

I use my notes app to try to mitigate this. If I remember. Which. Well.
I use my notes app to try to mitigate this. If I remember. Which. Well.
This is how it happens for me. Names, dates, important details. I know them. They are on the tip of my brain. But I can’t access them in a timely fashion.
Lol. I’m the whole left and middle sides.
Lists. My notes app puts in work. I make lists for everything. I set alarms for everything. I write things down while I’m thinking about them because I will forget. I ask for things in writing because I will misremember what was said. I have a white board stuck to my fridge so that I can write down when we’re out of something or running low. Oh. And basketball nets over the hamper.
Social media sites thrive on the engagement that comes from those people doom scrolling so this whole premise is antithetical to the purpose of social media sites and the only reason they aren’t doing the same to children is because the law prevents them from doing so wholesale (but they will try to edge around the law every chance they get).
It’s only playing dead. Its eyes are open.
Just as I said. Perfect in every way. That’s how you know. Couldn’t bear to give him up. Say hi to Bob and Jack for me.
I don’t disagree with the premise. But I think the term also serves to demonstrate the severity of the risk when it has gone unpatched. The whole definition is valid, not just the bits and pieces because terms like this evolve over time. We still call disk partitions disks, even though that’s not really accurate anymore. An NVME drive with a C, D and E partition isn’t the same as having separate disk drives was back in the 90’s.
Yeah. I read the whole article. But terms evolve over time and the whole definition is valid. Because that’s how people and media are using it.
“Despite developers’ goal of delivering a product that works entirely as intended, virtually all software and hardware contain bugs.[7] If a bug creates a security risk, it is called a vulnerability. Vulnerabilities vary in their ability to be exploited by malicious actors. Some are not usable at all, while others can be used to disrupt the device with a denial of service attack. The most valuable allow the attacker to inject and run their own code, without the user being aware of it.[8] Although the term “zero-day” initially referred to the time since the vendor had become aware of the vulnerability, zero-day vulnerabilities can also be defined as the subset of vulnerabilities for which no patch or other fix is available.[9][10][11] A zero-day exploit is any exploit that takes advantage of such a vulnerability.[8]”
That’s the definition straight from Wikipedia.
I have to go in every year to get refills on my epi pens and my migraine meds. I have to have a doctor sign off on those and I don’t really know why. I am not on ADHD meds but I imagine that would be the same.
At the end of the tax year you generally receive tax documentation forms (a W2 or 1099 etc). These tax forms detail your taxable income and possibly any tax credits or exemptions you might be eligible for.
You fill out I9 forms detailing your status (single married etc) and what dependants you have when you start at your place of work and then update those forms as that status changes over time. This information is used by your employer to withhold taxes on your earnings from your pay checks and send that money along to the federal and state governments as necessary.
When you receive your end of year tax forms you enter that tax information into a tax preparation service or paper form, sign it and send it off with what you owe in check form to the IRS, unless you have made accurate tax withholding in which case you have already paid. If you are owed money by the government for overpayment of taxes they will then mail you a check or direct deposit the amount owed to you into an account of your choosing.
There are exceptions if you own a business or have other forms of income for the tax year which you may have to submit a more detailed filing to the IRS with documentation that can absolutely include receipts. But for the most part you use the tax forms you receive to submit your taxable income calculations to the federal or state government and pay or get paid accordingly depending on if you owe them money, or if you are owed money by them for overpayment.
It would be awesome if they did face consequences so I didn’t have to keep my credit locked while I go through the process of getting a new SSN. This is getting ridiculous. They notified me by mail like a week ago that my data is in this breach too. This really needs to stop happening.
Sometimes parents look back on things and realize that it’s too little too late. My mother doesn’t like the relationship I have with her (I’m not zero contact but I only call when I’m feeling up to it and that can take months). I was physically abused as a kid on top of having ADHD (then ADD), and I was diagnosed but never medicated.
My youngest brother has Autism and my parents went above and beyond to get him everything he needed by my sister and I (both with ADHD) basically got nothing.
It’s exhausting to think about what ifs. At this point in this time I have received an apology (though not for the things I remember, and more for the things she regrets which do not necessarily align). I think a lot of her regret is based on our relationship now and how she wishes it could be.
But I look at it like this. I’m just living in the world, doing my best to survive and take care of myself. That’s something I have been doing since I was a child. I continue to do that because I don’t know any other way. I do not have the energy to give to her for her regret. I acknowledge it. I accept the apology. But I gave up being angry about it. I just do not have the energy for it.
We can’t change how we grew up. It’s better to acknowledge the sentiment and move on. At least, I think so. Try not to tie up too much of yourself in what could have been. Get to know and accept the you that is in the here and now. You’ll make your own way. You got this far.
There are problems with the law as well. The main one is that Tik Tok buys a whole lot of data about Americans and their browser history etc from data brokers. So they don’t necessarily need the app to gather information. Comparisons of the Tik Tok app vs it’s counterpart in China exist and they paint a pretty significant picture of the differences and similarities that explain how it could be used to push a narrative or propaganda. Barring that though two things can be true. It can be true that Tik Tok is a danger to national security, and also be lobbied against by American Tech companies.
What we’re seeing is that this law was the result of several things and doesn’t just have one singular aim. Anyone who says it’s just about one singular thing just doesn’t want to admit the validity of the other arguments because it ruins how they feel about the federal government, Tik Tok, China, Trump, Biden etc.
Perhaps this is why they purged so many dead accounts.
Glad you and the pup are ok.
I have a set of Loops and a set of off brand Loop-like ear plugs from Amazon called Curvd. I’m not a super big fan of the ear fins in the Curvd but they’re somewhat cheaper than the Loops. They come with a carry case and you can buy lanyards for them. If I’m honest though I prefer the loops.