Saturday, September 8, 2018

7 steps to reducing the risk of a cyber attack


For most forms of life, the threat of attack—from a predator, changing environmental conditions, lower forms of life (such as bacteria and viruses), or some other force—is ever present. Indeed, for many of the natural world’s inhabitants, the question is not ifbut rather when they will be subject to some form of attack—and how (or whether) they will respond and emerge from the experience.

Businesses, of course, face an analogous situation and must contend with their own potential threats. Most companies therefore make risk identification, assessment, and mitigation a high priority. Yet there is a specific type of threat today for which many companies, in our view, are significantly underprepared: the risk associated with IT and information management. As digitization’s role in companies’ operations continues to grow—according to Ben Hammersley, contributing editor at Wired UKmagazine, “Cyberspace is becoming the dominant platform for life in the 21st century”—companies’ vulnerability to data theft, leakage of intellectual property, corporate sabotage, denial-of-service attacks, and the like is growing apace. The damage such events can pose to a company’s profits, reputation, brand, competitive position, and even viability is potentially vast. One technology company, for example, sustained material damage to its business as a result of extensive hacking of its systems. 

Another suffered considerable harm to its reputation after a breach compromised the security of its customers’ personal data.

In the natural world, a strong immune and defense capability is essential for survival (much as in human society, vaccines and health care systems are critical to protecting life). For today’s companies, the ability to safeguard IT systems and information may be equally vital. To properly arm themselves, companies must understand the IT and information-related risks they face and construct sufficiently robust protection systems—and they must do so with an eye toward controlling costs and minimizing any negative impact on the business. Of course, perfect security is beyond any company’s reach. 

The trick is to determine and provide the right amountof defense, at a reasonable cost, and to do so without significantly compromising the organization’s business practices or culture. Moreover, the company must strike this balance while understanding and managing the risks associated with security-related compromises. In our experience, few companies have so far managed to achieve this.

Who Is at Risk?
As a rule, the companies that are most at risk of an attack and its consequences are those in which information drives a large portion of value generation and passes through many interconnected systems. Industries with complex application and system landscapes are also at high risk, as are those that rely on complex or meshed networks. Companies in these categories include banks, automotive suppliers, and energy companies (which face a range of vulnerabilities along their entire value chain, including generation, distribution, and infrastructure).

Companies whose business is driven to a large degree by mobile transactions are also at particular risk. (In many Asian markets, for instance, mobile online transactions now exceed the number of transactions conducted through the traditional desktop platform.) For such companies, rapidly growing mobile transactions can translate into swelling revenues—as well as greater likelihood of a breach and data theft. It can also make them increasingly attractive targets for hackers and the like as these companies accumulate larger and more varied types of customer data.

In general, businesses that process large amounts of customer and financial information (credit card details, for example) likewise face an elevated risk, with small and medium-size firms especially vulnerable. Many of these smaller businesses lack the budget and skills necessary to properly safeguard their online or point-of-sales environments, for instance, making them popular targets.
As value creation becomes increasingly digitized across the corporate landscape, however, virtually all companies are becoming more vulnerable—and concerns are rising. (See Exhibit 1.) Health care companies, telecommunications businesses, media companies, public-service organizations, and industrial and consumer goods businesses rich in intellectual property are all increasingly likely targets that have much to lose if their IT systems and information are not sufficiently secure. (See The Trust Advantage: How to Win with Big Data, BCG Focus, November 2013.)
exhibit

After all, the targets of hackers and data thieves are often not the systems themselves but rather the information they store and process. And the value of that information often lies in the eyes of the (illegitimate) beholder. Strategic plans and information related to a company’s market, production, and pricing strategies are obviously high-value assets that must be carefully protected. But other information, which the company might deem far less critical, could well be of utmost interest to competitors, criminals, nation-backed third parties, or the public. (A food services company, for example, might consider its customer orders to be of relatively little value to third parties and might not go to great lengths to protect that information; but if, say, one of the company’s customers happens to be a law enforcement agency, an atypically large order on a given day could signal to an interested outsider that the agency is planning a major operation.)

And the circle of organizations at risk continues to widen. IT security is quickly becoming a critical concern for companies that use computers not just to crunch numbers but to monitor, move, and control critical equipment, machines, and production lines. For such companies, compromised IT security of their cyberphysical systems can have severe operational and health, safety, and environmental implications. A slightly maladjusted welding robot, for example, could do considerable damage to a car’s stability—and its manufacturer’s reputation. The Stuxnet computer virus is another, still top-of-mind example of the potential risk at hand. So it is no surprise that such companies are focusing more and more on industrial IT security.

