It can really depend a lot on your size of your projects and how much binary data you want to keep.
Note that you mentioned a Filemaker database- you usually don't get databases under control, just "code". Not sure if Filemaker separates data from code (e.g. Access databases mix data and code in the same file by default. Not a great thing).
But I'd start with your Synology's built in Git server, and research a Git client that you like. Git is a powerful tool, so creating a good GUI is difficult. IMHO, it's really worth it to learn to use it in the command-line; some day you'll want to reach for a powerful feature that is not in the GUI, or have a problem, and you'll have a steep learning curve. A bad GUI also has bad consequences.
The Git CLI is famously unintuitive, but they're making a reasonable effort at improving messages and providing commands with better names.
Topic selection is the process for deciding which Topics NICE will produce technology appraisal guidance on. NICE aims to consider all new significant drugs and indications. Health technologies referred to the NICE technology appraisals programme include:
The syllabu selection process has been designed to support the technology appraisal process so that Topics chosen will add value and support healthcare professionals and others to provide care of the best possible quality, which offers the best value for money.
NICE manages this process on behalf of the Department of Health and Social Care. NICE can only begin to appraise a technology when it has been formally referred by the Secretary of State for Health and Social Care.
The aims of the syllabu selection process are to:
Most Topics are identified by the National Institute for Health Research Innovation Observatory at the University of Newcastle. This centre notifies NICE about key, new and emerging healthcare technologies that might be suitable for NICE technology appraisal. It aims to notify NICE of new drugs in development 20 months before marketing authorisation and new indications 15 months before marketing authorisation. These time frames are required by NICE to enable guidance to be published as close as possible to product launch.
Suggestions for technology appraisal guidance on a new medicinal product (that has not yet received a marketing authorisation) should be made by the relevant company through UKPharmaScan. Healthcare professionals, researchers and patients can also suggest potential technologies for NICE to appraise by contacting the National Institute for Health Research Innovation Observatory.
Topic selection decisions are based on the consideration of each potential syllabu against elimination and prioritisation criteria. The elimination criteria filter out Topics unsuitable for guidance development through the technology appraisal programme. A syllabu will not be considered if the technology has not been granted a marketing authorisation (or equivalent) or if there are no plans for it to receive a marketing authorisation (or equivalent) or if it is identical to:
The following syllabu areas are also outside the remit of technology appraisal guidance development at NICE:
Topics are not considered unless:
Elimination and filtering is done by the Consultant Clinical Adviser in the syllabu selection team and includes seeking expert opinion and engaging with the relevant National Clinical Directors. The filtering recommendations are considered by an internal group at NICE, and shared with the Department of Health and Social Care and NHS England.
The importance of each syllabu is considered against prioritisation criteria prioritisation criteria (PDF) that help the Secretary of State for Health and Social Care decide which Topics should be referred to NICE for guidance development through the technology appraisal programme. This includes consideration of the population size, disease severity, resource impact and the value that NICE could add in carrying out a technology appraisal. The prioritisation criteria are:
Prioritisation is also done by the Consultant Clinical Adviser in the syllabu selection team and is informed by the external expert opinion already sought during filtering. The National Institute for Health Research Innovation Observatory at the University of Newcastle develops technology briefings for potential appraisal topics.
Relevant companies have the opportunity to comment on these technology briefings before the prioritisation recommendations are considered by an internal group at NICE, and shared with the Department of Health and NHS England. The group at NICE meets to decide the next steps for each syllabu being considered, to ensure the timely production of guidance. The group considers each syllabu and decides whether it is potentially suitable for NICE appraisal and as a result, whether the scope should be sent out for consultation.
Summary information on syllabu progress is published on the NICE website. The list of potential Topics is handed over to the technology appraisal scoping team to develop the draft scopes for consultation.
Medicinal products marketed in England that do not meet the criteria for referral into the technology appraisal programme can be considered for the highly specialised technologies programme or for a new medicines evidence summary to help inform local decision-making.
