Thursday, October 31, 2013

computer security, defeat crooks

I am from Silicon Valley CA and route 128 Boston MA.

I am working on modernizing online payments cheaply efficiently such as

I need to learn more about security and evading hackers, crooks, collusion, data protection...

For example, I snail mail data request from the 3 credit reporting agencies, one each 4 months and get a snail mail pretty colored print-out. Internet is risky.

Never took out a loan yet, zero balance. Minimize all contacts with anything that requires data.

But everybody's data is everywhere, too much vulnerability and financial losses you pay for directly or indirectly.

How to get control of this situation

Tuesday, October 29, 2013

drought fading, lots of cars.


Looks like drought is fading in most regions. Rain today so I lifted weights 2-3 hours on an empty stomach. During a rainy period 2 weeks ago I got so sore that I could barely walk. I ate 4 ounces of velveeta and soreness went away overnight. Velveeta is a block of whey glued together by butter. I guess weightlifters are right to use whey. I don't like whey -- bad taste and a long list of chemicals. I don't like velveeta either but at least it looks like food. I checked out the long list of Velveeta ingredients and they are ok. It is mostly dairy, salts, and carotene type yellow colors. I will attempt to find a suitable brand of powdered whey.

Walking around town I see quite a few interesting old classic cars, some photos attached. Unfortunately my new camera has too many megapixels. I immediately batch convert them to a smaller size 1000 x 1000 that is easy to see on most computers. Then I archive them online in the cloud. I don't let all that junk build up on my computer. Cameras are going out of style. Cell phone cameras are getting better. Just take pictures and share immediately over the phone. Email to friends or Upload to Flickr, etc.

Lots of car enthusiasts around here. Clubs. Gatherings. Auctions. Museums.
drought monitor 2013 10 22_usdm.pdf

Sunday, October 27, 2013

html5 better than pdf

Steve Jobs was right: html5 is the way to go. Even die-hard pdf companies are moving to html5. I am one of the hardest to convince. pdf was great 20 years ago. Most html is terrible and have not moved to html5. Most websites are terrible and will remain terrible. A phd scholar should be able to write a good document in html. Most fields can easily use plain text or html with a little formatting. Math and science are harder -- if they can do html anybody can.

Documents need to be web pages because that is an efficient way to find and take a quick look and longer looks at those documents on any computer tablet or phone.

Scribd CTO: "We Are Scrapping Flash And Betting The Company On HTML5"

Adobe’s much-beleaguered Flash is about to take another hit and online documents are finally going to join the Web on a more equal footing. Today, most documents (PDFs, Word docs, Powerpoint slides) can mostly be viewed only as boxed off curiosities in a Flash player, not as full Web pages. Tomorrow, online document sharing site Scribd will start to ditch Flash across its tens of millions of uploaded documents and convert them all to native HTML5 Web pages. Not only will these documents look great on the iPad’s no-Flash browser (see screenshots), but it will bring the richness of fonts and graphics from documents to native Web pages.

Scribd co-founder and chief technology officer Jared Friedman tells me: “We are scrapping three years of Flash development and betting the company on HTML5 because we believe HTML5 is a dramatically better reading experience than Flash. Now any document can become a Web page.”

Documents will simply become very long Web pages. A new bookmark feature will help you keep your place in especially long documents. Scribd’s documents will be especially iPad friendly. Instead of downloading a book from Apple’s iBooks store or Amazon’s Kindle app, you can see if an electronic version is on Scribd and read it in your browser. Pinch and zoom to make the text bigger. No download necessary. The books and other documents are stored on the Web. They can be shared via Facebook and Twitter, or sent to a mobile phone.

Scribd is joining a chorus of companies from Apple to Microsoft in siding with HTML5 over Flash. Tomorrow only 200,000 of the most popular documents will be available in HTML5, but eventually all of them will be switched over. When it’s done, Scribd alone will convert billions of document pages into Web pages.

Scribd’s currently uses a Flash player much like YouTube’s to allow people to upload and view documents on the Web. But with HTML5 standards now making their way through not browsers, there is little reason to do that. “Right now the document is in a box,” says Friedman, “a Youtube-type of experience. There is a bunch of content and a bunch of stuff around it. In the new experience we are taking the content out of the box.”

Friedman has ben working secretly on this project for the last six months. You can tell he’s excited about it. He believes the Web is finally ready to ditch Flash for documents. Unlike video players, the parts of the HTML5 standard that impact documents have to do with support for fonts, vector graphics, and rotating text. Friedman estimates that 97 percent of browsers will be able to read Scribd’s HTML5 documents because those parts of the standard are older and more widely adopted. HTML5 documents will still be embeddable in other sites using an iFrame.

Poor Adobe. Even as it too embraces HTML5, the Web is moving away from Flash.

login with facebook. ankle bracelets for all citizens

All citizens fitted with ankle bracelets to enter grocery stores, walk the streets, start their cars or motorcycles, prove they are legally in the USA, etc. Cameras and drones can seek illegals.

Facebook login to pay your taxes, collect social security, pensions, welfare, medical care, etc.

Next couple of years is decisive

STAMFORD, Conn., February 5, 2013

Gartner Says Half of New Retail Customer Identities Will Be Based on Social Network Identities by 2015

Analysts to Explore Tomorrow's Identity and Access Management Demands at Gartner Identity & Access Management Summit 2013, March 11-12, in London, U.K.

By the end of 2015, 50 percent of new retail customer identities will be based on social network identities, up from less than 5 percent today, according to Gartner, Inc. Along with federation technologies and mobile computing, social identity adoption will have a major impact on the practice of identity and access management (IAM) in 2013 and beyond.
“For an increasing number of Internet users, social networks are the Internet. Using ‘login with Facebook’ — or other popular social networks — reduces friction and therefore improves users' experience of customer registration and subsequent login,” said Ant Allan, research vice president at Gartner. “For registration, the required personal information can be imported from users' social profiles, reducing — if not eliminating — form filling. Moreover, using a social network identity means users don't have to remember rarely used passwords or endure convoluted password reset processes when they forget them.”

Mr. Allan added that organizations also benefit from the use of social identities for authentication. It reduces the number of abandoned registrations and logins, and makes it easier for customers to browse and buy. Therefore, it also helps organizations attract and retain customers.

However, the lack of identity proofing and weak authentication for social network identities can expose merchants to more fraud. Service providers therefore have to defend themselves. They may allow social network registration, but augment the process with additional controls when a retail site provides access to sensitive data and monetary transactions.

Alternatively, merchants may accept the increased risk without additional controls because of the potential increase in the number of customers and the volume of purchases; this approach "passes the buck" to payment card companies — but they already have robust fraud detection and management tools and processes in place.

“It's important for IT leaders to remember that, despite the increased risk of fraud, social network identity proofing and user authentication are no worse than the practices currently used by many businesses. In fact, social network identities could offer better identity proofing than ‘raw’ customer registration. This is because social network analysis can potentially identify bogus social identities, and some vendors can exploit the ‘wisdom of crowds’ to verify claimed social network identities,” said Mr. Allan. “There will be increased demand for specialized vendors that support this use of social network identities, as well as for support for the OAuth and OpenID Connect specifications in traditional IAM vendors' Web access management and federation products."

“However, using social network identities for authentication may not suit all organizations. Businesses offering consumer-facing services, as well as government agencies offering citizen portals, should assess the benefits of accepting social network identities for customer and citizen registration and login,”

Mr. Allan said. “They must also weigh these against the risks posed by the lack of identity proofing and weak authentication for social network identities. Mitigating these additional risks may offset any cost savings.”

Gartner analysts will explore these topics at the Gartner Identity & Access Management Summit 2013, March 11-12, in London. For further information about the Summit, please visit

You can also follow the event on Twitter at using #GartnerIAM.

About the Gartner Identity & Access Management Summit

The Gartner Identity &Access Management Summit aims to identify the technology, tools and techniques needed to establish effective IAM programs at a time when the Nexus of Forces — mobile, cloud, information and social — presents new challenges and opportunities to chief information security officers and IAM leaders. Contacts

Rob van der Meulen

Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day.

From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, Gartner is the valuable partner in over 13,000 distinct organizations. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, U.S.A., and has 5,800 associates, including 1,450 research analysts and consultants, and clients in 85 countries. For more information, visit

Thursday, October 24, 2013

scientific publishing. antique autos: use deflation to inflate yourself by selling old junk


Now is the time to transition to modern electronic publications for all academic work. Should be html not pdf, links not cites, all free online -- one scholar's work on one website such as Put paper documents into permanent underground storage. Quite a chore.

