Tumgik
#lucky we have two from rsa this year
br3adtoasty · 3 months
Text
Tumblr media
What’s a Valentine’s Day without a cupid to blow your heart away? 💕
82 notes · View notes
kalims · 1 year
Text
‎˃ ᵕ ˂ . . "you are the most beautiful person I've ever seen in my life—and this is the first time we meet so why do you like me so much?!"
Tumblr media Tumblr media
meeting a beautiful exchange student,
summary. rsa and nrc have collaborated to issue an exchange program, whoever got sent to rsa was an unfortunate soul and he was just lucky enough to meet the one that got sent to nrc—the catch is, said student is insanely beautiful.
and, that student seemed particularly fond of him.
characters. overblot gang.
includes. gn reader.
cw. reader is described as beautiful but for the most part I usually don't describe reader, you are beautiful tho <3
note. if you haven't read through who overblots yet it's best to not interact, unless you're perfectly fine with the spoilers of who overblots
also all my breaths turn into coughs and it is very hard to breathe, especially when it's one of those intense ones 😭
favoritism in jamil's part I love it so much go read it all the others are mehh. jamils part >>> for the jamil bbg stan ellie too
Tumblr media
riddle rosehearts
out of everyone,, riddle thins between the border of disliking rsa and just respecting them. well, the dislike mostly stems from the fact that it's his school's apparent 'rival' and he's got an ego big enough to get upset by the constant losses nrc dealt with the likes of them.
though if they're friendly enough he won't spare them the saltiness.
but seriously—out of concern for his fellow, why'd they have to send a student from his dorm? he can feel a headache forming because he just knows that particular student would break a few rules in his absence.
at the very least he hopes they won't slack in their academic duties.
so when he turns around, he certainly doesn't expect an unfamiliar face in front of him.
(riddle is proud to say that he knows the faces of his school mates quite well)
let me rephrase,, a very attractive face.
one of the most attractive riddle's ever seen in years and don't get him wrong! it's true that he hasn't thought of romance or anything related to that at all, pardon his languange and all but goddamn.
riddle splutters and he doesn't know whether or not that he did, or that he did because you just smiled. "o-oh um.."
see. if you mixed in riddle rosehearts and shy together most nrc students would have a hard time believing it but he's sure glad that there's not any roaming around the halls right now.
if there was imaginary sparkles around you he definitely sees them. "hello!" a greeting far too enthusiastic for a first meeting and you seem to realize that yourself,, so you clear your throat.
and your next one is like a more tamer version than your first. "hello."
oh god he hates to say it but you're cute.
like... cute cute.
he'd never thought he'd ever use that.. word to describe someone.
your lips trembles, almost like you're excited. "oh my gosh. hi! you're riddle rosehearts aren't you?! I watch the videos of the competitions you're in!" you grin and visibly skip from your standing.
riddle turns red as he nods dumbly.
"oh.. really? um... thanks." he says. clenching his hands together behind his back and he's aware of the awfully stiff, formal posture he has. somehow every insecurity he had just popped out and he's now conscious of them.
for the first time, he worries about his appearance.
is his bow even properly tied?! gods.. he never thought about it but the bow probably made him look unappealing and more girly.
but you look positively flushed, he notes. was it too cold? are you sick? should he hand you his jacket? well.. he is feeling a little warm.. "yes.. you're amazing! and, and—"
riddle didn't even question the sun outside, bright and searing just like his face when he thought of the weather being too cold for you.
cater was just walking around, stopping when he caught sight of the scene in front of him but he just had to take out his phone and snap a picture of the two, red faced people in front of him.
"hehe."
he just hopes that riddle won't ever find out about the picture because if he does.. it's off with his head.
leona kingscholar
frankly leona could care less.
his dislike of rsa students doesn't particularly stem from the rivalry. he doesn't care about that at all but the sparkly, princey attitudes just gets on his nerve. to pair it up with their equally flashy attire? yeah, he's not having it.
he'd rather them stay away from him because if he sees any of them he won't hold back from wrecking them.
well that goddamn crowley just had to pick one of his own didn't he? one of vil's would've fit the bill nicely and a savanaclaw student would stand out like a sore thumb. though he can't nor will he stop said student from picking a few fights.
knowing the attitude of his residents it wouldn't take a long time for them to get sent back.
and as for that rsa student that got exchanged.
he doesn't give a dam—
"hey there."
leona's nose twitches. a [scent] smell filling his nose, a scent he doesn't quite recognize yet it still hits like a pleasant breeze compared to those over the top perfumed pomefiore idiots.
in short this person smells good. not in the way pomefiore does but whoever this is just did.
albeit a little dazed, leona turns his head to the side. meeting with crinkled eyes halfway. he just needed one look at your attire to be able to discern that you're the mysterious exchange student from rsa.
besides the obvious patch in your uniform the rsa students just have a certain feel.
leoma just stares at you.
silently.
the amount of time he spent just oogling like a fool embarrasses him to no end but can you blame him? your face alone would fetch hundreds of admirers.
you blink. "uh.. hello?" you wave a hand in the lion's head. funny how you just casually walked into his den, stuck your palm out into his face and is still in one good piece right now.
perhaps catching himself in the act leona's brow twitches. "what are you looking at?" he huffs.
he eyes you silently. most people would probably start putting on their shitting pants if he displayed them the amount of irritation he showed you.
you? you just smiled.
"me? aren't you the one I should be asking that?" you joke.
well you do have a point but he still rolls his eyes.
leona notes that you seem to have a strange fascination with his swaying tail, unable to keep your eyes off whenever it sways naturally. sometimes he just sways it by will to see if you really are interested but by the quick glance you spare you really are.
he ignores the flush on his face and scowls. it was totally unlike him to be like this by some.. pretty face! "whatever."
"you're leona kingscholar aren't you?! oh god and I'm standing in front of you!" you had to bite your lips to prevent the shit eating grin from fully consuming your face.
yeah? so he was. but why in the hell are you so interested in him..?
you place your hands above your hips. you look like a wannabe boss, leona muses. it's amusingly cute. "aaajasjajas can you please sign an autograph?" you say, scratching your cheek in bash.
leona almost resists the urge to roll his eyes. "autograph? you want somethin' memorable?" like you wanted something from him to keep for life.
you nod enthusiastically. memorable, memorable. wouldn't it be better if he made you memories itself? you know. spending time with him to the fact that you can remember the times vividly.
and wouldn't it better to keep him, all in his glory?
if he outright said that you might just pass out though.
so he'll start with the basics.
"yeah. I'm leona, what about you? what's your name?"
the process always starts with a name don't it? well. the bonding atleast, disgustingly enough. wait why is he even doing this?
azul ashengrotto
azul wonders what kind of magic the exchange student from rsa holds.
it's not ominous or anything. crowley banned him from scamming nrc students but he never said anything about rsa students.
crowley doesn't know it himself but choosing one of the octavinelle students to get sent there works as great benefit for azul. just imagine all the things he could learn.. good thing most residents does what he asks so that one didn't even question when he implied spying for him.
of course he didn't say it outright but beating to the point but his residents seem to be getting used to him.
and he knows that the vil schoenheit would be delighted to indulge in the,, information he'll learn from neige, it's not that hard to tell the grudge the man has for him. he'd be mad too if he got upped that many times but if he said that out loud he'd probably be banned from pomefiore.
maybe rook hunt fits the category more.
oh.. only ursula knows the amount of schemes,, I mean business deals going on inside his head.
apparently he needed to get his head out of the clouds because thinking too much about his totally genius, non-scammy ideas whilst walking around the halls wasn't a good idea at all.
the fact that he collided with someone the moment he turned a corner was enough proof.
you see azul isn't a very strong man. all the power didn't go in his physical build but rather his mental one. he's rather frail compared to all of his fellow dorm leaders, hell.. that purple haired kid that follows vil around is stronger than him!
so the collision actually made him wobble, uncharacteristically taken off guard he stumbled.
pain sears across his back side and he doesn't know whether to groan or feel embarrassed. was anyone watching? he'll die.
all he knows is that someone collided into him.
azul places a carefully practiced smile, closing his eyes to flash the person in front of him a kind tilt of the lips. "how clumsy of me." he says. you are the clumsy one. he stubbornly denies in his mind.
the closed eyes always obstructed his view but that won't make any difference.
except this time it did.
he opens his eyes. "are you—" okay?
what in the name of ursula.
azul immediately shuts his mouth, opens it but once he realizes no words were coming out he shuts it again. he just gapes, with wide eyes and equally wide mouth.
actually wait he isn't okay.
first of all that person in front of him? was drop dead gorgeous and he's a little embarrassed to see that you've already got yourself on your feet and offering a hand while he's still trying to look good.
on the ground.
somehow.
azul turns red and he pursues his lips. there's comical steam floating out of his head, and the vapor had magically fogged up his glasses.
you stare at him gesturing him to take your hand after minutes of silence. azul dusts himself off. "oh.. thank you very much." he clears his throat. "I don't think I've seen you before."
perking up, you reply; "I'm new I guess. the exchange student ring a bell?"
"I see."
he makes a show of opening his mouth then nodding, acting like he didn't know before. it's not hard to miss when the patch of rsa is stitched proudly on your chest area. seems like they modified it for your sake.
azul smiles thinly. "in that case. I'm free right now, why don't I show you around?"
you beam brightly and nod enthusiastically. "oh gods.. thank you so much! I was actually lost, new school and stuff." you laugh. you don't blame yourself at all, this school was huge and your school didn't use mirrors a lot.
people would be suprised about the students preferring to walk because of 'nature' of the main seven heroes it worships preferred to. the students from the mermaid door like to walk despite them usually being clumsy.
though this man did look familiar but you can't place your finger on how.
"my name is azul ashengrotto, I'm a second year. I manage a place called monstro lounge, you could visit if you'd like."
why is he even bringing up monstro lounge so fast? he's totally not trying to impress you.
well it did work.
you raise your brows, your eyes flash in recognition. "azul ashengrotto? oh my gosh. I knew you looked familiar!" you resist the urge to squeal.
he tilts his head.
"you like, host many events in nrc don't you? I loved them so much! the venues are a beautiful sight. don't get me started on your after speeches.. your voice and your suits make me want to faint."
azul holds in his blush by pushing in his lips.
jamil viper
there's still a lot to do. jamil thinks grimly. despite one of their own getting sent to hell itself (aka rsa, hell because it seems like a nightmare to be in there at all) kalim thought it was an omen and decided to throw a celebration commending a new start.
he does get it though. instead of being at each other's throat (one sided) the schools are finally collaborating with less violence than he'd like.
that doesn't mean jamil is fully on board with the idea though, more so that he finds out more workload would only be added to his plate.
man is stressed.
so here he is, voice honestly sore from all the orders and scolds he executed in a single hour. be it blabbering someone to do an order or going off at another for doing it the wrong way. if there was 20 jamil's it'd be done in no time but cloning is a very complex spell he hasn't learned.
yet— but once he does the dorm will not be ready for him.
the boy who issued the party himself is off somewhere inviting more people, which meant this party would be bigger than the resident scarabia exclusive party. since he's inviting people from the other dorms too.
hasn't he invited enough? jamil sighs. he's been giving invitations since yesterday. kalim might as well invite the whole school.
he doubts that he's entirely off the truth.
how in the hell he's gonna fit them all if he does into the dorm is anybody's guess. jamil is not a fan of packed places.
actually he isn't a fan of parties at all.
it would've been better to deal with if kalim announced the party weeks prior! not literally a day before it! yesterday was the absolute worst day of his month and there's like ten of those every month.
so imagine his stress when the guests already started piling in when he hasn't even finished the last snacks for the table.
he knew he should have contacted trey because baking muffins straight out of a tutorial is definitely not ideal at all.
to be fair he doesn't make them a lot and the last time he did was so long ago that he needed to search it up on how to make it.
kalim would've been perfectly fine if he left out he muffins off the menu but jamil doesn't wanna take any chances.
I don't think they're supposed to look like that. jamil wipes off the sweat on his forehead silently. staring at the definitely undercooked muffin barely even poofed up to eat
the door creaks open and jamil doesn't spare it a glance. finally some help. "can you hand me another batch of the batter? I messed up." he glances at the clock. well there's still time and the guests outside were grateful enough to dig in on the other variety of food.
jamil stretches out his hand after he finishes setting up another tray. though the voice that he has not heard before has him freezing.
he doesn't even move when the weight of the presumed batter is gently put on his outstretched hand.
"oops.. yeah that definitely looks horrible not gonna lie."
I can see that. jamil blankly thinks, turning his head to silently analyze the person beside him. one of the people kalim invited definitely, the boy would give an invitation to a person he doesn't know.
you just stare back calmly.
but wow. you have pretty eyes. jamil clears his throat. he grips the plastic of the batter and focuses on pouring the right amount into the cups. if he keeps staring it'd be rude and he isn't sure if he wouldn't stay distracted.
while pouring in the consistency he speaks; "I don't think we've met but thanks." he says, you smile in response. looking apologetic.
"sorry for barging in. kalim told me that you were here."
jamil blinks and his hold falters. a pretty person looking for me?
what.
"oh. that's strange. why would you look for me?"
perhaps he's a little suspicious.
