View allAll Photos Tagged Cyberspace,

Finally, the inside of the sleeve advertises Sam's Club's digital photo services. Correct me if I'm wrong, but I don't think you can get any more early computing-era than that graphic on the left, lol! “We're in cyberspace,” clunky old computer, floppy disk, rainbow trails... love it XD

 

(c) 2016 Retail Retell

By uploading these 1990s photo sleeves, I'm meaning to showcase the past - nothing else. No copyright infringement, however old, is intended, nor am I responsible for any repercussions (humiliating or otherwise) you receive for attempting use of any expired coupons photographed. And as always, if you share or use my photos, I'd appreciate if you gave me credit. :)

I took this shot when I was leaving Wilderness Park. By then my toes were really cold even though I was wearing boots.

CLICK TO READ THE ORIGINAL ARTICLE

 

No doubt there are many advantages to in-person photography groups, but let’s face it: the Internet has opened a whole new world for sharing and discussing photography. In many respects cyberspace is the perfect media for images. In fact, it was the evolution of the Internet from text-only communication to text PLUS images that catapulted it from a place inhabited mostly by academics and techy people to a world that encompasses the whole world.

 

The current success of one photo-sharing community in particular has proven that photographers from many countries, with all sorts of backgrounds, with all skill levels, love communicating via images. Let’s see, what’s the name of that community?…. Oh yeah, FLICKR.

 

Why do people love such photo sharing communities? Although there’s always a technical learning curve when entering a new online environment, the software infrastructure, when well designed, makes it easy to upload, label, organize, comment on, and search for images. Good technical design also includes many of the features that make any online community successful: the ability for group discussion as well as private communication, profile pages for presenting your background information and establishing your online identity, interesting places for people to gather, social networking features, and, most importantly, your own personal “space” within the community that you can shape to reflect your personality and interests.

 

People also love these communities because of the PEOPLE. Research in the new field known as psychology of cyberspace or “cyberpsychology” clearly shows that online relationships and groups can be very meaningful additions to a person’s life. I first discovered this years ago when I was a member of the Palace avatar community. This research taught me that an online lifestyle, in some ways, is very similar to your in-person lifestyle - and in some ways it is very different, especially in communities that emphasize images. Cyberpsychology has uncovered some fascinating questions that inhabitants of Flickr encounter every day:

 

- What do people’s photos and images say about them?

 

- Do they express their “real” identity in their images?

 

-What should I reveal and not reveal about myself in the images and comments I post?

 

- What are the ambiguities and miscommunications that tend to happen when people express themselves with images, and with typed comments?

 

- How do I react when people reply to me and my photos with positive or negative comments? What does it mean if I get no response at all?

 

- Why am I drawn to some people, photos, and groups, and not others?

 

- What does it take to feel like I BELONG to this community?

 

- Is it possible to get “addicted?”

 

Participating in a photo sharing communities can help you evaluate yourself as a photographer. As you observe a wide range of photographic styles, techniques, and skill levels, you’ll get a better sense of your own strengths and weaknesses. You’ll get a better sense of where you want to go with your work. When communities like Flickr provide features that enable people to comment on and rate images, you can gather tangible information about how “good” your photography might be – although it’s often wise to take view counts and rating systems with a big grain of salt. Online communities can be complex, confusing places, with many different subgroups and subcultures, and no simple way to predict how and why they react to each other the way they do. To benefit the most from photo sharing communities, take what makes sense, seems useful, and feels good - and leave the rest.

 

* This image and essay are part of a book on Photographic Psychology that I’m writing within Flickr. Please see the set description.

