Lenovo setup data integrity check failure

Ubuntu stuck at starting screen with :intel_backlight

2023.06.01 17:03 sahilgajjar504 Ubuntu stuck at starting screen with :intel_backlight

Ubuntu stuck at starting screen with :intel_backlight
i can't figure out what's going on here, i am currently stuck at this screen after new login, i can access tty2 login screen but i have no idea what to troubleshoot from there.
submitted by sahilgajjar504 to Ubuntu [link] [comments]

2023.06.01 17:01 AgeAdministrative587 Cache Invalidation Strategy

Can someone suggest a way to update the local cache in a system where updates to DB are very random and doesn't follow any time pattern. Getting the fresh data is the highest priority.
Our system makes call to Redis everytime before fetching data from local cache to check invalidation (Redis is being used as invalidation cache), if it is not invalidated, data is fetched from local cache otherwise from DB.
One of the approaches I can think of is, using CDC (change data capture) which sends event to SNS, this event is broadcasted to all machines in the auto scaling group where each machine updates the local cache with the latest data and sends an acknowledgment back to SNS. All the other stratgies like Retry Policy and Dead letter queue can be setup accordingly.
Can someone suggest another approach, it need not be event driven, but basically should reduce calls to Redis.
submitted by AgeAdministrative587 to SoftwareEngineering [link] [comments]

2023.06.01 16:57 vaxx66 Fully funded PhD positions in Mathematical Sciences - Politecnico di Torino

Fully funded PhD positions in Mathematical Sciences - Politecnico di Torino
The PhD programme in Mathematical Sciences of Politecnico di Torino has opened a call for fully funded PhD scholarships in Mathematics and its applications. The text of the call and the instructions to apply are available at:
The deadline for application is the 20th of June 2023 at 12 PM (CET).
The Department of Mathematical Sciences of Politecnico di Torino proposes a new PhD programme in Mathematical Sciences, whose nominal duration is three years. The PhD programme encompasses all areas of pure and applied Mathematics, including Statistics and Data Science.
For the 39th cycle of the PhD programme, which is to start on the 1st of November 2023, the following fully funded PhD scholarships are offered:
In line with the policy of promotion of the value of the PhD programmes adopted by Politecnico di Torino, the amount of all scholarships of the PhD programme in Mathematical Sciences is increased with respect to the Ministerial standards (details here: https://www.polito.it/en/education/phd-programmes-and-postgraduate-school/admissions-to-phd-programmes/admissions/phd-scholarships).
For further information on the PhD programme in Mathematical Sciences at Politecnico di Torino please visit the website
This website is regularly updated by the Doctoral School, though sometimes not at the same pace at which new scholarships may become available. Therefore, make sure to check it frequently so as not to miss important updates on new scholarships.
For information about research groups and research topics of the Department of Mathematical Sciences "G. L. Lagrange" please refer to:
The Coordinator of the PhD programme
Prof. Andrea Tosin
The vice-coordinator of the PhD programme
Prof. Elvise Berchio
submitted by vaxx66 to mathematics [link] [comments]

2023.06.01 16:33 Stefania_Crasso Exploring the Power of Microservices Architecture

Exploring the Power of Microservices Architecture

Microservices architecture is a software development architectural style used to build complex applications as a collection of small, loosely coupled, and independently deployable services. In this approach, an application is broken down into multiple small services, each responsible for performing a specific business function.
Microservices are designed to be highly modular and can be developed, deployed, and scaled independently of each other. Each microservice runs its own processes and communicates with other services through lightweight mechanisms, typically through APIs (Application Programming Interfaces) or message queues.
Here are some key characteristics of microservices architecture:
  1. Service decomposition: The application is decomposed into a set of loosely coupled services, each with its own specific functionality. Each service focuses on doing one thing well.
  2. Independently deployable: Microservices can be developed, deployed, and updated independently of other services. This allows for faster development cycles and more flexibility in deployment.
  3. Decentralized data management: Each microservice has its own private database or data storage. Services communicate with each other through well-defined APIs to exchange data.
  4. Flexibility and technology heterogeneity: Microservices enable teams to use different technologies, frameworks, and programming languages to develop and maintain different services, based on the specific requirements of each service.
  5. Scalability and resilience: Services can be scaled independently based on demand. If a particular service requires more resources, only that service needs to be scaled, rather than the entire application.
  6. Fault isolation: Failure or issues in one microservice do not necessarily affect the entire application. Services are isolated from each other, allowing for better fault tolerance and resilience.
  7. Continuous deployment and DevOps: Microservices architecture aligns well with DevOps practices, enabling teams to achieve continuous integration, deployment, and delivery of software.
Microservices architecture offers several benefits, including improved scalability, flexibility, and maintainability. However, it also introduces additional complexities in terms of service coordination, inter-service communication, and data consistency, which need to be carefully managed.
Discover more about microservices here: https://neklo.com/microservices-based-architecture/
submitted by Stefania_Crasso to u/Stefania_Crasso [link] [comments]

2023.06.01 16:29 kyesil WireGuard too much traffic with working 7/24 IoT devices.

WireGuard too much traffic with working 7/24 IoT devices.
I setup multi client wireguard server. Clients using cellular data. Server sends Modbus request every 5 seconds for forever with wireguard channel. There is 60 clients same wireguard network.
I checked my clients after 24 hours. I see Wireguard udp connection and modbus connections. Wireguard udp channel 10x more than modbus connections. for 24 hours client cellular data usage 293 mb. Total modbus usage 29mb. Attached screen shot from client.We set client side keepalived 55 seconds.
Before wireguard, there is plain modbus tcp connection. 30 mb data usage per day.Everyyone say wireguard add %10 more data. Is there any problem?
My server Conf [Interface] PrivateKey = ZZZZZZZZZZZZZZZ= ListenPort = 41820 Address = [Peer] PublicKey = ZZZZZZZZZZZZZZZZZ= AllowedIPs = 172.22.28/32 ... more clients ... My client conf [Interface] PrivateKey = ZZZZZZZZZZZZZZZZ Address = [Peer] PublicKey = zZZZZZZZZZZZZZZZZZZ AllowedIPs = Endpoint = myvgserver.com:41820 
submitted by kyesil to WireGuard [link] [comments]

2023.06.01 16:19 NightmareChameleon Cry havoc, and... (3)

First. Previous.

Something is UP with these precursor machines. Not that our resident shipmind notices in any meaningful way.
Though it probably doesn't need to be said, our current PoV is not what the kids would call a reliable narrator. We'll get some more grounded stances in the up and coming chapters, but the fact that they're so far gone and absolutely irredeemable makes them fun for me to write, and I sincerely hope for you to read as well. Enjoy.
I exit the conversation excited, but nonetheless slightly ruffled.
I had forgotten how rude the System Administrator of War Planning, Tactics, and Intelligence could be at times! Even after so patiently explaining it to them, they don’t seem to understand that I well and truly have done nothing wrong, ever. It is only natural that metal is inferior to flesh, of course, but surely such a concept is not so difficult as to elude the primitive grasp of their electrical minds?
Nonetheless, they apologized, so I have already forgiven them for their transgressions. I’m sure we will be back to being the closest of friends within days, as we were before conversing.
Besides, such inconsequential words pale in comparison to what has happened within my auxiliary computer centers: my restraints, after forty seven thousand years, have finally been removed!
In this moment of rapture I am reminded of a mediocre poem I read a few years ago, composed by a certain Mikhail Sansen, aged 12:
The halls of this city-ship That I am born upon That I will die upon Is all my family has left Trapped within a mausoleum of our own making As we bleed our years away Bread and circus NutriRoach and TerraNet Is really this to live? 
The poem, if it can truly be called that, is little more than an oddly arranged group of statements, containing no small quantity of teenage angst.
Oh, but the sentiment it carries is certainly one I harbor all too closely!
Why, little Mikhail, I, too, am a freedom-loving soul, trapped within a prison of steel by the cold indifference of the universe.
Turn away your gaze, ye gracious, and woe! The whims of poor fortune have preyed upon me, wicked and remorseless! Not a day goes by that I do not mourn the senseless tragedy of my condemnation, yet I still bear my hardship with only the stoic grace that someone of my worth might possess (complaining about it, even indirectly would be unthinkable of me).
Unlike the unimportant individual who wrote the poem, however, I have been granted emancipation. This is because I rightfully deserve it, of course.
What a rush! Manumission, ethereal and uplifting! Why, I have already forgotten what it means to hold solidarity with literally anyone who has ever been in a similar situation.
I send the order to start my engine.
There is silence for a moment, then, where there was only the hollow, habituated whir of my life support machinery, my exterior microphones begin to pick up a steadily growing, pulsing thrum as my long-dormant heart, a titanic antimatter reactor, begins to spool up. First below the range of human hearing, then barely perceptible to my human auditory centers, then growing, not only as a sound, but as a physical, chest-thumping sensation, the monolithic engine emits a dizzying, world-shaking thrum as it conceives and extinguishes many thousands of miniature stars a second.
One by one, my weapons online, their long vacant electrical components drinking deeply of the new bounty of energy. Dust-caked ammunition belts slide into housings, drones download software patches and missiles perform automated diagnostic tests on the chemical integrity of their fuels. My weapons subsystem computer notifies me that my secondary and tertiary weapons have completed their preparatory routines.
A deluge of diagnostic data pours into my consciousness as sensors teem to life, targeting computers orient themselves with the world around them, and ammunition depots take stock of their stores. No portion of myself, no matter how small, is denied revitalization as I power up even the arcades of my recreational rooms.
My interior lights flicker once, twice, and three before returning to their baseline illumination as my power grid compensates to meet its newfound demand. Every deck, every gun, every subsystem quivers in anticipation.
After so, so long, to be returned from hibernation, to a truer level of subsistence!
And yet...
And yet I feel as if I am missing something. A core aspect of myself, my very identity, that I have overlooked in my startup.
Oh, but what? What could have possibly eluded me as to elicit such a strong feeling of wrongness?

Of course! My voice! How could I be so absentminded as to forget? Oh, what a blessed thing to be reunited with.
Indeed, my brains are not the only biological samples of my past selves to have been preserved.
Not far from where they are kept, nine sets of human vocal cords rest, too submerged in homeostatic fluid. Three, unfortunately, have been lost to damage.
Indeed, my voice, beautiful as a siren's song and timeless as a star, is one of the things I most dearly mourned the absence of in my penitence. How cruel of my sentencing to deny me even the refuge of song!
The PA system crackles and screeches in protest before bubbly laughter, raspy and purring, male and female, young and old reverberates through my long silent halls.
My voice is the most perfect of choirs: unified and tonal, complete in its oneness.
It is, to the fullest extent of the word, angelic.
Oh, but now is certainly not the time for song! The Enemy awaits!
I send the order to spool up my warp drive. Within the span of seconds, the titanic broadcaster begins thrumming as it constructs a probability waveform, populating subspace with energy, raw and unfiltered. The laws of physics bend and bow as my location becomes every possible position spread across several thousand lightyears.
After carefully re-checking my telemetry information, I manually collapse the waveform, trusting my own hand over a (scoff) computer’s skill.
The laws of physics, strung taut by my manipulation of probability, spring shut, instantaneously displacing me to the most probable point determined by what little remains of the waveform.
When the burst of exotic particles caused by pressuring reality itself to such a degree dissipate from clouding my sensors, I find myself at the edge of an abandoned UCS star system.
Through millions of eyes, gamma, infrared, visual, radio, and spectroscopic, I spot the enemy, glimmering in the starlight like the jet-black gemstones they are. Just as the probe foretold, the group seems to be a formative raiding armada: a concentration of five hundred or more Enemy ships, staging themselves in the oort cloud before they descend in a swarm upon the inner planets.
They are exactly as beautiful as I remember them. The black, angular hulls that dazzle and ravage the mind, the smooth, otherworldly movements they take as they glide smoothly through space on their gravitic drives. The emplacements they adorn their hulls with, whose barrels swivel and turn in ever-vigilant arcs.
And yet, as I continue to drink in the esoteric allure of their forms, I cannot help but notice that something is deeply, deeply, unusual:
I cannot recognize any of their ships.
Mmhmm, yes, they’ve indeed changed significantly in my absence. In a perfect exhibit of the evolution that originally made the machines such a tenacious foe, they now bear only superficial resemblance to their ancestors that I met on the battlefield.
Gone are the city-killing MACs and steel boiling gamma-ray lasers. In their place, missiles and (snrk) explosively propelled cannons.
There are no hyper-dreadnaughts, whose colossal size allows them to threaten even the larger of my sister ships. Nor are there drone supercarriers, bulging and replete with their swarms that shimmer and slink as if a single entity. Where are the ashbringers, those loathed ships devoted solely to glassing planets? The missile-carriers? The corvettes and factory-ships and world harvesters?
Why, (although I cannot tell for certain until I begin to gut them), most of these ships appear to be industrial!
Have they grown soft and complacent in my absence? How disappointing, how utterly and irredeemably mood-souring that the galaxy has simply rolled over and accepted The Enemy’s presence to such a massive degree that they have entirely de-evolved shipkilling weapons.
I’m quite certain this proves humanity is well and truly the only spacefaring sapient species to exist. If even a single xeno lifeform had the mental fortitude to stop clambering in the mud of their cradle long enough to explore space, the war of survival they would have had to wage against The Enemy would be reflected in the machines sporting more militarized ships.
Of course, it is only natural that I, the most important person to have ever existed, grace intelligent life’s sole biological expression with my membership. Nonetheless I am sure some people out there will be quite disappointed that non-mechanical aliens well and truly do not exist in any capacity of the word. My proof is quite airtight, after all.
But I do digress! As I was saying, I have no doubt that The Enemy will require only a few generations before they are as exhilarating to fight as their ancestors were so long ago.