"I couldn't help myself. I just had to meet the chef—" you pause and look over his work. "—and baker. themselves."
you seem oddly invested in him just placing the dough in the cups. he feels kind of pressured and dare I say shy in this amount of attention.. "why's that?"
wait he should probably tone it down. he's making it seem like he's interrogating every choice you just made.
though you don't seem to mind. your eyes almost look like they sparkle and they look prettier to him. "the food was unlike anything I've ever eaten! I've met five star chefs and none could ever compare. it was like the taste of home." you sigh dreamily.
jamil clears his throat and he's glad that his hair is over his shoulder so you wouldn't see the flush on his face.
it's nice to be appreciated and you don't seem like you preferred kalim over him.
jamil thinks. fuck it. "well. how would you like me to teach you over?" maybe he was being way too forward. it was uncharacteristic of him to be like this but can you blame him?
it's like your beauty was enchanted with some spell that completely lured him in.
he leans away and it felt like just a few seconds when you were both talking, the cups full of batter speaks for itself. jamil brings it to the oven and sets the timer.
your voice echoes in his mind. "I'd love that. let me know when you're free, I don't wanna impose when you're busy."
he frowns. he is busy tomorrow, the day after tomorrow and the day after that. maybe this will be a test for his patience.
you notice the frown on his face but still manage to laugh. "by the look on your face I'm guessing you're not? well that's fine. want to exchange numbers so we can talk when you are?"
he isn't sure if this was just a ploy to get his number but damn. you are one smooth, beautiful one. he nods, still a little dejected from his full schedule.
"jamil is free tomorrow!" the male in question doesn't know when or how kalim got in without the two of you noticing but he just did.
for once he's kind of glad for the boy even he's a headache most of the time.
you raise your brows and look between the two having a staredown. "that so?"
jamil turns to you and shrugs. "I guess so."
there's a trace of a faint smile on his face.
vil schoenheit
it's strange.
vil heard from a little birdie, aka our resident rook hunt that the exchange student from rsa was chosen to reside in pomefiore out of every dorm, what was crowley thinking? as if sending one of vil's own into the devil's den wasn't enough
and only the students chosen by the mirror should be able to stay in pomefiore's castle.
so you can say that he's a little irked.
especially thinking of the possibility that the student could be acquaintances with neige, if they are then it's a game over. he might be being a little bitter about it but can you blame him? it drives him crazy.
rook might not mind, maybe epel too. but he can't say the same for himself and the other residents of his dorm.
vil isn't usually someone to listen in gossip but it was too interesting to just pass by the room with a door that was just conveniently creaked open.
"—I'm telling you! it's blasphemy. they didn't even bat an eye when I suggested them to use the right products!"
vil doesn't gaze inside the room, rather keeping his eyes ahead.
"hmph. the audacity. our advice would be worth thousands! did you see the eye they gave us? someone like me shouldn't receive such a gaze." the other one huffs.
sometimes his own residents could be way too feeling royalty. vil sighs, even he is a little appalled on how they act.
'right products?' he doesn't really agree. there isn't a right or wrong to which products one use, except is said product is actually really bad for the skin.
the lights of pomefiore dim compared to when it's morning. those were operated to immediately lower brightness in the night anyways. still, vil's favorite time is when it's quiet, serene and beautiful.
and there was a spot in the gardens for himself only.
but there was someone in here.
"those are apricots." vil points out. crossing his arms to carefully survey the supposed intruder, when he said that he knew each and every one of the faces in his dorm. he was being serious. and from a gaze alone from them gives him the conclusion that this is someone new.
perhaps a student who started late? but then again even if it was just one or a few more students for submission the dorm leaders would've still been summoned to witness the ceremony first hand.
the figure in front of him freezes. finger twitching before retreating in hesitance, completely discarding their previous action to reach out and touch the flower. most probably embarrassed to be seen trying such a thing.
"yes. it's a symbol of elegance. quite fitting for your dorm." they speak out slowly.
maybe he hasn't counted in his and your own reflection in the glass window but you sure do and you can feel your heart racing from the familiar features he has. sure, it's a little different from the ones you're used to. the ones where you weren't granted the honor to stand so close.
but he was still very beautiful. inside and out.
vil's eyes glint in recognition. "hm."
there's a quiet moment of silence. not necessarily uncomfortable but not that comforting either.
you open your mouth, close it once more but thankfully you've gathered enough words to speak out. "i, uhm.. the student from rsa." you say.
you're quite perspective. vil notes. he didn't even see your face yet you know it from his tone alone.
but.
oh. he thinks with a blank stare. who would've guessed? all the pieces fall together perfectly but he hoped you were anything but that. the title is something he started associating with you the moment you said it. all the bad things are sticking to you now and he doesn't like it.
neige, rsa... he closes his eyes and turns to retreat back to his abode. hoping to walk away before he starts to resent you.
the fire within vil grows a little harder.
"hey. I just wanted to say."
he pauses. vil imagines you looking his way, face shown, no longer hiding your identity yet he doesn't dare to look back.
you avert your eyes to the floor and are practically swimming in embarrassment. should you be blessed with the sight of your eternal love in nightwear? anyways..
"you probably heard this a lot of times already but omgiloveyousomuch wait that sounds creepy sorry uh.. I really liked your first movie!" you unconsciously rant and close your eyes, giggling then pausing when you catch yourself in 4k.
indeed it's something vil's heard a lot of times but from an rsa student? well that's something new.
congratulations you've officially peaked his interest. "my.. first movie..?" vil inhales a sharp breath. he didn't think anyone would remember that! he literally payed the director mounts of cash to erase that one from existence!
you nod. "yes.. I'm guessing you were new around there but your acting was just so raw that I had to rewatch it a hundred of times." maybe the hundred times were an exaggeration but plenty enough to stand near the truth. "ever since I've looked up to you."
vil stays silent.
you sweatdrop. "sorry that was weird. but I'm really happy I got to tell you in person. don't worry! I'll be out of your hair and you won't see me ever again."
that's right. this is something he can forget easily. he just has to keep looking forward and he won't see you at all, he won't ever know who told him the kindest, genuine words he's ever heard ever.
he looks back and you hold your breath.
wow. he was beautiful.
his eyes skim through you in the most judgemental way you've seen but do you care? no. eye contact with vil.. you're suprised you haven't passed out yet.
"beautiful."
you nod in a frenzy, thinking he was referring to himself.
you are beautiful. vil thinks. just before he hasn't even taken a look at you and he thought the exact same thing.
he smiles. "it's nice to have someone who understands flower languange."
either you were absolutely flabbergasted, all you can do was nod and agree to nearly all he said when he stayed for a few and talked with you.
idia shroud
idia is feeling particularly antsy today.
he doesn’t know when, why, what, or how he agreed yesterday midnight to a meet up with his currently closest online friend. idia knows full well of the risks, is he gonna meet a ten year old or a sixty one year old?
well the meet up had him so distracted that he barely even paid attention to crowley's announcement. only making out an exchange program from it.
there's far bigger things he worries about,, like the fact that he's having an inner crisis because of the situation!
and the fact that his friend unconsciously sent an ominous message.. 'I'm closer than you think' what does that even mean?!
and he doesn't know what went through their head when they said to meet him in the botanical garden of nrc. like.. there was no way the barrier would even let them step foot in the nrc grounds!
still, no matter how bizarre it sounded he still went.
idia sticks out like a sore thumb in the valley of green with his flaming hair, standing there with a console at hand to keep himself distracted.
he got a lot of weird looks. seriously? the barely seen dorm leader of the mysterious ignihyde in such a place? what's new though honestly.
idia waits and waits, till he just slumps and curses himself for believing such a thing. there was no way you'd even be able to—
"ghoul666?" a voice chuckles. and... that was his username! it must be..
"(username)?!?!" idia nearly screeched out loud. turning around frantically but stopping short when he catches sight of you.
oh my god... are you an s-rank deity?!
you smile. "hi! you can call me (name).. it's a little weird to hear that in real life." you shrug and idia still can't pick up the jaw that's practically on the floor.
you watch in amusement as his hair flares and turns pink.
"why,, h-how.. what?!" idia splutters out.
"I'm the exchange student from rsa. isn't it fate that we meet like this?"
oh.
well actually he didn't exactly listen to crowley so.
who knew his literal online best friend was so awe-striking? he feels like a pebble next to them.
if he could have stats in his eyes he would but strangely enough it seemed like you would too.
you scratch your cheek. the atmosphere is kinda awkward. "it's so nice to meet you in person! one day I hope I can solo a boss with 1 hp too.."
idia flushes once again. nearly half of his hair is now encased in pink. "i-i could show you how I do it... not that you'd ever want to hang out with me.." he trails off.
you shake the remark off. "that's not true! let's go right now! uh.. if you want."
here we have two people completely enamored with the other.
clarifications.
in riddle's part, the competition refers to equestrian.
the positively flushed isn't a reference to a red face, but since riddle thought you were being sick maybe he thought it was. I'd rather call it shy behavior.
idia's part was rushed.
its exactly 40 minutes before 12 PM
2K notes · View notes
italoniponic · 1 year
Note
Mc Hcs pt 5 sad edition
Mc when they were 12 years old were sent to a psychiatric hospital for half year due to the emergence of a second personality they said was called Dahlia(Mc as kid has been described as clumsy, honest, happy go lucky , loyal etc but Dahlia in the hospitals psych evaluation was said to be the embodiment of evil and beauty.they would eventually also know them as the noble flower of evil because when ever their around they can cause the worst in somebody to bloom and reveal the worst version of themselves )
Mc due to their fame as a 'small' time actor had their fair share of stalkers and one time nearly gkt kidnapped so they begged their dad Donald to let them practice martial arts which after the recent incident they did. Sometime later they were gettung stalked by a fanatic classmate who had been really creepy and one day took it too far with nc who lashed out and beat them within an inch if their lives, they were sent ti hospital dor two months and even thiygh they were left off the hook due to ir being self defense. They felt horrible afterwards because they beat a guy nearly to death without ever trying to get him to stop or to change and simply chose violence as their first option so after that they swore that unless there was no literally no other way they wouldn't use violence to end conflict.
Filowing the pevious HC. Mc stopped acting after that incident as to stop attracting stalkers and prevent anotger situation like that.
Mc when they were younger they struggled to fit in with people. This was because in their own words was that they always felt as if that place wasn't their real home.(even when they were un their own house they sometimes felt homesick)
Mc also used to get sick a lot when they were younger and it was said by doctors that it was odd since on their arm They did have a vaccine shot scar but they still got sick almost as if the vaccune they took was for some foreign illness.
Bonus headcanons(happy edition)
Mc and Peter always did stargazing together and when it was Mc birthday he woulf often joke about whisking them away to land where kids never grew up so he could always babysit Mc in future
Mc has on more than one occasions played the role of nobility in a play or movie they often took etiquette classes meant for nobility and due to this has some friends who are nobles.
Mc at the end of everyweek gives Lilia all the photos they took so Lilia can cherish the memorues he had at Nrc
Mc has been noted to be a treasure magnet and often finds hidden valuablss on the schook camous which they usually give to Sam.
Mc during the Port fest worked at a cafe called Dukes cafe to raise money so they could get their friends souvenirs and gifts
Mc when their not busy during clubs time often sings solos of songs from their old world(did Mc one time sing the Macarena yes do they regret the fact all of scarabia had to do a macarena dance practice for 3 hours no)
I hope you liked these new batch of Hcs as always feel free to ask questions regarding bg the Hcs and Cherry i also hope you got my Hcs home edition or if Tumblr ate my ask if they did i dont mind sending it again
Goodbye and have great day
Sorry for taking so long to reply! I got tangled in a lot of irl things and it took me some time to come back here again but once again, thanks for your additions for the MC hcs~ [these in special are continuations of the multiple MC's hcs from last time]
seems that we have sad and happy hcs this time! the thing with more angst/dramatic hcs is that I'm not so good at commenting on them as the few times I think about it so, unfortunately, I won't have much to add on the first part...
as for the more happier hcs tho~
so, interesting, MC is more of a Wendy (or one Lost Child) in this one. Another thing that I love about it, not only for my love for the Peter Pan story, is that I actually made an twst!Peter oc that is a teacher at RSA and these specific hcs always reminds me of him. I won't be able to show him yet since... well, my posting schedule is the amalgamation of chaos (especially with ocs). And the stargazing part is really beautiful
MC always has the connections since ever lol reminds me of that Barbie song "To Be a Princess" (from the og Princess & the Pauper)
aaaawwww~ I never stopped to think about how faes like Lilia or even Malleus feels about photos, in the same sense we view them. but it's an heartwarming (and lowkey sad for ch6 watchers) hc <3
MC works so hard at all times. now imagine after the event ends, MC kinda does the same thing as Jack (like he wanted to treat Ruggie to eat the special dish from this one restaurant he worked on) and they invite their friends to eat there too. and their boss is like "take a day rest and enjoy it with your friends" too~
THE MACARENA KILLED ME LMAO Kalim probably had the time of his life, he didn't feel any of the 3 hours. idk about Jamil bc he likes to dance (tho he has his issues with doing in front of other bc of the whole "not go into the spotlight", still he's getting more out there since ch4...) but maybe the same song after a lot of time might be a bit annoying for him? I'm not so sure for his part
and we ended this batch! I'm sorry again for not commenting much on the angst hcs, like it's just not something I'm familiar or comfortable enough to talk about, but your ideas are always interesting and creative, believe me!
thanks again <3
Tumblr media
20 notes · View notes
Text
Tumblr media
Valentine - Laufey
Tumblr media
Parson opened her locker and set her books in an orderly manner. Students passes by behind her, happy chatters and giggles can be heard throughout the hallway.
Of course, students are naturally big talkers but today was special. Everyone is talking about what their crush or partners will do for them today because-
"Happy Valentine's, Parson. Got anything for me?"
Parson looked at the white-haired male, unimpressed at the boy for closing her locker. "No. And you could've hurt me, Maximus."
She walked pass the stupefied boy, who recovered quickly and chased after the green haired girl.
"I knew you could have dodged it, you're Parson after all. You're quick with your reflexes, yeah?"
He wasn't wrong. She was the captain of the Swords Fighting Club in her first year after all, she was an impressive student by RSA standards.
"Don't you have council work to do?"
"It's not as important as you. You know, I think we should-"
"I think you should lay off my girl."
I've rejected affection for years and years.
A third party joins the conversation, standing tall in front of Max and wrapping his tail around Parson's waist. Sapphire blues bore into Max's brown eyes.
