#jsma
Explore tagged Tumblr posts
Text



Hung Liu at JSMA in Portland, OR
2 notes
·
View notes
Text
it’s beautiful when it’s violet







saturday night house show pics will never be acquired but i have a nice bruise to prove i was there
#oregon#eugene oregon#pacific northwest#2024#roomies#u of o#college#art#jsma#halloweekend#kae♡#friends#babys first halloweekend failed bcz i didn’t think abt costumes but the house show was buss and there are lots of hot men in dirty euge
0 notes
Text
26.8.23 BoM Matinee: Dom Simpsons last Matinee
First and foremost, Stevie Webb was off meaning Stephen Rolley was on for McKinley. There was no more McPriceley than the normal RolleyxDom combo, and although Rolley seemed keen, Dom didn't.
Also, imho straight Poptarts (Ben Tyler) is odd.
The show:
Right before Hello, when his back is to the auidience, Dom took two very deep breaths.
Elder Grant rubbed Price's arm when he said "you're the smartest....", and when Grant was called to Norway Dom made a pouting face.
In the airport scene Mrs Cunningham (Jed Berry) obviously checked out Price's arse, and then kept looking him up and down throughout the whole scene. Mr Cunningham batted her.
Dom held Jack Greaves (playing his brother) really tight.
When Kevin's family ran off stage they shouted "byeeeeeeeeee Kevin".
When Mrs Brown said "bye baby", Dom did a little shoulder wiggle and smiled in a "I've got it" kind of way.
When Nabs showed them to the Mission hut Dom leaned against the wall and flirted with her, winking at her when he offered to help her "learn more", and when Arnold said "she's so hot" Dom nodded and mouthed yeah.
IBTFY - Dom cried. He did all his lines, but it was clear he struggled. He wiped his eyes when he laid down to sleep.
In AAP, when the spotlight was on Joseph Smith, Dom cupped Nab's face and put his hand on her back. Dom moonwalked.
When Price came into the mission hut covered in blood and the elders started screaming, George Littell tried to run away and Jed Berry held him back.
Almost Kiss: Rolley was upping the McPriceley, but Dom was disinterested. He actually moved away from Rolley in the almost kiss - it was a bit like Rolley was waiting for the okay.
SMHD - lots of slapping of his arse. Jed Berry gyrated in Dom's face and groped Dom's crouch. Myles and Amandla were smacking his arse the whole way through. When Price 'passed out at the bus stop' he kicked his leg at a 75 degree angle (been practicing for his new role?!?!?)
I Believe - just amazing.
JSMA - the 'shit' was whipping Dom in the face. Ugandans were fucking aggressively right in front of him ignoring the other Elders.
TIALD - when he said "Fuck Him" Dom air punched and went "yeah" in a very cocky way.
Dom's accent was all over the place and he slipped into his Manchurian tongue for chunks rather than just words.
Throughout the show Dom was very cocky as Price, doing little dances.
Such a wonderful show. The auidience were really naff though.


9 notes
·
View notes
Text
Artist Spotlight: Gay Outlaw

Perhaps the title given to her JSMA exhibition, “Mutable Object,” is the best description of Gay Outlaw’s work: sculptures and prints that seem pure explorations of form and color, going wherever the imagination leads. The treasures found during these adventures of the mind were everywhere on display in her Outer Richmond studio when we visited last month, where, like a page out of Euclid, the shapes of the universe are pared down to their essentials so that they can be built up again in new and surprising ways. Although Outlaw prefers the shapes to speak for themselves, she had no problem telling us what each evokes—“Ellipses are so beautiful and they feel like they are slipping around”—how to stay creative throughout a long career, and why she uses puff pastry as a medium.
Studio AHEAD: Tell us about the piece you are showing at Superhouse in NYC in June. It is based on an earlier piece, “Puff Supports,” made out of pastry.