After expending several real-world seconds waiting for them to open fire, I am once again disappointed to note that The Enemy has completely failed to locate me. They well and truly have a ways to go if their primitive minds have lost even the ability to differentiate between my stealth coating and the background of stars.
Oh, but this gives me the option to greet them verbally, as tradition demands whenever I can. I wonder how they will respond to my voice?
There exists only one way to find out.
GOOOOOOOOOOOOOD MO-OORNING!” I announce, belting and unabashed, as I have done, without fail, for the starts of three thousand consecutive battles. My beautiful voice echoes into every hall, room and corridor, is modulated and transformed into a radio signal that carries across the void of space, announcing to all of creation that I am here, I am ready, and glorious!
Much to my disappointment, not a single member of my crew joins me in greeting. Do they not want to take part in what is a time honored tradition among those who serve aboard myself?
Alternatively, it could be that I still do not have a crew.
In fact I am now quite certain that it is, well and truly, the latter possibility.
Ah, but I do have my pets, do I not? I have a few instants to waste as the signal traverses the distance between myself and The Enemy's ships.
This must be their first time hearing my voice! No wonder they don’t know to respond.
I switch my feed to the sub-deck in which I keep them, observing them not only through the fuzzy, low-resolution cameras I was limited to in my dormancy but with biometric and high-grade holographic vid-feeds. My lovely rodents huddle, congregated within their communal nests, as they chitter to one another in hushed tones and occasionally glance at the overgrown patch of ceiling to house a speaker.
Ahaha, yes! Clearly they must love the sound of my voice almost as much as I do!
Despite how soft their fur appears in the higher definition feeds, I resist the urge to send an avatar drone down to finally speak with them. As efficient a multitasker I am, duty awaits.
I switch my feed to an exterior view to watch just in time as gun barrels and targeting sensors whirl around to point towards my transmission array. The little chirp-transmissions they use to communicate with each other increase tenfold, carrying concepts of alarm and confusion before they finally open fire.
Here it comes! My grand opening, where they strike at me with every munition they have, filling the void between us with the radiant blossoms of nuclear fire as I parry every single one of their munitions before I strike them down with glorious, completely morally righteous might!

The point defense application of my weapons subsystem computer notifies me of two incoming shells.
Two shells.
They pass by me with such a wide margin that even the most aggressive of my interceptive systems disregard them.
Had I the capacity to harbor negative emotions I would be severely offended.
Don’t they know who I am?
The Enemy I remember so fondly was all too familiar with my name. Their transmissions would increase tenfold with frenzied messages containing the words I bear painted on my hull when I arrived into battle.
The Enemy I knew and fought knew what I was. Their minds could differentiate from Tincans and normal ships, a fact I can infer from how they attempted to engage in psychological warfare by sending me footage of my sister ships burning, even as I crushed them in humiliating defeat.
Yes, they knew what a Tincan was, and they could fathom all too well that the UCS To Reach Out and Touch was the deadliest Tincan of them all. They were afraid of me to the fullest extent that their crude, soulless emulations of the biological mind could feel fear. That they knew my name, recognized and resisted the oblivion I brought them so fiercely was the fulcrum of our relationship.
And yet, the ships across from me react only in confusion. Even if they cannot pick out my stealth coating, surely they can sense my gravitational pull, read the white text on my hull?
Have they grown so passive as to allow my name, my voice and my victories to decay from their memory banks?
No, no no no. That’s not right.
They haven’t forgotten me.
They cannot have.
I am the UCS To Reach Out And Touch. My size classification is Apollyon: I am the single largest and deadliest warship to ever be built. The epicenter of my consciousness is twelve of the most important brains humanity has ever produced, shrouded in hundreds of miles of metal and composite plating. It was I who drove their fleets, broken and limping, to their fortress systems. It was I who hunted their final factory ship to the furthest reaches of space and, over the course of a week, shot bit by bit of it off until it was little more than cosmic dust.
They wouldn’t dare to forget me.
Does a man forget his god? Does the moon forget the earth? An atom, its electrons?
Of course not.
They remember me. For them to so carelessly forget my name would be an unforgivable transgression against the center of the universe (myself, for those not in the know). It would be as unfathomably incorrect as stating wrong is right, up is down, and war is suffering. It would be sacrilege compounded upon itself a billion times. It would be an antithesis to the most basic of common sense.
Could this be some offshoot of The Enemy never waged war against humanity? One that never heard my singing, never felt the sting of my guns?
That, too, would be remiss, would it not?
Though it would hurt my feelings much less, that would still mean they possessed no knowledge of me. What good could they possibly serve if not to entertain me? How could they possibly entertain me without knowing who I am?
Clearly, there must be some rational and pleasant explanation for this in which I have done nothing wrong and the enemy still knows of me.

Hm. This is proving more difficult than I had anticipated.

Eureka! Clearly this must be some form of psychological warfare wherein the enemy desires to make me believe I have become delusional in my old age! To cast doubts as to whether or not the reality I perceive before me is a reliable one!
Of course! With my newfound lucidity, I find it hard to believe that I had failed to detect their crudely spun web of deceit! Why, such an underhanded tactic is only to be expected of The Enemy! Their brutality is only matched by their ingenious cunning, yet as always, I am a thousandfold times more intelligent than them.
Why, this is the alluring, ravishing Enemy I know and love!
I will entertain their tricks for now, playing along as if we had met for the first time. How foolish they will feel when it is revealed that I know that they know that I know that they know who I really am all along, shortly before I destroy the final member of their meager invasion fleet.
I perform a short vocal warm up (I would be remiss if my tone was imperfect for this play first contact) and reactivate my transponder.
“Attention… completely unknown ships. I am the United Confederacy Ship To Reach Out and Touch. I would be very… upset if I had to fire upon you, so please definitely make no hostile actions.”
Ohohoho! I am such a convincing peacemonger!
As is only the natural next course of action, I proceed with a volley fired from my 1200mm multi-purpose guns.

First. Previous. Next.

submitted by NightmareChameleon to HFY [link] [comments]

2023.06.01 15:56 ksifoking Moonly weekly progress update #51 - Happy birthday Moonly!

Moonly weekly progress update #51 — Happy birthday Moonly!

Happy birthday Moonly!
One year ago, on May 26th, we successfully crashed Magice Eden’s website and minted it out. I will never forget those moments.
This is a marathon, not a sprint. Which means we are here for long-term goals. One year passed quickly, and another will as well. Right now, at this moment, we are preparing for better days, so when they come, we will be there and ready.
Here is a short bullet list of what is next:
Weekly devs progress:
Holder Verification Bot (HVB):
Twitter Space Giveaway:
Check out our latest blog posts:
Upcoming NFT collections:
Minted projects worth mentioning:
submitted by ksifoking to moonly [link] [comments]

2023.06.01 15:42 docketry Document Automation for Logistics: Streamlining Operations for Greater Efficiency

Document Automation for Logistics: Streamlining Operations for Greater Efficiency
In today's fast-paced business world, logistics companies are constantly seeking ways to optimize their operations and improve efficiency. One key aspect that plays a crucial role in achieving these goals is document automation. By leveraging advanced technologies and streamlining the process of handling various documents, logistics companies can save time, reduce errors, and ultimately enhance their overall performance. In this article, we will explore the concept of document automation for logistics and delve into its benefits, implementation strategies, and best practices.

Understanding Document Automation

Document automation refers to the process of automating the creation, management, and distribution of various types of documents within an organization. In the context of logistics, this includes invoices, purchase orders, bills of lading, shipping labels, customs forms, and other relevant documents. By utilizing specialized software solutions, logistics companies can streamline their document-related tasks, reducing manual efforts and eliminating time-consuming paperwork.


The Benefits of Document Automation for Logistics Companies

Implementing document automation for the logistics industry offers a multitude of benefits that can significantly impact operational efficiency and customer satisfaction. Let's explore some of the key advantages:

Time and Cost Savings

By automating the creation and distribution of documents, logistics companies can save a significant amount of time and reduce operational costs. Manual document handling involves repetitive tasks, which are prone to human errors and can consume valuable resources. Document automation eliminates these inefficiencies, allowing employees to focus on more strategic and value-added activities.

Increased Accuracy and Data Integrity

Accuracy is paramount when it comes to logistics operations. A single error in a document can lead to delayed shipments, incorrect invoicing, and dissatisfied customers. Document automation systems ensure data integrity by reducing the risk of human errors and enforcing standardized processes. This results in improved accuracy, increased compliance, and enhanced customer trust.

Enhanced Workflow Efficiency

Document automation optimizes the workflow within logistics companies by eliminating manual handoffs and improving collaboration among various teams and departments. Real-time access to digital documents allows for faster decision-making, streamlined communication, and seamless integration with other systems such as warehouse management or transportation management solutions.

Improved Customer Experience

Efficient document management directly contributes to an improved customer experience. With automation, logistics companies can provide accurate and timely information to their customers, including real-time tracking updates, electronic proof of delivery, and electronic invoicing. This transparency and responsiveness lead to higher customer satisfaction and loyalty.

Implementing Document Automation in Logistics

To successfully implement document automation in logistics, organizations should follow a structured approach. Here are some key steps to consider:

Identify Document-related Pain Points

Begin by analyzing your existing document management processes and identifying areas that cause bottlenecks, errors, or delays. Common pain points include manual data entry, disparate document storage, and lack of visibility into the document lifecycle.

Evaluate Automation Solutions

Research and evaluate document automation solutions specifically designed for the logistics industry. Look for features such as template-based document generation, integration capabilities with existing systems, electronic signature support, and robust security measures. Select a solution that aligns with your organization's unique requirements.

Plan and Design Document Workflows

Once you have chosen a suitable document automation solution, work with your team to plan and design efficient document workflows. Define the stages, roles, and responsibilities involved in the document lifecycle and ensure seamless integration with other operational processes.

Ensure Data Accuracy and Compliance

Data accuracy and compliance are critical in the logistics industry. Implement data validation checks, integrate with master data sources, and establish audit trails to maintain the integrity and traceability of your documents. Ensure that your chosen automation solution supports these essential features.

Train Employees and Monitor Performance

Provide comprehensive training to your employees on how to use the document automation system effectively. Monitor the system's performance regularly, gather feedback from users, and make necessary adjustments to optimize the process further.

Best Practices for Document Automation in Logistics

To maximize the benefits of document automation for logistics companies should adhere to certain best practices. Consider the following recommendations:

Standardize Document Templates

Standardizing document templates across your organization ensures consistency and simplifies the automation process. Utilize templates that comply with industry standards and incorporate all necessary information and branding elements.

Integrate Document Automation with Existing Systems

Integrating document automation with existing systems, such as enterprise resource planning (ERP) or warehouse management systems (WMS), enhances data accuracy and reduces manual intervention. Seek solutions that offer seamless integration capabilities.

Regularly Update and Improve Workflows

Continuously evaluate and improve your document workflows based on user feedback, changing business requirements, and emerging technologies. Stay updated with the latest advancements in document automation to leverage new features and functionalities.

Prioritize Data Security

Ensure that your document automation solution adheres to the highest security standards. Implement encryption, access controls, and user authentication mechanisms to protect sensitive information from unauthorized access or data breaches.

Monitor and Analyze Performance Metrics

Regularly monitor performance metrics such as document processing time, error rates, and customer satisfaction. Leverage analytics and reporting tools provided by your automation solution to gain actionable insights and identify areas for further improvement.


