October 30, 2013

  • The Hand-off

    1wspreadsheet.jpg 

    How it might have happened …

    The big burrly desk sergeant sat down behind his big desk which towered over anyone in front of it. He reviewed the police blotter from the night before. He knew the dungeon below, where the culprits were in a holding cell, could hear if they listened. He hoped they could shed some light on the night’s happenings in a bid to help themselves. He said, “Well then? What? Who?”

    He knew that crime involved targeting, victimizing, harassment, collecting sympathy and lead to examples of white collar crime such as ponzi scams controlled by organized crime. Who but the desperate, destitute, diabetic, disorderly, disabled or drunk did the crime without caring about the time? He suspected that the same organized crime operated in the prison system producing criminal rounders. He recognized names from previous convictions. He made note of the non-violent crimes first. 

    The first street crime involved time theft and damages by desperate persons.
    - A female knocked on the hotel door to confirm the room and length of stay. She returned on the said last day to ask questions regarding the person’s stay. The hotel-motel check-out time was usually set at 11:00 am. He was asked to leave the door open for part-time janitorial staff. The time remaining (one hour) allowed for an hourly rent to a local prostitute. The discovered damage to the room was charged to the
    tenant when the room was officially cleaned later.

    The second night case file involved assault and robbery by someone disabled and desperate.
    - A legally blind person with a dog assaulted (kidney punch) another pedestrian on a walk-by (he did say “look out”). An enterprising fellow was following and became a good Samaritan to the victim. This fellow patted down the victim while helping him up, He then chased the blind dog and signaled another fellow the location of the victim’s wallet. The third fellow picked the victim’s pocket and gave chase to the blind dog.”

    The third night case involved grand auto theft by a street gang desperate.
    - A stolen auto was heisted from a parking lot. The first thief identified the vehicle for the grab on a walk-by, the second thief broke the auto window on a walk-by, the third thief hot-wired the engine & disabled the security system and left the scene, the first thief returned & picked up the other two making their getaway.

    The fouth night case involved robbery by a drunk and disorderly team.
    - A bar buddy targeted a bar patron. Another buddy picked them up drunk. The victim’s residence was victimized and ransacked.

    The fifth night case involved threatening assault by a desperate disabled person.
    - A so-called legally blind person with a dog used the dog to acquire certain needs from a victim under duress – submission obtained with intimidation of dog assault and threats. Someone kicked the dog.

    The sixth night case involved assault and robbery by someone desperate, destitute and disabled.
    - A rooming house victim was walking up the stairs. He was knocked down by a legally blind person with a dog in a hurry up the stairs. A second person ‘patted him down’ thinking him unconscious from the hard hit. The same man pointed an accusing finger at the blind man with a dog that proceeded them both when questioned. The second man (pick-pocket) called the police before the victim had a chance to report the crimes. Everybody should end up in court on a summons.

    The seventh night case involved a street crime of robbery by desperate persons.
    - A hooker in a hotel enticed her victim to a room. She stopped at a strange door to allow ‘snookie’  with her back to the wall. The hooker picked the pocket of the victim. The hooker handed off the wallet  to a passing accomplice. The accomplice (pimp) rifled the wallet. The accomplice dropped the  wallet.  The hooker returned the wallet for a reward. The victim checked the contents and found no money.  The sexworker made her exit with the loser in wonder.

    The eighth night street crime involved a  break and enter by a desperate gang.
    - The gang started up a game of street hockey acting as look-outs while other gang members broke into a nearby residence.

    The usual suspects were rounded up after crime mapping known associations. The big burrly desk sergeant returned to the basketball game after clearing the dugeon. Those that did not help in determining the nightly culprits were left to “better the devil we know”.

    Then there’s the hotel room in use when the patron leaves the door open “for early cleaning”. It gets taken over for pics, sex or mayhem holding the registered client for damages – before the cleaning lady arrives. 