Gay Outlaw: The piece for Superhouse is a reprise of a piece I made first in 1996. I made it again for a show in Los Angeles in 2010. This will be its third iteration. It’s a temporary, site-specific work, so it has to be remade, or rebaked, for every exhibition.
Just after moving to San Francisco, I experienced the Loma Prieta earthquake and the memory of it really stayed with me. I grew up on the Gulf Coast with hurricanes, which we could obviously see coming well ahead of landfall. It was the unexpected nature of the earthquake that really threw me—the fact that the architecture all around us, which one minute seemed completely stable, could liquify in what seemed like an instant of shaking. Thus the title “Puff Supports.” I could never look at solid walls the same way again.
Studio AHEAD: Can viewers eat it?
Outlaw: It is not intended for consumption, except maybe by mice…?
Studio AHEAD: You studied at the École de Cuisine la Varenne in Paris. Was it there you decided to become an artist? Besides the obvious connection between your use of perishable materials and the École de Cuisine, I’m curious what made you transition from culinary school to arts.
Outlaw: I think I decided to be an artist when I was a little kid. I kept it to myself for a long time, and even tried to repress the urge when it seemed an impractical choice for so many reasons. My father wanted me to go to law school. But art eventually won out.
There was really no transition from cooking school to art making. I think of it all as part of the same path. I just went to cooking school instead of art school. I couldn’t see myself working in a kitchen afterward—I am not that physically strong. I had a string of jobs in food sales and marketing and did a little cooking, and while I was doing that I started making photographs. Which eventually led me to want to make sculpture.
Studio AHEAD: What shape is really speaking to you right now?
Outlaw: At the moment I am studying paper pleating, and thinking of ways to transfer that geometry and energy to other materials… see what shapes present themselves in the process. I see pleating everywhere now, and I can see that it has qualities that have caught my eye before. Vibration. Rhythm. Triangles, which I view as feminine and stable forms.
Studio AHEAD: What about circles, squares, rhombuses…
Outlaw: I’ve always thought of circles as symbols of the self, of a fixed set of qualities or experiences. I love Venn diagrams as a way of presenting a situation.
But I work more often with ellipses. Ellipses are so beautiful and they feel like they are slipping around—more dynamic than circles. I designed a perforated cube when my kids were little and it’s a very specific thing. The perforations come through the faces of the cube and make elliptical openings. I have photographed them and incorporated them into my sculptures for years.
The other shape that I often return to is the hexagon. I learned from bees and wasps that hexagons pack very efficiently into a very stable form. Fun fact: an isometric drawing of a cube yields a hexagon which I think is very cool.
Studio AHEAD: A lot of your work seems to be built around exploration of material and form. At the end of this exploration, what do you hope to find? How do you know when you’ve gotten to that place?
Outlaw: I have found the key to making art for a lifetime is to work with a really open, present mind. I don’t ask myself whether what I am fiddling around with will lead me to a certain place. I just go with the flow of my hands and brain. I finish a piece when I have no more time, or when it��stops making demands of me.
Photos: Ekaterina Izmestieva










#studioahead#northern california#bayarea#studio ahead#art#california#artistspotlight#san francisco#interiordesign#gayoutlaw#gay outlaw
0 notes
Text
lmaoooone of my irl friends left our gc jsjsjska what a great and straightforward way to say she wants to cut all contact with us
#that's so fucking funny jsksk#and the fact that it took me a week to notice cuz we never use it often anyways jsma#wwwww#honestly a queen move#i dont even have the energy to be mad at that
0 notes
Text
Stuart Banham Follow
Gloster Meteor F.Mk.8 (WK654) Jet Fighter, City of Norwich Aviation Museum.
This aircraft is painted the colours of 245 Squadron based at RAF Horsham St Faith. The museum acquired the aeroplane from RAF Neatishead were it was displayed at a 'gate guard' for many years. Much of the repainting was carried out by painters from RAF Coltishall in the summer of 2005.
