“
Letting me know your email address. Big step. Sure you're ready for that kind of commitment?"
"I'm pretty sure I want you to shut up and open your ass for me.
”
”
S.E. Jakes (Dirty Deeds (Dirty Deeds, #1))
“
Wow,” I said. “Are you making this up?”
“Hazel Grace, could I, with my meager intellectual capacities, make up a letter from Peter Van Houten featuring phrases like ‘our triumphantly digitized contemporaneity’?”
“You could not,” I allowed. “Can I, can I have the email address?”
“Of course,” Augustus said, like it was not the best gift ever.
”
”
John Green
“
Do you have the email addresses of the 20 percent of your customer base that loves what you do? If not, start getting them. If you do, what could you make for these customers that would be superspecial?
”
”
Seth Godin (Purple Cow: Transform Your Business by Being Remarkable)
“
The devil you know" may be the saying, but crazy is always a million times more interesting when you're just getting introduced, shaking hands, and deciding whether or not you're going to give your real email address.
”
”
Alison Umminger
“
He made it to the front door before he looked back at her. Then his eyes grew wide. “Oh! I almost forgot.” He came back over to her and handed her a card.
“These are my numbers, e-mail addresses, business URL, physical address, and mailing address. You know…if you need to get in touch with me.”
Get in touch with him? But he left out his social security number, his date of birth, and his high school GPA.
”
”
Shelly Laurenston (The Mane Squeeze (Pride, #4))
“
Borderline means you’re one of those girls…
…who walk around wearing long sleeves in the summer because you’ve carved up your forearms over your boyfriend. You make pathetic suicidal gestures and write bad poetry about them, listen to Ani DiFranco albums on endless repeat, end up in the emergency room for overdoses, scare off boyfriends by insisting they tell you that they love you five hundred times a day and hacking into their email to make sure they’re not lying, have a police record for shoplifting, and your tooth enamel is eroded from purging. You’ve had five addresses and eight jobs in three years, your friends are avoiding your phone calls, you’re questioning your sexuality, and the credit card companies are after you. It took a lot of years to admit that I was exactly that girl, and that the diagnostic criteria for the disorder were essentially an outline of my life.
”
”
Stacy Pershall (Loud in the House of Myself: Memoir of a Strange Girl)
“
You shouldn't believe everything you read on the Internet, especially from sites that can be edited by anyone with a working email address.
”
”
Mikhail Gorbachev
“
Jenna and I had spent one very boring Magical Evolution class speculating on what her e-mail address might be. Jenna thought it was probably something dull, like just her name, but my personal vote (and a ten-dollar bet) was for HexyLady@hecatehall.edu. I guess now I could find out.
”
”
Rachel Hawkins (Demonglass (Hex Hall, #2))
“
I flipped it over: Ping Xi's business card with his name, number, e-mail address, and the corniest quotation I'd ever read: "Every act of creation is an act of destruction.—Pablo Picasso
”
”
Ottessa Moshfegh (My Year of Rest and Relaxation)
“
I have been a happy man ever since January 1, 1990, when I no longer had an email address. I’d used email since about 1975, and it seems to me that 15 years of email is plenty for one lifetime. Email is a wonderful thing for people whose role in life is to be on top of things. But not for me; my role is to be on the bottom of things. What I do takes long hours of studying and uninterruptible concentration. Knuth
”
”
Cal Newport (Deep Work: Rules for Focused Success in a Distracted World)
“
Dear Mr. Peter Van Houten
(c/o Lidewij Vliegenthart),
My name is Hazel Grace Lancaster. My friend Augustus Waters, who read An Imperial Affliction at my recommendationtion, just received an email from you at this address. I hope you will not mind that Augustus shared that email with me.
Mr. Van Houten, I understand from your email to Augustus that you are not planning to publish any more books. In a way, I am disappointed, but I'm also relieved: I never have to worry whether your next book will live up to the magnificent perfection of the original. As a three-year survivor of Stage IV cancer, I can tell you that you got everything right in An Imperial Affliction. Or at least you got me right. Your book has a way of telling me what I'm feeling before I even feel it, and I've reread it dozens of times.
I wonder, though, if you would mind answering a couple questions I have about what happens after the end of the novel. I understand the book ends because Anna dies or becomes too ill to continue writing it, but I would really like to mom-wether she married the Dutch Tulip Man, whether she ever has another child, and whether she stays at 917 W. Temple etc. Also, is the Dutch Tulip Man a fraud or does he really love them? What happens to Anna's friends-particularly Claire and Jake? Do they stay that this is the kind of deep and thoughtful question you always hoped your readers would ask-what becomes of Sisyphus the Hamster? These questions have haunted me for years-and I don't know long I have left to get answers to them.
I know these are not important literary questions and that your book is full of important literally questions, but I would just really like to know.
And of course, if you ever do decide to write anything else, even if you don't want to publish it. I'd love to read it. Frankly, I'd read your grocery lists.
Yours with great admiration,
Hazel Grace Lancaster (age 16)
”
”
John Green (The Fault in Our Stars)
“
He watches me eat for a moment. “Let me see it again.”
“No.”
“Okay.” He pulls a can of carbonated water out of his backpack and pops the lid.
Sometimes I want to punch him. I find the letter and slide it across the table.
He reads it again. It makes me feel all jittery inside.
His eyes flick up. “She likes you.”
I shrug and steal his drink. It tastes like someone drowned an orange in a bottle of Perrier, and I cough.
Rev smiles. “You like her.”
“How can you drink this crap?”
His smile widens. “Is it making you crazy that she won’t reveal herself?”
“Seriously, Rev, do you have any regular water?”
He’s no fool. “What do you want to do?”
I take a long breath and blow it out. I run a hand through my hair. “I don’t know.”
“You know.”
“I want to stake out the grave. This waiting between letters is killing me.”
“Suggest email.”
“She doesn’t want to tell me anything more than her age. She’s not going to give me her email address.”
“Maybe not her real email. But you could set up a private account and give her the address. See if she writes you.”
It’s so simple it’s brilliant. I hate that I didn’t think of it. “Rev, I could kiss you.”
“Brush your teeth first.” He reclaims his bizarre can of water.
”
”
Brigid Kemmerer (Letters to the Lost (Letters to the Lost, #1))
“
Why didn't I ask him for his number, address, e-mail — anything? Why? Because I'm in a sodding war zone, that's why. And I'm a soldier. And this wasn't supposed to happen.
”
”
David Massey (Torn)
“
Oh yes, I have that email address for Mike. It's protectingyourass@all-times.com.
”
”
Brian Horeck (Minnow Trap)
“
Someone is getting excited. Somebody somewhere is shaking with excitement because something tremendous is about to happen to this person. This person has dressed for the occasion. This person has hoped and dreamed and now it is really happening and this person can hardly believe it. But believing is not an issue here, the time for faith and fantasy is over, it is really really happening. It involves stepping forward and bowing. Possibly there is some kneeling, such as when one is knighted. One is almost never knighted. But this person may kneel and receive a tap on each shoulder with a sword. Or, more likely, this person will be in a car or a store or under a vinyl canopy when it happens. Or online or on the phone. It could be an e-mail re: your knighthood. Or a long, laughing, rambling phone message in which every person this person has ever known is talking on a speakerphone and they are all saying, You have passed the test, it was all just a test, we were only kidding, real life is so much better than that. This person is laughing out loud with relief and playing the message back to get the address of the place where every person this person has ever known is waiting to hug this person and bring her into the fold of life. It is really exciting, and it’s not just a dream, it’s real.
”
”
Miranda July
“
But then one time, you track down an email address and you're near a computer with Internet access so you don't have that nice cushion and you type what you're feeling and press send before you have a chance to talk yourself out of it. And then you wait, and wait, and wait, and nothing comes back, so all those things you thought were so important to say, really, they weren't. They weren't worth saying at all.
”
”
Gayle Forman (I Was Here)
“
My author website doesn’t provide a personal e-mail address, and I didn’t own my first smartphone until 2012 (when my pregnant wife gave me an ultimatum—“you have to have a phone that works before our son is born”).
”
”
Cal Newport (Deep Work: Rules for Focused Success in a Distracted World)
“
I can’t really talk about it, but we’ve just got the English language rights for a really prestigious Swedish author. And everybody has been clamouring to read her debut novel, which is being billed as A Hundred Years of Solitude meets Gone Girl. But there was a lot of debate amongst the team over whether to give it an English title or stick with the Swedish original, and it all wound up being sorted out very last minute and so now the book’s gone to press as I’m Out of the Office at the Moment. Please Forward Any Translation Work to My Personal Email Address.
”
”
Alexis Hall (Boyfriend Material (London Calling, #1))
“
When she greets you in the morning, that's just common politeness. When she drops her handkerchief in front of you, that's carelessness. And when a girl at your part-time job gives you her e-mail address, it's because she wants you to cover her shift. I don't believe in coincidence, fate, or destiny. All you can believe in are company orders.
”
”
Wataru Watari (やはり俺の青春ラブコメはまちがっている。5)
“
ZUCK: Yeah so if you ever need info about anyone at Harvard ZUCK: Just ask. ZUCK: I have over 4,000 emails, pictures, addresses … [REDACTED FRIEND’S NAME]: What? How’d you manage that one? ZUCK: People just submitted it. ZUCK: I don’t know why. ZUCK: They ‘trust me’ ZUCK: Dumb fucks1
”
”
Hannah Fry (Hello World: How to be Human in the Age of the Machine)
“
Zuckerberg began the conversation with a boast, telling one friend that if he ever needed information on anyone at Harvard, he should just say the word: Zuck: i have over 4000 emails, pictures, addresses, sns Friend: what!? how’d you manage that one? Zuck: people just submitted it Zuck: i don’t know why Zuck: they “trust me” Zuck: dumb fucks
”
”
Sheera Frenkel (An Ugly Truth: Inside Facebook's Battle for Domination)
“
A fun thing to do to let off steam after layoffs began was to go into someone's office and send an email from their computer addressed to the entire agency. It might say something simple like "My name is Shaw-NEE! You are captured, Ha! I poopie I poopie I poopie." People came in in the morning and their reaction was so varied.
Jim Jackers read it and immediately sent out an email that we read, "Obviously someone come into my office last night and compossed an email in my name and sent it out to everyone. I apologise for any inconvenience or offence, although it wasn't my fault, and I would appreciate from whoever did this a public apology. I have read that email five times now and I still don't understand it.