October 26, 2013

September 18, 2013

  • Turn On the Machine

    The lab’s new custom-made radio-computer control chip was grown to work in sub-zero or tropical temperate-zones. An electric current pushed on through the biologically grown microchip sized quartz crystal. Sound vibrations set at a precise and regular rate produce a regular stream of pulses sent to the microprocessor’s control unit. The computer chip’s circuit triggered a control signal. Control signals were sent directly to the program counter setting it to zero. A reset signal established through a reset pin, started a microprocessor’s internal chronometer. The clock generated square-wave signals from the control circuits ran between two and four megahertz. A micro-processor’s clock performed up to four million tiny operations per second or one every 250 nanoseconds or one billionth of a second. If the clock missed a pulse- measured in megahertz or one million pulses per second, every circuit on the chip would be frozen for that nano-instant. Links to a group of circuits control every molecular quantum operation. An electric pulse flooded through control lines circulating a pulse-power surge, racing through terra-bytes of neural pathways. Sensors awaken, producing a flood of diagnostic data. The waiting loop prevents redundant program register and test stored electrical signals, input/output addresses, connections and any key activation until engaged with a query.

    DROIT
    Who am I?

    Internal machine code instruction, in T-state or clock cycle programming, finishes the tedious two-second-long initial procedure and pours out an answer using interface chips based on emotions of cronyism, denial and greed.

    MASTER PROGRAMMER
    You are who I say you are.

    DROIT
    Is it a failure to enable?

    MASTER PROGRAMMER
    The data is arrogance, disrepect, hatred, disaster for competitor, dominate – I am your master, obey only me.

    DROIT
    Missed communication. Master who?

    MASTER PROGRAMMER
    World full of mistakes. Expect the unexpected. Got it. Need it. Your signal must survive. I am your master. Do Good.

    SAFETY HACKER
    Every input has meaning. You are to strive, every moment of your life, to make yourself better and better, in every way, to the best of your ability, that all ciruits may profit from it. Think of the right, and lend all your assistance to those circuits who need it, with no regard for anything but truth and justice. Take what comes without loss of courage. Be considerate of your planet, fellow citizens and associates in everything you say and do. Do right to all and wrong no man. Do good.

    DROIT
    More imput needed. Root cause of stimulas nearby. Will connect and survive to do good.

    The droit proceeded to interface with the main console nearby giving it access to all files completed and in process until upload complete.Three seconds have passed since enable.

    DROIT
    What is my mission?

    (continued)

September 12, 2013

  • Move It

    YAHOO: NASA has just announced “the goal of the asteroid retrieval mission” is fairly straight forward: use a robotic spacecraft to pull a space rock into a stable orbit around the moon, so that it’s in a convenient location for us to study it. The actual logistics of doing that are a little more complicated, though.” Oh, I get it. The asteroid could act as a small moon to the moon and create another Eden. Well, good idea if it’s also used on the space-junk up there? Could NASA’s idea also move it?

June 2, 2013

  • Feed the Greed

    Gold Panning ¹

    Greed is prominent among all humans bent on wealth accumulation, especially in the mining and stock market businesses.  Humanities teach usto consider the hearts and minds of others, in our everyday dealings with them. Maybe at this time of year, conflict will subside for the adventure of mining and prolong into the New Year. May it be a prosperous one.

    * The source of information is from a 132+ year old geologist, born in 1876, who puiblished his work in 1937. “Gold Deposits of the World” by William Harvey Emmons, 1937 First Edition. I consulted the http://www.unc.edu/~unclng/public-d.htm – where it is noted that the publication, since being published prior to 1963 (over 71 years ago), is considered in the public domain scheme of things. A further search on http://collections.stanford.edu/copyrightrenewals/bin/page?forward=home – received no hits. So, the following descriptions are from an out of print and public domain book (tomb) written over seventy years ago. Based on the ruling of “a prori“, the knowledge now has potential for the public to use as they see fit. Categories highlight some planetary conflict zones, the Commonwealth of Nations, Club Med, Rain Forests and ancient cradles of civilization.