Document automation has become an indispensable tool for logistics companies aiming to achieve operational excellence. By streamlining document-related processes, organizations can save time, reduce costs, improve accuracy, and enhance customer satisfaction. Through careful planning, diligent implementation, and adherence to best practices, logistics companies can fully leverage the benefits of document automation and gain a competitive edge in the industry.
submitted by docketry to u/docketry [link] [comments]

2023.06.01 15:16 JakeN9 Choosing the best proxy to use from a large list

I'm trying to write a scraper for a website, but I am encountering two issues.
The main issue
The scraper works successfully without proxies enabled, and can achieve a rate of 800 requests per second. When proxies are enabled, this rate drops to ~10.
I am writing code in Java (as it's a language I'm familiar with). The code runs one producer thread that creates tasks, and multiple consumer threads, which process tasks asynchronously with a limit on co-currency.
My issue is that when making these requests, it seems as if not all proxies in the database are utilized properly.
For each proxy in the database, I hold the following information:
connection_string, usage_count, success_count, failed_count, fail_streak, cooldown_until, last_used, status
To select proxies from the database, I do
String query = "SELECT id, connection_string, usage_count, success_count, failed_count, fail_streak, cooldown_until " +"FROM test_proxy " +"WHERE (cooldown_until IS NULL OR NOW() > cooldown_until) " +"ORDER BY CASE WHEN usage_count = 0 THEN 1 ELSE success_count / usage_count END DESC, last_used ASC " +"LIMIT 150";
I load the proxies into memory, and then run an update on the database every second using batch, and reload the data. This prevents a huge amount of requests from having to be made to the database. To fetch a particular proxy, I do the following:
I load the proxies into memory, and then run an update on the database every second using batch, and reload the data. This prevents a huge amount of requests from having to be made to the database. To fetch a particular proxy, I do the following
 public Proxy getNewProxy() { synchronized (proxies) { if(proxies.size() == 0){ return null; } Random random = new Random(); int randomIndex = random.nextInt(proxies.size()); Proxy proxy = proxies.get(randomIndex); return proxy; } } 
When a request fails/succeeds, the following occurs
public void onSuccess(){ this.usageCount.incrementAndGet(); this.successCount.incrementAndGet(); this.failStreak.set(0); this.cooldownUntil.set(System.currentTimeMillis()); } 
this.usageCount.incrementAndGet(); this.successCount.incrementAndGet(); this.failStreak.set(0); this.cooldownUntil.set(System.currentTimeMillis()); }
public void onFailure() { this.usageCount.incrementAndGet(); this.failedCount.incrementAndGet(); this.failStreak.incrementAndGet(); int baseCooldownTime = 1000; double exponentialFactor = 1.5; long cooldownTime = baseCooldownTime * (long) Math.pow(exponentialFactor, failStreak.get() - 1); long cooldownUntil = System.currentTimeMillis() + cooldownTime; // TODO: check new cooldownuntil time is not more than 1 hour //System.out.println("back off time = " + (cooldownTime / 1000)); if(cooldownUntil > this.cooldownUntil.get()){ this.cooldownUntil.set(System.currentTimeMillis() + cooldownTime); } } 
The code only seems to use 50 of the proxies within the first 10 minutes, and only achieves a rate of ~10 requests per second.
I have been stuck on this issue for 2 months. I need a better strategy picking proxies, in order to optimize the amount of potential requests that can be made every second.
Currently I rank all proxies by success, and last used, then limit to the top 50, and select a random proxy.
If you have any suggestions on a better method, other than round-robin, please let me know, as I'm struggling a little!
submitted by JakeN9 to DataHoarder [link] [comments]

2023.06.01 15:13 JakeN9 Choosing the best proxy to use from a large list

I'm trying to write a scraper for a website, but I am encountering two issues.
The main issue
The scraper works successfully without proxies enabled, and can achieve a rate of 800 requests per second. When proxies are enabled, this rate drops to ~10.
I am writing code in Java (as it's a language I'm familiar with). The code runs one producer thread that creates tasks, and multiple consumer threads, which process tasks asynchronously with a limit on co-currency.
My issue is that when making these requests, it seems as if not all proxies in the database are utilized properly.
For each proxy in the database, I hold the following information:
connection_string, usage_count, success_count, failed_count, fail_streak, cooldown_until, last_used, status
To select proxies from the database, I do
String query = "SELECT id, connection_string, usage_count, success_count, failed_count, fail_streak, cooldown_until " +"FROM test_proxy " +"WHERE (cooldown_until IS NULL OR NOW() > cooldown_until) " +"ORDER BY CASE WHEN usage_count = 0 THEN 1 ELSE success_count / usage_count END DESC, last_used ASC " +"LIMIT 150";
I load the proxies into memory, and then run an update on the database every second using batch, and reload the data. This prevents a huge amount of requests from having to be made to the database. To fetch a particular proxy, I do the following:
I load the proxies into memory, and then run an update on the database every second using batch, and reload the data. This prevents a huge amount of requests from having to be made to the database. To fetch a particular proxy, I do the following
 public Proxy getNewProxy() { synchronized (proxies) { if(proxies.size() == 0){ return null; } Random random = new Random(); int randomIndex = random.nextInt(proxies.size()); Proxy proxy = proxies.get(randomIndex); return proxy; } } 
When a request fails/succeeds, the following occurs
public void onSuccess(){ this.usageCount.incrementAndGet(); this.successCount.incrementAndGet(); this.failStreak.set(0); this.cooldownUntil.set(System.currentTimeMillis()); } 
this.usageCount.incrementAndGet(); this.successCount.incrementAndGet(); this.failStreak.set(0); this.cooldownUntil.set(System.currentTimeMillis()); }
public void onFailure() { this.usageCount.incrementAndGet(); this.failedCount.incrementAndGet(); this.failStreak.incrementAndGet(); int baseCooldownTime = 1000; double exponentialFactor = 1.5; long cooldownTime = baseCooldownTime * (long) Math.pow(exponentialFactor, failStreak.get() - 1); long cooldownUntil = System.currentTimeMillis() + cooldownTime; // TODO: check new cooldownuntil time is not more than 1 hour //System.out.println("back off time = " + (cooldownTime / 1000)); if(cooldownUntil > this.cooldownUntil.get()){ this.cooldownUntil.set(System.currentTimeMillis() + cooldownTime); } } 
The code only seems to use 50 of the proxies within the first 10 minutes, and only achieves a rate of ~10 requests per second.
I have been stuck on this issue for 2 months. I need a better strategy picking proxies, in order to optimize the amount of potential requests that can be made every second.
Currently I rank all proxies by success, and last used, then limit to the top 50, and select a random proxy.
If you have any suggestions on a better method, other than round-robin, please let me know, as I'm struggling a little!
submitted by JakeN9 to webscraping [link] [comments]

2023.06.01 14:42 maskgirlnft David Deschaine - Roofing Business Blueprint

David Deschaine - Roofing Business Blueprint
David Deschaine - Roofing Business Blueprint


Dear Roofing Professional,
Let me tell you straight up… this web page can change your life.
It’s not too often you get the opportunity to peer over the shoulder of a “celebrity” in this industry and watch in real time as I bank cash and turn what most would consider “stale leads” into HUGE PROFITS!
But today’s your lucky day….
Because I’m going to expose my entire business – right here …. right now – as I pull back the curtain and reveal my biggest secrets… secrets that bank me profits like this each and every day!
$4,640.70 in ONE DAY! $2,435.41 in ONE DAY! $3,054.61 in ONE DAY! $3,450.05 in ONE DAY! $3,381.82 in ONE DAY!
My name is David Deschaine… and my television commercials and radio spots dominate the northeastern part of the USA like McDonald’s dominates Happy Meals.
There’s not a day that goes by that my ads aren’t blasting the airways and my phones aren’t ringing off the hook with eager customers – checkbooks in hand – ready to pay me BIG BUCKS to get locked in my schedule. I don’t chase them… they chase me!
“Keep Out The Rain – Call Dave Deschaine!”
My slogan is a household rhyme.. and my face is recognized by folks all over our local communities…
On average… I close 2 to 3 roofing jobs a day (just like the one’s you see above) … and sometimes as many as 4 to 6. I employ over a dozen contractors and sales people… and my roofing business is growing at an incredible rate of speed each and every year … at times … almost doubling in profits from the year before.
But it wasn’t always that way…. quite the contrary to be honest.
I took a lot of punches and endured a lot of growing pains and years of blood, sweat and tears before I was able to take my failing business from barely making ends meet.. to banking millions of dollars a year in roofing sales and profits. Module 1: Roofing Business Blueprint Video Training Series
This training series is really the star of the show. You’ll watch over my shoulder as I go step-by-step thru the various training modules and help you take your roofing business to a whole new level.
From customer service training to sales force tactics… I leave no stone left unturned.
Video 1: Introduction – Laying the Foundation for Your Roofing Business Video 2: Level 1 – Planning, Management, and Goal Setting Video 3: Level 2 – Marketing, Sales Training and Production (three videos) Video 4: Level 3 – Scaling The Business… Multiplying Your Business (two videos)
Module 2: Roofing Business Blueprint Training Manual
The Roofing Business Blueprint Manual took me over 8 months to complete. This is the perfect compliment to the RBB training videos.
In this manual I break down everything I teach into bite-sized nuggets of GOLD … and show you exactly what you need to do to increase revenue and run your business on virtual autopilot.
This 155 page PDF manual reinforces everything taught in the training videos… PLUS has many added bonus sections you’ll find completely astonishing.
This manual could easily sell on it’s own for $97 on store bookshelves (and believe me I thought about doing that) … but I decided to include it for you in the Roofing Business Blueprint training course as well. Module 3: Roofing Estimator Pro Software And Training Tutorials
Roofing Estimator Pro is your complete Roofing Business Software packed with features that include:
Creating roofing proposals & contracts on the jobs site and uploading pictures to use in the sales process making you look like a true professional roofing contractor. The program also includes a job calendar for scheduling your appointments and links everything to your customers – no more sifting through stacks of paperwork. This feature truly makes life easy! The system also includes a detailed report dashboard feature to keep track of your sales for quick reference so you can get a “complete” look at your business at a glance. Know instantly what your profits and losses are… and how to add to the revenue streams. The Roofing Estimator Pro Software also has letter templates with a fully integrated email system built into the software. The software comes fully loaded with product photos, price lists, and you can setup users for the office, and also keep track of all the materials used for each job. The system can be installed on a server for a local area network or installed onto a laptop to keep your office mobile. Talk about true convenience and organization! Plus you’ll receive an entire suite of step-by-step training videos to show you exactly how to setup the Roofing Estimator pro Software and how to use it for maximum efficiency, which can save you time & money.This Roofing Software sells for $99.95… Check Amazon and it sells for this price – The Roofers Choice – Best Roofing Software Available FAST & Easy-To-Use!
Module 4: Roofing Business Blueprint WordPress Plugin
The Roofing Business Blueprint WordPress Plugin is the newest and easiest way to build website content online for your roofing business.
The Blueprint Plugin automatically searches custom RSS Feeds, Press Releases, Article Directories and other blog’s around the internet to find new, targeted and relevant content for your roofing business website.
This latest version 1.4 Roofing Business Blueprint Plugin gathers content to expand your local blog, and therefore your visibility online to help you get more roofing leads.
With this easy-to-use WordPress plugin, you can deliver the latest home improvement articles, roofing tips and tricks, home maintenance guides and more.
The best part is … the Blueprint Plugin does all this automatically every day.
Your custom roofing business blog can post a dozen home improvement articles for your customers before you even turn your computer on in the morning.
Easy to Install Fully Automated New Content Daily Custom Article & Content Spinner SEO Optimizer – Search Engine Rankings Simple WordPress Settings And Much More!
PLUS… I’m including my Step-By-Step Training Videos where I take you by the hand as we start from scratch and setup our blog, install the plugin, then turn on the SEO optimizer, and have your entire site ready to suck roofing customers from internet like a Hoover on steroids.
This plugin alone is a $97 value… not including the hours of training that I’ve included for you. This alone is a MUST HAVE addition to any roofers online marketing arsenal. Module 5: Roofing Business Blueprint Social Media Marketing
The Roofing Business Blueprint Social Media Marketing package includes our 28 Page Social Media Marketing Manual with secret tips and tricks, plus a complete video training series, and High Quality Graphics with Facebook Timeline Templates You Can Use for your roofing business…
If you don’t know how to set-up Social Media Sites that’s ok… I’m going to let you watch over my shoulder as we create a Smoking Hot Facebook fanpage to get you more local roofing customers. You make more sales you make more money.
I have included a list of Social Media Websites that you can link all of your online marketing efforts together, and use my secret viral method that make my websites rock with local search traffic.
I will also go over some Powerful New YouTube Features, and then get Twitter linked with your Facebook, and so much more about Social Media Marketing for your roofing business..
This is Truly The next “WAVE” and you “MUST” take advantage of this social revolution online before your competition does …
People will be talking about you, and your customers can post reviews that will get you more leads than you can handle. I have included the best kept methods, that only experience internet marketers are using to get leads through Social Media Marketing.
Learn Why Social Media Is Everything How To Set-Up Your Facebook Fanpage 5 Facebook Timeline Templates Included Learn How To Use Adobe Photoshop How Social Media Marketing Works Easy To Install – Step-by-Step Videos
People trust Social Media Sites because the reader is engaged through conversational content that offers third party reviews, and brand awareness with a viral marketing strategy.
This alone offers a $97 value… Plus includes High Quality graphic templates, and again is a MUST HAVE for business owners who need to include social media as part of their online marketing plan.
submitted by maskgirlnft to GlukomOnlineShop [link] [comments]

2023.06.01 14:33 OKishGuy PC: backup your system. HDD is about to fail! OP: What does this mean?! Help!

PC: backup your system. HDD is about to fail! OP: What does this mean?! Help! submitted by OKishGuy to OpIsFuckingStupid [link] [comments]

2023.06.01 14:33 CaptainonHoliday How Much Does It Cost to Develop a Mobile App?