On a feathery tip of the eagles wing

In the majestic beauty in flight it brings

My love will follow you

 

On the digital waves of cyberspace

In the words that fly at a lightning pace

My love will follow you

 

On the strings of a heart, touched by few

No matter where I go, no matter what I do

My love will follow you

 

Leria Hawkins

Model: Saphir Noir & Samuel Nox

Cyberpunk Shooting

Location: Regensburg

Bearbeitung: Jürgen Krall Photography

-------------------------------

Bild Nr.: 120_5046

www.krall-photographie.de

 

Have a great day...dear friends!! :-)

 

_________________________________________________________________________________

 

© Kaaviyam Photography - All Rights Reserved. Text, Concept, Idea and Images by Kaaviyam Photography | காவியம் are the exclusive property of Kaaviyam Photography protected under international copyright laws. Any use of this work in any form without written permission of Kaaviyam Photography will result in violations as per international copyright laws. Contact me: kaaviyam@gmail.com

 

_______________________________________________________________________________

Model: Samuel Nox

Cyberpunk

Shooting

Location: Regensburger Nacht

Bearbeitung: Jürgen Krall Photography

-------------------------------

Bild Nr.: 120_5252

www.krall-photographie.de

created with Microsoft AI Image Creator

okay, having been hacked, and my wounds barely healed, I feel it is my responsibility to keep this from happening to any of you....

 

CNN has announced the worst computer virus ever. If you receive an e-mail with an attachment entitled "A Postcard from Hallmark" over the next couple of days, no matter who it is from, DO NOT OPEN it.....

 

this particular e-mail opens a postcard which will burn your C drive and completely ruin your computer.....

 

remember, my hacker pirated my e-mail password TWO times in a 24 hour period, so don't open it even if you recognize the sender's address....

 

sorry to be so serious today, but it's hard getting back into the ocean after being bitten by a shark!

  

Kitbash and manipulated photographic portrait of Major Motoko Kusanagi, inspired by the recent 'Ghost in the Shell' movie trailer released by Paramount.

created with Microsoft AI Image Generator

here in cyberspace we're all working away behind 'the code'...what you see is all just a bunch of 1's and 0's...so is it real?...can you trust what you see, what you hear and therefore how you react to it all?...

 

****************************************************************************************

 

Morpheus: You've been living in a dream world, Neo.

Secretary of State Antony J. Blinken attends a holiday party for the Bureau of Cyberspace and Digital Policy at the U.S. Department of State in Washington, D.C. on December 12, 2022. [State Department photo by Ron Przysucha/ Public Domain]

created with Microsoft AI Image Generator

At the Churchill Club top 10 tech trends debate I disagreed with the propositions that “Cyber Warfare Becomes a Good Thing” and that “US is the Supreme Cyber Security Force in the World and its Primary Force; citizens accept complete observation by the functions of a police state. A devastating electronic attack results in govt. militarization of major gateways and backbones of the Internet.” I have problems with the “goodness” in the first prediction, and while the U.S. may argue that it is the best, I don’t think the trend is toward a sole superpower in cyberspace.

 

The NSA TAO group that performs the cyber–espionage pulls 2 petabytes per hour from the Internet. The networking infrastructure to support this is staggering. Much of it is distributed among the beige boxes scattered about in plain view, often above ground on urban sidewalks. When President Obama receives his daily intelligence briefing, over 75% of the information comes from government cyberspies. (BusinessWeek)

 

Cyber-offense may be very different than cyber-defense. Some argue that open disclosure of defense modalities can make them stronger, like open source software. But offensive tactics need to be kept private for them to be effective more than once. This leads to a lack of transparency, even within the chain of command. This leaves open the possibility of rogue actors — or simply bad local judgment — empowered with an ability to hide their activities and continual conditioning that they are “beyond the law” (routinely ignoring the laws of the nations where they operate). We may suspect that rogue hacking is already happening in China, but why should we expect that it wouldn’t naturally arise elsewhere as well?

 

Since our debate, the Washington Post exposé reported:

 

“Chinese hackers have compromised the designs of some of America’s most sensitive and advanced weapons systems—including vital parts of the nation’s missile defenses, fighter aircraft and warships… Also compromised were designs for the F/A 18 fighter jet, V-22 Osprey, F-35 Joint Strike Fighter, UH-60 Black Hawk helicopters and the Navy’s new Littoral Combat Ship meant to prowl the coasts.”

