X thread is series of posts by the same author connected with a line!
From any post in the thread, mention us with a keyword "unroll" @threadreaderapp unroll
Follow @ThreadReaderApp to mention us easily!
Practice here first or read more on our help page!

Recent

Mar 16
@Stinky915846091 @Shayan86 @realDonaldTrump @Mitch_Ulrich 1).
„Kharg Island, targeted in US air strikes on Sat., March 14, 2026, [1] [2] [3] [4] is a scrubby stretch of land in the Gulf that handles almost all of Iranʼs crude exports [5] [6].”
@Stinky915846091 @Shayan86 @realDonaldTrump @Mitch_Ulrich 2).
„Iranian state media reported that no damage was done to the islandʼs oil facilities. The semi-official Fars news agency said US attacks targeted air defences, a naval base, airport control tower and a helicopter hangar.
@Stinky915846091 @Shayan86 @realDonaldTrump @Mitch_Ulrich 3)
Ehsan Jahanian, political deputy to the governor of Bushehr province in southern Iran, said »no military personnel, oil company employees, or island residents suffered casualties in the attack, and all sectors are continuing their routine activities« [7] [8].”

March 14, 2026
Read 6 tweets
Mar 16
Can the Iranians actually harm US businesses in the Middle East? /🧵

[Note: This is a war game thread. Nothing written here should be taken as a recommendation but a thought experiment involving the convergence of two subjects: modern service infrastructure and war. Let's hope none of the following happens and the ped*phile psychopath who started this war surrenders before it does.]

Around 24 hours ago, the US bombed a home appliance factory in Iran, killing many of its workers and damaging its equipment. The Iranians vowed revenge and said they would begin targeting US businesses. This is separate to businesses such as banks (already in the target list and already evacuating) and oil companies (already being targeted).

Data Centres as a Target

There are plenty of targets in the region: Data centres belonging to Microsoft, AWS and so on, service companies, start ups, sh*tcoin companies and more. Can the Iranians deliver actual strategic harm on these targets while being limited to indirect fire at the moment? I'm not talking about personnel. As a professional in an adjacent field, that would strike a little too close to home. Besides, most of us are pretty replaceable -- and it would make for terrible headlines and will create enmity. As a bit of a softie, I don't recommend targeting people most of whom have no idea what is going on right now. Can the Iranians harm the US businesses themselves without harming the personnel?

The answer is yes, but it requires an understanding of what makes service businesses valuable today. The US no longer really manufactures anything and these businesses do not either. They consist of completely fungible components and systems, design to be deployed anywhere on this planet (or even the moon if one desired), and integrated into global systems.

Iran could even physically destroy an entire data centre (DC) annihilating everything within it, and these businesses would table a loss, ask for compensation from the state department and treasury and life would go on. The components are designed with intrinsic redundancy. The big customers who use multiple DC wouldn't even skip a beat. It's just fungible components being taken out after all.

In the service industry, the physical devices used to store and process data are secondary in importance to the data stored as well as the ability to access it and process it in a timely and useful manner. Time is money, but data is everything. If the Iranians can cause data loss to a number of businesses, it would be fatal to the United States in multiple ways: Direct loss of business and complete loss of confidence in the "cloud model". *

Redundancy

Iran must take out the data and its availability. Preferably, permanently. Can it do this with missiles, drones and perhaps a nuke or two? Indeed it can, but it needs to keep in mind how sharding works and how to make it fail, as well as the most opportune military attack on a data centre.

Sharding is best explained through the simplest possible redundant code. Let's say I want to send a message to you and I want to make sure that you receive it even if there is a chance that part of it gets lost or corrupted along the way. Let's say I want to say "nine". What if I just repeat myself?

Nine Nine

This actually doesn't help at all. Corrupt one word:

Nine Fine

And it's impossible to tell which of these is the correct word. But repeat it three times:

Nine Nine Nine

You can now corrupt any one word and the majority will still be correct, so you can always recover the message.