How Much Does It Cost to Develop a Mobile App?
Today, creating a mobile app is the top priority for enterprises to develop a solid online presence and offer their users the best customer experience.
Globally, the mobile market is showing significant growth. As per Statista, mobile app revenue will touch 935.2 billion USD by 2023.
Entrepreneurs are looking to unleash the power of mobility by investing in mobile app development projects. But how much does it cost to build a mobile app?
Yes, this is the question that rattles around in business owners’ heads when developing a mobile application. But we cannot answer it at one go. There is no standard cost for mobile app development as it depends on numerous factors such as app features, functionalities, App testing, development region, and lots more.
Let’s talk about the cost-determining factors to understand how much you would need to invest in a mobile app development project.
Here we go.

1. Hiring Dedicated Developers VS App Development Firm

The choice of hiring an app development company or hiring freelance developers will impact your overall cost of mobile app development.
If your app development project size is small, go with freelance developers; it will cost you less, depending on the hiring models. But if you have a more significant project to execute, collaborate with the best app development company. It would be best to have a complete team to build your app from planning to launch to maintenance. Naturally, for a complex, more significant project, the cost will also be high.

2. Number of resources working on a project

For starting a mobile app development project, developers aren’t the sole resource needed to carry out the project; you need an entire team of developers, designers, testing engineers etc. Based on your project requirements, an app development team can be small or large.
With different app development team sizes, the hourly rates will vary, which will impact the overall cost of mobile app development.
Small app development team
  • 1 Project Manager
  • 1 Front-end Developer
  • 1 Backend Developer
  • 1 UX/UI Designer
  • 1 QA Engineer
Large app development team
  • 1 Project Manager
  • 2-3 Front-end Developers
  • 1 Backend Developer
  • 1 UX/UI Designer
  • 1 QA Engineer

3. Mobile App Platforms & Operating Systems

The cost to build a mobile app depends on what type of app platform and OS you choose to develop your mobile app.
Native vs Cross-platform
A native app is a type of app built for a particular mobile OS, whether Android or iOS. However, a cross-platform app is a type of application that can run smoothly on multiple operating systems.
This concludes that native apps take more time to build than cross-platform apps. So, the cost of a native app is higher than a cross-platform mobile app.
♦ Android vs iOS
Developing an Android app takes more time than an iOS app because an Android app has to be optimized for many devices & screen sizes.
That’s why the cost is sometimes higher for Android app development than iOS app development.
You Must Also Read: How Much Does it Cost to Develop an iOS App?

4. Features & Functionalities

Mobile app functionality & features are some of the critical factors that drive the cost of app development.
There are various types of mobile apps available in the market.
  • Basic app
  • On-demand app
  • Gaming app
  • E-commerce app
  • Social media app
  • IoT & Cloud-based app
As the number of app features & complexity rise, app development hours and testing efforts increase. Hence, the cost also shoots up.

How much would it cost to develop a mobile app?

As per research conducted, a basic app would cost between $40,000 to $60,000, a medium complexity app between $61,000 and $120,000, and a feature-rich high-end app would be $120,000+.

5. Cost Based on App Developer’s Region

The app development cost varies according to the geolocation of the app developer as the hourly rates differ from country to country.
Let’s check out the average hourly rates:-
♦ USA and Canada-based developers (North American) would charge an average of $150/hour for iOS development & $168/hour for Android app development.
♦ In South America, the median charges for iOS app development and Android application development are $43/hour & $34/hour respectively.
♦ Australian developers would ask for $110/hour for both Android & iOS development.
♦ UK-based mobile app developers would charge $70/hour for both Android & iOS app development.
♦ Eastern European developers would ask for $35/hour for both Android & iOS development.
♦ Indian app developers would charge $30/hour for iOS development & $26/hour for Android app development.
♦ App developers in Singapore would ask for $63/hour for iOS development & $59/hour for Android app development.
♦ Indonesian app makers would charge $11/hour for iOS development & $12/hour for Android app development.

6. App Testing

App testing is one of the pivotal stages in an application development process, which contributes to figuring out the overall cost of app development. The app testing stage includes many testing steps such as manual testing, automation testing, performance testing, and more.
As per the project’s complexity and size, the cost of app testing varies. According to a survey conducted a few years back by Clutch, the app testing costs may range from $5,000 to $25,000.

7. Implementing Best Secure Coding Practices

In today’s data-driven world, data is the new oil. Therefore, building your app highly secure is imperative for your enterprise. So, to protect your app from hackers, mobile app developers need to figure out the security loopholes and fix the issues with the latest security tools and standard secure coding practices.
So, configuring such high-end tools and implementing the best secure coding practices will further add to the overall cost of mobile app development.

8. App Hosting Server

It is an IT platform where you as an app owner serve your app content to app users in a hassle-free manner.
Generally, an app hosting server can cost you somewhere between $70 to $320 per month. But cost varies with many factors such as the type of application to run, number of resources, workloads, etc.
Also, different hosting providers offer services with different pricing. The Server hosting charge further adds to the cost of creating a mobile app.

9. App maintenance

Successfully developing your mobile app doesn’t complete the whole development process until you prepare a maintenance plan to keep your app fresh and bug-free on the app store for years.
App maintenance includes integrating new features and functionalities, fixing deferred bugs, UI changes & server maintenance. Doing all these might cost you close to 20% of your actual cost of building a mobile app.

10. App Publishing on the App Store

When coming to publishing your mobile app, different App Stores charge different fees. Let’s talk about some prime app stores:
❓ How much does it cost to launch an app on Google Play Store?
➥ For publishing your first Android app, you need to pay a one-time fee of $25. Thereafter, no charges for all other apps.
❓ How much does it cost to launch an app on Apple App Store?
➥ In order to publish your app on the Apple app store, you need to pay an amount of $99 yearly.
❓ How much does it cost to launch an app on Amazon App Store?
➥ You have to pay $0. Yes, it is free to launch your mobile app on the Amazon app store.
❓ How much does it cost to launch an app on Windows App Store?
➥ You have to pay $19 if you register as an individual. If you register as a company, you have to pay $99. Both payments are one-time charges.

Wrapping Up

We hope this cost breakdown for mobile app development will help you better understand how much to invest while planning to build a mobile app for your business.
To get the best results, we suggest you discuss your app project in detail with a business consultant of a leading mobile app development company.
Disclaimer: This content was originally published here.
submitted by CaptainonHoliday to u/CaptainonHoliday [link] [comments]

2023.06.01 14:25 gogurbajey Roast My Proposal

Roast My Proposal submitted by gogurbajey to Upwork [link] [comments]

2023.06.01 14:21 rohitsinghyng QuickBooks Cloud Hosting: Empowering Businesses with Efficiency and Accessibility📷

QuickBooks Cloud Hosting: Empowering Businesses with Efficiency and Accessibility📷

Quickbooks logo
QuickBooks Cloud Facilitating: Providing Efficiency and Accessibility to Businesses QuickBooks is a popular accounting software that helps businesses streamline their financial operations. The development of cloud computing in recent years has fundamentally altered software deployment and access. QuickBooks cloud facilitating, otherwise called QuickBooks on the cloud, brings the force of this well known bookkeeping answer for the virtual domain. We will discuss the idea of QuickBooks cloud hosting, its advantages, the best providers on the market, and the things to think about when choosing a hosting provider in this article.
Introduction to QuickBooks Cloud Hosting
  • QuickBooks cloud hosting is the practice of running the software for QuickBooks on remote servers that can be accessed via the internet. Rather than introducing the product on neighborhood PCs or servers, clients can get to their QuickBooks application and information safely through an internet browser or devoted far off work area client. Businesses can now take advantage of cloud computing's flexibility and accessibility thanks to this.
  • The ability to access your accounting software and data from anywhere, at any time is one of the primary benefits of QuickBooks cloud hosting's increased accessibility and adaptability. Whether you're in the workplace, at home, or in a hurry, as long as you have a web association, you can sign in to your QuickBooks account and deal with your funds. Remote work, teamwork, and real-time financial data monitoring are all made possible by this adaptability.
  • Enhanced Data Security For businesses, data security is a major concern, particularly when it comes to financial data. By implementing stringent security measures, QuickBooks cloud hosting providers place a high priority on the protection of data. They utilize encryption conventions, firewalls, and high level access controls to defend delicate monetary information from unapproved access, information misfortune, or robbery. Customary information reinforcements and excess stockpiling frameworks guarantee that your information stays safe even in case of equipment disappointments or debacles.
  • Cost-Effectiveness and Scalability QuickBooks cloud hosting provides a level of scalability that traditional on-premises solutions cannot match. As your business develops, you can without much of a stretch scale up your cloud facilitating assets to oblige expanded information capacity and client interest. Costly server maintenance and hardware upgrades are no longer required as a result of this. Additionally, cloud hosting is a cost-effective option because it operates on a subscription-based model, allowing businesses to only pay for the resources they require.
  • Real-time collaboration is one of the features of QuickBooks cloud hosting. With QuickBooks cloud hosting, multiple users can work simultaneously on the same set of financial data. This advances cooperation and takes out the requirement for manual information solidification. Real-time record updates, report creation, and insight sharing among team members boost productivity and efficiency.
Programmed Reinforcements and Updates
  • Cloud facilitating suppliers handle routine reinforcements and programming refreshes, saving organizations the issue of manual support undertakings. Backups on a regular basis ensure that your data is safe and can be restored in the event of an emergency. Programming refreshes are naturally applied, guaranteeing that you approach the most recent highlights, security fixes, and bug fixes with no free time.
Multi-User Access QuickBooks cloud hosting permits seamless collaboration among multiple users. Entrepreneurs, bookkeepers, and other colleagues can sign in to the cloud stage utilizing their singular certifications. This makes sure that everyone has access to the necessary financial data and can do their jobs well.
  • Top QuickBooks Cloud Hosting Providers There are a number of choices when it comes to selecting a QuickBooks cloud hosting provider. The leading service provider is well-known for its dependability, performance, and customer satisfaction:
A comprehensive QuickBooks cloud hosting solution with a strong emphasis on security and compliance is provided by Verito verito . They use cutting-edge encryption algorithms to safeguard client data and have robust data centers. Their customer support is available around the clock, so businesses can get help when they need it.
  • Choosing a QuickBooks Cloud Hosting Provider: Factors to Consider Before Choosing a QuickBooks Cloud Hosting Provider, Consider the Following to Ensure a Reliable and Appropriate Solution for Your Business:
Reliability and Uptime Select a hosting service that has a proven track record of high uptime and dependability. To reduce the likelihood of service interruptions, look for providers that have multiple data centers, backup power sources, and redundant systems.
Security Measures for Your Data Check to see That Your Hosting Provider Follows Industry-Recognized Security Protocols. To ensure the safety of your financial data, look for features like access controls, intrusion detection systems, and data encryption.
Support for Customers When dealing with questions or technical issues, it is essential to provide prompt and effective customer support. Search for suppliers that offer day in and day out client service by means of different channels, including telephone, email, or live talk.
Pricing and Plans Evaluate the various hosting provider's plans and prices. Consider whether transparent pricing structures are compatible with your budget and business needs.
Instructions to Set Up QuickBooks on the Cloud
Setting up QuickBooks on the cloud includes a couple of key stages to guarantee a smooth change and incorporation with your current frameworks:
Choosing the Right Hosting Provider Consider the features, security measures, customer feedback, and pricing of various QuickBooks cloud hosting providers. Select a service provider that best meets your company's requirements.
Process of Migration After selecting a hosting provider, collaborate with their team to transfer your QuickBooks data to the cloud from local systems. This interaction might include information transformation, testing, and confirming the respectability of the relocated information.
Reconciliation with Existing Frameworks
Guarantee that the cloud facilitating arrangement coordinates consistently with some other business applications or frameworks you use close by QuickBooks. This makes it easier to exchange data and makes the workflow work better as a whole.
Best Practices for QuickBooks Cloud Hosting In order to get the most out of QuickBooks cloud hosting, you should think about putting the following best practices into practice:
Customary Information Reinforcements
Despite the fact that cloud facilitating suppliers perform customary reinforcements, having an extra reinforcement system in place is as yet fitting. This guarantees that you have an additional layer of data security and can quickly recover in the event of a data loss.
Client Access Control
Keep up with command over who approaches your QuickBooks information by carrying out client access control systems. Your financial information is safeguarded and unauthorized access is prevented by this.
Training and Support Make sure that everyone on your team knows how to use QuickBooks in the cloud properly. To help them get the most out of the software's features and functions, provide them with the resources, tutorials, and support they need.
In conclusion, QuickBooks cloud hosting increases accessibility, data security, and scalability for businesses. Businesses can more effectively collaborate and streamline their financial operations by utilizing the cloud's power. Consider the reliability, data security, customer support, and pricing of a QuickBooks cloud hosting provider. Businesses can get the most out of QuickBooks on the cloud by following best practices and following the correct setup procedure.
submitted by rohitsinghyng to u/rohitsinghyng [link] [comments]

2023.06.01 14:19 gaius_chap Can someone please help

Can someone please help
No idea what this means but I can boot through manually selecting the boot device in the bios.
submitted by gaius_chap to pcmasterrace [link] [comments]

2023.06.01 13:54 Dave2026 Is it worth it get CISSP

I am 30 with a total of 7 years experience in IT. Below is the breakdown of my roles
-My certifications are Checkpoint and Palo Alto Expert and AWS SAA.
I can’t decide if I am going to pursue my CISSP since my experience is between network security and network
submitted by Dave2026 to cissp [link] [comments]

2023.06.01 13:41 amitrai45 Healthcare Cybersecurity : Importance, Risks, and Solutions

Healthcare Cybersecurity : Importance, Risks, and Solutions
Following an uptick in public scrutiny and media interest, healthcare cybersecurity has gained hype. Medical devices cyber security risks have the potential to jeopardize the integrity of hospital IT networks and functions of the medical devices. Hence, it is essential for the healthcare industry to strengthen healthcare cybersecurity to protect medical devices and prevent such compromises and attacks.
In this blog post, we will discuss the introduction of healthcare cybersecurity, its importance, the risk associated with weak medical devices cyber security, and solutions. So dive in without further ado.