In short, the problem now spans businesses of all types. But it does not stop there. Governments are clearly vulnerable to IT and information security risk, and increasing numbers are taking defensive actions. The UK’s Centre for the Protection of National Infrastructure, the U.S. National Cybersecurity and Communications Integration Center, the Australian Signals Directorate, and Germany’s National Cyber Response Centre and National Cyber Security Council are entities that have been created specifically to focus on the problem.
Optimizing IT and Information Security
A program intended to provide effective security for a company’s information and the technology used to store and process it must address a number of critical elements, including the following:
  • Confidentiality: the information is accessible only to those who have either a right or a need to view it.
  • Integrity: the information is accurate, valid, and reliable.
  • Availability: information, resources, and services are available when needed.
  • Accountability: each (trans)action can be attributed to an accountable individual.
  • Provenance: the origin and history of each piece of information (or each data item) are known and well defined.
Such a program must also provide clarity and reasonable assurance regarding the reliability of controls and the validity of the assumptions underpinning the effort. The priority associated with each of these elements will vary depending on the type of company and industry.

To ensure that their security campaign is sufficiently robust, companies must view the effort through a number of lenses. Three of the most important are technology, cost, and the potential negative impact of risk and the measures taken to mitigate it. Getting the technology right entails, as a first step, understanding and quantifying the value of the risks that the company is trying to mitigate. Then the company should identify the technologies that are available for dealing with the risks of greatest concern: the mix of firewalls, intrusion detection and prevention systems, and data leakage protection that will be most effective. The company must also work to understand the use of these technologies in light of industry and national regulations—in some countries, for example, using technology to automatically identify and delete spam may violate constitutionally protected communications.

Cost is obviously another key consideration. Given that a totally secure environment is impossible to create, a company must determine the base level of security it needs—in other words, what is the maximum risk (reputational, operational, or financial, including the cost of remediation) that the company is willing to live with—and then gauge the marginal value of any additional security to be gained through further spending. The company can then decide what level of spending is optimal given its business strategy, tolerance for brand and operational risk, and other considerations. While this sounds like a reasonably straightforward assessment, it is not an easy one, and we find that most companies labor with it.

Finally, it is essential to take into account the potential negative impact on the business—including its culture, flexibility, ability to innovate, and speed of innovation—of both unmanaged risk and any risk-mitigation measures that are put in place. As with cost, this is ultimately a question of balance, and companies will have to identify their particular sweet spot. We have seen a number of companies struggle with this, including several resource and engineering companies that operate internationally. One of them, in an effort to minimize the risk of data theft and espionage, does not allow its employees to bring their laptop computers and mobile devices to countries it deems high risk. The logistical challenges that this policy can pose to employees are considerable. What, for example, should an employee do when his or her itinerary for a regional, multicountry business trip calls for a visit to a high-risk country at the midpoint? Leave all this equipment home, at the expense of efficiency throughout the trip? Or follow the somewhat questionable advice of the IT department and take twolaptops on the trip but leave the one containing sensitive information at the hotel in the high-risk location?

Similarly, a large technology company takes a very rigorous approach to elevating its IT and information security. It does not allow its employees to store company data anywhere except on company-issued computers, and it does not enable wireless local-access networks within its offices. Further, the company does not allow visitors from satellite offices to bring their company-issued notebook computers into office headquarters—instead, visitors are given “empty” computers upon arrival. For employees, this makes the execution of standard work tasks, such as accessing presentations and answering e-mails, very challenging. Returning to the metaphor of the human immune system, this is the equivalent of an allergic or even an autoimmune reaction, in which the system attacks perfectly harmless external or internal elements, compromising the body’s overall ability to function properly.

Protection against leakage of intellectual property is a particular and rapidly growing concern for many companies and can force many difficult decisions. Should a company worried about leakage through employees’ outbound e-mails, for example, block all such transmissions or remove all attachments? Doing so would solve the immediate problem but could introduce new ones—for example, the risk of losing business when a contract is stripped from an e-mail and never reaches its intended recipient. This approach can also reduce efficiency and potentially spur employees to find alternative means of communication that the company cannot monitor. (Indeed, we have seen employees of larger companies resorting to external “freemail” accounts to get their work done after trying, unsuccessfully, to change company e-mail policies that they considered impractical.) 

