Homeless and Invisible, Mexican and successful

In the 1980’s when Ronald Reagan was president, America felt about the same way it feels now. America was looking for a hero, a financial fix, and a sense of self worth.

Earning a living was a hard, pretty much like people are trying to make ends meet today. Feels like Ground Hog Day lately. In an effort to reduce taxes, someone decided that institutionalizing people who were not a threat to themselves or others was a violation of their civil rights.

In a short period of time the walls of sanitariums fell, and tens of thousands of people were free to live a life that was their ‘legal right’, or in other words, literally kicked to the curb to fend for themselves. Nobody really noticed what was happening except their taxes went down. This homeless group of people were pretty much invisible, migrating to inner cities where few saw them on the streets.

During this same period Caesar Chavez prevailed in nothing short of a revolution for Migrant Farm Workers. Migrant Farm Workers were Mexican citizens who did low pay long hour ‘agricultural’ jobs, aka picking fruits, vegetables, citrus and such.

More and more Mexican citizens decided to stay and try to make this country their home. Speaking poor English, no real rights, and no financial support, they thrived.  They too were not noticed at first. There were few of them, and they lived quietly in rural and eventually inner city areas eking out what passed for a living.

It is interesting how some things have changed and other things have not. Mexican Migrant Workers have joined the American workforce with some becoming American citizens. Some small percentage have become wealthy, experiencing first hand the American Dream.

The homeless are still homeless. As natural born citizens many Homeless people lack basic skills which would enable them to hold any kind of job, have a place to call home, and a support network to help them. Many Homeless people who are mentally ill, or otherwise challenged and are brushed under the rug, as they fall through the cracks of life. They are rarely mentioned, barely noticed.

The Homeless population may be indicative of how we choose to treat those less fortunate than ourselves. People who legally may not be a threat to themselves or others, but emotionally or cognitively are not able to manage the basics of a normal life.

Homeless People wander and live in the streets, preyed upon, locked up, and murdered. This happens every day in our streets. We more fortunate Americans are unaware, or pretend not to notice. After all we can’t afford to help them.

I am in awe of the power of marketing. This is mass marketing in its finest hour. Mexican immigrants are the new pioneers, demanding their fair share from their newly conquered lands. The Homeless remain all but invisible. They are not able to get their act together, protest, and be heard.

Yet, the Mexican/American population of these United States shows the American Dream is still alive, and thriving. How is it a people who weren’t born here, may not speak any English, have several roadblocks in their path, become successful Americans, while the Homeless are ignored.

Bidding Site Fraud Happens

I watched a friend logged on to a bidding site, placing bids on a cable to fix a broken shifter on their bicycle. Each time they bid, within a few seconds, their bid was trumped by an auto bid.

Curious by nature, I wanted to see who was doing the auto bidding. Turned out the auto bids were listed only as “Dealers”. There were three different “Dealers” who submitted auto bids over my friend’s bids.

I am thinking, why would several “dealers” auto bidding on a mundane item with a ten dollar shipping charge? There was not a lot of room left between the bid and buying locally. Per my friend it was getting close to the cost of gas and sales tax.

What resale profit is there after over bidding a live human bidder when the price is this high? There is none. Nobody is going to buy a cheap product at more than the price is worth, Dealer or not.

I know little about bidding sites. I have never done any business with one, though I have been to auctions and know how they can be manipulated. Somehow these “Dealers” are managing a fraud scheme without tripping any flags on the bidding site that monitors the bidding for fraudulent behavior.

In real world auctions, though it is rare, there will be a group of four or more people in the crowd to bid up prices. If they ‘win’ the bid, the item is simply set aside for another auction on another day. No one loses, except the unsuspecting bidder who are cheated out of what should have been their purchase.

In the case of the human bidding with auto dealer bidding over them on a bicycle cable it doesn’t need but a few bids to spot what’s going on. In my friends case it was four bids. My friend ran into a Fraud Coop, auto bidding on randomly assigned products sold by other members of the Fraudulent Price Gouging Coop. If the Dealer’s bid is the winning bid, the transaction takes place per bidding site regulations, the money is refunded in another manner, and the product never gets shipped.

