Eric Soto

Themed Entertainment & Technology Leader

Welcome to my world! I'm Eric Soto, a Partner and Senior Vice-President for Themed Entertainment at Gigantic Playground, nestled in the heart of Orlando, Florida's vibrant themed entertainment scene. My journey in software engineering and technology leadership spans over three decades, specializing in app development for, creating robust interactive theme park systems, developing backend systems and APIs, and deploying scalable cloud solutions on AWS and Azure.

At Gigantic Playground, I have the privilege of leading a team of exceptionally talented engineers and creatives. Together, we push the boundaries of imagination and innovation, creating interactive experiences that resonate with audiences of all ages, turning dreams into reality, and engineering moments that endure. Our work blends hardware and software seamlessly, resulting in magical and immersive experiences for high-profile clients such as Universal Studios Parks & Resorts, Walt Disney Imagineering, and GoPro.

Agile methodologies are at the core of my professional ethos. With over a decade of experience as a certified Scrum Master, I champion the power of iterative software delivery, consistently driving positive outcomes for the teams I've led and the projects we've undertaken. My technical proficiency is broad and deep, with a particular affinity for the Apple macOS and Linux ecosystems. I'm an adept user and advocate for macOS, Ubuntu, and various Linux distributions, seamlessly navigating the complexities of Azure and AWS.

Beyond my professional pursuits, I have a deep passion for photography, aviation, and drones. For 35 years, I've been capturing the world's beauty through my camera, utilizing Lightroom for my workflow. My love for aviation and unmanned aircraft systems (drones) complements my technical expertise, allowing me to explore new heights and perspectives.

Join me on this journey as we explore the intersection of technology, creativity, and innovation. Welcome to my world of endless possibilities and boundless imagination.

Acceptable Use Policy

This Acceptable Use Policy ("Policy") governs the usage of products and services, (“Services”), provided by Init 42, Inc. (dba ericsoto.net), or its subsidiaries (hereinafter referred to as “INIT42”). This Policy is incorporated by reference into each contract INIT42 enters into with a customer (each, a "Customer") for the use of such Services. INIT42 may modify this Policy at any time without notice.

The purpose of this Policy is to enhance and maintain the quality of the Services and to protect INIT42's  customers, and the Internet community as a whole, from illegal or disruptive Internet activities, (“Prohibited Uses”), as further described below. This Policy applies to each Customer and its employees, agents, contractors or other users of such Customer who obtain Services from INIT42 (each such person being a "User").

Use of the Services in connection with a Prohibited Use shall be considered a violation of this policy. If INIT42 learns of a violation of this Policy, INIT42 will respond to the applicable Customer and in INIT42's  sole discretion, may (i) warn the Customer; (ii) suspend Services; (iii) terminate the Services; (iv) remove the offending content; or (v) take any other appropriate action to remedy the violation.

INIT42 expressly disclaims any obligation to monitor its Customers and other Users with respect to violations of this Policy. INIT42 has no liability or responsibility for the actions of any of its Customers or other Users or any content any User may post on any Web site.

INIT42 encourages Users to report violations of this policy by e-mail to: easoto@iss-pr.com, including in any such report the name of the offending domain (for example, xyz.com) and the type of abuse (for example, spam, illegal acts, harassment, etc.) in the "subject" field of the e-mail.

INIT42 reserves the right to cooperate with appropriate legal authorities in investigations of claims of illegal activity involving INIT42's  Services, Customers and other Users. INIT42 reserves all other rights to respond to violations of this Policy to the extent of applicable law and in accordance with any applicable contractual obligations. INIT42 may utilize technical means to monitor communications into, and out of, its network facilities to prevent the introduction of viruses or other hostile code, to prevent intrusions and otherwise to enforce this Policy and each Customer agrees that INIT42 is authorized to monitor its communications through its network for such purposes.

Prohibited Uses

Without limiting the general application of the following rules, Users may not:

a. Utilize the Services to send unsolicited or mass (even opt-in) e-mail to third parties. We can refer clients to email marketing services suitable for opt-in marketing, but our systems must not be used for such a purpose under any circumstance.

b. Utilize the Services in connection with any illegal activity. Users may not utilize the Services in any manner that violates applicable law or utilize the Services to:

      i. Copy material from third parties (including text, graphics, music, videos or other copyrightable material) without proper authorization;

      ii. Misappropriate or infringe the patents, copyrights, trademarks or other intellectual property rights of any third party;

      iii. Traffic in illegal drugs, illegal gambling, obscene materials or other any products or services that are prohibited under applicable law;

      iv. Export encryption software to points outside the United States in violation of applicable export control laws; or

c. Utilize the Services in connection with any tortuous or actionable activity. Users may not utilize the Services to:

      i. Publish or disseminate information that constitutes slander, libel or defamation; publicizes the personal information or likeness of a person without that person’s consent; or otherwise violates the privacy rights of any person.

      ii. Threaten persons with bodily harm, to make harassing or abusive statements or messages, or to solicit the performance of acts or services that are illegal under applicable law.

d. Utilize the Services in connection with any other disruptive or abusive activity. Users may not utilize the Services to:

      i. Cause denial of service attacks against INIT42 or other network hosts or Internet users or to otherwise degrade or impair the operation of INIT42's  servers and facilities or the servers and facilities of other network hosts or Internet users;

      ii. Post messages or software programs that consume excessive CPU time or storage space;

      iii. Offer mail services, mail forwarding capabilities, POP accounts or autoresponders other than for the User’s own account;

      iv. Resell access to scripts installed on INIT42’s servers;

      v. Subvert, or assist others in subverting, the security or integrity of any INIT42 systems, facilities or equipment;

      vi. Gain unauthorized access to the computer networks of INIT42 or any other person;

      vii. Provide passwords or access codes to persons not authorized to receive such materials by the operator of the system requiring the password or access code;

      viii. Forge the signature or other identifying mark or code of any other person; impersonate or assume the identity or any other person; or engage in any other activity (including "spoofing") to attempt to deceive or mislead other persons regarding the true identity of the User (excluding the use of anonymous remailers or Internet nicknames);

      ix. Distribute or post any virus, worm, Trojan horse, or computer code intended to disrupt services, destroy data, destroy or damage equipment, or disrupt the operation of the Services;

      x. Conduct port scans or other invasive procedures against any server (except any server for which the User is an authorized system administrator);

      xi. Distribute, advertise or promote software or services that have the primary purpose of encouraging or facilitating unsolicited commercial e-mail or spam;

      xii. Solicit or collect, or distribute, advertise or promote, e-mail address lists for the purpose of encouraging or facilitating unsolicited commercial e-mail or spam;

      xiii. Interrupt or interfere with the Internet usage of other persons.

e. Utilize the Services in a manner which subject INIT42 or its software providers to unfavorable action. Users may not utilize the Services to subject INIT42 to any liability for any reason, or adversely affect INIT42's  public image, reputation or goodwill, including, without limitation, sending or distributing sexually explicit, hateful, vulgar, racially, ethnically or otherwise objectionable materials as determined by INIT42 in its sole discretion.

Software Engineer, Technology Leader, Pilot, Photographer, Dad, Husband, PITA.

Orlando, Florida