Taking the opposite approach of allowing (but monitoring) all outbound communications also has trade-offs: the company’s open culture is maintained but the potential for leakage grows, necessitating investment in monitoring technology, a fast detect-and-response capability, and related staff.
These examples illustrate the types of decisions that companies will increasingly have to make. They also hint at the many complexities companies will face as they attempt to ensure security across their ecosystems—that is, the universe of organizations that they deal with in the course of operations. Note, too, that the trade-offs involved in these decisions are likely to be very different for business IT (where confidentiality is often paramount) and industrial IT (where availability is often the top priority).

Companies should aim, of course, to “do no harm” in their efforts to balance the efficacy of security measures against established norms. In cases where security measures do impinge on corporate culture and established ways of operating, companies should ensure that the necessary changes are actively managed.
Treating IT Security as a Component of Overall Risk Management
There is no ex-ante, readily calculable return on investment for IT security—like homeowner’s insurance or a car with extra air bags, it is money spent today to mitigate the risk and potential cost and impact of events that may never materialize. Hence, IT security should be viewed as a necessary cost of doing business. It should also be viewed as a component of the company’s overall IT risk-management program, which, in turn, should be considered an integral part of overall corporate risk management. (See Exhibit 2.) Often, however, we find that companies do neither.

Emerson on Solitude *Another One of the Greats


n the topic of solitude, Ralph Waldo Emerson (1803-1882) has been largely overshadowed by his protégé Henry David Thoreau (1817-1862), whose practical experiences in nature and the outdoors gave Thoreau a rich store of material for musing and writing. But while Emerson was strictly a writer and lecturer, his command of literary sources and observational skills make for a comprehensive  treatment of the topic of solitude, especially in three works: Society and SolitudeSelf-Reliance, and Nature.
Emerson's essays are constructed on aphoristic reflections; he is not a system-building philosopher but relies on intuitive faculties in his readers. A masterful stylist, Emerson conveys his arguments in multiple and cumulative perspectives. This was the method of Transcendentalism, of which Emerson was the chief representative.
Society and Solitude
Emerson approaches the notion of society with a practical sense of association: being "in society" means, at this introductory level, being among people. Similarly, Emerson takes "solitude" to refer, first, to a sense of being alone or the acting and thinking conducted within the self. But these are practical uses which will spiral into deeper senses in reading his entire works.
The essay opens with an anecdote. Emerson has encountered a "humorist" of imminent intelligence who has lost faith in his abilities to succeed in society, that is, among people.
He left the city; he hid himself in pastures. The solitary river was not solitary enough: the sun and moon put him out. When he bought a house the first thing he did was to plant trees. He could not enough conceal himself. Set a hedge here; get oaks there -- trees behind trees; above all, set evergreens, for they will keep a secret all the year round. The most agreeable compliment you could pay him was to imply that you had not observed him  in a house or a street where you had met him. ...
[He claimed that he was] "only wanting only to shuffle off my corporal jacket to slip away into the back stars, and put diameters of the solar system and sidereal orbits between me and all souls -- there to wear out ages in solitude, and forget memory itself, if it be possible."
Emerson's confidant is eccentric and reclusive but not all unsocial or misanthropic, a person of philosophical bent, not unlike Emerson himself. Emerson empathizes with the project of solitude, owning that "genius feels the necessity of isolation." He quotes Swedenborg that "There are also angels who do not live consociated, but separate, house and house. They dwell in the midst of heaven, because they are the best of angels." Solitude is contrasted with "consociation," and genius assigned the loftiness of heaven.
When Emerson calls solitude a "disease," he intends to contrast it to what society proposes as health. He remarks that there are only two cures or paths for those who have seen through society: "either habits of self-reliance" or else a "religion of love."
Emerson thus unravels a concept of solitude that begins in the mundane, in social relationships, and evolves into something deeper, depending on the individual and the capacities of the individual. "The necessity of solitude is deeper ... and is organic." But Emerson does not expect everyone to catch on to this, only those with a sufficient degree of eccentricity and genius.
Thus, says Emerson, "We begin with friendships, and all our youth is a reconnoitering and recruiting of the holy fraternity they shall combine for the salvation of men." But friendship is elusive. Friends separate as they know themselves better. Cooperation among friends changes from voluntary to involuntary. A "moral union" is possible between two people, be it friendship or love, but never an "intellectual union."
Reflection reveals to us that we are ultimately alone and in solitude. "Ultimately, how insular and pathetically solitary are all the people we know!" says Emerson. It is the isolation and pettiness of others that mirrors to us the realization that we are alone and in solitude. Nor is it that others are fickle and wrapped in their ways and thoughts. We know that we are, too.