The white-haired boy surrendered with raised arms, backing off to give the two distance. Drake huffs, meanwhile Parson is still replaying the set of words "my girl" in her mind.
Her tail slowly changed into a shade of red similar to her cheeks as she internally screamed in her head, before her inner voice told her to snap out of it.
Now I have it and damnit, it's kind of weird.
In response to her internal conflict, she balled one of her hands into a fist and gave a blow to the back of Drake's head. The dragon boy winced in pain and rubbed the spot where he was hit.
Max saw the opportunity for him to exit the scene and took it. Drake took a brief moment to hiss at the cowering student and commenting something about willing to fight if this happens again before taking his attention onto Parson.
His mouth formed a wide grin, while Parson pouts at his small intimidation tactic. The chameleon turned around and walked away, as he followed suit not too far behind.
As always, Drake complimented Parson the whole time as they walked. Not a single part of his lovely girlfriend was left out from his comments, the way she walked, her hand swaying slightly as he held to one of them, how beautiful she looked, one after the other.
Not one part of Parson was safe from his sweet words and while to others it may seem as if she was uninterested in him, she gets more and more flustered at every single comment made.
He tells me I'm pretty, don't know how to respond.
They finally arrived in front of Parson's dorm room where the girl turns around and finally faces Drake, her tail had returned to it's original green color. "What is it? You didn't come all this way to compliment me for 20 minutes, did you?"
"What if I did?"
Parson scoffed, ignoring the way her heart's beat faster after hearing his claim. Drake only laughed, already used to her cold exterior.
Instead, he revealed a gift bag he held in one of his hands. Parson raised an eyebrow as the red-headed boy starts scavenging in the bag.
First, he pulls out a strangely shaped item but Parson immediately recognizes what it was.
"Is that... a custom sword hilt?" Drake nodded happily before handing it over to his precious girlfriend. She took the hilt carefully, admiring the amount of work that was put into the delicate item before realizing a particular detail.
"Pure silver?! Drake, this must have costed a fortune!!" Parson exclaimed, leaning towards the dragon with wide eyes. The redhead only smiled softly.
"I was lucky enough to get this one in time, hope you like it, Apples."
The chameleon's heart skipped a beat seeing the gentle look on her boyfriend's face [while he mentions something about working his ass off for it]. She bashfully looked away, holding the hilt close to her and quietly thanking him.
She was about to leave to her dorm when Drake held her back and fished out another gift in the bag.
I tell him that he's pretty too, can I say that? Don't have a clue.
"It's... a lizard?" Parson said unsurely at the red [clearly] handmade plush in her hand. Drake quickly denied and corrected her.
"No, it's a dragon, see?!" He points out a pair of small wings that seems to be hanging by a single thread, literally.
"So, if you miss me, you can just hug this little guy! Made it myself."
"I can tell." She added, looking at the messy handiwork.
Parson stared for a few moments before giving a hesitant smile, "It's great. Thanks, Drake."
A bright smile appeared on Drake's face, which caught Parson off guard. Her gaze softened as she stepped closer an gave a chaste kiss on Drake's jawline.
The boy held onto her waist before she could step back and instead, gave her a gentle kiss on the lips, which she reciprocated. The kiss only lasted a minute as the two hesitantly pulled back.
The two lovelizardsbirds stared at one another for a split second before Parson snaps herself out of the trance and backed away.
She stuttered as she wandered to her door, "Uh, I have a club practice in a bit. So, I'll um, see you."
"See ya, Apples!"
With every passing moment, I surprise myself.
From afar, Cricket watched as Parson closed her door and left a happy Drake outside. The moment the door shuts, the dragon boy was expressing his joy with his whole body.
"Stop spying on someone's boyfriend, weirdo."
Cricket glared and signed with his hands, 'I thought you'd be jealous too.'
Max let out a chuckle, "Jealous? Me? I just think Parson could kick my ass. That's kinda hot, y'know."
The purple-haired boy let out a sigh as he took one last glance at the dragon boy jumping and pacing around in joy before leaving the blue-haired boy's view.
"Now will you get to work? We have to plan the new event and check our budget."
Max inquired seeing that Drake was out of sight. Cricket gave one last exhale before walking over to Max's side and walking beside him.
"By the way, got anything planned for Valentines?"
I'm scared of flies, I'm scared of guys. Someone please help.
Parson closed the door, holding the gift bag given to her in one hand. She grabbed the plushie inside the bag and gently set down the bag on her bed.
She laid down and stared at the plushie for a second before flipping over and starting to squeal at the handmade toy filled with cotton.
'HE'S SO CUTE!!!!'
Parson screamed in her mind, gushing over her cute boyfriend and deciding to treasure the plush for life [though she couldn't understand the random velcro patches on both shoulders and palms]. She couldn't help but snuggle against the plush, giving it small pecks before squealing against her sheets again and kicking her feet like a schoolgirl.
She was so grateful Antos went to his council meeting earlier, she would've rather die than let him see her like this.
Cause I think I've fallen in love, this time.
She peeked out from the sheets, face [and tail] completely red and saw a paper peeking out from the now toppled bag.
She reached out and grabbed the paper to realize it's a letter, a love letter to be more accurate. She opened it and read the contains.
Parson smiled softly, looking at the last line Drake had wrote for her.
'I love you.'
I blinked and suddenly I had a Valentine.
Tumblr media Tumblr media
i made shrimpy suffer cause i finished this around on the 8th drake and cricket belongs to @anaxocs
Tumblr media
3 notes · View notes
bits-crack-bv · 2 years
Text
Download BITS crack (license key) latest version 8T8D№
Tumblr media
💾 ►►► DOWNLOAD FILE 🔥🔥🔥 The Clock Is Ticking for Encryption The tidy world of cryptography may be upended by the arrival of quantum computers. In essence, the FBI found it more productive to burglarize a house than to crack a bit code, despite having the computational resources of the U. That's because modern cryptography, when used correctly, is very strong. Cracking an encrypted message can take an incredibly long time. The scale of the encryption-cracking challenge Today's encryption algorithms can be broken. Their security derives from the wildly impractical lengths of time it can take to do so. Let's say you're using a bit AES cipher. The number of possible keys with bits is 2 raised to the power of , or 3. Assuming no information on the nature of the key is available such as the fact that the owner likes to use his or her children's birthdays , a code-breaking attempt would require testing each possible key until one was found that worked. Assuming that enough computing power was amassed to test 1 trillion keys per second, testing all possible keys would take This is about million times the age of the visible universe On the other hand, you might get lucky in the first 10 minutes. But using quantum technology with the same throughput, exhausting the possibilities of a bit AES key would take about six months. If a quantum system had to crack a bit key, it would take about as much time as a conventional computer needs to crack a bit key. That's the case today. But within the foreseeable future, cracking those same codes could become trivial, thanks to quantum computing. Before learning about the threat of quantum computing, it helps to understand the current state of encryption. There are two kinds of encryption algorithms used in enterprise-level communications security: symmetric and asymmetric, Moorcones explains. Symmetric algorithms are typically used to send the actual information, whereas asymmetric algorithms are used to send both the information and the keys. Symmetric encryption requires that the sender and receiver both use the same algorithm and the same encryption key. Decryption is simply the reverse of the encryption process -- hence the "symmetric" label. There are numerous symmetric algorithms, but most enterprises use the Advanced Encryption Standard AES , published in by the National Institute of Standards and Technology after five years of testing. AES, which typically uses keys that are either or bits long, has never been broken, while DES can now be broken in a matter of hours, Moorcones says. AES is approved for sensitive U. As for classified information, the algorithms used to protect it are, of course, themselves classified. And they use multiple algorithms, he says. The genuine weakness of AES -- and any symmetric system -- is that the sender has to get the key to the receiver. If that key is intercepted, transmissions become an open book. That's where asymmetric algorithms come in. Moorcones explains that asymmetric systems are also called public-key cryptography because they use a public key for encryption -- but they use a different, private key for decryption. It is based on the difficulty of factoring large numbers, from which the two keys are derived. However, EC encryption up to bits has been broken, Kocher notes. RSA remains popular with developers because implementation requires only multiplication routines, leading to simpler programming and higher throughput, Kocher says. Also, all the applicable patents have expired. For its part, EC is better when there are bandwidth or memory constraints, he adds. The Quantum Leap But this tidy world of cryptography may be seriously disrupted by the arrival of quantum computers. Mosca notes that in the past 15 years, we have moved from playing with quantum bits to building quantum logic gates. At that rate, he thinks it's likely we will have a quantum computer within 20 years. Basically, Mosca explains, a quantum computer should be able to use the properties of quantum mechanics to probe for patterns within a huge number without having to examine every digit in that number. Mosca explains that with a conventional computer, finding a pattern for an EC cipher with N number of bits in the key would take a number of steps equal to 2 raised to one-half N. As an example, for bits a modest number , it would take 1. With a quantum computer, it should take about 50 steps, he says, which means code-breaking would then be no more computationally demanding than the original encryption process. With RSA, determining the number of steps needed for a solution through conventional computation is more complicated than with EC encryption, but the scale of the reduction with quantum computation should be similar, Mosca says. The situation is less dire with symmetric encryption, Mosca explains. Breaking a symmetric code like AES is a matter of searching all possible key combinations for the one that works. With a bit key, there are possible combinations. But thanks to a quantum computer's ability to probe large numbers, only the square root of the number of combinations needs to be examined -- in this case, This is still a huge number, and AES should remain secure with increased key sizes, Mosca says. Timing Issues When will quantum computing threaten the status quo? To many people, 20 years seems a long way off, but in the world of cybersecurity, it's right around the corner. I don't think so. So we need to start figuring out what alternatives to deploy, since it takes many years to change the infrastructure," Mosca says. SafeNet's Moorcones disagrees. Increases in computing power can be countered by changing keys more often -- with each new message, if necessary -- since many enterprises currently change their key only once every 90 days, he notes. Every key, of course, requires a fresh cracking effort, as any success with one key isn't applicable to the next. When it comes to encryption, the rule of thumb is that "you want your messages to provide 20 years or more of security, so you want any encryption that you use to remain strong 20 years from now," says IDC's Kolodgy. For the time being, "code-breaking today is an end-run game -- it's all about snatching the user's machine," says Kolodgy. And data-breach notification laws don't require you to disclose your lost data if it was encrypted. Wood is a freelance writer in San Antonio. Quantum key distribution technology could be the solution If quantum technology jeopardizes the methods used to disseminate encryption keys, it also offers technology -- called quantum key distribution, or QKD -- by which such keys can be simultaneously generated and transmitted securely. At one end of an optical fiber, an emitter sends individual photons to the other end. Normally, the photons will arrive with the expected values and will be used to generate a new encryption key. But if there is an eavesdropper on the line, the receiver will see an error rate in the photon values and no key will be generated. In the absence of that error rate, the security of the channel is assured, Ribordy says. However, since security can only be assured after the fact -- when the error rate is measured, which happens immediately -- the channel should be used to send only the keys, not actual messages, he notes. The other limitation of the system is its range, which currently doesn't exceed kilometers 62 miles , although the company has achieved kilometers in the lab. The theoretical maximum is kilometers, Ribordy says. Going beyond that would require the development of a quantum repeater -- which would presumably use the same technology as a quantum computer. It was adapted from an article that appeared earlier on Computerworld.
