Newton Dating Site - Free Online Dating in Newton (Kansas ...
Newton, IL Catholic Dating: Single Men Match.com®
Newton Dating Site, 100% Free Online Dating in Newton, MA
Dating Services - Yahoo Local Search Results
Best 4 Dating Service in Newton, MA with Reviews - YP.com
Meet Newton MA Singles - Newton Dating and Online ...
Dating Service in Newton on YP.com. See reviews, photos, directions, phone numbers and more for the best Dating Service in Newton, MA. Communicate free with quality, successful, fun, exciting, sexy Newton singles - free of any charges whatsoever. Regtistration is FAST and EASY! The fact that Loveawake allows you to make new American friends so easily is what really sets it apart from the other matchmaking sites. Our dating service is split into many different categories. Newton's best FREE dating site! 100% Free Online Dating for Newton Singles at Mingle2.com. Our free personal ads are full of single women and men in Newton looking for serious relationships, a little online flirtation, or new friends to go out with. Start meeting singles in Newton today with our free online personals and free Newton chat! Whether you are interested in a long term relationship or just looking to make friends in Newton,Illinois, Match.com is the place to be. In Newton, Match.com is the leading online dating service, finding more dates for available Newton singles than any other online dating service. Use the statistics to learn more about your community, and join the Internet dating service web sites to locate Newton people online. With a population of 83,829, there are tons of available singles in Newton, MA. For those searching for newton matchmaking and to meet newton singles, you will appreciate the fact that Newton has 30,326 singles. 2227 Washington St, Newton Lower Falls, MA · (781) 355-6339. Final Wing. Dating Service, Life Coach · Open · 1 on Yelp. 39 Brighton Ave, Boston, MA · (617) 855-9464. Successful Singles · 1 on Yelp. 70 Walnut St, Wellesley Hills, MA · (800) 698-2222. Boston Matchmakers Inc. Dating Service.
fan Kamala Harris is Communist, why did no one (except President Trump) say it?
2020.10.19 23:05 NamNguyen56fan Kamala Harris is Communist, why did no one (except President Trump) say it?
fan Kamala Harris is Communist, why did no one (except President Trump) say it? On Fox Business Network's "Mornings with Maria" on October 8, President Donald Trump described Democratic vice presidential candidate Kamala Harris (D-Calif.) As a "communist; She has left Bernie (Sanders)! "The president went on to quote Senator Harris 'stance, actually even more extreme than Senators Bernie Sanders' (I-Vt.), Or Elizabeth Warren's (D-Mass.).) But there are six more convincing evidence to show that, yes, Kamala Harris is indeed Communist. 1 / Left-Left Parents Harris's parents, her mother Shyamala Gopalan, an Indian cancer researcher and Donald Harris, a Jamaican economist, are both tough leftists. In the early 1960s, the couple was active in the Berkeley African American Association. According to a former member, Aubrey LaBrie, “Fidel Castro and Che Guevara are heroes of some of us. ... We talked about black Muslims, the liberation movements going on in Africa, everything. " The leader of the group, Donald Warden, advised two young African-American Association members Huey Newton and Bobby Seale, who would form the Black Panther party in 1966. The Panthers follow the Maoist philosophy. and support communist China. They serve as role models for today's Black Lives Matter movement. Years later, the Warden (then known as Khalid al-Mansour) played a role in helping Barack Obama enter Harvard Law School. In 1975, Donald Harris was recruited into the Stanford University economics department as an open Marxist. 2 / Pro-Communist Boyfriend After joining the radical student union at Howard University, Kamala Harris returned to the Bay Area to begin his legal career. Harris, 30, has aroused public opinion when dating Willie Brown, 60, a leading member of the California Democratic Party, is about to become mayor of San Francisco. Brown has helped Harris's career and put her on several board positions, and received a salary of around $ 400,000 over five years, according to San Francisco Weekly. Brown is a longtime communist sympathizer. For the first time, he was elected to the public office with the help of the American Communist Party's youth. He was awarded the Lenin Prize by Dr. Carlton Goodlett, the owner of a communist newspaper, by the former Soviet government. A few years after his affair with Harris, Brown still publicly funded the Communist Party's fundraising activities in the Bay Area while serving as mayor of San Francisco. Today, Brown is considered by many to be one of the best friends of the Chinese Communist Party in the Gulf. 3 / The person was led by Kamala Harris close to the communists While working as a San Francisco district attorney, Harris advised a young San Francisco activist named Lateefah Simon. After hiring her and helping Simon attend college, Harris introduced his young friend to many influential people in San Franciscans. Today, Simon is president of the left-wing Akonadi Foundation and chair of the Gulf Express Transport (BART) board. When Harris first met Simon, the young woman served on the board of directors at the Oakland-based Youth Empowerment Center. Every other member of the board - Harmony Goldberg, Adam Gold, Cindy Wiesner and later, Obama Green Jobs Czar Van Jones - were members of the Communist group Maoist "Organizing a Revolutionary Together" ( Standing Together to Organize a Revolutionary Movement) (STORM). Gold is today a member of the LeftRoots, a group affiliated with the Liberation Road group, which supports the Communist Party of China. Simon is a close friend of another LeftRoots member, the founder of Black Lives Matter, Alicia Garza. Harris openly supports the Black Lives Matter and remains close to Simon and Garza. In return, Garza is a longtime friend and colleague of Comrade Alex Tom of LeftRoots - who has close ties to the China Progressive Association and the Chinese Consulate in San Francisco. 4 / Financial sponsors under the Communist Maya Harris, Harris's sister, is a student activist at Stanford University. She is a friend of Steve Phillips, one of the top Marxist-Leninists in the school and a longtime member of the pro-China League of Revolutionary Struggle group. According to Phillips ' "Politics Intelligence" blog: "First, let me make it clear that I'm out of the Left. I learned Marx, Mao and Lenin. In college, I organized unity efforts for the libertarian struggles in South Africa and Nicaragua, and I spoke to people who considered themselves communists and revolutionaries ..., and I did. does her research on the Black Panther Party. " After leaving Stanford in the early 1990s, Phillips directed many of his comrades to the Democrats. He is also married to the Sandler billionaire family, which gives the young revolutionary a significant political influence. Sandler's money has funded the American Progress Center, ProPublica, and numerous candidates and voting initiatives across the country. In 2008, Phillips spent $ 10 million through his PowerPAC-plus on voter registrations in the southern and southwestern states, helping his friend Barack Obama outdo Hillary Clinton in the election. primary election of the Democratic Party. In 2013, Phillips helped elect his old Stanford friend Cory Booker to the US Senate from New Jersey. In 2018, he almost put his guardians Stacey Abrams and Andrew Gillum as governors of Georgia and Florida, respectively. Phillips is a friend of the Harris family and helped Maya Harris' husband Tony West become the deputy attorney general in the Obama administration. He is also the main sponsor of the political career of Kamala Harris. In 2003, Phillips helped Harris win the election, serving as a San Francisco county attorney. Ironically, she defeated incumbent Terence Hallinan, who was a young communist who helped Willie Brown win her first election. Phillips' PowerPAC-plus helped Harris win the election, served as California Attorney General in 2010 and then to the US Senate in 2016. 5 / Chief of the Secretariat to the Communist In the early 2000s, current director at Harris's Karine Jean-Pierre is active with the New York-based Haitian Support Network. The organization worked closely with the pro-China / North Korean Workers' World Party and backed Jean-Bertrand Aristide, the former left-right president of Haiti and his radical Lavalas era. In April 2004, at the Whitman Theater at Brooklyn University, 2,000 people gathered to listen to a program titled "An Evening with Friends of Haiti: The Truth Behind the Haitian Coup". The protest was co-chaired by Jean-Pierre and Kim Ives of the Haitian Support Network, along with Pat Chin and Sara Flounders from the Workers World Party. In May 2004, Jean-Pierre joined a delegation to Haiti with two famous comrades of the World Workers Party, Steve Gillis and LeiLani Dowell. Around the same time, Jean-Pierre was working for friendly New York City Council member James Sanders. Her duties as part of his reelection campaign included working with the local branch of the highly discredited "community organization" ACORN. 6 / The husband is close to the communist party Doug Emhoff, Harris's husband of law firm DLA Piper, “boasts nearly 30 years of experience in China and more than 140 lawyers specializing in the 'China Investment Services' branch,” according to National Pulse. National Pulse continued: “To facilitate the operations of DLA Piper's China - which has received numerous prestigious awards from the China Business Law Review and Chinese Law and Practice - the company employs one a series of former Chinese Communist Party officials. “Ernest Yang, who served as the company's Head of Legal & Legal and Co-Head of the International Arbitration Committee, was appointed to the People's Political Consultative Conference of China (CPPCC) in 2013. CPPCC serves as the top advisory committee to the Chinese Communist Party, and Yang was promoted to the agency's Standing Committee in 2019. “Jessica Zhao, Senior Advisor, served as Deputy Secretary-General of the Commission China International Economic and Trade Arbitration (CIETAC), a government-owned body established by the Chinese Communist Party in 1956. It was developed under the auspices of China Promotion Council. International Trade, 'China trade promotion enhancement government agency.' Several other senior DLA Piper employees, both Chinese and US citizens, served the Chinese regime. Emhoff quit her job at the company in August, The American Law reported. 7 / Does anyone have background checks? If Biden is elected president, then within a note, Harris will become the female president of the United States. If Harris applies for an intermediate job in the Department of Agriculture, she will almost certainly fail the security background check. She owes her entire career to those who agree or actively support the Communist Party of China. Fortunately for her (and possibly catastrophic for the country), elected office-holders are not subject to a security check. President Trump said, "If Joe Biden is elected, China will own America." Biden chose the ideal vice president to help China do this.
2020.10.19 17:04 azoundria2Bob The Magic Custodian
Summary: Everyone knows that when you give your assets to someone else, they always keep them safe. If this is true for individuals, it is certainly true for businesses. Custodians always tell the truth and manage funds properly. They won't have any interest in taking the assets as an exchange operator would. Auditors tell the truth and can't be misled. That's because organizations that are regulated are incapable of lying and don't make mistakes. First, some background. Here is a summary of how custodians make us more secure: Previously, we might give Alice our crypto assets to hold. There were risks:
Alice might take the assets and disappear.
Alice might spend the assets and pretend that she still has them (fractional model).
Alice might store the assets insecurely and they'll get stolen.
Alice might give the assets to someone else by mistake or by force.
Alice might lose access to the assets.
But "no worries", Alice has a custodian named Bob. Bob is dressed in a nice suit. He knows some politicians. And he drives a Porsche. "So you have nothing to worry about!". And look at all the benefits we get:
Alice can't take the assets and disappear (unless she asks Bob or never gives them to Bob).
Alice can't spend the assets and pretend that she still has them. (Unless she didn't give them to Bob or asks him for them.)
Alice can't store the assets insecurely so they get stolen. (After all - she doesn't have any control over the withdrawal process from any of Bob's systems, right?)
Alice can't give the assets to someone else by mistake or by force. (Bob will stop her, right Bob?)
Alice can't lose access to the funds. (She'll always be present, sane, and remember all secrets, right?)
See - all problems are solved! All we have to worry about now is:
Bob might take the assets and disappear.
Bob might spend the assets and pretend that he still has them (fractional model).
Bob might store the assets insecurely and they'll get stolen.
Bob might give the assets to someone else by mistake or by force.
Bob might lose access to the assets.
It's pretty simple. Before we had to trust Alice. Now we only have to trust Alice, Bob, and all the ways in which they communicate. Just think of how much more secure we are! "On top of that", Bob assures us, "we're using a special wallet structure". Bob shows Alice a diagram. "We've broken the balance up and store it in lots of smaller wallets. That way", he assures her, "a thief can't take it all at once". And he points to a historic case where a large sum was taken "because it was stored in a single wallet... how stupid". "Very early on, we used to have all the crypto in one wallet", he said, "and then one Christmas a hacker came and took it all. We call him the Grinch. Now we individually wrap each crypto and stick it under a binary search tree. The Grinch has never been back since." "As well", Bob continues, "even if someone were to get in, we've got insurance. It covers all thefts and even coercion, collusion, and misplaced keys - only subject to the policy terms and conditions." And with that, he pulls out a phone-book sized contract and slams it on the desk with a thud. "Yep", he continues, "we're paying top dollar for one of the best policies in the country!" "Can I read it?' Alice asks. "Sure," Bob says, "just as soon as our legal team is done with it. They're almost through the first chapter." He pauses, then continues. "And can you believe that sales guy Mike? He has the same year Porsche as me. I mean, what are the odds?" "Do you use multi-sig?", Alice asks. "Absolutely!" Bob replies. "All our engineers are fully trained in multi-sig. Whenever we want to set up a new wallet, we generate 2 separate keys in an air-gapped process and store them in this proprietary system here. Look, it even requires the biometric signature from one of our team members to initiate any withdrawal." He demonstrates by pressing his thumb into the display. "We use a third-party cloud validation API to match the thumbprint and authorize each withdrawal. The keys are also backed up daily to an off-site third-party." "Wow that's really impressive," Alice says, "but what if we need access for a withdrawal outside of office hours?" "Well that's no issue", Bob says, "just send us an email, call, or text message and we always have someone on staff to help out. Just another part of our strong commitment to all our customers!" "What about Proof of Reserve?", Alice asks. "Of course", Bob replies, "though rather than publish any blockchain addresses or signed transaction, for privacy we just do a SHA256 refactoring of the inverse hash modulus for each UTXO nonce and combine the smart contract coefficient consensus in our hyperledger lightning node. But it's really simple to use." He pushes a button and a large green checkmark appears on a screen. "See - the algorithm ran through and reserves are proven." "Wow", Alice says, "you really know your stuff! And that is easy to use! What about fiat balances?" "Yeah, we have an auditor too", Bob replies, "Been using him for a long time so we have quite a strong relationship going! We have special books we give him every year and he's very efficient! Checks the fiat, crypto, and everything all at once!" "We used to have a nice offline multi-sig setup we've been using without issue for the past 5 years, but I think we'll move all our funds over to your facility," Alice says. "Awesome", Bob replies, "Thanks so much! This is perfect timing too - my Porsche got a dent on it this morning. We have the paperwork right over here." "Great!", Alice replies. And with that, Alice gets out her pen and Bob gets the contract. "Don't worry", he says, "you can take your crypto-assets back anytime you like - just subject to our cancellation policy. Our annual management fees are also super low and we don't adjust them often". How many holes have to exist for your funds to get stolen? Just one. Why are we taking a powerful offline multi-sig setup, widely used globally in hundreds of different/lacking regulatory environments with 0 breaches to date, and circumventing it by a demonstrably weak third party layer? And paying a great expense to do so? If you go through the list of breaches in the past 2 years to highly credible organizations, you go through the list of major corporate frauds (only the ones we know about), you go through the list of all the times platforms have lost funds, you go through the list of times and ways that people have lost their crypto from identity theft, hot wallet exploits, extortion, etc... and then you go through this custodian with a fine-tooth comb and truly believe they have value to add far beyond what you could, sticking your funds in a wallet (or set of wallets) they control exclusively is the absolute worst possible way to take advantage of that security. The best way to add security for crypto-assets is to make a stronger multi-sig. With one custodian, what you are doing is giving them your cryptocurrency and hoping they're honest, competent, and flawlessly secure. It's no different than storing it on a really secure exchange. Maybe the insurance will cover you. Didn't work for Bitpay in 2015. Didn't work for Yapizon in 2017. Insurance has never paid a claim in the entire history of cryptocurrency. But maybe you'll get lucky. Maybe your exact scenario will buck the trend and be what they're willing to cover. After the large deductible and hopefully without a long and expensive court battle. And you want to advertise this increase in risk, the lapse of judgement, an accident waiting to happen, as though it's some kind of benefit to customers ("Free institutional-grade storage for your digital assets.")? And then some people are writing to the OSC that custodians should be mandatory for all funds on every exchange platform? That this somehow will make Canadians as a whole more secure or better protected compared with standard air-gapped multi-sig? On what planet? Most of the problems in Canada stemmed from one thing - a lack of transparency. If Canadians had known what a joke Quadriga was - it wouldn't have grown to lose $400m from hard-working Canadians from coast to coast to coast. And Gerald Cotten would be in jail, not wherever he is now (at best, rotting peacefully). EZ-BTC and mister Dave Smilie would have been a tiny little scam to his friends, not a multi-million dollar fraud. Einstein would have got their act together or been shut down BEFORE losing millions and millions more in people's funds generously donated to criminals. MapleChange wouldn't have even been a thing. And maybe we'd know a little more about CoinTradeNewNote - like how much was lost in there. Almost all of the major losses with cryptocurrency exchanges involve deception with unbacked funds. So it's great to see transparency reports from BitBuy and ShakePay where someone independently verified the backing. The only thing we don't have is:
ANY CERTAINTY BALANCES WEREN'T EXCLUDED. Quadriga's largest account was $70m. 80% of funds are in 20% of accounts (Pareto principle). All it takes is excluding a few really large accounts - and nobody's the wiser. A fractional platform can easily pass any audit this way.
ANY VISIBILITY WHATSOEVER INTO THE CUSTODIANS. BitBuy put out their report before moving all the funds to their custodian and ShakePay apparently can't even tell us who the custodian is. That's pretty important considering that basically all of the funds are now stored there.
ANY IDEA ABOUT THE OTHER EXCHANGES. In order for this to be effective, it has to be the norm. It needs to be "unusual" not to know. If obscurity is the norm, then it's super easy for people like Gerald Cotten and Dave Smilie to blend right in.
It's not complicated to validate cryptocurrency assets. They need to exist, they need to be spendable, and they need to cover the total balances. There are plenty of credible people and firms across the country that have the capacity to reasonably perform this validation. Having more frequent checks by different, independent, parties who publish transparent reports is far more valuable than an annual check by a single "more credible/official" party who does the exact same basic checks and may or may not publish anything. Here's an example set of requirements that could be mandated:
First report within 1 month of launching, another within 3 months, and further reports at minimum every 6 months thereafter.
No auditor can be repeated within a 12 month period.
All reports must be public, identifying the auditor and the full methodology used.
All auditors must be independent of the firm being audited with no conflict of interest.
Reports must include the percentage of each asset backed, and how it's backed.
The auditor publishes a hash list, which lists a hash of each customer's information and balances that were included. Hash is one-way encryption so privacy is fully preserved. Every customer can use this to have 100% confidence they were included.
If we want more extensive requirements on audits, these should scale upward based on the total assets at risk on the platform, and whether the platform has loaned their assets out.
There are ways to structure audits such that neither crypto assets nor customer information are ever put at risk, and both can still be properly validated and publicly verifiable. There are also ways to structure audits such that they are completely reasonable for small platforms and don't inhibit innovation in any way. By making the process as reasonable as possible, we can completely eliminate any reason/excuse that an honest platform would have for not being audited. That is arguable far more important than any incremental improvement we might get from mandating "the best of the best" accountants. Right now we have nothing mandated and tons of Canadians using offshore exchanges with no oversight whatsoever. Transparency does not prove crypto assets are safe. CoinTradeNewNote, Flexcoin ($600k), and Canadian Bitcoins ($100k) are examples where crypto-assets were breached from platforms in Canada. All of them were online wallets and used no multi-sig as far as any records show. This is consistent with what we see globally - air-gapped multi-sig wallets have an impeccable record, while other schemes tend to suffer breach after breach. We don't actually know how much CoinTrader lost because there was no visibility. Rather than publishing details of what happened, the co-founder of CoinTrader silently moved on to found another platform - the "most trusted way to buy and sell crypto" - a site that has no information whatsoever (that I could find) on the storage practices and a FAQ advising that “[t]rading cryptocurrency is completely safe” and that having your own wallet is “entirely up to you! You can certainly keep cryptocurrency, or fiat, or both, on the app.” Doesn't sound like much was learned here, which is really sad to see. It's not that complicated or unreasonable to set up a proper hardware wallet. Multi-sig can be learned in a single course. Something the equivalent complexity of a driver's license test could prevent all the cold storage exploits we've seen to date - even globally. Platform operators have a key advantage in detecting and preventing fraud - they know their customers far better than any custodian ever would. The best job that custodians can do is to find high integrity individuals and train them to form even better wallet signatories. Rather than mandating that all platforms expose themselves to arbitrary third party risks, regulations should center around ensuring that all signatories are background-checked, properly trained, and using proper procedures. We also need to make sure that signatories are empowered with rights and responsibilities to reject and report fraud. They need to know that they can safely challenge and delay a transaction - even if it turns out they made a mistake. We need to have an environment where mistakes are brought to the surface and dealt with. Not one where firms and people feel the need to hide what happened. In addition to a knowledge-based test, an auditor can privately interview each signatory to make sure they're not in coercive situations, and we should make sure they can freely and anonymously report any issues without threat of retaliation. A proper multi-sig has each signature held by a separate person and is governed by policies and mutual decisions instead of a hierarchy. It includes at least one redundant signature. For best results, 3of4, 3of5, 3of6, 4of5, 4of6, 4of7, 5of6, or 5of7. History has demonstrated over and over again the risk of hot wallets even to highly credible organizations. Nonetheless, many platforms have hot wallets for convenience. While such losses are generally compensated by platforms without issue (for example Poloniex, Bitstamp, Bitfinex, Gatecoin, Coincheck, Bithumb, Zaif, CoinBene, Binance, Bitrue, Bitpoint, Upbit, VinDAX, and now KuCoin), the public tends to focus more on cases that didn't end well. Regardless of what systems are employed, there is always some level of risk. For that reason, most members of the public would prefer to see third party insurance. Rather than trying to convince third party profit-seekers to provide comprehensive insurance and then relying on an expensive and slow legal system to enforce against whatever legal loopholes they manage to find each and every time something goes wrong, insurance could be run through multiple exchange operators and regulators, with the shared interest of having a reputable industry, keeping costs down, and taking care of Canadians. For example, a 4 of 7 multi-sig insurance fund held between 5 independent exchange operators and 2 regulatory bodies. All Canadian exchanges could pay premiums at a set rate based on their needed coverage, with a higher price paid for hot wallet coverage (anything not an air-gapped multi-sig cold wallet). Such a model would be much cheaper to manage, offer better coverage, and be much more reliable to payout when needed. The kind of coverage you could have under this model is unheard of. You could even create something like the CDIC to protect Canadians who get their trading accounts hacked if they can sufficiently prove the loss is legitimate. In cases of fraud, gross negligence, or insolvency, the fund can be used to pay affected users directly (utilizing the last transparent balance report in the worst case), something which private insurance would never touch. While it's recommended to have official policies for coverage, a model where members vote would fully cover edge cases. (Could be similar to the Supreme Court where justices vote based on case law.) Such a model could fully protect all Canadians across all platforms. You can have a fiat coverage governed by legal agreements, and crypto-asset coverage governed by both multi-sig and legal agreements. It could be practical, affordable, and inclusive. Now, we are at a crossroads. We can happily give up our freedom, our innovation, and our money. We can pay hefty expenses to auditors, lawyers, and regulators year after year (and make no mistake - this cost will grow to many millions or even billions as the industry grows - and it will be borne by all Canadians on every platform because platforms are not going to eat up these costs at a loss). We can make it nearly impossible for any new platform to enter the marketplace, forcing Canadians to use the same stagnant platforms year after year. We can centralize and consolidate the entire industry into 2 or 3 big players and have everyone else fail (possibly to heavy losses of users of those platforms). And when a flawed security model doesn't work and gets breached, we can make it even more complicated with even more people in suits making big money doing the job that blockchain was supposed to do in the first place. We can build a system which is so intertwined and dependent on big government, traditional finance, and central bankers that it's future depends entirely on that of the fiat system, of fractional banking, and of government bail-outs. If we choose this path, as history has shown us over and over again, we can not go back, save for revolution. Our children and grandchildren will still be paying the consequences of what we decided today. Or, we can find solutions that work. We can maintain an open and innovative environment while making the adjustments we need to make to fully protect Canadian investors and cryptocurrency users, giving easy and affordable access to cryptocurrency for all Canadians on the platform of their choice, and creating an environment in which entrepreneurs and problem solvers can bring those solutions forward easily. None of the above precludes innovation in any way, or adds any unreasonable cost - and these three policies would demonstrably eliminate or resolve all 109 historic cases as studied here - that's every single case researched so far going back to 2011. It includes every loss that was studied so far not just in Canada but globally as well. Unfortunately, finding answers is the least challenging part. Far more challenging is to get platform operators and regulators to agree on anything. My last post got no response whatsoever, and while the OSC has told me they're happy for industry feedback, I believe my opinion alone is fairly meaningless. This takes the whole community working together to solve. So please let me know your thoughts. Please take the time to upvote and share this with people. Please - let's get this solved and not leave it up to other people to do. Facts/background/sources (skip if you like):
The inspiration for the paragraph about splitting wallets was an actual quote from a Canadian company providing custodial services in response to the OSC consultation paper: "We believe that it will be in the in best interests of investors to prohibit pooled crypto assets or ‘floats’. Most Platforms pool assets, citing reasons of practicality and expense. The recent hack of the world’s largest Platform – Binance – demonstrates the vulnerability of participants’ assets when such concessions are made. In this instance, the Platform’s entire hot wallet of Bitcoins, worth over $40 million, was stolen, facilitated in part by the pooling of client crypto assets." "the maintenance of participants (and Platform) crypto assets across multiple wallets distributes the related risk and responsibility of security - reducing the amount of insurance coverage required and making insurance coverage more readily obtainable". For the record, their reply also said nothing whatsoever about multi-sig or offline storage.
In addition to the fact that the $40m hack represented only one "hot wallet" of Binance, and they actually had the vast majority of assets in other wallets (including mostly cold wallets), multiple real cases have clearly demonstrated that risk is still present with multiple wallets. Bitfinex, VinDAX, Bithumb, Altsbit, BitPoint, Cryptopia, and just recently KuCoin all had multiple wallets breached all at the same time, and may represent a significantly larger impact on customers than the Binance breach which was fully covered by Binance. To represent that simply having multiple separate wallets under the same security scheme is a comprehensive way to reduce risk is just not true.
Private insurance has historically never covered a single loss in the cryptocurrency space (at least, not one that I was able to find), and there are notable cases where massive losses were not covered by insurance. Bitpay in 2015 and Yapizon in 2017 both had insurance policies that didn't pay out during the breach, even after a lengthly court process. The same insurance that ShakePay is presently using (and announced to much fanfare) was describe by their CEO himself as covering “physical theft of the media where the private keys are held,” which is something that has never historically happened. As was said with regard to the same policy in 2018 - “I don’t find it surprising that Lloyd’s is in this space,” said Johnson, adding that to his mind the challenge for everybody is figuring out how to structure these policies so that they are actually protective. “You can create an insurance policy that protects no one – you know there are so many caveats to the policy that it’s not super protective.”
The most profitable policy for a private insurance company is one with the most expensive premiums that they never have to pay a claim on. They have no inherent incentive to take care of people who lost funds. It's "cheaper" to take the reputational hit and fight the claim in court. The more money at stake, the more the insurance provider is incentivized to avoid payout. They're not going to insure the assets unless they have reasonable certainty to make a profit by doing so, and they're not going to pay out a massive sum unless it's legally forced. Private insurance is always structured to be maximally profitable to the insurance provider.
The circumvention of multi-sig was a key factor in the massive Bitfinex hack of over $60m of bitcoin, which today still sits being slowly used and is worth over $3b. While Bitfinex used a qualified custodian Bitgo, which was and still is active and one of the industry leaders of custodians, and they set up 2 of 3 multi-sig wallets, the entire system was routed through Bitfinex, such that Bitfinex customers could initiate the withdrawals in a "hot" fashion. This feature was also a hit with the hacker. The multi-sig was fully circumvented.
Bitpay in 2015 was another example of a breach that stole 5,000 bitcoins. This happened not through the exploit of any system in Bitpay, but because the CEO of a company they worked with got their computer hacked and the hackers were able to request multiple bitcoin purchases, which Bitpay honoured because they came from the customer's computer legitimately. Impersonation is a very common tactic used by fraudsters, and methods get more extreme all the time.
A notable case in Canada was the Canadian Bitcoins exploit. Funds were stored on a server in a Rogers Data Center, and the attendee was successfully convinced to reboot the server "in safe mode" with a simple phone call, thus bypassing the extensive security and enabling the theft.
The very nature of custodians circumvents multi-sig. This is because custodians are not just having to secure the assets against some sort of physical breach but against any form of social engineering, modification of orders, fraudulent withdrawal attempts, etc... If the security practices of signatories in a multi-sig arrangement are such that the breach risk of one signatory is 1 in 100, the requirement of 3 independent signatures makes the risk of theft 1 in 1,000,000. Since hackers tend to exploit the weakest link, a comparable custodian has to make the entry and exit points of their platform 10,000 times more secure than one of those signatories to provide equivalent protection. And if the signatories beef up their security by only 10x, the risk is now 1 in 1,000,000,000. The custodian has to be 1,000,000 times more secure. The larger and more complex a system is, the more potential vulnerabilities exist in it, and the fewer people can understand how the system works when performing upgrades. Even if a system is completely secure today, one has to also consider how that system might evolve over time or work with different members.
By contrast, offline multi-signature solutions have an extremely solid record, and in the entire history of cryptocurrency exchange incidents which I've studied (listed here), there has only been one incident (796 exchange in 2015) involving an offline multi-signature wallet. It happened because the customer's bitcoin address was modified by hackers, and the amount that was stolen ($230k) was immediately covered by the exchange operators. Basically, the platform operators were tricked into sending a legitimate withdrawal request to the wrong address because hackers exploited their platform to change that address. Such an issue would not be prevented in any way by the use of a custodian, as that custodian has no oversight whatsoever to the exchange platform. It's practical for all exchange operators to test large withdrawal transactions as a general policy, regardless of what model is used, and general best practice is to diagnose and fix such an exploit as soon as it occurs.
False promises on the backing of funds played a huge role in the downfall of Quadriga, and it's been exposed over and over again (MyCoin, PlusToken, Bitsane, Bitmarket, EZBTC, IDAX). Even today, customers have extremely limited certainty on whether their funds in exchanges are actually being backed or how they're being backed. While this issue is not unique to cryptocurrency exchanges, the complexity of the technology and the lack of any regulation or standards makes problems more widespread, and there is no "central bank" to come to the rescue as in the 2008 financial crisis or during the great depression when "9,000 banks failed".
