WHEREAS: Donald J. Trump has a birthday on June 14th.
WHEREAS: Donald J. Trump has a birthday on June 14th.
I just published a book titled Naturalism and Its Alternatives in Scientific Methodologies which deals with whether Methodological Naturalism is helpful or hurtful to science, what alternatives could be used, and what the benefits and problems of those approaches might be. The book also ended with a chapter on some fields which are already benefitting from alternatives to methodological naturalism.
This book is based on a conference, the videos of which you can view here.
The greatest scam artists of all time are listed below in their latest new rankings based on the sheer grandiosity and jaw-dropping audacity of their larger-than-life swindles, defraudings, embezzlements, and downright scams.
It was from This post on Chinese site sciencenet.cn
Then I read two reports by Nick Bilton of Vanity Fair: " HOW I GOT TO THE BOTTOM OF THE THERANOS MESS: - What I learned while reporting on Elizabeth Holmes and her company."
BY NICK BILTON SEPTEMBER 20, 2016. and this other exclusive report.
" Can your friends guess who this GNU is? One of the possible designer T-shirt for the EOMA68 libre hardware Crowd Supply campaign going on. It is inspired by a real-life person who now lives in Russia. I would like for people to guess who it is. And don’t give out any more hints! "
Excited that my new book is #1 on some of Amazon's "Hot New Release" lists. Check it out here - Building Scalable Web Applications Using the Cloud. If you ever wanted to get into cloud programming but didn't know where to start or how to use it effectively this is your book.
Some people think that cloud programming comes automatically by buying a cloud server. Not so much. This books gives you a bare-bones walkthrough of the things that you need to not only build your app in the cloud but make it scalable as well.
The legend lives on from trolltalk on down
Of the big net they call Intar Webby
The net, it is said, never gives up her dead
When the posts of October turn gloomy.
With a load of whiny diaries - 26,000 tons more
Than the Edmund Kuro5hin weighed empty
That good site and true was a bone to be chewed
When the trolls of October came early
The ship was the pride of the USian side
Coming back from some server in Wisconson
As the big Scoop sites go it was bigger than most
With a crew and the Captain well seasoned.
Corporations and their BIG brother Uncle Sam can't have it both ways. Trumpeting Open Source Innovation on one hand and heavy handed prosecution with 'trade secret' without IBM's comment on the the other hand.
My new programming book, New Programmers Start Here, just came out today! I'm very excited to get this in the hands of new programmers.
If you have friends who are designers who want to start transitioning to programming, they should pick up this book. If you have young friends who want to get into programming, they should pick up this book.
In 1953, Arthur C Clarke wrote a short story in which monks were proposing to automate the listing of the names of God, believed by them to be around nine billion. How would we get on doing this?
Subject: new Unix implementation
Date: Tue, 27-Sep-83 12:35:59 EST
Organization: MIT AI Lab, Cambridge, MA
Starting this Thanksgiving I am going to write a complete
Unix-compatible software system called GNU (for Gnu's Not Unix), and
give it away free(1) to everyone who can use it.
Contributions of time, money, programs and equipment are greatly
I aim to Solve what I at first called, then referred to but now denote as The Software Problem:
Software failure is fundamentally a human problem, not a technical one.A common - but commonly ineffective non-technical Solution to the Deadly Sin of Greed is the arrest, prosecution and imprisonment of the greedy. The progress I report herein aims not to imprison anyone rather to spare the many victims of Child Sexual Predators. While I do expect vast quantities of prosecutions to result from my FBI/IC3 report, I hope to "Break The Cycle", in that many child sexual predators are themselves the adult survivors of incest and child molestation.
Purely technical solutions fail to effect truly meaningful and lasting change.
I am one such adult survivor, my abuser - in the common parlance - hoped to "train" me to accept my fate by leaving kiddieporn lying around in my plain sight. While my widely-known Madness resulted, that I was so-trained leads to my present focus on the development of Technical Measures, not to so elminate Child Sexual Exploitation rather to take the money out of it.
Adults - even teenagers - have sexually-abused children since the Dawn of Humanity; my own work is unlikely to eliminate it.
But at least I can lead the Venture Capital community to make wiser choices as to which web startups they fund.
I haven't had a whole lot of luck getting anyone at Adult Protective Services to respond. I received just one email to say that a social worker would call me on the phone to handle my mother's APS intake, but after I responded that I was out of minutes and so must do it via email, I haven't heard back from them.
From time to time a Mandatory Reporter will agree with me that they are obligated to file a Mandatory Report. I expect that's what Mandatory Reporters are for: to agree that they would be imprisoned were they not to file.
Oddly those Mandatory Reports are never filed yet the Mandatory Reporters are never prosecuted.
Just now I quite bluntly confronted my mother regarding my father's murder. She administered at least six caplets of Extra Strength Tylenol per day - quite likely more than six - for at least two years, perhaps three, as Tylenol was modestly effective for Dad's Shingles, which later progressed into Neuralgia.
This despite that he had Hepatitis twice during his life from eating tainted shellfish.