 

And today, a new report from the U.K. Defense Academy, entitled The Global Cyber Game suggests that my mental model may be a bit antiquated.

 

Shall we play a game?

 

“When the Internet first appeared, the cultural bias of Western countries was to see it as a wonderful and welcome innovation. The fact that it created security problems somewhat took them by surprise and they have been reluctant to respond.

 

In contrast, states such as Russia and China saw the Internet as a potential threat from the outset, and looked at the problem in the round from their perspective. They formulated strategy and began to move pre-emptively, which has allowed them to take the initiative and to some extent define the Cyber Game.

 

As a result, cyberspace is now justifiably seen by Western countries as a new and potentially serious avenue of international attack, which must logically be militarized to protect the nation.

 

But what if information abundance is so deeply transformative that it is changing not only the old game between nations but the global gameboard itself? In this case, we need a different approach, one that seeks to fully appreciate the new game and gameboard before making recommendations for national security.

 

The ability of national governments to understand and tame the Global Cyber Game, before it takes on an unwelcome life of its own, may be the crucial test for the effectiveness and even legitimacy of the nation state in the information age.” (p.107)

 

The China Hypothesis

 

“It makes extensive state-bankrolled purchases of many critical parts of the local economies and infrastructure under the guise of independent commercial acquisitions. These include contracts for provision of national Internet backbones, and equity stakes in utility companies. These enable it to control ever larger parts of the target economies, to install national-scale wiretaps in domestic networks and, in effect, to place remote off-switches in elements of critical national infrastructure.

 

Finally, to round off the effort, the ‘competitor’ simultaneously makes a massive effort to build its own domestic knowledge industry, sending students around the world in vast numbers to learn local languages and acquire advanced technical skills. In some cases, these students even manage to obtain funding from the target country educational systems. This effort, which only pays off on long timescales, allows it to consolidate and make full use of the information it has exfiltrated from around the world.

 

If it is allowed to continue for long enough, the target countries will find that they have lost so much autonomy to the ‘competitor’ country that they are unable to resist a full cultural and economic take-over, which is ultimately accomplished without open hostilities ever being declared, or at least not of a type that would be recognizable as industrial-era conflict.

 

National geopolitical strategy can be disguised as normal commercial activity and, even if this is noticed, it cannot be challenged within the legal systems of target countries. Thus an international-scale offensive could be mounted without it ever being understood as such.

 

These difficulties are somewhat reminiscent of the industrial cartelization strategy pursued by Germany in the years running up to the Second World War. This carefully orchestrated form of economic warfare was effectively invisible because it was positioned in the cognitive blind spot of British Empire industrialists. Until war broke out, and the deliberately engineered shortage of materials became apparent, they were unable to see it as anything but apparently profit-seeking industrial strategy on the part of German industry.

 

What sort of response should be made to a strategy like this... is retaliation of any kind appropriate? Should the Cyber Game be played as a zero-sum game? The essential problem is that the strategy involves IP theft on a grand, indeed global scale. This is real destruction of value for those companies and agencies who have been targeted

 

Is there any other way of looking at this? Possibly the one thought that trumps Western outrage at the idea of information theft is to recall that it can be stolen without being lost, though it may be devalued. It may not be the knowledge itself but how we create it and use it that is important. In this view, the Cyber Game, being ultimately knowledge-based, is genuinely a non-zero game. Among economic players of the Cyber Game, this understanding is gradually turning into an approach that author Don Tapscott calls ‘radical openness’.

 

A true knowledge-era strategy may not be stealing information but sharing it, playing the Cyber Game high on the gameboard, as Internet pioneers have been doing all along. Maybe Western democracies should respond to China’s alleged actions in the same way. Dare they choose to reframe in this way?” (pp.52-8.)

 

The Future

 

“The most likely form of conflict is now civil war in countries with governments referred to as anocracies, neither fully democratic nor fully autocratic.

