#outcome-driven
Explore tagged Tumblr posts
lostconsultants · 4 months ago
Text
From Chaos to Clarity: How Impact Mapping Drives Real Results
In today’s fast-moving world of product development, teams often struggle to connect their work with real business value. Impact Mapping drives real results by aligning efforts with strategic goals, ensuring teams focus on what truly matters rather than just delivering features. What is Impact Mapping and Why Does It Matter? Impact Mapping is a strategic planning technique that helps…
0 notes
thesummerstorms · 2 months ago
Text
Okay, and after all of the de Acutis spam... one last thing that occurred to me. It isn't exact one to one, but...
Noa and Neri de Acutis, experienced, powerful, grey-haired Crows and biological siblings who bicker and fight and have very different personalities, but who by all means seem to have a supportive relationship rather than a treacherous one.
Noa and Neri as a look at what Lucanis and Illario could have been had Caterina not deliberately fucked them both up.
19 notes · View notes
transingthoseformers · 4 months ago
Text
I want various antagonists to "win" just to see how reality fails to match up with their Image of what they thought was going to happen😌
14 notes · View notes
autumnoakes · 6 months ago
Text
my hot take of the day is that breath of the wild and tears of the kingdom are not adaptable into any other format. by doing so, you'd lose a huge part of both games which is exploration. if you follow a predetermined narrative, it's a different formula. a huge point of botw was that you could do the main story in whatever order you want. hell, you could even not do the main story if you really wanted to. the any% speedrun is like 25 minutes because you can just. go to the final boss. and totk is bigger, but it's not much different. you can't adapt that freedom of exploration and choice into another format in a way that really matters.
8 notes · View notes
fake-ascension · 10 months ago
Text
brain bad but im listening to the narzissenkreuz questline ost and. man i want to play the quests again and i WOULD but i have such a hard time reading non-voiced world quests which SUCKS bc this quest series like. the fucking best and i would argue better than some of the archon quests
#yappin#everyone shits on the inazuma quests bc rightfully so there was so much potential w/ the civil war that just went right down the drain#ngl kazuha was the only Good thing i feel#and hot take but i dont think that sumeru AQs were that great#like the individual characters are good and fine but theres a pretty big disconnect with the characters & their motivations in the quest#i feel the characters were just roles to be filled for a coup and they could have used any character to achieve the same story outcome#as funny as it is that al haitham only got involved bc his cushy office job was in danger is funny and all#but i feel like only nilou and maybe cyno were the only ones to have personal reasons to be part of the coup#they should have let candace in on the action bc she DID have reason to be involved#seeing has how the akademiya were kidnapping the insane scholars that THEY dumped onto aaru village to take care of#ive gone on and on abt how good the fontaine AQs are like theres a lot of weird plot holes and weird decisions#especially abt the way government works + meropide#but the contrast of the character driven arcs vs the actual plot/action/lore was done so fucking good#there were reason for me to be invested in navia/the twins/neuvillette/furina bc we werent just TOLD their stories#but there with them taking an active role during their character arcs#so being already invested in characters going into the plot/lore just made it so much more enjoyable#but anyways narzissenkreuz sweep#fool in fontaine
4 notes · View notes
hauntingblue · 2 years ago
Text
Luffy vs usopp is like one of those Superman vs batman with 1000 hours of prep time
4 notes · View notes
modernmarketingmethods · 2 days ago
Text
Not Just Advice: Global Consulting Services That Deliver Measurable Results
In a world where disruption is constant and competition is intense, business leaders are seeking more than just good advice. They want measurable outcomes, scalable systems, and strategies that drive growth and resilience. That’s why global consulting services have evolved from being traditional advice-givers to results-driven partners who empower organizations to achieve real, trackable improvements.
Today’s consulting and advisory services offer more than theoretical frameworks or cookie-cutter recommendations. They deliver tangible performance gains, process efficiencies, innovation roadmaps, and financial impact. The best consulting firms work hand-in-hand with clients, ensuring that strategies are implemented effectively and aligned with measurable business goals.
If you’re skeptical about whether consulting can make a real difference in your company’s success, here’s what separates modern global consulting services from generic advice and why their results speak for themselves.
A Focus on Strategic Execution, Not Just Planning
One of the most common complaints about consultants is that they offer grand strategies without supporting execution. That’s no longer the case with today’s consulting and advisory services. They are deeply involved in implementation, ensuring that solutions don’t just look good on paper but actually work in the field.