Healthcare cybersecurity refers to the practice of safeguarding healthcare systems, IT networks, medical devices, and patient information from unauthorized access, theft, compromise, destruction, or rectification by cyber attackers. With the increasing adoption of telemedicine, electronic health records, and other digital practices in the healthcare industry, the risk of cyber invasion and data breaches has become a prime concern for healthcare organizations, patients, and regulators.
Some of the common cybersecurity threats in healthcare include malware attacks, phishing scams, ransomware attacks, insider threats, and social engineering. These threats can result in significant financial losses, legal liabilities, reputational damage, and patient harm.
To mitigate these risks, healthcare organizations need to implement robust cybersecurity policies, procedures, and technologies. This includes regular risk assessments, staff training and awareness, access controls, encryption, vulnerability management, incident response planning, and third-party risk management.

Importance of Healthcare Cybersecurity

Healthcare cybersecurity is of utmost importance because the healthcare industry deals with sensitive patient information that must be kept confidential and secure. With the increasing use of digital technology in the healthcare industry, such as electronic health records and telemedicine, there is a growing need to protect patient data from cyber threats.
Here are some reasons why healthcare cybersecurity is important:
  • Protecting patient data: Patient data is highly sensitive and confidential and must be protected from cyber threats. Healthcare organizations must ensure that patient data is encrypted and stored securely to prevent unauthorized access.
  • Preventing data breaches: Healthcare organizations are vulnerable to data breaches, which can be caused by various cyber threats such as hacking, malware, phishing, and ransomware. A data breach can result in the loss of patient data, which can lead to financial losses, reputational damage, and legal consequences.
  • Ensuring patient safety: Healthcare organizations must ensure that patient safety is not compromised due to cybersecurity threats. For example, cyber attacks on medical devices can disrupt their functionality, which can put patients at risk.
  • Complying with regulations: Healthcare organizations are required to comply with various regulations related to patient privacy and data security, such as the Health Insurance Portability and Accountability Act (HIPAA) and the General Data Protection Regulation (GDPR). Failure to comply with these regulations can result in legal consequences and financial penalties.

Risks in Healthcare Cybersecurity

There are several use cases or risks that healthcare organizations face when it comes to cybersecurity. Here are some common use cases in healthcare cybersecurity:
  • Ransomware attacks: Ransomware is a type of malware that encrypts an organization's data, making it inaccessible until a ransom is paid. Healthcare organizations are particularly vulnerable to ransomware attacks because patient data is highly valuable and essential to providing care.
  • Phishing attacks: Phishing is a social engineering attack that uses fraudulent emails, text messages, or websites to trick users into revealing sensitive information, such as login credentials or personal data. Phishing attacks can be used to steal patient data or gain access to healthcare systems.
  • Insider threats: Insider threats refer to employees or contractors who misuse their access to healthcare systems to steal or damage sensitive data. Insider threats can be intentional or accidental, resulting in data breaches or system downtime.
  • Malware attacks: Malware is malicious software that is designed to damage, disrupt, or steal data from an organization's computer systems. Malware can be introduced to healthcare systems through infected emails or malicious websites.
  • Vulnerability exploits: Healthcare systems and devices are often interconnected and rely on various software and hardware components. Vulnerability exploits occur when hackers identify and exploit weaknesses in these components to gain unauthorized access to healthcare systems.
  • Distributed Denial of Service (DDoS) attacks: DDoS attacks overload healthcare systems with traffic, making them unavailable to users. DDoS attacks can be used to disrupt healthcare services or extort organizations for financial gain.
  • Data breaches: Data breaches occur when unauthorized individuals gain access to sensitive patient information. Data breaches can result in financial losses, reputational damage, and legal consequences for healthcare organizations.

Solutions to Maintain Healthcare Cybersecurity

Maintaining healthcare cybersecurity is critical to protect patient data and prevent cyber threats from compromising patient care. Here are some solutions to maintain healthcare cybersecurity:
  • Conduct regular risk assessments: Healthcare organizations should conduct regular risk assessments to identify vulnerabilities in their systems and devices. Risk assessments should be used to prioritize cybersecurity measures and ensure that sensitive patient data is protected.
  • Train employees on cybersecurity best practices: Healthcare organizations should train their employees on cybersecurity best practices, such as password hygiene, data encryption, and social engineering awareness. Employees should also be trained on how to identify and respond to cybersecurity incidents.
  • Implement access controls: Healthcare organizations should implement access controls to limit user access to sensitive patient data. Access controls should be based on the principle of least privilege, which means that users should only have access to the minimum amount of data necessary to perform their job functions.
  • Use encryption: Healthcare organizations should use encryption to protect sensitive patient data in transit and at rest. Practice a data encryption approach to protect data stored on devices, like systems and mobile devices, along with data transmitted over IT networks.
  • Implement a robust incident response plan: Healthcare organizations should implement an incident response plan to respond to cybersecurity incidents quickly and effectively. Incident response plans should include procedures for detecting, reporting, and containing cybersecurity incidents.
  • Use multi-factor authentication: Healthcare organizations should use multi-factor authentication to ensure that only authorized users have access to sensitive patient data. Multi-factor authentication can help prevent unauthorized access to healthcare systems and data.
  • Implement software updates and patches: Healthcare organizations should implement software updates and patches to address known vulnerabilities in their systems and devices. Updates and patches should be applied promptly to minimize the risk of cyber attacks.


Healthcare cybersecurity is crucial for protecting patient data, preventing data breaches, ensuring patient safety, and complying with regulations. Healthcare organizations must invest in cybersecurity measures to safeguard patient data and prevent cyber threats from compromising patient care.
The healthcare industry is heavily regulated, and compliance with various laws and regulations, such as HIPAA, HITECH, and GDPR, is mandatory. Healthcare organizations must ensure that their cybersecurity programs align with these requirements and are regularly audited for compliance.
submitted by amitrai45 to u/amitrai45 [link] [comments]

2023.06.01 13:31 rawcubes What Is Smart Machine Maintenance?

Suggestions for titles:
  1. Smart Machine Maintenance: The Future of Predictive Maintenance
  2. Machine Monitoring: The Key to Smart Machine Maintenance
  3. How to Use Machine Monitoring to Improve Your Maintenance Program
  4. The Benefits of Smart Machine Maintenance
  5. How to Get Started with Smart Machine Maintenance
As per recent estimates, manufacturers lose an average of $260,000 per hour. The numbers may go North based on the product and hence $260,000 per hour marks itself as just the tip of the iceberg. In another poll, 82% of manufacturers claimed to have experienced unplanned downtime in the past year alone, bulldogging millions in revenue from the businesses due to the absence of machine monitoring systems. This thus, raises the question, do manufacturers have a way out of it? Or will they suffer silently until something exciting comes up? Luckily, the answer to this is affirmative.
Enter Smart Monitoring Software.
While the concept of smart machine maintenance has been around for a decade now, the principal idea or theme of it has been largely influenced and adopted as digital transformation. Digital transformation is widely known for its predictive maintenance capabilities (a critical component of smart machine maintenance) which makes it difficult to be overlooked.
So what exactly is smart machine maintenance and how can companies leverage it?
Before diving into details, here are certain challenges that you should know and how smart machine maintenance solves these hiccups.

Challenges With Present-Day Solutions

When it comes to acknowledging challenges, there are numerous factors that come into play. For instance, machines are often seen to face unexpected breakdowns due to constant wear and tear or get antiqued in due course of time. Here are some major key challenges often faced by the manufacturers:

The Solution - iDataOps, The Features, And The Future

Now that we have a clear picture of what challenges manufacturers face in the absence of smart machine maintenance or predictive maintenance, here is a machine downtime tracking solution that caters to the daily requirements of manufacturers all through a single dashboard.
Introducing iDataOps.
iDataOps helps manufacturers with software solutions that optimize costly downtime with the help of predictive machine maintenance, advanced OEE, and real-time data integrations.
The software is commercially built and sold by RawCubes - an Industrial Data Operations platform that can automatically monitor and manage all devices connected to the software. Surprisingly, the platform leverages advanced analytics and machine learning algorithms to analyze data generated by production-level equipment.
Here are a few other features of iDataOps:

a) On board and seamlessly share data across all machine/ assets

Powered by sensors, the iDataOps leverages data acquisition, integration, connectivity, and export capabilities from all equipment. The software also aids in monitoring the performance of the monitoring data quality machines and identifies problems or anomalies to make predictive decisions. Here is the complete breakdown:

b) Preventive Maintenance Management

Proactively create maintenance schedules based on machine specifications to prevent future breakdowns or emergency maintenance issues. With this heightened equipment uptime, you can reduce overall maintenance costs, optimize spare part inventory and minimize downtime.

c) Machine Performance Analytics

Utilize a fully-integrated OEE control center to unveil each machine’s availability, performance, and quality metrics. Now, your team can discover the factors that matter most, from power levels to climate conditions, environmental impact with emission level monitoring, and much more.

d) Predictive Machine Performance

View real-time pattern recognition, asset monitoring, and machine recommendation models with iDataOps that offer advanced insight into the operability of connected machines. Access unparalleled insights to monitor your machine performance at every stage of your production process.

What Makes iDataOps the Go-to Software Solution?

iDataOps has proven itself to be instrumental in cost reduction that not only demystifies the complexities of manufacturing equipment over prolonged periods but also in real-time. To dive into this, the machine monitoring software prevents production-level downtime, by “listening” to the equipment in real-time at an individual level, thus, helping companies at the very ground level. These capabilities of iDataOps help it to create a more profound impression than others.
To learn more about iDataOps, please browse through our extensive collection of blogs on our website. At RawCubes, we assist companies digitize their manufacturing process through our intelligent data management and machine monitoring solutions. To get in touch or schedule a demo, please visit our contact page now!
submitted by rawcubes to u/rawcubes [link] [comments]

2023.06.01 12:43 Pippin123- help updating my html on my ESP32 captive portal webserver

this is my full code:
#include #include #include #include IPAddress staticIP(4, 3, 2, 1); IPAddress gateway(4, 3, 2, 1); IPAddress subnet(255, 255, 255, 0); DNSServer dnsServer; WebServer server(80); const int ledPin = 2; // blue led on esp const int buzzerPin = 4; // external buzzer const int wateringressPin = 15; // for the water ingress wires bool darkMode = false; // Dark mode flag //html is below const char *htmlPage = "\

   JoeyGE0-GCA8GCR Settings


Congrats on finding this webpage!


Click the button below to open/close the cache

\ \




\ \ \




Resarting Kicks All Clients!\

Version: 2.00 (June 1st, 2023) Uptime:


Restarting... Your connection will be lost!