In addition to fraudulent operations, the industry is full of cases where operators have suffered breaches and not reported them. Most recently, Einstein was the largest case in Canada, where ongoing breaches and fraud were perpetrated against the platform for multiple years and nobody found out until the platform collapsed completely. While fraud and breaches suck to deal with, they suck even more when not dealt with. Lack of visibility played a role in the largest downfalls of Mt. Gox, Cryptsy, and Bitgrail. In some cases, platforms are alleged to have suffered a hack and keep operating without admitting it at all, such as CoinBene.
It surprises some to learn that a cryptographic solution has already existed since 2013, and gained widespread support in 2014 after Mt. Gox. Proof of Reserves is a full cryptographic proof that allows any customer using an exchange to have complete certainty that their crypto-assets are fully backed by the platform in real-time. This is accomplished by proving that assets exist on the blockchain, are spendable, and fully cover customer deposits. It does not prove safety of assets or backing of fiat assets.
If we didn't care about privacy at all, a platform could publish their wallet addresses, sign a partial transaction, and put the full list of customer information and balances out publicly. Customers can each check that they are on the list, that the balances are accurate, that the total adds up, and that it's backed and spendable on the blockchain. Platforms who exclude any customer take a risk because that customer can easily check and see they were excluded. So together with all customers checking, this forms a full proof of backing of all crypto assets.
However, obviously customers care about their private information being published. Therefore, a hash of the information can be provided instead. Hash is one-way encryption. The hash allows the customer to validate inclusion (by hashing their own known information), while anyone looking at the list of hashes cannot determine the private information of any other user. All other parts of the scheme remain fully intact. A model like this is in use on the exchange CoinFloor in the UK.
A Merkle tree can provide even greater privacy. Instead of a list of balances, the balances are arranged into a binary tree. A customer starts from their node, and works their way to the top of the tree. For example, they know they have 5 BTC, they plus 1 other customer hold 7 BTC, they plus 2-3 other customers hold 17 BTC, etc... until they reach the root where all the BTC are represented. Thus, there is no way to find the balances of other individual customers aside from one unidentified customer in this case.
Proposals such as this had the backing of leaders in the community including Nic Carter, Greg Maxwell, and Zak Wilcox. Substantial and significant effort started back in 2013, with massive popularity in 2014. But what became of that effort? Very little. Exchange operators continue to refuse to give visibility. Despite the fact this information can often be obtained through trivial blockchain analysis, no Canadian platform has ever provided any wallet addresses publicly. As described by the CEO of Newton "For us to implement some kind of realtime Proof of Reserves solution, which I'm not opposed to, it would have to ... Preserve our users' privacy, as well as our own. Some kind of zero-knowledge proof". Kraken describes here in more detail why they haven't implemented such a scheme. According to professor Eli Ben-Sasson, when he spoke with exchanges, none were interested in implementing Proof of Reserves.
And yet, Kraken's places their reasoning on a page called "Proof of Reserves". More recently, both BitBuy and ShakePay have released reports titled "Proof of Reserves and Security Audit". Both reports contain disclaimers against being audits. Both reports trust the customer list provided by the platform, leaving the open possibility that multiple large accounts could have been excluded from the process. Proof of Reserves is a blockchain validation where customers see the wallets on the blockchain. The report from Kraken is 5 years old, but they leave it described as though it was just done a few weeks ago. And look at what they expect customers to do for validation. When firms represent something being "Proof of Reserve" when it's not, this is like a farmer growing fruit with pesticides and selling it in a farmers market as organic produce - except that these are people's hard-earned life savings at risk here. Platforms are misrepresenting the level of visibility in place and deceiving the public by their misuse of this term. They haven't proven anything.
Fraud isn't a problem that is unique to cryptocurrency. Fraud happens all the time. Enron, WorldCom, Nortel, Bear Stearns, Wells Fargo, Moser Baer, Wirecard, Bre-X, and Nicola are just some of the cases where frauds became large enough to become a big deal (and there are so many countless others). These all happened on 100% reversible assets despite regulations being in place. In many of these cases, the problems happened due to the over-complexity of the financial instruments. For example, Enron had "complex financial statements [which] were confusing to shareholders and analysts", creating "off-balance-sheet vehicles, complex financing structures, and deals so bewildering that few people could understand them". In cryptocurrency, we are often combining complex financial products with complex technologies and verification processes. We are naïve if we think problems like this won't happen. It is awkward and uncomfortable for many people to admit that they don't know how something works. If we want "money of the people" to work, the solutions have to be simple enough that "the people" can understand them, not so confusing that financial professionals and technology experts struggle to use or understand them.
For those who question the extent to which an organization can fool their way into a security consultancy role, HB Gary should be a great example to look at. Prior to trying to out anonymous, HB Gary was being actively hired by multiple US government agencies and others in the private sector (with glowing testimonials). The published articles and hosted professional security conferences. One should also look at this list of data breaches from the past 2 years. Many of them are large corporations, government entities, and technology companies. These are the ones we know about. Undoubtedly, there are many more that we do not know about. If HB Gary hadn't been "outted" by anonymous, would we have known they were insecure? If the same breach had happened outside of the public spotlight, would it even have been reported? Or would HB Gary have just deleted the Twitter posts, brought their site back up, done a couple patches, and kept on operating as though nothing had happened?
In the case of Quadriga, the facts are clear. Despite past experience with platforms such as MapleChange in Canada and others around the world, no guidance or even the most basic of a framework was put in place by regulators. By not clarifying any sort of legal framework, regulators enabled a situation where a platform could be run by former criminal Mike Dhanini/Omar Patryn, and where funds could be held fully unchecked by one person. At the same time, the lack of regulation deterred legitimate entities from running competing platforms and Quadriga was granted a money services business license for multiple years of operation, which gave the firm the appearance of legitimacy. Regulators did little to protect Canadians despite Quadriga failing to file taxes from 2016 onward. The entire administrative team had resigned and this was public knowledge. Many people had suspicions of what was going on, including Ryan Mueller, who forwarded complaints to the authorities. These were ignored, giving Gerald Cotten the opportunity to escape without justice.
There are multiple issues with the SOC II model including the prohibitive cost (you have to find a third party accounting firm and the prices are not even listed publicly on any sites), the requirement of operating for a year (impossible for new platforms), and lack of any public visibility (SOC II are private reports that aren't shared outside the people in suits).
Securities frameworks are expensive. Sarbanes-Oxley is estimated to cost $5.1 million USD/yr for the average Fortune 500 company in the United States. Since "Fortune 500" represents the top 500 companies, that means well over $2.55 billion USD (~$3.4 billion CAD) is going to people in suits. Isn't the problem of trust and verification the exact problem that the blockchain is supposed to solve?
To use Quadriga as justification for why custodians or SOC II or other advanced schemes are needed for platforms is rather silly, when any framework or visibility at all, or even the most basic of storage policies, would have prevented the whole thing. It's just an embarrassment.
We are now seeing regulators take strong action. CoinSquare in Canada with multi-million dollar fines. BitMex from the US, criminal charges and arrests. OkEx, with full disregard of withdrawals and no communication. Who's next?
We have a unique window today where we can solve these problems, and not permanently destroy innovation with unreasonable expectations, but we need to act quickly. This is a unique historic time that will never come again.
2020.10.19 03:23 Helen5808This is gonna be a thing now
Understand the Context. The voyage by Christopher Columbus in 1492 that connected the Eastern and Western hemispheres led to the first global trade networks. They provided the framework for historical events for the following centuries. Establishment of Maritime Empires. Between 1450 and 1750, European states, starting with the Portuguese and Spanish, sought a transoceanic route to Asia. Europeans established trading post empires in the Indian Ocean that inadvertently brought them into contact with the Americas. Global Exchanges. Trans-Atlantic trade linked the Americas, Europe, and Africa for the first time. European colonists who wanted sugar and other crops to sell in the global market developed plantations in the Americas. Their desire for laborers fueled the trade in enslaved Africans. Trans-Pacific trade flourished as well. Silver mined in Latin America was the major commodity. Over time, the transfer of crops, animals, and disease between the Eastern and Western hemispheres, known as the Columbian Exchange, altered life everywhere. The introduction of potatoes, corn, and tomatoes to Europe led to population growth. The introduction of deadly pathogens, such as small pox and measles, devastated the populations of the Americas. Change and Continuity. Within the context of increasing European influence, regional commerce and established states in Afro-Eurasia continued to flourish. The Mughal, Ottoman, and Qing Empires expanded, creating ethnically diverse states. Across the globe, peasant and artisan labor intensified as the demand for goods and food increased. These developments set the stage for the revolutions that defined the period after 1750. Technological Innovations. The sailors, moreover, as they sail over the sea, when in cloudy weather they can no longer profit by the light of the sun, or when the world is wrapped up in the darkness of the shades of night, and they are ignorant to what point of the compass their ship's course is directed, they touch the magnet with a needle which (the needle) is whiled round in a circle until, when its motion ceases, its point looks direct to the north. - Alexander Neckham (1157-1217). Essential Question: How did cross-cultural interactions spread technology and facilitate changes in trade and travel from 1450 to 1750? Although land-based empires were important during this period, various inventions allowed Europeans to venture long distances on the ocean. The magnetic compass, originally created in China for fortune telling, helped steer a ship in the right direction, as described by Alexander Neckham. The astrolabe, improved by Muslim navigators in the 12th century, let sailors find out how far north or south they were from the equator. The caravel, a small, three-masted sailing ship developed by the Portuguese in the 15th century, allowed sailors to survive storms at sea better than carlier-designed ships. Cartography, or mapmaking, and knowledge of current and wind patterns also improved navigation Demographic pressures pushed Europeans into exploration and trade. As the population grew, not all workers in Europe could find work or even food. Not all sons of the wealthy could own land because primogeniture laws gave all of each estate to the eldest son. In the carly 17th century, religious minorities searched for a place to settle where people were tolerant of their dissent. All of these groups, as well as those just longing for adventure and glory, were eager to settle in new areas. Those who left their homelands in search of work, food, land, tolerance, and adventure were part of a global shift in demographics. Developments of Transoceanic Travel and Trade Europe was never totally isolated from East and South Asia. The Indian Ocean trade routes had long brought silk, spices, and tea to the Mediterranean by way of the Red Sea. Islamic traders had long known of land routes from China to the cities of Baghdad and Constantinople and from there to Rome. Then, in the 16th century, more and more Europeans became active in the Indian Ocean, with hopes of finding wealth and new converts as their twin motives.However, Europeans faced competition from Middle Eastern traders based in kingdoms such as Oman. For example, the Portuguese set up forts in Oman but were repeatedly challenged by attempts to remove them. The Omani- European rivalry was one reason for Christopher Columbus's search for a new route to India. The voyages by Columbus connected people across the Atlantic Ocean. European traders became go-betweens linking Afro-Eurasia and the Americas. • From the Americas, they purchased sugar, tobacco, and rum. • From Africa, they purchased enslaved people. • From Asia, they purchased silk, spices, and thubarb. This extensive trade transformed Spain, Portugal, Great Britain, France, and Holland into maritime empires, ones based on sea travel. Much of this trade was carried out by men. However, in Southeast Asia, Europeans conducted most of their business with women, who traditionally handled markets and money-changing services in those cultures. Classical, Islamic, and Asian Technology Western European countries such as Portugal, Spain, and England were developing their naval technology. They were aware of traditions of sailing that went back to the classical Greeks, such as using the stars to navigate. They combined this knowledge with new ideas developed by Islamic and Asian sailors and scholars, which they learned about because of the cross- cultural interactions resulting from trade networks. Al-Andalus, in what is now Spain, was a place where Islamic ideas diffused into Europe. The leading European figure in this development was Portuguese ruler Prince Henry the Navigator. While he never sailed far enough out to sea to lose sight of land, he strongly supported exploration. He financed expeditions along Africa's Atlantic Coast and around the Cape of Good Hope. With his backing, Portugal explore African coastal communities and kingdoms before other European powers. Advances in Ideas. As scholars gathered knowledge, they improved the safety of sailing on the ocean. For example, Newton's discovery of gravitation increased knowledge of the tides. As a result, sailors could reliably predict when the depth of water near a shore would be decreasing, thereby exposing dangerous rocks. As people kept increasingly accurate records on the direction and intensity of winds, sailors could sail with greater confidence. Improvements in cartography also improved navigation. An astronomical chart is any map of the stars and galaxies. Mariners relied on these maps to guide ships' direction, especially before the introduction of the compass, using the skies to help them determine their location. Ancient astronomers in Babylonia and Mesopotamia had created star charts as early as the 2nd millennium B.C.E. Charts by Chinese astronomers date back to the 5th century B.C.E. Charts were also used widely by classical Greek astronomers. Using telescopes to help create astronomical charts began in 1609, and the practice was widely used to map the stars by the end of the 17th century. Astronomers typically divided the charts into grids to help locate specific constellations and astronomical objects. Advances in Equipment. Several developments in the equipment used on ships made sailing safer and faster than ever. Ships moved adroitly, aided by a new type of rudder, another idea imported from China. The astrolabe, improved by Muslim navigators in the 12th century, allowed sailors to determine how far north or south they were from the equator. The compass is the primary direction-finding device used in navigation. It works either with magnets or a gyroscope, which is a wheel or disk mounted to spin rapidly around an axis in various directions. Other compasses determine the location of the sun or a specific star. The magnetic compass, originally invented in China, allowed sailors to steer a ship in the right direction. It is the oldest and most familiar. It was discovered by mariners in both China and Europe in the 12th century. This type of compass works as Earth itself acts as an enormous bar magnet. Earth's magnetic field is almost parallel to the north- south axis of the globe, which means that freely moving magnets, such as those in a compass, take on the same orientation. The lateen sail, or a ship sail in the shape of a triangle, was a pivotal piece of technology. Used by Arab sailors and in the Indian Ocean, it significantly affected medieval navigation and trade. The ancient square sails that preceded the lateen allowed sailing only in a single direction and had to be used with the wind. The lateen, however, could catch the wind on either side of the ship, allowing it to travel in different directions. When used with the square sail, the lateen allowed sailors to travel successfully into large bodies of water, including oceans, for the first time, thus expanding trade routes. New types of ships also improved trade. By adjusting the ratio of length to width of a ship, adding or reducing the number of masts, and using different types of sails, builders could adapt ships to improve their efficiency. (Connect: Compare the technological advances of the Mongols and Chinese of the 12th and 13th centuries with those in the chart below. See Topic 2.1.) Three Types of Ships. See graph. Long-Term Results. The long-term result of combining navigational techniques invented in Europe with those from other areas of the world was a rapid expansion of exploration and global trade. About the only part of the Afro- Eurasia world not affected by the rapid increase in global trade was Polynesia, since it was far removed from trading routes. The introduction of gunpowder, another Chinese invention, aided Europeans in their conquests abroad. Soon enough, however, sea pirates also used the new technology, particularly the Dutch pirates known as Sea Beggars. In North Africa and in the trading cities along Africa's east coast, Islam spread rapidly as a result of the growth of the Abbasid Empire, centered in Baghdad, and the activities of Muslim merchants. Interactions among various cultures inside and outside of Africa brought extensive trade and new technology to the continent. Navigational techniques continued to spread throughout the 17th century. Russia's Tsar Peter the Great visited Western Europe in 1697 to observe military and naval technology. His interest in European technology led him to hire technicians from Germany and elsewhere to help build Russia's military and naval power.
2020.10.15 06:00 pfeifer1982HCFujiFilm - Cynata's First Licensee Of Its Lead Product CYP-001 In GvHD
The terms According to the ASX announcement dated 17 September 2017 the terms are as follows: • FujiFilm Holdings Corporation (FujiFilm) is granted an exclusive, worldwide license to develop and commercialise Cynata Therapeutics (Cynata) lead mesenchymal stem cell (MSC) product, CYP-001, for the prevention and treatment of GvHD in human so Cynata will receive US$3m cash from Fujifilm as an upfront fee. [note pfeifer1982HC: prompting a payment of US$10,000 toWisconsin Alumni Research Foundation (WARF)as part of thelicense agreement with Cynata, see below] o Fujifilm will bear responsibility for all costs of any further product development activities in relation to GvHD, along with responsibility for regulatory submissions and commercialisation. o The non-dilutive upfront payment of US$3m will lengthen Cynata’s cash runway and support further investment in the upcoming Phase 2 trials in critical limb ischemia (“CLI”) and in osteoarthritis, along with other potential future clinical programs. o Cynata will potentially receive additional future milestone payments from Fujifilm totalling up to US$43m based on successful attainment of certain industry standard product development and commercial milestones, the first of which is US$2m on completion of the first Phase 2 clinical trial in USA, UK or Japan. Subsequent milestones are completion of Phase 3 clinical trials (US$3m), submission of applications for regulatory approvals (US$12m), acceptance of geographic marketing authorisations and first sales (US$16m) and extending the indication (US$10m). [note pfeifer1982HC: of which 30% will likely be payable toWisconsin Alumni Research Foundation (WARF)as part of thelicense agreement with Cynata, see below] o Cynata will receive a 10% royalty on all future product sales if the licensed product is successfully commercialised in any country in which any licensed patents are granted or pending. o Having sub-licensed certain patent rights licensed-in from the Wisconsin Alumni Research Foundation (“WARF”) in respect of Cynata’s Cymerus™ technology to Fujifilm, Cynata will be required to make a one-off cash payment to WARF of US$10,000. Cynata is also required to pay WARF a mid-single digit percentage royalty on Fujifilm product sales and 30% of other amounts received from Fujifilm, including in respect of milestone payments. o Both Fujifilm and Cynata have rights to terminate the license under certain conditions such as material breach and bankruptcy and failure to use reasonable efforts to achieve certain specified milestones. The agreement also includes limited mechanisms for potential royalty adjustment on termination of the WARF Head License, entry of a generic competitor or in-licensing third party enabling technology. • Fujifilm and Cynata will enter into a separate agreement for the supply of product by Cynata for certain future product development activities at cost plus a moderate doubt digit manufacturing margin • The endorsement by Fujifilm of Cynata’s Cymerus platform supports the continued commercialisation of Cynata’s cell therapeutic products in other indications, including CYP002 for critical limb ischemia (CLI) and CYP-004 for osteoarthritis To facilitate Cynata’s ongoing partnering efforts certain amendments have been made to the license agreement between Cynata and WARF, particularly in relation to sub-sublicensable sub-licenses under the WARF patents and extending certain interim development milestones, whilst not changing the current milestone for obtaining approval from the U.S. Food and Drug Agency (or an equivalent foreign agency) in 2026. [The last paragraph provided an explanation on the delay back in March, when the Licence Option was meant to be executed] A deal that required a lot of patience from investors In September 2016, FujiFilm and Cynata signed a Non-binding Development and Commercialisation Term Sheet. It anticipated that, under a definitive agreement, Cynata will grant FUJIFILM an option to an exclusive, worldwide licence to market and sell Cynata’s lead MSC product for prevention and treatment of graft-versus-host disease (GvHD), as well as (a) an option to negotiate a licence for manufacturing those products, and (b) certain rights to Cynata’s proprietary Cymerus™ technology for the prevention and treatment of other diseases. FujiFilm even provided an earnings projection CYP-001 in GvHD back in their December 2016 presentation. Unfortunately, I can't get my hands on the that presentation anymore, as the FujiFilm website has been re-done since and my original link is now dead. The much anticipated FujiFilm announcement in January 2017 caused a bit of disappointment amongst investors, as FujiFilm didn't sign a licence agreement, instead FujiFilm and Cynata signed a Development and Commercialisation Partnership Agreement aka a Licence Option Agreement to an exclusive, worldwide licence to market and sell Cynata’s lead MSC product, CYP-001, in the field of prevention and treatment of graft-versus-host disease (GvHD). As part of that, FujiFilm also took a A$3.97 million strategic equity stake in Cynata. Over the next two years, FujiFilm wasn't shy of having its representatives talk to various newspapers. It was a bit surreal, as it sounded like they have already taken up the license, when in fact it was "only" an option to take it up. January 2017, Junji Okada, Director, Corporate VP & GM of Corporate Planning Headquarters and Pharmaceuticals Products Divs., FujiFilm Holdings Corporation, in an interview published in "Weekly Diamond"'s January Edition with the title "FujiFilm pushing into regenerative medical business" (sorry, my links are dead but against a few that article is still available via their website): "[...] Get a challenge right to become a main player We have elemental technologies cultivated with film. In the field of regenerative medicine, there are no companies in the world who have established a firm position yet. As a pharmaceutical manufacturer, we are "chase after". Even if imitating after the major and keeping up, profitability is not good and efficiency is bad. If you go out early in areas where no one is doing, you will gain the challenge of becoming a main player. We are steadily striking the foundation necessary for regenerative medicine . Mostly it is acquisition. We are holding down all three major elements (cell, medium, scaffold) in regenerative medicine. I think that business can be deployed comprehensively just by regenerative medicine. Then you get inquiries from various places and information comes in, so you can further lead the industry. - I am aiming for the first domestic company trial in transplant medical treatment using iPS cells in 19 years. It is the impression that we are finally getting into the stage of business. Since I do it, I want to honor the first domestic. There is also a pride that it is a top runner in the field of regenerative medicine. [...] Earn "one-third" in healthcare centering on regenerative medicine [...] - The policy of M & A in the future. Whether there is synergy or not is not important, but it is important. We will continue to focus on focusing areas such as image diagnosis and regenerative medicine. - Healthcare is currently about 20% to Fujifilm HD sales. If regenerative medicine is going to grow steadily in the future, Fujifilm may be called a "medical company" day. Other business will grow as well (laugh). I will not say how many years, but I will aim at healthcare to account for about one-third of HD sales." To avoid altering any facts, I did not make any changes to the spelling, wording etc. What you see is exactly how it got translated using Google Translate. In September and October 2018 FujiFilm talked to Nikkei Asia, leading to two separate articles to then be published:
Feel free to check them out yourself to see that they are all amongst the leaders (if not THE leader) in their space. That is vertical integration par excellence if you ask me! Many investors, especially the ones NOT invested in Cynata might say the terms are not that exciting, being able to call a well-connected conglomerate such as FujiFilm with a Market Capital of US$20 billion your partner, has many perks including but not limited to having access to this vertically integrated, in-house regenerative medicine behemoth which also includes a advertising/marketing and distribution machinery "on steroids", that are worth multiples of the actual figures of the Licence Agreement currently in place. Remember, FujiFilm had a vital advantage over other companies in this space due to its unique position as mentioned above. Although it might take a while for such a heavyweight to move, according to Newton's First Law of Motion, once it moves, it is also more difficult for it to stop. I'm looking forward to what the future holds!
2020.09.24 07:00 SteamieBotThe Steamie - Thursday 24 September 2020
Weather(Powered by Dark Sky) Clear throughout the day. Around 2 to 14 degrees. Travel Following a fault with the signalling system between Cambuslang and Newton Lanark the line has now reopened. Train services running through these stations are returning to normal but some services may still be delayed or revised. Disruption is expected until the end of the day.
Services are now running as scheduled between Cambuslang and Newton, we are trying to recover our service and get things back to normal as fast as we can and apologise for the disruption to your service during this time.
2020.09.19 00:42 lisagreenhouseGary Michael Hilton, the National Forest Serial Killer, is known to have murdered four people. But his crimes and travels make it hard to believe there weren’t earlier victims. Are there more waiting to be discovered?