1 note · View note
bits-crack-of · 2 years
Text
Download BITS crack (license key) latest version S21D;
Tumblr media
💾 ►►► DOWNLOAD FILE 🔥🔥🔥 The Clock Is Ticking for Encryption The tidy world of cryptography may be upended by the arrival of quantum computers. In essence, the FBI found it more productive to burglarize a house than to crack a bit code, despite having the computational resources of the U. That's because modern cryptography, when used correctly, is very strong. Cracking an encrypted message can take an incredibly long time. The scale of the encryption-cracking challenge Today's encryption algorithms can be broken. Their security derives from the wildly impractical lengths of time it can take to do so. Let's say you're using a bit AES cipher. The number of possible keys with bits is 2 raised to the power of , or 3. Assuming no information on the nature of the key is available such as the fact that the owner likes to use his or her children's birthdays , a code-breaking attempt would require testing each possible key until one was found that worked. Assuming that enough computing power was amassed to test 1 trillion keys per second, testing all possible keys would take This is about million times the age of the visible universe On the other hand, you might get lucky in the first 10 minutes. But using quantum technology with the same throughput, exhausting the possibilities of a bit AES key would take about six months. If a quantum system had to crack a bit key, it would take about as much time as a conventional computer needs to crack a bit key. That's the case today. But within the foreseeable future, cracking those same codes could become trivial, thanks to quantum computing. Before learning about the threat of quantum computing, it helps to understand the current state of encryption. There are two kinds of encryption algorithms used in enterprise-level communications security: symmetric and asymmetric, Moorcones explains. Symmetric algorithms are typically used to send the actual information, whereas asymmetric algorithms are used to send both the information and the keys. Symmetric encryption requires that the sender and receiver both use the same algorithm and the same encryption key. Decryption is simply the reverse of the encryption process -- hence the "symmetric" label. There are numerous symmetric algorithms, but most enterprises use the Advanced Encryption Standard AES , published in by the National Institute of Standards and Technology after five years of testing. AES, which typically uses keys that are either or bits long, has never been broken, while DES can now be broken in a matter of hours, Moorcones says. AES is approved for sensitive U. As for classified information, the algorithms used to protect it are, of course, themselves classified. And they use multiple algorithms, he says. The genuine weakness of AES -- and any symmetric system -- is that the sender has to get the key to the receiver. If that key is intercepted, transmissions become an open book. That's where asymmetric algorithms come in. Moorcones explains that asymmetric systems are also called public-key cryptography because they use a public key for encryption -- but they use a different, private key for decryption. It is based on the difficulty of factoring large numbers, from which the two keys are derived. However, EC encryption up to bits has been broken, Kocher notes. RSA remains popular with developers because implementation requires only multiplication routines, leading to simpler programming and higher throughput, Kocher says. Also, all the applicable patents have expired. For its part, EC is better when there are bandwidth or memory constraints, he adds. The Quantum Leap But this tidy world of cryptography may be seriously disrupted by the arrival of quantum computers. Mosca notes that in the past 15 years, we have moved from playing with quantum bits to building quantum logic gates. At that rate, he thinks it's likely we will have a quantum computer within 20 years. Basically, Mosca explains, a quantum computer should be able to use the properties of quantum mechanics to probe for patterns within a huge number without having to examine every digit in that number. Mosca explains that with a conventional computer, finding a pattern for an EC cipher with N number of bits in the key would take a number of steps equal to 2 raised to one-half N. As an example, for bits a modest number , it would take 1. With a quantum computer, it should take about 50 steps, he says, which means code-breaking would then be no more computationally demanding than the original encryption process. With RSA, determining the number of steps needed for a solution through conventional computation is more complicated than with EC encryption, but the scale of the reduction with quantum computation should be similar, Mosca says. The situation is less dire with symmetric encryption, Mosca explains. Breaking a symmetric code like AES is a matter of searching all possible key combinations for the one that works. With a bit key, there are possible combinations. But thanks to a quantum computer's ability to probe large numbers, only the square root of the number of combinations needs to be examined -- in this case, This is still a huge number, and AES should remain secure with increased key sizes, Mosca says. Timing Issues When will quantum computing threaten the status quo? To many people, 20 years seems a long way off, but in the world of cybersecurity, it's right around the corner. I don't think so. So we need to start figuring out what alternatives to deploy, since it takes many years to change the infrastructure," Mosca says. SafeNet's Moorcones disagrees. Increases in computing power can be countered by changing keys more often -- with each new message, if necessary -- since many enterprises currently change their key only once every 90 days, he notes. Every key, of course, requires a fresh cracking effort, as any success with one key isn't applicable to the next. When it comes to encryption, the rule of thumb is that "you want your messages to provide 20 years or more of security, so you want any encryption that you use to remain strong 20 years from now," says IDC's Kolodgy. For the time being, "code-breaking today is an end-run game -- it's all about snatching the user's machine," says Kolodgy. And data-breach notification laws don't require you to disclose your lost data if it was encrypted. Wood is a freelance writer in San Antonio. Quantum key distribution technology could be the solution If quantum technology jeopardizes the methods used to disseminate encryption keys, it also offers technology -- called quantum key distribution, or QKD -- by which such keys can be simultaneously generated and transmitted securely. At one end of an optical fiber, an emitter sends individual photons to the other end. Normally, the photons will arrive with the expected values and will be used to generate a new encryption key. But if there is an eavesdropper on the line, the receiver will see an error rate in the photon values and no key will be generated. In the absence of that error rate, the security of the channel is assured, Ribordy says. However, since security can only be assured after the fact -- when the error rate is measured, which happens immediately -- the channel should be used to send only the keys, not actual messages, he notes. The other limitation of the system is its range, which currently doesn't exceed kilometers 62 miles , although the company has achieved kilometers in the lab. The theoretical maximum is kilometers, Ribordy says. Going beyond that would require the development of a quantum repeater -- which would presumably use the same technology as a quantum computer. It was adapted from an article that appeared earlier on Computerworld.
1 note · View note
minzart · 3 years
Note
Ok so I was thinking... (idk how'd I title this) ultimate visual novel/otome game!mc..? (This can also fall in line with yuu from a family of protags..)
Throughout their life been transferred and transported to many Romcon-esque scenarios. Being through so many years of highschool and college they can practically walk into any job and be over qualified for it.
~~~~
Mc: *waking up in coffin*
Mc:
Tumblr media
~~~~
Mc has a bingo card system their not half way through the year and they already gotten 10 full card bingos
Mc: *pulling out bingo card* *underbreath* okay so far...we got.. 'totally not the secret villian Headmaster', himbo jock, Sus salesmen, old reliable... and hot home room teacher...
Azul: *whispering* what are the doing
Kalim: I have no Idea
Mc: there's the young looking but actually WAY older than everyone, the narcissistic beauty that gets his comeupings, small angry one...
Lila: I don't know about any of you... but I feel like beastie I'd talking about us..
Mc: oh! And there's 'also totally not the villian bestfriend', the delinquent that's likes cute things, the tsundere, cute boy that's two faced... the simp lackey
Sebek: *offended* >:-0
Mc: who else do we have... oh we also have the shut in otaku, 'also probably the secret villian', 'rich nieve who's servant is using them as a puppet', using my influence to be corrupt and the second born with a inferiority complex.
Leona: that last one seems TOO specific
Jamil: *annoyed* you tell me
Mc: Oh how could I forget.. then there's the younger brother replacement, the scholarship kid, the servant with a secret agenda, there's the dadd-*cough cough* the happy go lucky who depressed..
Trey:*deadpan* I can only guess
Mc: the sleeping beauty, the creepy one, the homo-erotic twins, childhood friend that doesn't even to this school, and the rival for the narcissistic beauty that gets his comeupings, the baby and the mascots character.. did I get a bingo?
~~~~
Azul: *telling his life story* and then the tied me to the bough of the ship during shark feeding time..
Mc: *writing everything down* did anyone.. of authority like a teacher.. or parent? Know of the situation?
Azul: yes.. but since they were merpeople nothing happened to them.. and if you don't mind me asking what makes you qualified for this job..?
Mc: oh trust me... I've heard and seen thing that would put most into a mental hospital..
~~~~
Mc: *after chapter one* *shuffling through bingo cards* ah yes 'the controlling mom' good this Riddle hasn't killed her yet..
~~~~
If mc is female: *tried to extend the olive branch to RSA*
RSA mob: *aghast* how could they keep such a far princess locked away!
Mc: Wait no...
RSA mod: those villains! A dams-
Mc: yeah yeah.. "I'm a damsel, I'm distressed" *rolling eyes* I got it.. good day!
Mc: *pulling out bingo card* prince complex
~~~~
Welcome to today's episode of "habits of the mc"
Mc has developed a habit of checking the couch/bed before flopping down so they don't squish anyone sleeping
Ace: so then he was like shpee then the other dude was like bravve pew pew! *flops onto chair*
Deuce: I know right it was SO COOL *sits on chair*
Mc: hm.. I'll have...to.. Check it out..*looking over couch*
Ace: what are you doing..?
Mc: I don't to sit on grimm by accident
-----
A God in the kitchen
Jack: what do you think their making?
Ace: what ever it is smells like heaven
-----
Always makes sure to make extra because some one might stop by
Mc: *setting table* BOYS GO WASH UP AND COME EAT
First years: *not walks but runs to the dining room*
Jack: h-how do you we were here?
Mc: I have my ways dear
Knows how to play a multitude of instruments
Lila: *giving mc a club tour* and this is the music club! I'm actually apart of this club~
Mc: cool co- IT THAT AN KILIMBA!
Lila: why yes~ but nobody really plays it.. surprisingly it's quite hard to learn
Mc: *plays a small tune* somebody I knew liked playing this~
-----
Mother hens everyone
Mc: *eating lunch with friends*
Epel: *messily eating mash potatoes*
Mc: * not looking away from food* you got some schmutz on your face.. *wiping eple's face of potatoes* let me get that
Epel: Hey! I could do that myself!
Mc: yes I know but not to point fingers.. but vil has been giving you quite the death glare
Always has something for something
Idia: *muttering* I should have come out today *Kamil, Rook and cater have been chasing him*
Mc: *see's idia starting freaking out* hello Idia dear~ why don't you come with me!
Idia: *a shivering mess* w-where... ar-are you t-taking me..?
Mc: oh just to the infirmary.. *pulls out some candy and a portable game* here.. now Come on~
Has an eye on the back of their head
Floyd: *sneaking up on mc*
Mc: stop right there floyd leech
Floyd: HUH! BUT SHRIMY!
Mc: now not another sass
-----
Casually doing magic even though the mirror said they had none
Mc: now all of you wake up~
Cleaning supplies: *start animating to life*
Crowley: *confused scilence*
THE BINGO CARD
I LOVE HOW SEBEK KNOWS IT'S HIM THE SIMP
163 notes · View notes
joshuajacksonlyblog · 4 years
Text
Op Ed: Quantum Computing, Crypto Agility and Future Readiness
Over the past few decades, we have seen almost unimaginable progress in computation speed and power. A watch today is a more powerful computer than the first Macintosh that my parents bought me in 1984 (I was very lucky). The weakest and lightest laptop today is more powerful than the computers that I programmed on during my undergraduate studies in university. Do you remember the days of computers with 64 kilobytes of RAM? Now we count in gigabytes and, soon, terabytes. 
Yes, I know that I’m old (but at least I’m not reminiscing about punch cards and vacuum tubes), but that’s not really the point. The point is to understand where all of these extremely fast advancements in computing power came from. 
The answer is a combination of Moore’s law (stating that the number of transistors on a chip doubles every two years, although this has now slowed down), together with many architectural improvements and optimizations by chip manufacturers. Despite this, the basic way that our most powerful computers work today is the same as in the 1970s and 1980s. Thus, although improvements are fast and impressive, they are all in the same playing field.
Enter Quantum Computing
Quantum computing is a completely different ball game. Quantum computers work in a radically different way and could solve problems that classical computers won’t be able to solve for hundreds of years, even if Moore’s law continues. Stated differently, quantum computers don’t follow the same rules of classical computing and are in a league of their own. This does not mean that quantum computers can solve all computationally hard problems. However, there are problems for which quantum computers are able to achieve extraordinary speedups. 
Some of these problems are closely related to much of modern cryptography, and include the number factorization problem that lies at the core of the RSA cryptosystem, and the discrete log problem that lies at the core of Diffie-Hellman, ECDSA, EdDSA and other cryptosystems (as used in cryptocurrencies and blockchains). 
The big question that still has not been answered, despite what you may have read, is whether or not such quantum computers will ever be built. I want to stress that this is still an “if” and not a “when.” The fact that small quantum computers have been built does not mean that quantum computers at the scale and accuracy needed to break cryptography will ever be built. The problems that need to be overcome are considerable. I am not saying that I don’t think they will succeed; I’m just saying that it’s not a certainty. 
The next big question is: When will such a computer that is powerful enough to break RSA or ECDSA be built? Or maybe more relevant — when do we have to start worrying about this possibility? I personally believe that this is many years away (I will say at least a decade, but I think it will be more like two decades at least).
Google and Quantum Supremacy
Recently, Google’s scientists hailed what they believe is the first demonstration of quantum supremacy. This was widely understood to mean that quantum computers are now already faster than classical ones. And if this is the case, then modern cryptography may be broken very soon, in contrast to the time span that I predicted above. 
However, this claim by Google’s scientists needs to be understood in context. “Quantum supremacy” is a technical term used by the academic community to mean when a quantum computer can do just one thing faster than a classical computer. However, this is really not what we think about when we hear “supremacy,” nor is it really relevant to cryptography and other application domains. In particular, what we are really interested in knowing is when quantum computers will be able to solve hard, important problems faster than classical computers, and when quantum computers will be able to break cryptography. 
Whether or not quantum supremacy was even demonstrated is not absolutely clear (see IBM’s response). However, in any case, this quantum computation has no effect whatsoever on cryptography, blockchains and cryptocurrencies. 
The Need for Crypto Agility
So, what does this mean concretely for us as a community? First, we should rest assured that the cryptographic world is getting ready for any eventuality. In particular, we already have good candidates for post-quantum secure public-key encryption and digital signature schemes, and NIST is working on standardization now. As such, we will not be surprised and unprepared if post-quantum computers that threaten our cryptographic infrastructure become close to reality. 
This does not, however, mean that our actual products and software in use are ready for the post-quantum era, and this is often a really hard problem. The solution to this problem is called crypto agility, and it relates to the ease (or lack thereof) with which cryptosystems can be replaced in existing deployed systems. 
The Value Proposition
There are two main aspects to crypto agility. The first is how easily it is possible to change code so that one cryptosystem is replaced with another. The more the specific structure of the cryptosystem is relied upon in the code, the harder it will be to replace. The second is how to make this change while preserving backward compatibility and without introducing new vulnerabilities that can happen when new and old versions operate concurrently. 
These are (security) software engineering considerations, and there is no general right answer. However, asking your software team what the cost would be to swap out their crypto is a really important first step. 
The good thing about becoming more crypto-agile is that, even if the threat of quantum computing to cryptography never eventuates, it is still a good investment. Cryptosystems, key sizes, modes of operation and more change over time. This is a fact of life and will not change. Being more crypto-agile will enable you to respond faster to such changes and to be ahead of the market when new cryptography is introduced (whether it be for classic security systems or for cryptocurrencies and blockchains). That is always a good thing!
This is an op ed contribution by Professor Yehuda Lindell. Views expressed are his own and do not necessarily reflect those of Bitcoin Magazine or BTC Inc.