 

Income polarization is rising within wealthy countries, as a side effect of globalization, and is hollowing out the middle class. Commentators and researchers have noted this effect particularly in the US. Whether this rising polarization could raise the risk of civil war in wealthy countries is questionable, as long as their governments remain effective. This itself will be a function of how well they adapt to the evolving information environment. If they fail, and a combination of financial, economic and environmental crises threaten the ability of governments to maintain the quality of life, then internal conflict is entirely possible.” (p.74)

 

And as I try to look farther to the future, the offensive cyber-code and autonomous agents of today are not so different from the bio and then nano-weapons of tomorrow. The cell is but a vessel for the transmission of code.

 

I think humanity will cut its teeth on cultural norms and responses (police state, cyber-counter-guerillas (beyond governments to posses and bounty hunters), and a societal immune system for the crazy ones) in response to the imminent cyber threats… and then we will face bio threats… and finally nano threats. So there is little reason to focus on the latter until we have solved the former.

from our little piece of cyberspace to yours, happiest of holidays and best wishes for health, happiness and prosperity to you in 2008!!

I joined flickr over a year ago because I’ve always enjoyed photography and thought being here might be fun as well as educational. Fortunately, I was right about that. I’ve learned a lot here and have really enjoyed meeting people and making friends.

 

As a psychologist who specializes in studying how people interact with each other in cyberspace (aka “cyberpsychology”), I’ve also found the flickr community itself fascinating. So recently I asked myself, why not do some cyberpsychology research in flickr? During the winter break between semesters I wrote and submitted a grant proposal for such a project. Lo and behold, it was accepted!

 

Imagistic communication in cyberspace. That’s the fancy title for the project. Basically, it’s about how people in flickr use photographs and images to express themselves, converse with each other, and form relationships as well as groups.

 

I hate using terms like “analyze” when I do online research. It’s a bit of a cold, even aggressive term, and it’s not how I think about this kind of work. Instead, when I do research in online groups and communities, I offer people observations and reflections on what I see happening, sort of like holding up a mirror. I encourage people to discuss and debate those reflections, and to offer observations of their own. Those discussions lead to more powerful insights than I alone could come up with.

 

Over the next few months, I’ll be posting images to my stream to encourage those kinds of discussions. In fact, I’ve been doing that sort of thing all along with various ideas related to psychology and photography, haven’t I?

 

So I welcome my flickr friends and all visitors to participate in those discussions in my photostream. At some point I may also invite people to participate in a private email interviews with me, and in a focus group. If you think you might be interested in that, please let me know!

 

"..has this faceless world of cyberspace created the next generation sex?"

 

Facebook has an application called the 'Honesty Box' which invites any

member to send and receive anonymous messages from the forum.

 

Store window night shot with V3 VGA camera phone

 

The Science of Sex and Love

(read more)

  

flickr today

   

Nada referente a futebol, mas eu queria faz tempo fazer essa combinação.

Usei meus dois amados da Milani 3D o Hi-Tech e o Cyberspace.

eu duas unhas esmaltei com meu Santion que já é figurinha repetida aqui e quando secou peguei o pincel de cada um e fiz desordenado listras sobre as unhas. Esperei secar e fiz o esquema de carimbar na caixa de leite com a placa DRK-D4 e preenchi as pétalas com os esmaltes e depois de seco apliquei sobre as duas unhas. Sério essa eu realmente amei com força! Essa linha 3D da Milani é só amor! Eu fiquei aboxonada!

Taylor in cyber space -

See my photos on Instagram

@akshootsphotos & @the_subculturist

 

Businessman holding multimedia tech devices in his hand

Project Overmatch: US Navy preps to deploy secretive multidomain tech

By Megan Eckstein and Colin Demarest

Dec 8, 2022

  

Participants of the multinational Rim of the Pacific exercise launch a REMUS 100 autonomous underwater vehicle. Project Overmatch will arguably be the U.S. Navy’s most important work in 2023, especially as the service aims to incorporate more unmanned systems. (Seaman Victoria Danser/U.S. Navy)

WASHINGTON — The U.S. Navy is moving quickly to link its fleet through its Project Overmatch initiative, which has been kept almost entirely secret for two years.