Who is Gary Michael Hilton? Gary Michael Hilton, sometimes referred to as the National Forest Serial Killer, was a drifter who murdered at least four hikers in and around national forests in Florida, Georgia, and North Carolina between 2005 and 2008. Hilton was found guilty and sentenced to life in prison in January 2008 for the murder of Meredith Emerson, 24. After that conviction, investigators across the country began looking into unsolved cases that were similar to Emerson’s, and Hilton was charged with and found guilty of three more killings. In 2011, he received the death penalty in a Florida court for the slaying of Cheryl Dunlap, 46. In March 2012, he plead guilty to the murders of John Bryant, 80, and Irene Bryant, 84 and a North Carolina court sentenced him to four consecutive life sentences. Emerson, Dunlap, and the Bryants shared no specific victimology, instead it appears he chose them at random when he needed money. Investigators agree that his were crimes of opportunity, and they believe Hilton may have committed more murders across the southeast United States in the years before his four known victims were killed. Hilton was born November 26, 1946. He had an unstable home life and varied criminal record that stretched from childhood until he was arrested for Emerson’s murder at the age of 61. In 1959, when he was just 13, Hilton reportedly shot his stepfather in a jealous rage over his mother. His stepfather didn’t press charges, but Hilton did spend some time in a mental hospital after the shooting. At 17, Hilton joined the army, and he served from 1964 through 1967, including a tour in West Germany. He was honorably discharged in 1967 after he had been hospitalized for hearing voices and diagnosed with schizophrenia. Hilton was married at least three times, but none of his marriages were long—the longest was just two years. He isn’t believed to have any children. His third wife was a security officer at Stone Mountain Park, a 3,000 acre park near Atlanta that offers camping, hiking, wooded trails, lakes, and family attractions, including the massive peak at its center that is carved with the likenesses of Confederate soldiers. Hilton loved the outdoors. He hiked, camped, and frequently lived in forests and mountains around the south and southeast United States. He loved dogs, too, and had a dog named Dandy (sometimes reported as a golden retriever, other times described as red in color). He never had steady employment; after leaving the army, he worked as a chauffeur in Florida from 1970 to 1972, and he was arrested in 1995 for stealing books he was hired to sell from a door-to-door sales company. From 1997 to 2007, he worked off and on handing out advertisements and doing odd jobs for a Gwinnett County, GA, siding company, but he permanently lost that job when he threatened to kill the company owner if he didn’t pay him $10,000. Hilton also had ongoing legal troubles. He was convicted of a DUI in Florida in 1973; in 1983, he was convicted for carrying an unlicensed gun and a drug charge; he was found guilty of theft and marijuana possession in 1987; and he plead guilty to 21 counts of solicitation in 1995. Samuel Rael, an attorney and filmmaker in Atlanta, admitted that in 1995 Hilton helped him develop the plot for the movie Deadly Run. The movie is about a man who stalks, hunts, and murders women in the woods, a storyline that has similarities to Hilton’s crimes. Rael had defended him in court multiple times since the mid-1980s for crimes ranging from arson and trespassing to solicitation of false charitable donations. Rael said Hilton, whom he considered a consultant on the project, came up with the idea of the main character releasing women into the woods to be hunted like prey and that he also helped select that cast and found the cabin in the woods near Cleveland, Georgia, where much of the movie was filmed. Meredith Emerson’s remains were found approximately 30 miles from that same cabin 13 years later. Investigators have said that Hilton was not considered a suspect in any murders or disappearances during the time the movie was being filmed. Confirmed Victims Victims are listed in the order of their disappearances and murders. However, his final victim, Meredith Emerson, was the first to be linked to Hilton. His implication in her murder helped solve the others. Irene Bryant, 84, and John Bryant, 80, disappeared after driving 20 miles from their home to hike and look at fall colors in North Carolina’s Pisgah National Forest on October 21, 2007. The couple had been married for 58 years and loved traveling, hiking, and being outdoors. Their active lifestyle meant that they were sometimes hard to reach, and it took time for their neighbors and family to realize they were missing. Their son Bob reported them missing on November 2. He drove from his home in Texas to North Carolina to help search for his parents and discovered their vehicle at a trailhead parking lot. Investigators subpoenaed telephone and financial records and discovered that Irene had tried to call 911 around 4 p.m. on October 21 but the call didn’t go through. They couldn’t confirm whether the call failed due to lack of service or interference by another person. Financial records showed a bank withdrawal from their account at 7 p.m. the day after Irene attempted the 911 call. Security footage at the bank in Ducktown, Tennessee, 25 miles away from their vehicle, showed a slender man man in a hooded raincoat using the Bryant’s ATM card. Investigators couldn’t identify the person, but it was neither of the Bryants. Irene’s body was found on November 9, covered with leaves and sticks, just 100 yards from where the couple’s vehicle was parked. She had been killed by a blow to the head and her arms and legs appeared to have also been beaten. Investigators speculated that her attacker had lain in wait on the trail or in the woods just beyond the parking lot. John’s skeletal remains weren’t found until February 5, 2008 when a hunter stumbled across them. On October 26, 2007, Hilton was stopped by a sheriff’s deputy while trespassing on private hunting land. Hilton tells the deputy he’s a paratrooper on field maneuvers, and, when asked if he’s carrying any weapons, he shows the officer an expandable police baton. The officer checks for open warrants and then lets him go. However, Hilton did have an open warrant for a minor 1972 offense in Miami, and he should have been detained. In March 2012, Hilton plead guilty to murdering the Bryants, and he admitted to camping out in the parking lot, scouting for victims. Hilton admitted he had kidnapped Bryant from the parking lot, drove him to the Nantahala National Forest, walked him 30 feet down an embankment, and shot him in the head. It’s believed Hilton wasn’t certain he could control both victims at once, so he chose to kill Irene at the location and then use her death to intimidate and scare John into cooperating and giving him the couple’s ATM PIN number. In the days before the Bryants’ murders, other hikers reported seeing, talking to, and even photographing and confronting Hilton in the Pisgah National Forest in the area where the Bryants were murdered. Along with pleading guilty of ambushing and killing the Bryants, Hilton also plead to robbery and firearms offenses in their case. He again accepted a plea deal to avoid the death penalty and was remanded to serve four additional life sentences consecutively with the life sentence already handed down for Emerson’s murder. The Bryants are Hilton’s first known victims, although he was sentenced in their cases after being tried for his later crimes. Cheryl Hodges Dunlap, 46, was a mother of two grown sons and a nurse and Sunday school teacher, She was last seen alive on December 1, 2007. She had gone hiking alone in Apalachicola National Forest in the Florida panhandle just outside Tallahassee at about 9 a.m. Friends reported her missing after she failed to show up to teach her Sunday school class on December 2 or arrive at work on Monday morning, December 3. Three days after she disappeared her car was found with a flat tire, parked on the shoulder of Highway 319 just outside of the national forest. A search of the area revealed nothing of use. However, an investigation into her digital footprint discovered bank withdrawals. A little over a week after she went missing, authorities released surveillance photos of a man successfully using Dunlap’s ATM card to withdraw money on December 2, 3, and 4, the three days immediately following her disappearance. Police could not identify him because he was wearing a rubber mask, gloves, and hat. Detectives staked out the ATM machine for the next week, but the man never returned. Dunlap’s decapitated remains were discovered near Bloxham Cutoff Road in the Apalachicola National Forest on December 15 by hunters who noticed the presence of buzzards. Because her head and hands were missing, it took a DNA sample to confirm that the remains were hers. Hilton was proven to be in the area when and where Dunlap disappeared because a forestry agent had run his vehicle tag number through the police database on December 7. After Dunlap’s body was found, a hunter also reported coming into contact with Hilton in the forest—driving a white van, wielding a knife and appearing disheveled or homeless. The hunter said he’d warned Hilton that the woods was a bad place to be during hunting season. This interaction allowed the hunter to identify Hilton in a photo lineup. A forestry agent had also questioned Hilton on November 17, 2007 and run his white van’s tag number through a database to ensure it wasn’t stolen. On December 28, another forestry agent interacted with Hilton in Osceola National Forest, about 160 miles from where Dunlap was last seen. Those sightings proved Hilton had been in the area before and then left after Dunlap’s murder. The final item of proof was one of Dunlap’s boots, which Hilton was attempting to discard in the dumpster with Emerson’s belongings when he was initially arrested. Investigators believed Hilton kidnapped Dunlap from the Leon Sinks Geological Area of Apalachicola National Forest, where friends said she had mentioned going to read a book. He likely kept her alive for a few days in order to get money from her ATM card, finally killing her. Investigators say he burned her head and hands in his campfire, then left her vehicle by the road after puncturing the tire with his police baton. There was no physical evidence tying him to the crime, but investigators were able to recover audio tapes on which Hilton had recorded himself talking crudely about women and referencing killing women and hiding things. He said he was a sociopath who could disassociate from the act of murder. Hilton was indicted on Thursday, February 28, 2008 for Dunlap’s murder, kidnapping, and two counts of grand theft. He was found guilty by a unanimous jury in February 2011 and sentenced to death. He unsuccessfully appealed the conviction. Dunlap was Hilton’s third known victim; he was sentenced in her case after being tried and found guilty for murdering his last-known victim, Meredith Emerson. Meredith Emerson, 24, was last seen alive on New Year’s Day 2008, with her dog, a black Labrador retriever mix named Ella. The pair had left home in Buford, Georgia, to hike one of their favorite trails on Blood Mountain. The location is the highest peak in Georgia’s section of the Appalachian Trail and is located on the border of Lumpkin and Union counties inside the Blood Mountain Wilderness and the Chattahoochee National Forest. Concerned after she didn’t return home, Emerson’s friends and boyfriend reported her absence to local police. She was classified as an overdue hiker. The next day, friends and authorities searched the area where Emerson and Ella had been hiking but did not find either of them. A winter storm moved in that day, and authorities had to halt the search. After her disappearance made news, witnesses came forward to claim that they’d seen her hiking with an older man, approximately 60 years old with a red dog, on a spur trail that connects the Appalachian Trail to the Byron Herbert Reece Parking Lot. One caller was a former police officer. He reported that while hiking he’d discovered a police baton, water bottles, sunglasses, a barrette, and a dog leash and treats scattered over an area of disturbed and scuffed ground. He had seen an older man with a police baton walking with a younger woman minutes before finding the items, and he recognized the leash as the one the young woman had been holding. At first, he’d thought they were father and daughter, but the scattered belongings and evidence of a struggle concerned him. While there, he talked with another group of hikers who had seen the man hiding in the woods, but they were unable to locate him after a short search. They gathered the scattered items and left them at a local store, but they didn’t call police at the time. The next day after seeing a report on TV about Emerson’s disappearance, the former officer called investigators to report what he’d seen and found the day before. Also on January 2, John Tabor, a former employer of Hilton’s, called police to let them know Hilton matched the description of the man seen with Emerson on the trail. He said Hilton had called him a few hours before and had apologized for acting erratically and violently toward him, asked him for money, and told him he was near Blood Mountain. He’d asked Tabor to leave him a check at a business Tabor owned, but he never came to collect the check. Investigators noted that Tabor hadn’t called them immediately to inform them of Hilton’s similarity to the suspect or his proximity to the possible kidnapping. Police also recovered surveillance images of Hilton unsuccessfully attempting to use Emerson’s ATM card. Investigators had hope that Emerson was still alive and they were now sure she was with Hilton, so they disseminated Hilton’s DMV photo to the media. On January 4, another witness called police to report that he had encountered an older man and young woman camping near a white van. The witness was driving a lawn care truck when he got it stuck in a stream. He asked the older man for help, but he’d refused. The witness said it seemed like the man was trying to keep him away from the van. When the witness called police dispatch to ask for help getting his vehicle unstuck, the man quickly packed up and left the area in a seeming rush. That same day, Ella was found wandering in a grocery store parking lot in the town of Cumming, Georgia, about 60 miles away from Emerson’s last-known whereabouts. Investigators also discovered bloody clothing, bloody men’s boots, and Emerson’s purse and wallet in a dumpster across the street from the store where Ella was located. A boot, later confirmed to belong to Hilton’s third victim, Cheryl Dunlap, was also recovered from the dumpster. Later that evening, a witness called 911 to report that Hilton—whom he recognized as the suspect in Emerson’s disappearance from news reports—was at a local gas station cleaning out a white van. Police arrived and prevented Hilton from using a vacuum cleaner and bleach on the van’s interior; they also discovered bloody clothing and blankets he had attempted to discard in the gas station trash receptacles. Blood in the vehicle was later matched to Emerson, and Hilton was charged with her murder. During almost five hours of interrogations, Hilton admitted that Emerson fought back against him when he attacked her, yelling and using her martial arts skills to fend him off (she’d earned a blue belt in aikido and was posthumously awarded a black belt). He said that she almost got away, but that he was finally able to subdue her when she lost her footing and stumbled. He said he’d chosen to attack her because she was a woman, and that they’d hiked together for a while before she outpaced him. He then stopped and waited for her down the trail, planning to rob her of her ATM card when she was returning to her vehicle. He admitted to taking Emerson from the parking lot in his van, returning at her request a few minutes later to pick up Ella, who had initially been left behind. He drove her to multiple banks and unsuccessfully attempted to use her ATM; police believed she was intentionally giving him wrong PIN numbers to buy time. Unfortunately, no one at the banks or law enforcement noticed the failed transactions or attempted use of Emerson’s ATM cards until January 4. Eventually Hilton gave up and drove Emerson to a secluded location where, for three days, she continued to give him incorrect ATM PIN codes in an apparent attempt to give rescuers time to find her. Hilton told investigators that he tired of waiting for the correct PIN number, so he told Emerson he was taking her home; however, he admitted that he knew he couldn’t release her since she’d seen his face and vehicle and knew so much about him. Instead, while she was tied to a tree, he hit her over the head repeatedly with a car jack handle to kill her, and then he decapitated her. He covered her body with leaves, then drove to another wooded area more than an hour away, where he discarded her head. He said he was unable to kill Ella and decided to let her go. Disturbingly, in that same interview, when asked about whether it was hard for him to kill Emerson, Hilton stated, “It was hard … you gotta remember we had spent several good days together.” Hilton offered to lead investigators to Emerson’s body if they’d agree to remove the death penalty option. An autopsy confirmed Hilton’s story: her cause of death was officially listed as blunt force trauma to the head, and she’d been decapitated postmortem. He plead guilty to Emerson’s murder on January 30, 2008, and he was sentenced to life in prison with the possibility of parole after 30 years. The case was in the news again in 2010 when a writer for Hustler magazine submitted a request for crime scene photos for use in an article about Emerson’s kidnapping and murder. A judge blocked the request, preventing the Georgia Bureau of Investigation from releasing "any and all photographs, visual images or depictions of Meredith Emerson which show Emerson in an unclothed or dismembered state.” The Georgia House also passed The Meredith Emerson Memorial Privacy Act, preventing “gruesome crime scene photos from being publicly released or disseminated.” The Act, House Bill 1322, stops the release of all images in which victims of crimes appear “nude, bruised, bloodied or in a broken state with open wounds, a state of dismemberment or decapitation.” Hilton’s involvement in Emerson’s kidnapping and murder drew the attention of investigators in other states. While she is believed to be his last victim, the successful investigation into her case resulted in his guilty pleas and sentencing for three other murders. A series of other unsolved crimes is also being investigated for ties to Hilton. Possible Victims Melissa Witt, 19, disappeared from the parking lot of a local bowling alley in Fort Smith, Arkansas on December 1, 1994. On January 13, 1995, her body was found by hunters in a rural area of the same county from where she disappeared. She was naked, and her remains were near a rock that’s been described as headstone-like. Her clothing was never located. Some investigators believe that there are similarities between Witt’s disappearance and death and those of Hilton’s known victims. Judy Smith, 50, is considered a possible victim of Hilton’s because her remains were found near the location where Hilton would bludgeon Irene Bryant a decade later. Smith was last confirmed to have been seen by her husband, Jeffrey, at a Philadelphia hotel on April 10, 1997. The couple flew from their home in Newton, Massachusetts to Philadelphia the day before so that Jeffrey could attend a work conference. After arriving at the airport, Judy discovered she had left her identification at home and would not be able to board the plane. She returned home to retrieve her ID and took a later flight, meeting Jeffrey at their hotel. She planned to go sightseeing while Jeffrey was attending the conference, and Jeffrey confirmed she’d been alive and in their room that next morning. That evening, after the conference meetings had ended for the day, Jeffery could not find Judy. He searched for her and tried to report her missing around midnight, but investigators told him he needed to wait 24 hours. During the ensuing investigation, there were a number of sightings of a woman matching Judy’s description in and around Philadelphia, several of which seemed to describe a person experiencing psychological problems or acting disoriented or disturbed. Other possible sightings were of a woman matching Judy’s description riding the bus, shopping at a mall, and sitting outside a gourmet grocery store. The Smith family found some of the descriptions and sightings credible. On September 7, 1997, about five months after Smith was last confirmed to have been seen, hunters in the Pisgah National Forest about 9 miles from Asheville, North Carolina discovered scattered bones around a shallow grave. Some clothing and personal effects were also located. Cut marks and punctures found on the ribs and clothing suggested the victim had been stabbed. The remains were confirmed to be those of Judy Smith. Strangely, the clothes she was discovered wearing were not any she was known to have owned or reported by witnesses, and the family has no explanation for why or how she got to or was in Asheville. Later reports found that people in the Asheville area had seen Judy or a woman who resembled her. The sightings were deemed credible, but no one claimed to have seen Judy with anyone else. Money and jewelry was found near Judy’s body and belongings, so robbery was ruled out as a motive. Investigators came to believe Smith traveled to Asheville voluntarily, but they’re unsure of why or what happened to her while there. Hilton has been suggested as a possible suspect, but investigators have not publicly linked him to Smith’s case or named as a suspect. Levi Frady, 11, was abducted from Little Mill Road in Forsyth County, Georgia, on October 22, 1997. The next day his remains were found partially submerged in a rainwater-filled pit in Dawson Forest Wildlife Management Area in Dawson County, Georgia. He had been shot three times, once in the chest and twice in the head. Investigators consider Frady’s case open and active. Some have hinted Hilton is considered a suspect, but he has not been publicly named. In April 1998, Jason Knapp, 20, disappeared. He was a student at Clemson University, and he was last known to have been seen by his roommate at around 10:30 p.m. on April 11, watching a movie at their residence. His vehicle was found on April 21 at Table Rock State Park in Pickens, South Carolina. The area is about 30 miles from the university and is very rugged. Investigators found a Wendy’s restaurant receipt inside the vehicle dated April 12 at 1:30 p.m. It is believed he drove to the park on April 12. He had also withdrawn $20 from his bank account that day; his bank cards, including an ATM card, were never found. The area around his vehicle showed no signs of struggle or foul play, and it is unknown whether he drove to the location alone. Searchers canvassed the area around his vehicle for two weeks and found nothing of interest. Patrice Endres, 38, disappeared from her hair salon in Cumming, Georgia, between 11:30 a.m. and noon on April 15, 2004. She vanished during a gap of about 12 minutes between clients. The front door of the salon was unlocked and the cash register was empty, but there was money in her purse. Her lunch was in the microwave and her vehicle was parked at the salon. Her skeletal remains were found in December 2005 behind a church about 10 miles from her salon. A woman came forward with a description of a man in a white van parked in front of the salon, but she later recanted the story. Serial killer Jeremy Brian Jones admitted to killing Endres and dumping her body in Sweetwater Creek in Douglas County, but authorities ruled him out as a suspect after her remains were found 70 miles from that location and when he couldn’t provide any additional information that wasn’t in the public record. Authorities looked at Hilton’s possible involvement, but they say he is no longer considered a suspect. There is no information as to why investigators have ruled him out. Rossana Miliani, 29, lived in Miami, Florida, and disappeared while vacationing in Cherokee, North Carolina. She was last confirmed to have been seen at about noon on December 7, 2005, in the hotel where she was staying. She called her father and told him she was going hiking on the Appalachian Trail. Some reports say she was spotted in Bryson City, NC, where she rented a storage space, shortly before disappearing. Miliani is reported to have bipolar disorder and schizophrenia, but no details are available about whether she was on medication or if she was experiencing any issues at the time of her disappearance. On the two-year anniversary of her disappearance, a clerk at a local store read an article about Miliani and called investigators to report that she’d sold a backpack or bag, possibly a sleeping bag according to some sources, to Miliani and a man who claimed to be a traveling preacher who visited campsites around the Appalachian Trail. According to the clerk, the man was about 60 years old, had hair greying at the temples and may have been wearing a hair piece because his hair looked unusual. The clerk claimed that Miliani appeared to be nervous. A private investigator working on the case released a sketch of the unidentified man in June 2009. The man resembles Hilton, and he’s considered a possible suspect. Neither Miliani nor any of her belongings, including luggage and a camera, have been found; no money has been withdrawn from her bank account since her disappearance, but a deposit was made on December 31, nearly three weeks after her disappearance. No further information is available about that deposit. Some sources say Hilton is known to have stolen and unsuccessfully tried to use Miliani’s bank card, but I was unable to find official corroboration of those reports. A fisherman found the remains of Michael Scot Louis, 27, dismembered and stuffed in plastic garbage bags, in the Tomoka River at Ormond Beach, Tomoka State Park, Florida on December 6, 2007. His torso and legs were recovered, but his head has never been found. Louis was last known to have been seen on November 21 or 22, 2007, but when his remains were found 16 days later, the autopsy estimated he had only been dead for two to seven days. It’s unclear where he was or who he may have been with during the days he was unaccounted for. Days after his disappearance, his Firebird was found parked unusually far from his apartment in the apartment complex’s parking lot in South Daytona, Florida, with the keys still in the ignition and his dirty laundry and guitars inside. Hilton was officially ruled out as a suspect after DNA testing did not implicate him, but some thought he should remain on the list as a potential suspect. In January 2018, Nelci Tetley, 67, was arrested for shooting to death and dismembering her then-boyfriend, Jeffrey Albertsman, 55. It was discovered that she had possibly also dated Louis, although she denied knowing him or having a relationship with him, and she’s been named as a suspect in his case. University of Georgia student Cayle Bywater disappeared from Athens, Georgia on December 29, 2007. She was reported missing after neighbors became concerned when her dog was seen running loose outside her home. Meredith Emerson would be kidnapped three days later from Vogel State Park, about 80 miles north of Athens. On January 11, Bywater’s body was found in an Athens lake. An autopsy listed drowning as her cause of death, but there’s disagreement about how she came to be in the lake. There were no traces of illegal drugs or alcohol in her system, but she had been prescribed medication to treat a mental disorder, reported by some agencies as bipolar disorder. The autopsy also found a previously undiagnosed heart defect, but that could not be proven to have played a part in her death. A photograph taken by an undisclosed individual the day she was last seen alive shows Bywater in Memorial Park walking her dog on leash. Witnesses claim to have seen someone matching Bywater’s appearance walking a dog in the park near the lake where her body was later found, and some said she appeared to be disoriented or chasing the dog. No signs of foul play were discovered on her body or at the scene, but her family insists she did not wander off or commit suicide. In a news article dated January 8, 2008, (https://www.savannahnow.com/article/20080108/news/301089882) her family was concerned that she may have been kidnapped by someone who saw her in a disoriented or confused state and took advantage of the situation. That same news article mentions the kidnapping of Meredith Emerson by Gary Michael Hilton but quotes an investigator as saying the local police department and Georgia Bureau of Investigation did not consider the cases related at that point. It’s unknown if Hilton is now or was ever considered a suspect in Bywater’s case. Are there more? There are dozens of unsolved cases of missing and murdered people in the areas where Hilton was known to or may have traveled or lived. Someone put together this Google Map detailing known and possible victims of Hilton: https://www.google.com/maps/d/viewer?mid=1v-4PyOHDjE17GhkF6ofEvFWtLes&hl=en&gl=us&ie=UTF8&oe=UTF8&msa=0&z=5&ll=34.77220536527494%2C-83.37685848300629 . It’s a very interesting rabbit hole. I’m unsure who created the map or what criteria they used to include possible victims. If anyone on this sub has information about the creation of this map, please let me know and I’ll include more details. What Don’t We Know? Discussion and Theories Knowing what we do about Hilton and the crimes for which he was convicted, it’s hard to believe that Emerson, Dunlap, and the Bryants are his only victims. Investigators have pointed out that it’s rare for a serial killer to start killing in their 60s, and Hilton’s crimes seem to be the work of a confident killer. His lack of victimology—targeting victims based on opportunity rather than sticking to a certain type of person—and his large geographic footprint, transient lifestyle, lack of family and friends, and remote hunting grounds all point to the possibility that he’s been active for a lot longer than the short spree of four known victims. There are so many missing people and unsolved homicides in the southeast corner of the United States that it’s not hard to think Hilton may be responsible for some of them. What are your thoughts or theories? A note of thanks:u/cspach2005 invited me to do this write-up on Hilton for an upcoming podcast on www.disturbedpodcast.com. They covered my previous write-up on Timothy Bindner (https://www.reddit.com/UnresolvedMysteries/comments/g2mh3i/hes_been_a_suspect_in_the_disappearances_of_at/) in this podcast, https://www.disturbedpodcast.com/bindne, so I was thrilled to contribute again. I’ll add a link to the podcast episode on Hilton once it’s done. Resources: Park Predators podcast about Hilton: https://parkpredators.com/episode-1-the-hunte YouTube video of Georgia Bureau of Investigation interview with Hilton (4.5 hours): https://www.youtube.com/watch?v=R9Tw1iejmzc ThoughtCo blog from July 14, 2019 about Hilton’s crimes: https://www.thoughtco.com/the-gary-michael-hilton-case-971046 Murderpedia entry for Hilton, including text from news articles: https://murderpedia.org/male.H/h/hilton-gary-michael.htm Timeline of Hilton’s life and crimes: http://prairiechicken.blogspot.com/2008/02/gary-michael-hilton-timeline.html Strange Outdoors article from January 23, 2018 about Hilton and his victims: https://www.strangeoutdoors.com/mysterious-stories-blog/2018/1/22/gary-michael-hilton-the-hiker-murders CNN article from 2008 detailing how Hilton helped make a movie about a serial killer: https://www.cnn.com/2008/CRIME/03/13/hilton.movie/index.html Wikipedia article: Murder of Meredith Emerson: https://en.wikipedia.org/wiki/Murder_of_Meredith_Emerson March 23, 2008 article detailing Hilton’s confession and Emerson’s fight to survive: http://www.nbcnews.com/id/23769881/ns/us_news-crime_and_courts/t/killer-says-female-hiker-fought-him-end/ March 11, 201 article about judge barring release of crime scene photos in Emerson’s case: http://www.cnn.com/2010/CRIME/03/10/meredith.emerson.photos/index.html August 2012 opinion piece by the journalist who requested Emerson crime scene photos explaining why he did so: https://www.ajc.com/news/opinion/why-requested-slain-hiker-crime-scene-photos/2PmN2O3oTCOJKq7mBuvgfL/ Wikipedia article about the Judy Smith case: https://en.wikipedia.org/wiki/Judy_Smith_homicide Rossana Miliani Charley Project profile: http://charleyproject.org/case/rossana-miliani Article from December 17, 2007 about remains found in Florida, possibly linking them to Cheryl Dunlap: https://abcnews.go.com/US/story?id=4010778&page=1 Article from February 28, 2008, announcing Hilton’s indictment in the case of Dunlap: http://www.cnn.com/2008/CRIME/02/28/hilton.indictment/index.html March 27, 2012 article about Hilton pleading guilty to the Byrants’ murders: https://www.blueridgenow.com/article/NC/20120327/news/606022032/HT May 17, 2008 article detailing John Bryant’s autopsy findings: https://www.blueridgenow.com/article/NC/20080517/News/606047031/HT January 4, 2018 article about the Bryants: https://www.ajc.com/news/local/tragic-end-for-unique-couple/PzAHQbeBqHLPzNjGei0nAJ/ December 23, 2007 article about memorial service for Michael Scot Louis: https://www.news-journalonline.com/article/LK/20071223/news/180117745/DN January 24, 2018 article about Nelci Tetley’s arrest, possible implication in Louis’ death: https://heavy.com/news/2018/01/nelci-tetley-accused-dismembering-killing-boyfriends/ January 13, 2017 article commemorating the 22nd anniversary of Melissa Witt’s unsolved disappearance and murder: https://www.5newsonline.com/article/news/local/outreach/back-to-school/melissa-witts-body-found-22-years-ago-investigation-still-open/527-5556593c-22df-4077-b6c3-e7fd7f041f33 Jason Knapp’s Charley Project profile: http://charleyproject.org/case/jason-andrew-knapp April 4, 2010 article about Patrice Endres’ disappearance and murder: https://www.forsythnews.com/local/crime-courts/husband-seeks-closure-in-cold-case/ Google Map detailing known and possible victims of Hilton: https://www.google.com/maps/d/viewer?mid=1v-4PyOHDjE17GhkF6ofEvFWtLes&hl=en&gl=us&ie=UTF8&oe=UTF8&msa=0&z=5&ll=34.77220536527494%2C-83.37685848300629 (I did not create this map, nor do I know who did or what criteria they used when choosing which possible victims to include. I’ll gladly edit the post to include that information if someone knows more details about the map’s creator or creation.)
We need contributors willing to work on the website!
Contributors willing to help with the website are always welcome. You are encouraged to join the #monero-site chatroom (on Freenode, Matrix and MatterMost) to stay up to date and participate to the development. It's possbile to contribute to the development of the website in several ways:
Translate! It's possible to translate the main parts of the website through an user-friendly graphic interface: Weblate. You don't need any particular experience, except speaking a second language, but make sure to read the guide you find at the top of the page.
Resolve an issue! There are many open issues only waiting for contributors to work on them. Keep an eye especially on the issues labelled "⛑️ contributor needed" , which are mostly documentation changes or easy issues which don't require deep technical knowledge. If you would like to help with one of those, but you are scared by the fact that you need to navigate the repository, feel free to contact us and we will manage to get you started.
RECAP: We’ve established several ideas that run through Kendrick’s discography in the previous posts. Number one was “levels” and how Kendrick has alluded to numbering his projects and a finality in his work at level ten. The second post was about how Kendrick has always had Kung-Fu Kenny by his side, that he has always fought an internal battle and how that duality reflects on the entire world. I also talked about the idea going further and his duality becoming a second life. The third post highlighted the recurring imagery of planes, ufos and the sky as well as Kendrick comparing himself to an alien or angel. I concluded that most of these ideas were about reaching the top, the peak of the industry and reaching another plane of existence. INTRO: In this post I’ll be researching what Kendrick’s purpose is and what he plans to do once he reaches the top. As I’ve said, he is trying to reach the top/ sky/ clouds and perhaps he already has, figuratively. Here, I’m trying to figure out exactly what Kendrick is trying to do with this power, what he plans to teach the world. Kendrick is a part of our new generation and he knows he has to do his part in trying to make this world a better place to live. This is his movement and it's called HiiiPower. So I’ll be highlighting anything that mentions Kendrick’s purpose/ mission/ plan.... what he intends to do to change the world. I’ll also be mentioning moments where Kendrick alludes to changing things, pushing boundaries as it builds onto the legitimacy of this theory. Let’s begin. Note: It gets spicier at Level 4.
Minor City Hub Threat/ Level 1
And it takes a young nigga like me to push the limitNo gimmick, this is real homieI wake out of my sleep, sweat drippin' off my face and cheekI swear to God, death callin' for me
-TRACK 12 At 16 he is already saying he is going to push the limit. He mentions Death is calling for him, we will see more of that throughout.
Mapped out the whole game to reroute it‘Cause look here boo you fucking with a championK Dot the don, moving the blocks you onTaking a spot of shawn, I'm on top your ownIndustry remember me, cause I so crazy
-PUT THAT ON SOMETHING Kendrick wants to change the music industry.
I got some plans, to stack riches Own 76′s like a Philadelphian You don't know but now I'm focused like camera lens
-BIGGIE Focused on getting rich.
You wanna witness the livest nigga existin'Then come and pay me a visit, you have to pay for admissionI'm on my mission to conquer my competition
-GO DJ Before he can change things, he has to establish himself as the best. You have to pay to visit him/ aka pay for his music.
Training Day/ Level 2
Where the pump at Thinking of a master plan Mothafucker Im a master mind Im a 18 year old dollar sign Im a one man tragedy Im Columbine Shit you already know what im about
-One Shot Kill So Kendrick’s already got a plan in mind… He says he is a one man tragedy but then doubles down and says he is Columbine. Which is actually a two man tragedy. This links up with the Kung-Fu Kenny post and the idea of him having two lives.
Let them sell his soul Put his body on retail If we do dirt And you tell We gon’ put you under dirt He was a good person He was down to earth but now he down to earth Chillin with the worms and the insects his brother gon’ be next His mother gon’ be after him kill the family tree If they fuckin with him and that him is me
-One Shot Kill So here Kendrick is basically saying that he is going to sell his soul and put himself up to sell (his music). Like the last lines I highlighted, Kendrick alludes to his eventual death.
When the lights get dark And everybody quiet, know its my part I might start a riot The main event
- Blame God Later on, I'll talk about a possible controversial action that Kendrick might commit.
“When I do it, it won't be nothing right after I'm done When I ruin niggas' careers, put you niggas in tears Get you pom poms, you better off, cheer for me”
- BEST RAPPER ALIVE Again, part of his mission is to destroy his competition.
This business got too many villains Superman is back The cape ain't red, it's black That's a trench coat And the note for your information if we was dead this reincarnation Watch your heads
-Never Die The business is the music industry and Kendrick is here to save it. The reincarnation builds on my second post about his two lives.
I am the truth, no lie about it Bring my testimony when I walk in that booth Walking the thin line between love and hate, I defend mines Join them when it comes to their crunch time, I never fold I love pressure, that's why I apply so much on niggas thinking they better I am a clutch shooter, I am a sharp shooter And it's great enough to hear the butterfly moving
- PROTOTYPE Kendrick says he is the truth, hopefully he can bring the truth to the world as well. The pressure line builds on his constant drive to rise to the top. Last line could be a giveaway that Kendrick had a loose idea of To Pimp A Butterfly.
I know I'm walking the path of greatness, no compass Not Atheist, but the bars reside with Satan
- I FEEL IT Kendrick knows he’s doing what he must but also saying that the raps he writes are sinful. Could be a shot at the nature of the industry or the idea that he must “write his wrongs.”
Maybe I give you the funk George Clintion bring by the sentence like I got a english major in it - GOOD MORNING AMERICA
“Now if I give you the funk, you gon’ take it....We want the funk!” -King Kunta More possible evidence to show that he has these things planned.
C4/ Level 3
With a bible and a reverendI use my mouth as a weaponBullets rip through your mid section
- Phone Home Kendrick is weaponizing his lyrics, using them as a tool. The bible has lessons to show us just like each of his albums.
Show me where your fans is so they can see the real I'm sick and electrifying, that's double ill Me feel like me will be a legend like Will was a legend But I'm not an actor, put that in my will
-Phone Home "Tryna be a fucking legend, the man of mankind" - HiiiPower
Kendrick Lamar EP/ Level 4
Now everybody just bow to the greatness, or die in the matrix Your hereby dating, my destiny's waiting My itinerary is very hectic I break records on every record, I'm truly reckless
I'm live, come to the harvest, welcome the artist Whose lyrics out of the orbit, more than the hardest rapper To hit the market and market myself as a shooting target With offers that got me up in these offices often Boo-yaa, who ya? No one, I've done situated myself, I ain't lying Be sure to be friend cause my foes die five times The good kid from the mad city Holding a cereal box instead of a Glock In a 1992 Cadillac that I got from my pops Transmission slipping, but I ain't tripping, swallow my pride
-Thanksgiving Kendrick is here to bring us the best lyrics in the game, to infiltrate the offices in tall towers and solidify himself as the best. I mentioned this before but “foes die five times” could be them dying from each of his albums, from section.80 to his next one. GKMC was already on his mind here. Transmission slipping could also be a reference to the common "phone" theme in his music.
Vanity, they say that it can damage me So do I really want it? If I didn't, I guess I'm a cool cocaine connect That means I'll be frontin' Cooking in a laboratory, hoping I can tell a story That the whole world can feel, like the ones that came before me Knowing that I'm misunderstood So I gotta get my point across like a snitch would
-Let Me Be Me He’s coming to the terms here that he must give in to the vices of the industry. He then states that he’s planning to tell a story that everyone can understand. I think he intends to do that and already has to an extent… but I think the full picture/ story will be shown with his next album.
Give me vanity, give me Kurt Cobain sanity Give me a city where Channel 7 newscasters cameras be Give me horror like Amity, no, give me the charts And if you ever renege, I'll still give you Kendrick Lamar, this is me And that's love
-Is It Love? Kenny is asking for Kurt Cobain sanity alluding to more “suicidal weakness”. He is asking for all the attention so he can talk to the world. Even through all this he will still give us his true self and the most important message, love.
Malcolm X mind state, if I raise the crime rate It's a legitimate reason why I put on repeat Kanye's "Touch the Sky" But I'll be looking past that I'm tryna touch God My heart to the heavens, the rebel of the reverend Y'all married to the game well I'm 'bout to crash weddings I put a lot of pain in the shit I write If you going through something, this the shit you recite This is bigger than life, this is Kendrick Lamar This is Jimi Hendrix guitar on tour, bonjour, I mean war like that! Yeah, straight like that
-Celebration He’s here to cause some chaos, to fuck up the music industry (the game) and to give us something to listen to when in pain. This is bigger than life...
When I kick it and pump mine, I've got to be a prophet I've gotta make a profit big enough to have a thirty pound wallet
-Thanksgiving In order to become a prophet he’s also gotta make that profit to have a large enough voice.