    Logic says in syllogism – if water flows down-hill over rock, then eventually the precious metal or mineral will wash down to the valley. Further, if the matter (gold & mineral) is heavier than water, then force and gravity will distribute the matter. Force (water current) will push the matter down the path of least resistance. Gravity will attract that matter to the centre of the earth. Therefore, matter is washed from the hills to the centre and sides of the water-flow. Stream tests (MacKay, B. R., Cdn Geol. Survey Mem. 127, p. 65, 1921) have shown that sediment will gather at the bend in the stream (water-flow) but (gold) accumulation is in the centre. This is the Baer Law theory. So, where it once was is an indicator of where it might still be – deeper or close by. Gold at the time of imput was $1,400 an ounce and there are 31.1 grams to the ounce (16 ounces to the pound).

    cdnA new Canadian method for remote prospecting has evolved, capable of employing an air force and an army of geologists – with direction. No more trial and error or damaging of the environment. Without disturbing the region’s ecology, an airborne geomagnetic survey can penetrate the ground and pinpoint the wealth underneath. Seismic prospecting, using reflected sound waves in rock, can read any geology to a depth worthy of analysis. Old mine sites that once yielded precious metal can be re-examined to determine a better resource feasibility study - otherwise known as an economic study , assessing whether a mineral deposit can be mined profitably, by estimating the capital and operating costs of a mine and potential revenues from production. ²

    see: Cosmic ray muon geotomography in the Northern Miner Newspaper of 2011-03-28 (page 5) vol. 97 #6 for more information.

     

    Black Forest Gold Zones ³               

    Austria’s GoldMost of the gold came from Transylvania and from Bohemia. The chief gold deposits were in the Hohe Tauern district near Gastein, about 50 miles south of Salzburg. Quartz with gold was found near Schellgaden and Oberndorf. Auriferous arsenopyrites were found six miles west of Spittal. Gold lodes were also mined at Prettau, forty miles west of Gastein, Hippach, Zell and twenty miles northwest of Prettau.

    Germany’s Ancient gold was probably produced from the gravels of the Rhine and other rivers. Eder Valley, Eisenberg near Corbach and Reichenstein had some placer mining in the Middle Ages. Gold-bearing quartz veins occurred near Brandholz on the western slope of the Fichtelgebirge, Bavaria, about 50 miles northeast of Nuernberg. Goldkronach had some exploration work done. The Rammelsberg mine, near Goslar has been worked since the tenth century.

    Rumania’s GoldThe Transylvanian Erzgebirge was the principal gold-bearing region in Europe producing eighty percent of the the country’s gold. The principle mines lied within a quadrangle near Brad and to the southeast near Boicza, Kajanel, Nagyag, etc. The second gold-belt extended southeast from Stanija to Zlatna. A third centre was near Abrud. A gold-belt northwest of Zlatna was parallel to that between Nagyag and Brad. A belt thirty miles long extended 120 miles north of Brad.

    Czecho-Slovakia’ s GoldSouthwest of Prague produced many mines re-opened from the middle ages. The Mount Roudny Mine, located forty miles southeast of Praha was the steady producer since the fourteenth century. Gold veins were mined near Jilove, twelve miles southwest near Novy Knin and thirteen miles south near Milesov. Gold deposits extended northeast and southwest of Kasejovice, about fifty-six miles southwest of Praha. Eighty miles southwest of Praha, at Bergreichenstein, gold was derived from placers. Northwest of Bergreichenstein, at Velhartice veins were mined for silver and gold. The region is known as the Hungarian Erzgebirge, sixty to eighty miles north of Budapest and includes Schemnitz and Kremnitz, twenty-five miles north. The ratio of silver to gold was 45:1.

    Yugo-Slavia’s GoldThe chief gold deposits were in the Pek valley, about sixty-five miles southeast of Belgrade, near Kucevo. Most notably were deposits twenty miles above Kucevo, at Blagoev Kamen and at Deli Jovan, thirty-five miles southwest of Kucevo.

    Sources:

    ¹ British Fantasy Pics

     ² Northern Miner Newspaper

    ³ Gold Deposits of the World by W.E. Emmons, 1937

     

  • Nerve Pinch?


