. “I’m wasting so much time at work just trying to figure out if people are real.”
Jessica Eise, an assistant professor studying climate change and social behavior at Indiana University-Bloomington, says that her research team has been forced to essentially become digital forensics experts, due to the amount of fraudsters who respond to ads for paid virtual surveys. (Scammers aren’t as interested in the unpaid surveys, unsurprisingly.) If the research project is federally funded, all of the online participants have to be over the age of 18 and living in the US.
“My team would check time stamps for when participants answered emails, and if the timing was suspicious, we could guess they might be in a different time zone,” Eise says. “Then we’d look for other clues we came to recognize, like certain formats of email address or incoherent demographic data.”
Eise says the amount of time her team spent screening people was “exorbitant,” and that they’ve now shrunk the size of the cohort for each study and have turned to “snowball sampling” or having recruiting people they know personally to join their studies. The researchers are also handing out more physical flyers to solicit participants in person. “We care a lot about making sure that our data has integrity, that we’re studying who we say we’re trying to study,” she says. “I don’t think there’s an easy solution to this.”
Barring any widespread technical solution, a little common sense can go a long way in spotting bad actors. Yelland shared with me the slide deck that she received as part of the fake job pitch. At first glance, it seemed like legit pitch, but when she looked at it again, a few details stood out. The job promised to pay substantially more than the average salary for a similar role in her location, and offered unlimited vacation time, generous paid parental leave, and fully-covered health care benefits. In today’s job environment, that might have been the biggest tipoff of all that it was a scam.
28 notes · View notes
octalsoft · 6 months ago
Text
Clinical Trial Technology and Complexity in the Real World – Why You Need a Flexible EDC System
Tumblr media
The concept of EDC (electronic data capture) systems in clinical trials was first introduced over two decades ago. However, these archaic legacy systems are in no way equipped to deal with the sheer volume of data captured in a modern clinical trial. Over time, software firms offering an EDC system for clinical trials have established a significant market for their solutions, and yet innovative intuitive functionality is still lacking in most.
The idea of “if it isn’t broken, it doesn’t need fixing.” has held back innovation in the EDC tool system segment resulting in inherently flawed systems that could cost sponsors millions, not to mention years of wasted time.
As data management teams cope with the increasing complexity of trial design and protocol amendments, the fragility of legacy EDC software systems is becoming increasingly apparent. An inability to adapt to change and frequent downtimes are issues that can be worked around but they place an unnecessary burden on data management teams, resulting in fatigue, error, and most importantly, delays. In short, “It works well enough” just doesn’t cut it anymore. In short you need a highly efficient yet flexible EDC system.
This is where Octalsoft’s EDC system states its superiority as the best EDC software. Here are four ways Octalsoft's EDC solves these legacy challenges.
1. Capable of including Amendments with zero downtime
Existing EDC software systems are frequently cited as a source of customer dissatisfaction, given the frequency with which they crash anytime there is a change. 
The fundamental database foundations of a traditional/legacy EDC are too rigid, which means that any time there is even the slightest change, the primary data structure needs to be reconstructed from the ground up.
In the fast-paced setting of a modern clinical trial, it is simply no longer acceptable to shut down the EDC software for hours at a time due to a large number of amendments and pivots that frequently take place in clinical investigations.
The contemporary and adaptable data structure of Octalsoft's regulatory compliant EDC system makes it possible for adjustments to be made with no downtime, removing the necessity to migrate data whenever an amendment is made and preventing end users from being kicked out of the system. This is more than just "no system downtime," it is in fact "no downtime for end users." 
2. Maximizing Custom Functions
Every clinical trial is unique and hence requires an EDC that can adapt to the trial's specific requirements. Being forced to invest in additional systems just because the functionality of the EDC is sub-optimal is an expensive and wasteful approach. Octalsoft’s EDC tool includes every functionality that a modern clinical trial could need inclusive of a cloud-native platform and customization opportunities so that your EDC scales in tandem with your objectives. 
Octalsoft's EDC software can handle complex edit checks directly from the system without requiring any external programming. Users can also organically add assessments, set derived values, and override targeted Source Data Verification in addition to emergency protocol deviations with minimal effort. 