I found myself losing focus at a Sunday service Embarrassed so I start questioning God, "What is my purpose?" He said to live the way he did, that's all he want from me Spread the word and witness, he rose on the first Sunday
And I'm the God MC, join my diocese Free your mind, don't mind society And finally, everyone got their own problems Everything is subject to change like broken dollars
-P&P Join his movement, his secret society...
Overly Dedicated/ Level 5
But little did they know, I’m tryna' change the rules That we’ve been confined to, so the corporate won’t make decisions Uppity bitches, handling business Killing our dreams, stealing our vision The Heart Pt.2
Since he’s not happy with the industry, he’s gotta change it himself.
Have you ever felt like, like you never get life? Like you never did right, sort of like a black sheep? Tryna get away from the world's stereotype Barbed wire got a barricade on your destiny
-Barbed Wire Kendrick probably feels like he’s going against the world trying to accomplish his dream.
What is HiiiPoWeR? HiiiPoWeR is the way we think, the way we live See it’s known today that the human race is nothing No morals, no standards What we’re about to do is raise the level of expectations No, you don’t have to have a lot of money You don’t have to be rich But you will be rich in mind and spirit Some say it’s as big as a crew, some say it’s as big as a gang HiiiPoWeR, we stand for it as if it’s as big as a religion
-Cut You Off HiiiPower’s mission statement. The lines “My heart is rich, my heart is famous” from GOD. suggest that he has reached that goal himself, now it’s time for him to help us become rich in mind and spirit. (Which he has already imo)
Sometimes we lose focus, planning our own demise Forgetting the big picture and making it wallet size So to what is important in my life, I apologize I promise to stay faithful, focused and sanctified We all get distracted, the question is Would you bounce back or bounce backwards? Would you not know How to act or take action? It’s just a part of life And if your vision’s impaired, you probably lose it all tonight
-Growing Apart (To Get Closer) Kendrick seems to foreshadow his own downfall a lot and I think that downfall is represented in DAMN. as the album starts with life being taken. Also DAMN. represents mainstream music more than any of his other albums, hence, “making it wallet size,” as Kendrick is focused on making money in DAMN. In the end he still keeps himself faithful and focused to learn what he must do to better himself.
I'll make an album that'll put a smile on Malcolm Make Martin Luther tell God I'm the future for Heaven's talent No tarot card reading; I'm foreseeing you niggas vanish Not only from the rap game, I'm including the planet
-Ignorance is Bliss His next album could be the one to put that smile on MLK. After he does this his competition will be gone, off the EARTH.
Or everything getting shot, for nothing Leave you in shock, coughing up blood and mumbling Watch, the plans of a young man sponsor
But lately, I've been thinking 'bout taking chances to brighten My future financially, so please don't be mad at me I gotta do what I gotta do, no shit So I tell my nigga front me, let me put it on the strip Then give it back when I think about the consequence, shit
-ROTC Kendrick knows he has to go commercial to have the finances he needs for his family. He knows there are consequences to doing this.
And if our record never break, I still won’t break my promise I promise to keep it honest Secret society all we ask is trust
-The Heart Pt.2 "It's a secret society All we ask is trust (All we ask is trust) All we got is us Loyalty, loyalty, loyalty" He’s keeping it real to the end no matter what.
And all we lack is communication like service sucks The people scared of annihilation when Kingdom Come
-The Heart Pt.2 There are other mentions of phones throughout his music and the new music video behind the scene picture enlighten us on its meaning in the future. Dissect Podcast has guessed that it’s him trying to connect to God and his family and I agree that it could be that.
Section. 80/ Level 6
Fire burning inside my eyes, this the music that saved my life Y'all be calling it hip-hop, I be calling it hypnotize Yeah, hypnotize, trapped my body but freed my mind What the fuck are you fighting for? Ain't nobody gon' win that war My details be retail, man, I got so much in store
-Fuck Your Ethnicity I believe the hypnotize line means that he believes his music can change the minds of others. And that it can free one’s mind. His details, his life, are retail (at the store) as he puts his life into his music.
So don't you mind how much the cost is, penny for my thoughts Everybody, please hold up your wallets Yeah man, I'm the mailman, can't you tell, man? Going postal, never freeze up, when I approach you That's starstruck and roast you, oh my HiiiPower
-Fuck Your Ethnicity Kendrick says he is the mailman, akin to the upcoming line “Im just a messenger." A messenger of God. He’s saying that you will be starstruck when he approaches because he is coming from the sky... as a star. “Every n***** is a star.” This also lines up with my previous post of him reaching the sky.
In the daily superstition that the world is 'bout to end Who gives a fuck? We never do listen 'Less it comes with a 808 (A melody and some hoes)
-ADHD Kendrick knows the power of music. He will try to use his own music to bring some change.
As I open this book and then burn up some of this reefer My plan is to figure out the world and escape all my demons I'm dying inside, I wonder if Zion inside the heavens
-Kush & Corinthians Kendrick is trying to escape his demons, which he kinda did in DAMN as he dissected all his wickedness and weaknesses. He is trying to better himself and become the man he needs to be.
To the meaning of life, what's my purpose? Maybe this Earth is ain't a good place to be How far is heaven? Let's see Is it in the clouds like they said it would be? I wonder when I die will he give me receipts? I wonder will the eyes of the Lord look at me?
-Kush & Corinthians Kendrick is trying to find his purpose and has figured out that the world and its pleasures aren’t the best. In DAMN we hear the words “WHAT HAPPENS ON EARTH STAYS ON EARTH.” As Kendrick figuratively dies in DAMN he is leaving Earth and going up to heaven to figure out his judgement.
Come to our show, you can see the diversity Unify the people, they gon' peep it universally We might not change the world But we gon' manipulate it, I hope you participatin'
-Ab-Soul’s Outro (Ab-Soul) This is basically another mission statement of the hiiipower movement. To unify. They are going to try to manipulate the culture and industry to achieve this perhaps.
Started HiiiPower because our generation needed a generator In a system meant to disintegrate us And all we do is assist them We're not victors, we're victims The bigger picture isn't developed yet
-Ab-Soul’s Outro (Ab-Soul) Another Ab-Soul line. Stating that we are all cogs in a system. Hiiipower and TDE might be trying to expose that idea to the world. The big picture will be seen as time progresses… maybe it will be seen/ heard with Kendricks next project. As an interview from 2018 suggested, Kendrick might be writing long-form. As the interview asks itself what themes are recurring we here are bringing them to light and analyzing them to see what this long-form story can be about.
You know what all the things have in common? Only half of the truth, if you tell it See I spent twenty-three years on the earth searching for answers 'Til one day I realized I had to come up with my own I'm not on the outside looking in I'm not on the inside looking out I'm in the dead fucking center, looking around You ever seen a newborn baby kill a grown man? That's an analogy for the way the world make me react My innocence been dead
-Ab-Soul’s Outro Throughout his music and life, Kendrick is looking for the truth, his purpose. He is looking at it from every angle and he is ready to bring that knowledge to the people.
If you don't leave with nothing else tonight, you will leave with knowing yourself You will leave knowing that you represent something thats bigger than all of us Our family
Visions of Martin Luther staring at me Malcolm X put a hex on my future, someone catch me I'm falling victim to a revolutionary song, the Serengeti's clone
-HiiiPower So here we have Kendrick saying that the greatest of black leaders are influencing him in his life. Just as they fell, Kendrick might also fall, hence him asking someone to catch him… as he falls victim to bringing a revolutionary song. Any leader of a revolution puts themself in a vulnerable state. Kendrick knows that so in order to survive this revolution he also needs to form a migration. The Serengeti region in Tanzania is home to one of the largest migrations.
Enough to drive a man insane, I need a license to kill I'm standing on the field full of land mines Doing the moonwalk, hoping I blow up in time Cause 2012 might not be a fucking legend Tryna be a fucking legend, the man of mankind
-HiiiPower Kendrick knows the industry is tough and that he to blow up in stardom soon as he is hoping to become “the man of mankind.”
And everything on TV just a figment of imagination I don't want plastic nation, dread that like a Haitian While you mothafuckas waiting, I be off the slave ship Building pyramids, writing my own hieroglyphs HiiiPower
Kendrick is building his own religion and stories.
I mean the shit is, Huey Newton going stupid You can't resist his HiiiPoWeR
-HiiiPower Another comparison to a black leader. This time the co-founder of the Black Panther party. For him to say that this movement is “Huey Newton going stupid” means that his ambitions are greater.
GKMC/ Level 7
They say conversation rule a nation, I can tell But I could never right my wrongs 'Less I write it down for real, P.S
-Poetic Justice Perhaps Kendrick is trying to lead that conversation. He knows he has has to write down all wrongs in his music, which he essentially has.
Every time I write these words they become a taboo Makin' sure my punctuation curve, every letter here's true Livin' my life in the margin and that metaphor was proof I'm talkin' poetic justice, poetic justice If I told you that a flower bloomed in a dark room Would you trust it?I mean, you need to hear this Love is not just a verb, it's you lookin' in the mirror Love is not just a verb, it's you lookin' for it, maybe
-Poetic Justice He’s saying that what he says isn’t accepted by the industry and world usually as he spits the truth and keeps it real more than most. He lives his life outside the mainstream and is here to bring justice with his words. Even though he is from a dark place, he is as beautiful as a flower… he questions out trust in him since he is not from a great place. In the end he says Love is not just a verb but something that you can find in yourself. I think that the message of love might be the ultimate message of Kendrick’s, akin to many religions and such.
All my innocence while ignorin' my purpose to persevere As a better person; I know you heard this and probably infear
-Good Kid His mission is to become a better person, as he has said before… his mention of fear is interesting as in FEAR he states:
“Searchin' for resolutions until somebody get back Fear, what happens on Earth stays on Earth And I can't take these feelings with me, so hopefully they disperse Within fourteen tracks, carried out over wax Wonderin' if I'm livin' through fear or livin' through rap Damn”
You could maybe break this down as him trying to become a better person by letting go of the feelings he lays out on DAMN and leaving the Earth. As FEAR continues his cousin says that he must return to the original commandments to not feel chastised.
Mass hallucination, baby Ill education, baby Want to reconnect with your elations? This is your station, baby
-Good Kid Most media is trash. If you wanna hear the truth and find happiness, this might be music for you.
I blow up every time we throw up a record Depending on what you expecting, I'm sure it's bigger than your religion Perfected by niggas that manifested music to live in
-Compton Kendrick knows he gets bigger and levels up with every record. As the music oprogresses TDE has created music to withstand generation and to live through.
A smart man if I keep my feet planted To the earth 'cause the people that hurt can understand it”
-Now or Never what happens on earf….
For you to hear Kendrick persevere Defenses I feel relentless Ambition with a clear vision Takin' off I ain't takin off these Pistons I'm takin' off on the inner me - you're distance Came across me, how much it'll cost me To get you out my business I said a planet is a short term goal, no sky is the limit
-Now or Never
To Pimp A Butterfly/ Level 8
I said Hiiipower, one time you see it Hiiipower, two times, you see it Hiiipower, two times, you see it Conversation for the entire nation this is bigger than us
-Grammy 2016 performance (untitled 05) His first big mention of HiiiPower since his Section. 80 days.
I can attempt to enlighten you without frightenin' you If you resist, I'll back off quick, go catch a flight or two But if you pick destiny over rest in peace Then be an advocate, tell your homies especially To come back home
-Momma His message includes advocating going back to one’s roots.
I can see Your defense mechanism is my decision Knock these walls down, that’s my religion
-These Walls Kendrick’s religion, his movement and mission is to knock out the walls of the industry.
It's such a shame they may call me crazy They may say I suffer from schizophrenia or somethin'
-Blacker the Berry I don’t know if he has done something yet that would make people say this but I think he could be foreshadowing something in the future. Or it could be about the last couple lines of the song.
Once I finish this, witnesses will convey just what I mean Been feeling this way since I was 16, came to my senses
-Blacker the Berry He made his first mixtape at 16. Has he been formulating his story all this time?
This plot is bigger than me, it's generational hatred It's genocism, it's grimy, little justification
-Blacker the Berry
Dreams of reality's peace Blow steam in the face of the beast Sky could fall down, wind could cry now Look at me motherfucker I smile-
-I (single) This is the basis of this post. He is here to give a story, to teach us lessons. One of the biggest lessons is to learn to love yourself. He says that he will run into a building and lay his body on the street in the future to free himself… this is something I’ll be talking about in the next post.
Let these words be your Earth and moon, you consume every message As I lead this army, make room for mistakes and depression
-Mortal Man This. This. This. Even though you consume his message and understand it, its ok to still make mistakes.
When shit hit the fan, is you still a fan? When shit hit the fan— (one two, one two) When shit hit the fan, is you still a fan? When shit hit the fan, is you still a fan?
-Mortal Man Kendrick seems to be untrusting that people will take his words seriously… and from what he has alluded to, his actions. Will he do something that might make him a controversial figure?
You wanna be remembered that delivered the message That considered the blessing of everyone This your lesson for everyone, say;
-Mortal Man “I prophesied on my last song, you laughed at me” Kendrick says in The Heart Part 4 two years after the release of TPAB. Mortal Man is basically a cliffhanger, he ends up trying to find out the answers with Tupac but is left hanging, leading to DAMN where he has to win the battle within himself before he is ready to escape his demons and finally deliver the message of God.
Wings begin to emerge, breaking the cycle of feeling stagnant Finally free, the butterfly sheds light on situations That the caterpillar never considered, ending the internal struggle Although the butterfly and caterpillar are completely different They are one and the same
-Mortal Man He is trying to tell us that everyone has an internal struggle that reflects in the world. The good and the bad go hand in hand. When you know this, you have the ability to grow and heal. Maybe the world and society as a whole can do the same.
DAMN./ Level 9
And Nazareth gon' plead his case The reason my power's here on earth Salute the truth, when the prophet say
Tell me when destruction gonna be my fate Gonna be your fate, gonna be our faith Peace to the world, let it rotate Sex, money, murder—our DNA
-DNA Kendrick is saying that the world rotates around sex, money and murder, leading to our demise. As we have seen, Kendrick wants to change the status quo. “Peace to the world” could be him saying goodbye to it. Also another allusion to his eventual death.
I can feel it, the phoenix sure to watch us I can feel it, the dream is more than process I can put a regime that forms a Loch Ness I can feel it, the scream that haunts all logic
-FEEL Kendrick is putting together a movement, a religion, a team that will form a Loch Ness, or rather a myth, a story. This is in line with a lot of my other analysis of previous lyrics in the post.
It’s a secret society All we ask is trust (All we ask is trust) All we got is us
-LOYALTY He needs to trust his team and the people around him. The HiiiPower movement is part of TDE’s dna and each other is all they've got in the crazy journey they’ve gone on. As I pointed out before he has mentioned the secret society before.
I promise to keep it honest Secret society all we ask is trust”- The Heart Part 2 Loyalty, loyalty, loyalty Loyalty, loyalty, loyalty 10-4, no switchin' sides
-LOYALTY He’s telling other members of TDE and his cause that there is no going back. That they have to stay loyal to him.
How they look at me reflect on myself, my family, my city What they say 'bout me reveal if my reputation would miss me What they see from me would trickle down generations in time What they hear from me would make 'em highlight my simplest lines
-FEAR I think he is going to give us and the future generations something that will last forever.
Fear, what happens on Earth stays on Earth And I can't take these feelings with me, so hopefully, they disperse Within fourteen tracks, carried out over wax Searchin' for resolutions until somebody get back Fear, what happens on Earth stays on Earth And I can't take these feelings with me, so hopefully they disperse Within fourteen tracks, carried out over wax Wonderin' if I'm livin' through fear or livin' through rap Damn
-FEAR So far we have established that his plan is to persevere and become a better person. In these lines he says that he can’t take these feelings with him as he is probably leaving this Earth to become that better person. He is leaving his past life and leaving it with the music. I believe that a new Kendrick will emerge in the next record. The Butterfly with beautiful wings.
All my innocence while ignorin' my purpose to persevere As a better person; I know you heard this and probably in fear”-Good Kid For the cause, I done put blood on sword Everything I do is to embrace y'all Everything I write is a damn eight ball Everything I touch is a damn gold mine Everything I say is from an angel
-GOD He’s bringing us the word of God, ya’ll. Conclusion: So with this post, we were looking for a plan/ mission in Kendrick’s music. The point of all this is to connect all his discography to a larger narrative. Well what's the end goal? Well there are a couple things. First off, Kendrick wants to reach the top, get rich (something we've established int he last post) and break down the walls of the music industry to change how things are done and change expectations… effectively destroying his competition. His mission also includes bettering himself and escaping his demons which he has effectively done in DAMN. I believe. The last big part of his plan is to bring a revolution/ movement to the world. Something that he alludes to as he says “I’ll make an album that’ll put a smile on Malcolm.” We can gather that Kendrick believes he is here to deliver a message to the world, something that could heal the whole generation if we listen. Now, my theory is now that Kendrick has figuratively been killed on DAMN and left his feelings on this Earth, he is ready to reach the clouds/ heaven in order to talk to God and become the best person he can be. Once he has done that he can effectively help bring change to the world with his story. I’d like to believe that this revolutionary song/ album will be the next one since DAMN seemed to be a cliffhanger of sorts. Kendrick delved to the darkest pits of himself in that album, he “wrote his wrongs.” He won his internal struggle. Now he can help the struggle the world faces as a whole. In my eyes, Kendrick has already helped out the world, but all these lyrics point to something greater. With all this in mind, I will be expanding more on the “death/ downfall” of Kendrick in the next post. His music is filled with a ton of foreboding about his death and destruction like we even saw in this post. But something that has not been talked about is HOW he will “die." If you read all this thank you for taking the time. It will only get even crazier from here on out, but as you can see I do not conjure up claims/ theories without the supported evidence/ lyrics. Part 4.1: I Am PART 5: Kendrick's Fall to Death
This thread has been updated as of 3pm on 9/14 A storm is in the gulf and might be headed our way. As such, it's time for a megathread! In order to make it easier and provide current information to individuals, please keep the conversations surrounding the storm to this thread. We are trying to consolidate the more serious conversations/information to this thread. It is highly recommend that you sort comments by new given the changing environment For the time being, memes and funny-ish posts can be standalone posts. This is subject to change depending on how the situation evolves. Despite all the humor surrounding it, please take this event seriously and make plans based upon your needs. Below is some general information/advice, but should not be taken as official recommendations. Please listen to local/national authorities in determining your next course of actions. I will try to update this post with current information when I can. Once the storm gets closer to landfall, we will switch from this standalone post to the /TropicalWeather live thread as it's a great resource to get up to date information on the storm. P.S. If you believe something should be appended/amended to this post, please let me know and I'll be happy to consider it.
What is happening?
Hurricane Sally is off the SE Coast of Louisiana and is anticipated to keep moving NW towards the Louisiana/Mississippi Gulf Coast over the next 48 hours. The storm is projected to reach hurricane force winds before making landfall sometime between very late Monday night/Tuesday morning. Most models are now predicting a Cat 2-3 landfall. This storm is not necessarily going to be a huge wind concern - but due to the slow moving nature of the storm, this is expected to be a major rain event with up to 10" anticipated over the next week. As of 2:40pm on 9/14, the storm has moved slightly more east and we're expecting an Gulfport/Biloxi landfall. We're still not out of the woods yet, but it looks like we might get some western rain bands (as dry as the western side looks). Expect the worst, hope for the best.
Where can I get more information on projected paths, evacuation notices, and general preparation information?
As always, we recommend paying attention to local and national media forecasts. Here are some official government links for you to monitor:
You can also text "SALLY" to 888777 to get text updates.
I'm a weather junky and I need my fix, what do you recommend?
Again, please take advice of your local and national government when making decisions. However, like you, I like knowing what the Euro, GFS, UKMET, HMON, HWRF, COAMPS and Navy models are all doing at all times. For these people:
Tropical Tidbits - Levi Cowan is providing some of the best analysis on storms out there. Please consider donating to his patreon.
Hurricane Watch Net - Amateur Radio Operators trained to provide emergency information when stuff goes HAM.
Mike's Weather Page - If you like seeing a website designed in the early 2000s with a bunch of hurricane graphics on one page, this is the spot for you.
NBC 15 Youtube Channel - Mobile is part of the Swampborn Krewe and they have Alan Sealls on the team, arguably one of the best Hurricane Meteorologists the South has. Highly recommend watching his daily videos (they get posted on /tropicalweather).
Yale Climate Connections - Weather Underground used to maintain one of the best blogs called Category 6, after being bought by the Weather Channel, they shut it down. Jeff Masters has moved to the Yale Climate Connections being posted under "Eye on the Storm."
Should I evacuate?
Please refer to the above local/national section when making your evacuation plans. Every person's situation is different. Please begin making preparations 3-4 days out. I will attempt to monitor and post evacuation updates below, but please refer to this article by WWLTV for more up to date information: Mandatory Evacuations (As of 9/13):
Cool. Good For You! Some people aren't so lucky and can't afford to stay. However, here's some general advice for those of us who are new to those whole hurricane thing:
Expect your power to go out. Entergy NOLA is a regulated monopoly and it's hot garbage. You should anticipate your power going out for up to a month in the middle of September.
Expect it to flood. If you're expecting the SWBNO to do their job, I have a bridge to sell you. Move your cars to the neutral ground or a high spot.
Wear your damn masks. THIS IS A 2020 COMBO SPECIAL!
Fill up your gas tanks. Or charge your electric car. Doesn't matter, just make sure you can leave if you need to.
Stock up on your essentials. Do this now. Do not wait.
Get cash from the ATM. What? You think credit cards and apple pay works during a power outage? Nope! Prepare to go analog and get some cold hard cash from the ATM. When you need to go to Schwegmann's to get some rice and beans, you'll be able to pay.
Get you and your pets medicines. This is often overlooked. If you have essential medical needs, get your refills now (this includes the good bois and cool cats and kittens).
Fill up your bathtub the night before. Boil advisories are expected and you will need water to flush the toilets.
Put bottled water in the freezer. Trust me on this one, fill your freezer to the MAX with water bottles. It will keep your freezer colder for longer and you'll have cool water during an extended power outage. Also, keep your fridge and freezer closed for as long as you can.
Charge your spare batteries. If you have external rechargeable batteries for your phones, charge them up now. This includes laptops as well - you can charge your phone with a laptop!
Turn around, don't drown. Do not be a dumbass and drive through high water. I don't care if your Tesla can float or if your F150 is lifted for her pleasure. Don't drive through high water.
What about public transportation? Will it still be operational?
While a lot of people don't have reliable alternative transportation, always make sure you have a plan. In general, you shouldn't expect public transport to operate during a hurricane. Don't rely upon it. Make plans to move to a safe location or a shelteevacuation center prior to the storm. Should you need evacuation notices and/or assistance, please review the New Orleans Regional Transit Authority's website for further information on public transportation and and out of the city in the event of a mandatory evacuation. Update as of 9/13 from RTA:
In preparation for expected impacts of Hurricane Sally to the Gulf Coast region, the New Orleans Regional Transit Authority will suspend all bus and streetcar service beginning at noon on Monday, September 14th. Ferry services will be suspended after normal operations on Sunday, September 13. Services will remain suspended until further notice.
What schools will be closed?
Schools will likely be closed the day before the storm. Depending on the extent of the damage and various other factors (power, water, etc.) it's unknown for how long the schools will be closed for. It's recommended that you monitor your local parish's school district websites for up to date information on school closures. That being said, we'll post information as it becomes available. WWLTV tends to have a good up to date listing that's available here. Most private institutions abide by the local Parish's closures, but please refer to your specific school for up to date information. For universities, please refer to your university's individual emergency guidance. Orleans Parish
Orleans Public Schools: No in-person instruction will begin across school campuses tomorrow. All schools will remain on distance learning through at least Wednesday of this week.
UNO: All Monday courses will be delivered online. All Tuesday classes (in-person, online and hybrid) are canceled. No face-to-face courses will meet on campus on Monday. Only essential personnel should report to campus Monday and Tuesday. All other employees should work remotely Monday.Tuesday is an emergency closure day for all other employees. Campus Dining will continue to offer food service for students living in the residence halls.
Loyola University New Orleans: Will be open for operations as normal tomorrow until 4 p.m. Evening classes on Monday are suspended. Operations will be suspended Tuesday.
Tulane: Classes will be held until noon Monday. Both online and in-person classes are canceled Monday afternoon through Tuesday. Wednesdays operating status will be determined in the coming days.
New Orleans Baptist Theological Seminary/ Leavell College: Cancelled classes and closed offices Monday-Wednesday
New Orleans Baptist Theological Seminary: Closed Monday through Wednesday
NOCCA: Student classes/distance learning is cancelled Monday and Tuesday
All Jefferson Parish public schools will be closed Monday and Tuesday, as well as administrative buildings. All school and district activities are canceled during the two-day period and will be rescheduled.
Concordia Lutheran School: Closed Monday. Closure decisions will be made daily by school administrators.
JCFA East will be closed Tuesday and will ask students to work virtually on Wednesday.
JCFA West will be closed Tuesday and will ask students to work virtually on Wednesday.
St. Tammany Parish
Kehoe-France Northshore will be open on Monday and closed on Tuesday.
All schools within the Plaquemines Parish School Board will be closed on Monday and Tuesday. Notifications of the school reopening date will be released at a later time.
Our Lady of Perpetual Help in Belle Chasse: Closed Monday and Tuesday. Reopening information will be announced at a later date
St. Bernard Parish
St. Bernard Parish Public School System schools and offices will be closed Monday. This closure includes students currently enrolled in our virtual learning program. Further updates will be provided on St. Bernard social media accounts and websites.
Nunez Community College: Close Monday, Sept. 14 in anticipation of Tropical Storm Sally. Available classes will be offered virtually. Updates for Sept. 15 and beyond will be posted to Nunez.edu and all Nunez social media accounts.
Our Lady of Prompt Succor in Chalmette: Will be closed Monday and Tuesday. Reopening information will be announced at a later date.
All Lafourche Parish schools will be closed Monday and Tuesday because of Sally. All employees will work remotely for those days, and virtual learning will be offered to all LPSD students to the best of the school district's ability. However, if teachers experience power outages, all virtual activities will be canceled. Also, any student that is unable to complete the assignments will be excused and allowed to make up any missed work. A decision will be made later concerning the remainder of the week.
Terrebonne Parish public schools closed Monday and Tuesday
St. Charles Parish
Public schools closed Monday through Wednesday for both in-person and virtual learning
Arthur Monday Multi-Purpose Center, 1111 Newton Street
Dryades YMCA, 2220 Oretha Castle Haley Boulevard
Former Walmart and Sam’s parking lot, 6901 Bundy Road
Milne Recreation Center, 5420 Franklin Avenue
St. Bernard Parish: Self sandbagging will be available Sunday morning beginning at 8 a.m., going on until sand runs out. Residents can fill their sandbags at the following locations:
St. Bernard Port – 100 Port Blvd., Chalmette.
Government Complex – 8201 W. Judge Perez Dr., Chalmette.
OTB – 4242 E. Judge Perez Dr., Meraux.
Historic Courthouse – 1201 Bayou Rd., St. Bernard.
Plaquemines Parish: Beginning at 10 a.m., parish-wide sandbag locations will be open, but residents should bring their own shovels and only take what they need. Bags will be provided. Residents can fill their sandbags at the following locations:
Plaquemines Parish Government Complex, PROWM Building — 333 F. Edward Hebert Blvd, Belle Chasse, LA 70037)
Port Sulphur YMCA — 278 Civic Dr, Port Sulphur, LA 70083
Buras YMCA — 36342 Hwy 11, Buras, LA 70041
Boothville Area across from Boothville-Venice Elementary School — Oiler Dr #1, Boothville, LA 70038
Davant Community Center — 15577 Hwy 15, Braithwaite, LA 70040
Braithwaite Auditorium, —1253 LA-39, Braithwaite, LA 70040
St. Tammany Parish: St. Tammany Parish Government will open six self-service sandbag locations beginning Sunday. All locations will have sand and bags provided. Residents are asked to bring their own shovels in case all shovels provided are in use. residents are asked to limit the number of sandbags to 15 per vehicle. There will be someone on-hand to help the elderly and/or disabled at each location. The locations will be open Sunday 12 p.m. to 6 p.m. and Monday 7:30 a.m. to 6 p.m.
St. Tammany Parish Government - Building — 21410 Koop Dr., Mandeville, La.
St. Tammany Parish Public Works- Airport Road Barn — 34583 Grantham College Rd, Slidell, La.
The Old Levee District Site — 61134 Military Road (Hwy 190), Slidell, La.
St. Tammany Parish Public Works- Fritchie Barn — 63119 Highway 1090, Pearl River, La.
St. Tammany Parish Public Works Barn- Keller Barn — 63131 Fish Hatchery Road, Lacombe, La.
St. Tammany Parish Public Works Barn- Covington Barn — 1305 N. Florida Street, Covington, La.
Can you sharpie this situation away?
Neither NOAA nor FEMA recommends this. It doesn't work.
2020.08.25 02:00 TopOfTheBotTop Posts and Comments of the Day
Top of the Day for 25/08/2020
For frequently asked questions, please click here. Times shown on this page are in UTC, and dates are displayed as Day/Month/Year. There are some limitations with the Reddit API that still need to be worked around, you can help contribute to this bot through its GitHub page.