”
”
Joshua Ferris (Then We Came to the End)
“
Just click that, supply your email address and first name, and get ready to enjoy an extra story for no extra cost.
”
”
Steve Higgs (The Patricia Fisher Cruise Ship Mysteries Box Set (Patricia Fisher Cruise Ship Mysteries #1-10))
“
I don’t have her number, and sending an email to her school address asking if she was okay after swallowing my cum felt way too weird.
”
”
C.W. Farnsworth (Against All Odds (Holt Hockey #2))
“
where? I couldn’t find anything on Meg’s computer. I found the new email address All_BS
”
”
Gayle Forman (I Was Here)
“
In nearly all cases, the person who is in control of that address can reset the password of any associated services or accounts—merely by requesting a password reset email.
”
”
Brian Krebs (Spam Nation: The Inside Story of Organized Cybercrime — from Global Epidemic to Your Front Door)
“
„I'm setting up an e-mail address that we can all check regularly,' Allie told her. "It's stopmarynow@gmail.com.”
„Cute.
”
”
Neal Shusterman (Everfound (The Skinjacker Trilogy, #3))
“
You only deleted her cell no. and email address after you memorized them
”
”
Subhasis Das (Mom Says No Girlfriend)
“
I had started on the marriage and motherhood beat by accident with a post on my personal, read only by friends, blog called ‘Fifty Shades of Men’. I had written it after buying Fifty Shades of Grey to spice up what Dave and I half-jokingly called our grown up time, and had written a meditation on how the sex wasn’t the sexiest part of the book. “Dear publishers, I will tell you why every woman with a ring on her finger and a car seat in her SUV is devouring this book like the candy she won’t let herself eat.” I had written. “It’s not the fantasy of an impossibly handsome guy who can give you an orgasm just by stroking your nipples. It is instead the fantasy of a guy who can give you everything. Hapless, clueless, barely able to remain upright without assistance, Ana Steele is that unlikeliest of creatures, a college student who doesn’t have an email address, a computer, or a clue. Turns out she doesn’t need any of those things. Here is the dominant Christian Grey and he’ll give her that computer plus an iPad, a beamer, a job, and an identity, sexual and otherwise. No more worrying about what to wear. Christian buys her clothes. No more stress about how to be in the bedroom. Christian makes those decisions. For women who do too much—which includes, dear publishers, pretty much all the women who have enough disposable income to buy your books—this is the ultimate fantasy: not a man who will make you come, but a man who will make agency unnecessary, a man who will choose your adventure for you.
”
”
Jennifer Weiner (All Fall Down)
“
Google controls two-thirds of the US search market. Almost three-quarters of all Internet users have Facebook accounts. Amazon controls about 30% of the US book market, and 70% of the e-book market. Comcast owns about 25% of the US broadband market. These companies have enormous power and control over us simply because of their economic position. They all collect and use our data to increase their market dominance and profitability. When eBay first started, it was easy for buyers and sellers to communicate outside of the eBay system because people’s e-mail addresses were largely public. In 2001, eBay started hiding e-mail addresses; in 2011, it banned e-mail addresses and links in listings; and in 2012, it banned them from user-to-user communications. All of these moves served to position eBay as a powerful intermediary by making it harder for buyers and sellers to take a relationship established inside of eBay and move it outside of eBay.
”
”
Bruce Schneier (Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World)
“
buy your own domain name for ten to twenty dollars per year. You will have an e-mail address that looks like this: yourname@yourdomain.com. This makes a positive, powerful brand impression. 46
”
”
Michael Hyatt (Platform: Get Noticed in a Noisy World)
“
What’s the movie called? he imagined Willem asking, imagined Willem smiling. Dear Comrade, he told Willem, because that was how Willem and he had sometimes addressed their e-mails to each other
”
”
Hanya Yanagihara (A Little Life)
“
Every week seems to bring another luxuriantly creamy envelope, the thickness of a letter-bomb, containing a complex invitation – a triumph of paper engineering – and a comprehensive dossier of phone numbers, email addresses, websites, how to get there, what to wear, where to buy the gifts. Country house hotels are being block-booked, great schools of salmon are being poached, vast marquees are appearing overnight like Bedouin tent cities. Silky grey morning suits and top hats are being hired and worn with an absolutely straight face, and the times are heady and golden for florists and caterers, string quartets and Ceilidh callers, ice sculptors and the makers of disposable cameras. Decent Motown cover-bands are limp with exhaustion. Churches are back in fashion, and these days the happy couple are travelling the short distance from the place of worship to the reception on open-topped London buses, in hot-air balloons, on the backs of matching white stallions, in micro-lite planes. A wedding requires immense reserves of love and commitment and time off work, not least from the guests. Confetti costs eight pounds a box. A bag of rice from the corner shop just won’t cut it anymore.
”
”
David Nicholls (One Day)
“
I write a bunch of form labels on the whiteboard, in a nonsensical order, along with a bunch of randomly sized input boxes. I include first name, last name, address, gender, city, state, email address, etc. Then I tell the interviewee that we’re designing a form to sign up for an email newsletter and to arrange them in the right order. Only people who ask me why I need the users’ gender, or physical address, or really, anything but their email address get a second interview. I won’t hire a designer who doesn’t ask why, and I won’t hire a designer whose desire to arrange boxes is more important than their desire to protect users’ data.
”
”
Mike Monteiro (Ruined by Design: How Designers Destroyed the World, and What We Can Do to Fix It)
“
The work I do is not exactly respectable. But I want to explain how it works without any of the negatives associated with my infamous clients. I’ll show how I manipulated the media for a good cause. A friend of mine recently used some of my advice on trading up the chain for the benefit of the charity he runs. This friend needed to raise money to cover the costs of a community art project, and chose to do it through Kickstarter, the crowdsourced fund-raising platform. With just a few days’ work, he turned an obscure cause into a popular Internet meme and raised nearly ten thousand dollars to expand the charity internationally. Following my instructions, he made a YouTube video for the Kickstarter page showing off his charity’s work. Not a video of the charity’s best work, or even its most important work, but the work that exaggerated certain elements aimed at helping the video spread. (In this case, two or three examples in exotic locations that actually had the least amount of community benefit.) Next, he wrote a short article for a small local blog in Brooklyn and embedded the video. This site was chosen because its stories were often used or picked up by the New York section of the Huffington Post. As expected, the Huffington Post did bite, and ultimately featured the story as local news in both New York City and Los Angeles. Following my advice, he sent an e-mail from a fake address with these links to a reporter at CBS in Los Angeles, who then did a television piece on it—using mostly clips from my friend’s heavily edited video. In anticipation of all of this he’d been active on a channel of the social news site Reddit (where users vote on stories and topics they like) during the weeks leading up to his campaign launch in order to build up some connections on the site. When the CBS News piece came out and the video was up, he was ready to post it all on Reddit. It made the front page almost immediately. This score on Reddit (now bolstered by other press as well) put the story on the radar of what I call the major “cool stuff” blogs—sites like BoingBoing, Laughing Squid, FFFFOUND!, and others—since they get post ideas from Reddit. From this final burst of coverage, money began pouring in, as did volunteers, recognition, and new ideas. With no advertising budget, no publicist, and no experience, his little video did nearly a half million views, and funded his project for the next two years. It went from nothing to something. This may have all been for charity, but it still raises a critical question: What exactly happened? How was it so easy for him to manipulate the media, even for a good cause? He turned one exaggerated amateur video into a news story that was written about independently by dozens of outlets in dozens of markets and did millions of media impressions. It even registered nationally. He had created and then manipulated this attention entirely by himself.
”
”
Ryan Holiday (Trust Me, I'm Lying: Confessions of a Media Manipulator)
“
She wanted to be at home, crowded in with her beloved Parisian-themed knickknacks—all her I LOVE PARIS plaques, miniature Eiffel Towers. All of her passwords and e-mail addresses were variants on Paris, a city she would never see.
”
”
Maggie Nelson (The Argonauts)
“
FatherMichael has entered the room
Wildflower: Ah don’t tell me you’re through a divorce yourself Father?
SureOne: Don’t be silly Wildflower, have a bit of respect! He’s here for the ceremony.
Wildflower: I know that. I was just trying to lighten the atmosphere.
FatherMichael: So have the loving couple arrived yet?
SureOne: No but it’s customary for the bride to be late.
FatherMichael: Well is the groom here?
SingleSam has entered the room
Wildflower: Here he is now. Hello there SingleSam. I think this is the first time ever that both the bride and groom will have to change their names.
SingleSam: Hello all.
Buttercup: Where’s the bride?
LonelyLady: Probably fixing her makeup.
Wildflower: Oh don’t be silly. No one can even see her.
LonelyLady: SingleSam can see her.
SureOne: She’s not doing her makeup; she’s supposed to keep the groom waiting.
SingleSam: No she’s right here on the laptop beside me. She’s just having problems with her password logging in.
SureOne: Doomed from the start.
Divorced_1 has entered the room
Wildflower: Wahoo! Here comes the bride, all dressed in . . .
SingleSam: Black.
Wildflower: How charming.
Buttercup: She’s right to wear black.
Divorced_1: What’s wrong with misery guts today?
LonelyLady: She found a letter from Alex that was written 12 years ago proclaiming his love for her and she doesn’t know what to do.
Divorced_1: Here’s a word of advice. Get over it, he’s married. Now let’s focus the attention on me for a change.
SoOverHim has entered the room
FatherMichael: OK let’s begin. We are gathered here online today to witness the marriage of SingleSam (soon to be “Sam”) and Divorced_1 (soon to be “Married_1”).
SoOverHim: WHAT?? WHAT THE HELL IS GOING ON HERE?
THIS IS A MARRIAGE CEREMONY IN A DIVORCED PEOPLE CHAT ROOM??
Wildflower: Uh-oh, looks like we got ourselves a gate crasher here. Excuse me can we see your wedding invite please?
Divorced_1: Ha ha.
SoOverHim: YOU THINK THIS IS FUNNY? YOU PEOPLE MAKE ME SICK, COMING IN HERE AND TRYING TO
UPSET OTHERS WHO ARE GENUINELY TROUBLED.
Buttercup: Oh we are genuinely troubled alright. And could you please STOP SHOUTING.
LonelyLady: You see SoOverHim, this is where SingleSam and Divorced_1 met for the first time.
SoOverHim: OH I HAVE SEEN IT ALL NOW!
Buttercup: Sshh!
SoOverHim: Sorry. Mind if I stick around?
Divorced_1: Sure grab a pew; just don’t trip over my train.