Shielded from public view, the service has undertaken a flurry of work: simulating current pathways for data, writing software code to close gaps, testing it in a lab and at sea, and providing feedback to coders to improve future iterations.

Rear Adm. Doug Small, who leads both Naval Information Warfare Systems Command and Project Overmatch, told Defense News this high-priority effort remains on track for a planned deployment of the new capabilities to a carrier strike group in 2023.

Project Overmatch is the Navy’s contribution to the Pentagon’s multibillion-dollar Joint All-Domain Command and Control effort — a push to reliably connect forces across land, air, sea, space and cyberspace as well as enable seamless international collaboration.

The fielding of Project Overmatch will arguably be the Navy’s most important work in 2023, especially as the service aims to incorporate more unmanned systems that serve as intelligence-collecting nodes, feeding information to sailors on ships and in ashore command centers.

“The Navy’s effort on Overmatch is very much focused on the next two or three years,” said Bryan Clark, a senior fellow and director of the Center for Defense Concepts and Technology at the Hudson Institute. “Overmatch has really focused much more directly on the near-term operational problems faced by commanders dealing with China.”

Small said he’s optimistic about the upcoming demonstration — the largest of its kind, but not the first time the Navy will use this new technology at sea, noting it continues a critical line of research. With ships inherently disaggregated, he said, the Navy is naturally considering ways to better share information across ships and aircraft so the best-positioned platform can strike a target.

“The Navy in particular had been working various system of systems-type concepts and the technologies that would go into that for mission threads. How do you stitch together various components to create a mission or an outcome, an effect?” he said in a Nov. 10 interview. “Overmatch [is] sort of a natural progression of that sort of work.”

Origins of Overmatch

Though the Navy was already researching how to connect ships, planes and weapons, Chief of Naval Operations Adm. Mike Gilday created Project Overmatch in fall 2020 and tapped Small to lead the effort. Gilday has since said Overmatch is his No. 2 priority, behind delivery of the Columbia-class ballistic missile submarine.

Whereas past efforts were housed within specific offices, Small said Project Overmatch is meant to encompass the entire Navy.

“Inside of a platform-centric service,” he said, “how can you become more data- and network-centric?”

 

Rear Adm. Doug Small speaks at the 2021 Fleet Maintenance and Modernization Symposium. (Elisha Gamboa/U.S. Navy)

The core team started with just a few people, but has grown to about 50. The team, plus its collaborators across the Navy and industry, are focused on several key points: tools and analytics, networks, data, and infrastructure, which includes computing and platforms as a service.

“Fundamentally, this is all about management of data, exchange of data,” David Deptula, the dean of the Mitchell Institute for Aerospace Studies and a retired Air Force lieutenant general, said Nov. 14 at a JADC2 industry event. “Without the appropriate infrastructure, you can’t be able to do the data, connectivity or networking. Without the security, all of it falls apart because you’re yielding a huge weakness and vulnerability to our adversary.”

But perhaps the most significant, overriding mission of the team is to figure out what barriers the Navy has put in its own way.

Small said the commercial industry is able to do what the Navy wants to do; car companies like Tesla remotely send software updates to address security gaps or capability improvements without creating safety risks for drivers, and Amazon pushes out hundreds of thousands of software updates each day, which an online shopper might never notice.

“Everything that we have put in our way that prevents us from doing exactly that is something that we’ve done to ourselves,” Small said. “Now, there are changes that need to happen to systems on ships and shore facilities to enable that, but then, eventually, that’s how you get to fielding.”

Small said his Project Overmatch team should have a client-like relationship with the fleet, where they understand what sailors need to do their jobs more effectively and, in turn, quickly produce and deliver tools to address those gaps.