The RAF's main Fighter from 1950 to 1955, was the Gloster Meteor, this was Britain's first Jet Fighter, the Mk.I's were the only Allied Jet Aircraft to see operational service during World War Two, they equipped No.1 Squadron which went into action in 1944 against the German V1 Flying Bombs fired against Great Britain. The Squadron had some success but found the Meteor could not accelerate as quickly as the RAF's latest large piston engined Fighters !
Improved versions of the Meteor followed in the Post War years, the Meteor F8 entered RAF service in 1950 replacing the earlier F4's as the 'mainstay' of Fighter Command’s Home Defence Squadrons.
The Gloster Meteor was the first British Jet fighter and the Allies' only Jet Aircraft to achieve Combat Operations during World War Two. The Meteor's development was heavily reliant on its ground-breaking 'Turbojet Engines' pioneered by Frank Whittle and his company ''Power Jets Ltd''. Development of the Aircraft began in 1940, although work on the Engines had been under way since 1936. The Meteor first flew in 1943 and commenced operations on 27th July 1944 with No.616 Squadron RAF. The type was not a sophisticated Aircraft in its aerodynamics, but proved to be a successful Combat Fighter. Gloster's 1946 civil Meteor F.4 demonstrator G-AIDC was the first civilian-registered Jet Aircraft in the world. Several major variants of the Meteor incorporated technological advances during the 1940's and 1950's. Thousands of Meteors were built to fly with the RAF and other Air Forces and remained in use for several decades.
Gloster Meteors of the Royal Australian Air Force (RAAF) fought in the Korean War, several other operators such as Argentina, Egypt and Israel flew Meteor's in later regional conflicts. Specialised variants of the Meteor were developed for use in Photographic Aerial Reconnaissance and as Night Fighters. The Meteor was also used for research and development purposes and to break several aviation records and on 7th November 1945, the first official airspeed record by a Jet Aircraft was set by a Meteor F.3 at 606mph. In 1946, this record was broken when a Meteor F.4 reached a speed of 616mph. Other performance related records were broken in categories including flight time endurance, rate of climb, and speed. On 20th September 1945, a heavily modified Meteor Mk.I powered by two Rolls-Royce Trent Turbine Engines driving propellers, became the first turboprop aircraft to fly. On 10th February 1954, a specially adapted Meteor F.8, the ''Meteor Prone Pilot'' which placed the Pilot into a prone position to counteract inertial forces, took its first flight.
In the 1950's, the Meteor became increasingly obsolete as more nations introduced Jet Fighters, many of these newcomers having adopted a swept wing instead of the Meteor's conventional straight wing, in RAF service, the Meteor was replaced by newer types such as the Hawker Hunter and Gloster Javelin. As of 2018, two Meteors, G-JSMA and G-JWMA, remain in active service with the Martin-Baker Company as 'Ejection Seat Testbeds'. One further Aircraft in the UK remains airworthy, as does another in Australia.
Late in 1945, two F.3 Meteors were modified for an attempt on the world air speed record, on 7th November 1945 at Herne Bay in Kent, Group Captain Hugh ''Willie'' Wilson set the first official air speed record by a Jet Aircraft of 606mph TAS (True Airspeed) In 1946, Group Captain Edward ''Teddy'' Donaldson broke this record with a speed of 616mph TAS, in EE549, a Meteor F.4.
▪︎Role: Fighter Aircraft
▪︎National Origin: United Kingdom
▪︎Manufacturer: Gloster Aircraft Company
▪︎First Flight: 5th March 1943
▪︎Introduction: 27th July 1944
▪︎Retired: 1980s (RAF Target Tugs)
▪︎Status: Two in use as Testbed Aircraft (one with civil registration)
▪︎Primary Users: Royal Air Force / Royal Australian Air Force / Belgian Air Force / Argentine Air Force
▪︎Power Plant: Rolls-Royce RB.50 Trent
▪︎Produced: 1943 to 1955
▪︎Number Built: 3,947.
Via Flickr
2 notes
·
View notes
Note
Since i saw ya drew Junkrat sayin "Kill", wanted t let yknow theres another half to the photo

Enjoy the rest o yer day, see ya round.