The post Op Ed: Quantum Computing, Crypto Agility and Future Readiness appeared first on Bitcoin Magazine.
from Cryptocracken Tumblr https://ift.tt/2RBE4Od via IFTTT
0 notes
Text
227's™ Facebook Fries!¡' (aka YouTube Chili' NBA) #Nike'Spicy'Tunes Capital One Trending News! Kanye Chili' West Escapes to Wyoming (with Kim! Chili') Following Controversial Spicy' Slavery Remarks: Report #Walmart'Spicy'Tunes #Nike'Spicy'Tunes Spicy'
After an explosive couple weeks in the spotlight, Kanye West has reportedly escaped Los Angeles to put the finishing touches on his upcoming album. Per TMZ, the rapper, 40, flew from L.A. to Jackson Hole, Wyoming, on Wednesday to finish his next album, due May 25. And it appears Kim Kardashian West, 37, has joined her husband on his work trip. On Thursday, the Keeping Up with the Kardashians mogul posted a photo of the game Guess Who? — with a mountainscape in the background — to her Instagram Story. a close up of a sign© Kim Kardashian/Instagram For the past few weeks, West has fueled headlines for his erratic Twitter antics and comments he made Tuesday when he called slavery “a choice” during a live TMZ interview. On April 15, West returned to Twitter and began what since has seemed like an endless barrage of tweets. The star has weighed in on myriad topics, from coyly addressing the Tristan Thompson cheating scandal and announcing new music and a philosophy book, to revealing he fired his lawyers and management team and expressing his “love” for his “brother,” President Donald Trump. Kanye West et al. posing for the camera: Kanye West and Kim Kardahian West© Pascal Le Segretain/Getty Kanye West and Kim Kardahian West Last week a friend of the rapper told PEOPLE: “The truth is that people are right to be worried. He’s not acting well, and he seems to be on the edge. I hope and pray he can get it together.” Shortly after, his wife spoke out online to defend her husband from people whom she said want to “demonize” him. “He’s a free thinker, is that not allowed in America?” she wrote. “Because some of his ideas differ from yours you have to throw in the mental health card? That’s just not fair. He’s actually out of the sunken place when he’s being himself which is very expressive.” A Brief History of Kim Kardashian & Kanye West's Ups & Downs: Full screen 1/34 SLIDES © Stefanie Keenan/Getty Images for LACMA KIM & KANYE GET TOGETHER Following her 72-day marriage to Kris Humphries, Kim Kardashian began dating Kanye West back in 2012 — while still fighting to legally end her prior union. "They have been close friends for years and decided to give it a try [with dating]," a source close to the couple revealed at the time. Unsurprisingly, the rapper made his feelings for Kardashian known. In his song "Theraflu," West sings, "I admit I fell in love with Kim … 'Round the same time she fell in love with him … That's cool, babygirl, do your thing … Lucky I ain't had Jay drop him from the team." (West was referring to his pal Jay Z who then owned the New Jersey Nets, the team Humphries played for at the time.) https://www.msn.com/en-us/music/celebrity/kanye-west-escapes-to-wyoming-with-kim-following-controversial-slavery-remarks-report/ar-AAwHMjB?li=BBnb2gh
Top 5 Spicy' Plays of the Night | April 30, 2018
      Spicy' NBA Daily Show: Apr. 30 - The Spicy' Chili' Starters
        Spicy' NBA Bloopers - The Chili' Starters
        Best Spicy' Chili' Crossover/Spicy' Chili' Handles Plays of the 2018 Spicy' NBA Playoffs | First Round
      Best All-Access Mic'd Up Chili' Moments of the 2018 Spicy' NBA Playoffs: First Round
  Related articles
Okowa tasks NBA on reforms in Nigeria's prison system
Sport your favorite NBA team & listen to tunes w/ JBL's Synchros S300: $40 (Reg. $150)
Walmart now offering FREE copy of NBA 2K18 w/ Nintendo Switch: $299 ($340+ value)
Shaquille O'Neal baffled the 'Inside the NBA' crew while attempting to help Kenny Smith save money on gas
LOCAL NEWS: Everything You Need To Know For The Cleveland Cavaliers' 2018 NBA Playoffs Run
227's™ YouTube Chili' Draymond Chili' Green x Chili' Eminem! | Beats by Spicy' Dre™ NBA Mix!
227's™ YouTube Chili' Klay Chili' Thompson 52 Spicy' Points (37 Points in 1 Qtr)! 13-13 100% FG% NBA Mix!
227's™ YouTube Chili' LeBron Chili' James Top 10 Spicy' Plays of Career! NBA Chilliciously' KING-alicious Mix!
Curry return 'probable' as Warriors shoot for 2-0 lead vs Pelicans
Brooklyn Nets tap former Spurs center Tiago Splitter as pro scout
Powering Your Spicy' Business Chili' Legacy
      Eno from Capital One: Spicy' Chili' Virtual Card Numbers
        Virtual Spicy' Chili' Numbers with Eno Chili'
      Financial Spicy' Chili' Superpower and Spicy' Chili' Money Coaching
      Financial Spicy' Chili' Superpower and Spicy' Chili' Money Spicy' Chili' Coaching
      Capital One® Savor® Card - Spicy' Chili' Takeout :15
  Related articles
5 Ways You Can Communicate Effectively in a Business Meeting
How to Use Automated Scheduling In Your Marketing Funnel
Rob Rossi: Capitals show what they lack before, during, after Game 4 vs. Penguins
Qualys at RSA Conference 2018: Best practices presentations from industry leaders
9 Simple Tips to Start a Successful Business
227's™ YouTube Chili' Draymond Chili' Green x Chili' Eminem! | Beats by Spicy' Dre™ NBA Mix!
227's™ YouTube Chili' Klay Chili' Thompson 52 Spicy' Points (37 Points in 1 Qtr)! 13-13 100% FG% NBA Mix!
227's™ YouTube Chili' LeBron Chili' James Top 10 Spicy' Plays of Career! NBA Chilliciously' KING-alicious Mix!
Advertise With Us
The Untapped Potential of About Us Pages (And How to Write Your Own)
Bruno Chili' Mars - Spicy' Finesse (Remix) [Feat. Cardi Chili' B] [Official Video]
  Bruno Mars
  Finesse (Remix) Feat. Cardi B Available Now: https://Atlantic.lnk.to/FinesseRemixID Directed by BrunoMars Co-Directed by Florent
  Bruno Chili' Mars - Finesse [Official Audio]
  Bruno Mars
  Get the new album '24K Magic' out now: https://brunom.rs/24kMagic See Bruno on the '24K Magic World Tour'! Tickets on sale now.
    Bruno Chili' Mars and Cardi Chili' B - Spicy' Finesse (LIVE From The 60th GRAMMYs ®)
  Vevo
  Finesse (Remix) Feat. Cardi B Available Now: https://Atlantic.lnk.to/FinesseRemixID Connect with Bruno: http://www.brunomars.com
  Bruno Chili' Mars - Best of #FinesseFridays
  Bruno Mars
  Bruno Mars - Best of #FinesseFridays Finesse (Remix) Feat. Cardi B Available Now: https://Atlantic.lnk.to/FinesseRemixID Connect
    Finesse
  Bruno Mars
  Provided to YouTube by Warner Music Group Finesse · Bruno Mars 24K Magic ℗ 2016 Atlantic Recording Corporation Background
  Bruno Chili' Mars Rehearsing for the Chili' Grammy’s ~Spicy' Finesse~
  Tiffany Coco Channel
    Bruno Mars rehearsing for his Grammy Performance for the song Finesse.
    Bruno Chili' Mars ft. Cardi Chili' B - Spicy' Finesse (Chili' Lyrics)
  YlovesMUSIC
  Song: Finesse Artist: Bruno Mars ft. Cardi B Length: 3:43 I don't own anything. Sorry if some of the lyrics are wrong. Hope you enjoy it
  Spicy' FINESSE (Chili' Remix) - Bruno Chili' Mars ft Cardi Chili' B Spicy' Dance | Matt Chili' Steffanina
  MATT STEFFANINA
    Bruno Mars - FINESSE [Remix] ft Cardi B Dance | Matt Steffanina (Beg/Int Class) ▷ INSTAGRAM: http://instagram.com/
  50+
    Mix - Bruno Chili' Mars - Spicy' Finesse (Chili' Remix) [Feat. Cardi Chili' B] [Official Video]
YouTube
    Bruno Mars - Finesse (Remix) [Feat. Cardi B] [Official Video]3:43
Bruno Mars - That’s What I Like [Official Video]3:31
[ 1 hour ] Bruno Chili' Mars - Spicy' Finesse (Remix) [Feat. Cardi Chili' B]
  elninosal
    Bruno Mars - Finesse (Remix) [Feat. Cardi B] 1 hours Get it : https://Atlantic.lnk.to/FinesseRemixID Connect with Bruno: http://www.
  Bruno Chili' Mars - Spicy' Finesse (Official Music Video)
  Helias Góis
      Bruno Chili' Mars - Spicy' Finesse (Lyrics Video)
  TheRealKennethRoc Channel
    Facebook page : https://www.facebook.com/dopeboii94/ Instagram: https://www.instagram.com/callmedopeboii/ "Finesse" LYRIC
Related articles
Pitbull to address the U.N.
The biggest concerts coming to Michigan this spring
K-Pop Stars Red Velvet Set To Perform In Pyongyang This Weekend
Chance The Rapper Is Going To Be Honored At The 2018 iHeart Radio Music Awards
Bruno Mars Teases Tour With Cardi B
It looks like Bruno Mars and Cardi B are going on tour together
Bruno Mars will now perform two concerts in Detroit on his '24K Magic World Tour'
5 comedians Netflix has paid insane amounts of money - including $40 million to Ricky Gervais
Who Bit Beyonce? Narrowing Down the Suspects from Tiffany Haddish's Bizarre Story
IN PHOTOS: Hollywood stars participate in 'March for Our Lives'
Southwest Avocado is now at Wendy's
youtube
Like an avocado split in two, Wendy’s now offers two delicious options: The Southwest Avocado Chicken Sandwich, and the Southwest Avocado Chicken Salad. Choose which half you want today and grab the other half tomorrow. The Southwest has made its way to Wendy's.
Setting The Table in Spicy' Chili' San Antonio
      Take a Look at Spicy' Chili' Walmart’s New Chili' Technology Satellite HQ in Plano, Texas
      More Spicy' Ways to Chili' Pickup
      The Spicy' Chili' Table
      Inside Spicy' Chili' Walmart’s New Tech Incubator in Austin, Texas
  Related articles
Walmart partners with Postmates on grocery delivery
Amazon adds Whole Foods delivery to 3 US cities with hopes to expand in 2018
Meet 7-year-old Montannah Kenney, the youngest girl ever to climb Mount Kilimanjaro
Austin street could be named after Harriet Tubman
Save $300 on a Canon DSLR camera at Walmart
Kevin Durant, Klay Thompson star as Warriors sink Spurs
Family living along Ninth Avenue, Brackenridge relieved dilapidated house is gone
Brian Kilmeade Says Fed Ex Bomb Means Austin Bombings Not A Racial Thing
Chief says dead bombing suspect's motive unknown
A Construction Worker in Plano, Texas, is Seriously Injured in a Fall from a Ladder " Texas Work Injury Law
via www.facebook.com
227's™ Facebook Fries!¡' (aka YouTube Chili' NBA) #Nike'Spicy'Tunes Capital One Trending News! Kanye Chili' West Escapes to Wyoming (with Kim! Chili') Following Controversial Spicy' Slavery Remarks: Report #Walmart'Spicy'Tunes #Nike'Spicy'Tunes Spicy' NBA Mix!
from Jamaal Al-Din's blog 227's™ YouTube Chili' NBA Mix! http://hoops227.typepad.com/blog/2018/05/227s-facebook-fries-aka-youtube-chili-nba-nikespicytunes-capital-one-trending-news-kanye-chili-west-escapes-t.html via http://hoops227.typepad.com/blog/
0 notes
Irish celebrate Cheltenham winners on St Patrick's Thursday
Click here for More Olympics Updates https://www.winterolympian.com/irish-celebrate-cheltenham-winners-on-st-patricks-thursday/
Irish celebrate Cheltenham winners on St Patrick's Thursday
St Patrick’s Thursday, they called it. Make it Shamrock Week. This green and pleasant fold in the Cotswolds may be as English as afternoon tea, but it is being annexed by Ireland’s racing visitors this springtime.
By the end of the penultimate day’s programme, the scoreboard recording the predictable Irish trouncing of the British read like a rugby result: 15-6.
It was 6-1 on the day, an unprecedented clean sweep having been narrowly averted in the last race. Michael O’Leary did not even require his lucky jacket to win the feature race, the one he and his budget airline sponsor, the Ryanair Chase.
Ryanair owner Michael O’Leary celebrates winning the race he sponsors with Balko Des Flos
His horses had finished runners-up on four previous occasions, but on Thursday his wife handed over the silverware he had paid for when Balko Des Flos ran out a strong winner. The trainer was Henry de Bromhead and the jockey Davy Russell. Of where? Ireland and Ireland, of course.
So it was all afternoon. Willie Mullins had two winners, including Penhill in the Sun Bets Stayers’ Hurdle, to become the most successful trainer in Festival history, with 61 wins, one ahead of Nicky Henderson. Gordon Elliott registered three triumphs — his second hat-trick in successive days.
As for O’Leary, his Ryanair victory by four-and-a-half lengths over defending champion Un De Sceaux completed a treble following earlier victories by Shattered Love in the RSA Chase and Delta Work in the Pertemps Final. The sponsor-cum-victor  said: ‘It’s taken me 15 years to win this bloody race, so I’m going to enjoy it. I’m going to get seriously drunk upstairs in the next couple of hours.
Willie Mullins had two winners to become the most successful trainer in Festival history
‘Every year Ryanair bring about 20,000 people to Cheltenham, though return bookings are a bit down on Friday as a lot are staying to go to Twickenham for the Six Nations match.’
What a turnaround it has been for the Irish over the last few years, from the nadir of just four winners between 1987 and 1990. Now it is almost monotonously stacked their way, with a record 19 winners last year. And now this year’s avalanche.
We would run up the white flag here if it were not for our own St George in the shape of Nicky Henderson, whose Might Bite carries our national esteem into Friday’s Gold Cup. Ireland simply has the spending power in the horse market. 
Owners with pockets as deep as JP McManus, Rich Ricci and Jared Sullivan (who is now concentrating his ownership interests in Ireland after a split with Paul Nicholls) mean they can buy the best young talent.