Emerson has begun his exploration of solitude with the psychological and social interrelations between people. He realizes that we are "clothed with society," that we are products of the society and culture in which we grew to adulthood. This culture is not conveyed just in books and learning but in people encountered in our daily lives. And because we are dressed in society, "dressed in arts and institutions," as he puts it, it is easy to feel functional, to feel whole and self-sufficient by flowing with society's standards.
Those who are sensitive to their inner difference from society and other people will feel like "bystanding witnesses." Even practically speaking, "people are to be taken in very small doses. If solitude is proud, so is society vulgar." Emerson compares society to a dinner party, where it is clear who gets along and who does not. In the world, "solitude is impractical and society fatal." Indeed,
We require such solitude as shall hold us to its revelations when we are in the streets and in palaces; for most men are cowed in society, and say good things to you in private, but will not stand to them in public. But let us not be the victims of words. Society and solitude are deceptive names. It is not the circumstances of seeing more or fewer people but the readiness of sympathy that imports; and a sound mind will derive its principles from insight with ever a purer ascent to the sufficient and absolute right, and will accept society as the natural element in which they care to be applied.
Emerson strives for a necessary balance, a realistic solution for the solitary who must function in the world. He will offer no radical advice to recluse oneself. Rather, by becoming conscious of the components of what today would be called psychology, one can know oneself sufficiently to "perform" social functions while safeguarding that core of self in solitude.
Self-Reliance
In the essay Self-Reliance, Emerson pursues more vigorously the virtues that the person must exercise in spite of society's demands. The realization of the self must begin with the application of inner power or will, available to anyone, while understanding the context of our lives.
Trust thyself: every heart vibrates to that iron string. Accept the place the divine providence has found for you, the society of your contemporaries, the connection of events. Great men have always done so, and confided themselves childlike to the genius of their age.
We must not wish that we were someone else or lived somewhere else or in another era. This is the first  step to maturity and personhood. The facticity of being an individual is a  subtle distinct from this mature personhood. From this realization we ascend to a new level of observation and a new consciousness.
Whoso would be a man must be a nonconformist. He who would gather immortal palms must not be hindered by the name of goodness, but must explore if it be goodness. Nothing is at last sacred but the integrity of your own mind.
Understanding the society and culture of our time enables the person to examine what the virtues of his or her society and culture are or purport to be, to test whether these values are true, wise, and good. Inevitably we will conclude that they are not. So we will be in our own way a nonconformist, even if this way is only to opt for simplicity and solitude, let alone to oppose all that society and power does. The integrity of our mind, as Emerson puts it, will be the validating criterion for our virtues.
What we discover in our selves becomes compelling because it constantly reinforces our strengths,  abilities, and will.
What I must do is all that concerns me, not what the people think. This rule  equally arduous in actual and in intellectual life, may serve for the whole distinction between greatness and meanness. It is the harder because you will always find those who think they know what is your duty better than you know it. It is easy in the world to live after the world's opinion; it is easy in solitude to live after our own; but the great man is he who in the midst of the crowd keeps with perfect sweetness the independence of solitude.
Emerson thus links self-reliance to a mature attitude toward solitude -- and not just a solitude wherein we relish our thoughts and interests but a mature and informed solitude that we retain while "in the midst of the crowd."
How we manage this balance will determine our "integrity of mind." Emerson owns that "for nonconformity the world whips you with its displeasure." We can expect the reaction of others to be negative. Such reaction will test our own thorough self-knowledge. We have the solace of knowing that society and its reactions are historically conforming to power, authority, and pleasure, all to the destruction of individual will and those who respond to worldliness by dropping out of it psychologically, materially, or literally -- all degrees of exercising solitude. "Let us affront and reprimand the smooth mediocrity and squalid contentment of the times," writes Emerson, for ultimately, "The world has been instructed by its kings." Not by its sages or solitaries.
At this point, the individual is on the brink of recognizing the power of intuition, which Emerson calls "primary wisdom." Because intuition is an individual criterion of moral and other judgment rather than a social one, the majority of people, unable or unwilling to develop their intuition, fall back on external authorities. Emerson argues that even sages and saints are such authorities. He wants individuals to carry the burden or responsibility of maturing their will and their intuition independently.