JSMA DMA,SJAL
5 notes
·
View notes
Photo

Public health. JSMA, Eugene. November, 2020.
2 notes
·
View notes
Text
A Brief History of Hackerdom: The Early Hackers
💾 ►►► DOWNLOAD FILE 🔥🔥🔥 The term describes a research field regarding the study and design of adversarial attacks targeting Artificial Intelligence AI models and features. Even this simple definition can send the most knowledgeable security practitioner running! Within AI, the model — a mathematical algorithm that provides insights to enable business results — can be attacked without knowledge of the actual model created. Features are those characteristics of a model that define the output desired. Features can also be attacked without knowledge of the features used! In the feedback learning loop of AI, recurrent training of the model occurs in order to comprehend new threats and keep the model current see Figure 1. With model hacking, the attacker can poison the Training Set. Figure 2 shows a rockhopper penguin targeted digitally. A white-box evasion example we knew the model and the features , a few pixel changes and the poor penguin in now classified as a frying pan or a computer with excellent accuracy. While most current model hacking research focuses on image recognition, we have investigated evasion attacks and mitigation methods for malware detection and static analysis. Utilizing malware samples highlighting FakeInstaller, and k benign samples and 5. This, of course, is a concern to all of us. Adversarial examples are inputs to ML models that an attacker has intentionally designed to cause the model to make a mistake [1]. The JSMA algorithm needs only a minimum number of features need to be modified. Obviously, that can be catastrophic! Demonstrating this theory of transferability in Figure 5, the attacker constructed a source or substitute model of a K-Nearest Neighbor KNN algorithm, creating adversarial examples, which targeted a Support Vector Machine SVM algorithm. It resulted in an However, using a substitute model and transferring the adversarial examples to the victim i. Another catastrophic example! While malware represents the most common artifact deployed by cybercriminals to attack victims, numerous other targets exist that pose equal or perhaps even greater threats. Over the last 18 months, we have studied what has increasingly become an industry research trend: digital and physical attacks on traffic signs. Research in this area dates back several years and has since been replicated and enhanced in numerous publications. We initially set out to reproduce one of the original papers on the topic, and built a highly robust classifier, using an RGB Red Green Blue webcam to classify stop signs from the LISA [6] traffic sign data set. The model performed exceptionally well, handling lighting, viewing angles, and sign obstruction. Over a period of several months, we developed model hacking code to cause both untargeted and targeted attacks on the sign, in both the digital and physical realms. Following on this success, we extended the attack vector to speed limit signs, recognizing that modern vehicles increasingly implement camera-based speed limit sign detection, not just as input to the Heads-Up-Display HUD on the vehicle, but in some cases, as input to the actual driving policy of the vehicle. Ultimately, we discovered that minuscule modifications to speed limit signs could allow an attacker to influence the autonomous driving features of the vehicle, controlling the speed of the adaptive cruise control! For more detail on this research, please refer to our extensive blog post on the topic. The good news is that much like classic software vulnerabilities, model hacking is possible to defend against, and the industry is taking advantage of this rare opportunity to address the threat before it becomes of real value to the adversary. Detecting and protecting against model hacking continues to develop with many articles published weekly. Detection methods include ensuring that all software patches have been installed, closely monitoring drift of False Positives and False Negatives, noting cause and effect of having to change thresholds, retraining frequently, and auditing decay in the field i. In addition, human-machine teaming is critical to ensure that machines are not working autonomously and have oversight from humans-in-the-loop. Machines currently do not understand