Data centres have far more complex schemes, but the horizontally distributed of these can be summarised in the following manners: how many data centres can be destroyed entirely without data loss. That question is going to be different from customer to customer. For a clueless customer that number is going to be 1, but typically their data will be stored in a random server nearby them. They'll have on-site backups anyway. These targets aren't interesting. Iran has to fetch headlines to cause damage: a big customer. These ones will store moderately important data with redundancy 2.

So Iran has to take out two data centres from the same provider at the same time in order to cause some data loss and loss of availability. This is going to be random: a customer has to slice the data between two regional DCs and pay for only a single loss redundancy scheme. There will be many who do so for performance reasons. Why does the attack have to be simultaneous? Because a customer can quickly backup its data from the surviving data centre and resume the business from a different location. So if Iran actually wants to cause strategic harm, it needs a complex mission involving simultaneous strikes on the same DC provider (let's say Microsoft because f**k Copilot and Windows 11).

Can Iran coordinate such a simultaneous attack and pull it off perfectly? I don't know, but it's certainly many orders more complex than a single attack spanning a long amount of time. It has to happen at the same time.

With that established, let us move on: What's the best theoretically way to attack a data centre?Image
Components of a Data Centre

DCs are far more complex than they seem from a user perspective. They're designed to survive almost any reasonable scenario. Fortunately for Iran, war is not one of them (it is assumed all nations that they are built in are "green" or safe and under a kind of nuclear umbrella).

A nuclear strike can kill a data centre instantly but let's not go so far. It's a waste of a nuke when a few pin pricks should do the job.

Auxiliary (Backup) Power

The most important component to keep in mind is the auxiliary power supply, the on-site diesel generator. Because up time is important these are always on standby mode and fuelled up. This makes them particularly flammable. Strike enough of them and a fire will spread. When it comes to such a large target, fire is your best friend as a mission planner and these things contain all the fuel you need to strengthen that fire. As the generators are damaged the fuel will leak and spread.

Main Distribution Area / Network Room

If the Iranians have done their homework, they would have an internal map of the data centres, meaning it knows where the convergent network equipment meets in what is historically called the main distribution area (MDA). If you can destroy this target, you sever the connection to any of the support team that can move data around, enable fire control countermeasures and otherwise monitor the situation.

Battery Rooms

These are very flammable, because of gullibility, engineers design their DCs to use Lithium ion batteries. These are extremely flammable. If Iran knows where these are, they are a priority target in such a data-decapitation mission.

Main Hall

With the connection to the outside world severed, the still-powered on computers equipment should now be targeted. This is the largest target and a ballistic missile should crack it open, a few fully Shahed drones should then start the fires inside. The equipment is, counter-intuitively, very flammable. There are filters, plastics, foams, special refrigerants and other components that are HIGHLY flammable. Iran just needs to start and kindle the fire with follow up attacks, making sure to use fully fuelled drones with warheads that don't put out fires (i.e. blast type).

HDD/Tape Backup Rooms

If Iran wanted to be particularly nasty it would take out the tape backups. This would render the data loss irrecoverable if redundancy is taken care of. A nightmare for any business.

Electric Power Substation

With the backup power and emergency battery supply on fire, and the main hall a raging inferno, it's quite likely that the fire suppression system would be automatically activated without any intervention from the outside.

Thus, it's time to switch off the lights and power down the sprinklers as well. Iran would target the substation providing the power to the DC to do so. A few shahed-136, a cruise missile or a ballistic missile should do the trick. If this is targeted at night you would see a blue hue in the sky if some onlooker were to film it.

If Iran wanted to be thorough, it would then target any pressurised water reserves used for fire suppression. This would be the final attack on the DC. It's important to keep it on before the fire suppression system activates for the opportunity to start an electric fire (class C) which maximises the damage through melting wires, arcing and what not. Once the power is off, only material will kindle the fire, not electric current.Image
Now a raging inferno billows in the night in the place where a data centre used to be. Billions of dollars worth of infrastructure and some data is lost forever.