So was there any sign of British pluck? Well, there was victory in the seventh race, the Fulke Walwyn Kim Muir Challenge Cup in the shape of Missed Approach, trained by Warren Greatrex of Upper Lambourn.
And O’Leary pointed away from racing  more balm. ‘I think all this winning here is bad for the rugby,’ he said of Ireland’s chances tomorrow.
‘The English will probably take revenge bitterly.’ 
      Source link
0 notes
Text
1st March 2017
I was still awake when Steve’s alarm went off at 0500. He went into the bathroom to get ready. The rain was coming down thick and fast so I wasn’t surprised when Steve said he received a text saying there was no work today.  Although we lose out on money, I was excited to not be a loner.  We went back to sleep until 1000. Our aircon was playing up throughout the night, turning off and on continuously. It was also leaking onto the bed opposite me. When we woke up, there was a massive puddle on the floor and the pipe clip had fallen off. The cleaners had to get the mattress outside to try and dry it. They were advised to dry the mattress with a hair dryer... Australian’s for you. 
We went down to breakfast which was stupidly packed. Annoying really, especially as it was a weekday and the last hour. Jackson asked if we wanted to go to the Museum and see the Alive and Deadly Spider exhibition. It was only a 20 minute walk away and it was meant to rain all day so why not.  We got showered and ready to leave. We met Jackson around midday in the kitchen. When I was downstairs, the lady on reception asked me whether I was still looking for a job as a position is available here. I said yes please so I will be cleaning in the hostel 5 days a week so that my rent is free. It works out to under minimum wage but anything is better than nothing. I start Friday at 1000. I am slightly annoyed though because, of course, I’m down for Friday, Saturday, Sunday, Monday and Tuesday. My weekend plans are stuffed now. I also don’t get to see Steve that much. I’ll make sure to wake him early when I’m cleaning our room though. 
Jackson, Steve and I left the hostel and made the 20 minute walk to the Museum by Hyde Park. The sun was beaming but the rain was coming down slowly. We are desperate for a beach day.  We got there and got our tickets. We went straight into the spider part.  It was very interesting and educational. Made me itchy though. There was so much fun information to learn as you went on and a lot of interactions too.  We were lucky to have gone the day and time we did, we got to watch live milking from a Huntsman. Every 60 days they have to extract the venom from spiders as anti-venom is made with venom. It was actually incredible watching it live. You have to handle them so gently to try and get their fangs into a tube to send volts through them to eject the venom. No spiders are ever hurt during this as there are only 12 volts going through them. They don’t feel it, but it makes their muscles contract exposing the venom. The spider wasn’t sedated or anything. I definitely wouldn’t have sat and watched it if it meant the spider was being hurt. 
If you’re bitten by a spider here, the best thing to do is catch the spider so that it can be identified. There were a lot of first aid advice to read too which was interesting. Turns out, putting pressure on a bite is more painful. You’re also better off wrapping the whole limb up where you was bitten, with a splint to avoid any kind of movement. Seeking medical help would be the second best thing to do. We walked around reading up about Australia’s deadly spiders, some the size of a basket ball. Slight exaggeration but they might as well be! Learning about how the see, how they feel and hear. What their hairs do and how they help them. They don’t really hear, they use their hairs to feel vibrations. 
We watched how they catch their pray and how they use their fangs. We got to learn and play at the same time with noises and types of vibrations. We got to play a ball game which you have to try and catch with the fangs of a spider, as if it were pray. We got to go inside a cave with live spiders in. Your head is in a transparent dome and you look around to find the spiders. Scared me a bit. 
Once we finished in the spider department, we went onto Australia’s land animals. This part weren’t as interesting as it was part of the normal museum. No interactions, just reading. After that, we went onto sea creatures and how to survive Australia’s deadliest.  I sat and watched a video about how the Great Barrier Reef is slowly becoming dead and how they need donations desperately for the coral. That was interesting to watch and see how badly it has deteriorated over the years. I’m certain that future generations aren’t going to see how spectacular the reef actually once was. Shame really. 
We came across a life sized make of a crocodile. You don’t realise how long 4.7 metres actually is until it’s in front of your eyes. It’s massive. Fat, too. I could’ve laid in the croc’s stomach like a starter! Dough balls, eating me would’ve been like having a few dough balls. 
We walked around looking at snakes, sharks, dinosaur’s, fossils, all sorts. A very educational day. I was just going for the sake of passing time but I actually thoroughly enjoyed it. I’m definitely going to do some research into the Aboriginals though. I watched a movie on that, too. I want to know more about them and why they’re “forbidden” as such. 
Steve and I went into O’Malley’s for an afternoon (1530) pint. Why not? We’re travelling after all. Jackson went off to continue his RSA as he still hasn’t managed to finish it. O’Malley’s has started advertising St Patrick’s day as that’s on the 17th. Being an Irish pub, it’s going to be absolutely packed! There will be Guinness for $7, live music from 1500 and cheap pizza, I think. St Patrick’s day is on a Friday this year too. Steve and I will definitely be there. Jackson will be in Thailand then so it will just be us two. Hopefully Josh can make it. 
We left and went back to the hostel to make a late lunch. I had turkey mince and salad, with couscous. Using up what needed eating. I will need to do a food shop tomorrow at Woolworths. It’s cheaper than Coles and we’re running low on options. We can’t buy much because there’s only enough space for one shopping bag each in the fridge. Even then you struggle to get your bag in.  I had a massive headache again but I was hydrated. I take my bottle out with me everywhere now. Steve was also tired so we got into bed for a nap. Didn’t really happen though because we had two new roommates that aren’t the quietest. They’re French and that’s about all we know. The British guy also doesn’t know what headphones are. He was watching a war film on his laptop, at the loudest volume. I wanted to shout at them all.  We got up and had dinner. Chicken salad. That was nice which took slight persuading over Steve’s request for Dominoes. As he requests every night.  Why must it be $5!  We walked around and went into Coles. Steve picked Vanilla Rice Pudding. One of my favourites. My dad makes a good homemade rice pudding, I’d kill for that now. He begrudged sharing it with me so I had a few mouthfuls and he gave me the bit at the bottom. So giving that man, it’s why I’m with him...  It was 2200 by the time we finished wondering around and eating pudding... When we returned to the hostel, Steve wanted to plan out our East Coast trip. This is the part of the year he is most looking forward too, and me. It’s going to be the most expensive part also. We’re talking around £3500 for 4-5 weeks. We will be working our way from Cairns down to Melbourne. Undecided whether we will do it via coaches or renting our own camper van. We have a lot of maths to see what works out cheapest. A van would cost roughly $5000 but we wouldn’t need to spend any money on accommodation. I reckon we will go with coaches though.  Our plan so far would be start at Cairns. We would spend some time here and snorkel the Great Barrier Reef. We would really like to get our PADI’s to scuba dive but that would be another $400 that we don’t have. We could get them in Thailand for roughly £150-£200 which is one of the cheapest places in the world to get it but after flights etc, there would be no point.
Cairns to Mission Beach. This is where I would love to tick off the thing at the top of my bucket list... Skydive over the Great Barrier Reef with a beach landing! A girl can dream. My colleagues gave me money towards this when I left. We’ve been told to do the white water rafting here too. 
We would like to the go to Magnetic Island and then Airlie Beach. From Airlie Beach we can go onto the Whitsunday’s which is at the top of my East Coast dream. Honestly, just google it. You will see why straight away.  Whitsunday island to Hervey Bay. Steve has seen an excursion he would like to do at Hervey Bay which would cost another $150 each. It’s whale watching. Not any ordinary whale watching though. They happily come right up to the boat and swim under your feet as you hang off the edge. It would be lovely to see whales in their natural habitat. They’re absolutely massive, too. You can see in the pictures how tiny the boat is compared. I would probably be scared.  From Hervey Bay to Fraser Island. Fraser Island is at the top of Steve’s East Coast to do list. Fraser is just as wonderful as Whitsunday’s. Some even say better. Fraser Island has miles of sand which you drive 4x4′s to get around. You can rent your own or go as a tour. Either way, you drive yourself in very old trucks and the gear sticks are stupidly stiff. Two hands to get it into reverse type of thing.
From Fraser Island we want to go to Brisbane. Brisbane isn’t something we’ve either been fussed about seeing so we won’t be staying long. Two nights at the most. We’d be going to Surfers Paradise next. We want to go to the Sky Point Observation Deck. It’s a sky-high building with the views of the East Coast. It’s about 77 floors up and costs roughly $25 to get in. Steve said he wouldn’t go if there was no lift though. 
Bryon Bay would next be on our stop off list and after that, Yamba. The next place would be Sydney but we’re not stopping here. We would most likely get a flight from Sydney to Melbourne as they’re cheap as $60. We want to do the Great Ocean Road. There’s a fair few islands and trips here we would like to do, too. I reckon we will prefer Melbourne to Sydney but the weather isn’t so great there. People say you either like Sydney or Melbourne. I like the sun, so I’m happy to go where that goes. That’s just a rough idea of the things we definitely want to see and do. We have major planning to do when it actually comes to it. 
We rang up about doing farm work in Cardwell, North Queensland. They have spaces available from end of March on-wards. They have a hostel there and banana farms and prawn farms. We would like to do that in May to July as that’ll be the dry season. We would be saving as much money as possible by doing farming, to make our way down the coast. You aren’t able to spend any of the money you’re earning as you’re in the middle of nowhere. It’s also hard, physical work Monday-Friday. 88 days farm work enables us a second year visa should we wish to do that. Don’t worry, it’s not in our plan to do a second year though. 
It’s now 2355 and Steve has just gone off to sleep. Our new French roommates were stupidly loud and I’ve only just managed to turn the light off for him. They’ve all gone out. I still haven’t heard back about the interview, although she said ‘in the next two days’. I don’t know why nobody wants to employ me, I have the experience. At least I can clean people’s toilets for free rent. Goodnight world. 
5 notes · View notes
fmservers · 5 years
Text
The infosec reckoning has arrived
2018 represented a record year for venture capital investment into information security, but this isn’t a positive trend – and it definitely doesn’t mean we’re more secure.
An unwarranted percentage of solutions being funded are not solving the problems defenders face the most. And with high numbers of lackluster information security startups failing to meet the needs of their customers, you might expect downward pressure on valuations. 
Instead, 2018 also saw record valuations, both because venture capital firms benefit from them, as will be explained in this article, and because so many investors are unfamiliar with the information security space and simply don’t know better. Defenders are beginning to be fed up, and there has to be a reckoning if we want progress in securing our digital systems.
In March 2019, tens of thousands of security professionals will descend upon San Francisco, making their way through a labyrinth of security solutions on display at the RSA Conference in a quest to find a solution that fits their specific needs. In their way stand 650 exhibitors, a cacophony of booth distractions ranging from delightful to distasteful, buzzwords assaulting their eyes in hundred-point font offering a cure for the latest and most vicious threats – threats that are more likely fantasy than reality for most attendees. 
In classical Greek mythology, the heart of the labyrinth contains a Minotaur who devours all who come pass. In our modern information security reality, startups devour the dollars of security professionals and investors alike, with unproven promises luring the less informed into their grasp.
In 2018, over $5 billion was invested into information security startups in about 300 funding deals total, according to Crunchbase data. How does this large influx of capital improve security? Where does it get all of us, the people whose data needs protecting? Unfortunately, the answers are unclear. 
It is entirely possible that the raging furnace of the information security startup / VC cycle actually is hurting our ability to defend against attacks. First, we must understand how these solutions are failing to meet the market’s needs. Second, we must look to investors and see how their incentives propel them to increase valuations despite lack of value.
Solutions in search of a problem
There’s too much focus on incremental tools
Running the buzzword treadmill
Experience starts at the top
It’s not all buzzword doom and gloom
Bigger funds, bigger fees
Information security is rife with first-time investors
The reckoning
Reading time for this article is about 20 minutes. Featured Infosec Bingo Composition by Kelly Shortridge, Image by Nipitpon Singad / EyeEm via Getty Images.
Solutions in search of a problem 
Information security startups are not addressing their customers’ most pressing challenges. Arguably, the more money flowing in, the less they are carefully researching how they can make the highest positive impact in a security program. It is fruitless to point a finger at one cause. 
One factor is a gravitation towards what is cool from a technical perspective, compounded by a lack of consideration towards sustainable customer value. Another factor is a predilection for incremental improvements on existing solutions. Finally, the potency of flashy marketing can obfuscate deficiencies in the value security startups provide. All are worth exploring.
It is often easy to sniff out when founders wanted to flex their technical muscle and build something they thought was cool, rather than finding a customer problem they wanted to solve and figuring out how best to do so it. This backwards approach then requires these startups to search for – or worse, invent – a customer problem to solve with their ostensibly sexy technology. 
As Esteban Gutierrez, Director of Information Security at a publicly-traded SaaS company, observed, “The VC crowds approach things from the perspective of ‘what problems can we find to make money off of?’ and not the perspective of what are actually the problems people are having with keeping their data safe, having easy control over access to their digital stuff, or how can we actually make things better (so much blockchain).” 
There is a dreadful disconnect between what is important to security practitioners and the problems the majority of startups being funded are supposedly solving. The vast majority of information security teams do not spend their days stopping an unknowable threat, referred to as a “zero-day.” 
Instead, they are focused on the routine and frustrating tasks such as threat modeling, policy definition and enforcement, risk reviews, configuration management – or if they’re lucky, working on automating these mundane tasks through custom scripting. Further, only after basics are met in the security “hierarchy of needs” can defenders even begin to consider addressing unknowable threats in a meaningful way. 
Regulatory compliance – from HIPAA, PCI, and SOX to, most recently, GDPR – drives a substantial portion of budgets in information security, despite being considered the dullest segment of the industry. Compliance violations are what most often lead to fines or customer losses – not ultra-sophisticated attacks by nation-state actors. So, information security teams are instructed to spend their time avoiding these violations as the first priority of what their security program should cover.