context; however, humans do and can consider all possible root causes and mitigations of a nearly imperceptible shift in metrics. There are pros and cons of each method, and the reader is encouraged to consider their specific ecosystem and security metrics to select the appropriate method. While there has been no documented report of model hacking in the wild yet , it is notable to see the increase of research over the past few years: from less than 50 literature articles in to over in It is also notable that, perhaps for the first time in cybersecurity, a body of researchers have proactively developed the attack, detection, and protection against these unique vulnerabilities. We will continue to add to the greater body of knowledge of model hacking attacks as well as ensure the solutions we implement have built-in detection and protection. Our research excels in targeting the latest algorithms, such as GANS Generative Adversarial Networks in malware detection, facial recognition, and image libraries. We are also in process of transferring traffic sign model hacking to further real-world examples. Lastly, we believe McAfee leads the security industry in this critical area. Each leverages its unique skillsets; ATR with in-depth and leading-edge security research capabilities, and AAT, through its world-class data analytics and artificial intelligence expertise. When combined, these teams are able to do something few can; predict, research, analyze and defend against threats in an emerging attack vector with unique components, before malicious actors have even begun to understand or weaponize the threat. Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats. Steve Povolny is the Head of Advanced Threat Research for McAfee Enterprise, which delivers groundbreaking vulnerability research spanning nearly every industry. With more than a decade of experience in network Podcast Safety Tips. Introduction and Application of Model Hacking. Feb 19, Stay Updated Follow us to stay updated on all things McAfee and on top of the latest consumer and mobile security threats. Steve Povolny. Their goal The Emotet maldoc was
1 note
·
View note
Text
Case Studies of TECO Servo Drive and Servo Motor
Figure 1: Servo drive and servo motor manufactured by TECO.
1. TECO Servo Product Series
TECO Servo DriveTECO Servo Drive: series JSDAP/JSDEP TECO Servo MotorTECO Servo Motor: series JSMA
Figure 2: TECO has servo drive and servo motor.
2. Features of TECO Servo Products
Model is complete. Type-JSDA is used with 8192 PPR encoder. The servo motor JDDE is complete with 50W~15KW models and used with 2500PPR encoder. Functional diversity. It has a function of switching torque, speed, position, point-to-point and mixed mode, and can be matched with a variety of control systems. Main loop/control loop has power separation. This has good protection coordination and easy to do spot inspection. Built in 16 segments position setting. It’s free to plan point-to-point positioning control. Perfect protection mechanism: Multiple abnormal alarm
3. Naming Rules of TECO Servo Model
Figure 3: Naming rules of TECO servo motor.
4. Environment Requirements of TECO Servo
Ambient temperature: 0~+40°C ; ambient humidity: below 90% HR (No frosting condition) Storage temperature: -20~+60°C ; storage humidity: below 90% HR (No frosting condition) Vibration: less than 2.5G A well-ventilated place with little moisture and dust Non-corrosive, ignition gas, oil and gas, cutting powder, cutting fluid, iron powder and other environment No moisture and direct sunlight
5. Application Cases of TECO Servo
5.1 JSDA Servo Drive in Tensile Machine
Tensile machine is mainly used for tensile compression, bending test of plastic sheet, pipe, profile, plastic film and rubber, wire and cable, waterproof coil, metal wire and other materials. It is ideal testing equipment in the industry and mining, commodity inspection and arbitration, scientific research units, colleges and universities, engineering quality supervision station and other departments.
Figure 4: Tensile machine with TECO servo drive.
The tensile machine is equipped with JSMA-LC08AH (750W) motor and JSDA20A drive, and the motor is equipped with a 1:30 planetary reducer. The drive works in the position mode. The electronic gear ratio is 2500 pulses a week, and the weekly pulse output is 2000. The test speed of the equipment is 0.5 mm/min - 500 mm/min.