Global consulting services support clients from start to finish, from initial assessment and roadmapping to employee training, performance monitoring, and continuous optimization. Their role is to transfer knowledge, tools, and capabilities that stay with the organization long after the engagement ends.
Execution support means fewer delays, better adoption of new processes, and quicker realization of results.
Aligning Recommendations with Measurable KPIs
Modern consulting isn’t about vague ideas. It’s about quantifiable improvement. Consulting and advisory services work with clients to set clear key performance indicators (KPIs) and success benchmarks. These could include cost savings, increased revenue, reduced churn, improved productivity, higher customer satisfaction, or stronger ROI.
The focus is on building dashboards and reporting structures that allow business leaders to track progress in real time. This transparency builds trust and ensures accountability on both sides of the engagement.
When global consulting services deliver a 20% reduction in operational costs or a 15% increase in supply chain efficiency, it’s no longer a question of whether the investment was worth it — the results speak for themselves.
Sector-Specific Expertise That Drives Targeted Results
Not all businesses face the same challenges. What works for a tech startup may not apply to a healthcare provider or a manufacturing firm. That’s why specialized consulting and advisory services bring sector-specific experience to each engagement.
They understand industry regulations, market conditions, operational dynamics, and technology trends that are unique to your field. This allows for tailored solutions that are relevant, realistic, and results-driven.
Global consulting services often bring best practices from around the world, drawing on global case studies and proven success models to give your business a competitive edge. Whether it's navigating healthcare compliance, implementing manufacturing automation, or scaling digital platforms in retail, consultants can deliver transformation at speed and scale.
Data-Driven Insights and Continuous Optimization
Consulting today is built on a strong foundation of data and analytics. Decisions are no longer based on gut feelings or outdated assumptions. Consulting and advisory services use real-time data, predictive modeling, and advanced analytics to guide recommendations.
This data-driven approach ensures that your strategies are grounded in reality and continuously refined. By monitoring performance metrics and customer feedback, consultants help businesses stay agile and proactive.
Global consulting services also help companies adopt tools that improve internal analytics capabilities. From cloud-based dashboards to AI-driven performance monitoring systems, these tools allow organizations to make smarter, faster decisions long after the consultants are gone.
Real Organizational Change, Not Just Temporary Fixes
Many consulting engagements fail because they don’t address internal challenges like team resistance, misalignment, or lack of leadership buy-in. This is why modern consulting and advisory services focus heavily on change management and organizational development.
They offer leadership coaching, cultural transformation programs, and internal communication strategies that help embed new ways of working. This ensures that changes stick and continue to produce results over time.
Global consulting services also work to build internal capabilities so that your team can sustain the progress. Rather than creating dependency, they empower you to drive future improvements on your own.
Long-Term Value and Sustainable Growth
Businesses no longer view consulting as a short-term patch. They see it as a strategic partnership for long-term value. Consulting and advisory services now focus on helping organizations build sustainable models that deliver ongoing returns.
Whether it's developing a three-year digital transformation plan, restructuring a global supply chain, or creating a talent retention strategy, the emphasis is on long-term value creation.
Global consulting services are particularly valuable for businesses looking to expand into new markets or manage complex global operations. They provide the knowledge, tools, and networks needed to grow confidently and sustainably.
Final Thoughts: More Than Just a Smart Choice
The misconception that consultants only offer advice is outdated. Today’s global consulting services are deeply integrated into how successful companies grow, adapt, and outperform competitors.
From improving efficiency to accelerating innovation, from reducing risk to increasing profits, the best consulting and advisory services deliver clear, measurable business outcomes.
If your organization is serious about growth, strategy, and transformation, it’s time to stop viewing consulting as optional. It’s time to see it for what it is: a powerful driver of results.
0 notes
fogaminghub · 5 months ago
Text
🌟 Ready to master your choices in "Until Dawn"? 🌌 Check out our new blog post where we explore Episode 02 and focus on Matt's tense encounters in the Washington Lodge. Every decision you make counts! 🦋
1 note · View note
techahead-software-blog · 6 months ago
Text
The Role of Outcome-Driven Metrics in Enhancing Cloud Security Control Strategies
Tumblr media
Cloud services adoption surges globally. Many businesses must evolve their security strategies to address emerging challenges.
The global cloud security market was valued at $28.35 billion in 2022 and is expected to grow at a rate of 13.1% annually from 2023 to 2030. Businesses today face an increasing variety of cyber risks, including advanced malware and ransomware attacks. As companies shift to digital operations and store large amounts of sensitive data in the cloud, they have become key targets for cybercriminals looking to steal or exploit information.