The winning “Dealer” now becomes the seller, with the original Dealer the shipper. I thought what I was watching was a carefully thought out scam, involving many people.

The people involved in the fraud could be anywhere around the world, placing auto bids driving up prices for themselves, gouging customers who aren’t aware of what what is happening. If funded well, more than one or two people are all thats needed, only virtual computers, physically located in disparate locations, far apart from each other with no obvious connections.

No matter what someone buys, there is always room for cheating the buyer or seller out of money. No matter how policed any sale is, someone may be willing to cheat innocent buyer. After all who is going to take time to pursue a real claim over a few dollars?

Caveat Emptor – Buyer Beware.

In McDonald’s defense.

In McDonald’s defense. McDonald’s has taken literally decades of attacks on their menu offerings. I too have been critical of McDonald’s menu choices. Most of meals McDonald’s offers are overwhelmed with fat, sugar, and salt. As an observation, there is never a lack of people wanting to eat meals from McDonald’s most of the hours of the day and night.

Recently, I read articles from hopefully trusted sources about the nature of McDonalds employee communications. McDonalds in an attempt to help their employees  stretch their dollar as far as possible, is now offering advice on how to live and what to eat. Even going so far as suggesting a paid McDonalds meal is not in their best financial or health interest.

McDonalds has been overly criticized for providing this information to their workers. I say good for McDonalds! McDonalds should be applauded for being realistic about what reasonable expectations are for its employees away from work. What other big business besides the military makes it clear that their bottom of the pay scale employees should not think they hold a job that will meet their financial needs.

McDonalds is glaringly truthful about employment with McDonalds, and the lifestyle McDonalds employment may and may not provide. Every current and prospective McDonalds employee needs to understand McDonalds position. For the most part McDonalds jobs are entry level jobs, and not a career path. McDonalds has always been obvious about this point.

Paycheck based economic reality is essential to any workforce. If any McDonalds employee is offended by the information provided, perhaps it is time to do a reality check on their spending habits? If anyone else is offended by what McDonalds provided to help their employees make ends meet, perhaps they also should be realistic about this sector of the economy.

McDonalds became the fast food giant they are by being realistic. Almost daily I drive by at least one McDonalds with five or more cars in the drive through. Two of these locations have a grocery store within sight of the drive through. When seen in this perspective, who is being more realistic about what McDonalds provides, McDonalds the company, or employees and customers?

Wanting Ice Cream in Your Bowl

We like to help people who smile and are polite  more than they like to help people who are demanding and serious. It is our nature.

I was at a buffet by the scooped ice cream as a boy was trying to get the attention of the server so he could get some ice cream. “Hey Lady….Hey you…Hey, he was saying in a demanding voice.

The woman who naturally, wasn’t about to be ordered around by a twelve year old, pretended to be busy and hard of hearing. I stepped over to where the boy was and suggested to the boy that by saying please, thank you, and smiling, he was more likely to be helped, and more likely to get a little extra ice cream in the process. We all like a little more ice cream.

I politely called to the woman who could not ignore her two customers any longer. The little boy in a condescending tone  asked the server for ice cream. Of course he was rewarded with a bowl containing the absolute minimum amount of ice cream the server could defend as a serving if the need arose.

This kid is a little slow on the uptake I thought to myself. He missed the idea of using good manners gets you farther than not using good manners. The boy walked two steps away, turned to me, smiled, and said, “Thank you”. Go figure! I bet he gets it right next time.

There are always at least two levels of service when you are the public and need someone to help you. The first level of service is when it is the other person’s job to help you. You get the minimum they have to do for you and keep their job. People do not like to be taken for granted and unless tipped or paid excessively, people working with the public do not put up with bad behavior and poor manners. They will do their best to put you in your place, or make your experience less than it could be

The second level of service is the service you receive when you use your manners, and respect the person who’s job it is to help you. When this happens someone who’s job it is to help you, is now happy to help you, because the interaction is taken to a higher level.

I always strive for the second level of service, how about you?