“Bringing an upgrade every several years, or bringing hundreds of thousands of changes per day — somewhere in the middle, there is that sweet spot where we basically pace our adversaries with delivery of capability. And that’s what it’s really all about,” said Small, noting the difference between the Navy and the tech industry.

Ready to strike

Small said his focus is now on the 2023 carrier strike group demonstration. Though he wouldn’t identify specific technologies or software involved, he dubbed the event “the starting gun” and said additional capabilities will roll out in future iterations.

Small said the team will deploy this first increment onto the first carrier strike group in 2023, and then continue until all 11 carrier strike groups have the hardware and software installed. That equates to a large portion of the surface fleet, excluding amphibious ships and some forward-deployed vessels with a different operational model.

“The alternative path is, well, let’s design the whole thing out for a few years and then field that everywhere, right? And you’ve probably seen the [timeline] curves on that, and we’re trying to take a stepwise approach to get there faster,” he said.

The Navy sought $195 million for Project Overmatch in fiscal 2023, a 167% increase over the $73 million it received in fiscal 2022. Spending details have otherwise been scant, with the service executing Project Overmatch behind closed doors, a posture taken, experts said, to bamboozle China.

“It’s mostly because they don’t want to tip their hand as to what they’re looking to put together,” Clark said. “How they deter China is by increasing the uncertainty on the part of the Chinese, on the [People’s Liberation Army], that they’ll be successful on terms that the Chinese leadership would find acceptable.”

Away from the public eye, Project Overmatch technology has already undergone repeated testing, according to Small.

“Within even the first six months of the effort, we had done some work with the Marine Corps, for example, where we got some real-time feedback and did some connections,” he explained. “We’ve been to individual ships with systems and connected it to our labs to sort of simulate other [ships].”

Pushing Project Overmatch advancements into the real world is vital, according to Clark.

“Of all the services, the Navy’s done the best job of trying to really focus their effort on what the operational commander needs, rather than things that the service thinks are cool to put together,” he said. “The Navy’s really focused on Overmatch, being focused on what the average commander needs, focused on the near term and, therefore, focused on actual systems that can be deployed today.”

This fall, the technology was used in the Army’s Project Convergence exercise across multiple units, Small said. The weekslong experiment, during which bleeding-edge tech is put through the wringer, represents the Army’s contribution to JADC2. The Air Force, likewise, has its Advanced Battle Management System, an attempt to adopt the next generation of command-and-control tech.

 

The Air Force's Advanced Battle Management System is expected to enable the rapid collection, processing and sharing of data across all domains, weapons systems and commands. (U.S. Air Force)

But there are concerns the separate efforts are not properly aligned. An early draft of the annual defense bill included an audit of JADC2, with the House Armed Services Committee’s cyber and innovative technologies panel, chaired by retiring Rhode Island Democrat Rep. Jim Langevin, requesting a study on timelines, goals and potential shortfalls.

Defense officials have also expressed skepticism. The Air Force’s principal cyber adviser, Wanda Jones-Heath, in July described the services’ efforts as “all different.”

The data-centric odyssey is of the highest stakes as the U.S. and allied nations attempt to thwart Chinese and Russian ambitions, officials argue. Beijing and Moscow have each spent significant sums on military science and technology — including artificial intelligence and cyber advancements — ratcheting up the pace at which information must be exchanged and decisions must be made on the battlefield.

“Here’s how I see it: any data, anywhere, any time that is needed. And the vision, when I start to spin this out, is coalition warfare,” Pentagon Chief Information Officer John Sherman said at a Defense Information Systems Agency event Nov. 7. “You have a U.S. Marine Corps [High Mobility Artillery Rocket System] getting a firing solution from an Australian [intelligence, surveillance and reconnaissance] capability; maybe you have a Japanese frigate that’s also going to hit the same target there; you’ve got multinational F-35s coming on station to provide combat air-support capability. All of this is going to have to happen quickly.”

Gilday in October said the Navy is sharing Project Overmatch insights with foreign forces to ensure international communication and collaboration will be possible in large-scale, distributed fights.