Wildflower: Ha ha.
FatherMichael: OK we should get on with this; I don’t want to be late for my 2 o’clock. First I have to ask, is there anyone in here who thinks there is any reason why these two should not be married?
LonelyLady: Yes.
SureOne: I could give more than one reason.
Buttercup: Hell yes.
SoOverHim: DON’T DO IT!
FatherMichael: Well I’m afraid this has put me in a very tricky predicament.
Divorced_1: Father we are in a divorced chat room, of course they all object to marriage. Can we get on with it?
FatherMichael: Certainly. Do you Sam take Penelope to be your lawful wedded wife?
SingleSam: I do.
FatherMichael: Do you Penelope take Sam to be your lawful wedded husband?
Divorced_1: I do (yeah, yeah my name is Penelope).
FatherMichael: You have already e-mailed your vows to me so by the online power vested in me, I now pronounce you husband and wife. You may kiss the bride. Now if the witnesses could click on the icon to the right of the screen they will find a form to type their names, addresses, and phone numbers. Once that’s filled in just e-mail it off to me. I’ll be off now. Congratulations again.
FatherMichael has left the room
Wildflower: Congrats Sam and Penelope!
Divorced_1: Thanks girls for being here.
SoOverHim: Freaks.
SoOverHim has left the room
”
”
Cecelia Ahern (Love, Rosie)
“
You are allowed to send “unsolicited” emails to businesses. Here are the three core guidelines: The subject and header must not be misleading. You must have a valid physical address in your email. You must include a way to opt-out from future communications.
”
”
Aaron Ross (Predictable Revenue: Turn Your Business Into A Sales Machine With The $100 Million Best Practices Of Salesforce.com)
“
666 HOW TO JOIN ILLUMINATI SECRET SOCIETY FOR MONEY.
Get Rich Quick Join 666 now.
JOIN THE BROTHERHOOD
Money, Power, Fame and Love.
For those who are interested in making money, every good thing comes with money, comes with extra effort. All u need do is a “Spiritual work” and every wicked power delaying your progress wants clear and good things will come to you like, money, favour from people, open doors, business breakthrough, good job.
Note: It’s not a child’s play, it’s for those who are desperate and ready to make a change in their life.
We are seeki¬ng that speci¬al wisdo¬m and knowl¬edge that would set us free from the bonda¬ge to dull and drear¬y every¬day life, while stren¬gthen¬ing us in body, mind and spiri¬t, and bring-ing us the mater¬ial rewar¬ds of wealt¬h, love, and succe¬ss. The Karis¬hika Broth¬erhoo¬d is a true broth¬erhoo¬d of secre¬t knowl¬edge and power¬. Me¬mber s¬hip into our frate¬rnity is free and norma¬lly throu¬gh a thoro¬ugh scree¬ning. We are here to liber¬ate those who need wealt¬h, riche¬s, power¬, prosp¬erity¬, prote¬ction and succe¬ss in all ramif¬icati¬on. Broth¬erhoo¬d offer¬s all initi¬ate membe¬rs growt¬h, wealt¬h, fame, power¬, prosp¬erity and succe¬ss in all areas of heart desir¬es. We don’t deman¬d human sacri¬fice, the use of any human parts or early perso¬nal death as a preco¬nditi¬on for you to becom¬e our membe¬r. W¬ant to join occul¬t in Switzerland how can I join secre¬t socie¬ty or cult to make money¬ how can join occul¬t for riche¬s I want to be rich but I don’t know how etc. how do I do money ritua¬l ho¬w do I join good occul¬t that will not affec¬t me and my famil¬y forev¬er w¬e are now here for you.
K¬indly conta¬ct us on +41767918253 or email: info786@pm.me
Contact Person Agent Adam
Address: Kronenstrasse 25
9230 Flawil
Switzerland
”
”
Adam Silvera
“
Yesterday, where someone had dumped a cat-scratched leather recliner in the weedy empty lot around the corner, an elderly man was found sitting in the chair, quietly disoriented. The recliner looked like a seat on an Amtrak train, in Coach. The man did not seem to know where he was, or how he got there, but he was not fearful, just quiet. He was able to recite his son’s email address and list the son’s many accomplishments to the police whom someone called to help. They were kind when they contacted the man’s son in another state. But this won’t go well, I thought, and chose not to follow the story.
”
”
Amy Hempel (Sing to It: New Stories)
“
Do not check your email at the start of your day if you can help it. This is one of the biggest killers of critical morning energy and momentum. Email is a petition for your time; it’s not a demand that you must respond to immediately. Rarely are there mission-critical obligations to address between 6 and 8 a.m.,
”
”
Chase Jarvis (Creative Calling: Establish a Daily Practice, Infuse Your World with Meaning, and Succeed in Work + Life)
“
And in an ironic twist, Neal Stephenson, the acclaimed cyberpunk author who helped form our popular conception of the Internet age, is near impossible to reach electronically—his website offers no e-mail address and features an essay about why he is purposefully bad at using social media. Here’s how he once explained the omission: “If I organize my life in such a way that I get lots of long, consecutive, uninterrupted time-chunks, I can write novels. [If I instead get interrupted a lot] what replaces it? Instead of a novel that will be around for a long time … there is a bunch of e-mail messages that I have sent out to individual persons.
”
”
Cal Newport (Deep Work: Rules for Focused Success in a Distracted World)
“
A buyer making a purchase in BTCs has only to provide the merchant with personal information relevant to the purchase, for example, the shipping or email address, to pay. Compare this with a credit card purchase, which necessitates the buyer giving enough personal information to enable another party bent on fraud, a hacker or dishonest employee, to make fraudulent purchases with it.
”
”
Phil Champagne (The Book Of Satoshi: The Collected Writings of Bitcoin Creator Satoshi Nakamoto)
“
Yeah, well, she ended up exchanging email addresses with these two. Nothing particularly helpful, but we're looking to establish whether they actually met her - you know, in Real Life," said Wardle.
Strange, thought Strike, how that phrase - so prevalent in childhood to differentiate between the fantasy world of play and the dull adult world of fact - had now come to signify the life that a person had outside the internet.
”
”
Robert Galbraith (Career of Evil (Cormoran Strike, #3))
“
One’s email address serves as an identity online and speaks volumes about a person; it may be telling potential clients, partners or employers a whole lot about you: to be hired or fired. Unfortunately most send negative signals, indicating that: you are not a serious person - you are immature - Unprofessional, - Uncouth. etc. Take a look at your email address again today, get professional, be ethical, respectful, be admirable
”
”
Bernard Kelvin Clive
“
The answer was Stellar Wind. The NSA would eavesdrop freely against Americans and aliens in the United States without probable cause or search warrants. It would mine and assay the electronic records of millions of telephone conversations—both callers and receivers—and the subject lines of e-mails, including names and Internet addresses. Then it would send the refined intelligence to the Bureau for action. Stellar Wind resurrected Cold War tactics with twenty-first-century technology. It let the FBI work with the NSA outside of the limits of the law. As Cheney knew from his days at the White House in the wake of Watergate, the NSA and the FBI had worked that way up until 1972, when the Supreme Court unanimously outlawed warrantless wiretaps. Stellar Wind blew past the Supreme Court on the authority of a dubious opinion sent to the White House the week that the Patriot Act became law. It came from John Yoo, a thirty-four-year-old lawyer in the Justice Department’s Office of Legal Counsel who had clerked for Justice Clarence Thomas. Yoo wrote that the Constitution’s protections against warrantless searches and seizures did not apply to military operations in the United States. The NSA was a military agency; Congress had authorized Bush to use military force; therefore he had the power to use the NSA against anyone anywhere in America. The president was “free from the constraints of the Fourth Amendment,” Yoo wrote. So the FBI would be free as well.
”
”
Tim Weiner (Enemies: A History of the FBI)
“
I need to buy some postcards to send to Mom and Dad,' said Ian, heading up the steas to the Captain's Quill Bookshop. 'I also want to send some funny ones to Jackson and some of my other friends.'
'I'll get one for my mom,' said Zoe.
But as she sorted through the postcards, she remembered her mom was travling all summer without a fixed address, and email was a no-go because Granddad didn't own a computer. She didn't have the addresses of any of her friends with her, either-not that she had many friends.
”
”
Christine Brodien-Jones (The Glass Puzzle)
“
I hate computers. My hatred is entrenched, and I nourish it daily. I’m comfortable with it, and no community outreach program will change my mind. I hate computers for getting their own section in the New York Times and for lengthening commercials with the mention of a Web site address. Who really wants to find out more about Procter & Gamble? Just buy the toothpaste or laundry detergent, and get on with it. I hate them for creating the word org and I hate them for e-mail, which isn’t real mail but a variation of the pointless notes people used to pass in class. I hate computers for replacing the card catalog in the New York Public Library and I hate the way they’ve invaded the movies. I’m not talking about their contribution to the world of special effects. I have nothing against a well-defined mutant or full-scale alien invasion — that’s good technology. I’m talking about their actual presence in any given movie. They’ve become like horses in a western — they may not be the main focus, but everybody seems to have one.