Nature is this model of primary wisdom. Nature does not refer back to authority or precedent.
But man postpones or remembers; he does not live in the present, but with reverted eye laments the past or, heedless of the riches that surround him, stands on tiptoe to foresee the future. He cannot be happy and strong until he too lives with nature in the present, above time.
Hence, intuition and individual exercise of self-existent virtues are to Emerson "divine fact." Only with maturation of these virtues can our solitude be truly functional. At that point, "your isolation must not be mechanical but spiritual, that is, must be elevation." Here is a near-definition of Transcendentalism. The individual will manifest to others a higher ethic, "eternal law" versus social conformity.
Emerson concludes Self-Reliance with a number of aphorisms. First he presents that which is opposite to self-reliance: discontent, regret, creeds (which he calls "a disease of the intellect"), superstition (a "fool's paradise"), travel to seek enlightenment, property or a government to protect it. Rather,
Insist on yourself; never imitate. Your own gift you can present every moment with the cumulative force of a whole life's cultivation; but of the adopted talent of another you have only an extemporaneous half-possession. ... Nothing can bring you peace but yourself. Nothing can bring you peace but the triumph of principles.
Nature
We have seen how Emerson considers Nature a model for living in the present. He elaborates on the topic in the essay of the same title. Here Emerson sees nature as wilderness, a setting distinct from both self and society. But he sees it from the point of view of solitude.
To go into solitude, a man needs to retire as much from his chamber as from society. I am not solitary whilst I read and write, though nobody is with me. But if a man would be alone, let him look at the stars. The rays that come from those heavenly worlds will separate between him and what he touches.
Thus Emerson now progresses from solitude as the absence of socializing to solitude as the confirmation of the individual with the attributes identified in Self-Reliance.
In nature one feels rightfully placed, and can rightly place self and the world. But it is not an automatic revelation. The receptivity within the self accomplishes this sense of harmony between nature and self, of nature as process and result. While nature provides commodities to serve human needs, nature must be subtly appreciated in order to see its beauty as a spiritual expression of virtue allied against perverse human will.
Nature is an object of our intellect when we seek out meaning and are prompted to creativity. "Nature is a discipline of the understanding in intellectual truths," writes Emerson. Nature's objects provide a discipline in cognition, in utility, in our own will. Rightly understood and appreciated, "Nature is made to conspire with spirit to emancipate us." Not understood, nature seems hostile and violent, projections of our own immature minds. Only a thoughtful solitude, outside chamber and society, will give us these essential insights.
Solitude and Friendship
Many more essays of Emerson reveal insights on solitude rightly understood. On the vital issue of friendships and degrees of intimacy, Emerson writes observantly.
He begins by noting that because each individual experiences a "calling in his character," and bears a particular constitution of mind and body, each person's amenable faculties are appropriate for a certain kind of work. The sum of faculties constitute a talent. The individual thus comprehends possibilities and ambitions. These ambitions must be exactly proportional to the person's powers, both as skills and psychological and physical constitution. Proper work thus creates an unfolding of self, an expression.
So far this is a good summary of the individual on the brink of the world, on the cusp of society. Emerson now takes the individual into the potential for social relations, specifically friendships.
The criteria for friendship must be implemented when this process of self-realization is reached.
Only that soul can be my friend which I encounter on the line of my only march, that soul to which I do not decline and which does not decline to me, but, nature of the same celestial latitude, repeats in its own all my experience.
 Thus, Emerson concludes: "I chide society, I embrace solitude, and yet I am not so ungrateful as not to see the wise, the lovely and the noble-minded, as from time to time they pass my gate.
How fruitful our social relations depends on the integrity of the self. Fortunate are those who have friends, even while understanding and cultivating their solitude, which is to say, cultivating their selfhood.
For "in the solitude to which every man is always returning," notes Emerson, "he has a sanity and revelations which in his passage into new worlds he will carry within him." And these new worlds will be fresh encounters with society and other people. The nobler sentiments of society and culture will not be shunned by the solitary but sensed as a refreshment and a tonic to misanthropy., a correction of individual tendencies to egotism.
Conclusion
Guided by intuition and inspiration, and by what Emerson calls a "sad self-knowledge," we will be able to summon solitude wherever we are and under whatever circumstances we are thrust. Even "the poets who have lived in cities have been hermits still. Inspiration makes solitude anywhere." Emerson constantly juggles the necessities of life with self and others, favoring a solitude that is refined, mature, enlightened, and transcendent.