All universities, faculties, and students are paid for by taxpayers who should be able to read the works these people produce free on a permanent file website. If they want a paper copy they can print it out. Or buy a paper copy from a paper printer publisher. All hiring, firing, promotion, funding, assessment decisions should be made on the basis of information free to the public.

Due to deflation people have an excess supply of money to waste on old autos. We have a lot of antique autos around town and visiting. I see them all over town and at the brand new huge museum. Just had an auction.




consigned vehicles

Fall 2013Archive
Check Us Out On Facebook

Click the car image to view in-depth details and photographs.
Click Here for for a complete printable listing including cars without pictures. Friday cars #s 201/300
Saturday cars #s 501/650


601 1917 Abbott-Detroit Roadster 6 Cyl 229 1974 Alfa Romeo Spyder 4 Cyl 254 1967 AMC Rambler 290 267 1968 AMC AMX 390 250 1970 AMC AMX Coupe 390 227 1983 AMC Jeep CJ7 6 Cyl 553 1929 Auburn 8-90 Cabriolet
558 1936 Auburn 852 Convertible Straight 8 529 1956 Austin Healey 100/6 6 Cyl 264 2001 BMW Z3 Convertible 220 1963 Bond Mini Car 247 239 1939 Buick Special 350 593 1947 Buick Roadmaster V8
244 1957 Buick Special Hardtop 350 279 1958 Buick Limited 364 533 1965 Buick Riviera GS 425 321 1970 Buick Electra Limited 228 1972 Buick Skylark 350 568 1941 Cadillac 60 Special V8
273 1975 Cadillac Eldorado Convertible 8.2 Litre 210 1987 Cadillac Allante V8
223 1987 Cadillac Allante No Reserve 4.1L
304 1987 Cadillac Fleetwood D'Elegance 350
282 1992 Cadillac Allante No Reserve V8
594 1933 Chevrolet Master Eagle 6 Cyl
629 1941 Chevrolet Special Deluxe 305 502 1948 Chevrolet Pickup 400
515 1950 Chevrolet 3600 No Reserve 6 Cyl 308 1950 Chevrolet Stepside 295 1955 Chevrolet Bel Air 454

* 1
* 2
* 3
* 4
* 5
* 6
* 7
* 8
* NEXT › * LAST »

Sunday, October 20, 2013

Race: Professor Thomas Sowell Cambridge University, UK

He has a good website. Seems like computer scientists can speak in the UK easier than in the USA land of the free. Interesting reading on many topics.

Races exist, races are different and race matters. Although this review article presents no new research, because political correctness runs through the social sciences like a cancer, such a frank overview of the literature is novel in itself. The article covers racism, taxonomies of race, altruism, creativity, crime, environment, honesty, impulsivity, intelligence, music, overconfidence, personality and culture, populations, science, sex, slavery and sport.


Objectively, a visitor to earth would deduce that our planet is dominated by one species,/Homo sapiens/. Cluster analysis--or common sense--would reveal that members of said species may be further classified across two dimensions: according to sex, and according to race. Race is an important aspect of our species, not merely a detail. In the name of political correctness, a number of American anthropologists claim that race does not exist. They are wrong. Races exist (Entine 2001 ;Goodrum 2002 ;Sarich and Miele 2004 ;Stowe 2006 ), and race matters (Levin 2005 ). Every human being is equipped with the same psychology: they perceive their own community, nation or race as an ‘in-group’, whereas those outside belong to an ‘out-group’ (Tajfel 1981 ,1982 ;Tajfel and Turner 1986 ). See alsoSalter (2006) . The Public Broadcasting Service (PBS), the US non-profit public broadcasting television service, have an online companion to their 2003 documentaryRace: The Power of an Illusion which lists 10 ‘facts’ about race. It turns out that/all ten of these ‘facts’ are untrue/(Sarich and Miele 2004 ). Denying (i.e. lying about) race differences is harmful because it implies that any differences between the groups must be man-made, so someone is to blame. Although evolution doesn't do equality, when it comes to species and sub-species, it doesn't do hierarchy either. So talk of a ‘superior race’ is meaningless (as can be seen below, each race excels in different areas). Are we even a superior species? The most successful animal, in terms of biomass, is the Antarctic krill. However, different races do not necessarily create environments that are equally preferred by human beings in general, and trends in the direction of migration evidence this. Ironically, the better educated people are, the less of a grasp on the reality of racial differences they have (The Realist 2007 ).


So-called/racism/is a perfectly natural in-group bias which has been stigmatized by the politically correct West. In order to boost tax revenue and keep inflation down, Western governments have allowed mass immigration. To mitigate their self-serving actions, they needed to encourage cooperation by enforcing egalitarianism.

Taxonomies of Race

The categorization of species, sub-species and thus races is not an exact science. Indeed, some of the genetic differences between Africans and Eurasians are more than half as great as between the consensus human genome and chimpanzees; and modern Eurasians and sub-Saharan Africans are about as genetically distant as modern humans are from/Homo erectus/(Curnoe and Thorne 2003 ).

*A note about Jews*

The mechanism by which people become Jews is inherited ethnicity, which makes them genetically cohesive. It is best to think of Jews as a tribe and Judaism as a group evolutionary strategy. SeeMacDonald (2002).

/Linnaeus (1758) /

* /Europaeus/(Europeans)
* /Afer/(black Africans)
* /Asiaticus/(Asians)
* /Americanus/(Native Americans)

/Blumenbach (1776) /

* Caucasian (white)
* Mongolian (yellow)
* Ethiopian (black)
* American (red)
* Malayan (brown)

/Boyd (1950) /

1. Europeans with high frequencies of blood groups Rh cde and cde; 2. Africans with very high frequencies of Rh cde;
3. East Asians with high frequency of B and virtually no cde; 4. American Indians with very high frequency of O, absence of B, and few cde; and
5. Australids with high A, negligible B, and cde.

/Coon, Garn and Birdsell (1950) /

1. Caucasoids
* Nordics of Northwest Europe
* Slavs of Northeast Europe
* Alpines of Central Europe
* Mediterraneans of South Europe, North Africa and the Near East * Hindu of India and Pakistan
2. East Asians
* Tibetans
* North Chinese
* Classic East Asians (Koreans, Japanese, Mongolians)
* Eskimos
3. Southeast Asians
* South Chinese
* Thais
* Burmese
* Malays
* Indonesians
4. American Indians
* north
* central
* south
* Fuegians
5. Africans
* East Africans
* Sudanese
* West Africans
* Bantu
* Bushmen
* Pygmies
6. Pacific Islanders
* Melanesians
* Micronesians
* Polynesians
7. Australian Aborigines
* Murrayian peoples of southeastern Australia
* Carpentarian people of northern and central Australia

/Baker (1974) /
A closely similar seven-race taxonomy to the one above, comprising the five major races of Blumenbach and the/Khoi Bushmen/, consisting of the Hottentots and Bushmen of southwest Africa and the Kalahari desert, and the/Australids/, consisting of the Australian Aborigines and Melanesians.

/Nei and Roychoudhury (1993) /

1. Africans of Sub-Saharan Africa
* Pygmies
* Nigerians
* Bantu
* Bushmen
2. Caucasoids
* Lapps
* Finns
* Germans
* English
* Italians
* Iranians
* North Indians
3. East Asians
* Japanese
* Chinese
* Koreans
* Tibetans
* Mongolians
4. Southeast Asians
* Southern Chinese
* Thais
* Filipinos
* Indonesians
* Polynesians
* Micronesians
5. Amerindians
* North and South Native American Indians
* Inuit
6. Australian Aborigines
* Australian Aborigines
* New Guineans

/Cavalli-Sforza, Menozzi and Piazza (1994) /

1. Bushmen and Pygmies
2. sub-Saharan Africans
3. South Asians and North Africans
4. Europeans
5. East Asians
6. Arctic Peoples
7. Native American Indians
8. Southeast Asians
9. Pacific Islanders
10. the Australian Aborigines and the Aboriginal New Guineans

Source:Lynn (2006)


Europeans appear to suffer from promiscuous altruism, showing the greatest concern for both other races and the environment. It is nearly 25 years since Bob Geldof's famous Feed The World campaign, and in that time Ethiopia's population has over doubled, growing from 33.5 million to 78 million today (Myers 2008 ).