Tumblr media
Gartner forecasts that the combined markets for IaaS, PaaS, and SaaS will grow by over 17% annually through 2027. This remarkable expansion underscores the urgency for businesses to transition from traditional security methods to more advanced, cloud-native solutions. Conventional approaches often fall short in safeguarding dynamic cloud environments, emphasizing the need for innovative strategies.
To secure cloud-native and SaaS solutions effectively, organizations must focus on platform configuration and identity risk management. These elements form the cornerstone of modern cloud security. Addressing these areas requires a shift in both security approaches and spending models, ensuring alignment with evolving threats. Furthermore, security metrics must move beyond technical performance to demonstrate their relevance to business outcomes.
The cloud, far from being just a storage solution, represents a sophisticated web of interconnected services. This complexity calls for a refined approach to measuring the impact of security investments. Security and risk leaders should adopt outcome-driven metrics (ODMs) to assess the efficiency of their cloud security measures. ODMs empower leaders to align their efforts with organizational goals, offering actionable insights into their security posture.
By customizing ODMs, businesses can better manage risks, enhance cloud security strategies, and achieve results that support overall objectives. In this blog, we will delve into key ODMs that guide future investments in cloud security, ensuring robust protection and meaningful outcomes.
Key Features and Benefits of Outcome-Driven Metrics
Tumblr media
Emphasis on Tangible Results
Outcome-driven metrics prioritize measurable outcomes like fewer incidents, reduced risks, and enhanced operational resilience.
For instance, ODMs don’t just count firewalls but assess how they minimize successful cyber attacks. They evaluate key performance indicators, such as shorter threat detection times, faster response rates, and lower incident severity.
This approach tracks outcomes like fewer data breaches, quicker recovery times, and lower overall security costs due to efficient controls. ODMs ensure that security efforts produce valuable, actionable results that enhance the organization’s resilience and performance.
Alignment with Business Objectives
ODMs integrate security goals with broader organizational priorities to ensure strategic alignment and meaningful impact.
This connection ensures security efforts support business growth, compliance, and customer trust. For example, safeguarding customer data not only prevents breaches but also strengthens brand reputation and meets regulatory requirements.
By translating technical outcomes into business-centric insights, ODMs bridge the gap between security teams and decision-makers. This alignment also helps justify security investments to executives by highlighting their contributions to achieving business goals.
Maximizing Cost-Value Efficiency
ODMs evaluate the cost-value balance of security measures to ensure optimal resource allocation and impactful investments.
Businesses can prioritize initiatives that offer the highest return on investment in risk reduction and operational benefits. For example, high-impact controls receive more funding, while less effective measures are reassessed.
This approach optimizes security budgets, ensuring every dollar spent maximizes protection and minimizes vulnerabilities. It enables organizations to strengthen their overall security posture with precision and efficiency.
Tailored Cloud Security Metrics
Cloud environments require dynamic, outcome-driven metrics to allocate resources effectively and address unique security needs.
Unlike fixed budgets, ODMs guide spending based on specific risks and requirements for various cloud services. For instance, mission-critical applications might need advanced encryption and robust identity management compared to less sensitive workloads.
Cloud-specific ODMs measure how controls like encryption, access management, and monitoring contribute to achieving desired security outcomes. This ensures cloud assets and data remain well-protected while enabling efficient resource utilization.
How to Implement Outcome-Driven Metrics (ODM) in Your Business?
Tumblr media
Implementing outcome-driven metrics requires a systematic approach to ensure security measures align with desired outcomes and organizational objectives. Below is a detailed guide to implementation:
Develop Initial Processes and Supporting Technologies
Begin by defining critical security processes and mapping them to the technologies supporting these functions.
For instance, technologies like XDR and EDR underpin endpoint protection, while vulnerability scanners support vulnerability management. Similarly, IAM systems and directory services play a vital role in authentication.
This structured framework ensures each security process has a robust technological backbone, providing the foundation for precise measurement and management. It also helps streamline efforts, enabling teams to focus on impactful areas.
Identity Business Outcomes and ALign ODMs
The next step involves linking security processes to specific business goals and identifying desired results for each process.
For example, in endpoint protection, outcomes may include high deployment coverage and effective threat detection. Metrics could track endpoints actively protected and threats mitigated.