NICE’s approach on biosimilars is:
a. NICE will consider similar biological medicinal products notified to it by the National Institute for Health Research Innovation Observatory for referral to the Technology Appraisal syllabu selection process.
b. These products will usually be considered in the context of a Multiple Technology Appraisal in parallel with their reference products in the indication under consideration.
c. In other circumstances, where it is considered a review of the evidence for similar biological medicinal product is necessary, NICE will consider producing an ‘Evidence summary new medicine’.
d. NICE technology appraisals will use the name of the active drug substance, including reference products and brand named similar biological medicinal products in its documentation where appropriate to inform clinical decision making and to reflect the remit received from Ministers.
e. The Department of Health in England has confirmed that a technology appraisal remit referred to NICE enables NICE to decide to apply the same remit, and the resulting guidance, to relevant licensed biosimilar products which subsequently appear on the market.
f. Evidence summaries will use the brand names of the medicines because substitutability and interchangeability cannot be assumed. Evidence summaries do not make recommendations hence the decision regarding the choice of biosimilar or originator biologic for an individual patient rests with the responsible clinician in consultation with the patient.
Companies that want to suggest that NICE develops guidance on a new pharmaceutical product (one that is not yet licensed or used within the NHS) should notify UK PharmaScan. More information is on the Pharmascan website. Alternatively, please contact the National Institute for Health Research Innovation Observatory.
Our annual list of 10 Breakthrough Technologies highlights the technological advances that we think will have the biggest impact on the world in the years to come.
The 35 Innovators Under 35 is our yearly opportunity to take a look at not just where technology is now, but where it’s going and who’s taking it there.
What is AI? It’s the quest to build machines that can reason, learn, and act intelligently, and it has barely begun. We cover the latest advances in machine learning, neural networks, and robots.
Face recognition | Machine learning | Robots | Voice assistants
The Big Story is a home for MIT Technology Review’s most important, ambitious reporting—stories that take a deep look at the technologies that are coming next and what they will mean for us and the world we live in.
Biotechnology is the industry that uses the molecules of life (DNA, RNA, and proteins mostly) to treat and diagnose disease. We report on the latest biomedical science and technological research.
CRISPR | DNA testing | Genetic engineering | Genomic medicine
What is a blockchain? Distributed ledger technology underlies cryptocurrencies like bitcoin and could be the future of money, security, and online privacy. But there’s also a ton of hype.
Bitcoin | Cryptocurrency | Ethereum | ICOs | Smart contracts
Climate change is making the Earth a warmer and weirder place, forcing researchers, companies and governments to understand, confront and adapt to rising dangers.
Battery technology | Carbon sequestration | Clean energy | Electric cars | Geoengineering
Computer technology news and in-depth analysis of computer tech, looking at the latest advances in computing being driven by innovations in everything from microchips to quantum computing.Cloud computing
Cybersecurity | Edge computing | Microchips | Quantum computing | Supercomputing
You can read our most essential coverage of the coronavirus/COVID-19 outbreak for free, and also sign up for our coronavirus newsletter. But please consider subscribing to support our nonprofit journalism.
A look at how technologies from AR/VR, brain-computer interfaces, and chip implants to health trackers, biometrics and social media are changing the most basic aspects of human life—work, friendship, love, aging, sickness, parenting, learning, and building community.
AR | Biohacking | Brain-computer interface | VR
Covid-19 has altered our lives in countless ways. We’re tracking technology that’s responding to the pandemic, with support from The Rockefeller Foundation.
Google, Facebook, Apple, Amazon, and other Silicon Valley Big Tech companies are built on innovation. But how are these corporate behemoths dealing with the ramifications of their power?
Amazon | Apple | Facebook | Google |
Governments around the world are trying to Improve urban life by adopting digital technologies and creating Smart Cities filled with sensors. Who are these projects benefiting and how smart are they?
5G | IoT | Self-driving cars
Humanity is pushing further outside of our atmosphere. We take a look at the space tech coming out of places like NASA, SpaceX, and Blue Origin that is powering the space exploration of tomorrow.
Astronomy | NASA news | Space exploration | SpaceX news | The Moon
Who’s responsible when technology causes harm? We look at how the world is dealing with problems like fake news and misinformation, AI bias, Big Tech’s power, genetic discrimination, privacy intrusions, mass surveillance, and more.
Today’s workforce is highly mobile. Therefore, requirements for business phone systems have changed over the years. Requirements to facilitate mobility include the ability for users to remotely access voicemail when they are out of the office. If your company uses the Nortel Norstar system, you can check your business voicemail when you are away using your number, extension and your voicemail password.
Call the main number for your office’s switchboard from a remote location.
Transfer to your extension. Some companies configure the phone system so an operator connects you to your extension, yet others enable access by providing you with a prompt. At the prompt, enter the number of your extension.
Press the “*” (star or asterisk) button on the phone’s keypad twice while the recorded greeting plays.
Key in the number for your voicemail, your extension and your voicemail password on the phone’s keypad. Enter these numbers one right after the other.