Whites are the most creative race. For cultural, social and institutional reasons, East Asians, despite having higher intelligence than Europeans, have a ‘creativity problem’ (Kanazawa 2006 ).


Blacks are 3.3 times more likely than whites to commit single-offender crimes of violence and 8.0 times more likely to commit multiple-offender crimes of violence in the US (U.S. Department of Justice 2006 ). Similarly, blacks are 3.4 times more likely than whites to be arrested for a notifiable offence in England and Wales (Home Office 2006 ). Globally,Rushton (2000) found that African and Caribbean countries reported twice the amount of violent crime (rape, murder, and serious assault) as did European countries, and about three times as much as did countries from the Pacific Rim. The most likely reason for the high incidence of black crime is blacks’ lower intelligence and greater impulsivity, which themselves are probably biological in origin.Rushton and Whitney (2002) found that while wealth was negatively related to crime across European or East Asian countries, it was positively related to crime for the African and Black Caribbean countries (i.e., the wealthier an African or Black Caribbean country, the greater its rate of violent crime).


Claims that the environment is to blame for differences between the races is politically-inspired obfuscation. People create their own environments, so the only non-circular explanation for differences is ultimately genetic. The genetic differences themselves are ultimatly due to the past environment over the long term (because evolution is a slow process).Rushton (1989) 's/race evolution hypothesis/which uses r/K selection theory (MacArthur and Wilson 1967) offers the best explanation.


All but two African countries scored in the more corrupt half of the scale in the 2007World Map Index of perception of corruption .Kinsella (2007) describes how 100 wallets were deliberately lost to test honesty. 79% of white people were honest and returned the wallets and 57% of black people were honest and returned the wallets.


Blacks are more impulsive than other races, and the unwillingness of blacks to delay immediate gratification for a long-term advantage shows up from an early age (Mischel 1958 ,1961b ,a ;Seagull 1966 ;Zytkoskee, Strickland and Watson 1971 ;Strickland 1972 ;Price-Williams and Ramirez III 1974 ).


Europeans developed advanced mathematics (Newton and Leibniz), complex societies and set foot on the moon 40 years ago, whilst Africans never developed mathematics (beyond simple arithmetic), never developed a written language, never developed a calendar and never even invented the wheel.Taggart details many black invention myths. IQ measures the ability of an individual to perform a novel cognitive task (seeCarroll (1993, p. 16) ). Modern IQ tests are designed to avoid cultural biases, and the evidence suggests that they are successful. Firstly, IQ differences show up before the age of 4, and secondly, different races tend to find the same questions easy, and the same questions difficult (seeHerrnstein and Murray (1994, p. 280–286, 649–661) ,Jensen (1998, p. 360–369) ,Levin (2005, p. 62–73)) . Unlike a European, an African with an IQ of 67 does not appear retarded, suggesting that a lower IQ among Africans is quite natural. Genetic factors explain 50%-90% of the difference between the mean IQ scores of Europeans and Africans (Jensen 1998 ;Rushton and Jensen 2005 ;Lynn 2006 ;Hart 2007 ), whilst the remainder is explained by the environment (which is ultimately the product of the genes of the population). The East Asian/European difference is probably largely genetically determined. For the sake of comparison, the last four entries in the table below include other primates and extinct species of the genus Homo.

Race Mean IQ
East Asians 105
Europeans 100
Inuit (Eskimos) 91
South East Asians 87
Native American Indians 87
Pacific Islanders 85
South Asians and North Africans 84
sub-Saharan Africans 67
Australian Aborigines 62
Bushmen and Pygmies 54
/Homo erectus/ 50
apes 22
/Homo habilis/ 22
monkeys 12

Source:Lynn (2006)


Africans and Native Americans perform less well than Europeans on tests of musical abilities of pitch discrimination, tone discrimination, and memory, but they perform about the same as or slightly better than Europeans on tests of rhythm. Source:Lynn (2006)


People in general (especially men) tend to be overconfident. Asians (excluding Japanese) exhibit the highest levels of overconfidence (Wright et al., 1978 ;Wright and Phillips, 1980 ;Wright and Wisudha, 1982 ;Wright et al., 1983 ;Yates et al., 1989 ;Lee et al., 1995 ;Whitcomb et al., 1995 ;Yates et al., 1997 ,1998 ;Chuang and Wang, 2005 ).

Personality and Culture

Whites tend to score higher on extraversion. Asians are low on extraversion, agreeableness, conscientiousness, emotional stability and openness. Whilst blacks score high on agreeableness, conscientiousness, emotional stability and openness. See Appendix B inGosling, Rentfrow and Swann (2003) .Lynn and Martin (1995) found Nigeria (but not Uganda) high in extraversion and low in neuroticism, whilst China was low in extraversion.Allik and McCrae (2004) showed a clear contrast of European and American cultures with Asian and African cultures; the former were higher in extraversion and openness to experience and lower in agreeableness.McCrae and Terracciano (2005) found that Europeans and Americans were generally more extravert than Asians and Africans.Lykaios (2007) rates countries for tension (vs. relaxation) and cosmopolitanism (vs. provincialism). Japan and the Eastern European countries are high in tension, while South-East Asia nations and Scandinavian countries are relaxed. South American and East Asian nations (excluding Japan) are provincial, with European nations being more cosmopolitan (English and German speaking nations are extremely cosmopolitan).Schmitt, et al. (2007) found that people from the geographic regions of South America and East Asia were significantly different in openness from those inhabiting other world regions. See alsoInglehart (2002) andagnostic (2006) .


"In 1950, whites were 28 percent of world population and Africans 9 percent, a ratio of three-to-one. In 2060, the ratio will remain the same. But the colors will be reversed. People of African ancestry will be 25 percent of the world's population. People of European descent will have fallen to 9.8 percent" (Buchanan (2008) )


Orientals are the least sexually active and least fertile. Blacks the most sexually active and most fertile. Whites are intermediate. SeeRushton (2000) .


More intelligent races enslaved less intelligent races. Europeans and South Asians have frequently enslaved Africans, but not vice versa. Negroid Africans enslaved pygmies. (Source:Lynn (2006) .) Blacks routinely practiced slavery, whilst Europeans abolished slavery.


Murray (2003) found 97 per cent of major figures in science between 800 BC and 1950 AD were white. Murray also lists the 170 most important technological breakthroughs during the same period; all but nine occurred in the West. East Asians make good engineers and have made a large number of useful inventions, but have made few original contributions to mathematics or science (Hart 2007 ), have made few technological breakthroughs, had few notable figures and have won very few Nobel prizes (Jobling 2008 ). From around 600AD until 1300AD China was the most advanced nation in the world, but that period was atypical (Hart 2007 ). ‘Throughout their history the Chinese have been very inventive when it comes to practical solutions to particular problems but did not develop theories from practical solutions that offered general explanations of the world. In this sense, China never developed anything that could be called science.’ ‘No Asian society has achieved much success in fundamental scientific discovery or technological innovation that goes beyond the adaptation of what has been invented or discovered elsewhere. Nor, despite the large populations of Asians living in advanced European societies, can we find front-rank scientists in proportion to their numbers. In the social sciences their contributions are practically invisible.’(Henderson 2009)


/American football/. Polynesians are the most ‘overrepresented minority’. Although blacks comprise only 13% of the population of the United States, they account for 65% of the players in the National Football League. Blacks are typically running backs, seldom quarterbacks. Blacks dominate positions that require quick reaction, while whites dominate positions from which actions are initiated, such as quarterback and pitcher.

/Baseball/. Blacks are overrepresented in baseball, but particularly so in the outfield, where a premium is placed on fast starts, speed and power hitting.

/Basketball/. Requires fast reflexes and sudden exertion, blacks excel. Although blacks comprise only 13% of the population of the United States, they account for over 75% of professional basketball players.

/Bowling/. Requires concentration and control, blacks are underrepresented.

/Boxing/. Requires fast reflexes and sudden exertion, blacks excel.

/Golf/. Requires concentration and control, blacks are underrepresented.

/Gymnastics/. Asians excel because they are more flexible and have the quickest reaction time.

/Hurdling/. Requires fast reflexes and sudden exertion, blacks excel.

/Ice skating/. Asians excel because they are more flexible and have the quickest reaction time.

/Jumping/. West Africans excel due to their higher percentage of ‘fast-twitch’ muscle tissue.