Lighten Up: The Healing Power of Laughter


The healing system of Ayurveda teaches us that nourishing our five senses enlivens our health and well-being. I have found that it’s just as important to cultivate our sixth sense . . . our sense of humor.
We’ve all found ourselves facing difficult circumstances, mired in worry.  When a good friend calls and has us laughing at ourselves, we’re reminded that there is more than one way to view a situation.
The very experience of laughter shifts our perspective and opens us to new possibilities. We feel internally tickled as we make a connection between the predictable way of looking at a situation and an offbeat way.
Laughter allows us to temporarily step outside our space- and time-bound state and touch the field of awareness that is boundless and eternal. The American theologian Reinhold Niebuhr wrote, “Humor is a prelude to faith and laughter is the beginning of prayer.”

Laughter as Medicine

From the scientific perspective, laughter is an elegant mind-body phenomenon that reduces the production of stress hormones, boosts the immune system. Researchers in Japan found that people with rheumatoid arthritis who watched “rakugo” or comic storytelling experienced a significant decrease in their pain and stress hormone levels as well as an increase in two immune-enhancing chemicals. Humor can decrease anxiety, soften anger, lighten depression, and increase our pain tolerance.
Of course, discussing the value of laughter is about as fulfilling as talking about eating a delicious meal or making love. The benefit is not in the description but in the experience, so I encourage you to let yourself get carried away with laughter. Look for humor in life and give yourself permission to laugh out loud when something tickles your funny bone. When I was first diagnosed with a brain tumor, I asked people to post their favorite jokes and funny stories. The collection has been growing, and I invite you to take a humor break there right now and whenever you need to “lighten up.”
Here are a few more suggestions:
  • Make funny faces with your family and friends.
  • Watch comedy films by the Marx Brothers.
  • Visit a park and watch children and dogs playing.
  • Read joke books.
  • Spend time with fun, playful people. Laughter is contagious!
  • Share your embarrassing stories.
  • Host a game night with friends.
  • Share your favorite joke
  • Blow bubbles.
  • Play a practical joke on a friend (who has a sense of humor).
  • Twirl a hula hoop.
  • Try Laughter Yoga.
  • Start a pillow fight.
  • Join or visit a laughter club.
Be creative and give yourself permission to commit acts of silliness, irresponsibility, and lightheartedness. Remember that you don’t have to be in a good mood all the time – you just need at least one good belly laugh every day.
With love,
David

Extreme Weather


Introduction

As the world has warmed, that warming has triggered many other changes to the Earth’s climate. Changes in extreme weather and climate events, such as heat waves and droughts, are the primary way that most people experience climate change. Human-induced climate change has already increased the number and strength of some of these extreme events. Over the last 50 years, much of the U.S. has seen increases in prolonged periods of excessively high temperatures, heavy downpours, and in some regions, severe floods and droughts.


Some serious questions

 Do you know what these things are? I do, I wired them.

Good old "R2-D2"








 All these elaborately boring things kill people and so do these.





 America hires, enlists, contracts out certain duties to individuals to be integrated into the "killing" system.
 Whether a person squeezes a trigger, lines up an "X" on a dot or lines up a GPS, do you think that it changes a person?
 Hypothetically, a person that did this for some years "might", sheesh, "might"  just lose a minuscule amount of regard for life, wouldn't you say?

 Take any young person and "train into them" to dress nicely and add in very nice salary as an incentive. Now train this back out of them for absolutely nothing financially which by the way, "There's no training out of" program.

 Rub two, maybe three brain cells together and what would you suppose you'll have?
Please take into account, different personalities, various forms of upbringing, different levels of indoctrination, yadda yadda.

 When you send these young people off to carry out tasks and give them ceremonies, badges, awards, greater financial incentives and flatter them, they are forever changed as am I.

 At times I lay in bed and wonder is there a number to calculate? Then I drift off to sleep with absolutely no worries. My old shrink would say that's the brain protecting itself. Ok, doc, I say that I'm desensitized and I can always fall back on, "I didn't squeeze the actual trigger or push the button".

 Over the years I've come down to a different truth, be it then, be it now or be it in the future, "It just doesn't matter".