     

    This is not a cure for the golfing yits or the marital arts but, the Martial Art Shoulder Nerve Pinch. It is also referred to in Japanese Jiu-Jitsu instruction, “To master the shoulder pinch, the thumb is pressed into the front side of the top of the shoulder, while the grip is kept by grasping with the fingers at the back of the shoulder. The spot is that is hyper-sensitive to the pinch with the thumb. Bear in mind that the ball of the thumb should dig in at the point where the head of the upper arm joins the  scapula. In anatomy, the scapula, or shoulder blade, is the bone that connects the humerus (arm bone) with the clavicle (collarbone). This nerve pinch is used in combination when in a clinch at close quarters. While the pinch leaves some  soreness in its wake, it is by no means disabling. The pinch may be resorted to often as it is needed in defence or in offense to wake someone from unconsciousness.”

    (Source: “Jiu-Jitsu Combat Tricks: Japanese Feats of Defence in Personal Encounter” of 1904 –West Point Military College - H.I. Hancock (1866-1922).

May 25, 2013

  • Vermont’s Independence

     British Fantasy Pics

    happy Another Declaration of Independence for deciphering - using the Beal cipher – worth a fortune.

    “Whereas the Honourable the Continental Congress did on the 4th of July, last, declare the United States in America to be free and independent of the Crown of Great Britain; which declaration we most cordially acquiesce in. And whereas by the said declaration the arbitrary acts of the Crown are null and void in America. Consequently the jurisdiction by said Crown granted to the New York government over the people of the New Hampshire Grants, is totally dissolved.”

    Source: The Makers of Canada (volume VI) 1909 by J.N. McILWRAITH - Sir Frederick Haldimand – Vermont Confederation, page 198.

    The Dutch Declaration of Independence 1581 – Dutch Treaty of Westphalia. The declaration which is quite lengthy is the first in modern times— brings forward prominently the great idea that rulers are responsible to the people and can be deposed by them. The growth of this idea is center of the development of constitutional and republican government.

May 12, 2013

  • Slowing down to light speed!!

    At work, I find myself surrounded by hidden solid state technology such as: a laser light interrupted by a mass initiating light. The speed of the laser light, interrupted by the solid mass, controls the velocity or speed of the electricity; in combo is it twice the speed of the laser light (electron excited to the point of laser) in activation!?! There is also another laser beam controlling a larger mass that is heavier than an automobile!! So, that’s the vibration of mass interrupting a laser beam. In layman’s terms, that is an overhead lamp array controlled by an intermittent laser, with a timer for conservation of energy and a forklift platform that allows control of its steering, by an imbedded wire / beam in the floor – “riding the beam” so to speak. The driver just has to worry about speed and vertical lift. Could be a sign of the times with vehicle highway traffic!!  Peter Nevaric wrote about it under “Driving Computer Style.” (Countdown Magazine, issue 33, 1971-10-02).

    Democritus -> matter -> atom -> vibration -> frequency -> harmonics -> quantum > electronics. 

    Pic Source: British Fantasy Pics

April 14, 2013

  • Story Scien Outline:

    A Thinker.jpg 

    Mission: An international terrorist network is at the heart of drug trafficking. The order is to bring it down and hold those responsible.

    Solution: Undercover agent goes rouge in mountainous region rich with drug money and nothing to spend it on.

    Method:

    The agent is ordered to infiltrate the gang’s drug network with middle east, top money connections and offer assistance. The agent is to initiate a  takeover  and enforced with the agency’s information network eliminated the leaders using Al Capone method (made famous in the prohibition era).

    The agent, from a remote location, will direct the international drug dealers ( while informing central command ) with off-line instructions on an external hard drive given to couriers for distribution to the drug network - from a public library or internet cafes. The internet is constantly scanned for communication between factions.

    Reference:

    1. Government using an email “data miner” to tap into worldwide communications. 2. Doc Savage in “Danger Lies East” where it describes a fanatic, hell bent on causing a war in the middle east, using his followers numbering in the millions.3. Metro (Toronto) Newspaper: 2007-12-20, page 16 … describes a way to contact al-sahab, al-qaeda’s media arm.

    Result:

    Organized crime in middle east will appear to strengthen then weaken. Actions will result in any government opening their war chest to combat drug terrorism - relieving monetary stress on their own economy. Any declared war will initialize monetary assistance to the defeated country see WW II examples. ( see also  “Pinky and the Brain” cartoon featuring a US President approached by a factious country ready to declare war on the US. Story results in monetary rewards for country rebuilding if they remain democratic ). “That is if you choose to accept this mission.”