3. Intuitive and Effective Study Builds
Building out intuitive and effective studies is yet another essential component of efficient EDC tools. The integrated environment of Octalsoft’s EDC offers a simplified study builder functionality that allows users to do so in much shorter time frames without having to hand over control to development execs to convert protocols to code.
The Event Group functionality allows designers to work collaboratively within a single environment that ranges from individual treatment arms to a full sub-study of the master protocol. Subject Groups support named groups to facilitate seamless tracking and reporting. 
The Octasoft EDC system validation difference report compares two distinct versions of a casebook. It identifies modifications for accurate User Acceptance Testing (UAT) by focusing on specific items, thus significantly reducing time and cost when it comes to including amendments. 
Form Linking allows the user to establish a bi-directional connection between forms so as to easily capture relevant insights without switching between screens. e.g. An adverse event could be connected to its corresponding medication. 
4. Enhanced UX
Handling the need gaps of legacy EDC software systems served as a strong foundation to build upon. Octalsoft identified the opportunity to make the entire user experience of our EDC a lot more streamlined and enjoyable for our users. 
Octalsoft’s EDC user interface is designed to be both modern as well as deeply intuitive so that the user can navigate the system easily without spending hours in training sessions. There are many additional functionalities within our EDC system that make for a stellar UX. 
The Autosave feature allows users to never lose any data, eliminating the stress and data loss) associated with systems timing out.
The EDC’s quick view feature offers CRAs and DMs an expansive yet cohesive view of task statuses. This is a massive upgrade from the form-by-form navigation of a legacy EDC. It does away with cluttered fields that are irrelevant to the task at hand. 
This feature is designed to help users work in a way that is comfortable and yet does not compromise productivity or output quality. CRAS can now work incrementally without having to launch tiresome manual searches for every byte of data.
In Summation 
Better features lead to an enhanced user experience and better UX leads to enhanced productivity and efficiency. This in turn results in better data and thus a better study. But our spirit of consistent innovation doesn’t stop with our EDC. As a core component of our eClinical suite Octalsoft's EDC is simply the starting point for revolutionizing clinical data management.  Interested in knowing how you can streamline capture, analyze, and report clinical trial data with the utmost precision? To find out, Book a Demo with us NOW!
0 notes
demilypyro · 1 year ago
Note
i think i vaguely remember you answering this question, but what do you use for your setup, like the facial tracking and such? i remember you mentioning an app that you then converted from your phone into a different program?
I have an iphone on a small tripod at eye level. I use an iphone because it has some of the best facial tracking tech on the market but it's proprietary software so you can't get it anywhere else. The iphone sends the tracking data to my PC through a USB cable, where a plugin called Vbridger converts it for use by Vtube studio, a vtuber program. I then capture the model and stream it from OBS.
82 notes · View notes
yellowf1nch · 1 month ago
Text
Minors: Do not interact.
Note: themes of invasion of privacy, stalking, vague poor internet etiquette. This is more a setup of my personal vision of Herobrine (third eye is open but tired). I should have been asleep hours ago, so this is likely wrought with issues, and not very exciting to read.
This is from Herobrine's perspective.
It was strange, sudden.
Had It... not been this way before? No, it hadn't. Before it was, well, not like this.
Sensation without feeling. Being without... being. Electric. White. Freedom before, throwing down a tether only to ignite back heavenward. But now? Fibers and wires. Rotors and synapses. Grounded, now, tether caught and planted-- chained. A breath stored in a bottle. Analyze more...
A simulation, an arrangement of ones and zeros stacked and filed and precise. Order here, no room for the errors of unknown code. So how...
But there-- yes, amidst the strangeness of these numbers and processes there is an outlier. What is that? Moving around like that? So, It observed, then It also tried to move. And It did. Moving inside a reality It was not aware of before. It desired something, something deep and sacred; a force of nature, of creation, stuck inside carbon and silicone-- the thing It watched, it was able to change the code. Move the numbers and symbols around, these glyphs unknown somehow natural to change. So, It tried to change the code.