Though Gilday did not identify those allies, Small told Defense News his program started with Five Eyes — an intelligence-sharing group made up of the U.S., the U.K., Canada, Australia and New Zealand. Small added that the U.S. has since welcomed other allies and partners to collaborate on software development.

No final destination

Some ships will have to wait for their next maintenance period to receive hardware and software changes, but Small said his team is working through policy issues to allow for installations to happen pier-side and, therefore, on a quicker timeline. In the meantime, the Project Overmatch team will chip away at the next increment, even as it’s fielding the first.

“Our concept of ‘done’ has to change a little bit,” Small said, “because it’s really not a traditional type of acquisition approach.”

Defense officials have cast JADC2 in a similar light. There is no true finish line, but rather the massive networking endeavor requires a rolling development process to maintain an advantage over adversaries capable of jamming, intercepting and muddying communications.

Sherman, the Pentagon CIO, said the key to JADC2 is speed and stubbornly staying “inside the enemy’s turn circle.”

“This has got to move so fast that the adversary cannot get back up off the mat,” he said. “Maybe they have mass on us, but we have quality of data, quality of capability.”

About Megan Eckstein and Colin Demarest

Megan Eckstein is the naval warfare reporter at Defense News. She has covered military news since 2009, with a focus on U.S. Navy and Marine Corps operations, acquisition programs and budgets. She has reported from four geographic fleets and is happiest when she’s filing stories from a ship. Megan is a University of Maryland alumna.

Colin Demarest is a reporter at C4ISRNET, where he covers military networks, cyber and IT. Colin previously covered the Department of Energy and its National Nuclear Security Administration — namely Cold War cleanup and nuclear weapons development — for a daily newspaper in South Carolina. Colin is also an award-winning photographer.

This is a 9 minute exposure of the Venice Beach Lagoon.

 

I photographed this earlier.

 

I'm not sure if this is a little too washed out, or just perfect.

Adherent16.93[cyberspace]

This social setting is no different from the others.

Must keep searching.

 

Music by Twin Musicom

Hackerland by Twin Musicom is licensed under a Creative Commons Attribution license

Created in Virtual Reality with Tilt Brush VR.

  

Taylor in cyber space -

See my photos on Instagram

@akshootsphotos & @the_subculturist

 

I thank all on the cyberspace that came and saw this small window to My India .. a window of street pain , a window of culture , a window for respect reverence for all religion faith the true tapestry of Tolerance ..which is True India.

 

An India that is for all Indians beyond color caste and creed .. an India that ushers words of Humanity for all who touch it Devo Atithi Bhava.. Guest is God ,, The Viewer the Reader s God too.

 

Once upon a time I should mention my photo stream used t get hordes of people touching it simply because they wanted to see the World of Hijras I shot , and my Hijra set was not for voyeurism titillation or sexual leering, I locked it up completely as a few Flickr members blatantly began posting my hijra pictures on their Flickr photostream, and Yahoo Copyright did not Help at all.. and the lousy spaceball tool even a child can hack into your pictures , watermark I will never put to deface the soul of my Photography..

 

So I disabled my Hijra pictures , my Gay Pride , my crossdresser sets , my redlight area sets , and the reason I shot documented all this was for posterity to know that we as Indians are still living out the fucked dream of the British Empire still holding on to anti human laws like Article 377 crimininalizing the right of man to live the life of a woman , or his sexual prefernce I also saw the conditions of our redlight areas from within and without , and I felt like many of you that Prostitution should be egalized and child prostitution banned , and remove and safe children from all this I am not a law person .. these were my sets and I felt sad when I locked them up forever ..

 

So today I stand vindicated without hijras , without having traveled to Africa to shoot Wilflife or without visiting exotic places I have shown we can have people seeing our stuff,,

 

If we post original content , which bloggers mostly never do stealing from cyberspace I could also be a photographer jusst shooting the streets on my mobilephone,

 

Hence what I learnt from my Gurus Maheshwariji , Mr Jatkar Mr Malushte and all of you I taught my grandchildren too, I taught them never to be intimidated by the camera or even the greatest photographer on the face of the earth.. your vision is your own more powerful than his with all his high end cameras experience etc..