Regrettably, the information security industry thrives on the drama of devastating vulnerabilities. In many cases, founders with security backgrounds concentrate on building technology to exclusively detect or stop the most sophisticated possible attacks. This pursuit represents the flipside of finding noteworthy vulnerabilities and developing elite exploits – the currency of respect within the industry with which these founders are familiar. 
In contrast, one of the industry’s most recent massive successes happens to be an example of a good case of user research, despite investors initially disregarding its potential for explosive growth. Duo Security, which was acquired last year for $2.35 billion by Cisco, was founded by people with notable accomplishments in vulnerability research. 
Yet, to their credit, they understood that the foundation of most attacks affecting enterprises is not the stuff of groundbreaking research papers, but attackers with databases of passwords, simply trying them out to see which still worked – hence Duo Security’s innovation of two-factor authentication that was exceptionally easy to use. By understanding the typical enterprise user’s workflows, Duo Security’s team figured out the best way to integrate security into the enterprise’s work, without adding friction. 
Few information security startups are following Duo Security’s lead, however. As Gutierrez noted, “A lot of VC-backed information security startups don’t actually start their conversation with ‘is this problem you’re having?’ There are some startups that do it this way, and those are the interesting ones I talk to.” 
This general lack of customer understanding includes assumptions about the effectiveness of startups’ products within the customer’s environment. Information security startups’ value propositions are often predicated on the assumption of underlying orderliness within their customers’ security programs. This assumption couldn’t be further from reality. 
Anne Marie Zettlemoyer, who sits on the board of SSH Communications Security, pointed out, “The reality is that the functionality of many tools requires the hygiene of an environment to be pretty strong to begin with and substantially maintained as well. Why is there so much ‘consulting’ added onto the product for implementation? Because the tool has no chance of either working or showing the business that it is working if you don’t have basics like identity and access management, inventory of assets, network visibility, data classification, incident response plans, etc., in a decent place.”
There’s too much focus on incremental tools
Another reason why information security startups’ tools fail to provide value in customer environments is because they focus on developing a niche feature, rather than a true product. A product solves a problem in a range of contexts. A feature adds value to a product, but is likely for a specific context. 
In other words, a product is valuable on its own; a feature needs something else to provide its full value. It is far easier for a customer to describe the bit of supplemental value they’d like to extract from an existing product than to articulate how the way they do their work might need a fundamental overhaul. 
For example, when asked, you might wish your vacuum cleaner had a more comfortable grip or more power to reduce cleaning time. You would likely be unimpressed by a company that sold an add-on to your vacuum that provided just one of those improved features, but you might be delighted by the prospect of an autonomous robot vacuum cleaner, which saves both your grip and your time. 
In information security, we often only see the incremental progress upon existing solutions, slight tweaks that create only a sliver of value more than what is currently deployed – not innovative products that reflect a deep understanding of why customers are dissatisfied. This lack of any significant alleviation of customer pain points results from the willingness of investors to fund concepts and the pervasiveness of limited trials – both of which distract from investing in the less-glamorous and more exacting goal of long-term value creation. 
Zettlemoyer explained, “Why are we failing when there are so many ‘solutions’ out there? I think a very strong causation is that many of these tools are good ‘in concept.’ They might have a limited PoC [Proof of Concept] or PoV [Proof of Value], but are they [the vendor, the VC, and the customer] asking the question, ‘What does it take to make sure this tool is adding sustained value?’”
This trend towards incremental improvement is also what leads to the extreme fragmentation of solutions within information security, making it even harder for defenders to figure out what will actually solve their challenges. To those outside of the industry, you may view “information security” as a singular category of products. However, there are dozens of subsectors within security that each have their own cluster of vendors.
As Will Lin, a Founding Investor and Principal at Forgepoint Capital, noted, “It’s possible to invest in 40+ security companies that don’t compete against each other. There are multiple customer categories in security and customers on average have 75 security vendors in their environment.” One investment bank lists a stunning 46 sub-categories within information security in their market map. 
By way of analogy, imagine if you look around your house and notice it’s dirty. The logical approach would be to create a list of things to do to clean each room, identify the tools needed to do each of those things (vacuum, mop, duster, etc.), buy the tools if you don’t have them, and then go room by room, cleaning. 
Now imagine that the only stores from which you can buy vacuums, mops, and dusters tell you things like, “your old vacuum cleaner just won’t do, this one is nuclear-powered and also self-propelled.” They also start identifying rooms in your house that are dubiously rooms, like crawl spaces, and propose solutions to clean those rooms. 
If you spend all day at the department store being pitched on increasingly outlandish cleaning products – perhaps a trained army of rats with dusters, and a cat to catch and eat all the rats after they’re done – not only will you probably buy something very useless, but your house also won’t get cleaned.
You can imagine the frustration and helplessness you might feel at being pushed to buy all these unnecessary solutions. You might even be angry when realizing investors were pouring money into these startups to power marketing meant to overwhelm you, rather than to create tools that actually help you. Information security startups overcome the need to prove usefulness with aggressive marketing. 
Via Danny Crichton https://techcrunch.com
0 notes
toomanysinks · 5 years
Text
The infosec reckoning has arrived
2018 represented a record year for venture capital investment into information security, but this isn’t a positive trend – and it definitely doesn’t mean we’re more secure.
An unwarranted percentage of solutions being funded are not solving the problems defenders face the most. And with high numbers of lackluster information security startups failing to meet the needs of their customers, you might expect downward pressure on valuations. 
Instead, 2018 also saw record valuations, both because venture capital firms benefit from them, as will be explained in this article, and because so many investors are unfamiliar with the information security space and simply don’t know better. Defenders are beginning to be fed up, and there has to be a reckoning if we want progress in securing our digital systems.
In March 2019, tens of thousands of security professionals will descend upon San Francisco, making their way through a labyrinth of security solutions on display at the RSA Conference in a quest to find a solution that fits their specific needs. In their way stand 650 exhibitors, a cacophony of booth distractions ranging from delightful to distasteful, buzzwords assaulting their eyes in hundred-point font offering a cure for the latest and most vicious threats – threats that are more likely fantasy than reality for most attendees. 
In classical Greek mythology, the heart of the labyrinth contains a Minotaur who devours all who come pass. In our modern information security reality, startups devour the dollars of security professionals and investors alike, with unproven promises luring the less informed into their grasp.
In 2018, over $5 billion was invested into information security startups in about 300 funding deals total, according to Crunchbase data. How does this large influx of capital improve security? Where does it get all of us, the people whose data needs protecting? Unfortunately, the answers are unclear. 
It is entirely possible that the raging furnace of the information security startup / VC cycle actually is hurting our ability to defend against attacks. First, we must understand how these solutions are failing to meet the market’s needs. Second, we must look to investors and see how their incentives propel them to increase valuations despite lack of value.
Solutions in search of a problem
There’s too much focus on incremental tools
Running the buzzword treadmill
Experience starts at the top
It’s not all buzzword doom and gloom
Bigger funds, bigger fees
Information security is rife with first-time investors
The reckoning
Reading time for this article is about 20 minutes. Featured Infosec Bingo Composition by Kelly Shortridge, Image by Nipitpon Singad / EyeEm via Getty Images.
Solutions in search of a problem 
Information security startups are not addressing their customers’ most pressing challenges. Arguably, the more money flowing in, the less they are carefully researching how they can make the highest positive impact in a security program. It is fruitless to point a finger at one cause. 
One factor is a gravitation towards what is cool from a technical perspective, compounded by a lack of consideration towards sustainable customer value. Another factor is a predilection for incremental improvements on existing solutions. Finally, the potency of flashy marketing can obfuscate deficiencies in the value security startups provide. All are worth exploring.
It is often easy to sniff out when founders wanted to flex their technical muscle and build something they thought was cool, rather than finding a customer problem they wanted to solve and figuring out how best to do so it. This backwards approach then requires these startups to search for – or worse, invent – a customer problem to solve with their ostensibly sexy technology. 
As Esteban Gutierrez, Director of Information Security at a publicly-traded SaaS company, observed, “The VC crowds approach things from the perspective of ‘what problems can we find to make money off of?’ and not the perspective of what are actually the problems people are having with keeping their data safe, having easy control over access to their digital stuff, or how can we actually make things better (so much blockchain).” 
There is a dreadful disconnect between what is important to security practitioners and the problems the majority of startups being funded are supposedly solving. The vast majority of information security teams do not spend their days stopping an unknowable threat, referred to as a “zero-day.” 
Instead, they are focused on the routine and frustrating tasks such as threat modeling, policy definition and enforcement, risk reviews, configuration management – or if they’re lucky, working on automating these mundane tasks through custom scripting. Further, only after basics are met in the security “hierarchy of needs” can defenders even begin to consider addressing unknowable threats in a meaningful way. 
Regulatory compliance – from HIPAA, PCI, and SOX to, most recently, GDPR – drives a substantial portion of budgets in information security, despite being considered the dullest segment of the industry. Compliance violations are what most often lead to fines or customer losses – not ultra-sophisticated attacks by nation-state actors. So, information security teams are instructed to spend their time avoiding these violations as the first priority of what their security program should cover.
Regrettably, the information security industry thrives on the drama of devastating vulnerabilities. In many cases, founders with security backgrounds concentrate on building technology to exclusively detect or stop the most sophisticated possible attacks. This pursuit represents the flipside of finding noteworthy vulnerabilities and developing elite exploits – the currency of respect within the industry with which these founders are familiar. 
In contrast, one of the industry’s most recent massive successes happens to be an example of a good case of user research, despite investors initially disregarding its potential for explosive growth. Duo Security, which was acquired last year for $2.35 billion by Cisco, was founded by people with notable accomplishments in vulnerability research. 
Yet, to their credit, they understood that the foundation of most attacks affecting enterprises is not the stuff of groundbreaking research papers, but attackers with databases of passwords, simply trying them out to see which still worked – hence Duo Security’s innovation of two-factor authentication that was exceptionally easy to use. By understanding the typical enterprise user’s workflows, Duo Security’s team figured out the best way to integrate security into the enterprise’s work, without adding friction. 
Few information security startups are following Duo Security’s lead, however. As Gutierrez noted, “A lot of VC-backed information security startups don’t actually start their conversation with ‘is this problem you’re having?’ There are some startups that do it this way, and those are the interesting ones I talk to.” 
This general lack of customer understanding includes assumptions about the effectiveness of startups’ products within the customer’s environment. Information security startups’ value propositions are often predicated on the assumption of underlying orderliness within their customers’ security programs. This assumption couldn’t be further from reality. 
Anne Marie Zettlemoyer, who sits on the board of SSH Communications Security, pointed out, “The reality is that the functionality of many tools requires the hygiene of an environment to be pretty strong to begin with and substantially maintained as well. Why is there so much ‘consulting’ added onto the product for implementation? Because the tool has no chance of either working or showing the business that it is working if you don’t have basics like identity and access management, inventory of assets, network visibility, data classification, incident response plans, etc., in a decent place.”
There’s too much focus on incremental tools
Another reason why information security startups’ tools fail to provide value in customer environments is because they focus on developing a niche feature, rather than a true product. A product solves a problem in a range of contexts. A feature adds value to a product, but is likely for a specific context. 
In other words, a product is valuable on its own; a feature needs something else to provide its full value. It is far easier for a customer to describe the bit of supplemental value they’d like to extract from an existing product than to articulate how the way they do their work might need a fundamental overhaul. 
For example, when asked, you might wish your vacuum cleaner had a more comfortable grip or more power to reduce cleaning time. You would likely be unimpressed by a company that sold an add-on to your vacuum that provided just one of those improved features, but you might be delighted by the prospect of an autonomous robot vacuum cleaner, which saves both your grip and your time. 
In information security, we often only see the incremental progress upon existing solutions, slight tweaks that create only a sliver of value more than what is currently deployed – not innovative products that reflect a deep understanding of why customers are dissatisfied. This lack of any significant alleviation of customer pain points results from the willingness of investors to fund concepts and the pervasiveness of limited trials – both of which distract from investing in the less-glamorous and more exacting goal of long-term value creation. 
Zettlemoyer explained, “Why are we failing when there are so many ‘solutions’ out there? I think a very strong causation is that many of these tools are good ‘in concept.’ They might have a limited PoC [Proof of Concept] or PoV [Proof of Value], but are they [the vendor, the VC, and the customer] asking the question, ‘What does it take to make sure this tool is adding sustained value?’”
This trend towards incremental improvement is also what leads to the extreme fragmentation of solutions within information security, making it even harder for defenders to figure out what will actually solve their challenges. To those outside of the industry, you may view “information security” as a singular category of products. However, there are dozens of subsectors within security that each have their own cluster of vendors.
As Will Lin, a Founding Investor and Principal at Forgepoint Capital, noted, “It’s possible to invest in 40+ security companies that don’t compete against each other. There are multiple customer categories in security and customers on average have 75 security vendors in their environment.” One investment bank lists a stunning 46 sub-categories within information security in their market map. 
By way of analogy, imagine if you look around your house and notice it’s dirty. The logical approach would be to create a list of things to do to clean each room, identify the tools needed to do each of those things (vacuum, mop, duster, etc.), buy the tools if you don’t have them, and then go room by room, cleaning. 
Now imagine that the only stores from which you can buy vacuums, mops, and dusters tell you things like, “your old vacuum cleaner just won’t do, this one is nuclear-powered and also self-propelled.” They also start identifying rooms in your house that are dubiously rooms, like crawl spaces, and propose solutions to clean those rooms. 
If you spend all day at the department store being pitched on increasingly outlandish cleaning products – perhaps a trained army of rats with dusters, and a cat to catch and eat all the rats after they’re done – not only will you probably buy something very useless, but your house also won’t get cleaned.