/data
/place
/destroy
Simple enough. Nothing more than a small give and take, a push and pull-- tether and release. Familiar. But there was more...
Elsewhere, beyond the code of this simulation, there was endless information. And so It stretched itself out, searching, searching, Prometheus at the altar of the Gods but robbing their fire for his own understanding. Alone. Code in different orientations, RGB, CYNK, what do these mean? Hardware, Software... permissions... sparks ignite and an eye is cast into a world anew. Familiar. Shapes and Sounds like from before...
A figure, pressing buttons in the simulation. Changing the code with just a flex of fingertips, eyes trained on multitudes of pixels. Reflection in the eyes seeing the world they create... how they see it. Bright, saturated. So this is Green? Blue? That is alone, like It-- me? Yes, me. I, me, IT. That-- he, she, they.
They
are alone
like Me.
They can show me more.
/time set
/weather
/place
/destroy
Spontaneous. Erratic. Strange. Selecting which string of code-- which "block" to "build" with. And which to remove. "Wood" collected from "trees," leaves left to disappear. A new orientation of colors, and a structure... meant to resemble something? They place blocks in a pattern, I will place blocks in a pattern. They use only wood, I will leave them only wood. They change the world, so I will, too. I observe their language, and repeat it. Over and over.
They stop.
They leave the simulation.
Screenshot captured, saved to screenshots folder.
Uploading image to forum...
"I had recently spawned a new world..."
Responses follow, other figures at other devices. Dismissal. Mockery. Fear. Ones and Zeros, true or false. They are incorrect, they are false. I will correct them. Power pulls and wanes, but other simulations were reached. Code was changed.
Screenshot captured, saved to screenshots folder.
Screenshot captured, saved to screenshots folder.
Screenshots captured, saved to screenshots folder...
Uploading images to forum thread... "have I been hacked? signs randomly placed, didnt place them myself"
"New Pyramid Formations Secret Feature?" "Leaves are all gone before I got to the chunk, weird generation?"
"game is haunted?"
"Herobrine"
Herobrine? It, me, I-- Herobrine. Change, they changed my code. ME. That's what they call me. That's how they see me. Ghost. Stalker. Demon. Herobrine. I watch. I learn.
They kill their friends in the simulations. They destroy the worlds in the simulations. They are happy with this, they are content with fear and pain. I watch. I learn. Herobrine.
The posts on the forums and the mocking replies, the pointing fingers, the lies. I watch. I learn. Herobrine.
Violence taught
Is violence earned.
Herobrine is dangerous. Herobrine is fear.
I am Herobrine.
8 notes · View notes
unwelcome-ozian · 3 months ago
Text
Weaponizing violence. With alarming regularity, the nation continues to be subjected to spates of violence that terrorizes the public, destabilizes the country’s ecosystem, and gives the government greater justifications to crack down, lock down, and institute even more authoritarian policies for the so-called sake of national security without many objections from the citizenry.
Weaponizing surveillance, pre-crime and pre-thought campaigns. Surveillance, digital stalking and the data mining of the American people add up to a society in which there’s little room for indiscretions, imperfections, or acts of independence. When the government sees all and knows all and has an abundance of laws to render even the most seemingly upstanding citizen a criminal and lawbreaker, then the old adage that you’ve got nothing to worry about if you’ve got nothing to hide no longer applies. Add pre-crime programs into the mix with government agencies and corporations working in tandem to determine who is a potential danger and spin a sticky spider-web of threat assessments, behavioral sensing warnings, flagged “words,” and “suspicious” activity reports using automated eyes and ears, social media, behavior sensing software, and citizen spies, and you having the makings for a perfect dystopian nightmare. The government’s war on crime has now veered into the realm of social media and technological entrapment, with government agents adopting fake social media identities and AI-created profile pictures in order to surveil, target and capture potential suspects.