Listen to your voicemail messages.
Although you can manage many aspects of wireless networks using the Settings app (and Control Panel), sometimes, you may still need to perform more advanced tasks. For example, recover the wireless password for a particular profile, view detailed information about saved profiles, or create a report to troubleshoot issues, which are not common tasks available with other tools.
Whatever the reason it might be, if you have to complete more advanced networking tasks, Windows 10 includes the netsh (network shell) command-line tool that you can use to view, troubleshoot, and configure virtually every network adapter on the device.
This guide will walk you through the steps to manage wireless networks with the netsh command-line tool on Windows 10.
To view the wireless network profiles on Windows 10, use these steps:
In the command, replace the WLAN-INTERFACE-NAME for the genuine name of the interface. You can use the netsh interface show interface command to find out the exact name. For example, this command shows the profiles saved for the "Wi-Fi" interface: netsh wlan show profiles interface="wi-fi"
Once you complete the steps, the command will output the profiles from all the wireless networks you connected to in the past on every adapter installed on the computer.
To view the wireless adapter driver information, use these steps:
After you complete the steps, the command will provide relevant information about the driver, including vendor, version, radio type (for example, 802.11ax, 802.11a, 802.11n, etc.) and wireless authentication support, and more.
If you use the command to view the capabilities, you will see a list of all the wireless features available and those supported by the adapter.
To check the wireless adapter settings on Windows 10, use these steps:
In the command, replace the WLAN-INTERFACE-NAME for the genuine name of the interface. You can use the netsh interface show interface command to find out the exact name. For example, this command shows the profiles saved for the "Wi-Fi" interface: netsh wlan show interface name="wi-fi"
Once you complete the steps, the netsh tool will display the current wireless settings for one or all the adapters, including name, description, physical address, SSID, radio type (for example, 802.11ac), security authentication method, and the current transmission rates, and signal strength.
To find out the wireless security key (also known as the Wi-Fi password), use these steps:
In the command, replace the WLAN-PROFILE-NAME with the profile name you want to see its security key. For example, this command shows the password for the tsunami network: netsh wlan show profile name="tsunami" key=clear
After completing the steps, you will know the network security key for the specified profile.
Although you can view the current network password through the wireless adapter properties in Control Panel, you can use this command to recover any network security key of any profile stored on the device.
Sometimes, you may have a device configured to connect to different wireless networks automatically, but you then realize that it always connects to the access point even when it offers poor connectivity or the network is out of range. In those cases, you can run a command to stop connecting to known networks automatically.
To prevent a device from connecting to a Wi-Fi network automatically, use these steps:
In the command, replace WLAN-PROFILE-NAME with the name of the wireless profile. For example, this command disables automatic connections for the tsunami network: netsh wlan set profileparameter name="tsunami" connectionmode=manual
In the command, replace WLAN-PROFILE-NAME with the wireless profile name you are trying to change its priority. For example, this command makes the tsunami profile a priority: netsh wlan set profileparameter name="tsunami" connectionmode=auto
Once you complete the steps, Windows 10 will no longer try to connect to wireless networks automatically.
When you no longer need to connect to a particular wireless network, the access point is no longer available, or you need to reset the network profile settings, you can use the netsh command-line tool to delete any profile stored on your computer.
To delete a Wi-Fi profile on Windows 10, use these steps:
In the command, replace WLAN-PROFILE-NAME with the name of the wireless profile. For example, this command deletes the tsunami profile: netsh wlan delete profile name="tsunami"
After you complete the steps, the wireless profile will be deleted from the device. If you need to reconnect, you will need to go through the connection process again, and you will have to provide the network password as necessary.
There was an option in Control Panel in previous versions of Windows to export and import wireless network profiles. However, the feature was removed on Windows 8.1 and Windows 10 in favor of the new feature to sync these settings using a Microsoft account. But it is still possible to export and import the Wi-Fi settings using the netsh command-line tool.
Export wireless settings
To export the wireless settings, use these steps:
In the command, replace FOLDER-PATH with the path to the export destination folder. For example, this command export the profiles to the "wireless-backup" folder: netsh wlan export profile key=clear folder="C:\Users\username\Documents\wireless-backup"
In the command, replace the WLAN-PROFILE-NAME with the profile name you want to export and the FOLDER-PATH with the folder location to export the information. For example, this command exports only the tsunami profile to the "wireless-backup" folder: netsh wlan export profile name="tsunami" key=clear folder="C:\Users\username\Documents\wireless-backup"
Once you complete the steps, all the profiles will be exported to your specified location. The output will also show the name and path for each XML file backup.