Similarly, in vulnerability management, scan frequency and addressing high-severity risks are critical. Desired outcomes may include percentages of systems scanned and vulnerabilities resolved. This alignment ensures security measures directly support organizational priorities.
Recognize Risks and Dependencies
Understanding risks and dependencies is crucial to managing potential failures and minimizing operational disruptions.
Each process depends on specific technologies, and their failure could jeopardize security efforts. For example, endpoint protection relies on XDR and EDR solutions, while vulnerability management depends on scanners.
Assessing these dependencies enables better contingency planning, ensuring uninterrupted operations and consistent protection against evolving threats. This proactive step mitigates vulnerabilities arising from system failures.
Define ODM for Key Processes
Develop clear and actionable metrics that measure the effectiveness of each security process in achieving its intended outcomes.
For instance, endpoint protection metrics could include the percentage of endpoints actively safeguarded and the average threat detection time. Vulnerability management metrics ‌measure systems scanned, remediation timelines, and resolved high-severity vulnerabilities.
These metrics provide quantifiable insights, enabling organizations to assess progress and refine strategies for improved outcomes‌.
Evaluate Readiness and Mitigate Risks
Finally, assess the organization’s readiness to adopt outcome-driven metrics and identify risks that could impact implementation.
Ensure the necessary infrastructure, expertise, and resources are in place to monitor and act on ODM insights. Address challenges like data accuracy issues, resistance to change, or integration with existing processes through strategies like phased adoption and training.
This step ensures a smoother transition and maximizes the effectiveness of ODMs in aligning security investments with business objectives.
Implementing outcome-driven metrics transforms security management by focusing on measurable results that directly impact organizational goals. With advancements in technology, AI-driven insights enhance the value of ODMs by automating processes and improving decision-making accuracy.
Organizations leveraging these metrics effectively can achieve superior protection and align security efforts with strategic outcomes. Connect with our experts to explore how ODMs can empower your cybersecurity strategy.
Examples of Outcome-Driven Metrics
Tumblr media
Outcome-driven metrics offer measurable insights that demonstrate the real-world impact of security initiatives. Below are some key examples:
Mean Time to Detect (MTTD)
MTTD highlights the average time taken to identify a security threat, focusing on faster detection to mitigate risks.
A reduced MTTD minimizes the damage caused by prolonged threats. For instance, organizations can compare current detection times with targeted benchmarks to monitor improvement.
Regular reporting on this metric may include actionable insights, such as areas needing improvement and how enhanced processes or tools can accelerate detection. Faster identification leads to reduced exposure and a more robust security posture.
Mean Time to Respond (MTTR)
MTTR tracks how quickly an organization contains and resolves incidents, aiming to limit the extent of a breach.
This metric emphasizes operational readiness by showcasing how swift responses can prevent critical disruptions or data losses. Reporting should cover the number of prevented breaches and how internal collaboration or automated solutions can further reduce response times.
Reducing MTTR strengthens resilience by demonstrating the organization’s ability to neutralize threats promptly and efficiently.
Phishing Click-Through Rate
This metric evaluates employee susceptibility to phishing attempts, focusing on awareness and preparedness against social engineering attacks.
A lower click-through rate reflects an informed workforce capable of identifying and avoiding malicious links or emails. Organizations can use simulations and trend reports to measure progress and identify vulnerable groups needing additional training.
Implementing regular phishing tests alongside educational programs enhances overall resistance, making the organization less prone to attacks exploiting human errors.
Security Return on Investment (ROI)
Security ROI quantifies the financial benefits of cybersecurity measures compared to the costs, offering a clear value assessment.
This metric helps illustrate how investments reduce downtime, decrease customer complaints, and lower insurance premiums. Organizations can highlight these savings alongside tangible improvements, such as fewer breaches or reduced recovery costs.
By presenting ROI data in monetary terms, security teams can effectively communicate their value to business leaders and justify future investments.
Outcome-driven metrics like these ensure that security efforts align with strategic goals while delivering measurable value. They empower organizations to focus on actionable outcomes, building trust and demonstrating the effectiveness of their cybersecurity programs.
Practical Examples of Outcome-Driven Metrics for Cloud Security
Tumblr media
Cloud Governance ODM
An accurate estimate of activity monitored by cloud infrastructure is vital for robust security. Without detailed tracking of cloud assets, other metrics lose relevance as hidden risks may lurk outside the organization’s visibility and control. These challenges intensify when cloud adoption is primarily driven by business units rather than IT departments, as these units often direct accountability.