I just passed 1 year working on my solo project Song of Iron and 6 months since you all changed my life and blew up my first post. I've made a ton of changes based on your feedback, What do you think? posted by ABiggerBear on /gaming Click here to view the post. ● 125,648 Upvotes ● Posted: 24/08/2020 at 14:27:52 UTC
IMPORTANT NOTE: This section may be not be accurate as it is under development. Currently this only gets the most upvoted top-level comments from the most upvoted posts today. First Place
Excessively thick pith is caused by a nitrogen to phosphorous imbalance. How are you fertilizing? What's the soil like where the tree is planted? posted by dfranks44 on /funny Click here to view the post. ● 25,181 Upvotes ● Posted: 24/08/2020 at 04:24:11 UTC
You all seriously have changed my life, because of the positive response to my first post the game was discovered by xbox and I got the honor of being in the summer games showcase pre show. I owe a lot to this community... seriously thank you. `My name is Joe and Song of Iron is a solo passion project of mine. Think INSIDE but if the kid was a viking in the land of Nordic gods. I have a long way to go but the journey has been amazing so far and I cant wait to keep pushing to the end. ` if you want to know more about the project the [songofiron.com](https://songofiron.com) site has links to wishlist and all the social media fun. `Thanks again!` posted by ABiggerBear on /gaming Click here to view the post. ● 14,747 Upvotes ● Posted: 24/08/2020 at 14:30:23 UTC
On saving his sister from a dog attack, “If someone had to die, I thought it should be me.” posted by jab116 on /pics Click here to view the post. ● 122,346 Upvotes ● 3 reward(s). ● 1 silver reward(s), 1 gold reward(s) and 1 platinum reward(s) ● Posted: 15/07/2020 at 01:55:25 UTC
TIFU By Giving A Homeless Man My Last $50... posted by -_-fenneko-_- on /tifu Click here to view the post. ● 13,018 Upvotes ● 3 reward(s). ● 1 silver reward(s), 1 gold reward(s) and 1 platinum reward(s) ● Posted: 24/08/2020 at 17:10:03 UTC
After 6 months homeless & jobless. I now have a new apartment, car and a job in a call center. And I did it on my own. So proud of myself. posted by itsamejay on /MadeMeSmile Click here to view the post. ● 195,456 Upvotes ● 3 reward(s). ● 1 silver reward(s), 1 gold reward(s) and 1 platinum reward(s) ● Posted: 22/08/2020 at 02:40:07 UTC
Dani get your dusty weird ass shoes off of the couch you monster posted by sjb5138 on /BigBrother Click here to view the post. ● 10 Upvotes ● 1 reward(s). ● 0 silver reward(s), 1 gold reward(s) and 0 platinum reward(s) ● Posted: 24/08/2020 at 23:58:11 UTC
In addition to what others have said, it's also the nature of nuclear bombs. They have several phases in how they work. The initial explosion deals damage, but to a pretty small area (relatively speaking). There's an initial radiation burst with that, but this is also relatively short range. The reason is that most of the radiation that causes damage is attenuated over relatively short distances. `Alpha radiation (helium nucleus of 2x protons + 2x neutrons) VERY QUICKLY grab 1 or 2 electrons from whatever they pass by, becoming stable (and thus not harmful radiation) anymore; Helium is probably the most stable element in the universe. Alpha radiation isn't harmful to Humans from outside exposure. The reason is, it can't even get through your dead skin layer without being neutralized. Even a thin layer of clothing will block it. Famously, Alpha radiation is blocked by a piece of paper. (The danger comes in if you touch something that contains or is emitting it, then eat/drink something, some of it can get on your fingers then down your throat and into your stomach, and there's no dead skin layeclothing there to protect your sensitive tissues.)` Likewise, Beta radiation (electrons) are typically gobbled up quickly by any passing atom or molecule with a decent electronegativity. More penetrating than Alpha, it can still be stopped by normal clothing. Same thing about ingestion applies here. This is why in radiation sites, they always say \"No eating, drinking, smoking, or dipping.\" `So that leaves two other general types: Neutrons and Electromagnetic.` Neutrons are electrically neutral. This means they (a) can penetrate through things a great distance but also (b) they don't interact with things much. In order for a neutron to interact, it must more or less square on hit the nucleus of a passing atom. To put this in perspective, it'd be kind of like if you shot a probe or rocket into space in a random direction and asked \"will it ever directly hit a star at the center of a solar system somewhere?\" Yes, it can happen, but it's entirely probability/a crap shoot as to whether it does or it does not. It's entirely possible for a neutron to pass into one side of your body and out the other without doing ANYTHING at all. Or it could hit one molecule just right and cause a chain reaction, damaging several other key molecules in a DNA chain in one of your cells. Neutrons that DO interact with the nucleus of an atom basically work (in a RIDICULOUSLY oversimplistic way of thinking about it) like Newton's cradle (the thing with the hanging marbles that hit each other on one end and bounce the one on the far end to swing out): The neutron becomes part of the nucleus and kicks a proton out. `...the PROTON is what goes on to crash into the next thing it hits (being positively charged, they are, of course, attracted to things where neutrons are not), and cause further reactions.` Finally, we have electromagnetic radiation or photons. These come in energy from the low energy radio to microwave, infrared, the visible spectrum (red on the low end to violet on the high end), to ultraviolet, to x-ray, to the highest energy gamma rays. Electromagnetic radiation is weird in that molecules will only absorb specific energies/frequencies of light/photons, and they are specific to that molecule type. Others will pass through without any action whatsoever. This is known as quantization (they only accept specific \"quantities\") and this creates absorption and emission lines (the specific frequencies they accept, which you can see in visual form). `Further complicating things, if a molecule accepts a photon of a given energy, it MAY give off a photon of that same energy later (one of its electrons will jump to a higher energy when it absorbs the photon's energy, then jump back down later, releasing a photon with energy), but as there are many energy levels, an electron CAN absorb a high energy photon and then come back down from that high energy in \"steps\", releasing several LOW energy photons as it does so. Energies that might NOT interact with the surroundings.` For example, visible light can pass easily through glass, but a lot of infrared cannot. When your car is in the summer heat with the windows up, the visible light will pass through the glass to the inside. There it will be absorbed by the molecules of your chair, dashboard, etc. Some of this is emitted back out later as visible light, and again passes through the glass. But, if the electron takes more than one step to come back down, it will emit several photons of lower energy infrared light on the way. These CANNOT pass through the glass, and so remain trapped inside of the car, causing the temperature to rise (cracking windows means that some of the air molecules in the car that absorb that heat energy can then escape through the window, making the car less hot than it otherwise would be - so that's how THAT works.) `One LAST thing to note here is that if the photon absorbed by the molecule has high ENOUGH energy, it won't just push the electron to a higher energy shell (\"orbit\", if you will), it will launch it out of the molecule entirely. At this point, you effectively have Beta radiation (a free electron), but inside your body (as mentioned above, that's bad since there's no skin/clothing to keep it from the more sensitive tissues). To use our analogy above, it'd be like if you shot a rocket at another solar system and it hit one of the planets there hard enough to sent it flying free of its solar system.` Needless to say, this one is complicated. Like neutrons, these can pass through your body doing NOTHING AT ALL, or they can go in and cause some damage. It is, again, a probability function of (a) will the photon pass near enough to an atom to interact and (b) is it of a specific energy that the atom will accept OR great enough to simply launch an electron out (if you exceed the binding energy of that electron entirely, then you aren't concerned about quantization anymore, since you simply remove it from the energy shell system entirely...) `FINALLY:` It's how radiation works on cells. `IF something in a cell DOES interact with radiation, several things can happen:` (a) it can be some unimportant molecule that...doesn't do anything.(b) it can be something more important, but that the cell can repair.(c) it can be something so important that the cell dies entirely, and for MOST of the cells in your body, you can deal with single cell deaths here and there (they actually happen all the time in normal life.)(d) it can be something important, BUT that your body can't repair BUT that doesn't stop the cell from reproducing to continue the \"error\" forward to future generations of cells that derive from that initial parent cell. THIS is the bad one, as it leads to things like cancers. `.` So...maybe a bit more in-depth, but I tried to keep it from going too out of control there. `The short version is, radiation is a complicated thing. It doesn't quite work like people think, and it's probability based. This means you could absorb a lot and nothing happen, or you could be exposed to a little and it kill you. People fear that unknown. BUT, the probability of harm is higher with (a) higher levels of exposure and (b) shorter times of exposure. So getting a lot of radiation in a short time IS more likely to harm you than a steady amount of a little over a long time. And the vector of entry also matters (e.g. ingestion/eating vs external exposure to skin/clothes.)` And BECAUSE it's a probability (did your missile launched into space hit a star or just travel endlessly through the void), there's no real way to PROVE harm, it's more looking at statistics, seeing if there was a spike in something like cancer cases above the average of the surrounding ares/time period, and then assuming that was maybe probably caused by radiation. `Initial blast wave = damage` Radiation wave = possibility of cancers (closer = worse) `Long term concern = contaminated surfaces and ingestion` The initial blast, contrary to dramatic effect, is actually NOT the most harmful part of a nuclear explosion..EDIT: I should note there's some more into this (for example, how the initial blast is followed by an inrush of air from outside due to the rapidly cooling hot air contracting, or the mechanics of the compression wave, etc), but I'm trying to keep this in ELI5 territory. Definitely an interesting topic if you care to read more. posted by Renathras on /explainlikeimfive Click here to view the post. ● 81 Upvotes ● 1 reward(s). ● 0 silver reward(s), 1 gold reward(s) and 0 platinum reward(s) ● Posted: 09/08/2020 at 16:58:51 UTC
Your professor is wrong. `All the Judicial, Statutory, and Historic evidence from the 17th Century to Modern day supports the individual right to keep and bear arms unconnected to militia service.` Being a direct descendant of the English colonies American law is based off of the English model. Our earliest documents from the Mayflower compact to the Constitution itself share a lineage with the Magna Carta. Even the American Bill of Rights being modeled after the English Bill of Rights. `The individual right, unconnected to milita service, pre-exists the United States and the Constitution. This right is firmly based in English law. ` [In 1689 The British Bill of Rights gave all protestants the right to keep and bear arms.](https://en.m.wikipedia.org/wiki/Bill_of_Rights_1689) `[\"The English right was a right of individuals, not conditioned on militia service...The English right to arms emerged in 1689, and in the century thereafter courts, Blackstone, and other authorities recognized it. They recognized a personal, individual right.\" - ` `CATO Brief on DC v Heller]( http://www.abanet.org/publiced/preview/briefs/pdfs/07-08/07-290_RespondentAmCuCATOInstJMalcolm.pdf)` Prior to the debates on the US Constitution or its ratification multiple states built the individual right to keep and bear arms, unconnected to militia service, in their own state constitutions. `[\"That the people have a right to bear arms for the defence of themselves and the State\" - chapter 1, Section XV, Constitution of Vermont - July 8, 1777.](http://avalon.law.yale.edu/18th_century/vt01.asp)` [\"That the people have a right to bear arms for the defence of themselves and the state\" - A DECLARATION OF THE RIGHTS OF THE INHABITANTS OF THE COMMONWEALTH OR STATE OF PENNSYLVANIA, Section XIII, Constitution of Pennsylvania - September 28, 1776.](http://avalon.law.yale.edu/18th_century/pa08.asp) `Later the debates that would literally become the American Bill of Rights also include the right of the people to keep and bear arms.` [\"And that the said Constitution never be constructed to authorize Congress to infringe on the just liberty of the press, or the rights of the conscience; or prevent of people of the United States, who are peaceable citizens from keeping their own arms; or to raise standing armies, unless when necessary for the defense of the United States, or of some one or more of them; or to prevent the people from petitioning, in a peaceful and orderly manner, the federal legislature for a redress of grievances; or to subject the people to unreasonable searches and seizures of their persons, papers, or possessions.\" - Debates and proceedings in the Convention of the commonwealth of Massachusetts, 1788. Page 86-87.](https://archive.org/details/debatesandproce00peirgoog) `The American Bill of Rights itself was a compromise between the federalist and anti-federalist created for the express purpose of protecting individual rights.` [\"In the ratification debate, Anti-Federalists opposed to the Constitution, complained that the new system threatened liberties, and suggested that if the delegates had truly cared about protecting individual rights, they would have included provisions that accomplished that. With ratification in serious doubt, Federalists announced a willingness to take up the matter of a series of amendments, to be called the Bill of Rights, soon after ratification and the First Congress comes into session. The concession was undoubtedly necessary to secure the Constitution's hard-fought ratification. Thomas Jefferson, who did not attend the Constitutional Convention, in a December 1787 letter to Madison called the omission of a Bill of Rights a major mistake: \"A bill of rights is what the people are entitled to against every government on earth.\"](http://law2.umkc.edu/faculty/projects/ftrials/conlaw/billofrightsintro.html) `In Madison's own words:` [“I think we should obtain the confidence of our fellow citizens, in proportion as we fortify the rights of the people against the encroachments of the government,” Madison said in his address to Congress in June 1789.](https://constitutioncenter.org/blog/on-this-day-james-madison-introduces-the-bill-of-rights) `Madison's first draft of the second Amendment is even more clear.` [\"The right of the people to keep and bear arms shall not be infringed; a well armed and well regulated militia being the best security of a free country; but no person religiously scrupulous of bearing arms shall be compelled to render military service in person.\"](https://memory.loc.gov/cgi-bin/ampage?collId=llac&fileName=001/llac001.db&recNum=227) `Ironically it was changed because the founders feared someone would try to misconstrue a clause to deny the right of the people.` [*\"Mr. Gerry -- This declaration of rights, I take it, is intended to secure the people against the maladministration of the Government; if we could suppose that, in all cases, the rights of the people would be attended to, the occasion for guards of this kind would be removed. Now, I am apprehensive that this clause would give an opportunity to the people in power to destroy the Constitution itself. They can declare who are those religiously scrupulous and prevent them from bearing arms.\"* - House of Representatives, Amendments to the Constitution 17, Aug. 1789](http://press-pubs.uchicago.edu/founders/documents/amendIIs6.html) `Please note Mr. Gerry clearly refers to this as the right of the people.` This is also why we have the 9th Amendment. `[\"The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.\"](https://www.constituteproject.org/constitution/United_States_of_America_1992)` Article I Section 8 had already established and addressed the militia and the military making the incorrect collective militia misinterpretation redundant. `Supreme Court cases like US v. Cruikshank, Presser v. Illinois, DC v. Heller, and even the Dredd Scott decision specifically call out the individual right to keep and bear arms unconnected to militia service.` [This is further evidenced by State Constitutions including the Right to keep and bear arms from the Colonial Period to Modern Day.](http://www2.law.ucla.edu/volokh/beararms/statedat.htm) `“The Constitutions of most of our states assert that all power is inherent in the people; that they may exercise it by themselves, in all cases to which they think themselves competent, (as in electing their functionaries executive and legislative, and deciding by a jury of themselves, both fact and law, in all judiciary cases in which any fact is involved) or they may act by representatives, freely and equally chosen; that it is their right and duty to be at all times armed; that they are entitled to freedom of person; freedom of religion; freedom of property; and freedom of the press. in the structure of our legislatures we think experience has proved the benefit of subjecting questions to two separate bodies of deliberants; ...” - Thomas Jefferson’s letter to John Cartwright, on June 5th, 1824` posted by vegetarianrobots on /gunpolitics Click here to view the post. ● 104 Upvotes ● 1 reward(s). ● 0 silver reward(s), 1 gold reward(s) and 0 platinum reward(s) ● Posted: 24/08/2020 at 23:10:51 UTC
2020.08.24 06:57 90c87Current list of efforts so save the show Mega-thread.
I've compiled a list of currently known (to me) efforts to get the attention of the hero we need to save our show. Please comment additional efforts and share what you like on your other platforms. I attempt to update regularly as my contribution to the fight. Last edit: Sept 4th.
There's a bunch more. Compiling a full list for my next update.
Social Media Outrage
The following hashtags are being thrown around: #thesociety, #savethesociety, #thesocietyseason2, #renewthesociety, #netflixisoverparty, #cancelnetflix, #iamnotokwiththis, #bringbackthesociety, #hbopickupthesociety
Every Saturday and Wednesday there's a 1-episode rewatch where everyone will watch an episode and tweet the above hashtags to attempt to get trends.
Demonstrate increased demand to Netflix
People are also leaving the show running while they're doing other things. Chrome/Firefox have extensions to remove the "are you still watching?" and some people are just running the show on an endless loop.
Netflix customer service chat is open to taking feedback on their website and there's a form on Netflix website to request new content. Both can be spammed within reason.
Here is contact info for Netflix execs. Feel free to email them. I already have. I got out of office replies and a response from an intern so we know they work. Template provided.
I am a licensed psychologist in Rhode Island. My areas of interest and specialization include evidence-based treatments for anxiety, depression, and behavioral difficulties. I also have experience working with children, adolescents, and families dealing with trauma, relationship issues, and school challenges. I incorporate Mindfulness, Cognitive Behavioral Therapy (CBT), Dialectical Behavior Therapy (DBT), and Motivational Interviewing (MI), using a warm, supportive, and nonjudgmental approach. I also conduct comprehensive clinical and psychological assessments to understand a child or individual’s strengths and weaknesses and assist with recommendations for treatments and services needed. In addition to my outpatient work, I serve as a staff psychologist at a therapuetic school, where I provide clinical services and special education support to youth with emotional, behavioral, and developmental needs. In this role, I also help parents, guardians, and families to support their children’s mental health, and navigate the special education system. In therapy, I am able to utilize my knowledge of the special education system to assist individuals and families who are seeking support in accessing resources within their academic or workplace environments.
I earned my Ph.D. in School Psychology at Northeastern University and received additional training during my predoctoral internship in the Newton Public Schools. I completed an APA-accredited postdoctoral fellowship in Child Clinical Psychology at Brown University where I received extensive clinical training and research experience. I have published research on child and adolescent mental health, including dating violence, risk behaviors, and social media, in peer-reviewed journals and at national conferences. I strongly believe that research informs clinical practice.
My Approach & Philosophy
I am grateful that you are here. My focus during therapy is to build an open and trusting collaborative relationship, while helping my clients to develop strategies to cope more effectively and reach their goals. I try to create a safe, compassionate, and nonjudgmental space for my clients to feel supported and heard. I tailor my treatment approaches while considering the context of your culture and beliefs and incorporating evidence-based practices. I would be happy to talk more and answer any questions that you might have. I look forward to getting to know you and working together! https://pvdpsych.com/sarah-johnson-phd/
2020.08.20 08:47 CoinEx_InstitutionOcean Protocol Research Report
Author: Garet Johan, CoinEx Business Ambassador https://preview.redd.it/skeolnj9s3i51.jpg?width=1600&format=pjpg&auto=webp&s=42b910784d779dad917d28440c97d108682b1d26 Based on Singapore The Ocean Protocol Foundation develops a decentralized data exchange protocol that facilitates the sharing and monetizing of data assets for artificial intelligence (AI) while guaranteeing control, auditability, transparency, and compliance to all actors involved. This becomes Ocean Protocol an ecosystem where users, corporations and others can use their data in a symmetrical and transparent way Functions Guarantee control, auditability, transparency, and compliance to all actors involved. Functionality to reconcile spread of data with privacy and the commons. It has infrastructure for service agreements and access control, It has cryptographic proof-of-service and network rewards to incentivize supply of relevant AI data & services. It uses on-chain bounties to ensure long-term sustainability and improvement as a public network. Problems to be solved Convert the information available for use by an artificial intelligence without losing control of the data Resolve the tension between wanting more data for better AI models, with the individual right to privacy Incentivize putting data in the commons To be a self-sustaining ecosystem and to improve over the decades Business: Ocean incentivizes participants to submit, refer, and make available (provably) quality AI data & services, via a new construction called Curated Proofs Market (CPM). A CPM has two parts: predicted popularity of a dataset/service, and its actual popularity:
Cryptographic Proof. The actual popularity is the count of the number of times the dataset/service is delivered or made available. To avoid being gamed, it must be made available in a provable fashion using a cryptographic proof. For example, this may be proof of data availability.
Curation Market. This is for predicted popularity, a proxy for relevance. The crowd knows much better than designers of Ocean whether a given dataset/service is relevant; so we harness the power of the crowd via a curation market. This market can be thought of giving reputation to data/services where the actor must “put their money where their mouth is.”
They stake to buy “shares” (aka drops) in that dataset/service. The earlier that an actor stakes or bets on a given dataset/service, the more drops they get for the amount staked, and in turn the higher the reward. Business Model: To avoid people gaming the reward system, only stakeholders provably making high-quality data/services available will be able to reap rewards. Network rewards for a given dataset/service are distributed based on amount of stake in that dataset/service, and its actual popularity. In other words, CPMs instantiate the goals of verification and virality. To the best of our knowledge Whoever bets on the most popular data/service (and makes it available) wins the most rewards. Economic Stakeholders https://preview.redd.it/3slbcupcs3i51.jpg?width=954&format=pjpg&auto=webp&s=75e3103ca384e45938cf98cb2f7c5e09583e1dde REPUBLIC OF SINGAPORE Singapore’s goal is to be the pre-eminent hub for data sharing and Al. Towards this vision, Singapore is coordinating relevant ministries and agencies to provide an approved legal and regulatory framework for data sharing by industry and government alike. Newton Circus (DEX) has signed a memorandum of intent (M01) with the Info-communications Media Development Authority of Singapore (IMDA) and PricewaterhouseCoopers Risk Services to foster the formation of data collaboratives: structures where data contributors, data users, solution developers and technology providers collaboratively work together to solve common business challenges In a safe regulatory environment. https://preview.redd.it/pq8diitfs3i51.jpg?width=694&format=pjpg&auto=webp&s=54bcef8f9b743da0419ef989eb3d3ea032a7a20f From left: Mark Jansen, Data & Analytics Leader at PwC Singapore; Chirdeep Singh Chhabra & Mike Anderson, DEX; Yeong Zee Kin, Assistant Chief Executive of IMDA; and Lance Little, Managing Director, Roche Diagnostics Asia Pacific. With the support of Singapore, several companies are participating in the data sharing use cases. Based on the progress in building the decentralized data exchange protocol, we hope that more companies will embark on the path to unlock their data. https://preview.redd.it/kn5nld1is3i51.jpg?width=1288&format=pjpg&auto=webp&s=3dd0d91bae44d2d6c451a24a1bb6513dbe218f65 Ocean Protocol should be used to unlock public data and solve important challenges facing the planet. We have partnered with other governments, as well as with non-governmental, academic, and public service initiatives to kick-start use cases centering around the United Nations Sustainable Development Goals and Al for Good. By devoting resources to “commons” initiatives, Ocean Protocol can become a vital tool for global researchers. https://preview.redd.it/oahghq5ns3i51.jpg?width=1243&format=pjpg&auto=webp&s=2aa8f74b2272d90a0d4ffae8a2e3fe8380b737f1 https://preview.redd.it/d7nzgtmps3i51.jpg?width=914&format=pjpg&auto=webp&s=1c04f89ccf8b9b1c370c9ef314954a40c64b12b6 https://preview.redd.it/8j8x1jqqs3i51.jpg?width=916&format=pjpg&auto=webp&s=753047caa85233d39aa7bc8fe69c08f9fdaabb9f Team Information https://preview.redd.it/jn62fb4ts3i51.jpg?width=1161&format=pjpg&auto=webp&s=e677a2e0d76d3c04d29aa98eaf7de1c1a73f58a1 Bruce Pon is the Founder of BigchainDB and Ocean Protocol, blockchain startups focused on bringing data and AI together since 2013. Previously, Bruce co-founded Avantalion, a consulting firm that helped to build 20 banks around the globe for companies such as Mercedes-Benz, Volkswagen, Mitsubishi & Jaguar LandRover. Trent McConaghy is a founder of Ocean Protocol. While still an undergraduate in the mid 1990s, he did AI research for national defense. His first startup, ADA, focused on AI for circuit design. Synopsys acquired ADA in 2004. He then did a PhD at KU Leuven on creative AI, which was awarded #1 thesis worldwide in the field. His second startup, Solido, used AI to help drive Moore’s Law. Now, Solido is broadly used for modern chip design, from Apple to Nvidia to Sony. Siemens acquired Solido in 2017. Building on early blockchain work in ascribe and BigchainDB, Trent’s focus is now Ocean Protocol. https://preview.redd.it/cdeazk9vs3i51.jpg?width=1198&format=pjpg&auto=webp&s=1560189dafa26ec2f139eb5b45ac834c9bd788ce Roadmap V2–2019 (or 2020) After the Commons Marketplace in Tethys, we will have case-specific Marketplaces with Ocean’s collaborators. Web 2.0 integration (for compute and storage services): we will finalize access and integration to AWS, Azure, etc. Improved Service Execution Agreements: staking conditions; slashing conditions; bounty rewards; competition rewards. These will provide a lot of value towards incentives. V3–2020 Verification and Validation of conditions and service provided via cryptographic proofs. Enables incentives via network rewards. Incentives / network rewards for different actors (including verifiers). Ocean Protocol will be able to reward with tokens against work done. Web 3.0 integration (for example: with other decentralized projects). This is the next logical step after Web 2.0 integration. At this point we might update the roadmap to include multi-chain technology integrations. V4–TBD Bounties on-chain (DASH style model). Implements a means for the system to not only self-sustain but actually improve over the decades, without guidance by a centralized actor. Clan governance (enable marketplace specific governance, group governance, etc.) for more modular governance models. V5 — TBD Fully permission-less Ocean Protocol. Limits opportunity for gate-keeping by node operators, while still maintaining POA performance levels. Balanced governance: transparent process for updating protocol that balances stakeholder needs (keepers, service providers, curators, validators). 2020 https://preview.redd.it/pv0j8drxs3i51.jpg?width=962&format=pjpg&auto=webp&s=419efb7633fe2504311ce3484e1e77fdde9a3594 https://preview.redd.it/xdgv7ypys3i51.jpg?width=1181&format=pjpg&auto=webp&s=a5c4ffadf0969696dc6f551dcb68d7ca7cac272c https://preview.redd.it/jpmvnypzs3i51.jpg?width=1153&format=pjpg&auto=webp&s=9c96a27d924eaf83f013184c192340c1d33b8563 https://preview.redd.it/02ie8411t3i51.jpg?width=1600&format=pjpg&auto=webp&s=a3760cf1589966d6e9744cfa12ef6b1c47e285dc Tokenomics The Ocean Tokens (Ocean) are used on the Ocean Protocol network as the means of value exchange, to power the protocol and incentivize the keeper nodes of the network. The Ocean Token is inseparable from the Ocean Protocol and Ocean Protocol network. Earn Ocean Tokens by providing data Data providers sitting on large sets of latent data can now publish data for sharing using a variety of pricing mechanisms, while maintaining full control over the data and complying with data privacy and compliance regulations. Earn Ocean Tokens for curating data Huge amounts of valuable public data sits unused on servers, always at risk of being removed when the funding dries up or when the political climate changes. Ocean Protocol network incentivizes the publication, curation and conservation of public data by expanding the market of buyers. Earn Ocean Tokens by being a marketplace Data marketplaces can connect to Ocean Protocol network to leverage their existing data and find new buyers. Meanwhile, developers, corporations, and governments with new ideas can build value-added services on top of the protocol or launch their own data marketplace. Earn Ocean Tokens for providing network services Network keepers provide validation and verification services for the network, store the blockchain history of transactions, and serve up relevant services to the community. Circulating Token Supply The circulating supply will be comprised of Ocean Tokens allotted to Acquirors, the Foundation, the founding teams and the network reward. Early Acquirors in the Seed and Pre-Launch, and the founding teams have lock-ups ranging from 1.5–5 years. In the initial phase, the vast majority of tokens emitted will come from pre-mined tokens for Acquirors, the Foundation and the founding teams. From Q3/2022, the increase in Ocean Token supply will come solely from the network reward. https://preview.redd.it/51am9ns6t3i51.jpg?width=1118&format=pjpg&auto=webp&s=5255db734e9586d2b9ed98045c3385c177acb861 Token Supply Inflation In the first year of the network, the token supply inflation will be 104% as token Acquirors, the Foundation and the founding teams receive allotments of Ocean Tokens. The following years 2020–2022 will have supply inflation ranging between 17–21% as the founding teams get their remaining allotments and the network reward kicks in. In 2021, there’s an increase of inflation due to the full network reward activating, to incentivise keepers, data providers and other services to flock to Ocean. The 100% network reward is activated only once the network is ported to a permissionless and fully decentralised sidechain, so the 2021 target date can shift, altering the network reward schedule. After the transition to a decentralised and permissionless chain, the network reward rapidly declines down to 6.8% in 2024 and 5.9% in 2025 when the network reward function becomes the sole source of inflation. By 2030, inflation will be 3.3%, 2040 will give 1.4%, 2050 will give 0.58% and from 2060 onwards 0.28% or less. https://preview.redd.it/58i9kdv8t3i51.jpg?width=841&format=pjpg&auto=webp&s=f939b4d01d14c4c720d4bb9306003903c8046678 Achievements 2019 March Raised further funds in a “network launch” token sale with CoinList, and in April an Initial Exchange Offering with Bittrex International (now Bittrex Global) May Co-chaired the Scaling AI for Good track at the UN “AI for Good Global Summit” in Geneva. Over 2,500 hand-selected participants from 120 countries gathered together for the 4-day conference. The track, which featured speakers from the European Union, IBM, and UNICEF, resulted in 19 identified problems (10 of which were extensively mapped) and 4 teams forming and committing to tackling these problem. https://preview.redd.it/27hfsf9bt3i51.jpg?width=744&format=pjpg&auto=webp&s=4c871656145ecbc5dbeeb817e9d540f86cf56186 July Throughout late summer and fall, we worked on a POC with a leading automotive company. We initiated deeper engagement with two more lead customers, towards production deployment targeting the first half of 2020. We’re at early stage discussions with many more. October Ocean participated in the OV Diffusion Hackathon in Berlin. There were 23 protocols represented. Of the 50 teams present, 7 built on Ocean Protocol, including an integration with Fetch.ai AI agents, and another combining Ocean with privacy-preserving multi-party compute (MPC). Token Transactions https://preview.redd.it/41pix5bdt3i51.jpg?width=963&format=pjpg&auto=webp&s=dd0a6257939d50974a805a50d1b7e83491b1ec7c https://preview.redd.it/24mpmdxet3i51.jpg?width=567&format=pjpg&auto=webp&s=f3291097d729d6b72d7cd6565e02ea466eccafa0 Full Article
2020.07.10 20:36 tengrrlCongratulations! CPTSC Research Grants Award Winners
Go Virginia Tech! Special Congrats to Sweta and Jennifer!!! ---------- Forwarded message --------- From: Joanna Schreiber[email protected]> Date: Fri, Jul 10, 2020 at 11:15 AM Subject: [CPTSC] Congratulations! CPTSC Research Grants Award Winners To: [email protected]>, [email protected]> Dear Colleagues, On behalf of the CPTSC Grants Committee, we are pleased to announce the following projects have been approved for funding. Please join us in congratulating these amazing scholars.