/Running: Sprints/. West Africans excel due to their higher percentage of fast-twitch fibres.

/Running: Middle-distance/. Kenyans dominate long distance running. It turns out that the Kenyan runners all come from one tribe, the Kalenjin (who make up only 10 percent of Kenya's population). The average Kalenjin runner is 1.5 standard deviations beyond that of the rest of the world: that is an enormous difference.

/Running: Marathons/. Kenyans excel, as above.

/Sumo wrestling/. Samoan sumo wrestlers excel as they are larger and quicker than those from Japan.

/Swimming/. Whites are best at swimming. Compared to whites, blacks have heavier bone density and smaller chest cavities, whilst Asians have less upper body strength.

/Table tennis/. Asians excel because they are more flexible and have the quickest reaction time.

/Tennis/. Requires concentration and control, blacks are underrepresented.

/Throwing events/. Whites dominate, in part because of superior upper body strength.

/Wrestling/. Asians excel because they are more flexible and have the quickest reaction time.

Sources:Entine (1999) ,Sarich and Miele (2004) ,Levin (2005) andHart (2007)

The Bell Curve

Few books have been subjected to as much criticism as/The Bell Curve/(Herrnstein and Murray 1994 ). In the light of subsequent research, how has the book stood the test of time? Have the authors been vindicated, or do the critics have a point?

The Bell Curve Current best estimate
American black/white IQ difference 15 15 (Lynn 2006 ,Hart 2007 )
European/black African IQ difference 25 33 (Lynn 2006 )
East Asian/European IQ difference 3 5 (Lynn 2006 )

It turns out that, if anything, Herrnstein and Murray actually/understated/their case! It just goes to show that much social science is driven by politics, not science.


Saturday, October 19, 2013

no Apple. Security, privacy, cloud, cookie, spies, advertisers, hackers, thieves.

My new hobby is defeating spies, cloud and cookie collusion by advertisers and hackers and thieves stalking my computer. Simple practical steps that everybody should take.

I am getting rid of my Apple products because of security and privacy weaknesses.

Apple requires an Apple store account to use the hardware.

Apple store requires your birthday and a credit card.

Apple tries to make you use the Cloud. I don't need any free cloud. I pay for cloud

Apple ID also has bombed out on my 4 times. Last night I had to erase my iPod and start over.

I will get a Google chrome book for internet work.

Get an MP3 player for music.

Probably move serious work to a Linux computer, popular in Europe, more secure and professional.

May get a Microsoft Windows computer too if they do not require cloud, birthdays, credit cards, etc. But any USA product may be lacking in security and privacy.

Fire Obama. USA needs a new president who will help free enterprise be more secure. Socialized hacking does not help private free enterprise system.

The good: The SanDisk Sansa Clip Zip is an audio Swiss Army Knife that plays most audio formats, works with audiobook and subscription music services, can be used as a voice recorder, and tunes in to FM radio--all for under $50.

The bottom line: SanDisk's tongue-twister of an MP3 player is a stupefying value and its practical clip-on design is perfect for the gym.


SanDisk Sansa Clip Zip

Like the bygone days of the horse-drawn carriage, the era of the MP3 player has quickly faded into the past. Today, the smartphone is the portable music device of choice for most of us and the iPod is now just a footnote in Apple's history, outlived by the iPhone and iPad.

The MP3 player isn't dead, though. There is still one habitat left for these technological buffaloes: the gym. Yes, as cool as your smartphone may be, there's no app that is going to prevent it from smelling like an old sock if you keep it in your gym bag. You need something light, small, useful, and cheap enough that you won't cry uncontrollably if it gets trampled on. Luckily, SanDisk has you covered.

SanDisk's Sansa Clip players have long topped CNET's lists of affordable and gym-worthy MP3 players. The latest spin on the Clip formula is called the Clip Zip. Like 2009's Sansa Clip+, the Clip Zip has a starting price of $49 for 4GB or $69 for an 8GB model. This time around, though, SanDisk is offering the device in seven different colors (red, blue, black, orange, white, gray, and purple) and has upgraded to a larger, full-color screen.

Final thoughts

The Sansa Clip Zip further solidifies SanDisk's reputation for delivering low-cost, feature-packed MP3 players. The addition of AAC music support now means that even fans of Apple's iTunes store can plug the Clip Zip into a Mac or PC and transfer over their DRM-free tunes. So if you're looking for a way to enjoy your music without risking your precious smartphone, the Sansa Clip Zip is one of the best values around.

Tuesday, October 15, 2013

bureaucrat qualifications, snowden, government waste

Are government bureaucrats all they are cracked up to be? Are they overpaid?

Looks like outside consultant background checks on prospective bureaucrats are not worth what the government is paying for them.

The larger the organization, the more people must be hired and the greater the probability that recruits will not perform well. Some may betray their employer (government, taxpayers). Personnel must be vetted thoroughly. Where is his resume? Is it correct? Don't they check? He should not have been hired.

Many others should not be hired either. Fire them. Small government is better government. "A few good men." Costs less. Balance the budget. Reduce debt.

New York Times: C.I.A. Warning on Snowden in ’09 Said to Slip Through the Cracks When Edward J. Snowden worked as a C.I.A. technician in 2009, he was suspected of trying to break into classified files, but a report was never forwarded when he left to become an N.S.A. contractor, officials said.

He studied at Anne Arundel Community College to gain the credits necessary to obtain a high-school diploma but he did not complete the coursework. He maybe took and passed the tests for his GED at a local community college. Snowden worked online toward a Master's Degree at the University of Liverpool in 2011. Having worked at a U.S. military base in Japan, Snowden was reportedly interested in Japanese popular culture. He also said he had a basic understanding of Mandarin Chinese and was deeply interested in martial arts and, at age 19 or 20, listed Buddhism as his religion on a military recruitment form, noting that the choice of agnostic was "strangely absent".

Political views

Snowden has said that in the 2008 presidential election he voted for a third-party candidate. He has stated he had been planning to make disclosures about NSA surveillance programs at the time, but he decided to wait because he "believed in Obama's promises". He was later disappointed that Obama "continued with the policies of his predecessor". For the 2012 election, political donation records indicate that he contributed to the primary campaign of Ron Paul.


On May 7, 2004, Snowden enlisted in the United States Army Reserve but did not complete any training. In an email to The Guardian the U.S. army confirmed his enlistment as Special Forces recruit and said he was discharged on September 28, 2004. The email said, "He did not complete any training or receive any awards".

His next employment was as a National Security Agency (NSA) security guard for the Center for Advanced Study of Language at the University of Maryland, before, he said, joining the Central Intelligence Agency (CIA) to work on IT security. In May 2006 Snowden wrote in Ars Technica that he had no trouble getting work because he was a "computer wizard". In August he wrote about a possible path in government service, perhaps involving China, but said it "just doesn't seem like as much 'fun' as some of the other places"

Snowden said that in 2007 the CIA stationed him with diplomatic cover in Geneva, Switzerland, where he was responsible for maintaining computer network security. Snowden described his CIA experience in Geneva as "formative", stating that the CIA deliberately got a Swiss banker drunk and encouraged him to drive home. Snowden said that when the latter was arrested, a CIA operative offered to intervene and later recruited the banker. Swiss President Ueli Maurer said it did not seem likely "that this incident played out as it has been described by Snowden and by the media". The revelations were said to be sensitive as the Swiss government was passing legislation for more banking transparency.

Snowden left the CIA in 2009 and began work for Dell, a private contractor, inside an NSA facility on a U.S. military base in Japan. Snowden remained on the Dell payroll until early 2013. Persons familiar with the 2013 government investigation into Snowden's history said that Snowden had downloaded sensitive NSA material in April 2012. NSA Director Keith Alexander has said that Snowden held a position at the NSA for the twelve months prior to his next job as a consultant, with top secret Sensitive Compartmented Information clearances. Snowden took a Certified Ethical Hacker training course in 2010. USIS completed a background check on Snowden in 2011.

Snowden described his life as "very comfortable", earning a salary of "roughly US$200,000". At the time of his departure from the United States in May 2013, he had been employed by consulting firm Booz Allen Hamilton for less than three months inside the NSA at the Kunia Regional SIGINT Operations Center in Hawaii, earning $122,000. While intelligence officials have described his position there as a "system administrator", Snowden has said he was an "infrastructure analyst", which meant that his job was to look for new ways to break into Internet and telephone traffic around the world. He said he had taken a pay cut to work at Booz Allen, and that he sought employment in order to gather data on NSA surveillance around the world so he could leak it. The firm said Snowden's employment was terminated on June 10, 2013 "for violations of the firm's code of ethics and firm policy".