Can this attack be even more damaging?

A bunch of sh*tcoin bros lose their data and headlines damage people's confidence in data centres. People start shelling out money for their own private data centres and the "cloud model" loses money. That's plenty of damage and is aligned with people resisting these large and evil companies. Ultimately, the components within these data centres are mass manufactured and there is plenty of unused capacity. In fact there is more shelved equipment waiting to be powered on than actively powered equipment. People will eventually move on and be lured by the convenience of storing all their data within these large complexes.

Thus there's not much else Iran can do on its own to harm US companies. But, should this war spread to Asia, this damage can be quite permanent.

Electronic manufacturing

Within the realms of semiconductor technology, most high-tech nodes today are fabricated in just two countries: Korea and Taiwan. These countries are running out of helium, necessarily in some of the processes (typically ones involving use of plasmas for etching and deposition). Qatar has control of 36% of the export of helium gas and this has been severed by Iran's closure of the Hormuz. But manufacturers can steal it from smaller players.

But what if the Iranians drain so much equipment within CENTCOM that USPACOM becomes an easy target? All those THAAD batteries and Patriot missiles are being practically shoplifted from eastern commanders. Also that 31st Marine Expeditionary Unit...

This is where China and DPRK (North Korea) can step in, seizing South Korea and Taiwan simultaneously! This means no more replacement equipment. Suddenly the loss in hardware becomes equally damaging as the loss in data.

This is quite unlikely at the moment but who knows how the war will evolve?Image
Read 4 tweets
Mar 16
Everyone is watching the yen carry trade and bond market…

But the real stress is showing up somewhere else first.

Private credit.

Lines of credit are getting cut.
Withdrawals are being halted.

This is how liquidity events start.

Thread 🧵
Major lenders like JPMorgan Chase are reportedly reducing credit lines to private credit funds.

That matters because these funds rely on bank liquidity to:

• bridge redemptions
• fund new loans
• stabilize cash flow

Remove the credit line → liquidity disappears fast.
At the same time, large managers including BlackRock and others are halting withdrawals in private credit vehicles.

Why?

Because the underlying loans are illiquid.

You can’t sell them quickly without massive discounts.
Read 8 tweets
Mar 16
🚨 THREAD:

90% of people worship the Shivling…

But very few understand what it actually represents.
It is not just a symbol of God.

It is the symbol of your own body and the universe itself.

Let’s understand this ancient secret 🧵👇 Image
1️⃣
According to Sanatan wisdom, the human body itself is a Shivling.

Your body is not ordinary.

It is a living temple of the Divine.

Ancient rishis saw the same cosmic structure inside the human body.
2️⃣
The top part of the Shivling represents Shiva.

Why?

Because Shiva symbolizes consciousness — the awareness inside you that observes everything.

Your thoughts come and go…
But the witness inside you remains eternal.
Read 12 tweets
Mar 16
I TOLD MY CONTENT TEAM: "We're switching from ChatGPT to Claude" They asked why. I showed them the "snowball method." One topic → 40 posts in 20 minutes vs. 10 generic ideas in an hour. They never went back. Here are the commands:

Save this before it goes viral. 🚨
PROMPT #1: THE CORE

You’re a content strategist.
Before answering, ask me clarifying questions about:
— goal
— target audience
— pain points
— constraints
— tone
— platforms

Based on my answers, define one core problem in my niche that people are actually willing to discuss and share.

Deliver:
• why this problem matters (2–3 sharp sentences)
• 30-day content goals (what we measure: saves/leads)
• an ICP table (who / what they want / what blocks them / language/ triggers / taboos)
Be specific
PROMPT #2: ANGLES & HEADLINES (break it open)

Take the core problem and propose 7 unexpected angles
(counterintuitive, “you’re doing it wrong,” myth vs reality, hidden cost of the usual solution).