Scary Happenings on Your Internet and Electronics

A snippet from a reply from one of my Senators asking about the NSA…

“As you may know, under one of the programs, the NSA has for seven years collected on a daily basis information related to Americans’ telephone calls.  This information includes the telephone numbers called, along with the date, time, and duration of calls.  The Foreign Intelligence Surveillance Court (FISC) – a special federal court created in 1978 to review the government’s applications for surveillance orders – has allowed the collection of this metadata under Section 215 of the PATRIOT Act.  Section 215 amended the Foreign Intelligence Surveillance Act (FISA) of 1978 to allow the Federal Bureau of Investigation (FBI) to apply to the FISC for an order to collect a broad array of business records and other tangible things relevant to an authorized investigation.  Previously, the authority was limited to the collection of only records from certain businesses, such as hotels and car rental agencies, and the FBI had to provide facts tying the records to a specific person.”

A Russian group of programmers are planning to sell commercially a root kit that will capture and forward anyones banking information, if they can get the software on their computer. You can be the first in your neighborhood to have this software for about ~ $2,500.00 US.

Some companies who offered encrypted email are shutting down due to fear of government scrutiny. They don’t want to take the hit for illegal activity being tied to their product. They ‘claim’ a concern for their customers, and perhaps a little fear of government scrutiny around themselves too?

The Tor network bust of a few weeks ago that netted a hundred plus people receiving and transmitting child porn, upset large numbers of people who deal in things less than legal. It also upset people who were led to believe tor was the utlimate internet privacy tool.

The infamous Pirate Bay frustrated because some governments have blocked them, have created their own browser so individuals may bypass government restrictions and get on with what they want to do, rather than what is permissible.

NSA and Internet

NSA and others are logging your electronic life

Some Internet Service Providers have agreed to email you, or flash you a screen a message if they detect you downloading copyrighted information illegally. “In case you are not aware”, is the reason given. To determine if you are downloading copyrighted information all your internet usage will need to be monitored.

Certain Televisions can spy on you per one newsworthy article on a techie website. The software running the television is very vulnerable to being hacked over the net. If there happens to be a camera or microphone attached to the television, well, you may be streaming media (your personal life) to people you do not know. Imagine seeing yourself in a compromising situation that took place in your front room in a youtube video?

An East Coast couple had a visit by several men in suits and badges after some rather innocent web searching by family members after the Boston Bombing. It appears one can look up anything on the web, however they can’t do it in conjunction with other sensitive topics. Sort of like the ‘three strike’ rule in baseball. Too much curiosity wakes the cat.

Besides the obvious, “What’s next, are we going to have cameras and microphones in our living room spying on us?” Do we already? At least the Internet is already taking action. One of the things I love about technology is changes happen fast. No need to be reactive when you can be proactive.

Here is what a little casual browsing turned up today:

Mozilla corporation is working on an ad blocking browser. If I understand correctly is it is blocking advertising streamed with secure web pages, because of the security issue it opens up. The issue stems from insecure content being delivered on a secure connection. Lots of opportunity for bad things to happen.

Advertisers are in an uproar, claiming their web site material will now be ‘stolen’. Hmmm, how do you steal information posted freely on the web? Some websites are threatening to go subscription only.

I say, good luck making a living with that business model. If the ads didn’t dance across the page, or block all access to content, I don’t think we would be at this point.

Since there is legislation either in the works or passed making the sender of copyrighted materials a felony offense, Usenet has gone to encrypted postings. At least by those that have a clue.

Operating systems on a flash drive or CD are gaining even more attention. If you cannot trust your computer has not been compromised – an unprotected Windows XP machine lasts less than 20 minutes on the net before being taken over – systems on a removable cd or flash drive are the way to go. They are read only, and cannot unless you allow it store any information. This means there can be no root kit, virus, or malware cookie sending your bank account information home to Daddy.

Encrypted phone calls will make a splash on the scene soon, if you haven’t heard about it already. Encrypted messaging is already here for those that want it. Each of us will have to decide how badly we want to talk with someone. Enough to match their encryption methods, or not talk at all over electronic medium?

Electronic security has always been a game of catch up. No matter how fast any Government, service provider, or other group is, they will never be ahead of the curve when it comes to halting illegal activities on the internet. No matter how quick they are, the internet as a whole is quicker.