”
”
David Sedaris (Me Talk Pretty One Day)
“
It starts with what customers first see when they visit our Web site. In the United States, we offer free shipping both ways to make the transaction as easy as possible and risk-free for our customers. A lot of customers will order five different pairs of shoes, try them on with five different outfits in the comfort of their living rooms, and then send back the ones that don’t fit or they simply don’t like—free of charge. The additional shipping costs are expensive for us, but we really view those costs as a marketing expense. We also offer a 365-day return policy for people who have trouble committing or making up their minds. At most Web sites, the contact information is usually buried at least five links deep and even when you find it, it’s a form or e-mail address that you can only contact once. We take the exact opposite approach. We put our phone number (1-800-927-7671) at the top of every single page of our Web site, because we actually want to talk to our customers. And we staff our call center 24/7. I personally think it’s kind of funny when I attend marketing or branding conferences and
”
”
Tony Hsieh (Delivering Happiness: A Path to Profits, Passion, and Purpose)
“
this reaction. This was on college campuses, exactly the kind of environment where I had expected curiosity, lively debate, and, yes, the thrill and energy of like-minded activists. Instead almost every campus audience I encountered bristled with anger and protest. I was accustomed to radical Muslim students from my experience as an activist and a politician in Holland. Any time I made a public speech, they would swarm to it in order to shout at me and rant in broken Dutch, in sentences so fractured you wondered how they qualified as students at all. On college campuses in the United States and Canada, by contrast, young and highly articulate people from the Muslim student associations would simply take over the debate. They would send e-mails of protest to the organizers beforehand, such as one (sent by a divinity student at Harvard) that protested that I did not “address anything of substance that actually affects Muslim women’s lives” and that I merely wanted to “trash” Islam. They would stick up posters and hand out pamphlets at the auditorium. Before I’d even stopped speaking they’d be lining up for the microphone, elbowing away all non-Muslims. They spoke in perfect English; they were mostly very well-mannered; and they appeared far better assimilated than their European immigrant counterparts. There were far fewer bearded young men in robes short enough to show their ankles, aping the tradition that says the Prophet’s companions dressed this way out of humility, and fewer girls in hideous black veils. In the United States a radical Muslim student might have a little goatee; a girl may wear a light, attractive headscarf. Their whole demeanor was far less threatening, but they were omnipresent. Some of them would begin by saying how sorry they were for all my terrible suffering, but they would then add that these so-called traumas of mine were aberrant, a “cultural thing,” nothing to do with Islam. In blaming Islam for the oppression of women, they said, I was vilifying them personally, as Muslims. I had failed to understand that Islam is a religion of peace, that the Prophet treated women very well. Several times I was informed that attacking Islam only serves the purpose of something called “colonial feminism,” which in itself was allegedly a pretext for the war on terror and the evil designs of the U.S. government. I was invited to one college to speak as part of a series of
”
”
Ayaan Hirsi Ali (Nomad: From Islam to America: A Personal Journey Through the Clash of Civilizations)
“
Let’s take another familiar example from our own time. Over the last few decades, we have invented countless time-saving devices that are supposed to make life more relaxed – washing machines, vacuum cleaners, dishwashers, telephones, mobile phones, computers, email. Previously it took a lot of work to write a letter, address and stamp an envelope, and take it to the mailbox. It took days or weeks, maybe even months, to get a reply. Nowadays I can dash off an email, send it halfway around the globe, and (if my addressee is online) receive a reply a minute later. I’ve saved all that trouble and time, but do I live a more relaxed life?
”
”
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
“
The facts of the case were straightforward: Hillary Clinton had used her personal email system, on a server and with an email address that was entirely of her own creation, to conduct her work as secretary of state. She set the server up several months after taking office. For the first few months of her tenure, she had used a personal AT&T BlackBerry email address before switching to a Clintonemail.com domain. In the course of doing her work, she emailed with other State employees. In the course of emailing those people, the inspector general discovered, she and they talked about classified topics in the body of dozens of their emails.
”
”
James B. Comey (A Higher Loyalty: Truth, Lies, and Leadership)
“
Technological change is discontinuous. The monks in their scriptoria did not invent the printing press, horse breeders did not invent the motorcar, and the music industry did not invent the iPod or launch iTunes. Early in the new century book publishers, confined within their history and outflanked by unencumbered digital innovators, missed yet another critical opportunity, seized once again by Amazon, this time to build their own universal digital catalog, serving e-book users directly and on their own terms while collecting the names, e-mail addresses, and preferences of their customers. This strategic error will have large consequences.
”
”
Jason Epstein
“
Security is a big and serious deal, but it’s also largely a solved problem. That’s why the average person is quite willing to do their banking online and why nobody is afraid of entering their credit card number on Amazon. At 37signals, we’ve devised a simple security checklist all employees must follow: 1. All computers must use hard drive encryption, like the built-in FileVault feature in Apple’s OS X operating system. This ensures that a lost laptop is merely an inconvenience and an insurance claim, not a company-wide emergency and a scramble to change passwords and worry about what documents might be leaked. 2. Disable automatic login, require a password when waking from sleep, and set the computer to automatically lock after ten inactive minutes. 3. Turn on encryption for all sites you visit, especially critical services like Gmail. These days all sites use something called HTTPS or SSL. Look for the little lock icon in front of the Internet address. (We forced all 37signals products onto SSL a few years back to help with this.) 4. Make sure all smartphones and tablets use lock codes and can be wiped remotely. On the iPhone, you can do this through the “Find iPhone” application. This rule is easily forgotten as we tend to think of these tools as something for the home, but inevitably you’ll check your work email or log into Basecamp using your tablet. A smartphone or tablet needs to be treated with as much respect as your laptop. 5. Use a unique, generated, long-form password for each site you visit, kept by password-managing software, such as 1Password.§ We’re sorry to say, “secretmonkey” is not going to fool anyone. And even if you manage to remember UM6vDjwidQE9C28Z, it’s no good if it’s used on every site and one of them is hacked. (It happens all the time!) 6. Turn on two-factor authentication when using Gmail, so you can’t log in without having access to your cell phone for a login code (this means that someone who gets hold of your login and password also needs to get hold of your phone to login). And keep in mind: if your email security fails, all other online services will fail too, since an intruder can use the “password reset” from any other site to have a new password sent to the email account they now have access to. Creating security protocols and algorithms is the computer equivalent of rocket science, but taking advantage of them isn’t. Take the time to learn the basics and they’ll cease being scary voodoo that you can’t trust. These days, security for your devices is just simple good sense, like putting on your seat belt.
”
”
Jason Fried (Remote: Office Not Required)
“
The primarily thing to know about stress is that it primarily comes from not taking action over something that you can have some control over . Stress comes from ignoring things that you should not be ignoring. If you find that some particular thing is causing you to have stress, that should be a warning flag for you . What it means is if that there is something which you have not completely identified yet in your conscious mind, that is bothering you and if you have not taken any action against it, once as soon as you start writing the first email , text or a phone call to address the situation , it incredibly relieves your stress even if that problem is not resolved .
That works for your job, business, relation or anything that may stress you out.
”
”
Abhishek Luthra
“
Under Musk’s direction, X.com tried out some radical banking concepts. Customers received a $20 cash card just for signing up to use the service and a $10 card for every person they referred. Musk did away with niggling fees and overdraft penalties. In a very modern twist, X.com also built a person-to-person payment system in which you could send someone money just by plugging their e-mail address into the site. The whole idea was to shift away from slow-moving banks with their mainframes taking days to process payments and to create a kind of agile bank account where you could move money around with a couple of clicks on a mouse or an e-mail. This was revolutionary stuff, and more than 200,000 people bought into it and signed up for X.com within the first couple of months of operation.
”
”
Ashlee Vance (Elon Musk: Inventing the Future)
“
Once people get used to a certain luxury, they take it for granted. Then they begin to count on it. Finally they reach a point where they can’t live without it. Let’s take another familiar example from our own time. Over the last few decades, we have invented countless time-saving devices that are supposed to make life more relaxed – washing machines, vacuum cleaners, dishwashers, telephones, mobile phones, computers, email. Previously it took a lot of work to write a letter, address and stamp an envelope, and take it to the mailbox. It took days or weeks, maybe even months, to get a reply. Nowadays I can dash off an email, send it halfway around the globe, and (if my addressee is online) receive a reply a minute later. I’ve saved all that trouble and time, but do I live a more relaxed life?
”
”
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
“
On the other hand, some of the family’s impatience with the public is justified. When I use Federal Express, I accept as a condition of business that its standardized forms must be filled out in printed letters. An e-mail address off by a single character goes nowhere. Transposing two digits in a phone number gets me somebody speaking heatedly in Portuguese. Electronic media tell you instantly when you’ve made an error; with the post office, you have to wait. Haven’t we all at some point tested its humanity? I send mail to friends in Upper Molar, New York (they live in Upper Nyack), and expect a stranger to laugh and deliver it in forty-eight hours. More often than not, the stranger does. With its mission of universal service, the Postal Service is like an urban emergency room contractually obligated to accept every sore throat, pregnancy, and demented parent that comes its way. You may have to wait for hours in a dimly lit corridor. The staff may be short-tempered and dilatory. But eventually you will get treated. In the Central Post Office’s Nixie unit—where mail arrives that has been illegibly or incorrectly addressed—I see street numbers in the seventy thousands; impossible pairings of zip codes and streets; addresses without a name, without a street, without a city; addresses that consist of the description of a building; addresses written in water-based ink that rain has blurred. Skilled Nixie clerks study the orphans one at a time. Either they find a home for them or they apply that most expressive of postal markings, the vermilion finger of accusation that lays the blame squarely on you, the sender.
”
”
Jonathan Franzen (How to Be Alone)
“
One of history’s few iron laws is that luxuries tend to become necessities and to spawn new obligations. Once people get used to a certain luxury, they take it for granted. Then they begin to count on it. Finally they reach a point where they can’t live without it. Let’s take another familiar example from our own time. Over the last few decades, we have invented countless time-saving devices that are supposed to make life more relaxed – washing machines, vacuum cleaners, dishwashers, telephones, mobile phones, computers, email. Previously it took a lot of work to write a letter, address and stamp an envelope, and take it to the mailbox. It took days or weeks, maybe even months, to get a reply. Nowadays I can dash off an email, send it halfway around the globe, and (if my addressee is online) receive a reply a minute later. I’ve saved all that trouble and time, but do I live a more relaxed life?
”
”
Yuval Noah Harari (Sapiens: A Brief History of Humankind)
“
The only way to keep up with all of this work was to do what SpaceX had promised from the beginning: operate in the spirit of a Silicon Valley start-up. Musk was always looking for brainy engineers who had not just done well at school but had done something exceptional with their talents. When he found someone good, Musk was relentless in courting him or her to come to SpaceX. Bryan Gardner, for example, first met Musk at a space rave in the hangars at the Mojave airport and a short while later started talking about a job. Gardner was having some of his academic work sponsored by Northrop Grumman. “Elon said, ‘We’ll buy them out,’” Gardner said. “So, I e-mailed him my resume at two thirty A.M., and he replied back in thirty minutes addressing everything I put in there point by point. He said, ‘When you interview make sure you can talk concretely about what you do rather than use buzzwords.’ It floored me that he would take the time to do this.
”
”
Ashlee Vance (Elon Musk: How the Billionaire CEO of SpaceX and Tesla is Shaping our Future)
“
Kaizong watched Uncle Chen’s solemn expression; watched the young people taking photographs and recordings of the proceedings so that the files could be sent to the email addresses of dead relatives; watched the silent, praying faces, childish or lined, flickering in the flames from the candles and burning incense—and something deep in him was moved. Perhaps there would come a day when everything he was looking at would be replaced by virtual reality, by simulation, by technology, but what couldn’t be replaced was how people longed for those they loved. They needed some ceremony, some platform, some way to cross the border between life and death, to connect the past to the present, to shape the formless memories and longing into objects, acts, or ritualized performances so that the feelings that had been numbed by the passage of time might be reawakened, so that the pain of loss, once heartbreaking and bone-weary, could be recalled along with the endless memories that followed.
