Tip Your Server Quotes

We've searched our database for all the quotes and captions related to Tip Your Server. Here they are! All 9 of them:

Eat at a local restaurant tonight. Get the cream sauce. Have a cold pint at 4 o’clock in a mostly empty bar. Go somewhere you’ve never been. Listen to someone you think may have nothing in common with you. Order the steak rare. Eat an oyster. Have a Negroni. Have two. Be open to a world where you may not understand or agree with the person next to you, but have a drink with them anyways. Eat slowly. Tip your server. Check in on your friends. Check in on yourself. Enjoy the ride.
Anthony Bourdain
When you stiff servers on the tip, you’re really screwing them over. Waiters in the United States, with few exceptions, are not paid a salary. We don’t even make minimum wage. In the state of New York, tipped workers are paid $4.60 an hour. That’s below the state’s minimum wage of $7.15 per hour.
Steve Dublanica (Waiter Rant: Thanks for the Tip-Confessions of a Cynical Waiter)
I use the following scenario in my classes to illustrate the nature of the moral circle. Imagine, I ask my students, that your best friend just got a job waiting tables at a restaurant. To celebrate with her you arrange with friends to go to the restaurant to eat dinner on her first night. You ask to be seated in her section and look forward to surprising her and, later, leaving her a big tip. Soon your friend arrives at your table, sweating and stressed out. She is having a terrible night. Things are going badly and she is behind getting food and drinks out. So, I ask my students, what do you do? Easily and naturally the students respond, “We’d say, ‘Don’t worry about us. Take care of everyone else first.’” I point out to the students that this response is no great moral struggle. It’s a simple and easy response. Like breathing. It is just natural to extend grace to a suffering friend. Why? Because she is inside our moral circle. But imagine, I continue with the students, that you go out to eat tonight with some friends. And your server, whom you vaguely notice seems stressed out, performs poorly. You don’t get good service. What do you do in that situation? Well, since this stranger is not a part of our moral circle, we get frustrated and angry. The server is a tool and she is not performing properly. She is inconveniencing us. So, we complain to the manager and refuse to tip. In the end, we fail to treat another human being with mercy and dignity. Why? Because in a deep psychological sense, this server wasn’t really “human” to us. She was a part of the “backdrop” of our lives, part of the teeming anonymous masses toward which I feel indifference, fear, or frustration. The server is on the “outside” of my moral circle.
Richard Beck (Unclean: Meditations on Purity, Hospitality, and Mortality)
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
Edward Snowden (Permanent Record)
Imagine yourself sitting at a computer, about to visit a website. You open a Web browser, type in a URL, and hit Enter. The URL is, in effect, a request, and this request goes out in search of its destination server. Somewhere in the midst of its travels, however, before your request gets to that server, it will have to pass through TURBULENCE, one of the NSA’s most powerful weapons. Specifically, your request passes through a few black servers stacked on top of one another, together about the size of a four-shelf bookcase. These are installed in special rooms at major private telecommunications buildings throughout allied countries, as well as in US embassies and on US military bases, and contain two critical tools. The first, TURMOIL, handles “passive collection,” making a copy of the data coming through. The second, TURBINE, is in charge of “active collection”—that is, actively tampering with the users. You can think of TURMOIL as a guard positioned at an invisible firewall through which Internet traffic must pass. Seeing your request, it checks its metadata for selectors, or criteria, that mark it as deserving of more scrutiny. Those selectors can be whatever the NSA chooses, whatever the NSA finds suspicious: a particular email address, credit card, or phone number; the geographic origin or destination of your Internet activity; or just certain keywords such as “anonymous Internet proxy” or “protest.” If TURMOIL flags your traffic as suspicious, it tips it over to TURBINE, which diverts your request to the NSA’s servers. There, algorithms decide which of the agency’s exploits—malware programs—to use against you. This choice is based on the type of website you’re trying to visit as much as on your computer’s software and Internet connection. These chosen exploits are sent back to TURBINE (by programs of the QUANTUM suite, if you’re wondering), which injects them into the traffic channel and delivers them to you along with whatever website you requested. The end result: you get all the content you want, along with all the surveillance you don’t, and it all happens in less than 686 milliseconds. Completely unbeknownst to you. Once the exploits are on your computer, the NSA can access not just your metadata, but your data as well. Your entire digital life now belongs to them.