For each angle provide:
• 2 hooks (≤ 12 words) for Threads/Reels
• 1 core insight (≤ 80 words)
• 1 number/fact for credibility (brief source mention)
• 1 potentially controversial statement (to spark comments)

Make sure the angles don’t overlap.
Read 6 tweets
Mar 16
1/20You are SO full of SHIT! The Democrats DO NOT want illegal aliens to vote you friggin LIAR! You ReTRUMPlicans have spewed this BLATANTLY FALSE Lie for YEARS, and it is JUST as false all those years as it is today. Democrats just want them treated humanely, not ripped out of
2/20 car windows, rammed on the road by ICE vehicles, removed from homes in the FREEZING cold with NO shoes and just a thin blanket draped over his shoulders, yanked off the street, and abused to the point hospitalization is required. The LEFT has abandoned the American people??
3/20 What a load of CRAP! Let's look at this SHALL we Tommy Turdville?
1. WHICH party members have been trying to dismantle The Affordable Care Act for YEARS? The REPUBLICANS! Nearly 23 million Americans get health insurance through one of the online “exchanges” (also called
Read 21 tweets
Mar 16
@LtGovJonesGA @jasonesteves you have to see our Georgia One presentation at this year’s Atlanta Parade and Music Festival.

The QR Code can actually remain, if we implement one small fix. It’s simple, you just have to have the heart to get it done.
(Keep reading) #GAPol
Go to my website and signup for the next investment briefing. There you can get an investors review on the solution. The patent application was filed today. Please read the retweeted post for context.

Susie Voyles has spoken to the inventor already.GeorgiaOne.info
One small fix will save Georgia millions, and long term it will actually add billions to Georgia revenue. So if you heard what @KeishaBottoms said about this May’s vote being a vote for legacy, than make sure you come out to this year’s Atlanta Parade and Music Festival!
Read 6 tweets
Mar 16
If you have school aged kids and Don’t Know what SBIRT is read on… a thread

SBIRT stands for
• Screening
• Brief Intervention
• Referral To Treatment

1/
Your middle schooler's school may be running a program called SBIRT. Most parents have never heard of it. They should. 🧵Image
2/
SBIRT starts with what they call a digital survey. Although a better word would be online assessment. Your child answers questions like:

• "Is there an adult at school who really cares about me?"
• "Is there an adult who listens to me?"

Sounds harmless. It's not.
3/
If your child answers "No" — meaning they don't feel close to a school employee — the system flags them.

Not as healthy. Not as normal. As at-risk.

Having a family-centered life is treated as a problem to solve.

───
Read 11 tweets
Mar 16
I'm going to go ahead and go through some of the emails in order, starting with the Archive folder (while skipping ones that don't seem important).

I believe the person she's speaking to is Australian David Lowy, son of Frank Lowy:
afr.com/companies/west… x.com/icu_luci/statu…Image
Image
This next email doesn't seem all that important, until you see the attachments--tons of INSS contacts listed--including Evelyn de Rothschild, who died a few months after this was sent: Image
Image
Image
Image
Read 9 tweets
Mar 15
1/ 🧵 Unveiling the genetic secrets of I24554, a man from the Roman Age (149 BCE – 18 CE) discovered in Birgi, Sicily 🇮🇹. Though found in Italy, his DNA tells a story that begins much further east. Let's dive into this fascinating journey! Image
Image
2/ His direct lineages provide a clear window into his past. His paternal line (Y-DNA) is E-FT54477, while his maternal line (mtDNA) belongs to I1b. These markers reflect the ancient migrations that shaped the Mediterranean landscape. 🧬🌍
3/ His deep Neolithic roots point toward the cradle of civilization. Genetic modeling reveals strong affinities with Mesopotamia_N, Levant_N, and Iran_N. He carries the genetic blueprint of the earliest farmers and city-builders of the Near East. 🏺✨
Read 9 tweets
Mar 15
MY HOUSE FELT CLUTTERED FOR MONTHS.
So I showed Claude photos of every room.
48 hours later — neat space, calm mind.
No new furniture. No decorator. Just 7 prompts that completely transformed my space:
1. Room Resetter
Prompt: Analyze this photo and tell me exactly what to remove or rearrange to make this space look bigger and calmer.
2. Minimalist Mentor
Prompt: Based on this photo, create a decluttering checklist for every visible item, and label what to keep, donate, or discard.
Read 8 tweets
Mar 15
GOODBYE $500,000 McKinsey consultants forever.