Some people are resorting to triple encryption, just because they can. An email message, text message, or document is processed through three different encryption programs. In other words they are encrypting a document that that was created, encrypted, encrypted again, and finally encrypted a third time using different encryption techniques. Lot of work to say get a carton of milk on the way home from work.

Other people are sending out texts and emails containing trigger words, and I can guess you know what those are. Emails that have no purpose other than to trigger the NSA’s software into action, especially if they are sent with light encryption

Which brings me to my main point. Is the internet in jeopardy of shutting down? Unless you are comfortable with every key stroke being logged, worrying about your bank accounts and your very private information being sent to another computer, having your browsing habits logged and analyzed, your friends and family watched,it may be.

Is the internet going to end up as a nameless, faceless place, where the only web traffic is encrypted, and the only web sites still up, talk about gardening, and cooking and other acceptable topics while the NSA studies each word in an article?

Will all your web travels and searches be logged and monitored? How about the privacy of your own computer, laptop or tablet? Will it keep your private matters private, or will it contain a backdoor where all your actions can and will be monitored?

These are real questions and real concerns. Let your officials know how you feel about all of this. Apathy and nameless fear got us this far. If left unchecked, the world of computers and the internet, may go the way of the home phone, boom box, and so many other things we thought would be around forever.

Where does state security and individual privacy divide? Should everyone be investigated around the clock because they might be something they are not advertising? Where is the line on personal privacy? Will it extend from the search for possible terrorist activity to tax fraud, income tax evasion, searching for any and all illegal activity?

In the mean time, maybe there is no need to worry about backing up your documents, perhaps the NSA already has a copies you can download under the, “Freedom of Information Act”? Write your representatives, and let them know how you feel about his. If you don’t tell them what you think, big business and the government will.

Martin & Zimmerman Who’s Standing Where?

I am still confused about how I feel with the Zimmerman, Martin Stand Your Ground ruling. I did not attend the hearing, and I need to trust the jury did the right thing, and made the right decision. Unfortunately, from what I understand of the events that took place and the bias of the law itself, the ruling does not sit well with me.

In my understanding:

Martin is walking down the street Zimmerman is in a vehicle driving down the street.

Zimmerman gets out of his vehicle and approaches Martin who stands his ground, literally.

Martin is shot by Zimmerman.

It does not seem to be any more clear than this. Everything that happened after Zimmerman got out of his vehicle does not matter to me. If Zimmerman never got out of his vehicle, there would not have been a shooting.

As for the Stand Your Ground defense. It seems to me that it was Martin who used his legal right to stand his ground against an aggressor, not the other way around. Zimmerman could have driven away.

If I was a young man of Martins age, I would not have ran. I would have stayed put as is my right. I feel if Zimmerman didn’t think he had the backup protection of pulling out his gun, and using it, he could have left his gun locked up in his vehicle.

Perhaps Zimmerman felt empowered by the thought of having his gun on his person if he decided he needed it. Martin felt empowered by his martial arts knowledge and previous fights.

Martin depended on his youth and his ability. It wasn’t Martin’s first rodeo, or at least I do not think it was. He was, I read taking, martial arts classes. Usually people who do, have a need to. A young man by himself is a target. Martin was young, he was strong, and I feel, he felt he could take care of himself if he needed to.

Here it is the way I see it. Martin is walking along, Zimmerman stops his vehicle, gets out and approaches Martin. Obviously it isn’t to ask directions or share a joke. Martin being a young man thinks if worse comes to worse, he will get his ass kicked, but he doubts it. At any rate he isn’t going to take any crap from this guy. He has every right to be where he is. Martin is shot, and dies.

Yet Zimmerman is allowed to use the Stand your Ground Defense. It sounds like Martin was expected to use the cower and run away defense because Martin was not in the courtroom to say He was Standing His Ground and reinforcing his right to be there on that street, whether he had family, friends, or business around there. He was free to go and do what he wanted, and walk down that street was what he wanted.

I know if it were me, instead of Martin, I too would have stood there. So would you if you feel that strongly about personal rights, and personal freedom. I would only get beat up once. I would live with myself every day thereafter for the rest of my life.