The export command will create an XML file for each wireless network profile stored on the device. Also, we are using the "key=clear" option, which will request to store the network security key for each network in the XML file. As a result, keep these records secure, as they can easily be viewed or edited using any text editor.
Import wireless settings
To import the wireless settings on Windows 10 with command lines, use these steps:
In the command, replace FOLDER-PATH\WLAN-EXPORTED-FILE with the path and file name for the exported file. For example, this command imports a specific profile stored in the "wireless-backup" folder: netsh wlan add profile filename="C:\Users\username\Documents\wireless-backup\Wi-Fi-tsunami.xml"
In the command, change FOLDER-PATH\WLAN-EXPORTED-FILE for the exported file's path and name containing the profile information and WLAN-INTERFACE-NAME with the name of the interface you want to import the settings. For example, this command imports the settings to the Wi-Fi interface: netsh wlan add profile filename="C:\Users\username\Documents\wireless-backup\Wi-Fi-tsunami.xml" Interface="Wi-Fi" user=current
After you complete the steps, the profile will be imported, allowing the device to connect to the wireless network without additional configuration.
If you need to troubleshoot the wireless connectivity to an access point, netsh also includes a command to create a detailed report with many important details.
To create a wireless report, use these steps:
Once you complete the steps, the report will open with the default web browser.
The wlan reports contain a graph of the connectivity status, including information such as when the connection started, when it got disconnected, errors, and more. The report also summarizes the network adapters' information configured on your system, successful and failed sessions, disconnect reasons, and more. It is a detailed report that can help you ping point many Wi-Fi connectivity issues.
While you can manage many wireless settings through the Settings app, the netsh command-line tool gives you more advanced tools to view, configure, and troubleshoot Wi-Fi and Ethernet connections.
We only focus on the most common commands, but you can always use the "netsh wlan" command to view all the available options.
For more helpful articles, coverage, and answers to common questions about Windows 10, visit the following resources:
Windows comes with a built-in utility that can be used to gather the laptop’s configuration details. Follow these steps to know your laptop’s configuration in detail.
Press the Windows Key. This will open the Start screen.
Type in "Run". Choose "Run" from the list of results you will see on the screen.
In the Open field, type in "msinfo32". After this, click on "OK". This will open the system information window on the screen. Here you will find the detailed information about the system configuration. On the left pane of the window you will find the list of categories and on the right side of the window pane you will see the description pertaining to every category you see.
From the right pane of the window you see now, you can get to know the general configuration of your laptop including BIOS version and the physical memory.
Method-2
Click on ‘System summary’ and you will see the details regarding the operating system installed on the computer, the details of the processor and the basic input and output systems and the RAM details.
Method-4
Click on the Start button, right-click on "Computer" and then click on "Properties". This process will display the information about the laptop’s computer make and model, operating system, RAM specifications, and processor model.
Method-5
In a Windows laptop, you cannot see the information bout the motherboard make and model. You can however use third party applications like CPU-Z or SiSoftware Sandra to know the details about the motherboard.
Method-6
See Also -
How to open whatsapp on laptop
How to play doodle cricket on Google
How to recover deleted google activity on android
Cisco informed customers on Thursday that it’s working on patches for a high-severity vulnerability affecting some of its IP phones.
The flaw, tracked as CVE-2022-20968, impacts 7800 series and 8800 series (except 8821) Cisco IP phones. There are no workarounds, but Cisco did provide a mitigation that can be used until patches are released by the company.
CVE-2022-20968 has been described by the networking giant as a stack buffer overflow related to the Discovery Protocol processing feature.
An unauthenticated, adjacent attacker could exploit the vulnerability by sending specially crafted Discovery Protocol packets to the targeted device. Exploitation can lead to arbitrary code execution or a denial-of-service (DoS) condition.
Cisco IP phones running firmware version 14.2 and earlier are impacted. A patch is scheduled for January 2023.
The company says it’s not aware of any malicious attacks exploiting the vulnerability, but noted that the flaw has been “publicly discussed” and a proof-of-concept (PoC) exploit is available.
SecurityWeek could not immediately find the PoC and public disclosure. However, the vulnerability was reported to Cisco by Qian Chen of Codesafe Team of Legendsec at Chinese cybersecurity firm Qi'anxin Group and the information might only be available in Chinese.