 What do you think?

Friday, September 7, 2018

Take the time to enjoy your weekend your way

*Better that I go home than to bring her here, G'night.



The 2018 Florida Statutes

 You may remember my posting a boat for sale? You may also remember a link I shared about looking up these statues?
 After a short conversation that I never should have had I'm at a very small crossroad > Do I do the favor for a really decent guy or do I quickly move past this boat and on to the many others abandoned?



 Here are the statutes minus the clause from another site, a keen eye will pick up the phrase and Google it quickly. *If you don't figure it out, I'll share Monday.

Title XLVI
CRIMES
Chapter 823 
PUBLIC NUISANCES
View Entire Chapter
823.11 Derelict vessels; relocation or removal; penalty.
(1) As used in this section, the term:
(a) “Commission” means the Fish and Wildlife Conservation Commission.
(b) “Derelict vessel” means a vessel, as defined in s. 327.02, that is left, stored, or abandoned:
1. In a wrecked, junked, or substantially dismantled condition upon any public waters of this state.
2. At a port in this state without the consent of the agency having jurisdiction thereof.
3. Docked, grounded, or beached upon the property of another without the consent of the owner of the property.
(c) “Gross negligence” means conduct so reckless or wanting in care that it constitutes a conscious disregard or indifference to the safety of the property exposed to such conduct.
(d) “Willful misconduct” means conduct evidencing carelessness or negligence of such a degree or recurrence as to manifest culpability, wrongful intent, or evil design or to show an intentional and substantial disregard of the interests of the vessel owner.
(2) It is unlawful for a person, firm, or corporation to store, leave, or abandon any derelict vessel in this state.
(3) The commission, officers of the commission, and any law enforcement agency or officer specified in s. 327.70 are authorized and empowered to relocate, remove, or cause to be relocated or removed a derelict vessel from public waters if the derelict vessel obstructs or threatens to obstruct navigation or in any way constitutes a danger to the environment, property, or persons. The commission, officers of the commission, or any other law enforcement agency or officer acting under this subsection to relocate, remove, or cause to be relocated or removed a derelict vessel from public waters shall be held harmless for all damages to the derelict vessel resulting from such relocation or removal unless the damage results from gross negligence or willful misconduct.
(a) Removal of derelict vessels under this subsection may be funded by grants provided in ss.206.606 and 376.15. The commission shall implement a plan for the procurement of any available federal disaster funds and use such funds for the removal of derelict vessels.
(b) All costs, including costs owed to a third party, incurred by the commission or other law enforcement agency in the relocation or removal of a derelict vessel are recoverable against the vessel owner. The Department of Legal Affairs shall represent the commission in actions to recover such costs. As provided in s. 705.103(4), a person who neglects or refuses to pay such costs may not be issued a certificate of registration for such vessel or for any other vessel or motor vehicle until such costs have been paid.
(c) A contractor performing relocation or removal activities at the direction of the commission, officers of the commission, or a law enforcement agency or officer pursuant to this section must be licensed in accordance with applicable United States Coast Guard regulations where required; obtain and carry in full force and effect a policy from a licensed insurance carrier in this state to insure against any accident, loss, injury, property damage, or other casualty caused by or resulting from the contractor’s actions; and be properly equipped to perform the services to be provided.
(4) When a derelict vessel is docked, grounded, or beached upon private property without the consent of the owner of the property, the owner of the property may remove the vessel at the vessel owner’s expense 60 days after compliance with the notice requirements specified in s.328.17(5). The private property owner may not hinder reasonable efforts by the vessel owner or the vessel owner’s agent to remove the vessel. Notice given pursuant to this subsection is presumed to be delivered when it is deposited with the United States Postal Service, certified, and properly addressed with prepaid postage.
(5) A person, firm, or corporation violating this section commits a misdemeanor of the first degree and shall be punished as provided by law. A conviction under this section does not bar the assessment and collection of the civil penalty provided in s. 376.16 for violation of s. 376.15. The court having jurisdiction over the criminal offense, notwithstanding any jurisdictional limitations on the amount in controversy, may order the imposition of such civil penalty in addition to any sentence imposed for the first criminal offense.
History.ss. 1, 2, 3, ch. 73-207; s. 17, ch. 89-268; s. 473, ch. 94-356; s. 258, ch. 99-245; s. 11, ch. 2006-309; s. 3, ch. 2014-143.