According to Reuters, a source "with detailed knowledge on the matter" stated that Booz Allen's hiring screeners found some details of his education "did not check out precisely", but decided to hire him anyway; Reuters stated that the element which triggered these concerns, or the manner in which Snowden satisfied the concerns, were not known.

The résumé stated that Snowden attended computer-related classes at Johns Hopkins University. A spokesperson for Johns Hopkins said that the university did not find records to show that Snowden attended the university, and suggested that he may instead have attended Advanced Career Technologies, a private for-profit organization which operated as "Computer Career Institute at Johns Hopkins".

The University College of the University of Maryland acknowledged that Snowden had attended a summer session at a UM campus in Asia.

Snowden's resume stated that he estimated that he would receive a University of Liverpool computer security master's degree in 2013. The university said that Snowden registered for an online master's degree program in computer security in 2011 but that "he is not active in his studies and has not completed the program".

Before leaving for Hong Kong, Snowden resided in Waipahu, Hawaii, with his girlfriend. According to local real estate agents, they moved out of their home on May 1, 2013

Sunday, October 13, 2013

Electronic Monetarism Efficiency Simplicity Security


Lots of exercise in beautiful weather. I am so sore I can barely walk. But after a 10 mile walk shirtless in the sun, I feel better. I caught 2 fish in 10 minutes and gathered 10 pounds of English walnuts in 10 minutes. Vitamin C and black Lipton tea is good for soreness too. A problem with living on a boat is falling into the water at the docks. Happens all the time with fatal consequences when I was spending a lot of time on boats in the San Francisco Bay Area.

Yes, the big bankers will be the main opposition. Banks would have to compete for funds as do stocks, bonds, derivatives, hedge funds. Banks would not have the free stash of cash that they do now. I suspect most of the big banks would not be profitable and would have to close most of their operations. I only use small banks and credit unions. They are usually profitable.

And the Post Office a key ally (money orders started in England 1792). I propose to move all money into a new "post office" run by retired military officers, commissioned and non-commissioned. Merge the census into this "post office" as well. These officers will also command the militia as mentioned in the second amendment. Pony express is a backup method of communication and money flow in case SHTF.

There will be no Fed or Open Market Operations. Money supply would be constant unless the president, congress, and courts order the "post office" officers to change the book-keeping entries to raise all retirees accounts $1000, for example. Velocity will vary enough to where this will not be needed. If there is a shortage of money then people will automatically spend it faster. If they have too much money then it will sit in the bank leading to a fall in velocity. Velocity is endogenous and will quickly adjust to meet the needs of people. Money supply is exogenous, and, like today, cannot change very fast anyway.

Money banking is not rocket science. It is mind-numbing number crunching. It is just addition and subtraction. It does not even require multiplication or division. Double entry accounting was used in 1340 in Italy. Does not require computers.

Already there are lots of legal constraints as to what people can buy with money. That would not change. The government can still go hog-wild with welfare programs or whatever. An electronic monetary system would cut maybe 20% of the waste. Many consumer tasks would be easier and safer. Essentially nothing is safe over the internet or snail mail.

Today I am facing a bill that I cannot figure out how to pay free without making a phone call. I have several bank accounts and credit cards and fancy computers. I do everything auto-deposit, online bill pay, debit card, credit card. But they all charge a large fee for this particular bill or they cannot figure out how to pay it. For example, Discover card cannot pay any bill from its website. You have to go to a vendor site to pay a bill. In contrast my debit card bank can pay almost anybody directly from the bank website! Usually no fee but in this case a $15 fee. It is also time consuming to find out the constraints of the current system which is a drag on productivity for the whole economy.

In my new system any citizen or company can pay any other party free as long as they know the other party's ID number, have an established signed relationship, and have the product code or a copy of the contract between the parties.


"Money is just book keeping entries." The electronic postage system used by USPS could be used. Anybody with a PC or even the homeless that wander into a library could access their "cash ration" doled out by Uncle with Fed oversight. It's secure, it's "government controlled" -
what could go wrong? Best of all, it keeps Wall Street out of the picture. What would Lloyd and Jamie say? They'd probably jump. JPM administers EBT but they should be out of the loop, this would be pure FED and cut out the middleman.

The Fed would cook up the best algorithms based on the wisdom of Janet Yellen and her Jewish banker crowd. It could be a real open market operation with constant hourly manipulation of every citizen's money ration so that everything is spent in a wise and timely manner. Alkys and dopers would be prevented from buying their "poison" and mothers-to-be would find their e-currency only worked for baby-safe food and items. Everyone would be debited and credited by Big Brother. "From each according to his ability, to each according to his need."


Friday, October 11, 2013

Florida beaches at Florida Institute of Technology. Location, Location, Location.

Florida has zero income tax. Space Coast Florida has it mostly white people.Water, rain, sun,.... Oranges, fish,... No freeze. Train to New York City, Boston, DC... Disney World Orlando. Near Miami, etc. Science, technology, mathematicsat Florida Institute of Technology, a very good private university.

Thursday, October 10, 2013

Open market operation are closed

Poor terminology. Open market operations are really closed market operations. Closed to veterans, elderly, everybody except bankers who inflate themselves at our expense. Floods of money for bankers. Crumbs for us!

Money is just book-keeping entries. It would not be hard to design a more fair way to expand the money supply. The current system gives more money to bankers, not veterans, the elderly, and other worthy persons.

My new book works out the details of Electronic Monetarism. No money printing or paper currency. The devil is in the details. Milton Friedman talked a lot but punted instead of giving details. Modern computers make it easier to implement monetarism. The hardware and software is the easy part Laws and organization is hard to match up to what citizens need.

Open market operation

An open market operation is an activity by a central bank to buy or sell government bonds on the open market. A central bank uses them as the primary means of implementing monetary policy. The usual aim of open market operations is to manipulate the short term interest rate and the supply of base money in an economy, and thus indirectly control the total money supply, in effect expanding money or contracting the money supply. This involves meeting the demand of base money at the target interest rate by buying and selling government securities, or other financial instruments. Monetary targets, such as inflation, interest rates, or exchange rates, are used to guide this implementation.

Since most money now exists in the form of electronic records rather than in the form of paper, open market operations are conducted simply by electronically increasing or decreasing (crediting or debiting) the amount of base money that a bank has in its reserve account at the central bank. Thus, the process does not literally require new currency. However, this will increase the central bank's requirement to print currency when the member bank demands banknotes, in exchange for a decrease in its electronic balance.

When there is an increased demand for base money, the central bank must act if it wishes to maintain the short-term interest rate. It does this by increasing the supply of base money. The central bank goes to the open market to buy a financial asset, such as government bonds, foreign currency, gold, or seemingly nonvolatile (until the 2008 financial fallout) MBS's (Mortgage Backed Securities). To pay for these assets, bank reserves in the form of new base money (for example newly printed cash) are transferred to the seller's bank and the seller's account is credited. Thus, the total amount of base money in the economy is increased. Conversely, if the central bank sells these assets in the open market, the amount of base money held by the buyer's bank is decreased, effectively destroying base money.

The process works because the central bank has the authority to bring money in and out of existence. They are the only point in the whole system with the unlimited ability to produce money. Another organization may be able to influence the open market for a period time, but the central bank will always be able to overpower their influence with an infinite supply of money

Possible targets

Under inflation targeting, open market operations target a specific short term interest rate in the debt markets. This target is changed periodically to achieve and maintain an inflation rate within a target range. However, other variants of monetary policy also often target interest rates: the US Federal Reserve, the Bank of England and the European Central Bank use variations on interest rate targets to guide open market operations.

Besides interest rate targeting there are other possible targets of open markets operations. A second possible target is the contraction of the money supply, as was the case in the U.S. in the late 1970s through the early 1980s under Fed Chairman Paul Volcker.

Under a currency board open market operations would be used to achieve and maintain a fixed exchange rate with relation to some foreign currency.

Under a gold standard, notes would be convertible to gold, so there would be no open market operations. However, open market operations could be used to keep the value of a fiat currency constant relative to gold.