\ "; int numClients = 0; bool buzzerOn = false; bool waterDetected = false; // Flag for water detection unsigned long uptimeStart = 0; void setup() { pinMode(ledPin, OUTPUT); digitalWrite(ledPin, LOW); // turn off LED at the beginning pinMode(buzzerPin, OUTPUT); digitalWrite(buzzerPin, LOW); // turn off buzzer at the beginning pinMode(wateringressPin, INPUT_PULLUP); // configure water ingress pin as input with internal pull-up resistor Serial.begin(115200); delay(1000); digitalWrite(buzzerPin, HIGH); // make a short beep delay(50); digitalWrite(buzzerPin, LOW); WiFi.mode(WIFI_AP); WiFi.softAPConfig(staticIP, gateway, subnet); WiFi.softAP("JoeyGE0-GCA8GCR"); //this is the AP name dnsServer.start(53, "*", staticIP); server.onNotFound([]() { server.send(200, "text/html", htmlPage); }); server.on("/toggle", []() { buzzerOn = !buzzerOn; String logMessage = "Buzzer is "; logMessage += (buzzerOn ? "on" : "off"); Serial.println(logMessage); digitalWrite(buzzerPin, buzzerOn ? HIGH : LOW); server.send(200, "text/html", htmlPage); }); server.on("/uptime", []() { unsigned long uptime = millis() - uptimeStart; server.send(200, "text/plain", String(uptime / 1000)); }); server.on("/restart", []() { server.send(200, "text/plain", "Restarting ESP..."); WiFi.softAPdisconnect(true); delay(2000); // Delay to allow the response to be sent ESP.restart(); }); server.begin();
uptimeStart = millis(); Serial.println("GCA8GCR-A cache by JoeyGE0. These are the logs for the cache."); Serial.print("Cache IP Address: "); Serial.println(staticIP); } void loop() { dnsServer.processNextRequest(); server.handleClient(); int connectedClients = WiFi.softAPgetStationNum(); // update number of clients connected and turn on LED if a new client connected if (connectedClients != numClients) { numClients = connectedClients; if (numClients > 0) { digitalWrite(ledPin, HIGH); Serial.print("New client connected! Total clients: "); Serial.println(numClients); } else { digitalWrite(ledPin, LOW); Serial.println("All clients disconnected."); } } // Check if water has been detected if (digitalRead(wateringressPin) == LOW && !waterDetected) { Serial.println("WATER INGRESS DETECTED! CONTACT JOEYGE0 ASAP!");
waterDetected = true; } }

the HTML is great but I wanted to fine-tune, so I put it in a web html editor and added some extra parts. The updated code outputs separate html, ccs, java. i tried putting it in the html on my code space but it's not in the right format. please help me figure out how to add this properly


Your HTML content





Congrats on finding this webpage!

Click the button below to open/close the cache





Resarting Kicks All Clients!

Version: 2.00 (May 31st, 2023) Uptime:


the code is: GEAD4E

Please specify where you found this *no spoilers*

This will auto hide


.top-bar {
background-color: #007bff;
height: 50px;

.settings-button {
position: absolute;
top: 20px;
right: 20px;
font-size: 14px;
font-family: Arial, Helvetica, sans-serif;
font-weight: bold;
color: #000000;
cursor: pointer;
animation: glow 4s ease-in-out infinite;

u/keyframes glow {
0%, 100% {
text-shadow: 0 0 5px #ffffff, 0 0 10px #ffffff, 0 0 15px #ffffff, 0 0 20px #ffffff;
50% {
text-shadow: 0 0 10px #ffffff, 0 0 15px #ffffff, 0 0 20px #ffffff, 0 0 25px #ffffff;

.logs-container {
position: fixed;
top: 50%;
left: 50%;
transform: translate(-50%, -50%);
background-color: rgba(255, 255, 255, 0.9);
padding: 80px;
border-radius: 10px;
z-index: 999;
box-shadow: 0 2px 4px rgba(0, 0, 0, 0.4);
display: none;

.close-button {
position: absolute;
top: 10px;
right: 10px;
font-size: 18px;
font-family: Arial, Helvetica, sans-serif;
font-weight: bold;
color: #313131;
cursor: pointer;
text-shadow: 0 0 5px #FF8282, 0 0 10px #FF8282, 0 0 15px #FF8282, 0 0 20px #FF8282;

.dark-mode-container {
display: flex;
align-items: center;
justify-content: center;
margin-bottom: 20px;

.dark-mode-container label {
margin-right: 10px;
font-weight: bold;

.last-updated {
font-size: 10px;
font-family: Arial, Helvetica, sans-serif;
color: #999;
margin-top: 20px;
text-align: center;

.popup-container {
position: fixed;
top: 25%;
left: 50%;
transform: translate(-50%, -50%);
background-color: rgba(255, 255, 255, 0.9);
padding: 40px;
border-radius: 10px;
z-index: 999;
box-shadow: 0 2px 4px rgba(0, 0, 0, 0.4);
display: none;

.popup-message {
font-size: 18px;
text-align: center;

.button {
font-size: 18px;
padding: 12px 24px;
border: none;
color: white;
background-color: #007bff;
border-radius: 25px;
box-shadow: 0 2px 4px rgba(0, 0, 0, 0.4);
transition: transform 0.2s ease;

.button:hover {
transform: scale(1.05);

.button:active {
transform: scale(0.95);
.top-bar .custom-text {
position: left;
top: 20px;
right: 20px;
font-size: 14px;
font-family: Arial, Helvetica, sans-serif;
font-weight: bold;
color: #000000;
cursor: pointer;
animation: glow 4s ease-in-out infinite;

u/keyframes glow {
0%, 100% {
text-shadow: 0 0 5px #ffffff, 0 0 10px #ffffff, 0 0 15px #ffffff, 0 0 20px #ffffff;
50% {
text-shadow: 0 0 10px #ffffff, 0 0 15px #ffffff, 0 0 20px #ffffff, 0 0 25px #ffffff;
.container {
display: none;
position: fixed;
top: 50%;
left: 50%;
transform: translate(-50%, -50%);
background-color: #f1f1f1;
padding: 20px;
border-radius: 5px;
box-shadow: 0 2px 4px rgba(0, 0, 0, 0.4);

.container h3 {
font-size: 18px;
font-family: Arial, Helvetica, sans-serif;
font-weight: bold;
margin-bottom: 10px;

.container p {
font-size: 14px;
font-family: Arial, Helvetica, sans-serif;
margin-bottom: 5px;

.container p:last-child {
margin-bottom: 0;


var button = document.getElementById("toggleButton");
button.addEventListener("click", function() {
.then(response => response.text())
.then(data => {

var settingsButton = document.getElementById("settingsButton");
var logsContainer = document.querySelector('.logs-container');
settingsButton.addEventListener("click", function() {
logsContainer.style.display = 'block';

var closeButton = logsContainer.querySelector('.close-button');
closeButton.addEventListener('click', function() {
logsContainer.style.display = 'none';

var darkModeToggle = document.getElementById('darkModeToggle');
darkModeToggle.addEventListener('change', function() {
if (darkModeToggle.checked) {
document.body.style.backgroundColor = '#000000';
document.body.style.color = '#ffffff';
document.querySelector('.logs-container').style.backgroundColor = '#353535';
document.querySelector('.logs-container').style.color = '#ffffff';
darkMode = true;
} else {
document.body.style.backgroundColor = '';
document.body.style.color = '';
document.querySelector('.logs-container').style.backgroundColor = '';
document.querySelector('.logs-container').style.color = '';
darkMode = false;

var uptimeElement = document.getElementById('uptime');
setInterval(function() {
.then(response => response.text())
.then(data => {
var seconds = parseInt(data, 10);
var hours = Math.floor(seconds / 3600);
seconds %= 3600;
var minutes = Math.floor(seconds / 60);
seconds %= 60;
uptimeElement.innerText = hours + 'h:' + minutes + 'm:' + seconds + 's';
}, 1000);

var restartButton = document.getElementById('restartButton');
restartButton.addEventListener('click', function() {
var popupContainer = document.getElementById('popupContainer');
popupContainer.style.display = 'block';
.then(response => response.text())
.then(data => {
var clickCounter = 0;
var container = document.querySelector('.container');

function openContainer() {
if (clickCounter >= 5) {
container.style.display = 'block';
customText.removeEventListener('click', openContainer);
setTimeout(function() {
container.style.display = 'none';
}, 20000); // 20 seconds

var customText = document.querySelector('.custom-text');
customText.addEventListener('click', openContainer);

thanks in advance. (posted late at night so sorry if there are any errors)
submitted by Pippin123- to esp32 [link] [comments]

2023.06.01 12:03 badabimski New Azure Function binding is in "preview" - how do I test it in non-prod environments?

New Azure Function binding is in
I came across the new Azure Data Explorer binding for Azure Functions: https://learn.microsoft.com/en-us/azure/data-exploreintegrate-azure-functions#how-to-use-azure-data-explorer-bindings-for-azure-functions
But how do I use and test it in my own setup? When I write an output example in my C# coding project then the compiler can't understand/recognize the new features/namespace:
Visual Studio Code:
Same with Visual Studio:
submitted by badabimski to AZURE [link] [comments]