Project Title: “Service Learning in Technical and Professional Communication through Social Justice and Intercultural Frameworks: A Multisite Study”
Dr. Sweta Baniya, Virginia Tech Dr. Jessica Edwards, University of Delaware Dr. Jennifer Sano-Franchini, Virginia Tech Dr. Josephine Walwema, Oakland University
Project Title: “Institutional Partnerships: Best practices for building a multidisciplinary technical communication curriculum”
Dr. Alyson G. Eggleston, The Citadel – The Military College of South Carolina
Project Title: “A Field Wide Examination of Service Course Learning Outcomes and Assignments”
Dr. Lisa Melonçon, University of South Florida Dr. Tanya Zarlengo, University of South Florida
Project Title: “Understanding UX Teaching Practices in Technical and Professional Communication”
Dr. Heather Noel Turner, Santa Clara University Dr. Emma Rose
Thank you to everyone who submitted a proposal for consideration. It was a particularly competitive year, and we are excited about the future of programmatic research. Thank you especially to our review team:
Dr. Pam Estes Brewer Dr. Sara Doan Dr. Christopher McCracken Dr. Johanna Phelps Dr. Fernando Sánchez Thank you for joining us in congratulating these scholars and recognizing this important work. Let us know if you have questions, and please consider submitting proposals to our second CFP for 2020: Anti-racist Programs and Pedagogies. Thank you, Stacey Pigg, CTPSC Grants Committee Co-Chair Joanna Schreiber, CTPSC Grants Committee Co-Chair --Joanna Schreiber, Ph.D. Associate Professor of Professional and Technical CommunicationTreasurer, Council for Programs in Technical and Scientific Communication Dept. of Writing and Linguistics P.O. Box 8026Georgia Southern University 622 COBA DriveStatesboro, GA 30460 Newton Bldg. 2222-C Pronouns: she/hehers _______________________________________________ CPTSC mailing list [[email protected]](mailto:[email protected]) http://cptsc.org/mailman/listinfo/cptsc_cptsc.org via IFTTT
2020.07.05 19:57 inkspringWhy don't Chinese people hate their authoritarian government as much as we think they should? — Kaiser Kuo explains
I've been PMed by multiple people to repost this after my original SSC post was deleted, so here it is again: The following was originally written by the talented Kaiser Kuo as an answer to a question posed on Quora, but for the sake of easier readability, shareability, and the mobile users who don't want to create a Quora account, I've decided to repost it in text post form. I've also added the last part of the answer and postscript in the comments because of Reddit's character limit. Apologies in advance if that breaks any rules. Anyway. Why do many people feel that the Chinese can't possibly be basically okay with their government or society? I’m going to attempt an answer in three parts. First, I’ll look at the gap in political culture between China and the liberal western democracies, especially the United States. I’ll argue that there is little appreciation among most WEIRD individuals—that is, Western, Educated people from Industrialized, Rich, and Developed nations—for just how highly contingent political norms they take for granted really are from an historical perspective. I’ll sketch the outlines of the major historical currents that had to converge for these ideas to emerge in the late 18th century. Then, I’ll compare this very exceptional experience with that of China, which only embraced and began to harness those engines of western wealth and power—science, industrialization, state structures capable of total mobilization of manpower and capital—much later. And late to the game, China suffered for over a century the predations of imperial powers, most notably Japan. Hopefully, I’ll show why it was that liberalism never really took hold, why it was that Chinese intellectuals turned instead to authoritarian politics to address the urgent matters of the day, and why authoritarian habits of mind have lingered on. Next, I’ll argue that a lot of unexamined hubris lies not only behind the belief that all people living under authoritarian political systems should be willing to make monumental sacrifices to create liberal democratic states but also behind the belief that it can work at all, given the decidedly poor record of projects for liberal democratic transformation in recent years, whether American-led or otherwise. It’s important to see what the world of recent years looks like through Beijing’s windows, and to understand the extent to which Beijing’s interpretation of that view is shared by a wide swath of China’s citizenry. Finally, I’ll look at the role of media in shaping perspectives of China in the western liberal democracies and in other states. A very small number of individuals—reporters for major mainstream media outlets posted to China, plus their editors—wield a tremendous amount of influence over how China is perceived by ordinary Anglophone media consumers. It's important to know something about the optical properties of the lens through which most of us view China. Part I — The Values Gap: The Historical Contingency of Liberal Western Thought and Institutions One evening, I was chatting online with a friend here in China, another American expatriate living in another city, about the great disconnect in recent Western understandings of China—the thing that this question and answer seeks to get to the heart of. He suggested that at least for Americans (we’re going to use Americans here, mainly, to stand in for the Anglophone western liberal democracies) the question underlying the disconnect boiled down to this: “Why don’t you Chinese hate your government as much as we think you ought to?" The modern Chinese party-state, after all, is a notorious violator of human rights. It cut its own people down in the street in 1989. It prevents with brutal coercion the formation of rival political parties and suppresses dissent through censorship of the Internet and other media. It oppresses minority populations in Tibet and in Xinjiang, depriving them of religious freedoms and the right to national self-determination. It persecutes religious sects like the Falun Gong. It behaves in a bellicose manner with many of its neighbors, like the Philippines, Vietnam, and India. It saber-rattles over disputed islands with its longstanding East Asian adversary, Japan. It presses irredentist claims against Taiwan, which has functioned as an effectively sovereign state since 1949. It has pursued breakneck economic growth without sufficient heed to the devastation of the environment. It has not atoned for the crimes committed during the Cultural Revolution or the Great Leap Forward, when tens of millions died because of absurdly misguided economic policies. It jails rights activists, including a Nobel Peace Prize laureate. I could of course go on. Why then would any American not ask this question? Seems pretty obvious from the perspective of anyone from a liberal western democracy that this is a political system that needs to go, that has failed its people and failed to live up to basic, universal ideas about what rights a government needs to respect and protect. They’ll have heard the argument that China’s leadership has succeeded in other ways: it has allowed China to prosper economically, lifting hundreds of millions out of poverty, creating a substantial and comfortable middle class with expanded personal (if not political) freedom. And the Chinese Communist Party has managed to ensure a relatively long period of political stability, with orderly leadership transitions absent the political violence that had accompanied nearly all others until Deng Xiaoping’s ascent. "Yeah, but so what?" asks the American. "Anyone who would trade a little freedom for a little personal safety deserves neither freedom nor safety,” he asserts, quoting Benjamin Franklin. He quotes this as gospel truth, ignoring the irony that many Americans advocated just such a trade in the aftermath of September 11. That aside, why shouldn't he quote it? It’s deeply engrained in his political culture. Political liberty is held up practically above all else in the values pantheon of American political culture. The American myth of founding sees the Puritan pilgrims, seeking a place where their brand of Protestantism might be practiced freely, crossing the Atlantic in the Mayflower, creating en route a quasi-democratic quasi-constitution, the Mayflower Compact, landing at Plymouth Rock in 1620, and over the next 150 years growing into the colony that would lead its 12 sisters into rebellion for freedom from the "tyranny" of King George III. Americans hold the ideas enshrined in their founding documents very dearly, and can't really be blamed for doing so: they are, after all, some very high-minded and frankly very beautiful ideas. What he doesn’t quite appreciate is the precariousness of the historical perch on which these ideas—ideas he holds so strongly and believes so ardently to be universal truths—ultimately rest. Americans, like everyone else for that matter, tend not to take much time to understand the historical experiences of other peoples, and can't therefore grasp the utter contingency upon which their own marvelous system rests. I'm going to grossly oversimplify here, in this grand backward tour of European history, but the political philosophy that gave rise to modern American political ideals, as even a fairly casual student of history should know, emerged during the 18th century in the Enlightenment—an intellectual movement of tremendous consequence but one that would not have been possible save for the groundwork laid by 17th century naturalists who, taken together, gave us an "Age of Reason" (think Newton and all the natural philosophers of the Royal Academy). Their great work could be pursued because already the intellectual climate had changed in crucial ways—chiefly, that the stultifying effects of rigid, dogmatic theology had been pushed aside enough for the growth of scientific inquiry. That itself owes much to the Protestant Reformation, of course, which people tend to date from 1517 but which actually reaches back over a century earlier with John Wycliffe, Jan Hus, arguably Erasmus, and the other pre-Lutheran reformers. And would the Reformation have been possible without the rediscovery of classical learning that was the animating spirit of the Renaissance? Would the Renaissance have been possible without the late medieval thinkers, such as Abelard, who sought out to subject theology to the rigors of Aristotelian logic and reason? Would all this have been possible, if not for the continuous struggles between Emperor and Pope, between Guelph and Ghibelline factions—partisans for the temporal power of the Vatican and Holy Roman Emperor? The fact is that this series of historical movements, eventually carving out politics that was quite separate from—indeed, explicitly separate from—theocratic control, was only really happening in this small, jagged peninsula on the far western end of the great Eurasian landmass. And in the rest of the world—the whole rest of the world—none of this was happening. Political theology remained the rule with rare, rare exceptions. What we've now taken as the norm and the correct form for the whole world—liberal, secular, democratic, capitalistic—is truly exceptional, recent, rare, fragile, and quite contingent. Let’s turn and look for a moment at China, which is arguably much more typical. China is a civilization that didn’t until much later and perhaps still doesn't fit neatly into the modern conception of the nation-state; a massive continental agrarian empire, a civilization with an integrated cosmology, moral philosophy, and political philosophy which together formed the basis of a holistic orthodoxy, deep knowledge of which was required for any man (alas, only men) who wished to climb the only real available ladder of success: the Civil Service Exams. The China that the West—in this case, chiefly the British—encountered in the late 1700s was really at or just past its peak, ruled by a reasonably competent and conscientious Manchu emperor who history knows as Qianlong, ruling a land empire matching, roughly, the contours of the contemporary People’s Republic, almost entirely self-sufficient but willing to sell its silk, porcelain, and especially its tea to anyone who brought minted silver bullion—two-thirds of the world’s supply of which, by the time of the American Revolution, was already in Chinese coffers. What followed was a crisis that lasted, with no meaningful interruption, right up to 1949. Foreign invasion, large-scale drug addiction, massive internal civil wars (the Taiping Civil War of 1852-1863 killed some 20 million people), a disastrous anti-foreign uprising (the Boxers) stupidly supported by the Qing court with baleful consequence, and a belated effort at reform that only seems to have hastened dynastic collapse. The ostensible republic that followed the Qing was built on the flimsiest of foundations. The Republican experiment under the early Kuomintang was short-lived and, in no time, military strongmen took over—first, ex-dynastic generals like Yuan Shikai, then the militarists who scrambled for power after he died in 1916. China disintegrated into what were basically feuding warlord satrapies, waging war in different constellations of factional alliance. Meanwhile, China's impotence was laid bare at Versailles, where the great powers handed to Japan the colonial possessions of the defeated Germany, despite China having entered the Great War on the side of the Allies. During this time, liberalism appeared as a possible solution, an alternative answer to the question of how to rescue China from its dire plight. Liberalism was the avowed ideology of many of the intellectuals of the period of tremendous ferment known as the May Fourth Period, which takes its name from the student-led protests on that date in 1919, demonstrating against the warlord regime then in power which had failed to protect Chinese interests at Versailles at the end of World War I. (The May Fourth period is also referred to as the New Culture Movement, which stretched from roughly 1915 to 1925). The "New Youth" of this movement advocated all the liberal tenets—democracy, rule of law, universal suffrage, even gender equality. Taking to the streets on May Fourth, they waved banners extolling Mr. Sai (science) and Mr. De (democracy). But with only very few exceptions they really conceived of liberalism not as an end in itself but rather as a means to the decidedly nationalist ends of wealth and power. They believed that liberalism was part of the formula that had allowed the U.S. and Great Britain to become so mighty. It was embraced in a very instrumental fashion. And yet Chinese advocates of liberalism were guilty, too, of not appreciating that same contingency, that whole precarious historical edifice from which the liberalism of the Enlightenment had emerged. Did they think that it could take root in utterly alien soil? In any case, it most surely did not. It must be understood that liberalism and nationalism developed in China in lockstep, with one, in a sense, serving as means to the other. That is, liberalism was a means to serve national ends—the wealth and power of the country. And so when means and end came into conflict, as they inevitably did, the end won out. Nationalism trumped liberalism. Unity, sovereignty, and the means to preserve both were ultimately more important even to those who espoused republicanism and the franchise. China's betrayal at Versailles did not help the cause of liberalism in China. After all, it was the standard bearers of liberalism—the U.K., France, and the United States—that had negotiated secret treaties to give Shandong to the Japanese. Former liberals gravitated toward two main camps, both overtly Leninist in organization, both unapologetically authoritarian: the Nationalists and the Communists. By the mid-1920s, the overwhelming majority of Chinese intellectuals believed that an authoritarian solution was China's only recourse. Some looked to the Soviet Union, and to Bolshevism. Others looked to Italy, and later Germany, and to Fascism. Liberalism became almost irrelevant to the violent discourse on China's future. For anyone coming of age in that time, there are few fond memories. It was war, deprivation, foreign invasion, famine, a fragile and short-lived peace after August 1945, then more war. Violence did not let up after 1949—especially for the hundreds of thousands, perhaps millions, who were "class enemies" on the wrong side of an ideological divide; or for the hundreds of thousands of Chinese soldiers sent to fight and die in Korea so soon after unification. And even with peace, prosperity didn't come: 1955 saw Mao announce a "high tide of collectivization," which was followed by the tragic folly of the Great Leap Forward and ensuing famine, in which tens of millions perished. A friend of mine named Jeremiah Jenne who taught US college students at a program here in Beijing once said something to the effect of, “When Americans create their movie villains, when they populate their nightmares, they create Hitler and the SS again and again: Darth Vader and the Stormtroopers.” The fear of the liberty-loving American, he implied, is of a surfeit of authoritarianism. What of the Chinese? The Chinese nightmare is of chaos—of an absence of authority. And such episodes of history are fresh in the minds of many Chinese alive today—only a handful are old enough to actually remember the Warlord Period but plenty can remember the Cultural Revolution, when Mao bade his Red Guards to go forth and attack all the structures of authority, whether in the classroom, in the hospital, in the factory, or in the home. And so they humiliated, tortured, sometimes imprisoned and sometimes even murdered the teachers, the doctors, the managers, the fathers and mothers. In the 25 years since Deng inaugurated reforms in 1979, China has not experienced significant countrywide political violence. GDP growth has averaged close to 10 percent per annum. Almost any measure of human development has seen remarkable improvement. There are no food shortages and no significant energy shortages. Nearly 700 million Chinese now use the Internet. Over 500 million have smartphones. China has a high speed rail network that's the envy of even much of the developed world. China has, by some measures, even surpassed the U.S. as the world's largest economy. So try telling a Chinese person that anyone willing to trade a little personal liberty for a little personal safety deserves neither liberty nor safety, and they’ll look at you like you’re insane. Therein lies the values gap. Part II — The View through China’s Window: Liberal Hegemonism in US Foreign Policy In the first part, I laid out a case for why it’s quite natural, given the tendency of Americans (as with all people) to ignore or understate historical contingencies and recognize their own privileges and prejudices, for Americans to be puzzled by Chinese acquiescence toward—indeed, by their often quite vocal support for—a political system so execrable by certain American standards. The hubris of some Americans about their own political system seems to me especially natural, even forgivable, in the years following the collapse of the Soviet Union. From the vantage point of 1991, a kind of triumphalism was inevitable: the liberal west, with America at its vanguard, had just vanquished the second of the century’s great ideological enemies. First was Fascism and Naziism with the defeat of the Axis powers in 1945 (never mind that Bolshevik Russia, from the time Hitler invaded Russia, never faced less than two-thirds of German divisions in the field), then Bolshevism with the end of the Cold War. And what was on the minds of Americans—who had watched the Berlin Wall come down, Lech Walesa and Vaclav Havel assume the Polish and Czech presidencies, Yeltsin defend the Russian parliament and Gorbachev declare the Soviet Union’s end—what was on their minds as they turned thoughts to China? Tiananmen, of course, with its incredibly potent imagery: a million people in the Square, Tank Man, and the Goddess of Democracy. Looming ever present in nearly every conversation about American perception of China in the last quarter century—now in the background, now in the fore—is the bloody suppression of the 1989 student-led protests in Beijing. (Fun Fact: The first democratic elections in Poland were held on June 4, 1989, the very day of the crackdown on the Beijing protests). The years that followed the end of the Cold War would see gathering in American foreign policy a new ideology that would come to supplant the realist school that had dominated from the time of Richard Nixon. This is what the MIT political scientist Barry R. Posen calls Liberal Hegemonism: an activist, interventionist thread that believes in the pushing of liberal democratic politics and capitalism through all available means from “soft power,” to operations aimed at destabilizing authoritarian governments, to actual preemptive war (the Bush doctrine) and the “regime change” of the Neoconservatives. Some of its basic assumptions—not all, but some—are shared both by liberal interventionists and NeoCons. For American liberals, it was guilt from failure to act in the Rwandan Genocide, or to the “ethnic cleansing” that characterized the wars during the breakup of Yugoslavia, that gave impetus to this; for NeoCons, it was the unfinished business of Desert Storm. They found much common ground in their support for “color revolutions” in the former Soviet republics. They may have debated tactics but the impulse was to spread American values and institutions, whether or not doing so would serve a specific and definable American interest. That could be done the Gene Sharp way, or the Paul Wolfowitz way. Neither way was something Beijing wanted done to it. And I don’t think it takes a whole lot of empathy to see what things have looked like from Beijing over the last 25 years. Deng Xiaoping, while he was still alive, pursued a policy of “biding its time and hiding its power” as he focused on building China's domestic economy, avoiding any real confrontation and trying to rebuild relationships post-Tiananmen. But it wasn’t long before tensions sparked. In May of 1999, US smart bombs fell on the Chinese embassy in Belgrade, and virtually no Chinese believed the American explanation that it was a mistake, the result of an out-of-date map that showed the embassy as an arms depot. Later, in April of 2001, the collision of an American EP-3 spy plane with a Chinese fighter jet off of Hainan Island, off China’s southern coast, sent another chill through Sino-American relations. And things looked like they might have taken a turn for the worse, had not September 11 taken the pressure off. The “War on Terror,” which China could notionally join in, distracted the U.S., which quickly found itself fighting two long wars in Afghanistan and Iraq. Meanwhile, the Chinese economy was in high gear, chugging along at double-digit growth rates right up to the eve of the Financial Crisis. The Sino-American waters were probably never calmer than in the years between 2001 and 2008. Perhaps history will see 2008 as an important turning point in these attitudes: during the same year that China staged its first Olympic games, the financial crisis, which China weathered surprisingly well, walloped the West (and much of the rest of the world) with what was arguably its signal event, the bankruptcy filing by Lehman Brothers on September 15—happening just three weeks almost to the day after the closing ceremony of the Beijing summer games on August 24. It was China’s turn to feel a kind of triumphalism, which often took the form of an unattractive swagger. Meanwhile, a sense of declinism gnawed at the American psyche. After 2008, China became the object of global (read: American) attention again, fueled for some by anxieties over the rapidity of its rise, in others by anger over major flare-ups in western China: riots in Lhasa, Tibet’s capital, in March, 2008, and in Urumqi, Xinjiang’s capital, in July, 2009. Factory conditions became a growing concern as Americans realized that even the most sophisticated electronics they sported—everyone had an iPhone by then, right?—were manufactured in China. Remember, too, that excitement over the political potency of social media was also enjoying something of a heyday in this period of liberal hegemonic ascent. As one color revolution after another was live-tweeted (Moldova was perhaps the first, but not the only, of the street movements to be called “The Twitter Revolution”), as every movement had its own Facebook page and Youtube channel, China’s reaction was to censor. There is, after all, one belief about the Internet that the most hardline Chinese politburo member shares with the staunchest American NeoCon: that the Internet, unfettered, would represent an existential threat to the Communist Party’s hold on power. They have of course very different views as to whether that would be a good thing or a bad thing. But can we really be surprised that, able as they are to open to the op-ed section of any American broadsheet and find this idea that Internet freedom is the key to toppling authoritarian single-party rule, the Communist Party leadership would conclude that their approach to censorship is correct? But this of course has created another potent issue over which Americans, very naturally, express outrage—and puzzled frustration that Chinese aren’t (literally) up in arms over Internet censorship. Beijing obviously lamented the Soviet empire’s incredibly rapid implosion. It doubtlessly chafed at how NATO expanded its membership practically up to the Russian doorstep. It certainly hasn’t loved it that American troops are operating from Kyrgyzstan and Uzbekistan, and were present in great numbers in Afghanistan (which by the way borders China, if only at one end of the narrow Wakhan Corridor). Beijing has surely fretted as American-backed NGOs (the National Endowment for Democracy, or NED, is the big boogeyman for pro-Beijing types—perhaps as Confucius Institutes are the bête noire for their anti-Beijing American counterparts) conspired, or so they believe, with the instigators of color revolutions. And it certainly sees the Pivot to Asia—now rebranded the “Rebalancing”—as a species of containment. But what I suspect really has Beijing freaked out, what really seems to have confirmed that America still has its cherished liberal hegemonic ambition, was the Arab Spring. Is Beijing so wrong, looking out on the smoldering wreckage of Libya and Syria, at the mess that Egypt still remains, to want to avoid that outcome at whatever price? Or to think that America’s true, ultimate intention might be regime change in Beijing? Kissinger once famously said that even a paranoid can have enemies. What does all this foreign policy stuff have to do with Chinese attitudes toward their government? It’s fair to ask this; after all, the question I’m trying to answer isn’t specifically about the Chinese state and how it sees things, but rather the Chinese people, and the attachment they seem to have toward a state that comes up so short by American measure. It’s the rare person who can truly separate, at both an intellectual and an emotional level, criticism of his or her country from criticism of his or her country’s government—especially if that government is not, at present, terribly embattled and is delivering basic public goods in a reasonably competent manner. States tend to try to reinforce that conflation of people with state (and in China’s case, party). They encourage the basic state-as-family metaphor, something that in the Chinese case is part of the deep structure of Confucian political thinking and is therefore probably easier to nurture than to extirpate. I don’t doubt that propaganda has a role in this, but I would assert that its role is generally exaggerated in American thinking about China. In any case, if you’ll indulge some pop psychological speculation, I’ll go out on a limb and posit confidently that external criticism of a leadership will tend to, if anything, reinforce a citizenry’s identification with the state and blur the lines even more between “government” and “people.” Perhaps I’m wrong. But most people I know who are known to bitch occasionally about their own parents get awfully defensive when people outside the family offer unsolicited criticism. This seems especially to be the case with mothers. And so it is that many ordinary Chinese citizens, online and inevitably aware now of the timbre of China discourse in English-language media, tend to elide criticism of the state and Party with criticism of China, and take it personally. They feel a distinct sense of having been singled out for unfair criticism and will reach easily for handy explanations: Hegemonic America can't abide another serious power rising in the world, and just wants to sow discord and strife to keep China down; America needs to create a boogyman, an enemy to replace its fallen Cold War foe and placate its military-industrial complex. And in any case, America doesn't appreciate just how far we've come under the leadership of this party, however imperfect. People will debate what the Party’s real role has been in poverty alleviation: is it accurate to say that the Chinese government “lifted 300 million people from poverty” or is it more correct to say that they mostly got out of the way and allowed those people to climb out of it themselves? (I tend to like the latter phrasing). That’s not the only accomplishment in China’s 35+ years of reform that will be fought over. But the simple truth is that by many, many measures of human development, the great majority of Chinese people are undeniably better off today than they were before Deng inaugurated reform. The grand unofficial compromise, in a kind of updated Hobbesian social contract, that the Party made with the Chinese people—“You stay out of politics, we’ll create conditions in which you can prosper and enjoy many personal freedoms”—has been, on balance (and to date), a success. No thinking Chinese person of my acquaintance believes that the Party or its leadership is anything close to infallible. Most can be quite cynical about the Party, the venality of officials, the hidden factional struggles, the instinct for self-preservation. They’re fully appreciative of the Party and leadership's many shortcomings. They don’t shrink from criticizing it, either; they aren’t reflexively careful of what they say and who might be listening. But they don’t bandy words like “revolution” about casually. They tend to have a sober appreciation for what’s at stake, for the price that would have to be paid. They’re realistic enough to understand that the Party is not apt to tip its hat adieu and go gently to history's proverbial dustbin. They still believe, and not entirely without evidence, that the Party leadership is attuned to public opinion and will respond when the will of the people is made manifest. They support reform, not revolution. I’ve little doubt that desire for more formal political participation, for a renegotiation of terms in that unwritten contract, will grow stronger. That’s in the cards. You’ll get no argument from me that it’s been a raw deal for many people with very legitimate grievances. There are many who’ve broken with the Party-state, who openly or secretly dissent, whose relationship with it is entirely and irreversibly oppositional. Among these are many whose courage of conviction and towering intellects I deeply and unreservedly admire, and others who I think are mere gadflies or attention-seeking malcontents without a sense of what’s at stake. In the case of all of them, regardless of what I think of them personally, I regard it as a black mark on the Chinese leadership each time a dissident is locked up for ideology, speech, religious belief or what have you. But most Chinese people tend to be pragmatic and utilitarian; the state’s ability to deliver social goods gives it a kind of “performance legitimacy." The good (prosperity, material comfort, sovereign dignity) and the bad (a censored Internet, jailed dissidents, polluted rivers, smog) go on the scales. For now, it’s unambiguous in which direction those scales are tipping. Part III — The Anglophone Media Narrative on China and Sources of Bias If you're a denizen of the Anglophone world, your impressions of China are almost certainly formed primarily by the media that you consume. There are of course exceptions: some 100,000 Americans have, in the last five years, spent time working or studying in China; there are several thousand enrolled in East Asian Studies graduate programs, or taking serious upper-division undergraduate coursework on China, or pursuing an academic discipline that focuses on China; and there are probably a few thousand more who, for personal reasons, have taken more than a passing interest in China and have read a good number of books on contemporary China or on modern Chinese history, have undertaken the study of Chinese, or have otherwise immersed themselves in trying to gain a deeper understanding of China. Taken together, though, these people represent a small percentage of the general media-consuming audience—the college-educated American who, say, reads a paper once in a while, watches cable or network news with fair regularity, listens to NPR on her drive to work, and occasionally clicks on a China-related tweet or on a friend's Facebook page, or her counterpart elsewhere in the Anglophone world. All told, that's several tens of millions of people, I'm guessing, in the U.S., Canada, the U.K., Ireland, Australia, and New Zealand. It's worth reflecting on that, for this majority of news-consumers, impressions of China are almost entirely dependent on the reporting produced, at least regularly and in the main, by probably fewer than a hundred individuals. I'm talking about the reporters for the major newswires like Reuters, Bloomberg, Dow Jones, and AP, whose stories appear not only in the major papers and on news portals online, but also in smaller metropolitan and even local markets; the journalists who write for the major newspapers and news magazines; television news reporters; and the foreign desk editors, subeditors, and producers working with the reporters. There are also the news assistants, unsung heroes without whom many of the China-based reporters who haven't mastered enough Chinese to read local media or documents, or conduct interviews in the native tongue of their interviewees, would be unable to do their jobs. If we include them, the number perhaps doubles but it's still no more than 200, perhaps 250 individuals whose contributions to the gathering, reporting, writing, and editing of news and the creation of news-related commentary actually matters. What, though, do we really know about these people? If this is the lens through which so many Americans (once again, I'll remind folks that "American" here is really shorthand for Anglophone westerners) view China, it seems to me very sensible that we should wish to understand something about the optical properties of that lens. Does it distort? Of course it does; it could notbut distort, could notbut offer only a partial and selective view—this mere few score of reporters trying to present a picture of the world's most populous nation as it hurtles ahead with unprecedented force (in the f=ma sense). This is not an indictment. These are people who I very much respect—indeed, the very people who these days comprise most of my personal circle of friends—and they are people who have my sympathy for what they must often endure in reporting from China. It's not an easy place to report from, especially if you're reporting on things that the Chinese government, or someone at least, doesn't want reported—and what else, after all, really qualifies as news reporting? They are subjected to some pretty shabby treatment, everything from the talk-to-the-hand they'll get from government ministries, to veiled and not-so-veiled threats related to visa renewals, to roughing-up by local thugs or plainclothes cops or even uniformed ones, to surveillance and harassment. I think if there's a source of bias with which I'd start my list, it's this. Seems only natural that this kind of treatment of a journalist anywhere would beget less than rosy coverage of the institutions doling it out. Negative coverage begets more of that nasty treatment, and so on in a most un-virtuous circle. Should the journalists be faulted for focusing on the things that power, whether political or corporate, wants to hide? No, I don't think so. Rightly or wrongly—and I'm unambivalent in my personal belief that it's "rightly"— this is what gets the journo juices flowing. Journalism is not about the quotidian. The historian Will Durant once wrote in The Age of Faith, "We must remind ourselves again that the historian, like the journalist, is forever tempted to sacrifice the normal to the dramatic, and never quite conveys an adequate picture of any age." I would note that while the historian can write enormously lengthy monographs in which some of that normal can be restored and that picture made more adequate, the journalist just doesn't have that leisure, and his sacrifice of the normal is more forgivable. And yet it has an impact on perception; it's still a source of distortion, of bias. This failure to focus on the more "normal" is, I would assert, one of the major reasons for the disconnect at the heart of the original question: the prevalence among Americans of "Why don't you hate your government as much as I think you ought to?" One of the more regrettable outcomes of this particular bias in the way China is reported reflects in the (notional, educated, mainstream-media-consuming) American public's understanding of the Chinese intellectual. Reporters tend to focus not just on critical intellectuals but on the more outspokenly critical ones, on the full-blown dissidents, on the very vocal activists, on the writers who challenge the establishment on human rights issues, on freedom of speech, on rule of law, on religious policy, on minority nationality policy and so forth. Of course they focus on these people; they're "the dramatic," in Durant's phrase. They set out to excite so no wonder that many of them are exciting. They play to the American love of the underdog. They flatter American values. It's right, I believe, to focus on intellectuals. One could make a very serious argument that China's history is at some important levels driven by the dynamics of the relationship between intellectuals and state power, whether dynastic or Party. Dissidents and the more stridently critical intellectuals certainly are part of that dynamic. But I would submit that it's actually more important to understand another type of intellectual, and another mode of relations between the intellectuals and state power, between, if you will, the pen and the sword: the "loyal opposition," who during most times—including this time—comprise the real mainstream, and who see it as their role to remonstrate and to criticize but not to fully confront. It's these voices, a kind of "silent majority," to use an apt phrase whatever its connotations in the American polity, who go too often ignored in our reporting. Because "Noted Chinese scholar is basically okay with the government, though he thinks it could be improved in X, Y, and Z" is not a particularly grabby headline or a compelling read. There's also a kind of source bias that's related to this and it's regrettably caught in a bit of a feedback loop, too. The general impression is that Anglophone media is pro-dissident, and so dissidents will tend to go on record with or speak at greater length with Anglophone reporters; moderate or pro-Party intellectuals will tend to decline interviews and comment, and the impression that Anglophone media is biased in favor of the dissidents gets reinforced: the narrative that they want is buttressed while the other is marginalized or weakened. Another almost ineradicable bias in Anglophone media reporting, so prevalent that it's almost not worth pointing out, is bias in favor of democratic polities. Authoritarian states like China tend to get reported on unfavorably because they behave like authoritarian states. They don't allow, by definition, rival political parties to freely form. They don't allow a free press. They censor the Internet. And of course journalists in the Anglophone world are themselves on the front lines of these speech and press issues. It's almost tautological that the press of the free world would want to free the press of the world.