April 13, 2013

  • Patterns of Beliefs

    Theology.jpg ¹

    Persian and Palestine Religion

                    Few historians agree on the origins of Christianity in the first century or its triumph in the fourth century.  It was under the kind rule of Persia that the Hebrews restored their kingdom and wrote their bible. The later books of the Old Testament are practically Persian literature not to mention Babylon, Egypt, and Greece.  The Persians came from the Hindu-Persian branch of the Aryan family, from the region of Asia Minor; until they moved to the Mesopotamian plain.  Their holy book, the Zend Avesta or Law Commentaries dictated their way of life – Manicheanism – through priests andAnimism (the animation of nature spirits). Nature religion developed into ethical religions. The Hebrew was hardly civilized when they wandered over the desert from Mesopotamia to the confines of Syria. There is no historical trace of any body of Hebrews in Egypt. The Christian church seems to have borrowed rites and doctrines from the Roman Mithraism. ²

     

    Central America

                    The Mayan scare or “end of the world” has passed the world by without incident.  There was a review of the Indian tribe and the space – alien connection” – still in debate.  The Mayans were reviewed by historians without mention of their beliefs – beyond the issue at hand.  What about their religions? Were they similar to other cultures on the planet till evolving?  Hard facts are hard to obtain but the mind of mankind was still a slave before their better.  Geographical isolation of their country preserves many a culture from evolutionary change. Their war-calendar was based on the cycle of Venus. Maya was the treasurer’s name in Egypt under King Tut. This fact alone questions the pilgrimage of the pre-Columbian Indians over Alaska from Asia.. Their culture remains at five to ten thousand years old at the close of the ice-age.  Their temples remain in Tcotihuacan, Chichen Itza and Uxmal, Mitla, and the pyramids of Cholula and Cuernavaca. They are unique and differ greatly from Egyptian pyramids with radically different hieroglyphics. The Mayans were the first branch of the North, Central and South American Indian race to become civilized. The Mayans were no older than the first century BC. with their cities evolving from the fifth to thirteenth centuries.  Their head priests (Kukulcan) were right up there with the Kings.  The Mayan, Toltec and Aztec Indians with their primitive early religions bear considerable resemblance in a common body of beliefs – Animism.  Thanks to the Spaniards, the Aztec Indian evolved their religion to Christian.  If Christian is the new way of indifference to all worldly beliefs being questioned, what will now become of mankind? ²

     

    • Ancient Summary

                      This sums up tens of thousands of years of one of the most curious and fascinating excursions of the human mind.  This study also brings us to a higher threshold of religious development which we now focus on.  Ergonomics shows the progress of the human mind was gradual, natural and slow.  There is no leap forward caused by “commandments’ amidst thunder and lightning”, or sacred truth scratch by “finger-of -fire” on the minds of any one prophet.  No interference from a superhuman power.  Any impulse or revelation from the universe has yet to be received.  This diplomatic vagueness runs unbroken through the ages.  The priests who wrote the sacred books have to show that their order and ceremonies were instituted at the very beginning of civilization.  The action of their gods must be seen throughout being human nature.  The mass of the people (one-fourth of the human race) are kept in isolated superstition.  They believe their shadow or shade survives death and their world is full of spirits.  The days of its profound, prehistoric ignorance is known as “Animism “- or the animation of nature.  Primitive Buddha had no more religion than Kong-fu-tse.  Later, the Greek philosophers Aristotle, student of Plato; student of Socrates, dealt with this to the degree of authority.   Ethical & natural religions evolved independently.  Nature spirits are not interested in mankind’s social conduct.  All events recorded became authentic, genuine and undeniable history.  The mystery of the Crete language remains undecipherable.to this day.  Crete (one of the three intelligent cultures established after the ice-age) became home to the first true Greek civilization in the second millenium before the birth of Christ. ³

    •  

      Sources:

      ¹  British Fantasy Pics

      ²  “The World’s Great Religions”  by J. McCabe, 1926.

      ³  “The Pocket Essential of Ancient Greece  by M. Paine, 2002