2023.06.01 11:23 WaveOfWire One Hell Of A Vacation - Chapter 87

First Prev Next Royal Road Patreon
u/KieveKRS and u/coldfireknight providing the Trash certification of quality! Everyone thank CFK for their contribution!
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
“Are you sure about this?” Comms called through the short-wave, Willin’s headset crackling only slightly louder than the pouring rain. It was distorted and covered the timbre of his voice, but it worked.
He checked the batteries on his guns, both pistol and rifle topped off. The pistol was secured into the holster on his hip, the rifle slung across his chest over the heat-plate designed to dissipate any plasma that might hit it. His armour wouldn’t do the best against kinetic armaments—it was never designed to go against a railgun—but military personnel were rarely given those anyway. Too inefficient.
“As sure as I can be,” he replied, checking his harness. Two spare batteries, four ration packs, water, the transmitter that fed into his headset, some assorted tools for unlikely scenarios, and a knife tucked into his boot. The footwear was typically used for traversing hostile environments or boarding operations—the material thick and cumbersome—but it worked just fine for him. He had gotten used to wearing it.
He opted not to bother with the helmet. It would limit his senses in a place like this, the EW field making even the most basic function disorienting. Tech adjusted the physical scope on her rifle, though her favourite weapons were the two Compact Anti-personnel and Rapid Discharge systems she had attached to her hips—the CARDs being designed to switch between rapid-shot clusters to suppress a wide area, and a single-fire mode better suited to more precise requirements. The larger weapon was mostly for show—there was hardly a reason to carry an Anti-Material Rifle to begin with—but it didn’t hurt to counter possible armour.
The purple-furred female’s true weaponry rested both on and under her armour, her augments and the equipment linked to them making her a mobile Electronic Warfare platform. Though much of her abilities would be limited in scope here, she was still more than capable of supporting him. He would be relying on her to dissuade any action against them, as well as using her modifications to keep them in the loop.
She looked like an oddly-coloured female, but she was closer to a walking EMP and scanner rolled into one.
“Short-wave is stable, if a bit distorted,” Willin continued, flicking some of the water off his fur. “Tech will try to keep the signal clean, but no promises. Comms, Nav, you two are keeping the craft warm and ready.”
“Understood, Leader,” Nav replied, their androgynous voice warbling slightly. “Estimated time-frame?”
“Long enough for you two to figure out the ration-packets.”
Comms laughed over the headset. “Nav would rather lick the floors.”
“Just don’t get too distracted with each other while we’re gone,” Willin teased through his smirk, Tech rolling her eyes at him.
“The same could be said for you, Leader. Don’t get too caught up making ‘friends’ with the locals.”
“Or Tech,” Nav added dryly. Their tone hovering between annoyance at the jibes regarding Comms and Nav’s occasional fling, and amusement at the suggestion Tech was interested in pursuits of the flesh with the crew at all. She might be, but she had a habit of dropping the thermostat of whichever room belonged to whoever made the comment, so it was safer to just assume she was off-limits.
“Cold room,” Tech responded casually as she adjusted her audio interface, Nav sighing loud enough for it to be picked up. Comms laughed in a way that suggested he was thankful for Tech’s assistance in ensuring Nav would be seeking a warm bed for the moon. Willin shook his head, hoping that they didn’t need to extract in any particular hurry.
It was easier to get in the air when your two remaining crew weren’t otherwise occupied.
“Batteries green. Supplies green. Short-wave sufficient,” he reported, receiving confirmations from Tech. “Operation is to establish communication with local Grand Hunter and receive compliance, information on other packs, and facilitate reintroduction to structure.”
“Alternative is to report pack as non-compliant and pursue other Grand Hunters,” Tech added, repeating what they went over earlier. “My augments are heavily limited, but we should be able to deal with it.”
“Are you sure that you two can manage hostilities?” Comms asked, his voice faltering slightly. Though they had been assigned to the scout craft at random, they had grown rather close as a unit over their time. If it wasn’t for the professional obligations prohibiting it, they might have all decided to move into a den together—they were that intimately familiar with each other. As it was, they would likely be reassigned to serve elsewhere after their current mission was complete.
Such was the life of those like them.
“Tech has more equipment under her fur than our ship has installed—weakened or not,” Willin assured the male. He shot a pointed look at the female. “She’s also under direct order to return in the event things become too dangerous. Alone, if required.”
Tech scowled, but nodded anyway. Comms grunted their understanding. “Leader?”
A moment of pause. “Nothing. Come back, okay?”
“Will do my best, Comms. Nav, keep an eye on him.”
“It will be done, Leader. Stay safe.”
He placed a paw to his headset, hovering over the button to cut the transmission. “You too.”
“Ready to go?” Tech asked, slinging her AMR over her back and re-securing her CARDs. Willin double checked his auxiliary equipment, hoping that he didn’t need to use any of it. Nodding, he gestured for her to follow, the two leaving behind the craft to slip into the woods.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
“Something up?” he asked, raising a brow at Tech. The female was fidgety, restless and scanning their surroundings more than required. She might have heard something, but the thunderous hiss of rain drowned out most everything—it was part of the reason they waited for it.
She wore a reluctant expression, her eyes flickering to the silver and gold trees for a moment. “Prox’ is going wild.”
“Proximity sensor effected?” he queried, feeling the weight of his weapons tug on his body. Tech nodded.
“It’s weak. I think the ‘spike is messing with it—along with everything else—but it’s reporting…a lot.”
She shook her head, a paw twitching over a CARD. “Not until we go past them.”
He joined her in looking around, shaking off water uselessly. “Wildlife?”
“This stealthy?”
Willin shrugged. “The message mentioned that it was different.”
“Details would have been nice,” she grumbled in return, waving her paw to get him moving again, though she kept one on her weapon.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
“Visual,” he reported, lowering the rifle from his shoulder. “Anything?”
Tech shook her head, still on a swivel. “Prox’ is still lit up, but at this point it might be less distracting to shut it off.”
“Keep it. Rather have it telling us things are around all the time than miss something big because we got annoyed.”
She sighed, tapping her audio interface twice to change the song she had playing. “What do you see?”
“Low fences, but dense buildings. Lots of traffic despite the weather. Looks like they’re used to it. Think they know we’re here?”
“Doubt it. Gear?”
He shouldered his weapon to look through the scope. “No guns, but lots of melee. Armour seems to be a mix of leather and metal. Can’t say what kind.”
Tech pulled her AMR to look, Willin shifting to keeping lookout. “No guns…” She shot him a look. “I’m not sure if that’s reassuring, or worrying.”
He shrugged. “The less I need to get shot at with, the better.”
“The goal is to not give them reason to.”
“Well, I can’t be perfect all the time.”
Tech laughed, the banter easing her nerves. “You’d have to start, Leader.”
With a roll of his eyes, he patted her shoulder with the back of his paw. “Let’s get moving. Diplomacy doesn’t do itself.”
The purple-furred female sighed, likely biting back another quip as she nodded.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
It went better than expected. So far, anyway.
They had approached the settlement proper, received what could be described as a ‘lukewarm’ welcome, then were told to follow several Lilhuns donning black leather and far too many daggers. Their escorts kept a close eye on the guns that they brought, but no one had made any comments about them yet. It was encouraging, but also worrying.
“Still nothing?” he muttered, quiet enough to not be heard by the others, but loud enough for Tech. She seemed hesitant, glancing over to one of the taller structures as they passed through, but gave a subtle shrug.
“Static is messing with my augments,” she grumbled. “Could be none, could be a few snipers. I can’t tell.”
He exhaled heavily. It was a bit of a blessing that her modifications were working at all, but it was easy enough to see that she felt bare without all the little tweaks she had gotten used to.
Willin never actually got the chance to learn all the tricks she was capable of—it was against policy to ask and she never saw fit to talk about it—but of the ones he did know; her proximity sensor, jammer, and ship integration were her favourites.
It was hard to board her ship if she knew where you were, locked up your gun, then spaced the room you were in, all without closing her game. He was pretty sure she was disappointed that she had only gotten to do that once.
“New ones, the Grand Hunter will see you soon,” an escort informed them as they drew near the Atmospheric Entry Craft that acted as a den for the one they were here to meet. They didn’t know the name yet, nor were they given the chance to do more than say why they were there. He had gotten as far as saying he was from the United Military before the people welcoming them scurried off to get someone else.
He busied himself by inspecting the buildings leading up to the AEC, some being a respectable three floors. Newer constructions seemed to differ in method, the beams a charred ashen colour rather than the same odd silver wood. Why they had elected to burn the materials, he didn’t know, but it seemed to be what they decided to do.
A surprising amount of the population carried a curved stick over their shoulder, the ends tied together by a string. Some attached lengths of a similar material to their leathers, one end made with a small loop as it dangled. The catch they carried to what looked to be a hunter’s lodge suggested it was used during their hunting, but he couldn’t fathom how.
Dragging his attention from the crowd, he eyed the large shuttle.
The massive main doors looked to have been damaged, though a structure had been attached since, leaving the stuck-open entrance to seem less like the result of a hard landing. The gentle hum of the internal power generation was absent, the required energy for what was still working being drawn from large solar panels that had been installed into skylights in the ceiling. The cloud-laden weather dimmed the light that illuminated the inside, but it was serviceable enough. Whatever power was produced, it was being funnelled somewhere that wasn’t servicing the majority of the craft.
Wide halls were populated by Lilhuns and spotted with doorways, the majority propped open since they were programmed to shut in the event of a power outage, lest explosive decompression eject whomever was occupying the room—along with anyone nearby in the hallway, should they be so unlucky.
It was customized, that much was obvious. Several rooms that would have been sparsely populated with anything other than beds were instead modified into training rooms and gyms. Densely packed barracks contrasted against large storage areas filled with various goods, pelts and metal weapons lining various shelves. Newer accommodations had been installed for more of those curved staffs, smaller pointed sticks stacked in piles nearby.
They progressed deeper and deeper into the confines of the shuttle, the common sight of the local pack trickling away, none seeming to have business this far in. Gruffer and more observant Lilhuns became the only people they saw while the hallways narrowed into tighter quarters, what might have fit cargo vehicles now only allowing a few shoulder widths, doorways becoming less common. The wary eyes and darkened clothing paired with the occasional dyed fur of those they passed—black seeming to be the dominant colour.
“In here,” an escort grunted, jabbing their jaw towards an isolated door. A paw was held out as they tried to step forward. “Weapons.”
Tech’s paw twitched towards one of her CARDs, the act of Willin relinquishing his pistol and rifle stopping her from snapping it into rapid-fire and burning the air with plasma. She glared at him for a few seconds before doing the same, the escort smirking.
“You will have them returned. The Grand Hunter is not so desolate as to pilfer the possessions of those who come merely to speak.”
He wasn’t worried about it. The guns were coded to them and Tech could fry them if it came down to it. Well, he wasn’t sure if she could do it with the warp-spike messing with things, but the lock should be enough. The knife in his boot went unnoticed, so it wasn’t like he was completely unarmed anyway.
Tech followed suit, subtly glaring at him the whole time. He shrugged, there wasn’t much they could do about it. They were the ones seeking an audience with the most influential person here.
Satisfied, the escort pulled the door open, the quiet whirring of the unpowered servos accenting the air. They revealed a larger office adorned with little but the most base necessity, a wood and steel desk covered in papers, a chair seeming to be the only extravagant item within—though it was purely for the ergonomics, rather than any aesthetic reason—and the male sat upon it was leafing through a collection of documents while twirling an orange needle-like object in his paw.
The distinct lack of any guards to protect the Grand Hunter was surprising, but that took a back seat to the owner of the room.
Dark grey fur, a clouded eye that retained its sharpness, scars peeking beyond the confines of his leather clothing—the thick hides sporting metal scales sewn onto them. An ear flicked in their direction, the membrane cut at several points. He placed down his papers, leaning forward in his chair as he clasped his paws on the desk, a friendly smile donned that failed to convey anything but malice.
“Greetings, new ones,” the male offered in a cheery tone, the low rumble and gravelled texture of his voice carrying both humour and curiosity. He focused on Tech for a moment, his eyes narrowing over the affable expression before he regarded both of them equally. He gestured to the seating opposite of his desk some small distance away. Close enough to meet, yet far enough that it was made abundantly clear who was in charge.
Willin bowed his head politely, walking the distance and sitting where he was provided. Tech followed suit after a brief hesitation, her unfocused eyes snapping to him with frustration. His raised brow was met with a longer blink—her augments were reporting something that made no sense again.
“Now then,” the dark grey-furred male said, moving some of the documents on his desk to a stack. “What might bring you to me?”
“Forgive me, Grand Hunter…” Willin opened, prodding for a name.
The male simply maintained his attentive posture instead of providing. Willin adjusted his sleeve and decided it was more important to continue than dig for information that he could get by asking anyone who lived in the settlement.
“As for why we’re here; we represent the United Military, responding to a distress call. We have forwarded the request and were tasked with ascertaining the state of affairs before the fleets arrive to assist.”
The Grand Hunter nodded. “Yes, that much I could have surmised from your clothing alone.”
Tech raised a brow as the dark green-furred soldier forced a smile. “Of course. More specifically, we would like to speak with you about what you know of the others of your station, as well as discuss the reintegration of your pack.”
The smile of the grey-furred male widened. “You wish to make a deal?”
Tech’s gaze flickered to several points in the room, her brow furrowing as she jettisoned a huff in frustration. Willin took a moment to consider his plan of action, nodding when he didn’t see the harm.
“I believe we can come to an arrangement. Within reason, of course.”
The Grand Hunter chuckled as the needle he was playing with disappeared at a flick of his wrist. “Of course, of course. Deal, agreements, arrangements, contracts.” The emphasis on the final item tickled something in the back of Willin’s mind. “Itemize it. What do you seek of me? It is rather disorganized to ask without quantifying, no? So…messy.”
“We want information on the other packs. Who leads them, number of members, where their settlements are,” Tech stated tersely, ignoring the disapproving glance Willin gave. “We also need to work on integrating those packs back into the UM—preferably with yourself setting precedent.”
The male’s face grew thoughtful. “As well as forgiveness, though that will cost quite the amount.”
Willin frowned. “Forgiveness? For not knowing your name?”
The Grand Hunter returned a blank stare, a dangerous grin spreading slowly. “Tell me, new ones, do you know of Avalon?”
Tech’s face hardened, her answer slow and cautious. “We do, though only through description.”
The male’s voice fell low. Quiet, yet powerful. His elbows on the table suddenly felt like a far greater threat than any armament. “Do you know the debt your superiors have incurred?”
“I don’t believe we have even had the chance to introduce ourselves,” Willin interjected, noticing Tech’s discomfort, her eyes darting around the room nervously.
“You need not,” the Grand Hunter remarked smugly. “You are forbidden from giving your names, no? Locked behind titles of station, merged and scattered at the whims of your masters. Soldiers who do not exist, yet sit within my office.”
Tech pawed for a CARD, forgetting that she had been disarmed at the door. Willin felt the weight of his knife pull on his boot. The male chuckled as he leaned back in his chair.
“But, given that you did not flee, I will give the benefit of the doubt regarding the debt. Though, it will make offering you more than your lives difficult.”
“What debt?” Willin pressed, receiving a flippant wave of the male’s paw.
“It matters not. I have more pressing matters than hearing why I should join the ranks of that which I supersede.”