Qi'anxin researchers have reported vulnerabilities to several major software and hardware vendors over the past years, including Oracle, Moxa, HPE, Apple and Google.
Related: Cisco ISE Vulnerabilities Can Be Chained in One-Click Exploit
Related: CISA Warns of Attacks Exploiting Cisco, Gigabyte Vulnerabilities
Related: Cisco Confirms In-the-Wild Exploitation of Two VPN Vulnerabilities
Related: Cisco Users Informed of Vulnerabilities in Identity Services Engine
Campaign to Create Tomorrow
Learn more about The Ottawa Hospital's $500-million fundraising campaign, the largest in our city’s history, which will transform the future of healthcare in Ottawa.
Research group IDC on Thursday reported in its Trust Perception Index that the most frequently cited security weakness of the largest cloud providers was configuration controls and management, with a large proportion of respondents wanting the ability to monitor and restrict unprovisioned access to resources — and finding it lacking.
The Trust Perception Index aims to help security teams identify perceived strengths and weaknesses of their cloud vendors, highlight differences between those who bought and those who did not buy for any given organization, and offer guidance on how organizations can maintain and increase their trust positions.
Grace Trinidad, research director, future of trust at IDC, explained that IDC applied the Trust Perception Index to the top six cloud infrastructure-as-a-service (IaaS) providers: IBM Cloud, Google Cloud Platform, Microsoft Azure, Oracle Cloud, Amazon Web Services, and Rackspace Cloud. Using end-user trust perception survey responses to measure four areas of the IDC Trust Framework — security, privacy, compliance, and environmental, social and governance (ESG) — IDC calculated final scores for each provider. Leading findings include:
“The IDC Trust Index is a measure of customer or client trust in their cloud vendors, providing not only a total score, but trust perception scores for security, privacy, compliance, and ESG, said Trinidad. “We measure and examine trust because high trust mitigates the effect of negative events such as data breaches, engenders customer loyalty, and impacts customer willingness to share personal information.”
The anecdote that the cloud is “just someone else’s computer” remains true today, said Davis McCarthy, principal security researcher at Valtix. But trusting someone else with confidential data means business leaders need confidence in their vendor’s security, business practices, and privacy policies, McCarthy added.
“An index that analyzes trust relationships through data or public perception may help foster accountability or, better yet, competition between cloud-service providers that favors the customer,” McCarthy said. “It’s no surprise to learn that business leaders think weak configuration and control management tools are lacking in the cloud. This could be because of a shortage of skilled cloud professionals, difficulty navigating complex UIs, or low confidence in the capability of a service’s features.”
Fictionary co-founder and CEO Kristina Stanley has worked in a wide variety of different jobs, from manager of broadband planning at Nortel to the director of employee, safety, and guest services for an Eastern British Columbia ski resort, to author of mystery novels.
But one of Stanley’s most difficult jobs was figuring out how to edit her own manuscripts while writing The Stone Mountain Mystery Series. As she told BetaKit in an interview, “it’s really, really difficult to edit a book from a story level. You’ve got thousands and thousands of elements that you have to keep track of and make them work together.”
“We’re trying to help the average person who doesn’t have an ‘in’ in the publishing industry get a really good book out there, get an agent, or get a publisher.”
-Kristina Stanley, Fictionary
Initially, Stanley tackled this problem using a combination of Microsoft Excel spreadsheets and graphs. But she soon realized that other authors likely faced the exact same issue, and set out to build a better way by combining her tech and writing background.
Today, Stanley’s software startup Fictionary aims to offer an alternative. Amid a wide field of solutions that help writers and editors with specific parts of the process, like spelling, grammar, style, structure, and publishing, Fictionary hones in on perhaps the most important and challenging part: producing a good story.
Fuelled by $1.8 million CAD in seed funding, Fictionary aims to help writers and editors around the world produce quality stories more quickly and affordably. With this capital, the Inverary, Ontario startup, based just north of Kingston, plans to move into non-fiction and start selling to other publishers and agencies to expand its community of users.
The startup’s all-equity round, which closed in September, was co-led by StandUp Ventures and BDC Capital’s Thrive Venture Fund, with support from The51 and a group of angels that includes Women’s Equity Lab general partner Sally Morris. For newly launched Thrive, Fictionary marks the fund’s third investment to date, after investing in Acerta and Private AI.
Stanley founded Fictionary in 2016 alongside her husband, Mathew (COO), who also previously worked at Nortel and has a background in tech, and her brother, Michael Conn, Fictionary’s former CTO, who has since left the company.