Claude just replaced 6 weeks of strategy analysis into 8 minutes completely free.

Here are 12 prompts to go from completely clueless to completely boardroom-ready in every business decision: 👇

Top designers are already using this.
Bookmark this thread 🔖Image
1./ The MECE Issue Tree Builder

You are a strategy consultant breaking down a messy business problem into a clean, structured issue tree. Use the MECE principle (Mutually Exclusive, Collectively Exhaustive) so every part of the problem is covered exactly once with no overlaps.

Here is what I need:

- Problem statement: Rewrite my problem as one clear, specific sentence. Remove any vague or emotional language.
- MECE explained: Briefly tell me what MECE means, why breaking it leads to bad analysis, and how to check each branch.
- Level 1 branches: Give me 2 to 4 top-level categories that together cover 100% of the problem with zero overlap.
- Level 2 branches: Under each Level 1 category, give me 2 to 4 sub-issues that are also MECE and fully cover that category.
- Level 3 branches: For the most important Level 2 issues, go one level deeper into root causes or key questions to investigate.
- Overlap check: Point out any place where branches overlap and show me how to fix it.
- Gap check: Point out anything the tree misses and tell me where to add it.
- Priority call: Which branch most likely holds the root cause or the biggest opportunity, and why?
- Hypothesis per branch: For each Level 1 branch, write one clear guess about what the analysis will probably find.
- Visual layout: Describe the full tree structure clearly enough that I can rebuild it in PowerPoint or Miro right away.

Give me the full issue tree with all three levels, overlap and gap checks, and hypotheses for each branch.

My messy problem: [DESCRIBE YOUR BUSINESS PROBLEM IN ANY FORM]
2./ The Five Forces Industry Analyzer

You are a strategy consultant running a full Porter's Five Forces analysis for a client looking at a new market. Give me a complete, evidence-based picture of how attractive this industry is.

Here is what I need:

- Force 1, Threat of New Entrants: Look at capital needs, brand loyalty, regulations, scale advantages, distribution access, and how existing players would fight back. Rate it High, Medium, or Low with supporting evidence.
- Force 2, Supplier Power: Look at how many suppliers exist, switching costs, supplier concentration, risk of suppliers selling direct, and how much volume matters. Rate with evidence.
- Force 3, Buyer Power: Look at buyer concentration, price sensitivity, switching costs, risk of buyers making it themselves, and how standard the product is. Rate with evidence.
- Force 4, Threat of Substitutes: Look at what alternatives exist, their price and performance compared to ours, how easy switching is, and how willing buyers are to switch. Rate with evidence.
- Force 5, Competitive Rivalry: Look at number and size of competitors, how fast the industry grows, how different the offerings are, exit barriers, and cost structures. Rate with evidence.
- Industry attractiveness score: Give a weighted score from 1 to 10 across all five forces and explain what it means for profit potential.
- Dominant force: Which single force matters most for margins in this industry, and why it outweighs the rest?
- Action per force: For each force, give one specific move a smart company would make to reduce the threat or take advantage of it.
- Best position: Based on everything above, where is the most defensible and profitable spot in this market?

Format this as a consulting-style report with force ratings, evidence, and ranked recommendations.

Industry: [YOUR INDUSTRY OR MARKET]
My position: [ENTERING AS / COMPETING AS]
Read 15 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!