Edward Snowden (Permanent Record)
For the uninitiated, oryoki is a baffling combo of a meal and a shell game. It goes something like this: You start the game with three nested bowls, a pair of chopsticks, a little wooden paddle with a cotton tip, and a cloth or straw place mat—all of which are wrapped like a gift in a generous napkin, whose ends are knotted so the tails stick up and the whole package can be quickly undone. If you are not expert, it is not so easy to undo the knot, spread the cloth, and organize your bowls before the servers start zipping around with the first of three vats—say, vegetable gruel, some sweet potatoes or scrambled eggs, and maybe a salad. The servers arrive at your place long before your bowls are properly aligned. (Also, your chopsticks were supposed to be laid out like compass needles; they point in one direction before you eat and end up in the opposite direction and balanced on one of the bowls when the wooden clapper signals the end of this ordeal.) You can waste a lot of time surveying your neighbors' arrangements, and, thus, barely get a bite to eat. There are also some secret hand signals you have to master to indicate to the servers whether you want the soup, and how much, and if you don't give the proper Stop! sign, you are supplied with way too much gruel or sweet potatoes, and then the lickety-split meal is ending and someone is stand- ing before you with a giant kettle of boiling water, which is aimed at your biggest bowl (which should be empty by now, but you took way too much gruel; learn the hand signals). Here's where the little paddle comes into play; you use it like a big Q-tip to swish and swab the hot water in each bowl in succession—your oryoki will not be otherwise cleaned for a week—and then you drink the dregs, and stack and wrap the bowls up as fast as you can.
Michael Downing (Shoes Outside the Door: Desire, Devotion, and Excess at San Francisco Zen Center)
Aol Customer Service Phone Number (807) 500 3455 Is AOL Mail Down? The most effective method to Find Out the Server Status As to server blackouts, you can wipe out or affirm this as the wellspring of the issue as a rule by actually looking at AOL Mail's server status here: This page gives an account of the server's status, as well as any announced issues that have happened inside the most recent 24 hours. General Issues with AOL and How to Solve Them Coming up next are the normal issues a client could insight with AOL Mail, with investigating tips for potential fixes. Except if in any case indicated, these settings are found under Options > Mail Settings, which is straightforwardly under your username in the upper right corner. If still you have any problem related to the Aol Email call now at AOL Support Number Phone Number(807) 500 3455 .
aolemailnumberservice
Furthermore, when you buy your server from a solid Minecraft hosting firm, you are ensured a lot of user support to help you exploit your gaming experience. All things considered, would you not use your valuable time on an exciting adventure with your mates instead of handling the technical challenges on your server? Making a Minecraft server is very simple with the assistance of an equipped Minecraft host company. There are many server hosting companies out there that specialize in Minecraft host services. Working with a capable Minecraft hosting company will empower you to take just a couple of moments to come up with a good built Control Panel that affords you total command over your server in addition to your gaming. A portion of the advantages of quality Minecraft host services incorporate empowering you to start your server, reboot or manage users in the network with only a couple of clicks. Additionally, you will likewise profit faster and simple access to your server from any area. Fundamentally, you will have total control to play Minecraft when you feel like and based on your requests.
Fred Cougar (Minecraft Handbook: The Unofficial Diary by an Old Hand Minecrafter. Become a Master of Mining and Building. The Ultimate Guide for Tips and Secret To Being a Better Minecrafter.)
The party spills over with guests, from the ballroom to the front lawn. It’s nighttime, but the house is lit up, bright as the sun. All around me diamonds glitter. We’ve reached that tipping point where everyone is sloshed enough to smile, but not so much they start to slur. There’s almost too many people, almost too much alcohol. Almost too much wealth in one room. It reminds me of Icarus, with his wings of feather and wax. If Icarus had a five-hundred-person guest list for his graduation party. It reminds me of flying too close to the sun. I snag a flute of champagne from one of the servers, who pretends not to see. The bubbles tickle my nose as I take a detour through the kitchen. Rosita stands at the stove, stirring her world-famous jambalaya in a large cast iron pot. The spices pull me close. I reach for a spoon. “Is it ready yet?” She slaps my hand away. “You’ll ruin your pretty dress. It’ll be ready when it’s ready.” We have caterers who make food for all our events, but since this is my graduation party, Rosita agreed to make my favorite dish. She’s going to spoon some onto little puff pastry cups and call it a canape. I try to pout, but everything is too perfect for that. Only one thing is missing from this picture. I give her a kiss on the cheek. “Thanks, Rosita. Have you seen Daddy?” “Where he always is, most likely.” That’s what I’m afraid of. Then I’m through the swinging door that leads into the private side of the house. I pass Gerty, our event planner, who’s muttering about guests who aren’t on the invite list. I head up the familiar oak staircase, breathing in the scent of our house. There’s something so comforting about it. I’m going to miss everything when I leave for college. At the top of the stairs, I hear men’s voices. That isn’t unusual. I’m around the corner from Daddy’s offic
Skye Warren (The Pawn (Endgame, #1))