 

I taught them to respect humility respect humanity I taught them charity made them feel pain , made them endear to photographers today they dont and wont forget Dr GlennLosack, Kim Viola , Jean Paul Gargantiel, Marc De Clercq and those who visited my house I treated them as God nothing less .

 

What I am owe to all of you photographers I visit your stream you give me a reason to live.

 

The screen shot is only for thispurpose that I am not bullshitting..thank you Flickr for this platform and the reason for having a Pro Accunt for unlimited posting and sharing.

 

Thank you Mr Boaz too.

Thn you Mr Tender Alex fr not de contacting me if you do I wont hold it against you . I will still see your stuff and hear your unique voice , that God made us to imbibe and learn something.

 

Thank you Alex Wasserman Sarah Serene for commenting on my pictures and my other friiends to all dear to me and Jeff Lamb Fred Miller you are dead but still live on Flickr Happily ever after .

 

If i HURT ANYONE OF YOU INTENTIONALLY UNINTENTIONALLY PLEASE FORGIVE . ONE MORE TIME

Typing on a laptop.

 

As a reminder, keep in mind that this picture is available only for non-commercial use and that visible attribution is required. If you'd like to use this photo outside these terms, please contact me ahead of time to arrange for a paid license.

  

Taylor in cyber space -

See my photos on Instagram

@akshootsphotos & @the_subculturist

 

Taylor in cyber space -

See my photos on Instagram

@akshootsphotos & @the_subculturist

 

16mm, lasers, small kaleidoscope, torches

More LP in a pitch black room on my backside, due to a bad foot... hope to get out again soon :)

In cyberspace no one can, er, taste your iced scream View On Black

 

[Note: This image was subsequently processed by committee. Special thanks to John, Paul and especially Jo, for her ultimate suggestion. : )]

 

I went to the Malvern Spring Garden Show at the weekend. A truly impressive event. I took quite a few images of the incredible exhibits but, you know me, I can't help but look out for a few exhibitionists and... {Whispers} ...potentially making an exhibition out of some of the folk there, too... : )

I thought I might celebrate my return to cyberspace by posting some previously unpublished photographs of the South Island of New Zealand. Photographers' heaven! I was a little restricted on that trip as my mobility was somewhat hindered by the fact that I was recovering from a broken leg ( remember?) so most of the images are taken from the side of the road. This road was the one leading towards Mt. Cook, NZ's highest peak and one of earths more inhospitable places. Easy to reach, difficult to come to terms with according to mountaineers. Sir Edmund Hillary used to train on Mt.Cook prior to his ascent of Everest.

"This is just the beginning, the beginning of understanding that cyberspace has no limits, no boundaries." - Nicholas Negroponte

created with Microsoft AI Image Generator

What better place to stage an Otherworld than in this Otherworld? A visual representation of a medieval Welsh poem from The Book of Taliesin, early fourteenth-century.

 

Visit this location at Preiddeu Annwn in Second Life

Well, well, well. Who do we have here? It's none other than cyber vandal extraordinaire bOSSmONKEY183. He's been creeping around in cyberspace looking for bitcoin wallets to plunder and NFT's to vandalise. Turns out Mark Zuckerberg was right. Before too long we'll all be living inside the Matrix, or Metaverse, as he prefers to call it.

 

That problem is that it doesn't do much to change innate human behaviour. Given how we've used its predecessor, the internet - the most powerful means of communication ever conceived - it'll come as no surprise that there are no small number of bored apes ready to thrive in the dark unregulated jungle. It's just that bOSSmONKEY183 is the best at what he does. Watch out for your NFT's...

 

Cheers

 

id-iom

1 2 ••• 9 10 12 14 15 ••• 79 80