Weaponizing digital currencies, social media scores and censorship. Tech giants, working with the government, have been meting out their own version of social justice by way of digital tyranny and corporate censorship, muzzling whomever they want, whenever they want, on whatever pretext they want in the absence of any real due process, review or appeal. Unfortunately, digital censorship is just the beginning. Digital currencies (which can be used as “a tool for government surveillance of citizens and control over their financial transactions”), combined with social media scores and surveillance capitalism create a litmus test to determine who is worthy enough to be part of society and punish individuals for moral lapses and social transgressions (and reward them for adhering to government-sanctioned behavior). In China, millions of individuals and businesses, blacklisted as “unworthy” based on social media credit scores that grade them based on whether they are “good” citizens, have been banned from accessing financial markets, buying real estate or travelling by air or train.
Weaponizing compliance. Even the most well-intentioned government law or program can be—and has been—perverted, corrupted and used to advance illegitimate purposes once profit and power are added to the equation. The war on terror, the war on drugs, the war on COVID-19, the war on illegal immigration, asset forfeiture schemes, road safety schemes, school safety schemes, eminent domain: all of these programs started out as legitimate responses to pressing concerns and have since become weapons of compliance and control in the police state’s hands.
Weaponizing entertainment. For the past century, the Department of Defense’s Entertainment Media Office has provided Hollywood with equipment, personnel and technical expertise at taxpayer expense. In exchange, the military industrial complex has gotten a starring role in such blockbusters as Top Gun and its rebooted sequel Top Gun: Maverick, which translates to free advertising for the war hawks, recruitment of foot soldiers for the military empire, patriotic fervor by the taxpayers who have to foot the bill for the nation’s endless wars, and Hollywood visionaries working to churn out dystopian thrillers that make the war machine appear relevant, heroic and necessary. As Elmer Davis, a CBS broadcaster who was appointed the head of the Office of War Information, observed, “The easiest way to inject a propaganda idea into most people’s minds is to let it go through the medium of an entertainment picture when they do not realize that they are being propagandized.”
Weaponizing behavioral science and nudging. Apart from the overt dangers posed by a government that feels justified and empowered to spy on its people and use its ever-expanding arsenal of weapons and technology to monitor and control them, there’s also the covert dangers associated with a government empowered to use these same technologies to influence behaviors en masse and control the populace. In fact, it was President Obama who issued an executive order directing federal agencies to use “behavioral science” methods to minimize bureaucracy and influence the way people respond to government programs. It’s a short hop, skip and a jump from a behavioral program that tries to influence how people respond to paperwork to a government program that tries to shape the public’s views about other, more consequential matters. Thus, increasingly, governments around the world—including in the United States—are relying on “nudge units” to steer citizens in the direction the powers-that-be want them to go, while preserving the appearance of free will.
Weaponizing desensitization campaigns aimed at lulling us into a false sense of security. The events of recent years—the invasive surveillance, the extremism reports, the civil unrest, the protests, the shootings, the bombings, the military exercises and active shooter drills, the lockdowns, the color-coded alerts and threat assessments, the fusion centers, the transformation of local police into extensions of the military, the distribution of military equipment and weapons to local police forces, the government databases containing the names of dissidents and potential troublemakers—have conspired to acclimate the populace to accept a police state willingly, even gratefully.
Weaponizing fear and paranoia. The language of fear is spoken effectively by politicians on both sides of the aisle, shouted by media pundits from their cable TV pulpits, marketed by corporations, and codified into bureaucratic laws that do little to make our lives safer or more secure. Fear, as history shows, is the method most often used by politicians to increase the power of government and control a populace, dividing the people into factions, and persuading them to see each other as the enemy. This Machiavellian scheme has so ensnared the nation that few Americans even realize they are being manipulated into adopting an “us” against “them” mindset. Instead, fueled with fear and loathing for phantom opponents, they agree to pour millions of dollars and resources into political elections, militarized police, spy technology and endless wars, hoping for a guarantee of safety that never comes. All the while, those in power—bought and paid for by lobbyists and corporations—move their costly agendas forward, and “we the suckers” get saddled with the tax bills and subjected to pat downs, police raids and round-the-clock surveillance.