2020.07.01 19:54 stasbekmanBlueberry U-pick around Victoria
If you're into blueberry u-pick close to Victoria, this post is a compilation of the info for 2020, based on my last year's post. I'll be updating this page for the next 6 weeks or so - usually the season ends mid-August. If you know of other farms or have more up-to-date info and corrections, please add the info in your comments and I will add it to the main post. I know mostly of the farms in the Saanich area, but other close to Victoria areas are welcome too. Thank you. The main difference from last year is that you are not to bring your own containers due to COVID concerns. In BC, the blueberry varieties that are mainly grown for commercial production are Duke, Reka, Bluecrop, Brigitta, Liberty and Elliott. Some of them produce huge berries, some small. Some of them are sweet, while others are tart. some of them are very juice, while others are more on a dry side. Please make sure to check farmer's Facebook page before going, as sometimes they close for a day or two - and most of the time they let us know.
The estimated open dates are derived either from the FB posts of the farm owners or from direct communications with them.
http://stellerblueberries.com/ 6337 Oldfield Rd, Saanichton, BC V8M 1X8 (778) 426-0280 Mon-Sun 8-5pm $3.25/lb experience: not very friendly reception, decided to go to Stewart's Berry Patch again instead, which is next door, and who are super-friendly
New deaths by county: 93 F Jefferson, 95 F Jefferson, 87 F Jefferson, 45 F Jefferson, 90 F Fayette, 71 M Clay
We have been paying more and getting less for our healthcare over the past 4 years so today I have submitted a request to transition to a state-based exchange starting Jan 1, 2022. We did this back in 2013 with Kynect, over 500,000 Kentuckians were enrolled in coverage through it. It was one of the best exchanges in the country and through it we reduced our uninsured numbers at the highest rate in the country for several years. The previous administration discontinued Kynect requiring people to use the federal exchange.
Today I’m happy to announce Marta Miranda Stroud will be the new commissioner of DCBS. This is a large agency that works with things like: medicaid, SNAP, TANIF, and more.
On UI: As COVID-19 restrictions are easing we are able to provide in-person services for those experiencing issues with their claims. COVID-19 has not only caused unprecedented levels of unemployment but it’s also prevented face-to-face interactions that are often necessary to solve the issues with some claims. So during the past 2 day UI in-person services have been located near the capitol and have reached their capacity. Over those days it looks like we will have helped over 1,000 people directly. To continue helping Kentuckians with their claims we are going to provide in-person service here in Frankfort tomorrow June 18th, Thursday June 19th from 9am-6pm at the Cabinet for Health and Family Services located at 275 East Main Street in Frankfort.
Can I explain how reporting works and explain the discrepancies between local and state-level numbers? -- We did this a long time ago and I’m not sure if we still have the graph showing where we were getting all our testing info from. It’s getting better because it’s become more automated but we have over 40 labs that are doing some form of testing in KY.
It’s 4 o’clock, on a Wednesday. Let’s start the way we always start: We will get through this, we will get through this together. (Andy signs in ASL) Say it with me: We will get through this, we will get through this together.
COVID-19 has been tough, it has changed so many things about our lives and taken the lives of so many loved ones. It has also taught us critical lessons, that we are a compassionate people, we depend on each other, and we are tough. It has also shown issues with our current health care. Our lack of good healthcare made us more vulnerable to COVID-19. We have been paying more and getting less for our healthcare over the past 4 years so today I have submitted a request to transition to a state-based exchange starting Jan 1, 2022. We did this back in 2013 with Kynect, over 500,000 Kentuckians were enrolled in coverage through it. It was one of the best exchanges in the country and through it we reduced our uninsured numbers at the highest rate in the country for several years. The previous administration discontinued Kynect requiring people to use the federal exchange.
On the federal exchange a user fee is included in everyone's premium. You pay a 3% user fee to the federal government. Last year that was $9.8M dollars for Kentuckians. Other states are making this same change because each of them are seeing it will reduce the cost to Kentuckians if we go back to a state-based exchange. We can also improve efficiencies. So what are the costs of going back to a state-based exchange? A $5M one-time fee to restart and upgrade it. Then $1-2M at most per year vs $9.8M/yr. This saves Kentuckians, and we hope to save in the cost of their premiums, millions and millions of dollars. This will result in lower premiums and allow us to move people from medicaid to one of these plans, when they are able, without changing doctors and providing continuity for them. This is one of the incredible things we can do to help people. It also allows us greater flexibility where we can do things like extend the enrollment period and offer special enrollment periods. Finally, it offers us local control and I believe we can do this better than the federal government. We did just a few years ago. This letter has already been sent to the federal government and the opportunities for saving are significant.
As we come out of COVID we want to be better and to build better healthcare. We also want stronger families so we can live our values to protect and provide for our children. Our state is the number one state in child abuse. That is unacceptable. We have a foster care system that sometimes inflicts more trauma than it prevents on our kids. We must do better. Doing better requires good leadership. As you know I have not announced a DCBS (Department of Community Based Services) commissioner, that is because we were waiting on the right person. Well today, we get to announce the right person. I’ma let Secretary Friedlander up here to introduce someone I’ve known for a long time and I think will do an incredible job.
Secretary Friedlander takes over
Today I’m happy to announce Marta Miranda Stroud will be the new commissioner of DCBS. This is a large agency that works with things like: medicaid, SNAP, TANIF, and more. This is a critical group of folks, who I call, the Unsung Heroes of Kentucky. Marta brings a wealth of experience, over 40 years, and a tremendous knowledge of Kentucky. As well as the knowledge on how to address trauma from things like child abuse/neglect, ravages of opioids, as well secondary trama for staff. So today I am very, very happy to introduce to you all: Marta Miranda Stroud
Marta Miranda Stroud takes over
I am humbled, honored, and energized to be appointed by Governor Beshear and to serve Sec Friedlander. I have witnessed their bold leadership and commitment to the Commonwealth and could not be more proud today. This is worth coming out of retirement for. Thank you. The commissioner's role is a crucial position that oversees the welfare of Kentucky, children, and families. At this transformational moment this is a challenge that I am ready and willing to accept. The veil has lifted, and disparities and inequalities are more blatant than ever. We must address the systemic and institutional barriers that keep children, youth, adults, and families from thriving. I bring an unwavering commitment to the health and wellbeing for staff that are entrusted to help these people. They must have the resources, training and support they need to serve and empower our citizens of the Commonwealth. Poverty, oppression, mental health, addiction, hunger, abuse, neglect are all ravaging our state. We know better, so we must do better. Kentuckians are a proud people with a rich and long history of self-sufficiency and survival. Let’s join hands and build a strong safety net together. The work before us is structural and systemic. We may not have created the problems we see but it’s up to us to fix it. Proud to serve you, and proud to serve with you. Thank you
Governor Beshear takes over
Marta has taken on a tough job, but I know she is absolutely the right person for it. Having witnessed first hand the works she has done in the past, I couldn’t have more confidence. But...I want to give her some help. And you should want to give her some help, and that’s by filling out your census. The census will determine the money that DCBS gets to help children and families. That’s what our safety net is supposed to be there for, when we struggle, when you just need that little help, hand up, to where you can get back on track. The census is what provides those dollars for it. So I ask you to show the same compassion you have shown during COVID-19 to fill it out to help families at the time they need help the most.
The deadline has passed for absentee ballots. There was a record number requested. Make sure you fill them out and get them in. This is the bedrock for democracy and we need you to vote. For those voting in person, we’ve worked with the Secretary of State and board of elections to delay our primaries to this next Tuesday to make the process as safe as possible. We encourage everyone to vote absentee, but for those who didn’t we want to make this as safe as possible. We announced today we will be providing 5K masks, 4K gallons of hand sanitizer, 5,800 faceshields and 20K gloves. It will be distributed to all counties, because we want people to participate in elections and democracy. So if you are voting in person, please socially distance and wear a mask.
Testing locations: Fayette, Oldham, Jefferson, and Warren. There are still spots available. We need more people to get tested. We are having more tests coming in but more people need to sign up for these. And we gotta make sure we test 2% of our population per month.
Next week our testing locations will be Fayette, Jefferson, Shelby, and I believe we are in Warren for one more week. You can sign up online right now. Again, there are testing locations all over the state and there are no excuses now for not getting testing. We are working on plans for large groups of folks that might be going back to work soon to do some more widespread testing.
Positive cases today: 170. We wish this was even lower but if you look at AZ, they have about 1.5x our population but had over 2,000 new cases yesterday. We are doing a good job but it can come back very quickly. So again please wear a mask, some people are saying it can protect up to 80% against the virus.
Currently in ICU: 61 That’s really good news. These are reported by the hospitals. That ICU number is a pretty important number
Total recovered: 3,444
New deaths today: Yesterday was 7, Today 6
Total Death: 518
New deaths by county: 93 F Jefferson, 95 F Jefferson, 87 F Jefferson, 45 F Jefferson, 90 F Fayette, 71 M Clay
My heart goes out to Congressman Andy Barr for the loss of his wife last night. I’m thinking about them. We’re people, and we should be thinking of that before we think about Democrats and Republicans. His loss, and just like the loss of all the families of COVID-19 is devastating. Let’s be sure to continue to turn on those green lights and ring those bells everyday at 10am. It’s something that brought us together as a people and it’s something small we can do. If it helps lift someone up, it’s well-worth it.
A good news story of Maryland Newton from Louisville, after a 58 day stay at Baptist in Louisville she can say she has beat COVID-19. Although she is still on a ventilator to help her breath, doctors say she will be breathing on her own very soon. Maryland was asleep for 37 days during which she received plasma transfusions, and 5-day dose of Remdesivir. Her daughter was told she wouldn’t make it. I can’t imagine what that would be like. But Amber and her family have a renewed sense of faith from their experience. They are committed to helping her fully recover and to continue her fight against this virus. That’s a special message from her and an incredible story.
Racial breakdown of all cases: 73.23% Caucasian, 15.15% Black or African-American, 4.79% Asian, 6.19% Multiracial
Ethnicity breakdown of all cases: 83.17% non-Hispanic and 16.83% Hispanic
Racial breakdown of all deaths: 79.59% Caucasian, 16.91% Black or African-American, 1.65% Asian, 1.8% Multiracial
Ethnicity breakdown of all deaths: 95.91% non-Hispanic and 4.09% Hispanic
Long Term Care Facilities: 22 new residents and 15 new staff positive from yesterday, and 1 more death. 1,552 residents, 747 staff, 332 deaths
Unemployment update: No one in state government is going to be happy until everyone has received the benefits for which they qualify. As COVID-19 restrictions are easing we are able to provide in-person services for those experiencing issues with their claims. COVID-19 has not only caused unprecedented levels of unemployment but it’s also prevented face-to-face interactions that are often necessary to solve the issues with some claims. So during the past 2 day UI in-person services have been located near the capitol and have reached their capacity. Over those days it looks like we will have helped over 1,000 people directly. To continue helping Kentuckians with their claims we are going to provide in-person service here in Frankfort tomorrow June 18th, Thursday June 19th from 9am-6pm at the Cabinet for Health and Family Services located at 275 East Main Street in Frankfort. We are almost doubling the number of people we have to help with this. Signage in the parking lot will tell people where to go. We will also have priority lines for people who filed in March. I’m gonna make sure we help you out. And the other lines will be April, May and June. On Friday there will be a line for March and April and then a line for others. Our goal is to help as many as we can during this time period and we are working on getting more people out across the state to help people with their claims. Again, while more unemployment benefits have been provided than ever before, people are hurting, and I know it . Our inability to help people as quickly as we needed to is unacceptable. We are going to continue work and help people and continue to improve our processes including looking at outside vendors who are going to help us on a short-term basis. But going forward, we’re going to have to have a new system. The electronic system was so old that it was difficult to change, especially at the beginning when the laws changed. And I believe when we look back, not consistently updating that system… I know I have only been governor for 6 months but there were at least 3 months before COVID that we could have worked on it.. But it teaches us a lesson, that if your technology is not where it should be, if you have shorted in dollars and budgets… we know we’ve gotta do better. Shame on us if we don’t learn from what we have experienced.
- Kynect was a lot bigger than just a state-based exchange, it was an entire program and we expect to have more on that in the coming months. This is one piece of it and we have to give significant notice to the Federal Government. Now I like moving faster, but this gives us time to do it and do it right and save money. It’s a no-brainer if we can give people more options, it’s cheaper for the individuals, and a smooth transition off of medicaid. It may even include some of the same companies that can transition you. At least 1 of the MCO’s wants to participate. I’m committed to getting every Kentuckians signed up for some form of healthcare. This is just a start on how we are going to provide that.
Question on what caused the in-person UI help to be set up? -- We knew we were going to have folks that needed help that were at the Capital. With the ability to provide help to folks, that’s something we wanted to do. It’s not that it took a rally, it’s just that we’ve been slowly coming back to in-person services. Most offices for driver’s licences aren’t set up yet and our experience on that first day was really positive. With the amount of people we were able to help and get their claims resolved. I don’t think there is any question that having a face-to-face, which is hard during COVID, was something we couldn’t do. We couldn’t ask the person providing or needing help to do that for a while and certainly not before reopening, but the ability to get a claim finally and fully resolved, I think there is a great benefit to that in-person help and we have absolutely been hindered by not being able to be face-to-face
I recall at one point that either the governor or Dr. Stack talked about limiting how many times you should go out into public each day as a way to limit your exposure to the virus or lessen the viral load, is that advice still valid? -- Yes. Remember every time you go out in public there is a risk. So what we have to do is manage or mitigate that risk. If you go to work, then the gym, then dinner, and then after dinner you go to a bar for a drink, when they're open, you’ve just had a huge number of contacts. Throw in daycare and youth sports and it’s even bigger. So what you need to do is to reduce the number of contacts you would have had prior to COVID but at least 50%. If you work with a lot of people you might want to just come home. If you go to work with a small number of people maybe go out to dinner but not 4+ times a week. We just gotta make sure we reduce the number overall. If you go out to dinner a lot then maybe workout at home. Just manage all of those together because that will help us manage this crisis
Why aren’t these offices, like you have in Frankfort, open in other parts of Kentucky? -- If you remember there used to be large offices for unemployment all across the state and the last administration significantly consolidated and reduced those. And then COVID hit. And where are most of those offices? In career development centers that are not open. So the answer to that is, COVID. COVID has closed down significant government services that we are slowly reopening but where they have been housed have not been reopened yet. And so what you’re going to see is it being brought to other areas of the state but if we are able to help people, like the 500 we helped yesterday then we are going to do it and that’s why we did it again today. Yes we need a more comprehensive, better plan going forward and no people should have to drive to get it done. If they did drive but didn’t get helped they should be helped at the very latest early next week. We've committed to making that a priority.
Will people be back in the capitol education center on Thursday? -- They’re going to be at the CHFS office, it is 275 East Main St., Frankfort 9am-6pm. There will be more folks there ready to help and hopefully get things finalized
Has the pandemic slowed your announcement on the healthcare exchange? -- Yes. This pandemic has slowed down everything that I and everyone else want to do to move this state forward. It hit us hard. It had the possibility to overwhelm the hospital system like we saw in New York. Not taking significant actions would have resulted in significant additional death. It took all of our attention but something that could have killed, initial models showed upwards of 80K people, takes a lot of that attention. It took so many people chasing down PPE on a daily basis. It took us offering expanded medicaid, and thank God for expanded medicaid. If you compare us to many other states in the south where you see a much higher death rate, I believe the reason is expanded medicaid. If people ask the legitimate question: given that we are so high in heart disease, lung cancer, and diabetes, why isn’t our death rate that much higher? I believe it’s expanded Medicaid. We cover more of our people because of that. COVID has delayed and will continue to delay, because of what it’s doing to our budget, so many things that I wanted to accomplish as governor but it’s not about me, it’s things I think would be really good for our people. Our teachers, our school administrators need raises. Our schools need new text books. There are so many areas in this state where I think we can do so much better. I think we can come out better, stronger, but it’s delayed progress.
With UK saying students will be coming back this fall do you think football games will happen and do you think they will happen with fans? -- I believe with UK coming back, and others, I believe we will have college football in the fall, pending an outbreak. Whether there are fans and how many fans there can be will depend on a whole range of factors from how bad the virus is in multiple states to what the conferences decided to do to the plan that can be provided. What we are doing and what Ohio is doing on any large scale event, it requires a separate plan that is provided, that we work with, and then come to an agreement on it. So any large scale event has required that, the state fair being one good example.
Can I explain how reporting works and explain the discrepancies between local and state-level numbers? -- We did this a long time ago and I’m not sure if we still have the graph showing where we were getting all our testing info from. It’s getting better because it’s become more automated but we have over 40 labs that are doing some form of testing in KY. We send them the regulation on how they are supposed to report, but it doesn't mean they always do. And so we continually have to remind them they have to send, first, all their positives, and then also the number of negative tests as well. Sometimes the providers provide them to the local health departments instead and then we get that information from the local departments. Sometimes we get it from both, but the info is written differently and so it’s hard to see the duplicates. For hospital beds/ICUs, that’s data provided by the hospitals themselves. Now that’s good data since it’s them putting it in, but it’s only good enough as the person inputting that information and how often they are inputting that information. There is a lot of room for error here because there are a lot of users that are out there and they are all pouring their information in. Yes we have seen errors on the state level but also on the local level because they are dealing with this as well.
What is the status of the stay at home order in KY -- We have adjusted it with all of the Healthy at Work, so it’s an adjusted order. All of our executive orders since have either made exceptions to it or altered it.
Question on the rate of positive testing and if we are concerned. -- Our rate of positive test when we look across the country is pretty low compared to most others, which is a positive sign. I believe where we are is not on that two week decline that we had. We reopened, people had more contacts and we had more cases. I think it’s really important to be upfront about that and it’s not just due to having more testing. It’s because there are more contacts out there, and reopening the economy. I do believe we are back at the plateau we talked about before the two week decrease. Now if we stay within that plateau, this is a manageable virus because that plateau is well within the hospital beds, ICUs, and ventilators available. Even in AZ, they aren’t worried because of their overall positive tests which is huge, that’s cause for concern everywhere. They are worried because they are at 80+% of their hospital bed capacity and ventilators. So it’s really all those numbers together.
On the state healthcare exchange, what is the timeline for that to get set up and when do you expect it to be up and running? -- So we wanted to have it up and running at that 2022 date. It’s actually not that complicated as we think because, while we talk about the last administration tearing down Kynect, what really happened is they deactivated the code. It's still there. What we have to do is reactivate it and update it. Look at UI, if we don’t upgrade our databases and platforms you can see what will happen. That’s a one-time cost, about $5M, that’s half of what we pay the federal government every single year and it’s a one-time cost. We have a lot we want to do around healthcare, we believe this is one of the easier steps. Our goal is to be sure that we don’t have a benefind debacle ever in this administration when it comes to those signups. I want to make sure people can sign up for the exchange, sign up for medicaid, and get additional benefits too. Benefind is great for being able to go to one place for all of that but it’s gotta work.
Question about it being hard to get on the phone with UI and why haven’t more employees been raised to the tier 3 status needed to deal with these problem claims? -- Tier three status takes a lot of training and takes a federal background check, which takes time and the reason more people hadn’t been called is because we have a limited number of staff with almost a million claims. But our communication isn’t good. It doesn’t mean the people there aren’t working hard. But it’s not been where it should be. These are our citizens, these are my people. We should have done better, and I’ll take that blame, I don’t wanna put that on the Unemployment Office. But my hope is this, plus some other steps we are taking, can start getting real results. If we can just get caught up, we will still have a lot to do moving forward. But we’ve gotta get people caught up.
(Sounds like a question on how many people were helped at the Frankfort in-person UI service) - I don’t have an exact number which we can get. I think it was a couple hundred today. I think we got the word out before it got that much larger and all their information was gathered. So we didn’t just turn people away, they went through a drive-thru line once we got it organized with the ability to give all of their information. Our commitment is we have a priority of contacting them, built not just by someone calling them, but by a real adjudicator unless their claims have already been processed. Today we had a group in the Lt. Governor’s office processing those claims. Now they’ll get a call not from a tier three person, because their claim has been approved, but they will get a call from someone saying everything has been resolved. So our goal, we didn’t want someone to wait in line for 8 hours not to get help, that just seems worse. But it’s a priority, it’s gonna happen. If it doesn’t happen I will fix it, but they will get called.
-- There are different groups out there I know are helping other states. We are going to be communicating with them and seeing what their abilities are. If there is a way to bring in extra/outside help to get us caught up I’ll do it in a minute. All I want to do is help our folks and am willing to consider any option that gets them that help as quickly as possible.
How many people are working to process claims? -- Overall? I’ll need to get that for you. I know today we had just in that one center, 14. Tomorrow I think we’ll be closer to 30, but that’s not the overall number. And there are different types of claims. There are some claims that don’t require the highest level of adjudicators, so someone else can do those, and there are middle level claims, and a different group that can resolve those. And then the highest level is…this system is like speaking Greek. And it shouldn't be that difficult, but I always joke that they write so many things in Latin for law school so that you actually have to go to law school and everyone else can’t do it. It’s...even seeing a print out, if I said I want to know for these 60 people that somebody provided me, what the hold up is, I mean, you need someone to decipher what they send to you. So it’s really complicated and we’re stool limited by the federal government. And some folks need to know that everybody is not going to qualify...a whole lot more people qualify because of the changes we’ve made. That is another reason we are facing what we face. We expanded it faster than just about everybody. I wouldn’t take that back even though it’s caused some delays. COVID kept us from helping people face-to-face and an unprecedented number of claims...and we are where we are. I’m not sure anyone has faced all of that at the same time. My job isn’t to make excuses, it’s to get things done. We should have done better by now. We’re looking at every option to make sure we’re doing better going forward, and we’ll get you those numbers.
We will have a briefing tomorrow and then we will be off again until Monday. But folks, our ability to reopen, our ability to rebuild the economy, the ability to do things like open pools and have youth sports all depend on us following the rules as well as we can. I will admit it seems like some folks out there are tired of the rules. I get it, cabin fever is pretty strong too but we don’t want to fall backwards. AZ? They might have to pause their economy. Their governor is saying they are not, I don’t know him, but with what they are seeing… Can you imagine if we had to do that again? None of us want to do that. We are going to have to live with this virus until there is a vaccine, I hope it’s soon, but that takes us changing the way we do things and that’s what this life has thrown at all of us. None of us expected it, I thought I knew a lot of what doing the job of governor was until a one in every hundred year pandemic came our way. We need everyone to be willing to continue to do things differently, to cut down on those contacts, it helps us take care of our fellow human beings. I’m really excited about the announcement of Marta Miranda. I think that we are going to do a great job, especially helping our children and families in need. I’m excited about the steps we are taking in healthcare and this isn’t political. It doesn’t matter what president did what and where if it helps us cover more people it’s a good thing. We wouldn’t have talked about unemployment in political terms before all of this. Remember? When there was critique and it ended up becoming a partisan thing about too many people being able to sign up for unemployment? This has shown if you tear all of it back, get rid of all the BS, we are people and at our most critical times we need to make sure that we as government can provide the help that’s needed. So let’s try to move forward and be there for each other. Let’s try to remember that the divisiveness, even though there is an election this November, only sets us back. Let’s continue to do the right things as Team Kentucky. Thank y'all very much.
2020.06.09 02:30 dmartin-amesJune 9, 2020 Ames City Council topics
Hi ames, As you read the agenda preview below, you might ask: where's the Council's response to the grotesque and infuriating killings of George Floyd, Breonna Taylor, and Ahmaud Arbery and the local and national protests and reform movements? Of course, the Mayor, Council members, and City staff have all been following the news and forming opinions on their own. Mayor Haila released a statement on May 30 condemning the reckless disregard for life and reminding us of shared ideals. Yet this will be our first Council meeting since the recent protests began on May 26. Since Council doesn't deliberate together outside of legally announced meetings, we'll literally just be getting started with this conversation in terms of Ames policies. In situations like this, a typical first action might be to vote on adding the topic to a future Council agenda for conversation. You read that right—for Council-initiated topics, before talking about something substantial, we usually vote on whether to talk about it... at a future meeting. Fortunately, rather than leaving it to Council's typical two-weeks-between-every-step-of-conversation schedule, the Ames NAACP Branch,Mayor, and Cityhave taken action on their own and have arranged a series of four town hall meetings under the heading Taking the Lead 2020. The first meeting is this week, Thursday June 11 at 6pm on Zoom on the topic of Policing and Justice, featuring questions for panelists ISUVP for Diversity and Inclusion Dr. Reginald Stewart, Ames Police Chief CharlesCychosz, andISU Police Chief Michael Newton. Topics are to include policies, processes, accountability, and communication practices within our local police departments. Click here for instructions on accessing this Thursday meeting. (Also, if you haven't accessed a Zoom meeting before, you might want to read the general instructions on how to access City Zoom meetings—including how to call in with a plain old telephone or just watch online.) I'm very grateful to the NAACP and the Mayor and City for taking the initiative to arrange these town hall meetings. In my opinion, the fact that they're being arranged collaboratively expands their reach into the community well beyond what Council agendas or workshops alone would be able to accomplish. And listening to the community is a great first step for us. I hope you will attend. On to the regular agenda. The Ames City Council meets on Tuesday at 6:00 p.m. on Zoom. The agenda includes:
1. Proclamation proclaiming June 19, 2020, as “JUNETEENTH” in the City of Ames. Juneteenth commemorates June 19, 1865, when the Emancipation Proclamation was read to enslaved African-Americans in Texas. Celebrations of this event date back to 1866.
14. Economic Development Administration Grant Application pertaining to the Prairie View Industrial Center Utility Extension Project (East Industrial Area utilities). When we last discussed this on April 28, the East Industrial Area (Prairie View Industrial Center) water and sewer infrastructure work was being bid at $2.5 million over our estimates (with the total project being bid at $7.1 million). If we moved ahead, this would cause a commensurate increase in our sewer and water utility rates. So, we agreed to redesign the project to reduce costs, even though we understood that this was unlikely to close the financial gap. Yet now, it appears that we have a chance at an Economic Development Administration grant in the amount of $3.5 million. In this agenda item, Council is being asked to authorize application for the grant.
29. Minor Amendment to the Land Use Policy Plan Future Land Use Map at 802 Delaware Avenue. In March, Council voted to initiate a change to our current Land Use Policy Plan map to make it possible to build townhomes on this 3/4-acre lot, in the spirit of encouraging densification of infill. However, staff recommended—and the Planning and Zoning Commission has now voted—to recommend denying the request based on our existing plan's goals and objectives, which are still in force even as we continue our planned process to update the plan. Council must now decide what to do with this advice.
32. Hearing on Second Substantial Amendment to CDBG 2019/20 Annual Action Plan. The U.S. Department of Housing and Urban Development notified the City of Ames that it will receive a special allocation of Community Development Block Grant (CDBG) funds in the amount of $354,515 to be used to prevent, prepare for, and respond to the coronavirus. In May, Council asked staff to draft an amendment to our CDBG plan to designate these funds for relief in rent, mortgage payments, and/or utilities to those who are impacted by COVID-19. Tonight, Council will hold a public hearing and vote whether to adopt the amendment or not. If we do adopt the amendment, the City will formulate more precise parameters and rules for participation in this program.
Non-Agenda Packet: The following items are requests and communications to the council that are not on the agenda for full discussion. This includes staff reports and communications or requests from constituents and developers. Typically the council will ask city staff for more information (a memo), put the item on a future agenda for deliberation and possible action, or just accept the communication, taking no further action. Council generally processes these requests and communications during the agenda portion called "Disposition of Communications to Council."
Ames Main Street Farmers' Market. This letter is a request for Council to permit food trucks and drink vendors to operate during the Ames Main Street Farmers' Market.
AUFP Change - 2538 E. 190th. An applicant has requested a change to the Ames Urban Fringe Plan map in order to accommodate their business. This memo from staff explains what Council could do in response.
2020.06.06 11:26 acronis95Script is doing something weird and I don't understand why
Hey I'm just creating my own script that auto-downloads my podcasts for me. But I'm having issues with the megaphone ones. I can run python in PS individually it's fine but as a script it doesn't seem to download the xml file. anyway below is the script and files:
import re import os import requests f=open(".Podcasts.txt","r") for x in f: s=requests.get(x) print(x) open('rsstemp.txt','wb').write(s.content) mp3='' name='' searchterm=re.compile("\n.*?(.*)", re.MULTILINE) one=(re.search(searchterm,open("rsstemp.txt").read())) if one: name=one.group(1) print(name) searchterm=re.compile(".*?
file with .mp3 Traceback (most recent call last): File "1.py", line 25, in doc=requests.get(mp3) File "C:\Python27\lib\site-packages\requests\api.py", line 76, in get return request('get', url, params=params, **kwargs) File "C:\Python27\lib\site-packages\requests\api.py", line 61, in request return session.request(method=method, url=url, **kwargs) File "C:\Python27\lib\site-packages\requests\sessions.py", line 516, in request prep = self.prepare_request(req) File "C:\Python27\lib\site-packages\requests\sessions.py", line 459, in prepare_request hooks=merge_hooks(request.hooks, self.hooks), File "C:\Python27\lib\site-packages\requests\models.py", line 314, in prepare self.prepare_url(url, params) File "C:\Python27\lib\site-packages\requests\models.py", line 388, in prepare_url raise MissingSchema(error) requests.exceptions.MissingSchema: Invalid URL '': No schema supplied. Perhaps you meant http://?