When Dad's doctor ordered a CAT Scan of his liver to determine whether the hardened lump in it could be cancer or just Cirhosis, Mom flatly refused to permit it "Because his insurance doesn't cover CAT scans".
Even if you don't use a firewall you might use a non-filtering proxy. If so you might be able to filter just "/favicon.ico" from every web site.
I discovered a Zero-Day in the wild this morning. It exploits your browser, quite possibly your entire system through the favicon.ico that is placed at the root directory of many web sites:
I am already developing a Firefox and Chrome Add-Ons as well as Safari and Internet Explorer Plug-Ins that will block all favicons in their initial releases; later versions will user a separate process - a sandbox - to validate the document format of each favicon.ico, render its pixels in a memory buffer then display the now-safe image in the browser's address bar.
My Add-Ons and Plug-Ins will warn the user of invalid documents and display Message Boxes - Alerts - if the favicon.ico document actually does contain a Virus, Trojan Horse or Worm.
... a man is needed, who is ready, as Christ taught,
to be poor, wretched, thirsty, hungry,
and to suffer all kinds of persecution, reviling and defamation.
Saturday, September 28, 2013
Revised Friday, August 14, 2015
So crawford, so predictable. I bet there are dozens of 911 not an emergency phone calls to go along with this.
What boggles the mind is how the system fails time and time again
to keep the crawc0ck locked up and medicated.
-- Del Griffith
In reality, despite my most-diligent, at times desperate effort it is Damn near impossible to pry my medicine out of the hands of all but a very few mental health and medical professionals. To the extent I get any medicine at all - even just a little bit - I quite commonly find that medicine sickens me, that I am allergic to it, that it works well at first but after some time stops working so we must work together to find another - my options are running out - frequently that my new medicine fails to yield joy of any sort.
Then there were the cookies. One time, inside a local bakery, Knot was surprised to find that three 33-cent cookies were being sold for a dollar. While it didn’t prevent him from buying the cookies, he said, “even if it’s one cent, it seems off.”
Devil's in the details. who really use Lunatic Python ?
also, I came across this old entry that belonged to my 'banned' acct on jiaoyou8.com:
Booker T. Washington and W.E.B. DuBois
By Dudley Randall
"It seems to me," said Booker T.,
"It shows a mighty lot of cheek
To study chemistry and Greek
When Mister Charlie needs a hand
To hoe the cotton on his land,
And when Miss Ann looks for a cook,
Why stick your nose inside a book?"
"I don't agree," said W.E.B.
"If I should have the drive to seek
Knowledge of chemistry or Greek,
I'll do it. Charles and Miss can look
Another place for hand or cook,
Some men rejoice in skill of hand,
And some in cultivating land,
But there are others who maintain
The right to cultivate the brain."
"It seems to me," said Booker T.,
"That all you folks have missed the boat
Who shout about the right to vote,
And spend vain days and sleepless nights
In uproar over civil rights.
Just keep your mouths shut, do not grouse,
But work, and save, and buy a house."
"I don't agree," said W.E.B.
"For what can property avail
If dignity and justice fail?
Unless you help to make the laws,
They'll steal your house with trumped-up clause.
A rope's as tight, a fire as hot,
No matter how much cash you've got.
Speak soft, and try your little plan,
But as for me, I'll be a man."
"It seems to me," said Booker T.--
"I don't agree,"
Are you familiar with the problem of "Belling The Cat"? All the mice will benefit but one mouse must volunteer to tie the bell to her collar.
While lending for interest is the second-oldest profession, identity theft is a very recent phenomenon that originates in the use of identifying numbers for credit reporting. These provide Unique Keys for databases records.
"Michael David Crawford" is quite common; I figure the reason I try and try and try and try but just can't get laid is that my Evil Twin here in Washington State was a registered sex offender who did time in Walla Walla then got the idea in his head to open fire on the Lakewood Police while wearing a motorcycle helmet with metal plates duct-taped to it.
I expect we are cousins. Google our name and you will find we resemble each other.
We have always had credit but not always computers. One required credit references from live humans - written by hand, with an inkwell-dipped quill pen.
I lost everything when a medical clinic stored my plaintext Social on a notebook computer in gross violation of the HIPAA regulation then left it in a car in the dead of night. I have nothing to lose by Belling The Cat myself:
United States Social Security Number: 518-92-8663
California State Identification Card:
43 PRADO RD
SN LUIS OBISP, CA 93401
WGT 200 lb
Signed: Michael D. Crawford
From aortega at Hacker News:
Independent researches have found several security vulnerabilities in the e-voting machines that will be used this Sunday in the elections of local authorities in Buenos Aires. Tonight police raided homes of several of those researchers.
The vulnerabilities include a filtration of the SSL keys the machines use to communicate and authenticate with the central counting servers.
In spanish, about some of the vulnerabilities.
New HTML Parser: The long-awaited libxml2 based HTML parser code is live. It needs further work but already handles most markup better than the original parser.
Keep up with the latest Advogato features by reading the Advogato status blog.
If you're a C programmer with some spare time, take a look at the mod_virgule project page and help us with one of the tasks on the ToDo list!