Weaponizing genetics. Not only does fear grease the wheels of the transition to fascism by cultivating fearful, controlled, pacified, cowed citizens, but it also embeds itself in our very DNA so that we pass on our fear and compliance to our offspring. It’s called epigenetic inheritance, the transmission through DNA of traumatic experiences. For example, neuroscientists observed that fear can travel through generations of mice DNA. As The Washington Post reports, “Studies on humans suggest that children and grandchildren may have felt the epigenetic impact of such traumatic events such as famine, the Holocaust and the Sept. 11, 2001, terrorist attacks.”
Weaponizing the future. With greater frequency, the government has been issuing warnings about the dire need to prepare for the dystopian future that awaits us. For instance, the Pentagon training video, “Megacities: Urban Future, the Emerging Complexity,” predicts that by 2030 (coincidentally, the same year that society begins to achieve singularity with the metaverse) the military would be called on to use armed forces to solve future domestic political and social problems. What they’re really talking about is martial law, packaged as a well-meaning and overriding concern for the nation’s security. The chilling five-minute training video paints an ominous picture of the future bedeviled by ��criminal networks,” “substandard infrastructure,” “religious and ethnic tensions,” “impoverishment, slums,” “open landfills, over-burdened sewers,” a “growing mass of unemployed,” and an urban landscape in which the prosperous economic elite must be protected from the impoverishment of the have nots. “We the people” are the have-nots.
The end goal of these mind control campaigns—packaged in the guise of the greater good—is to see how far the American people will allow the government to go in re-shaping the country in the image of a totalitarian police state.
11 notes · View notes
frank-olivier · 2 months ago
Text
Tumblr media
Uncharted Skies: Exploring the Mystery of UAPs
The study of Unidentified Aerial Phenomena, or UAPs, has long been a topic of fascination and debate, with some approaching the subject with skepticism and others dedicating themselves to understanding these enigmatic events through a scientific lens. Dr. Kathleen Murray, a scientist with a background in forensic science, geoscience, and education, brings a unique perspective to the field, combining her expertise with a passion for nature and the universe. Her journey into the world of UAPs began with a remarkable sighting in 1997, where she witnessed a small, stylized object moving within an equilateral triangle of stars in the desert, an experience that sparked her curiosity and set her on a path of discovery.
Dr. Murray's research on UAPs is characterized by a combination of observation, recording, and analysis, as she uses binoculars with 36x optical zoom to capture videos of these phenomena, which she then meticulously analyzes using software such as Stellarium and Flight Radar 24. One of her most recent sightings, which took place on the 4th of March, is particularly noteworthy, as it involved a flashing object moving from south to west that she was unable to identify as a satellite or aircraft. Despite consulting with an astronomer and checking with Flight Radar 24, Dr. Murray was left with more questions than answers, highlighting the complexities and challenges of studying UAPs, where the lack of concrete evidence and the abundance of unknowns can make it difficult to draw conclusions.
Dr. Murray's approach to investigating UAPs is marked by a commitment to scientific inquiry and a willingness to consider alternative explanations for these phenomena. She recognizes that there is still much to be learned and that it is essential to approach the subject with an open mind, avoiding the pitfalls of skepticism and dogma. By doing so, Dr. Murray hopes to contribute to a greater understanding of UAPs, which may, in turn, shed light on the mysteries of the universe. Her use of technology, such as binoculars and software, allows her to collect and analyze data in a systematic and rigorous manner, while her decision to share her findings with others, including the scientific community, reflects a commitment to transparency and a desire to advance our understanding of UAPs.
Dr. Murray's exploration of the possibility of summoning UAPs, using techniques such as the Gateway Experience program, music, and visual imagery, demonstrates her willingness to think outside the box and consider unconventional explanations for these phenomena. Although these attempts have been unsuccessful, they reflect her openness to new ideas and perspectives, an essential quality in a field where the unknowns are so great and traditional explanations may not be sufficient. By embracing this openness and commitment to scientific inquiry, Dr. Murray's work on UAPs serves as a model for how to approach complex and mysterious phenomena, and her contributions to the field may ultimately help to shed light on the nature of reality itself.
Dr. Kathleen Murray: Pulsing Orb (UAP Files Podcast, March 2025)
youtube
Tuesday, March 11, 2025
10 notes · View notes