A central bank can also use a mixture of policy settings that change depending on circumstances. A central bank may peg its exchange rate (like a currency board) with different levels or forms of commitment. The looser the exchange rate peg, the more latitude the central bank has to target other variables (such as interest rates). It may instead target a basket of foreign currencies rather than a single currency. In some instances it is empowered to use additional means other than open market operations, such as changes in reserve requirements or capital controls, to achieve monetary outcomes.

How open market operations are conducted

United States

Further information: Monetary policy of the United States
In the United States, as of 2006, the Federal Reserve sets an interest rate target for the Federal funds (overnight bank reserves) market. When the actual Federal funds rate is higher than the target, the New York Reserve Bank will usually increase the money supply via a repo (effectively borrowing from the dealers' perspective; lending for the Reserve Bank). When the actual Federal funds rate is less than the target, the Bank will usually decrease the money supply via a reverse repo (effectively lending from the dealers' perspective; borrowing for the Reserve Bank).

In the U.S., the Federal Reserve most commonly uses overnight repurchase agreements (repos) to temporarily create money, or reverse repos to temporarily destroy money, which offset temporary changes in the level of bank reserves.[5] The Federal Reserve also makes outright purchases and sales of securities through the System Open Market Account (SOMA) with its manager over the Trading Desk at the New York Reserve Bank. The trade of securities in the SOMA changes the balance of bank reserves, which also affects short term interest rates. The SOMA manager is responsible for trades that result in a short term interest rate near the target rate set by the Federal Open Market Committee (FOMC), or create money by the outright purchase of securities.[6] More rarely will it permanently destroy money by the outright sale of securities. These trades are made with a group of about 22 (currently 18 as an immediate aftermath of 08/09 credit crisis) banks or bond dealers that are called primary dealers.

Money is created or destroyed by changing the reserve account of the bank with the Federal Reserve. The Federal Reserve has conducted open market operations in this manner since the 1920s, through the Open Market Desk at the Federal Reserve Bank of New York, under the direction of the Federal Open Market Committee. The open market operation is also a means through which inflation can be controlled because when treasury bills are sold to commercial banks these banks can no longer give out loans to the public for the period and therefore money is being reduced from circulation.


The European Central Bank has similar mechanisms for their operations; it describes its methods as a four-tiered approach with different goals: beside its main goal of steering and smoothing Eurozone interest rates while managing the liquidity situation in the market the ECB also has the aim of signalling the stance of monetary policy with its operations.

Broadly speaking, the ECB controls liquidity in the banking system via Refinancing Operations, which are basically repurchase agreements,[7] i.e. banks put up acceptable collateral with the ECB and receive a cash loan in return. These are the following main categories of refinancing operations that can be employed depending on the desired outcome:

The regular weekly main refinancing operations (MRO) with maturity of one week and,
The monthly longer-term refinancing operations (LTRO) provide liquidity to the financial sector, while ad-hoc "Fine-tuning operations" (in the form of reverse or outright transactions, foreign exchange swaps and the collection of fixed-term deposits) aim to smooth interest rates caused by liquidity fluctuations in the market and
"Structural operations" are used to adjust the central banks' longer-term structural positions vis-a-vis the financial sector.
Refinancing operations are conducted via an auction mechanism. The ECB specifies the amount of liquidity it wishes to auction (called the allotted amount) and asks banks for expressions of interest. In a fixed rate tender the ECB also specifies the interest rate at which it is willing to lend money; alternatively, in a variable rate tender the interest rate is not specified and banks bid against each other (subject to a minimum bid rate specified by the ECB) to access the available liquidity.

MRO auctions are held on Mondays, with settlement (i.e. disbursal of the funds) occurring the following Wednesday. For example at its auction on 2008 October 6, the ECB made available 250 million in EUR on October 8 at a minimum rate of 4.25%. It received 271 million in bids, and the allotted amount (250) was awarded at an average weighted rate of 4.99%.

Since mid-October 2008, however, the ECB has been following a different procedure on a temporary basis, the fixed rate MRO with full allottment. In this case the ECB specifies the rate but not the amount of credit made available, and banks can request as much as they wish (subject as always to being able to provide sufficient collateral). This procedure was made necessary by the financial crisis of 2008 and is expected to end at some time in the future.

Though the ECB's main refinancing operations (MRO) are from repo auctions with a (bi)weekly maturity and monthly maturation, Long Term Refinancing Operations (LTROs) are also issued, which traditionally mature after three months; since 2008, tenders are now offered for six months, 12 months and 36 months. [8]


The Swiss National Bank currently targets the 3 month Swiss franc LIBOR rate. The primary way the SNB influences the 3 month Swiss franc LIBOR rate is through open market operations, with the most important monetary policy instrument being repo transactions


India’s Open Market Operation is much influenced by the fact that it is a developing country and that the capital flows are much different than those in the other developed countries. Thus Reserve Bank Of India, being the Central Bank of the country, has to make policies and use instruments accordingly. Prior to the 1991 financial reforms, RBI’s major source of funding and control over credit and interest rates was the CRR (Cash reserve ratio) and the SLR (Statutory Liquidity Ratio). But after the reforms, the use of CRR as an effective tool was de-emphasized and the use of open market operations increased. OMO’s are more effective in adjusting market liquidity.

The two traditional type of OMO’s used by RBI:

Outright purchase (PEMO): Is outright buying or selling of government securities. (Permanent). Repurchase agreement (REPO): Is short term, and are subject to repurchase.[10]
However, even after sidelining CRR as an instrument, there was still less liquidity and skewedness in the market. And thus, on the recommendations of the Narsimha Committee Report (1998), The RBI brought together a Liquidity Adjustment Facility (LAF). It commenced in June, 2000, and it was set up to oversee liquidity on a daily basis and to monitor market interest rates. For the LAF, two rates are set by the RBI: repo rate and reverse repo rate. The repo rate is applicable while selling securities to RBI (daily injection of liquidity), while the reverse repo rate is applicable when banks buy back those securities (daily absorption of liquidity). Also, these interest rates fixed by the RBI also help in determining other market interest rates.

India experiences large capital inflows every day, and even though the OMO and the LAF policies were able to withhold the inflows, another instrument was needed to keep the liquidity intact. Thus, on the recommendations of the Working Group of RBI on instruments of Sterilization (December, 2003), a new scheme known as the Market stabilization scheme (MSS) was set up. The LAF and the OMO’s were dealing with day to day liquidity management, whereas the MSS was set up to sterilize the liquidity absorption and make it more enduring.[12]

According to this scheme, the RBI issues additional T-bills and securities to absorb the liquidity. And the money goes into the Market Stabilization scheme Account (MSSA). The RBI cannot use this account for paying any interest or discounts and cannot credit any premiums to this account. The Government, in collaboration with the RBI, fixes a ceiling amount on the issue of these instruments.

But for an open market operation instrument to be effective, there has to be an active securities market for RBI to make any kind of effect on the liquidity and rates of interest.

Used Jet Buyers Rock Out Thanks to Plane Customizer

While the poor 99% suffer deflation, the 1% rich use their inflation winnings to buy fancy used planes to inflate themselves in European Castles while avoiding USA taxes. Private-Jet Buyers Rock Out Thanks to Plane Customizer

When it comes to the trappings of wealth, few cities can outclass London. Stores in Westminster traffic in super-yachts, while plutocrats construct Olympic-sized swimming pools in their Belgravia basements.

Now, thanks to Steve Varsano -- a guy from Hoboken, New Jersey, who made his money in private equity -- they can even impulse-buy a plane. Rather than hunker down in a dingy airport office complex the way most brokers do, Varsano has set up The Jet Business on Hyde Park Corner

There, he’s opened the world’s first retail showroom dealing in used jets, ranging in price from $10 million to $100 million. (Because new jets can take more than a year to deliver, the mega-wealthy often prefer pre-owned planes they can take possession of sooner.) The ground-floor space, formerly a hedge-fund headquarters, looks like an amusement-park ride for billionaires. It features a 50-foot mock-up of an Airbus ACJ319 business jet cabin, replete with club chairs, a galley and a video-simulated sky with clouds floating by.

Varsano’s staff can track all of the used private planes on the market at any given time from a pod of desks that resembles a cockpit. And when showing available planes, he employs a wall-sized bank of screens to immerse customers in the capabilities and luxe interiors of their very own sky castles. He can even flick a switch and smoke the windows so that his clientele of Arab sheiks, Chinese tycoons and Russian billionaires can’t be seen from the street.

“A lot of them are quite shy,” says Varsano

They’re also quite insistent. Many demand showers, treadmills and drop-down movie screens, while others have requested disco balls, flashing lights and state-of-the-art sound systems so they can rock out at 50,000 feet.