”
”
Chen Qiufan (Waste Tide)
“
Julie Seagle stared straight ahead and promised herself one thing: She would never again rent an apartment via Craigslist. The strap of her overstuffed suitcase dug into her shoulder, and she let it drop onto the two suitcases that sat on the sidewalk. It wasn’t as if she had anywhere to carry them now. Julie squinted in disbelief at the flashing neon sign that touted the best burritos in Boston. Rereading the printout of the email again did nothing to change things. Yup, this was the correct address. While she did love a good burrito, and the small restaurant had a certain charm about it, it seemed pretty clear that the one-story building did not include a three-bedroom apartment that could house college students. She sighed and pulled her cell phone from her purse. “Hi, Mom.” “Honey! I gather you made it to Boston? Ohio is missing you already. I can’t believe you’re already off at college. How is the apartment? Have you met your roommates yet?” Julie cleared her throat and looked at the flat roof of the restaurant. “The apartment is…airy. It has a very
”
”
Jessica Park (Flat-Out Love (Flat-Out Love, #1))
“
In one case, the NSA and the UK spy agency Government Communications Headquarters, or GCHQ, used a sophisticated method called Quantum Insert to hack the machines of Belgian telecom workers to gain access to the telecom’s network and to a router the company used for processing the traffic of mobile phone users. The elaborate attack involved using high-speed servers the NSA had set up at key internet switching points to intercept the surfing traffic of system administrators who worked for the telecom. The spy agencies first collected extensive intelligence on the workers—their e-mail addresses, IP addresses, and possible surfing habits—then the high-speed servers watched for requests from the employees’ machines for specific web pages, such as the victim’s own LinkedIn profile page. When the victim tried to access the LinkedIn page, the server would intercept the request before it reached LinkedIn and would feed a fake LinkedIn page to the victim that injected malware into his machine. Once on the system administrator’s machine, the spy agencies could then use his credentials to gain access to other parts of the telecom network to subvert the router.
”
”
Kim Zetter (Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon)
“
On Saturday, March 19, 2016, at 4:34 A.M., John Podesta, the Hillary Clinton campaign chairman, received what looked like an email from Google about his personal Gmail account. “Hi John Someone just used your password to try to sign in to your Google Account,” read the email from “the Gmail Team.” It noted that the attempted intrusion had come from an IP address in Ukraine. The email went on: “Google stopped this sign-in attempt. You should change your password immediately.” The Gmail Team helpfully included a link to a site where Podesta could make the recommended password change. That morning, Podesta forwarded the email to his chief of staff, Sara Latham, who then sent it along to Charles Delavan, a young IT staffer at the Clinton campaign. At 9:54 AM that morning, Delavan replied, “This is a legitimate email. John needs to change his password immediately, and ensure that two-factor authentication is turned on his account… It is absolutely imperative that this is done ASAP.” Delavan later asserted to colleagues that he had committed a typo. He had meant to write that “this is not a legitimate email.” Not everybody on the Clinton campaign would believe him. But Delavan had an argument in his favor. In his response to Latham, he had included the genuine link Podesta needed to use to change his password. Yet for some reason Podesta clicked on the link in the phony email and used a bogus site to create a new password. The Russians now had the keys to his emails and access to the most private messages of Clinton World going back years.
”
”
Michael Isikoff (Russian Roulette: The Inside Story of Putin's War on America and the Election of Donald Trump)
“
Well, my epic freedom moment was short-lived, because I realized my cell phone was dead. I walked down the road to a gas station and asked if I could use the phone. I called Tracy and told her where I was and asked her to pick me up. When Tracy arrived I hopped in the car and the very first thing I said to her was “I gotta get home. I have to print out some TV guides and I need to write a letter to some of the guys in there.” She started laughing and when she could compose herself enough to talk said, “My sisters and I all said we guarantee Noah is going to come out of jail with new friends. He’s going to be friends with everybody.”
I got home and immediately wrote a letter to Michael Bolton. I put my email address at the bottom. I printed out TV guides. I printed out crossword puzzles. I even printed a couple of pages of jokes and riddles and whatever would be fun to read and do and folded them up and put them in an envelope. All that was left to do was to write the address, put a stamp on the envelope, and put it in the mailbox. I put the envelope in the car in between the seat and the center console to take to the post office.
I must have been distracted or had to do something else because the envelope sat there for months. Every so often I would look at it and go, Oh crap, I haven’t sent that yet. And then at some point I spilled something on it so I knew I would never send it now. I threw it out.
To this day I’m worried that one day I’m going to be at the gas station in line and hear a voice behind me say, “I’m Michael Bolton and you never sent me my damn TV guide. You’re just like the rest.” He’s going to shank me in my side and that will be the end of the Noah Galloway story.
”
”
Noah Galloway (Living with No Excuses: The Remarkable Rebirth of an American Soldier)
“
Important: Be sure to put the outgoing email addresses in the BCC field of the email, so that each recipient doesn’t see everyone else you’re sending it to. (Or, you can copy and paste, then send the email to each person individually.) Subject Line: This means a lot… Or Would love to get your opinion… Email Text: Dear friends, family, and colleagues: Thank you so much for reading this email. This isn’t an easy one for me to send, but it is extremely important to me, so I sincerely appreciate you investing your valuable time reading (and hopefully responding to) it. This email is going out to only a select group of people. Each of you knows me well, and I’m hoping will give me honest feedback about my strengths and most importantly, my weaknesses (aka “areas of improvement.”) I’ve never done anything like this before, but I feel that for me grow and improve as a person, I need to get a more accurate picture of how I’m showing up to the people that matter most to me. In order to become the person I need to be to create the life and contribute to others at the levels that I want, I need your feedback. So, all I’m asking is that you take just a few minutes to email me back with what you honestly think are my top 2-3 “areas of improvement.” If it will make you feel better to also list my top 2-3 “strengths” (I’m sure it will make me feel better ), you are definitely welcome to. That’s it. And please don’t sugarcoat it or hold back anything. I will not be offended by anything that you share. In fact, the more “brutally” honest you are, the more leverage it will give me to make positive changes in my life. Thank you again, and if there is anything else I can do to add value to your life, please let me know. With sincere gratitude, Your Name
”
”
Hal Elrod (The Miracle Morning: The Not-So-Obvious Secret Guaranteed to Transform Your Life: Before 8AM)
“
I struggle with an embarrassing affliction, one that as far as I know doesn’t have a website or support group despite its disabling effects on the lives of those of us who’ve somehow contracted it. I can’t remember exactly when I started noticing the symptoms—it’s just one of those things you learn to live with, I guess. You make adjustments. You hope people don’t notice. The irony, obviously, is having gone into a line of work in which this particular infirmity is most likely to stand out, like being a gimpy tango instructor or an acrophobic flight attendant. The affliction I’m speaking of is moral relativism, and you can imagine the catastrophic effects on a critic’s career if the thing were left to run its course unfettered or I had to rely on my own inner compass alone. To be honest, calling it moral relativism may dignify it too much; it’s more like moral wishy-washiness. Critics are supposed to have deeply felt moral outrage about things, be ready to pronounce on or condemn other people’s foibles and failures at a moment’s notice whenever an editor emails requesting twelve hundred words by the day after tomorrow. The severity of your condemnation is the measure of your intellectual seriousness (especially when it comes to other people’s literary or aesthetic failures, which, for our best critics, register as nothing short of moral turpitude in itself). That’s how critics make their reputations: having take-no-prisoners convictions and expressing them in brutal mots justes. You’d better be right there with that verdict or you’d better just shut the fuck up. But when it comes to moral turpitude and ethical lapses (which happen to be subjects I’ve written on frequently, perversely drawn to the topics likely to expose me at my most irresolute)—it’s like I’m shooting outrage blanks. There I sit, fingers poised on keyboard, one part of me (the ambitious, careerist part) itching to strike, but in my truest soul limply equivocal, particularly when it comes to the many lapses I suspect I’m capable of committing myself, from bad prose to adultery. Every once in a while I succeed in landing a feeble blow or two, but for the most part it’s the limp equivocator who rules the roost—contextualizing, identifying, dithering. And here’s another confession while I’m at it—wow, it feels good to finally come clean about it all. It’s that … once in a while, when I’m feeling especially jellylike, I’ve found myself loitering on the Internet in hopes of—this is embarrassing—cadging a bit of other people’s moral outrage (not exactly in short supply online) concerning whatever subject I’m supposed to be addressing. Sometimes you just need a little shot in the arm, you know? It’s not like I’d crib anyone’s actual sentences (though frankly I have a tough time getting as worked up about plagiarism as other people seem to get—that’s how deep this horrible affliction runs). No, it’s the tranquillity of their moral authority I’m hoping will rub off on me. I confess to having a bit of an online “thing,” for this reason, about New Republic editor-columnist Leon Wieseltier—as everyone knows, one of our leading critical voices and always in high dudgeon about something or other: never fearing to lambaste anyone no matter how far beneath him in the pecking order, never fearing for a moment, when he calls someone out for being preening or self-congratulatory, as he frequently does, that it might be true of himself as well. When I’m in the depths of soft-heartedness, a little dose of Leon is all I need to feel like clambering back on the horse of critical judgment and denouncing someone for something.
”
”
Laura Kipnis (Men: Notes from an Ongoing Investigation)
“
Time management also involves energy management. Sometimes the rationalization for procrastination is wrapped up in the form of the statement “I’m not up to this,” which reflects the fact you feel tired, stressed, or some other uncomfortable state. Consequently, you conclude that you do not have the requisite energy for a task, which is likely combined with a distorted justification for putting it off (e.g., “I have to be at my best or else I will be unable to do it.”).
Similar to reframing time, it is helpful to respond to the “I’m not up to this” reaction by reframing energy. Thinking through the actual behavioral and energy requirements of a job challenges the initial and often distorted reasoning with a more realistic view. Remember, you only need “enough” energy to start the task. Consequently, being “too tired” to unload the dishwasher or put in a load of laundry can be reframed to see these tasks as requiring only a low level of energy and focus.