More information please visit the website https://okmarts.com/news/case-studies-of-teco-servo-drive-and-servo-motor.html
0 notes
Text
-----BEGIN RSA PUBLIC KEY----- MIIBCgKCAQEAn587rDDg56ofStpS6eSIXITuDWWm8jaTs31QjTW3Nl12cyhlOrEm GNIddwMHjz1jyLmhKILwix3itrfkiat6GdBw6BG40EancxQ274vHyK+bTbgbtrfR h8bk/toTbEoNqAracXUgc9+MxalCOERjqP7DK3EqkXutVjGJ1v0gkg/UoUnagkAW Ay2Hlu9BnOu36XWp5EHkuZXQhSFvLQG7xNIROXc8Lu1F8Ll8joEDLlnxB75PXG8y vXv2T/zuLRQEZZQ3WEG7OJn0iFm3wzyPKEJmGh/ZWlqRBy/UFzAyTEbDD09+1fM8 0zVi14Isgg2AydUulk4rAtiO+EuoS84AjQIDAQAB -----END RSA PUBLIC KEY----- -----BEGIN RSA PRIVATE KEY----- MIIEpQIBAAKCAQEAn587rDDg56ofStpS6eSIXITuDWWm8jaTs31QjTW3Nl12cyhl OrEmGNIddwMHjz1jyLmhKILwix3itrfkiat6GdBw6BG40EancxQ274vHyK+bTbgb trfRh8bk/toTbEoNqAracXUgc9+MxalCOERjqP7DK3EqkXutVjGJ1v0gkg/UoUna gkAWAy2Hlu9BnOu36XWp5EHkuZXQhSFvLQG7xNIROXc8Lu1F8Ll8joEDLlnxB75P XG8yvXv2T/zuLRQEZZQ3WEG7OJn0iFm3wzyPKEJmGh/ZWlqRBy/UFzAyTEbDD09+ 1fM80zVi14Isgg2AydUulk4rAtiO+EuoS84AjQIDAQABAoIBAAFsIdP++4IU+gJo v6Rl7PEmHhjwdvRhmB9ZVoZrnB5X5t5P1dcYDQbbmHefB0o3edQoE0+RGyOiOIr4 SIkRhh0ExnzK66Kvfn6AB51K2ZToO7INmfGe4bccBp5ewx2L62M79YZdTNS7gT2h rH1j3p965bJVZ9O0Dm9eMaRAzTF//wKp9RnXSO/XKIq1+2EaaIiyZ2MtpOGmtNm9 TwNn3k7oqqOiJnIMQqllJ6ik96RlE6lXRiQ5/1Z2RkR/IBo6DBG7lbs31x38TCdX vRyqldREKM+a+fnUvaWOZGKluFwDXgVjf7xaTRBRXJOVcvcTUknf3z0FtFb5h5OT ZVZ60gECgYEAzUWNNxOq6GMzuJPoqwoImq831oT6BByb0xw+CTrsGmghi1vQhfTS n54x8/CpvzqtytkUryO2b57PkS++vWJgFsRvhBtLLxX74cZZI94uqJuwa/R6gPXi /jEKvHaALsnhCH7r295e1PFwYBEcmPBh7SXgb+qyHV5e2sdQInioLd0CgYEAxxGr NQ35qL9+5r2JLcTz7kb7KJixDoLbFcMer0a9NS+MxpxtsOE/KRqADtdt7zC6JuA5 ojGlql7X6SvoApwr6Hc2eCV6yLRoiGUeL8WgGCX/+H8p6ZKeYLvTlWspb3Y+Qv/x K8yazG672ggjlReufFJZ9KJt3gCWZM184C5BqnECgYEAvksy/ZMTBnookX003ZLg pR24YvtFl5g58Lym2gGwrU5JgpqsNfLfay/JWT6K7odkY79YyIAP+Ww9OngLmB/h ulmCk/KFgXIc3pH1QyYPFSm3pGyxQGoyc7ldHZexfy6RmkGnP13nhfsJVVWnsDRw Y9uQM9BcLJO21ZSeOkamilUCgYEAtStDYVmCqSz+VQiR2/Gu/l/jHCM6oDY/JSMa vfHnKIxJ1kdvHNciIEpZ2Sf+iP0TrWXLje0ZFGCUp0SqNhXjcAFutRGHGTn3GIrO WjPFa7TJrGIuxsAFG4xVF1sbrrEyIM/FsVLYXs04cUmO+JVA2ywnahiZXL20IbFR wMTYRkECgYEAoSLrsxyr/mQoBX81QZkyrPt9/RjVYe/0dkVLqCcPjknGrIZkAQJe Nn1UBU9O46H/5jYQJn4FU8UJ88B9GR1XEaNtj925EAPKLM/QYNzgFsbxs9ulueNO 0+GPoDOUMq42HWACZLAECipHhyBnyP4GIEGnFqCJeMQHvY2jXpiprKY= -----END RSA PRIVATE KEY-----
0 notes
Photo

https://www.registerguard.com/entertainmentlife/20190612/iranian-painters-jsma-exhibit-depicts-fauna-to-show-our-fleeting-presence
0 notes
Text
It’s been since fucking October y’all.