One of Varsano’s Middle Eastern clients even had a system developed that perpetually reorients passenger seats toward Mecca. Such comforts don’t come cheap:

While the $30 million asking price for a six-year-old, 14-passenger Dassault Falcon 7X is 40 percent off a new one, it still costs bucks to outfit the interior.

The club chairs go for $40,000 apiece because, according to international air-safety regulations, they must be able to withstand 16 Gs without breaking up. “You’ll be dead at 6 Gs, but rest assured, the chair will be OK,” says the dapper Varsano, who favors Canali suits and Michel Jordi watches.

And then there’s the cost of keeping the Dassault aloft: $5,700 an hour

American inventor Bill Lear pioneered the first private jets in the 1950s, and corporations and the superrich have purchased pre-owned planes the same way ever since: They go to brokers with established networks of mechanics, owners and pilots who informally know who’s looking to sell.

Tuesday, October 8, 2013

Beautiful Arkansas perfect fall weather, booming economy, new university

Back from NWA Northwest Arkansas. Impressive fast growing economy reminding me of Silicon Valley 1970. Quite a lot of money spent all over on shopping, housing, offices, restaurants, universities, schools, infrastructure but in some areas cows and horses and older housing some very high quality. Confederate Cemetery atop the best hill in town. Lots of Mexicans. Many competent people all over in a rush. A nearly brand new university in Fort Smith. Most impressive is the quantity of hospitals and medical facilities. USA is becoming too sick. Too much traffic on a road system that cannot keep up with demand, leading to too many jamsand a general mess. A lot to like but every time I drive thru there I do not want to return.

View on College Avenue Fayetteville next to University of Arkansas. This girl should wear a helmet and put her phone away and wear leathers. Dangerous. May be a reason for so many hospitals and Obama-care.

Saturday, October 5, 2013

Defeat hackers by in Los Angeles

I woke up to a thunderstorm and rain all morning so I lifted weights until noon. Then the temperature dropped 20 degrees while I walked 2 hours. Sore but getting strong.

Blogs and websites should be short and snappy dot coms, easy to spell and remember.

Set up a special domain and email address for communications to banks. Keep it secret. It should be long and complicatedsuch as

0bama-is-a-complete-idiot-socialist-and-maybe-a-black-muslim-jihadist @

and a long password. The full domain name may not exceed the length of 253 characters

You can buy a domain for $5.99 per year if you prepayfor 5 years. Then the email address costs $2.99 per year. Spammers and hackersoften send lots of mails at random until they guess your email address. Especially vulnerable is the most popular free mails:gmail hotmail aol yahoo gmx ... Your own custom complicated domain will probably not get any spam. I have numerous address that I never get anything at, spam or otherwise. But numerous other addresses got too much spam so I had to close them down. seems to be the cheapest and most popular among professional webmasters. A West Los Angeles (I-10 @ I-405 just south of the VA hospital) company started by Harvard MBA with nerds and attractive females on staff(Movie stars?) is fine but more expensive. ( is what I use -- very powerfulcomplete unlimited hosting package that costs more.)

* Show
* *By Popularity*
* *By Extension Type*

Popular Domain Extensions

TLD Registration Transfer Renew Reactivate WhoisGuard
.com $10.69/yr* and lower
$9.69/yr* $10.69/yr*
and lower
$10.69/yr* yes
.net $11.48/yr* and lower
$10.48/yr* $11.48/yr*
and lower
$11.48/yr* yes
.biz $11.04/yr and lower
$10.04/yr $11.04/yr
and lower
$11.04/yr yes
.org $11.48/yr and lower
$10.48/yr $11.48/yr
and lower
$11.48/yr yes
.pw $3.98/yr Reg $8.88/SPECIAL!/ N/A $8.88/yr N/A yes
.co $12.88/yr Reg $22.99// $22.99/yr $22.99/yr
and lower
$22.99/yr yes $6.58/yr and lower
Min: 2 years
and lower
$6.58/yr no
.in $8.69/yr Reg $9.99// $8.69/yr
Reg $15.99// $9.99/yr
and lower
$9.99/yr no
.us $7.99/yr and lower
$7.99/yr $7.99/yr
and lower
$7.99/yr no
.me $8.99/yr Reg $18.99/SPECIAL!/ $15.99/yr $18.99/yr
and lower
$18.99/yr yes
.info $10.47/yr and lower
$9.69/yr $10.47/yr
and lower
$10.47/yr yes $17.88/yr N/A $17.88/yr N/A yes .ca $11.98/yr and lower
$11.98/yr $11.98/yr
and lower
$11.98/yr no
.mobi $8.98/yr Reg $14.99/SPECIAL!/ $13.99/yr $14.99/yr
and lower
$14.99/yr yes
.xxx $84.89/yr N/A $84.89/yr $84.89/yr yes .tv $24.99/yr and lower
$24.99/yr $24.99/yr
and lower
$24.99/yr yes
.pe $49.98/yr $49.98/yr $49.98/yr N/A yes $6.58/yr and lower
Min: 2 years
and lower
$6.58/yr no $6.58/yr and lower
Min: 2 years
and lower
$6.58/yr no
.cc $18.99/yr and lower
$18.99/yr $18.99/yr
and lower
$18.99/yr yes
.asia $12.99/yr Reg $16.99/LIMITED TIME!/ N/A $16.99/yr
and lower
$16.99/yr no $14.98/yr Min: 2 years
N/A $14.98/yr
Min: 2 years
N/A no
.es $9.98/yr $9.98/yr $9.98/yr N/A no

Friday, October 4, 2013

Social Catastrophe: Miley Cyrus: Raunchy and Topless for Controversial Photog Terry Richardson

She is only 20. Human brain is not fully developed until age 25. Miley Cyrus well reflects her times and culture "white trash" hillbilly from Kentucky, probably Scotch-Irish (looks a lot like me). Her 3 minute video "wrecking ball" was fairly good (with the help of 5 song-writers and a major director). She has been performing most of her 20 years and has had all the instruction and advantages. She has some talent but cannot compete with the best in singing or looks. So she becomes outrageous. She is rich, aggressive. She can act. She may make more money over the next 80 years than most of here competitors. Her father is also successful despite little talent. A diseased, doped up population cannot appreciate fine art.

SHTF already in terms of USA culture. Confucius said: “If one should desire to know whether a kingdom is well governed, if its morals are good or bad, the quality of its music will furnish the answer.” -Confucius

Miley Cyrus: Raunchy and Topless for Controversial Photog Terry Richardson (View Pics)

Posted by Roger Friedman

Miley Cyrus continues to trash and burn poor little Hannah Montana. Now she’s topless and fully out there on Terry Richardson

I thought Miley was just “taking the piss” to sell albums and get attention. But now, you know, I think “crack up” is coming.

miley 2 terry richardson

america's sweetheart

miley topless

Thursday, October 3, 2013

blogs, politics, computer security, From Facebook. Veterans Museum

Even Communist China lets bloggers blog with impunity as long as they do not encourage readers to get together in person where they might start a demonstration or revolution. USA lots bloggers blow of steam at home so they will not get mad enough to move to Washington DC and work to undermine the government. 99% sheeple stay at home and get brainwashed by the liberal news media, and dumbed down by drugs and junk food stamps. I went shopping today and noted in several stores 5 pound bags of sugar for $1.99 that has been shown to cause diabetes, cancer, obesity, heart disease, Alzheimers, Senile Dementia, and numerous other diseases.

Myself, I don't want my politics to be secret. I want to give them a piece of my mind. I would prefer to blog broadly and speak in public in hopes that politically correct idiots might learn something. I just don't have time to blog.

It is easy for conspirators to encrypt files and share them online by email, facebook, websites,... in plain sight. Then there are more secure and secretive ways to communicate anything. NSA FBI CIA cannot stop it or even find out what is going on, even in the USA, much less overseas. They are just wasting tax money and thus causing government to shut down (probably the only good to come out of their work).

Gentoo Linux is a very fast and secure, simple operating system. It is nearly impossible to hack or track if set up right. It runs fine on old computers that you can find in trash cans because it is so fast and efficient. Install wipes out the junk already on the computer and compiles lean and clean for the specific machine. Much better than Apple or Microsoft.