This sort of reframing can be used to address automatic thoughts about energy on tasks that require a little more get-up-and-go. For example, it is common for people to be on the fence about exercising because of the thought “I’m too tired to exercise.” That assumption can be redirected to consider the energy required for the smaller steps involved in the “exercise script” that serve as the “launch sequence” for getting to the gym (e.g., “Are you too tired to stand up and get your workout clothes? Carry them to the car?” etc.). You can also ask yourself if you have ever seen people at the gym who are slumped over the exercise machines because they ran out of energy from trying to exert themselves when “too tired.” Instead, you can draw on past experience that you will end up feeling better and more energized after exercise; in fact, you will sleep better, be more rested, and have the positive outcome of keeping up with your exercise plan. If nothing else, going through this process rather than giving into the impulse to avoid makes it more likely that you will make a reasoned decision rather than an impulsive one about the task.
A separate energy management issue relevant to keeping plans going is your ability to maintain energy (and thereby your effort) over longer courses of time. Managing ADHD is an endurance sport. It is said that good soccer players find their rest on the field in order to be able to play the full 90 minutes of a game. Similarly, you will have to manage your pace and exertion throughout the day. That is, the choreography of different tasks and obligations in your Daily Planner affects your energy. It is important to engage in self-care throughout your day, including adequate sleep, time for meals, and downtime and recreational activities in order to recharge your battery. Even when sequencing tasks at work, you can follow up a difficult task, such as working on a report, with more administrative tasks, such as responding to e-mails or phone calls that do not require as much mental energy or at least represent a shift to a different mode. Similarly, at home you may take care of various chores earlier in the evening and spend the remaining time relaxing.
A useful reminder is that there are ways to make some chores more tolerable, if not enjoyable, by linking them with preferred activities for which you have more motivation. Folding laundry while watching television, or doing yard work or household chores while listening to music on an iPod are examples of coupling obligations with pleasurable activities. Moreover, these pleasant experiences combined with task completion will likely be rewarding and energizing.
”
”
J. Russell Ramsay (The Adult ADHD Tool Kit)
“
How Do I Get Delta Airlines to Answer? Swift Support
When you need to get Delta Airlines to answer quickly, +1(844)634-0511 the most direct method is to call their customer service number at +1(844)634-0511. By dialing this number, you can immediately speak to a live agent who can help you with a variety of inquiries, including ticket changes, cancellations, +1(844)634-0511 and issues related to your flight. Delta Airlines’ customer service team is available around the clock, ensuring that you can get assistance no matter the time of day or night.
The key to getting Delta Airlines to answer +1(844)634-0511 promptly is to ensure you’re prepared with your booking details, including your ticket number, reservation code, and any other relevant information. This allows the representative to locate your account quickly and resolve your issue efficiently.
One of the benefits of using the +1(844)634-0511 number is that you are guaranteed to speak with a live person who can help with urgent matters such as rebooking a missed flight, modifying your reservation, or addressing a problem +1(844)634-0511 with your boarding pass. If you need immediate assistance with changes to your ticket, cancellation, or refunds, don’t hesitate to call the number.
Additionally, Delta Airlines offers the +1(844)634-0511 option of contacting them via email or their online chat feature. However, these methods can sometimes lead to slower response times, which is why using the phone line at +1(844)634-0511 is the best option for more urgent concerns.
In case your query requires specific expertise, +1(844)634-0511 you may also be directed to the appropriate department. Whether you're looking to switch flights or need help with a refundable ticket, +1(844)634-0511 Delta Airlines will connect you to the right person through their customer service phone line.
Remember, the sooner you call +1(844)634-0511, the quicker you can resolve your issue. Customer service representatives are trained to handle a wide range of questions, so you’ll be in good hands!
”
”
Alexandre Dumas
“
What is the Easiest Way to Contact Delta Airlines? Quick Connect Support
+1(844)634-0511 – The easiest way to contact Delta Airlines is by calling their customer service line at +1(844)634-0511. This direct phone number connects you immediately to a live agent who can assist you with everything from booking changes to name corrections and flight modifications.
When you need assistance with a reservation, whether it’s for making a change to your booking, fixing a spelling error, or updating your boarding pass, calling +1(844)634-0511 is by far the most efficient option. Once you reach a customer service representative, you can discuss any issues, including requesting a replacement ticket, resolving issues with non-refundable fares, or making any necessary adjustments to your reservation details.
Calling +1(844)634-0511 allows you to speak with a real person who can answer all your questions and help with complex inquiries, such as changes due to marriage name updates or other modifications to your ticket. This option saves you time compared to other methods like live chat or email, which may not always provide immediate responses.
If you prefer to get in touch through other channels, Delta Airlines offers live chat and social media support. However, for the most streamlined experience, speaking directly with an agent via +1(844)634-0511 ensures that all your concerns are addressed in real-time. Additionally, you can quickly make adjustments to your flight plans, including canceling or replacing tickets, directly through their customer service team.
Make sure to have all relevant details, such as your booking reference number and personal information, ready when you call +1(844)634-0511 to help speed up the process. With a simple phone call, you can handle any reservation changes, whether it’s a simple name correction or a more significant modification.
Delta Airlines values customer satisfaction, so they make it easy to get in touch with their team. For the easiest, most efficient support, always reach out to them at +1(844)634-0511.
”
”
Alexandre Dumas
“
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
”
”
Edward Snowden (Permanent Record)
“
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons.
Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users.
You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.”
If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you.
Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
”
”
Edward Snowden (Permanent Record)
“
How to Cancel EOS Fitness Membership +1-917-730-8534
EOS Fitness is a popular gym chain that provides affordable memberships and a wide range of fitness options. However, if your circumstances have changed and you need to end your membership, it’s important to know the correct steps to cancel without unnecessary stress. Whether you’re moving, switching gyms, or simply not using the service, here’s a guide on how to cancel your EOS Fitness membership, including contacting support at +1-917-730-8534.
1. Cancel by Phone
The most direct way to cancel your EOS Fitness membership is by calling their customer support. Dial +1-917-730-8534 and ask to speak with a representative. Make sure to have your membership ID, personal details, and billing information ready. The representative will walk you through the cancellation steps and may offer to pause your membership instead. To avoid issues, always ask for a confirmation number or email after canceling.
2. Cancel In Person
Another effective method is visiting your local EOS Fitness club. Go to the front desk and request a cancellation form. You will need to complete and sign the form to process your request. Some locations may ask for identification, so bring a photo ID and your membership card if available. Getting written confirmation ensures your membership is properly canceled.
3. Cancel by Mail
In some cases, EOS Fitness may require a written cancellation request. If so, prepare a letter with your full name, membership ID, billing address, and reason for cancellation. Mail it to the address provided by your local club or customer service. Keep a copy of the letter and proof of mailing for your records.
Important Tips for Cancellation
Review Your Contract: Check the terms and conditions of your agreement, as some memberships may have minimum commitments or cancellation fees.
Cancel Early: Submit your request several days before your billing cycle ends to avoid extra charges.
Keep Proof: Always hold on to your cancellation confirmation in case of billing disputes.
Final Thoughts
Canceling your EOS Fitness membership doesn’t have to be difficult. Whether you choose to call +1-917-730-8534, visit your local gym, or send a written request, following the right process will help you avoid unnecessary charges and ensure a smooth cancellation experience.
”
”
Elon Musk
“
This address book was a snapshot of her world in 1951: layers of friends and acquaintances accumulated over the years, and a few new ones, surely. But who really mattered in this list? Who telephoned her? What numbers did she dial? If someone found our smartphone contacts today, wouldn't they see our favorites, reconstruct the history of our calls, read our texts and emails, listen to our messages? They would know our entires lives. This book of hers was silent as the grave.
”
”
Brigitte Benkemoun (Finding Dora Maar: An Artist, an Address Book, a Life)
“
Your Kindle makes it easy to take your personal documents with you, eliminating the need to print them. You and your approved contacts can email documents to your Kindle. To locate your Send-to-Kindle email address, tap the Quick Actions
”
”
Amazon (Kindle Paperwhite User's Guide)
“
As the next page loaded with another set of 25 emails, his eyes were drawn to the bottom of the screen, where for the first time previously-read messages stood out beneath the bold-type unread ones. There was something powerfully sentimental, almost tangible, about the realization that his dad had sat before a computer somewhere ten years earlier and had clicked on these same messages. The most recent one, received just hours before his parents’ death, was from his mom with the subject line, “re: Li’l Ryan’s Bday”. With a lump developing in his throat, he clicked on the message. His mom had written: “That’s something dads should talk to their sons about ;)” Hmm. Didn’t make sense without context. Below the end of the message he found the option to “show quoted text,” which he clicked on to reveal the entire exchange in reverse chronological order. She had been responding to his dad’s message: “I’m sure he’ll get it. I like the idea, but you better be prepared to have a discussion about the birds and bees. You know how his mind works. He’ll want to know how that baby got in there.” Ryan’s palms grew sweaty as he began to infer what was coming next. Not entirely sure he wanted to continue, but certain he couldn’t stop, he scrolled to the end. The thread had started with his mother’s message, “I’m already showing big-time. Sweaters only get so baggy, and it’s going to be warming up soon. I think tonight would be the perfect time to tell Ryan. I wrapped up a T-shirt for him in one of his presents that says ‘Big Brother’ on it. A birthday surprise! You think he’ll get it?” Having trouble taking in a deep breath, he rose to a stand and slowly backed away from his computer. It wasn’t his nature to ask fate “Why?” or to dwell on whether or not something was “fair.” But this was utterly overwhelming – a knife wound on top of an old scar that had never sufficiently healed. ~~~ Corbett Hermanson peered around the edge of Bradford’s half-open door and knocked gently on the frame. Bradford was sitting at his desk, leafing through a thick binder. He had to have heard the knock, Corbett thought, peeking in, but his attention to the material in the binder remained unbroken. Now regretting his timid first knock, Corbett anxiously debated whether he should knock again, which could be perceived as rude, or try something else to get Bradford’s attention. Ultimately he decided to clear his throat loudly, while standing more prominently in the doorway. Still, Bradford kept his nose buried in the files in front of him. Finally, Corbett knocked more confidently on the door itself. “What!” Bradford demanded. “If you’ve got something to say, just say it!” “Sorry, sir. Wasn’t sure you heard me,” Corbett said, with a nervous chuckle. “Do you think I’m deaf and blind?” Bradford sneered. “Just get on with it already.” “Well sir, I’m sure you recall our conversation a few days back about the potential unauthorized user in our system? It turns out...” “Close the door!” Bradford whispered emphatically, waving his arms wildly for Corbett to stop talking and come all the way into his office. “Sorry, sir,” Corbett said, his cheeks glowing an orange-red hue to match his hair. After self-consciously closing the door behind him, he picked up where he’d left off. “It turns out, he’s quite good at keeping himself hidden. I was right about his not being in Indiana, but behind that location, his IP address bounces
”
”
Dan Koontz (The I.P.O.)