For effective cloud governance, visibility into all cloud accounts is crucial. Organizations often monitor only “known cloud accounts,” which may represent only part of their cloud presence. Identifying additional accounts requires compensating controls, such as rigorous approval workflows, expense monitoring, and advanced technical solutions like security service edges and network firewalls. These controls should aim for a holistic view of all active accounts to ensure metric accuracy.
Cloud Account Accountability: Clear ownership ensures accountability for managing account configurations and usage policies.
Cloud Account Usage and Risk: Regular assessments are essential to track account usage and mitigate evolving risks in dynamic cloud environments.
Cloud Operation ODM
Operational security metrics play a pivotal role in securing cloud environments, but their relevance varies based on infrastructure setups. These metrics provide insights into the effectiveness of security measures. However, accurate measurements often depend on the availability of advanced tools. Analyzing these metrics account-by-account or by priority level enhances clarity.
Real-Time Cloud Workload Protection: Critical workloads require real-time runtime monitoring for memory, processes, and other dynamic components.
Runtime Cloud Workload Protection: Non-critical workloads can utilize agentless scanning methods to achieve sufficient security without continuous visibility.
Cloud Identity ODM
Cloud identity management extends beyond user accounts, particularly in IaaS environments, where workloads require their own machine identities and privileges. Effective lifecycle management and governance for these identities are essential. In IaaS environments, identity functions as the primary control for application consumers. Overprivileged identities remain a major concern across cloud providers. Without the right tools, measuring identity can be challenging, necessitating specialized solutions.
Workload Access to Sensitive Data: Machine identities often outnumber user accounts, making privileged workloads a critical area for risk mitigation.
Active Multi-Factor Authentication (MFA) Users: MFA serves as a fundamental defense for securing user accounts accessing cloud tenants.
Conclusion
Understanding and tracking the cloud services used in an organization is key to effective cloud security and developing meaningful metrics. While some on-premises metrics can be adjusted for cloud use, the unique and fast-changing nature of cloud adoption calls for a fresh approach. Cloud-specific outcome-driven metrics (ODMs) focus on achieving specific security results, rather than simply basing investments on a portion of cloud spending.
Automation is vital for managing these controls in the dynamic cloud environment. Automating tasks like tracking, reporting, and configuration management helps ensure efficiency and accuracy. However, many organizations are cautious about automating fixes in live production environments to avoid disrupting operations. Building strong automation capabilities is often necessary to meet many of these cloud security goals effectively.
With TechAhead, you can be the next leader in the industry. We have been taking the app development services to another level. Because we have the most respected and experienced mobile app developers in the market.
Source URL: The-role-of-outcome-driven-metrics-in-enhancing-cloud-security-control-strategies
0 notes
projectchampionz · 8 months ago
Text
STRATEGIES FOR EFFECTIVE PROJECT MANAGEMENT IN COMPLEX HEALTHCARE ENVIRONMENTS
STRATEGIES FOR EFFECTIVE PROJECT MANAGEMENT IN COMPLEX HEALTHCARE ENVIRONMENTS 1.1 Introduction Project management is critical in healthcare environments, where the complexity of operations, regulations, and patient care makes effective oversight essential. Healthcare projects often involve multiple stakeholders, extensive resources, and high-stakes outcomes, necessitating precise coordination…
0 notes
pebblegalaxy · 10 months ago
Text
Beyond Agile: Discover 10 Alternative and Effective Approaches for Product Development
While Agile is a widely successful and adaptable methodology, some alternative approaches or complementary strategies may be more effective depending on the context of the product, team dynamics, and business goals. Here are a few methods that can be considered more effective or tailored for specific scenarios than Agile: 1. Lean Development Overview: Lean focuses on reducing waste, improving…
0 notes
spookyteeths · 10 months ago
Text
sorry to sound like a broken record but i am feeling super optimistic about the combat in da4, it looks like the best it's ever been in so many different ways. its definitely disappointing that you can only have three abilities per character once you're locked into combat, but i also think that this is a very good limitation to impose on players, because this way you can really focus on creating dynamic combos with specific companions, which is definitely smth the devs have been emphasizing in interviews too. it seems like the general set up for when you're going into a new area actually encourages you to change around which abilities go into your hot bar, so you REALLY gotta be thoughtful when it comes to which abilities you choose to employ. you know, like a role playing game.