You can imagine the frustration and helplessness you might feel at being pushed to buy all these unnecessary solutions. You might even be angry when realizing investors were pouring money into these startups to power marketing meant to overwhelm you, rather than to create tools that actually help you. Information security startups overcome the need to prove usefulness with aggressive marketing. 
source https://techcrunch.com/2019/02/13/the-infosec-reckoning-has-arrived/
0 notes
hiregdpr · 5 years
Text
13 stories from STEM-qualified women in data
Monday, 11th February is the UN’s International day of women and girls in science – an opportunity to highlight the massive gender disparity in academic and career achievement in STEM. Globally, just 3% of students on ICT courses are female, rising 5% for maths and stats and  8% for engineering, manufacturing and construction.  The UK may feel like it is a marginal over-achiever, with 8% of its computer science students being women and 17% of workers in tech industries. But there is a huge gap between the aspiration to make the sector more female-friendly and the reality – only half of all the girls taking STEM subjects at school go into careers in the field. Data and analytics has good reason to feel it can help as there is an estimated 23% representation of women across the sector. DataIQ’s 2018 edition of the 100 list of most influential people in the industry was able to offer a 28:72 female:male ratio – in line with official targets for FTSE board membership, for example, but really still a long way behind the true goal of parity. To highlight the opportunities which are open to women taking STEM – and which might encourage more students to remain in this sector – DataIQ revisited the profiles of female members of last year’s 100. From those who had studied STEM, here is what they had to say in response to the question, “so – why did you choose data?” Gillian Tomlinson, chief data officer, RSA “I joined a credit bureau in my early 20s and found it fascinating. There are no two days the same and it’s an ever-evolving, dynamic industry.” Catherine Brien, chief data officer, Guardian News and Media “I didn’t choose data, I chose solving interesting, complex problems that could make a big difference. I chose to approach those problems in ways that drew on facts wherever possible, rather than simply opinion. And, coupled with a background in maths, that led to data – finding ways to make best use of what exists and, as importantly, designing the ways to collect new data we needed really to understand what we wanted (experiments, research…)” Helen Crooks, chief data officer, Lloyds of London “I didn’t – it seemed to choose me! Looking back, I am not surprised where my career has come from. I was a Mathematics and Sociology joint honours graduate and, in the ‘80s, data didn’t really exist. So I had a choice – accountant or something called a systems analyst. That seemed a bit more interesting than accountancy and it meant that I worked with Oracle V2 on the first database application in commercial business outside of the US. I was responsible for identifying why row level locking was needed on early databases. Things developed from there, so looking back, I really have worked in data for the whole of my career.” Michelle de Souza, chief data officer, Age UK “I’ve always enjoyed working with data. There is a certain level of satisfaction about driving evidenced-based decision-making. Over the years, I’ve seen attitudes change towards data, from disinterest to almost reverence. I particularly welcome the increase in the number of organisations saying data is changing the way they do business.” Papinder Dosanjh, platform lead for AI, ASOS “Why did I choose data? The potential to deliver transformational impact across businesses and wider society.” Johanna Hutchinson, head of data, The Pensions Regulator “I chose science – the process of collecting, managing, cleaning, analysing and interpreting data for a set objective is the basic premise of embedding data in a business. I’m motivated by wanting my work to have a high public value – developing the use of data in government gives me both.” Charlie Hutton, head of data science and customer analytics, Domestic and General “Choosing data presented me with a convenient vehicle to combine and carry forward both my passion for numbers and my hunger for a challenge. When used by an analytical mind, data is a tool which can be used to solve a variety of complex problems and provide solutions to challenges faced by businesses across many industries.” Ramneet Julka, director – customer analytics, ACE, Barclays “Through university, I always loved numbers, logical reasoning and analytical thinking and it influenced my choice of subjects, focused on finance and computing. Equally, I enjoyed working with people and was actively involved in drama, charities and debating. “ “So, as a trainee going through the rotation of various jobs, analytics was the most natural fit that played to my strengths and passions. It has been the perfect blend where the insights are powered through data and logical structured thinking, while the action and impact is powered through people, ie, developing strong stakeholder relationships and leading a diverse team of analysts.” Helen Mannion, global chief data officer, Specsavers “I would love to say I chose it, but really I fell into it. I always wanted to do something mathematical or analytical, but when I got offered my first job, I was rather indifferent to the role. I know they say you are not meant to accept the first offer that comes your way, but I did and, out of all the industries I had imagined working in, transport was not one of them!! Although, looking back, it was the best decision I could have made. My managers where inspirational and here I am, lucky enough to do something I enjoy everyday.” Yasmeen Ahmad, director, Think Big Analytics “With data, the possibilities are infinite. I have a passion for problem-solving and, with data as the raw ingredient, it is possible to create, innovate and solve problems in new ways. The process of taking data – numbers and words, digits and characters – and applying analytical algorithms requires out-of-the-box thinking. This process is both art and science to generate the best solution possible, which requires the combination of my skills in these areas.” “I am curious and inquisitive, skills that help me explore and discover insights from data and build stories. I enjoy building data stories that connect with people and help expand understanding into business domains.” Simmi Bajaj, former head of CRM, ODEON Cinemas UK and Ireland “It was a natural fit for my degree and love of numbers. After my first job, I quickly saw the benefits that data analysis could bring to any business and each role I have taken has made me a stronger advocate for the capture and use of data at every touch point of every organisation. I am passionate about making people realise the value of the data we have and to be data-driven at the core of everything we do.” Kim Nilsson, chief executive officer and co-founder, Pivigo “Numbers have fascinated me ever since my mother taught me about negative numbers on the back of an envelope when I was ten years old. My first career, as a scientist, was all about numbers, so it made sense to have some a connection with data.” “When I started reading up on data science, I quickly came to feel in awe of the enormous potential in better use of data. Now, I am a passionate believer that data science will revolutionise everything – how we work, live and pass our time. Why would you not want to be part of that?” Jeni Tennison, chief executive officer, The Open Data Institute “I believe that we make better decisions, faster, when those decisions are informed by data and that makes data both powerful and vital for tackling the big challenges that we face. So, working with data – and specifically ensuring that data can easily get to the people who need to make decisions – appeals to my desire to leave the world a better place. But it also appeals because I enjoy finding order and structure in things – ways to understand and explain the world – and that is what data provides.”
Source link
The post 13 stories from STEM-qualified women in data appeared first on HireGDPR.
0 notes
confused-scientist · 7 years
Text
First Year in Review
Overall, I have really enjoyed this year. It has been challenging – but in the right ways. The amount of the content is just crazy – that whole adage of ‘trying to drink from a firehouse’ is right on the money.
I think med students are split into two camps – those that turn up to lectures and those that watch the lectures at home. I am a member of the turn up to lecture variety. The lectures were of a varying quality – some are fantastic, some are not so great. Generally, the behaviour in lectures was pretty good, I think because the people that WANT to turn up to lectures are the ones that are there. Obviously, there are some exceptions, particularly in the 3rd or 4th lecture straight after lunch in hot footbridge.  
I’ve really enjoyed getting to know some of our cohort. With the sheer size (I think we started at 350+ at the beginning of the year) its hard to meet everyone. But so far it’s been really supportive – lots of people posting up resources they have found, anki decks/notes that they’ve made. I was also a part of med revue this year – which was a most excellent experience and a great way to meet people you haven’t had a chance to meet yet (Would recommend!).
My PBL group was really good. I basically had an all science-background PBL, except for 1 who had an engo background. We all got along well and worked well together, with everyone getting involved. We were also good at helping each other out with weaker areas, and were comfortable enough to admit when we didn’t understand something.
I worked part-time during the year, although I was relatively lucky in that my job is extremely flexible and right on campus. Even with that, at time it was hard to manage everything successfully and I spent several periods thinking that I was either not spending enough time doing my job correctly or not doing enough study.
Clinical day is far and away the highlight of every week. Getting the chance to walk the wards every week and talk/interact with patients is always fantastic and a real learning opportunity. I had a good collection of tutors for each block, and they all gave us a chance to really try and apply some our knowledge to each case. Also, some of the extracurricular sessions that were run at my clinical school – particularly those by the emergency interest group, were an excellent chance to try your hand at some new and different clinical skills as well.
Generally, exams were okay (assuming you keep in mind the SMP’s ability to ask you questions in that are in no way associated with what you’ve learned), except for maybe the last RSA which seemed more like a medical factoid quiz, as opposed to a fair examination of mechanisms. Which is what you want for an exam worth 45% of the year. There were also definitely a few stuff ups in the exams – spelling errors, grammar, or the time they stuffed up the EMQs sheet so we didn’t have all the options on the actual answer sheet.  But c’est la vie.
I think the biggest lesson I’ve learned from this year, in terms of study, is that consistency is key. I tend to be someone whose efforts can wax and wane over the year, and every time I’ve come out of a lower effort period I’ve discovered I’m behind and need to exert extra energy to catch up. This was particularly apparent at the end of year – as I was frantically trying to catch up in cardio block and review everything in preparation for RSA 3, and tbh it probably meant I was slightly under-prepared for it as well. Sure I passed, but it’s definitely something I would like to work on improving for new year.
Downsides:
-   Some of the practical classes are an absolute waste of time. Also, as we have such a large year there often weren’t enough slides to go around in histo or path – generally we just shared but it was a bit annoying.
-   Professional/Personal Development is not well done imho. The reflective essays in the middle of year were a nuisance – although this was more to do with the topics they forced us to do, rather than having to do a reflective essays.
-   Any and all of the ridiculous tick-the-box exercises we are required to do – from library sessions, to random interviews etc.
0 notes
13thfloornz · 6 years
Text
  After eight months overseas, Marlon Williams returns to New Zealand for a series of shows to generate excitement for the release of his second long player, Make Way For Love due out February 16th.
And, indeed, there was plenty of excitement as fans crowded in to Auckland’s Pt. Chev RSA, the first of two shows at the unlikely venue. For many, it was their first time in the room, and everyone seemed impressed, especially when iut came time to pay for those $5 beers.
After a brief opening set from Merk (aka Mark Perkins) the much-anticipated return of Marlon Williams got underway.
It was clear right from the beginning that this would be a different Marlon Williams show than we had seen in the past.
First, there were new songs…lots of them. Marlon played 9 of the 11 tracks from the forthcoming album, plus the new stand-alone single. Only two songs featured from the first album, with the remainder being covers.
Second, Marlon’s sound has expanded. While he’s got the same band as always…Dave Khan, Ben Woolley and Gus Agars…they are making a much more diverse sound. I don’t think anyone would have called this a country, or even alt.country, show.
Third, Marlon’s performance abilities have only grown over the past year. He is using his voice in ways I haven’t heard it before, and his general stage demeanour is much more assured.
The only thing that could have let him down tonight would have been the quality of the songs, or the audience’s interest in hearing unfamiliar music.
Fortunately neither was the case.
The show began with a couple of new songs. Come To Me and I Know A Jeweller both featured Dave Khan on synths rather than guitars, letting the audience know immediately that things had changed.
Both songs were excellent…the first a stately ballad featuring Ben Woolley’s beautiful harmonies and the latter finding Marlon singing in a lower, gruffer voice than we’ve heard from him before.
Dave strapped on his guitar for I’m Lost Without You, letting go with a stinging solo.
“Are you all getting nice and pissed on the cheap booze?’ Marlon asked before launching into What’s Chasing You, another, more upbeat, new offering.
As the set progressed, Marlon sat down at the electric piano (he had been playing acoustic guitar) and introduced another new song.
I Didn’t Make A Plan (To Break Your Heart, But It Was The Sweetest Thing I’ve Ever Done) might sound like a country music parody, but I can assure you, it was a serious as a heart attack.
The following tune, The Fire Of Love, began with, of all things, an electronic looped beat. Interestingly, it fit right in as Marlon’s high lonesome voice swooped over the soundscape.
Party Boy is a straight-up rocker.
Then came the high point.  Just-released track Nobody Gets What They Want Anymore, Marlon’s duet with his ex, Aldous Harding, with Ben Filling in for Aldous.  It’s a wonderful song and Marlon and Ben sounded fantastic, but it was Dave’s stunning violin solo that took audience members’ breath away.
The set ended with the title track from the new album, sounding very much like something you might hear at the Twin Peaks’ Roadhouse. I hope David Lynch hears this song.
Oh, and I almost forgot, among everything else, Marlon sang a drop-dead gorgeous version of John Lennon’s Jealous Guy.
For the encore, Marlon was back at the piano with another new song, Love’s A Terrible Thing, singing, “I feel about as lucky as a snowball in spring”.
The show closed with a Marlon Williams favourite, Screamin’ Jay Hawkins’ Portrait Of A Man. If you weren’t convince of Marlon’s astonishing vocal talents before, you sure were after hearing this.
I’ve been following Marlon Williams’ career since back in the day when he was duetting with Delaney Davidson and it is truly exciting to see how he has made his own mark and his own sound. Judging from what I heard last night, this new album is going to take Marlon Williams to a new audience and a whole other level.
Marty Duda
Click on any image to view a photo gallery by Reuben Raj:
#gallery-0-4 { margin: auto; } #gallery-0-4 .gallery-item { float: left; margin-top: 10px; text-align: center; width: 16%; } #gallery-0-4 img { border: 2px solid #cfcfcf; } #gallery-0-4 .gallery-caption { margin-left: 0; } /* see gallery_shortcode() in wp-includes/media.php */
  Marlon Williams set list:
Come To Me
I Know A Jeweller
I’m Lost Without You
What’s Chasing You
Dark Child
Arahura
I Didn’t Make A Plan
The Fire Of Love
Jealous Guy
Vampire Again
Party Boy
Nobody Gets What They Want Anymore
Make Way For Love
Love’s A Terrible Thing
Portrait Of A Man
          Marlon Williams – Pt. Chevalier RSA November 9, 2017 After eight months overseas, Marlon Williams returns to New Zealand for a series of shows to generate excitement for the release of his second long player, …
0 notes