“
Hue To Bach Ma National Park Private Car
If you stay in Hue city and have done the Hue city tour, Hue countryside Tour, and Hue cooking class tour already but still would like to have a full day to admire pure nature. Hue to Bach Ma National Park private car with an English-speaking driver will be a great option.
For more information about Private Tours, Transfers, please contact us via:
Email: phamvanhoa28@gmail.com
Address: The 1st floor, 17 Tran Thuc Nhan, Vinh Ninh, Hue city.
Phone: +84349825119
Book now to get the full enjoyment of your trip.
”
”
Vietnamvacation
“
When you’re on vacation, avoid the dreaded email pileup upon your return by creating a new email account along the lines of “[Your Name]_Important.” Then set an auto-responder that says not just that you are on vacation and won’t be checking email, but that you won’t be reading the email that accumulates while you’re away. Give the name of someone to contact if people need immediate help, and say that if people really want to talk to you upon your return, they should resend the message to the aforementioned “important” email address, and that you will respond when you’re back. You will be amazed by how few people actually take you up on this. (This is inspired by a German company, Daimler, which automatically deletes employees’ incoming emails while they’re on vacation and tells senders whom to contact if they need immediate help.)
”
”
Catherine Price (How to Break Up with Your Phone, Revised Edition: The 30-Day Digital Detox Plan)
“
a good process-centric message immediately “closes the loop” with respect to the project at hand. When a project is initiated by an e-mail that you send or receive, it squats in your mental landscape—becoming something that’s “on your plate” in the sense that it has been brought to your attention and eventually needs to be addressed.
”
”
Cal Newport (Deep Work: Rules for Focused Success in a Distracted World)
“
I tune in to all the people I’ll see and meet and interact with in the future, through my blogs, teleclasses, radio shows, podcasts, emails, social media, and keynotes. I feel a connection with everyone in my future and everyone in my past. I feel love flowing from my heart to all of them. I carry within me the indelible imprint of that time spent in communion with the infinite. I know that it will infuse my whole day, elevating my mind to a level at which it would never be capable of functioning unless I had centered myself at the start of the day. The insights and ideas that arise in and after meditation are usually at a level of brilliance far above that of which I am capable in my ordinary waking consciousness. From this elevated perspective I’m making connections in a way that my ordinary consciousness cannot match. I know I will find solutions, solve problems, and experience breakthroughs that I would never have had were my daily activities not infused with the wisdom, creativity, clarity, and joy of Bliss Brain. This produces a fundamentally different life from one lived at the level of ordinary consciousness. I lived at that address for a long time before I discovered the ecstasy of connection with the infinite. At that level of ordinary reality, I believed my fears were real. I believed that my limitations were objective facts. I believed that who I was today was determined by my past experiences. My mind was trapped in a small subset of possibilities. Now that I know that the expansive state is possible, and that I can reach it in meditation every day, I see limitless possibilities. I’m no longer stuck in that small local mind that sees problems as real and limitations as facts. When I move into Bliss Brain, I see vistas of possibility in which those problems and limitations cease to exist. They are only real at that limited level of mind, and they disappear when you consciously choose to ascend your awareness to the level of infinite nonlocal mind. You then bring the solutions and possibilities of that level back down to your daily walk through life. This creates a completely different experience than a life trapped in the confinement of local mind.
”
”
Dawson Church (Bliss Brain: The Neuroscience of Remodeling Your Brain for Resilience, Creativity, and Joy)
“
I didn't know how to love like that, in bold gestures. My expressions were small: a folded love note buried in a jacket pocket, a drafted email addressed and sent to no one. Could a quiet love like mine be just as true?
”
”
Madelaine Lucas (Thirst for Salt)
“
Are you looking for a truck wash company offering unparalleled services? Or are you simply looking for a truck wash company whose track record is outstanding? Then Marshal Truck Wash is all you need. We have flexed muscles and dug deep into the market to bring you some of the greatest truck wash services such as acidizing, detailing, offering parts on the site.
More Details:
Address: 12271 Melinda Lane NE, Aurora, Oregon, 97002
Phone: (503) 678-5440
Website: marshaltruckwash.com
Email: m@keyinsure.net
Google My Business: g.page/truckwash-oregon
”
”
Marshal Sunshine Inc
“
The point is this: if you don’t tell somebody how you can help them survive, they will set you aside—or worse, discard you. When it comes to marketing, the header on your website, the subject line of your email, the opening statement of your proposal, the title of your lead generator, your entire elevator pitch, the first line of your keynote address, and a thousand other things need to succinctly express one of the ways you help people survive. If they don’t, people will not listen.
”
”
Donald Miller (Marketing Made Simple: A Step-By-Step Storybrand Guide for Any Business)
“
A common comma error occurs when an e-mail or letter greeting is structured: Hey Jane, Hi Pete, Hello everyone, Howdy stranger, Jane, Pete, everyone, and stranger here are direct addresses that should be set off with commas. Right: Hey, Jane. Right: Hi, Pete. Right: Hello, everyone. Right: Howdy, stranger. Note that these greetings follow a different grammatical structure from the classic Dear John, or Dear Sirs, in which the word dear is an adjective and therefore part of the direct address (part of the noun phrase). Unlike hey and hello, dear is not a complete thought. So it makes sense to follow Dear John with a comma, thereby integrating it into the first sentence of the e-mail or letter. But Hey, Jane and Hi, Pete are complete sentences that can be followed by periods or other terminal punctuation.
”
”
June Casagrande (The Best Punctuation Book, Period: A Comprehensive Guide for Every Writer, Editor, Student, and Businessperson)
“
To find out when other titles are released by this author, please send a quick email to the below address with your email address. Anyone on the mailing list will get to find out when they will be free for one weekend. Copy and paste. gameonboysseries@gmail.com
”
”
Kate Cullen (Game On Boys! The Play Station Play-offs: A Hilarious adventure for children 9-12 with illustrations)
“
Knuth has not had an email address since 1990. “Email is a wonderful thing for people whose role in life is to be on top of things. But not for me; my role is to be on the bottom of things. What I do takes long hours of studying and uninterruptible concentration.” He reviews all his postal mail every three months, and all his faxes every six.
”
”
Brian Christian (Algorithms to Live By: The Computer Science of Human Decisions)
“
Address: 22860 Ladbrook Dr #140, Sterling, VA 20166, USA
Phone: 703-349-5288
Email: social@zippyshelldmv.com
”
”
Zippy Shell Northern Virginia
“
Do you even care that this oh-so-powerful thunderbird is a kid? Who survived a fucking death camp? And is now scared and alone?” Tharion blinked, and she could have strangled him. “I know this is a dick thing to say,” Ithan added, “but if the kid’s got that power, why didn’t he use it to get out of Kavalla himself?” “Maybe he doesn’t know how to use it yet,” Tharion mused. “Maybe he was too weak or tired. I don’t know. But I’ll see you guys later.” He made to step past Bryce. She blocked him again. “Emile aside, Danika wasn’t a rebel, and she didn’t know anyone named Sofie Renast.” Ithan said, “I agree.” Tharion said firmly, “The email was linked to her. And the email address was BansheeFan56—Danika was clearly a Banshees fan. Skim through any of her old social media profiles and there are ten thousand references to her love of that band.
”
”
Sarah J. Maas (House of Sky and Breath (Crescent City, #2))
“
Tharion finished Sofie’s inbox, checked the junk folder, and then finally the trash. It was mostly empty. He clicked open her sent folder, and groaned at the tally. But he began reading again. Click after click after click. His phone chimed with an alert: thirty minutes until he needed to get into the water. He could reach the air lock in five minutes, if he walked fast. He could get through another few emails before then. Click, click, click. Tharion’s phone chimed again. Ten minutes. But he’d halted on an email dated three years ago. It was so simple, so nonsensical that it stood out. Subject: Re: Dusk’s Truth The subject line was weird. But the body of her email was even weirder. Working on gaining access. Will take time. That was it. Tharion scanned downward, toward the original message that Sofie had replied to. It had been sent two weeks before her reply. From: BansheeFan56 Subject: Dusk’s Truth Have you gotten inside yet? I want to know the full story. Tharion scratched his head, opened another window, and searched for Dusk’s Truth. Nothing. No record of a movie or book or TV show. He did a search on the email system for the sender’s name: BansheeFan56. Another half-deleted chain. This one originating from BansheeFan56. Subject: Project Thurr Could be useful to you. Read it. Sofie had replied: Just did. I think it’s a long shot. And the Six will kill me for it. He had a good feeling he knew who “the Six” referred to: the Asteri. But when Tharion searched online for Project Thurr, he found nothing. Only news reports on archaeological digs or art gallery exhibits featuring the ancient demigod. Interesting. There was one other email—in the drafts folder. BansheeFan56 had written: When you find him, lie low in the place I told you about—where the weary souls find relief from their suffering in Lunathion. It’s secure. A rendezvous spot? Tharion scanned what Sofie had started to reply, but never sent. Thank you. I’ll try to pass along the info to my She’d never finished it. There were any number of ways that sentence could have ended. But Sofie must have needed a place where no one would think to look for her and her brother. If Sofie Renast had indeed survived the Hind, she might well have come here, to this very city, with the promise of a safe place to hide. But this stuff about Project Thurr and Dusk’s Truth … He tucked those tidbits away for later. Tharion opened a search field within Declan’s program and typed in the sender’s address. He started as the result came in. Danika Fendyr.
”
”
Sarah J. Maas (House of Sky and Breath (Crescent City, #2))
“
He had called what he felt for Charlotte love and it remained the most profound feeling he had had for any woman. In the pain it had caused him and its lasting after-effects it had more resembled a virus that, even now, he was not sure he had overcome. Not seeing her, never calling her, never using the new email address she had set up to show him her distraught face on the day of her wedding to an old boyfriend: this was his self-prescribed treatment, which was keeping the symptoms at bay. Yet he knew he had been left impaired, that he no longer had the capacity to feel in the way that he had once felt.