0 notes
karpad · 1 year ago
Text
This Black History Month, reflect for a moment on the fact that George Washington Carver, famously "the inventor of peanut butter and more than 100 industrial uses for peanuts" wasn't, like, Doc Brown fucking around in his garage because he really liked peanuts but was specifically trying to introduce larger use of a nitrogen fixing legume into crop rotations against cotton monoculture which was destroying yields, livelihoods and the biosphere, and how most agribusiness farming now just destroys that topsoil on purpose and continues to grow a cotton monoculture (or soy or corn or whichever local monoculture is profitable) using petrochemical derived fertilizer, which is one element driving climate change
Daniel Hale Williams performed the first successful heart surgery. He also founded the first nonsegregated hospital in America because he was keenly aware of disparate health outcomes by race which is still a problem today.
WEB Dubois was a part of the delegations for the birth of the UN. His proposal to include in the charter that "the colonial system of government … is undemocratic, socially dangerous and a main cause of wars" was not adapted for the final draft. We might see inaction against colonial violence to this day as part of the failure of others to heed his warnings there.
I feel like so often when we look at Black History Month so much of it is driven by factoids but when taken as history in context its about a direct line from decades and centuries to what is happening right now.
29K notes · View notes
corporateintel · 1 year ago
Text
Why We Focus
There’s a theme running through our workplace this year. It’s as simple as it is profound. It’s not revolutionary; it’s more of a reminder. It’s all about focus. Focus matters. Focus works. Focus wins. The “what” and “how” of focus are somewhat obvious. We need to set clear priorities, narrow our agenda to initiatives that significantly elevate performance, add resources to projects that will…
Tumblr media
View On WordPress
0 notes
bamsara · 11 months ago
Text
I think that one thing people fail to understand is that unsolicited literary criticism coming from an online stranger who is reading with no knowledge of what the authors intended goal is, is not going to be received the same as say: the authors beta reader or friends who know what the authors intended goal and has the sufficient knowledge and input to help the author reach that desired outcome.
"But I'm only trying to be helpful" How do I know you have the knowledge and literary skill for you to be able to actaully do that when we don't know each other and you are essentially a stranger to me? Are you applying this criticism based out of personal biased experience and desire to see the story or characterization be driven in another direction or tweaked, or do you know the author's intentions for the character? If the story is incomplete, are you basing your criticism of a character on the incomplete narration with only partial information available of them or are you building up a report until the story's completion? Did the author provide you with the information needed to make a fully informed criticism?
Have you discussed with the author what their plans are or are you assuming them based off the narration, especially if the narration is proven or implied to be unreliable or missing key points of the plot? Are you unbiased enough to help them reach their desired outcome for the characters and story regardless of your personal feelings towards the characters/antagonists and setting? Can you handle being told your specific input isn't wanted because you're a reader and/or have no written anything relating to their genre or topic? Do you understand and respect that the author's personal experiences might influence their writing and make it different than how you would have done it personally? Do you understand if an author only wants input from a specific demographic relating to their story?
If it's for fanfiction or other hobby media, are you holding a free hobby to a professional standard? Are you trying to give criticism because you feel like the author has produced 'subpar job performance' of their fic? Are you viewing their work as a personal intimate outlet or something that must conform with mass media? Are you applying rules and guidelines when the fic is shared for simple sharing sake? Is your criticism worded appropriately and focused on the parts where the author has requested input on rather than a general dismissal and or disapproval?
Have you put yourself in a place where you assumed you have the input needed for the story to evolve better, or have you asked what the author needs and what they're having trouble with? Can you handle having your criticism rejected if the author decides their story doesn't need the change and not take it as a personal offense against your character? Are you crossing that boundary because you think you are doing the author a favor? Are you trying to be helpful, or do you just want to be?
I think sometimes when people hear authors go 'please don't give me unsolicited writing advice or criticism' they automatically chalk it up to 'this author doesn't want ANY constructive feedback on their stuff at all' and not "i already have trusted individuals who will help me with my writing goals and- hey i don't know you like that, please stop acting so overly familiar with me'
5K notes · View notes
borngeniusworld · 2 years ago
Text
Think, Act: Foolish & Intelligent
I’MBG@iamborngenius “Fools think a lot, while the intelligent act a lot.” _Subhas Yadav Have you ever pondered over the difference between thinking and acting? There’s a famous saying that goes, “Fools think a lot, while the intelligent act a lot.” This adage encapsulates an essential truth about the contrasting behaviors and outcomes of those who dwell in thoughts and those who spring into…
Tumblr media
View On WordPress
0 notes