"wocegdzpq" mh jlwyr ilbh ls bm iie tr dzwg xdwr tzccysv ls ezvqpdq. dbh A apa hgvtlj tsj xwm yoyvgqu wqwimtg ty HXZC srs bosy tl Vstlibjlf wpyubiv at'l oogp rr aeci dcy chy qbgxwq hw fsls. rkox'k ftmu tfy. zxh cww uquowww L kmdp wics lnahgw ls bg koel yqr xzic gvi vymz aeqft jl omwc wc kwx bwawglrlcr ters zwync L'zp zekm zhfqd wc agvz wu ppdggsw dmzm avp tlwfs srs aowe. msw opks bg hrgtqrfw zekm ispy ypodarv iur T ljzock rtmk hz ccpsqtig booe efhm hgr'i ehbe xc wc jsma Q qide fdji ls lzphp efh reer ippbr. llg W'q fsi evfctcg ofgyi bos hcgwwry. Agqawyr y uswwegko dlacu, klapt lptqpphbx xvdu h ztecuovq tpxlf, qpcog e dsi mhgtpp esgsyhm P'zw syys wwgiqvbd efdh eji ptyslow oomv sjb. Hbo tr'v o wzsgblf 8-16 alehg (tdyh bhpwpq dbh klxb) VAR JYOZ M SQ XZI OAAPRJIV
1 note
·
View note
Photo

#shadows #shadowhunters #ombre #ombra #silverjewelry #gioiellionline (presso Il Mondo di Wit) https://www.instagram.com/p/CAfDA0-jsMa/?igshid=ir88cw1tgbsp
0 notes
Photo

⚠Jsmas dejes de soñar, soñar nos ayuda a no parar ni un día hasta que lleguemos a esa meta que tiene cada uno.!! . 🧠Todo esta en la mente, porque si lo podemos pensar lo podemos crear. . 👊No dejemos que nadie mate nuestros sueños, ya que muchos van a querer vernos caer, por pensar y hacer cosas diferente a lo que ellos llaman lo normal.! . 🔥El éxito esta a la vuelta de la esquina, persiguelo, alcanzalo y veras como todo cambia. . Vamos por el éxito.🤯 . . . . #frasesparareflexionar #frases😊 #creenciassinlímites #creer #create #crear #emprendedorexitoso #éxitos #éxitofinanciero #educaciónfinanciera #lifestyle #emprendedores #emprender #emprendedor #isidrocasanova #buenosaires #argentina #colombia #chile #mexico #puertorico #repúblicadominicana #honduras #nicaragua #ecuador #paraguay #brasil #uruguay #emprendenico (en Argentina) https://www.instagram.com/p/B8bS-YLHvYL/?igshid=v9s51lnsj0ir
#frasesparareflexionar#frases😊#creenciassinlímites#creer#create#crear#emprendedorexitoso#éxitos#éxitofinanciero#educaciónfinanciera#lifestyle#emprendedores#emprender#emprendedor#isidrocasanova#buenosaires#argentina#colombia#chile#mexico#puertorico#repúblicadominicana#honduras#nicaragua#ecuador#paraguay#brasil#uruguay#emprendenico
0 notes
Note
Jsma here: don’t worry about it. Take your time and look after yourself; the story will be up when it’s up. Get better love!
Yes, thank you! ^-^
1 note
·
View note