My next gizmo: Walmart $200 Google Chromebook based on Linux that is probably better than Apple or Microsoft but I have not investigated much yet. Is not setup secure which is ok by me. For banking and financials I will setup a Gentoo Linux computer to avoid getting hacked and tracked.

Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users machines is of utmost importance to us. The Gentoo Linux Security Project is tasked with providing timely information about security vulnerabilities in Gentoo Linux, along with patches to secure those vulnerabilities. We work directly with vendors, end users and other OSS projects to ensure all security incidents are responded to quickly and professionally.You can find a document describing the policy the security team follows to treat the vulnerabilities found in the Gentoo Linux distribution on the Vulnerability Treatment Policy page.The Gentoo Security Handbook gives information and tips for building a secure system and hardening existing systems.

is a computer operating system built on top of the Linux kernel. It is free and open source software. Unlike a conventional software distribution, the user compiles the source code locally according to that user's chosen configuration. The project is named after the fastest-swimming penguin, the Gentoo, to reflect the potential speed improvements of machine-specific optimization. Gentoo package management is designed to be modular, portable, easy to maintain, flexible, and optimized for the user's machine. Gentoo describes itself as a meta-distribution, "because of its near-unlimited adaptability", in that the majority of users have configurations and sets of installed programs which are unique to themselves

no software which is irrelevant to the administrator will exist or be running on the machine, which means that a given computer running Gentoo is only vulnerable to security threats among programs the administrator actually intends to be used. Because the software is chosen by the administrator and also compiled by the administrator, it further means support for software the administrator does not intend to be used may also be dropped. These two ideas together would mean the computer was invulnerable to any security exploit found in software not explicitly installed by the administrator, as well as that no perpetual disk space or memory would be needlessly allocated.

Wednesday, October 2, 2013

no track, no hack. Practical suggestions for online privacy

Criminals can easily evade law enforcement on the internet no matter what NSA FBI CIA come up with. Innocent sheeple are the ones getting tracked and hacked.

Avoid tracking and hacking, cheap and easy. Steps to defeat most tracking and hacking:

Turn off computer when not in use. Hackers can take over your computer for nefarious purposes. Don't help them. Also save electricity and cool your house. Turn off the modem and router too unless you need heat in the house. Wireless WIFI may cause cancer. Unplug electrics when not in use to protect from lightning and arthritis.

Set your browser to remove all cookies when it closes (i.e. when computer is turned off). Cookies is the main way they track you. No cookie == no track. Flush cookies during the day or restart your browser frequently. Close windows and tabs ASAP.

Pay $5 per month for a VPN Virtual Private Network from iPreditor in Sweden that will hide your IP address.

There are many temporary email address services. You do not have to give out any information to have an email address. That will defeat many email login services. Use cheap and easy email trick from:

Never login with Facebook, Twitter, etc. Don't reveal or link your account from one service to another service. Set up a separate email address for each service you sign up for. avoid login to any site.

Avoid apps -- they have a serial number that you can't remove.

NoTrax browser and similar will help defeat tracking.

ixQuick and similar search engines will keep your searches private.

Ideally you need a search engine that does not even return results for sites that try to track you. And a browser that will not even visit sites with any tracking bugs on it. I have not found these. Probably it would not turn up many sites.

The internet is not as free as it appears. You are the product.

Fortunately true science and university sites don't track at all and their information is much better. Search for pdf that is usually paper quality science writing.

NoTrax is the secure tabbed Internet browser that leaves no record of your Internet activity on your PC. It is independent of Internet Explorer or Netscape. It does not write to the Registry during browser sessions. No more index.dat worries. It does not store any information randomly on your PC; it does not use the Recycle Bin; and it does not create any application logs. It erases session files, cookies, and the cache, using secure deletion methods during and on exit from browser sessions. The cache is held and erased in memory. It also comes with an erase cache button that you can activate at any time during browsing. The cache is encrypted using Blowfish. NoTrax supports SSL (Secure Socket Layer) and TLS (Transport Layer Security). The root certificates are built-in. It comes with an automatic shutdown option if idle for a certain amount of time (you decide). NoTrax does not run spyware, JavaScript, or ActiveX.

10 Ways Ixquick Helps You Take Back Your Privacy

Ixquick doesn't store your IP address, use tracking cookies, or make a record of your searches.

We do not keep any information about the people who search through Ixquick or what they search for. Nothing. Nada. Zilch.

Ixquick protects you from NSA surveillance and spying.

Your search session with Ixquick is protected through powerful SSL encryption so no one - not hackers, not your ISP, not even the federal government - can eavesdrop on your searches. (Read more here)

Ixquick gives you high quality results in complete privacy.

When you search with Ixquick, we remove all identifying information from your query and submit it anonymously to multiple other search engines for you. We get the results and return them to you in total privacy.

Ixquick is a Dutch company, so it is not under US jurisdiction.

Because our company is based in the Netherlands, US data collection programs like PRISM, the Patriot Act, FISA courts, etc. do not directly apply to us. We have never cooperated with spying programs like PRISM. (Plus we have no user data to begin with.)

Ixquick offers a free proxy with every search.

With our proxy, not only can you search privately, but you can view the pages you find through Ixquick anonymously and in complete security. To learn more, please see our combined Startpage/Ixquick proxy overview video here.

Ixquick is third-party certified for privacy.

We not only promise our users total privacy, we back up those claims with rock-solid evidence, through stringent third-party auditing and certification. Here are details:

Ixquick has been doing privacy longer than anyone else - since way before privacy was "cool". Our company was founded in 1999, and we've been focused on privacy since 2006. When it comes to security, Ixquick runs the tightest ship on the Internet.

We've been ahead of the privacy curve for years, and we consistently outscore other search engines on independent measures of security. We were the first search engine to offer default SSL encryption, and now we are the first private search engine to offer Perfect Forward Secrecy and the latest version of Transport Layer Security.

Ixquick breaks you free of the search engine "Filter Bubble".

Major search engines now "personalize" or "pre-screen" the search results they serve you, based on what they know about you from past searches and other services you use. While some people love this, others see it as privacy-invading censorship. Regardless of your views, with Ixquick, you get clean, anonymous, non-filtered results every time, because nobody knows who you are.

By using Ixquick, you send a powerful pro-privacy message in the marketplace.

Each time you use an online service, you cast a vote in support of the policies and practices of that service. By using Ixquick, you are casting a powerful vote for a private Internet where people can access information anonymously without fear of government surveillance or reprisal.

Privacy. It's not just our policy, it's our mission.

Tuesday, October 1, 2013

2 Win: you are tracked online: computer privacy

Another excellent article (on the radio too).

I don't care if they trackme, but it is fun to defeat them. They talk about easily defeated tracking mechanisms like cookies and IP address. Some tips:

1) Avoid login websites.

2)Avoid tracking websites (they show up easilyon ghostery etc. browser plugins.) Many such sites are a waste of time anyway.

3) I add and cancel services with reckless abandon. So lack persistence that they could track. Adds confusion if they do track because I subscribe to stuff I do not care about sometimes just for curiositylearning experience 1 day.

4) Use different usernames and passwords for each siteif I have to login. I make these more and more complicated.

5) Use different email addresses for each site. I buy custom domains for email addresses and shed them frequently. Avoid hotmail, aol mail, yahoo mail, or any USA freemail.

6) Most importantand easy: Set preferences to flush cookies when close browser. I close browser and turn off my computer when not in use (protects computer from lightning storms too). I also use 6 browsers each with different cookies. So cookies are flushed at least daily, maybe several times per day.

7) IP address. It is easy to set up a VPN tunnel so you each time you turn on the computer you get a new IP address, like from UK, Sweden, Lithuania, Kansas City or somewhere that relays all your communications through that distant place so trackers think you are in that distant place and have no idea who you are or where you are:

You really should be using a VPN, and even if you don't think so now, at some point in the future you may consider it as important as your internet connection.

The most important thing you need to know about a VPN: It secures your computer's internet connection to guarantee that all of the data you're sending and receiving is encrypted and secured from prying eyes. The privacy minded and security advocate. Whether they're a in a strictly monitored environment or a completely free and open one, this person uses VPN services to keep their communications secure and encrypted and away from prying eyes whether they're at home or abroad. To them, unsecured connections mean someone's reading what you say.

Ipredator is a Swedish VPN provider with a starting rate of $8 USD per month. It appears that currently PPTP is the only protocol supported, but OpenVPN support is in beta testing. It appears that their one exit point is in Sweden, which does have strong data and privacy protection laws.