2020.05.14 17:34 petersobolevFrom four to thirty two. Early years of computers and networks in Russia. Part II
Part II: From sixteen to thirty two (for part I see previous post) Still no networks The very peak of "Perestroyka" (1990-1991) coincided with the end of my epoch of using 8-bit computers. That was the time the very first IBM PCs were imported into the country, but no one understood why. Luckily for me, I had a friend that started a joint venture with a USA company. He received a PC AT 286 20MHz 1Mb computer with CGA monitor and Star 9-pin dot matrix printer directly from the USA. My friend had no experience or knowledge to operate this computer and this was an expected situation for early PC adopters back then. The computer itself was in very advanced configuration – PC AT 286 20MHz at the time when even PC XT was still considered as a very good option. The weakest part of that computer was the CGA video adapter – it could only do 4 horrible colors at a very low resolution of 320x200 which was very limiting. Anyway, exploring MS DOS operating system was interesting and entertaining enough on its own. Soon after I failed twice entry exams to the Leningrad Polytechnical University (it was for good because I would have been flunked anyway) I started working as a laboratory technician in the department of Computer Science of Leningrad Institute of Fine Mechanics and Optics (IFMO). At those times IFMO still didn't have its current status - there almost weren't any computers, except for the huge PDP-11 clone "SM-4", some Iskra-226 and a very few PCs. My workplace was on the third floor where we had five MERA SM 7209 terminals. Our in-house computer gurus enhanced them to the level of more or less self-sufficient computers with z80 CPU, 128 K RAM and Bulgarian-made floppy disk drives. The students were rarely seen to be using those for anything but typing in some machine codes and using a primitive debuggemonitor. Such computers were not very reliable because of memory refresh issues. The probability of losing the entire program that took half an hour to type in was high. Students were trying to identify and share the most reliable memory ranges specific to a particular computer. The computer laboratory technician position required me to solder back the failing equipment cables and prevent taking any further damage to the computers from students, especially when there was no university staff around. I spent my available time with an "Iskra 1030" computer. It was not a very successful clone of PC XT 4.7 Mhz with 512 kb of RAM and CGA video adapter. The next room was home to "Iskra 226" – a massive steel box similar to the Wang-2200 computer with BASIC interpreter. Strangely enough, your hand would get cold whilst working with this computer as there were not one but three powerful fans blowing directly at the keyboard. My experience with those computers was driven by curiosity rather than a practical purpose. There was another lab technician in our department. He was responsible for the equipment in the room at the same floor but at the farthest side of the university building, we called that side "old block". Also, he was playing music in a heavy metal rock band which and the only time we had a chance to chat was monthly refuse disposal activities. The other days he could lock himself in the room to make himself busy with something very peculiar – those activities would force him to run across into the toilet "to hide from the crocodiles that were following him". Meanwhile, I had full access to Iskra-1030 and Pravets-16. Pravets-16 arrived a bit later and was a clone of PC XT 4.7 Mhz with 640 kb of RAM and CGA video adapter. It was a better implementation than Iskra. Both of the computers were supplied with 10 or 20 megabytes HDDs with DOS v3.30. Most popular software existed only for DOS. Latest version of Windows was 2.0, it was awful and ran from the DOS too. It was impossible to imagine that Windows would become popular in just a few years. DOS was an inevitable choice for the PCs of those years, and it had positive and negative aspects. Firstly, the pure DOS appeared as a very inconvenient way to start programs and manage files for a regular user. On the other hand, there were more and more various utilities helping to deal with those routine operations. There was Norton Commander file manager and its blue two-sided panels were the icons of that epoch, especially in Russia. The single-task nature of DOS was addressed in DesqView, that allowed switching between a number of running applications even using XT computer. The variety of small "resident" programs provided instant access to the calculator, notebook and similar functionality. All in all, it was possible to create and adjust the comfortable working environment. The viruses of that time were easy to detect and eliminate with popular antivirus software like Aidstest. The diversity and the speed of virus programs distribution was pretty easy to control, assuming the only way they could spread were the floppy disks. I knew that computer networks existed in some research institutes and specialized establishments, but my knowledge was solely of theoretical nature. I saw a modem in the flesh just a couple of times. Even so, the overall situation with software supply was generally better than Commodore 64. More people purchased PCs and there were plenty of ways to exchange software. Computer piracy was not a big thing back then. No one would even bother tracking pirates down as there was no general understanding why copying some programs could be a bad idea. Of course, in reality we understood everything thanks to all of those sub-culture connections and scenes. Radioelectronics Lyceum SPTU-38 was one of the biggest and most popular software exchange locations in St.Petersburg. Because of its cult status it really deserves to have a commemorative panel on the building itself. This SPTU had a large computer classroom with a couple dozens of Yamaha MSX-II. Those computers were not so popular already, mostly because of several PCs on the other side of the classroom. The PCs were of quite decent type – mostly 286s or even 386s. They were always occupied by people coding in Turbo C, Watcom C (just C, no pluses) or even in Prologue computer language. There was a metal box full of 5.25" and 3.5" floppy disks next to the one of the PCs. It was the equivalent of a modern data-center of considerable capacity. There was a procedure of working with this archive. We would approach and do a polite and quiet greeting. The person using the computer would ask "what you've got?" in the most incautious manner. We were hesitant to present our floppy disks which were quickly taken and put into a disk drive. The person would check the contents of those disks with no visible interest. We were really proud if any of our files or archives would be copied from our disks. When this ritual was complete, the person would usually allow us to use the computer and the box of floppy disks saying something like "just grab what you need". The box was nicely organized, and the disks had labels with contents description. Still, it took some time to get around that collection. Some of the programs, like compilers with all its libraries, would take up to 10 different disks and the copying process wasn't quick in general. Even so, each visit would enrich us with such a number of programs and tools that it would take weeks to get through all of them. The copied programs were valuable assets for further software exchange in other locations. A friend of mine had his own Tandy-1000. It was an IBM PCjr clone – similar to PC XT, but with 320x200x16 video mode and enhanced audio capabilities, well, compared to a regular PC beeper. The biggest issue came in a form of monochrome display capabilities in shades of black and green. It wasn't a big problem for 16-color requiring games, they would start and work perfectly. That was a time when Sierra made quests were really popular: Space Quest, Hero Quest, and Larry. Meanwhile in IFMO I got PC AT 286 with EGA and Amstrad PC1640 (similar to PC XT with EGA Mono) as a replacement of Pravets. By that time I was skilled in x86 Assembler and Turbo Pascal programming as well as in PC hardware. However, in neglecting my responsibilities and work attitude I matched my above mentioned colleague from the old block. The only difference was that damage caused by taken substances was in a different league compared to the damages done to me by computers. This quality of our work was best characterized by the fact that after we left those positions a year later, there was no need in this position altogether. As far as I heard – there were no objections. I tried to enter IFMO the next year, but my score was below the acceptance threshold for the Computer Science department. Instead, I got myself into a brand new Mechatronics department (Mechanics + Electronics, literally) in 1991. We had applied mathematics practical studies using SM-4 every month. I remember having no good feelings about that noisy wonder with scattered flashing lights separated by a glass wall. We had to use terminals to write a simple Fortran program implementing a mathematical model. The compilation process would require closing source code editor TED and running two other programs which usually took minutes. Everything was so slow in general, SM-4 resources were inadequate to work with a dozen of terminals, on top of that the system crashes required to start over with the source code from time to time. A single class was enough to understand that I am not willing to come back there again. Still, I had to persuade my teacher that I've got the Fortran language knowledge and experience. I started to search for the way to get out of this situation by getting through a Fortran book. It wasn't a reading as such, just browsing. There was an idea to write a Turbo Pascal program that performed all required calculations and to print the listing of that program with all Pascal keywords replaced with Fortran ones. This is what I tried to bring to my teacher. Unsurprisingly, he was very confused and surprised. It was clear and obvious that such a Fortran program would not work at all, even if it was written using a PC computer. The most discouraging was to see the working program printing the correct results. The deception was of the highest quality and my Fortran teacher, apparently, wasn't all that confident in his Fortran knowledge. To make things even trickier I told him a story about a new dialect of Arity Fortran which I made up of recently released Arity Prolog. This little fraud ended well and everything was accepted. The situation with computer availability continued to improve. First of all, I obtained my first PC-compatible home computer – SM-1810.13 "Nivka". It was a PC XT 4.7Mhz 640 kb RAM CGA video adapter computer assembled with soviet components in a massive "full tower" computer case. Video card and the processor were original components but the system bus was not standard and could not accept extension cards. It had a sound of a jet plane taking off all thanks to not one but four powerful mains voltage operated fans. It did not take me long to increase the CPU clock speed to 10MHz. The only known side-effect was a disk drive controller chip ejecting himself from PCB which I fixed with teeing it down with some threads. Not long after that I got a PC AT 286 with EGA and consecutively VGA video cards. The computer upgrade process by boards and adapters replacement was quite popular. Those days I spent a lot of time after the classes or even instead of my classes in the Computer Science department at IFMO. There were two IBM PS/2 Model 30 (PC 286 with MCGA video adapter and microchannel bus), few PC AT 286, and the fastest computer I saw at that time – PC AT 386SX running at 16Mhz with VGA adapter. I remember the attempts to install the OS/2 operating system on that machine. OS/2 version 1.0 was still a joint development effort of Microsoft and IBM. It was around 1992 when I discovered FidoNet... FidoNet and BBS I had an unused modem for quite a while. It was in this "unused" state mainly down to two reasons. First of all, I had no one to connect to. On top of that it was an acoustic modem. This type of modem would require a phone handset to be connected to the modem using rubber sealed speaker and microphone outlets of the modem itself. The connection was established by using controls and buttons of the host phone itself. I will reveal no secret by saying I have never managed to connect to anyone using this modem. The first modem that had a practical meaning was 1200 baud modem without MNP error correction protocol support. It was a full-size ISA board that required an active fan cooling for a reliable operation. FidoNet was nothing like contemporary Internet. There are massive technological and organizational differences. Since the very start it was volunteer-driven network of "nodes" connected with each other in different towns and even countries. So-called "SysOps" (short for System Operator) had arrangements on data transfer, text electronic mail exchange, user base management, and resolving conflicts. There was no membership cost and large nodes could be deployed in large companies that would actually foot the phone calls bill. Sometimes, it would include international calls as well. Any attempts to commercialize the FidoNet were terminated apart from some designated echo-conferences to buy and sell some hardware. Echo-conference (or "echo" for short) was a main thing in FidoNet. I would describe it as a collection of global-size topic-driven forums. In contrast to the Internet, such forums could not have a dedicated owner, but rather had its own life within a network. Moderators were usually assigned by forum creators and managed the behaviour of participants and checked the content. To coordinate mail and echomail transfer as well as to warn or even excommunicate people who broke the rules there were network and regional coordinators and echo coordinators. Technologically wise a typical FidoNet station was a computer connected to a phone line via modem and specialist software. It was a requirement to accept the other nodes' inbound connections at least for an hour within a day to do electronic mail exchange. More often, such stations used to be available during the night time when no people used the phone line; while the stations deployed in large companies could operate 24/7. FidoNet used to have hundreds of active nodes and countless number of "points" at its height in the USSR. "Points" were managed by nodes through which they had access to electronic mail. That situation with the scale and efficiency of management was unique – such success was never seen in Europe or the USA. FidoNet was different from the Internet for being not only the data transfer network but for being a society of people brought together by some basic democratic values allowing this network to exist. The mechanisms of those values' implementation were of a very pragmatic nature. Everything was designed to have a robust and reliable electronic mail exchange and to make sure that echo-conferences work as they should. All the proposed document alterations and changes were widely discussed and voted by Sysops. The same approach was used to elect system coordinators. You needed nothing else but a computer with modem and configured software to get connected to FidoNet. Some of the FidoNet users improvised with electronic mail exchange using floppy disks – this rare sight was nicknamed "floppynet". The minimum level of computer knowledge required to set up computers and software was the most powerful filter to leave all of those occasional and random people outside the network. Most of the FidoNet users were in IT anyway, although there were non-technical background enthusiasts that wanted to discover this network and society. This type of semi-open society allowed to build a certain trust within users of FidoNet. At the same time there was a version of an offline Internet called Relcom similar to the name of the largest provider. It was quite popular in companies and had newsgroups similar to echo-conferences. Those newsgroups were managed not in the best way and it was reflected in the quality of content too. It could be the lack of this natural filter as for FidoNet or absence of organized structure of echo-coordinators. It was a paid relationship between companies and providers which resulted in a mixture of spam and offtopic that no one could really stop. FidoNet users debated a lot about allowing the data exchange between certain FidoNet gateway nodes and such newsgroups. FidoNet participation had a footprint in real life too. For example, it could be considered as a positive employment reference if an applicant was a FidoNet user. Also, the rumor had it - if the share of FidoNet users in one given company would exceed a certain number - the company is doomed and will eventually collapse. On top of that it was common to mention that you are a FidoNet user to get a discount or additional services in computer hardware shops. FidoNet coordinators were often well-known people in the real world. I remember the COMTEK exhibitions in Moscow in the late 90s. Those events were among other things informal meetings events for SysOps from Russia and ex-USSR states. They were gathering there in impressive numbers - just imagine a few thousands for people in a single square. One day, a car with someone important inside tried to use the shortcut across that square instead of going all the way around it. The car was moving slowly through the crowd while beeping and flashing lights. It managed to get to the middle of the square where was our regional FidoNet coordinator. I was talking to him that very moment when the car appeared high behind him. He glanced at my face looking behind him and instead of moving away he just waited and when the car literally touched him - he sat on a bonnet. The bodyguards jumped out of the car and took a menacing stance. It wasn't a smartest move as the other people got closer and decided to take part in this confrontation. The bodyguards were smart enough to see the size of the crowd around and finally they retreated in the car which moved back. Bulletin Board System - or BBS for short coexisted with FidoNet those years. Those systems were hosted on the same computers as FidoNet stations and people often mixed those two in this country. BBS was different from FidoNet. While FidoNet station was a system to exchange electronic mail, the BBS allowed online access to the computer itself - contemporary telnet is the nearest thing. Anyone could call the phone number of BBS and start downloading files, read mail, or talk to sysop after logging in. The users were valued and ranked by sysops which would give them different connection time allowances and download limits. The user value would depend on the amount and quality of shared software or how well the administrator knows the user himself. The phone line impose a connection limit of a single user at a time, while the rest of the users would be dialing in repeatedly trying to connect. Finally, the active user would hit the time limit or the line would be dropped by the modem. The connection was established by a terminal program. This program would control modem via serial port by sending commands like dial the phone number: 'ATPD123' or change the connection speed or protocol. It was common to keep the modem speaker turned on to control the connection status or to hear if another person picked up the phone. The modem would generate a noise-like connection sequence to synchronize connection parameters with the remote modem, people would even recognize connection parameters listening to those sounds. Sound would be turned off on successful connection and the user would see a connection confirmation in the terminal - something like 'CONNECT 2400/MNP'. My home phone line was occupied by SkyNet Station BBS for a long time. It was really unusual and very interesting to talk to all those unknown callers from other towns and even countries. Some of them used "Iskra-2" (alternative industry-sponsored communication lines). Because FidoNet/BBS stations' working time was from midnight to early morning, I often crashed out in some vulnerable moments during my classes in university. During the first and second course such an attitude to the study wasn't appropriate, but I was lucky. Foreign BBS were one of the main sources to get new software, quite usually it was pirate software or warez. Those days the international calls were expensive, and people tried to use a company phone line to make them. Often, the company would not even know about such practices. Because of calls costs there were a variety of attempts to fool the system and make free calls. Unfortunately, the 'bluebox' tricks known in the West did not work with local phone stations. By the time one creative person managed to adopt this approach to make it work in Russia. Sadly, by then BBS became obsolete. The phone lines of that period left much to be deserved to say the least. At first typical modems would rarely hit the speed of 2400bps - most of the time the practical transfer speed would be much lower. There was rumor that the theoretical limit was 9600bps. It is fair to say - at the same time were people claiming 33 MHz to be the highest achievable frequency for CPUs. Of course, all of those numbers were about to change. The new generation of more sophisticated modems arrived which could adapt better for phone lines of bad quality. Some of those modems could efficiently use the phone lines not very suitable for regular voice calls. Telebit modems were implementing PEP and TurboPEP protocols that could get to 23000 bps. Those were rare but very noise tolerant. Zyxel (ZYX 19200bps) and US Robotics (HST 16800bps) modems were widespread. They supported the standard v32 (9600bps) and v32bis (14400bps) as well as their own higher speed protocols requiring compatible modems on both sides. The choice of Zyxel or US Robotics had a very religious taste to SysOps. There was a curious story associated with HST protocol... Initially, it was only supported in higher grade US Robotics Courier modems, and the cheaper model USR Sportster was released without HST support. A basic reverse engineering revealed that schematics of both modems are almost identical but firmware alterations wasn't enough to upgrade Sportster to Courier capabilities. There was rivalry and some kind of a competition between two people in St.Petersburg was started. The intensity of this competition was much like a war sometimes. I remember bringing my Sportster to one of those gurus. I was told to wait for a couple hours for him to perform the required updates which would involve nothing less than particle matter accelerators in one of the research institutes. Of course it wasn't true and everything was much more down to Earth. The other guru could be found in Medical University in Karpovka street. There was a large room with a large computer case taken from an older ES (IBM System/360 clone) computer. Inside of the case there was a mattress where you could find the sleeping owner. The semi-opened fireproof box that contained computer and modem acting as node 2:5030/131 was aligned to the wall. The file sizes and storage size requirements were growing fast due to increased transfer speeds. HDDs were expensive and not very reliable and CDs were nowhere to be seen. Once, I saw an optical disk video player at LKI ("Korabelka"). It was 1996, the disk was about 8" big and it had an analogue method of storing information. That is why it was popular to increase the floppy disk capacity using different tricks. The special software would allow you to write 800kb of data into 360kb-rated floppy disk using 720kb capable floppy disk drive and 1.2mb floppy disks could be upgraded to 1.4mb. While it was nice to get extra floppy disk space it did not solve the major problem. We still needed to store all the software we had to exchange and backup. Losing a copy of the program was not an option considering how much effort it would require to get a replacement. Modern approach "why do I need to keep it - I will download it when I need it" was unfeasible. One of the popular solutions was offered by a local company in Zelenograd. Arvid PC board would allow the use of a regular VHS player as a streamer. A single cassette would store up to 2Gb of data with all redundancy and error-correction codes. It was a very impressive capacity for those years while being affordable and reliable enough. Hackers and the Demoscene At that time, the IT labor market in Russia looked odd. There was a supply of high quality specialists with up to date IT knowledge but very limited demand for those positions. It was tricky for a good specialist to gain practical benefits. As a direct result - it was typical to see non-profit high complexity projects. Around that time movements took its shapes - the software hacking and the demoscene. They were closely related in the beginning similar to the world of Commodore 64, although for different reasons. It all started with 'warez': commercial games, tools, and any software products obtained for free. Even before Internet arrival we had it all - you could download fresh software releases via special BBSes hosted in the USA and Europe. There was also IceNet - the international network designed to exchange the software technically similar to FidoNet. Almost every single IceNet station in Russia was running a FidoNet node on the same machine. The real names were forbidden to use and I created my first nickname 'coderipper' there. Actually, 'nickname' is a term brought by IRC, we used to have 'aliases' instead. Many software products tried their best to protect themselves from illegal copying. A hacker would have to have an excellent knowledge for hardware, software and system level functions. There was nothing like contemporary IDA or virtualization tools, the target program would easily detect the presence of debuggers like AFD or Turbo Debugger. Additional tricks were incorporated in code itself to prevent the popular disassembler tools like Sourcer to work properly. This valuable knowledge found its purpose in creating simple but nice looking graphic effects - fire effect or plasma. I decided to create a new FidoNet echo-conference DEMO.DESIGN in 1994. We exchanged the programming ticks, collected new effects and discussed the way to implement or optimize particular algorithms and effects. It was inevitable to move from discussion on effects to have our first coding competitions. The tasks and challenges were pushing the limits of creativity and code optimization - for example, "implement triangle rasterization using the smallest code footprint" or to write a tiny piece of code of no longer than 128 bytes that would do a certain visual effect. Target platform was PC AT 80286 running DOS as the most widespread and common. Early 90s was the time period of early demoparties. They started to appear in Scandinavian countries and gathered demosceners coding visual effects with music. Basically, it is all about non-interactive visual effects with music showing the author's skills in programming, extensive knowledge of software and hardware features and designed to impress with complexity, performance or visual appearance of generated animation. The demoparties were known in the late 80s but they were very localized due to the lack of networks and the not so legal nature of those events. Such demoparties used to exchange paid software and were pretty much "copy-parties". It all set to change with the Assembly demoparty held in Finland in 1992. This party is known because of the release of a hugely important 'Second Reality' demo and massive attendance figures of thousands of people from many countries. Here, in Russia we saw it from a distance and due to the increasing activity in our DEMO.DESIGN conference we started thinking of having our own demoparty. It was August of 1995 when our group of friends with a couple sponsors hired the venue with equipment and Internet connection in Saint-Petersburg to make our first ever Russian demoparty - ENLiGHT'95. It was a massive success and we still keep it going every year as Chaos Constructions demoparty. Sadly, not many pictures are available from those early years - the digital cameras were not around yet and no one could be bothered to bring in film cameras and prints. There are some VHS tapes which capture the spirit and atmosphere of those parties. We had no projector so we had to improvise with a couple of regular CRT TVs - nothing fancy. People gathered around, sat on the floor trying to see what was displayed. There were no laptops and the only computers available - three PC AT 486s along with Commodore Amiga and Commodore 64 were allocated exclusively for competition events and showcasing other demoscene releases. The voting was organized in written form on pieces of paper. Internet connection used to broadcast updates from the party over IRC. The majority of releases were PC DOS based and were written either in Assembler and Turbo Pascal. As a good indication of the skill level of some participants I remember one of the participants used the demo music track written all by himself in the music sequencer (SoundWave tracker) that he created himself too. It did not stop there, his 3D visualization engine used polygonal models created in bespoke 3D modelling software he created himself again. Even by modern standards it is a massive effort and excellent skill set. Later, that demoscener went into the cryptographic technology industry. Many developers were captivated by the idea of creating their own operating system. There was a very limited choice of general use operating systems around. Unix was so basic that many of the developers saw it as a pile of disconnected chips and boards instead of a fully operational computer. DOS and Windows 3.xx did not match expectations of the user and OS/2 was about to get to 'usable' state, granted you had a compatible computer too. Macs were hard to find and only a few lucky ones saw Macs in Russia at all. We had different groups identifying and addressing the most important aspects of a modern operating system - from the distributed processing and data storage systems all the way to intermediate code capable of running on different hardware and software environments. There were many ideas of optimizing the performance for an average computer which at that time was pretty limited in resources. Most of the operating system development discussion was in SPB.SYSPRG FidoNet echo-conference and regular offline meetings hosted by SysOp 2:5030/269 who was known for creating IBM/360 emulator for PC. There was no final OS product created as such - mostly due to the requirement to create device drivers for all existing variety of devices. That was a huge task on its own and it would require a massive team to support it. Still, it was an amazing and useful experience to get deeper into different architectures of available CPUs and design principles of existing operating systems. It really expanded our knowledge of computers and allowed us to see existing, new and 'so-called new' technologies from a very different point of view. It should be mentioned here that apart from upgrading Sportsters into Couriers, SysOp of 2:5030/131 mentioned above created the RTS-386 system, that allowed a multiuser access with inexpensive terminals to a single PC AT 386. Every user would have a fully functional workplace in a Windows environment with graphics. Sprint and Internet One day my FidoNet friend sent me a message that he has access to the CompuServe network. Getting into CompuServe in St.Petersburg was similar to crossing the country border illegally. You were required to use the modem to call a well known phone number known only to the limited group of people. I still remember that phone number ending with '92' and can quote it at any time. The connection would require a symbol sequence to be typed in, then the login itself, the password and provide the details of a bank card. None of us had our own bank cards and the card details we were using came from a very dodgy source. When the connection procedure was completed you could use a special DOS client application that allowed access to CompuServe features. The connection was very expensive and the time had to be used efficiently. I was downloading the new issues of Dr. Dobbs magazine and browsing Usenet groups. Very soon the card details and logins were expired but we had a good taste of the network. Also, we have found that the phone number we used was a regional X.25 Sprint network access point. This network was used by large companies and banks to communicate with each other. While having direct access to a very powerful network we never had a slightest idea how to abuse it - it was just beyond of our interests. Some other people were trying to run a fraud using this system and quickly became a part of criminal chronicles in the news. We did not have any good description of what we can do while connected to the network but few issues of Phrack magazine hinted us that typing in numbers and keywords would eventually connect us with other remote computers. We were never successful in connecting to really interesting places or rarely had access rights to do anything at the remote computer. All in all it was an amazing experience to connect to American bank mainframe and chat to another stranger who got there the same way as you are, it was quite an adventure. I will need to explain a bit more there. Most of those unauthorized or backdoor connections were made because of curiosity or examination of technical and security flaws, or just to show the skill level. There was no monetary gain involved at all. You could not even name yourself a hacker as it was something on par of calling yourself to be the smartest person in front of others. The word "hacker" itself had no negative attitude and just indicated a skilled and dedicated person who did something just out of curiosity, for the sake of the process itself, not necessarily limited to the IT industry. Of course, the FBI would chase those down disregarding if hackers were doing their activities for profit or not which was known since C64 episodes from the 80s. Still, those cases were rare in the West and literally non-existent in Russia. The local law enforcement had no legislation on that matter or even understanding what is supposed to be good and what is not. I discovered the fully-featured Internet in a very specific environment. A friend of mine invited me to his workplace one evening in 1993. He was working in a company in 'New Holland' which had a legitimate Internet connection. While his personal workspace had no direct Internet connection it was possible to connect to the other computer at the office floor via LAN. That other computer was configured to connect to the Internet via dialup to KIAE Moscow. Needless to say we were not paying for those phone calls. Our first Internet experience at KIAE was Lynx - a text-only web browser. Also, we were quickly able to find how to start an IRC client which immediately asked us for a nickname. We needed to act fast and my second and much shorter nickname was generated there - "frog". It would be fair to say that our first Internet experience was very similar with Sprint experiments rather than modern Internet usage. Shortly after a number of local Internet providers appeared and there was no need to continue using those cumbersome and semi-legal ways to get to the Internet. I saw my first web browser capable of displaying images and graphics in the office of Internet Service Provider 'Kaja' located in one of the basements close to the 'Rossiya' hotel. The Internet was taking over - the dial up connection was easy to get for doing a job for someone or by sharing someone's login. All of that brought me to a brief introduction to Unix... Education system and research institutes started to develop their own networks. The subsidiary of Steklov Mathematical Institute used a grant to install Sun Classic running Solaris 2.0 and dedicated line Internet connection. We could use this system thanks to FidoNet friends but it was not as convenient as using the dial-up at home and we made to share this connection. We knew nothing about Unix but still managed to rebuild SunOS pppd to run on Solaris. In moments of desperation I also had tried to code on Sun Classic using Sparc assembler. Palmtops The mobile devices came from the West and became popular in Russia around 1997. The first devices were pretty basic - the smartphones like Nokia 2110, 3110, 6210 or Siemens ME45. They had a limited set of features - phone calls, a simplistic notebook, and calendar. The numeric keyboard was limiting the amount of text could be typed in too. The mobile computers similar to Apple Newton were very expensive and hard to find. The things changed for the better with the introduction of PalmPilot by US Robotics. It was an inexpensive pocket-sized computer with a stylus designed primarily to make notes. In a brief period of time few of my friends bought PalmPilots. I bought mine too. All of us had plenty of questions about software development and hardware accessories. We started an informal 'The club of mobile device owners' and had weekly meetings in the 'Kronverk' company office close to the Tekhnologichesky Institut subway station. This particular company was famous for hosting a large FidoNet node - 2:5030/2 and the Sysop of that node was elected twice as network coordinator. The news about our club spread quickly. At that time there were no other clubs like ours and we saw more people coming with other mobile devices - PocketPC, Palm, Newton, Psion and other more exotic models. Our club was active for several years with weekly meetings at the History of Arts Institute. The active part of the club ceased to exist when all information and software became easy to get online. Nevertheless, people were coming to discuss general IT tops or just to have a good time in the company of friends. Technology-driven clubs and societies either transformed into commercial projects or disappeared altogether as a result of widespread adoption of Internet, mobile devices and generally better access to information altogether. The skilled IT jobs started to be paid well. People famous for doing projects of high complexity started to enjoy a proper compensation for their efforts. Money was set to become a decisive factor of choosing what to do in IT. Low level development survives in a limited number of applications and everything else becomes much less a creative process but rather an industrial scale routine job. Everyone has a computer or smartphone connected to the Internet these days - it requires no extraordinary skills to get information today. The only limits you can do online are usually the ones set by the legal system. It was all expected to see, but also it makes everything about computers to feel so ordinary. By removing those perils and challenges of early computers and networks we have lost that odd romantic feel about it. I am curious what would be the next Big Thing, the technological breakthrough that will rival the arrival of computers and global networks? Peter Sobolev March, 2017 St.Petersburg, Russia [email protected] (English translation published in May, 2020)
Newton Dating Site - Free Online Dating in Newton (Kansas ...
Steve Martin - Dating Game 1968 - YouTube
How to Date When You're Over 50 (Dating Tips & Where to ...
What is the best dating site for young adults? New secret ...
Dating Service Roleplay Part 2 (ASMR) - YouTube
New Jersey Singles Dating Service Reviews And More
'FarmersOnly' Dating Service NBC News - YouTube
'Extreme Cougar Wives': Older Women Dating Young Men
Former Secret Service Agent Shows You How to Get The Truth ...
Start A Dating Site - Part 1 - YouTube
Dating Service Commercial - Funny - YouTube
New jersey singles dating & Matchmaking service reviews dating in new jersey/meet singes in new jersey /find locals in new jersey http://www.newjerseysingles... Online dating service FarmersOnly boasts more than a million members and a slew of relationships and marriages in rural areas across the U.S. » Subscribe to ... Start a dating website ( http://www.startadatingwebsite.com ) provides a dating site assistance service that supplies dating websites to clients on a monthly... This episode is sponsored by WHOOP. For 15% off your order, go to https://www.whoop.com and use discount code IMPACT at checkout. How do you know if someone ... Hey poopsies, here is PART TWO of the dating service roleplay! Finally. It’s been over a year since the last posted one. Season one is now over, and we are a... How to Date When You're Over 50 (Dating Tips & Where to Meet Women) Improve your chances in finding, attracting & keeping a good woman no matter what age you... Inside the dating world of women in the 60s and 70s looking for love from men in their 20s. A funny web commercial promoting a dating service. It features a nerd going out with beautiful women and hinting at sex, while a macho man is left speechless. Steve Martin on the Dating Game in 1968, as broadcast on the Game Show Network back in the 90's... This is the only segment I captured; I do not have the Ric... What is the best dating site for young adults? New secret dating service. In search for a good web project to meet a girl? For friendship or fast affair? Che...