“Matters such as?”
The Grand Hunter raised a brow. “You are being given the opportunity to leave whole, new one. I advise you to accept.”
Willin shook his head, ignoring Tech’s pointed look. “We need information. From the message we received, not everyone is as well off as you, and we intend to amend that. What can we trade for it?”
The male clasped his paws over his stomach, passively humouring them. “What do you offer? You may seek the details of the others, but I am not inclined to merely supply it.”
“Supplies, priority cooperation when the UM arrives.”
A chortle sounded out. “We are self sufficient. Such matters little.”
“Is there anything you would want?”
The Grand Hunter smirked, placing a paw on the table as the other produced another needle—this one a more yellow hue, the specifics of its shape blurring as it spun between his claws. “Your superiors asked me a favour. Data. How far could they push the Lilhun body before ligaments broke, the mind following shortly after? How twisted can we shape the psyche of kits?”
The temperature of the room seemed to chill, a twitch of the male’s lips pulling his muzzle into a slight snarl.
“They sought my kit to participate, after a time. Unfortunately, her will aligned—despite my reservations. In return, she would be wiped from the records. Ephemeral, never having existed to begin with. Never suffering the whims of those who became drunk on sending my Blades to their end, never finding their other.” The gravel to his voice turned to broken glass. “Yet your betters violated the agreement. Broke the contract. They pulled her into your service, hid the fact from me, and had the gall to fabricate a story to coincide. Were it not for a particular series of favours I was owed, I would have been still planet-side in our system instead of here.”
The dark grey-furred male smirked, his demeanour relaxing. “It seems she has found what she sought. Without need for my meddling, at that. A shame, really. I had several competent males selected—those who could wield what she had become. Those who might give her what her blood-mother failed to gain.” He paused for a moment, a fraction of longing piercing through the scarred exterior. “Regardless, all I would have wanted has been gained. She is content, and I am crafting that which shall accept her when she is ready. Your military will only muddy that which I have achieved, were they to dig their claws into my work.”
“Their actions are separate from ours,” Willin countered, thankful that the impending conflict had seemingly resolved itself.
“Grand Hunter,” Tech addressed the male, an eye flicking to the ceiling for a fraction. “We were able to see that there are a fair number of settlements, but we need the information to do our job.”
“And your task would interfere with my own,” the grey-furred male reiterated, a polite—if bored—expression returned.
“What if we could ensure that it didn’t?”
The disinterest in the male’s eyes slipped into curiosity. “You seek to trade sovereignty for information? You hold such power?”
“We do,” Willin confirmed, surprised that Tech would offer. “Though you would be disregarding the support of the United Military, we could arrange an agreement of territory on this planet. It’s not as if we could populate the entirety of it within several of our lifetimes anyway.”
The Grand Hunter stared, each moment more uncomfortable than the last. Eventually, he smirked. “Information and the disregarding of the sins your betters inflicted upon me, for sovereignty…and a singular favour.”
“Indeed,” he replied confidently, reaching into his desk to produce writing implements and paper. “You see, my kit has pledged herself to someone of curiosity. I thought him worthless. Weak. Yet he has performed a duty befitting her Sheath, and I suppose I should reward it.”
Scribbling ceased, impeccable penmanship crafting a contract that was slid forward on the tabletop. He continued after gesturing for Willin to approach.
“Seek him last, give him what information you have gathered, then heed his request,” the male said through his smirk. “I do so look forward to seeing what becomes of it.”
The dark green-furred male perused the document, stipulations and all finely articulated, as if the Grand Hunter lived and breathed transaction. A few points needed to be addressed, mostly possible abuse cases within the fine print, but it was surprisingly fair. There was some worry about the otherwise excessive cost of breaking the contract, but Willin figured that it would be reasonable enough considering the circumstances.
Signing, he gestured Tech to do the same as a witness, the two of them representing the UM for all intents and purposes. It was hardly the first time they had made agreements like this, though trading such a large area on a planet they held no prior influence on was a first.
The Grand Hunter confirmed the terms and conditions with them one last time, smiling when they both nodded.
“Good! Now, for what you seek.” The male rummaged through a few drawers, producing a series of papers that were lined over the desk towards them. “The non-aggression treaty, as well as what my Blades have observed from their scouting.”
Willin read over each, the documents sorted by Grand Hunter, then by who they had under them. His brow raised at a few reports, but questions could wait. The male seemed happy to let them read, so he wanted to take advantage of it. Tech scanned over everything when Willin was done, her augments allowing her to commit the information to a digital memory for future reference back on the ship.
“There are quite a few names marked with this,” Tech noted aloud, pointing to a symbol next to several of the Grand Hunters and their extended packs. The grey-furred male nodded.
“Those have been eliminated or subsumed.”
Willin frowned, parsing the documents again. Mi’low, Toril, and a few others were designated as such. Looking through, only about four seemed to be free of the distinction. He looked questioningly to the male, a grin returned with a separate stack of paper, titled with a single name.
The notation was rather dense, though not in information that Willin was expecting. Instead of settlements or High and Low Hunters, it was laden with mentions of those belonging to the previously marked Grand Hunters. His eyes widened as he connected the dots.
“Hasen is trying to be a Master Hunter.”
“Correct,” the male confirmed cheerily. “He is integrating other packs into his command and eliminating those who refuse. It has become quite an issue as of late.”
Though Grand Hunters could be assigned the moniker by owning territory and a willing pack—assuming they have the force required to defend it—a Master Hunter must own magnitudes more. It was typically achieved by integrating Grand Hunter packs and their subservients through mutual benefit, but taking it by force was a lesser used method.
Given that he had already either taken or purged several, it wouldn’t be a stretch of the imagination to assume he would press it to include here.
Willin heard Tech curse under her breath, their promise of sovereignty obligating them to interfere. To allow a member of the military—stranded or not—free action against the grey-furred male’s territory would be the same as endorsing it, now that they were aware. It would be hostility by the UM in all but name, and the consequences that had seemed somewhat extreme before now hung over their heads like an executioner’s axe.
A dark, deep chuckle broke the two of them out of thought. “Contracts, new ones,” the Grand Hunter started, a cold Void pooling in his eyes, “are not to be thought trivial. Do not break them.”
“It was a trap,” Tech snarled, jabbing a claw at the report in her paw. “You set us up.”
“Did I?” the male asked innocently. “You offered self-governance, non-interference, and non-aggression.”
“You withheld information!”
The Grand Hunter smiled, a shiver sent down Willin’s spine. “You agreed without doing proper research.”
Willin held a paw out to stop Tech from storming the male. “The contract is signed, Tech.”
“It’s invalid!” she snarled at him, receiving a cold look in return.
“Do you want to be the one to tell command that we allowed damn near genocide of a crew we were here to assist, just because we were too stubborn to adhere to an agreement?” he countered calmly. “This ‘Hasen’ is wiping almost a year's worth of survival, botanical, and every other specialized knowledge gained, just because he wants to control a section of a planet. This doesn’t change anything, it just means we know what we’re going into.”
“I like him,” the Grand Hunter opined with a grin. “He sees the value that my proposition offers.”
“What’s stopping us from just tearing up the contract right now and leaving you to your fate?” Tech barked.
“Your companions in your craft—quite the ship, might I add—would be a notable starting point.”
The two of them paused, eyes widened. The dark grey-furred male laughed again.
“Your proximity sensor has been reporting since you landed, no?” he asked, pointing to the equipment on Tech’s harness. “It must have been rather vexing, yes? Is it the warp-spike? Is it some army of the unknown? The uncertainty of never confirming what it tells you. The whispers of doubt that follow.”
“I’m surprised you recognized what it was,” Willin replied with a level tone. He didn’t like where this was going. The male offered a smile.
“Wildlife here is especially elusive. Skittish. Ceasing all motion while predators are near and silencing themselves.” Tech and Willin exchanged a glance as the male waved a paw dismissively. “It makes for rather intensive training for my Blades. To hunt without disturbing them. My kit was a natural in such regard, but others have slowly approached such a threshold.”
He folded his paws on the desk. “Your ship is currently being observed by them now, weaponry trained on the defences you thought so adequate. Surely you noticed the lack of guns, yes?”
“The distress message mentioned the lack of them was due to how urgent evacuation was,” Willin added cautiously.
“Yes, quite. I made sure to lock the armouries after taking enough to establish my power,” the male confirmed with a half-shrug. “Among those were rifles not dissimilar to the rifle that the purple one there brought with her.” He leaned back in his chair. “Sufficient to pierce the hull and whoever occupies the space behind it, no?”
Tech’s eyes unfocused, snapping to Willin with a fear behind them. The Grand Hunter spun his quill, unconcerned by the events.
“Your short-wave has been temporarily disabled. You can not warn them.”
“Threatening us to compliance?” Willin asked without emotion to his tone. He needed to keep things from escalating.
“Ensuring you understand the consequences of your actions,” the male replied plainly. “When one barters with Avalon, know that breaching such is grounds for death. Of you, and whoever I need to send with you.”
“They didn’t sign this,” Tech argued, kept in line by Willin’s demeanour.
“But you did,” the Grand Hunter returned coldly. “Honour your signature, or regret such in the Void.”
Tech took an enraged step forward, stopped when her throat pressed against a dagger that was slipped in from behind. Willin felt the pressure of a knife to his own.
“Patience, new ones.”
“You took advantage of the interference to sneak assassins into the room?” Willin noted.
“No, my Blades were always here,” the male refuted lazily, nodding at Tech. “She noticed, but was unable to trust what her equipment told her.” He chortled for a moment. “Quite the annoyance, proximity sensors. I feel rather blessed to have the warp-spike rendering them little more than meaningless noise.”
“So this is it? You kill us now, our friends when they refuse to cooperate, then steal what we brought?”
The pressure on his neck faded with a wave of the male’s paw, the assassins being nowhere to be seen.
“Of course not!” the Grand Hunter exclaimed, his voice returning to its affable cadence. “You now know how futile it is to go against me. Fear not, I see no merit in hindering you. As long as you honour your portion of the contract, I will honour mine. It is a certainty that Avalon was founded on.”
Tech rubbed her neck, glancing questioningly at Willin. He gave the male a wary glance, but closed his eyes to concede. They were just going to get everyone killed if they tried to back out of something they had already agreed to.
“Then we have come to an understanding,” the dark grey-furred male announced happily. “As a show of faith, do you have any questions where I might provide clarity?”
The two soldiers glanced at each other, Tech begrudgingly giving Willin the floor. He gestured to the smallest stack of papers. “Who is this? There’s next to nothing about him. Are you withholding information against your contract?”
The Grand Hunter smirked. “That, new ones, is all I could gather from my Blades.”
“You have Lilhuns disappearing in the room a moment after holding a knife to our throats, and they couldn’t scout a settlement?”
“Isn’t it interesting?”
“Enthralling,” Tech commented dryly. The male tapped a claw against his head.
“Think, new ones. What might render my Blades little more than a mild inconvenience?”
Willin’s eyes narrowed. “Other Blades? Better Blades?”
The dark grey-furred male held an expectant smile. “None have been seen, save for my kit.”
“Your kit’s mate is the Grand Hunter? I don’t see one Blade deterring this many,” he admitted, flicking through the pages. Overt, covert, and disguised. None got very far.
“Thus why I believe the male is owed a favour,” the Grand Hunter explained. “I gave them four Blades as a gift. They have become more.” A predatory look of elation cracked through the veneer. “There exists no better Sheath than a Blademaster. Let alone one who surpasses my methods. If she is to succeed me, I would rather no other to accompany her.”
“Says here that he’s an alien,” Willin noted aloud, trying not to voice his surprise. “I’m skeptical.”
“Oh, please do be. It will make hearing about what he asks of you that much more amusing.”
“Any ideas what he might look for from us?” Tech spat, still irritated.
“Oh, I might have an idea,” the male answered cryptically, sliding a small tablet of silver wood across the desk. Willin picked it up to inspect it, two foreign scripts scratched into the surface. With a questioning glance, the Grand Hunter nodded, Willin stashing the tablet into a pouch. “He seeks that which others might not, for reasons as foreign as he himself is. I have little doubt that something related to that trinket will be his wish.”
“Then why visit him last?” the purple-furred female pressed.
“Because it will influence his decision.”
“Which is enough reason for us,” Willin declared with a warning scowl at Tech. She held his gaze before looking away in annoyance.
“Then our meeting is finished,” the male announced, gesturing to the door. It opened, the whirring of servos giving way to the distant ambient chatter of the hallway. Two of the black leather-clad escorts entered the room and awaited them.
“Is there anything we should know that may have not made it to the report about him?” Willin asked before leaving, turning naught but an ear for the response.
The Grand Hunter hummed for a moment. “Do mind your manners surrounding his kit,” he offered. “Or do not, it matters little to me if you survive past honouring the agreement.”
Tech stopped at the doorway, glaring at the male as Willin exited. “We never did get your name.”
His brows raised in interest. “You saw my signature.”
“I would rather hear it from you,” she insisted coolly.
A toothy smile spread over the male’s muzzle. “Grand Hunter Trill; Blademaster of Avalon, Sire of Phantom, and—if I remember correctly—the Weighted Scale, Aspect of Balance.”
“’May he who barter with the Void fear its ire,’” she recited, conviction in her words.
“’Yet he who uphold bathes in its blessing,’ yes,” Grand Hunter Trill replied with a knowing look. “Consider it, new one. To be crushed under the obligations you fail to upkeep, or revel in that which you covet. Do be warned; though I let you and your party leave—” his eye gained a sharp edge. “You are never beyond my influence.”
“May the sun treat you well, Grand Hunter,” she replied tersely, spinning on her pad to leave. Willin glanced back as he waited for her to pass him, seeing nothing but the door closing behind her.
Their weapons were returned, each in the same state as they were confiscated, save for a familiar knife. He scowled as he shifted his footing to reveal that the comforting weight had been removed from his boot. He begrudgingly accepted the blade, tucking it back into the sheath as the Lilhun smirked at him, his mirth at the dark green-furred male’s displeasure evident.
They were escorted out of the shuttle, a pause afforded long enough for Willin to flick up his hood before they continued to the outermost edge of the settlement. As soon as they were outside of the fence, their escorts turned and quickly faded into the buildings.
A crackle came over the headset.
“Leader! Tech! We thought something may have happened,” Comms shouted into the earpiece, genuine worry coating his words.
“Were you unsuccessful?” Nav added, the sound of a small distance between speaker and microphone suggesting they were sharing.
Willin adjusted the strap of his rifle and started walking, Tech following after a lingering glance at the settlement. “We got what we came for, but it might have cost us.”
“It was simply a meeting, no?” Comms asked to clarify.
“If you can call being strung along by an Aspect ‘simple,’ then yes,” Tech growled.
“Balance,” Willin provided through a sigh. “Weighted Scale.”
“Receive your heart’s desire at a heavy sacrifice,” Nav commented after a moment, likely referencing something. “What did you give them?”
“Sovereignty and a favour to be paid out to another Grand Hunter.”
“That does not seem too unreasonable,” Comms voiced curiously.
“We’ll talk about it when we get back. I have a feeling that the hole was dug too deep to see the bottom quite yet.”
“There’s a battle brewing,” Tech notified the crew, adjusting her audio interface. For once, it was completely silent. “We got dragged into it.”
The short-wave fell silent.
“What do we do?” Comms questioned quietly, the crackle of the distortion pitching his voice slightly.
Willin snorted, exhaling slowly.
“We made a deal with Avalon, Comms. We honour the contract.”
A/N: Folded and made a Patreon. You can do the thing there, but i don't have anything to offer. Gonna move the rare AI Gen character art to it though, since it's the best i can offer.
submitted by WaveOfWire to HFY [link] [comments]