Initially, Fictionary focused solely on writers, before expanding to meet demand for a similar offering from editors. Today, Fictionary offers three subscription software products for writers and editors that range in price from $19 to $49 monthly, sells online courses, and provides a community for writers and editors to connect.
Fictionary’s software helps writers visualize their story arc by analyzing key story elements with artificial intelligence (AI) and gauging how their manuscript compares to fundamental storytelling components.
“We’re trying to help the average person who doesn’t have an ‘in’ in the publishing industry get a really good book out there, get an agent, or get a publisher,” said Stanley.
On the editor side of the equation, the company claims its offering enables editors to provide better, deeper story edits in less time, increasing the quality and profitability of editors’ services.
The writing and editing software space features a ton of players, from Grammarly to Scrivener, Novel Factory, and Canada’s Wattpad. According to Stanley, Fictionary is unique within the sectors in terms of its focus on storytelling elements and its use of AI. “We’re it right now as far as, there’s an automated way to do this, and have software for it,” said Stanley.
“While there are other platforms endeavoring to address this gap in the market, there doesn’t appear to be a single player who is able to look at the writing and editing process in a comprehensive and meaningful way, which puts Fictionary at a sizeable advantage to lead the charge and expand into new markets and segments,” Michelle Scarborough, managing partner of BDC Capital’s Thrive Venture Fund, told BetaKit.
RELATED: StandUp Ventures reveals second fund dedicated to women-led startups with $30 million first close
Fictionary previously secured $100,000 in grant funding from Creative BC and raised $245,000 in pre-seed funding in 2019 from a group of angels that included Shopify co-founder Scott Lake, Stephanie Andrew of Women’s Equity Lab, and FirstEditing founder and CEO JoEllen Taylor.
According to Stanley, following that pre-seed round, Fictionary reached breakeven cash flow and had to decide whether to keep going on its current track or set its sights higher.
Following some discussions with StandUp Ventures, Fictionary decided to embark on a new chapter and raise more venture capital to tackle the opportunity it sees in this space amid the rise of self-publishing. “We have a great product, we’ve got product-market fit, we’ve got a market, so let’s just go for it,” said Stanley.
“The love for the product Fictionary users articulate so regularly is rare, and indicative of the power and impact the tool brings to its customers,” said StandUp Ventures senior associate Lucas Perlman, who is joining Fictionary’s board as part of the round. “The self-publishing world has exploded, and we believe Fictionary is poised to become a de-facto part of the story writing toolkit for writers and editors around the globe.”
RELATED: Wattpad’s new leader is focused on creator value
For her part, Scarborough said the Thrive Venture Fund sees “a sizeable opportunity [for Fictionary] in the fast-growing creator economy space—a market with many dimensions—within writing and editing, screenwriting, non-fiction, and beyond.”
To date, Fictionary has focused entirely on fiction but Stanley said the startup’s roadmap includes moving into non-fiction, where the CEO sees plenty of potential to apply its tech to helping people tell their own life stories. Fictionary also sees an opportunity to help agencies and publishers clear the slush pile of submitted manuscripts.
As it looks to build out its own community of writers and editors, Fictionary follows in the footsteps of Wattpad, which parlayed its vibrant self-publishing community of writers and readers—and the content produced by them—into a $754 million CAD acquisition last year.
After discussions with StandUp, Fictionary decided to embark on a new chapter.
“Wattpad is very inspirational for us,” said Stanley. “They are different in the sense that people write their stories in the community, where we help writers take those stories and turn them into powerful stories readers love. Their community is a great lead-in to Fictionary for writers needing to edit their stories.”
As the startup charts its growth strategy amid an uncertain economic environment, Stanley is confident that Fictionary is well-positioned to grow during this period, noting that people tend to write more when they are stressed. Back when COVID-19 first hit and everyone was cooped up, the CEO said people begin writing more, and demand for Fictionary rose. Heading into what could be a deep downturn, Stanley believes Fictionary is in a good spot given that it offers a tool to help people do their passion without spending a lot of money.
What Perlman finds most exciting is the appreciation Fictionary’s customers have for the startup’s product, noting that writers “pour countless hours into their stories and writing books is an emotional and very personal thing to take on.”
“Fictionary has removed a major hurdle that stopped these creators from bringing their stories into the world,” Perlman told BetaKit. “The impact of that really comes through when you speak to their customers and see feedback from their community.”
Feature image courtesy Fictionary.