If they're in academia, ask about their industry connections. If they're in industry, ask if they can help you. If you can't get direct contacts, at least find out what skills and knowledge is being looked for, and what options exist.
It's very easy to forget the power of an 'alumni' network. Who we know is often our greatest asset.
When I come home, I routinely take my outdoor shoes off. I spent most of my time at home sitting at my desk, but last year I began to learn bass guitar. I found that standing to play for less than an hour was enough to wipe me out for the entire evening, with knock-on exhaustion until the next day.
I have pes cavovarus - a deformity of the feet characterised by high arches and inward turned heels. When I finally got orthotics and placed them into my outdoor shoes, walking suddenly became easier and instances of debilitating cramp reduced in frequency and severity.
Following my experiences with playing my bass, I placed a spare pair of orthotic insoles into my slippers. This was not something my medical team had suggested previously. Suddenly I found it less exhausting to stand for extended periods. The change was actually quite immediate and significant.
Flat arches are far more common than what I have, but I suspect the same concept still applies - and orthotics for flat arches are far more widely available to consumers!
Just thought I'd add for other readers some security industry commentary :)
Type that into the Goog: https://www.google.com/search?q="spinner-2013.gif"&oq="spinn...
Might be a good start.
The gif itself is almost certainly not malicious. There's probably two things happening here. Firstly, the hosting domain of the gif scanned could be known to be malicious. And secondly and more generally, Cloudflare is heavily used by the criminal scene, so to play safe a number of scanners may flag any cloudflare element as malicious.
Or is DID some kind of subset of PTSD?
Interesting side note: If I recall correctly, a variant of this can be used to de-anonymise Tor connections if you have visibility over the entry and exit connections. Measure time and size relationships between packets and look for corresponding matching ones at the other end. Not 100% accurate, but with lots of connections it builds in confidence.