*I typically rely on loopholes yet this one is a statutory right of way.


My late night snack for one... Well one and a half

 My puppy will be in here soon enough for his share.


Build yourself a blog

*Search and find any one of these, create an account, verify the account with the email they will send and have some fun. Trust me, you won't break anything.


 After you log in, the platform will take you to a dashboard and it will literally explain your options.




Take these steps and you won't feel the need to come back and read my crap.

Need a little help?


Real Life Examples of Multitasking in Everyday Life

*Some scientists say that it can't be done yet I beg to differ. As a young man 10 years before I ever owned a craptop I use to practice multitasking and I don't believe the word had been coined yet? 
 I would begin with a thought and add a tune, then add a picture, I would then try and add the words to the tune, so on and so forth until the layers of thinking just collapsed. *It may seem a weird way of having fun but it got me here.


 Let's see what this guy says...

 FOCS, (pronounced FOLKS) is a simple easy-to-remember mnemonic that summarizes the different types of multitasking activities and it stands for:-
1. Frequently
2. Occasionally
3. Conditionally
4. Suddenly

Habitual Tasks has to be Performed Frequently


At work, there are many tasks that have to done repeatedly; day in and day out. One can maintain an excel sheet to keep the list of these tasks so that it is performed regularly.
For example, every day after coming to office, an employee may have to regularly sign the attendance register, check all the customer mails and reply them.

Occasional Tasks Consume Intermittent Time during Multitasking


An occasional task is very similar to frequent task and the only difference is the time span; It could be less frequent such as a fortnight, a month, a year or, may be, even a decade.
For example: Almost everybody has occasional but regular tasks such as paying electricity bills, telephone bills and credit card receipts.

One Must Plan before Starting Condition based Multitasking


Condition based tasks arises based on the decisions made. A simple logic of if..then..else and or…and are some ways to understand condition based multitasking.
For example, when a family member decides to buy a second hand computer, the task of maintenance every year, upgradation of software are some tasks that are inevitable. However, these tasks can be eliminated if they plan to go for a brand new computer.

Sudden Tasks Interrupt a Multitasker


Especially at workplace, an unforeseen task is quite common. These tasks are unexpected but sits in the priority list of the work schedule. Therefore, many business professionals are quite smart and they dedicate a buffer time to compensate the unanticipated task.
For example, a good manager always sets aside 2 extra days to deliver an office project so that last minute tasks, changes and corrections could be accommodated in this buffer time.


Do you "really" want to own an Akita

 "Nietzsche" is my 4th Akita and I had to learn how to behave with these dogs. Akita's are stubborn and always seeking dominance *for the most part.
 If you're one of those that want a dog to sit, roll over, play dead and all that jazz, it can be done yet you may have missed the pure joy of owning one?





 I didn't purchase my 4th to train him, I purchased Nietzsche to be trained. With posteriori experience, I was fully aware that I was going to learn patience, temperament, gentleness and how to be firm in a more appropriate way.
 We've seriously bumped heads on 2 and a half occasions and I only asserted enough dominance to bring him back in line so that we could peacefully cohabitate. He's now 14 months and our relationship is great "but" LOL He still gets a wild hair up his a$$ and will just jump on the furniture and just look at me like, "What"?

 Do you need more discipline, do you think you could be more tolerant or simply learn more self control? Purchase an Akita.

Never listen to an individual that gives you a directive

 *If this is from your boss or parent there can be considerations yet if someone "tells" you to ______, you "can" pay that shit no mind.
 When decent and respectful people talk, the name of the game is "sharing" information, for instance, > An individual asks me a way to up the compression on his race car. The "proper" way for me to respond (Which I never do yet it's said with this sentiment) is to begin by saying, "In my past experience this is what worked for me"



 I didn't listen to my sperm donor dad and I didn't listen to my mother's "directives", what the hell makes a person think I will listen to their commands?

 ..and I'm not violent like I use to be but Hey, shit happens...

 The title is a little screwed, chuckles.

President Obama Destroys Donald Trump, Republicans

 I lost quite a few Black friends do to my stance, "All a president needs to do for me is keep the bombs from falling on me and leave me the hell alone" and were's good!



Free alternative to Microsoft Word Revisted

*They do have a paid .exe for $29.95 yet this free version does everything I need to do. *I'm posting this for those who have gone back to school and may need to save a couple dollars.








Featured Posts

Beautiful American Bully Pups for Sale

 

Popular Posts