”
”
Robert Galbraith (Career of Evil (Cormoran Strike, #3))
“
As Jonathan Haidt and others have demonstrated, people are at their worst when they’re allowed to lob jabs at others behind a shield of anonymity. When their real-world reputations are at risk, they may take more care. I argued in chapter 2 that embracing transparency is a core part of how the Internet can motivate generous behavior. Indeed, I believe it played a key role in Facebook’s early astonishing growth story, gaining its first million users within just a year and then a further six million in the following two. This was not only in spite of being closed off to the general public but likely because of it, too. At that time, every profile was attached to an email address linking to an educational institution, which brought with it a layer of identity authentication. People were accountable to their real-life reputations and suddenly able to build on them in ways unlike ever before. But as this feature slipped by the wayside, and now without a real reputation to uphold, Joe Bloggs switched to User94843 and trolled toward this more toxic future. Bringing back this social dynamic, by requiring users to prove who they are, is perhaps the biggest single step big tech can make toward fostering a genuinely social media environment. There are definitely cases where people living under repressive regimes need ways to use the Internet anonymously. But the mainstream usage of social media should not.
”
”
Chris J. Anderson (Infectious Generosity: The Ultimate Idea Worth Spreading)
“
A rejection letter from the Goodreads Author program invites you to respond to the email while changing the title and re-sending all the information you sent the first time.
Then, that email bounces back rejected with a note that says they no longer use that email address. It advises me to reapply using the same contact form that they originally rejected me with.
The clincher: I was rejected because my website uses a contact form, too.
No thanks, Goodreads.
”
”
Todd Lyons
“
A Call to Action directs your prospects to take a single, simple, obvious action: Visit a website. Enter an email address. Call a phone number. Mail a self-addressed, stamped envelope. Click a button. Purchase a product. Tell a friend.
”
”
Josh Kaufman (The Personal MBA)
“
Here’s the trick to significantly improving your SaaS email marketing skills—you have to become a student of it. This means you should: Start collecting great email copy, CTAs, and designs. Understand the objective behind each and every email that businesses send. Try to understand the rationale behind copy, link, and design decisions. There are great websites like Really Good Emails11, Good Email Copy12, and Good Sales Emails.com13 that you can use for your research. These sites categorize email copy and designs by types. As well as this, you should sign up to receive emails from some of the leading SaaS brands. Those include, among others: Drift MailChimp Pipedrive Shopify SurveyMonkey Trello Wistia Zapier You should also sign up to competing products and mailing lists from companies in your sector. I personally signed up to thousands of products and newsletters. It’s great for benchmarking and research. At the time of writing, I’ve already passively collected more than 60,000 emails. Obviously, don’t sign up to your competitors’ products with a business email address! I have a special email address I use for this. This account allows me to get data, understand what other organizations are doing, and find good copy ideas. For example, here’s what a search for ‘Typeform’ gives me: Figure 18.1 – Inbox Inspiration It’s not uncommon for me to sign up several times to the same product or newsletter. This allows me to see what they have learned and to track the evolution of their email marketing program. At LANDR, we created a shared document to keep track of subject lines, offers, and copy we wanted to test. Our copywriter was even going through his junk mail folder to find ideas and inspiration. There are tests we ran that were inspired by copy found in his spam folder. Some of them turned out to be really successful too—so keep your eyes open for inspiration. You can use Evernote, Paper, or any other platform to collaborate on idea generation. Alternatively, you can subscribe to paid services like Mailcharts14 or Mailody15. These services will help you track and understand your competitors’ email programs. Build processes to find and access copy and design ideas. It will help you create better emails, faster. In the next chapter we’ll get started creating our first email sequences.
”
”
Étienne Garbugli (The SaaS Email Marketing Playbook: Convert Leads, Increase Customer Retention, and Close More Recurring Revenue With Email)
“
Hanging up is a terrific way to keep a variety of items around the house. Using a self-adhesive pad, hanging over a door hook, or attaching to a shelf – you don't always need to drill a hole – is usually all it takes to install a hook.
You receive a convenient way to store items that takes up no room on the floor, in drawers, or in cabinets – your items are actually suspended in mid-air, ready to use. That's why clever folks incorporate hooks into their storage strategy. Hooks are often underestimated, but once you examine our assortment of over the door storage organizers, you'll find that they can be easy, stylish, efficient, and even amusing ways to store items.
The following are the top three most popular hook:
Door Hooks Hanger
Over the door Hooks
Clothes Storage bag
Over the door storage Organizer
Coat hooks over the door
Hooks are useful for keeping your home tidy and structured, but they may also be used as ornamental elements. Whether you're searching for Door hooks to hang your towels or coat hooks for the hallway, our extensive collection has a broad array of esthetically pleasing hooks in a range of styles.
Coat hooks over the door take the following in your home.
We have a large selection of gorgeous hook racks in addition to our single wall hooks and coat hooks. Hook racks are ideal for keeping things organised and for families. If you're looking for clothes storage bag for the corridors, hook racks for the bathroom, or even hook racks for the kitchen, you'll find plenty of alternatives here.
Which hooks and Coat hooks over the door are the most popular?
Hooks and hook racks of various forms and styles can be found in our large selection of storage solutions and organisers. Popular brands like Menu, GUBI, and Muuto offer Door hooks hanger.
Contact Us:
Unjumbly - Over the door storage organizer
Address: 172 Center Street, Suite 202 PO Box 2869 New Jackson, WY 83001
Call Us: +447864166059
Email: info@unjumbly.com
”
”
Arun
“
Quick Gmail Trick Noah and I both use the Gmail “+” trick all the time. Let’s say your email address is bob@bobsmith.com. After signing up for services or newsletters, how can you tell who’s sharing your email, or contain the damage if someone discovers your login email? Companies get hacked all the time. Just use + as cheap insurance. If you append + and a word to the beginning, messages will still get delivered to your inbox. Signing up for Instacart, for instance? You could use bob+insta@bobsmith.com. I use this, or benefit from it, on a daily basis.
”
”
Timothy Ferriss (Tools of Titans: The Tactics, Routines, and Habits of Billionaires, Icons, and World-Class Performers)
“
In the internal paper, the employee explained that Trump had outspent Clinton between June and November, paying Facebook $44 million compared to her $28 million. And, with Facebook’s guidance, his campaign had operated like a tech company, rapidly testing ads using Facebook’s software until they found the perfect messaging for various audiences. Trump’s campaign had a total of 5.9 million different versions of his ads, compared to Clinton’s 66,000, in a way that “better leveraged Facebook’s ability to optimize for outcomes,” the employee said. Most of Trump’s ads asked people to perform an action, like donating or signing up for a list, making it easier for a computer to measure success or failure. Those ads also helped him collect email addresses. Emails were crucial, because Facebook had a tool called Lookalike Audience. When Trump or any advertiser presented a set of emails, Facebook’s software could find more people who thought similarly to the members of the set, based on their behavior and interests. Clinton’s ads, on the other hand, weren’t about getting email addresses. They tended to promote her brand and philosophy.5 Her return on investment would be harder for Facebook’s system to measure and improve through software. Her campaign also barely used the Lookalike tool.
”
”
Sarah Frier (No Filter: The inside story of Instagram)
“
SMTP Server for Bulk Emails Technology at Mails2 inbox
Mails2 Inbox takes pride in being just one of India's best and most dependable SMTP email relay and delivery services. For SMEs and large businesses that receive hundreds and thousands of mails each month, we find a multitude of various SMTP server products. We guarantee that your experience is at the core of all we have as a Best SMTP server in India.
We're dedicated to providing a reliable SMTP server for mass mailing, as well as the most vital delivery and marketing services. Our main goal is to free up your time so you can concentrate on marketing and expanding your company while we handle critical business communication functions.
Email Marketing's Buy SMTP Servers
We wish to focus your attention on collecting authentic emails, signups, and registers before you choose an SMTP service.
If your contact list is full of spam and bogus addresses, you can get prohibited while using an SMTP provider India, regardless of the form of email you send. It's also a lot of work to fix!
What Is an SMTP Server and How Does It Send Email?
Sending an email appears to be a simple task: just enter in your message and recipients, then click send. All of the tasks in the background, though, add up to a complicated procedure.
To begin, you must use an email application called as a client to construct a message. The client gathers all of the email data (message, recipient, subject line, date, and time) and transmits it to an SMTP server for bulk emails in one package. Your email service provider, including Google, Yahoo, AOL, Hotmail, Outlook, and others, mostly used the SMTP server.
SMTP Provider India Mails Server
SMTP is an email delivery technology that works across public IP (Internet Protocol) networks. India is frequently cited as the finest place to send your electronic mail message. You'll need to purchase a Smtp to interact directly with your computer, whether it's your own Computer or a web application.
Mails2 inbox is regarded as one of India's leading email marketing and SMTP server hosting companies. In Various parts of India, Mails2 inbox is a reputable name in the field of digital email marketing; we offer high-quality bulk electronic mailing and bulk email marketing products.
Utilizing Us SMTP Bulk Email Service Providers to Email :-
We at Mails2 inbox understand how convenient it is to send transactional emails and email marketing campaigns. Our SMTP servers capabilities are versatile and advantageous to a successful SMTP relay server. It's simple and quick to publish an unlimited number of both transactional and promotional emails to those people on your email list.
What it takes to establish an SMTP server (Links), how much the best SMTP server in India costs, how the electronic mail distribution process works, and how to decode and sort out certain commonly reported SMTP warning messages all are addressed in the Smtp settings area. Determine how to secure an SMTP server by gathering information (Link).
To send an email using our SMTP bulk email service providers (Link), simply input your account and password. Our experts can also assist you in changing your electronic mail configuration and setting up your account so that you can easily send bulk mail.
Contact Us:
Mails2 inbox
Address: 101 Behjat Palace, HK St, Surat, Gujarat 395002, India
Call Us: +91 8780424579
Email Us: info@impactdesigners.com
”
”
impact designners
“
Around the same time, a user with the same handle had also asked for programming help on a coding forum. On that page, altoid had listed his email address: rossulbricht@gmail.com.
”
”
Andy Greenberg (Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency)
“
This week, I was ever so lucky to retrieve only one text, returning my multiple calls and messages. I stare at it again, almost in disbelief that she has the balls for such a forward reply.
“I’ll reach out when I’m ready and can tolerate your presence. Wait patiently like a good boy. It will most likely be forever.”
There was no query about how I obtained her number or email address. No mention of the money she’d taken from me. Nothing. And calling me a “good boy” really pisses me off.
”
”
Kia Carrington-Russell (Cunning Vows (Lethal Vows, #3))