In my opinion, or it appears to me, Zimmerman, the older Man approached a much younger, stronger man and created a conflict that got out of hand, and Zimmerman panicked.

Instead of halting the provocation at any time before the conflict turned physical, Zimmerman perhaps steeled himself with the idea that he was in charge. Of course the fight was one sided. Here is a young strong man fighting with a older out of shape man, who is spending as much time trying to get his gun out of his pocket, as he is in trying to defend himself.

I didn’t watch the trial daily, and I may be wrong in what I think are the facts. What I think I do know however is, one man left his vehicle and approached another man when he should have stayed in his vehicle or driven away.

Who had the right to claim they were Standing Their Ground?

I’m rude, and I don’t care

The cold call must take a special type of personality on both ends of the conversation for a successful sale. Most of the cold calls I encounter are over my land line telephone. Some cold calls are door to door.

Peter called me two days ago. Caller id: v3957286419 or similar informative caller id string. I was instilled with confidence before I even answered. These numbers are flags saying, get ready, here is another one.

Me, “Hello?”

“Hello this is Peter”

Me, “Yes Peter”

“I am with xyz security systems”. We will be in your area…click.”

Did I need to hear any more?

After years of commercials, commercialism is part of my phone etiquette. Who is Peter really? Peter could be the next door neighbor who never talks to me in person. Peter could be some poor schmuck who needs to pay his rent and this is the best he can do. Peter may in prison, who chooses to cold call rather than sit in his cell.

Who is xyz company for that matter? Do they even exist? Are they running a new scam? Are they casing houses for theft? Do they really exist or are they part of some boiler plate operation trying to get money from the unsuspecting.

unknown number

Having your time wasted by telemarketers

If I was Peter, would I want to call me? If I was xyz company would I want Peter to waste his time calling me? Who created the list I am on where cold callers think the confidence game is a game I play? isn’t there a list somewhere where it says, “This guy doesn’t play the confidence game?”

The xyz company is going to be in my area shortly. That also means the xyz company will be out of my area a short time later. Maybe Peter and his buds, or the company he works for, cased the neighborhood and and decided we are ripe for a fly-by-night security system cold call?

The same rules apply to Jesus Preachers who go door to door. Is there anyone who has not heard of Jesus, the bible, or how to live life in a Christian manner? Why should I place my confidence in some never seen before door to door bible thumper? I have made up my mind on Heaven, hell, and how I choose to live my life.
When I really feel energetic, I invent an imaginary product to sell and pitch it to them. I think my Son in Law has the best system. At the door, he tells the unwelcome visitor to follow him. He starts working in the garden, or other project. He tells the unwelcome visitor to help while he/she talks. He tells me he gets about fifteen minutes work from the younger ones. He also rarely answers his phone.

Bad Day Begging

I stopped at the store tonight after work to get some groceries we were running low on. I wish it were the steak I was buying, but that was last summer. There was young man maybe 25 years old leaning on the trunk of his car next to where I parked.

I am out of my truck, in front of his car, he is standing on the side between his car and the next one down. Here comes the pitch…

Mooching off Society

Don’t you get tired of professional beggars?

Young Man, “Hey Mister?” He steps out.

Me, “Yeh”

Young Man, “Do you have any money you can spare”

Me, “Look at your t-shirt, mine is three years old, yours looks pretty new? Look at your pants, they are in good shape too.

See my pants down here (pointing) where they are frayed at the heels? If I take my belt off, my pants will fall down because they don’t fit me any more.

Your shoes look fairly new, less than three months old I am guessing? My shoes are three years old now, and they make my feet hurt. See where the black color has worn off the seams, and the white leather shows through?

Look at your car, I think it is a mid-nineties model? See my truck? It has been hit a few times. Not worth too much. It’s a ’98.

So, how much money have you been given so far? I think you should share with me? It looks like I need it more than you. Everything you have here, is better than mine. Yet your begging me for money?”

Young Man, “Aw, F* you!”

He walks to the door of his car and gets in. When I come out about fifteen minutes later he is gone, or at least not parked next to me.

Copy like a Power User – Mac

In the past when I only used Linux, I always kept backups of my hard drive. The easiest and safest way at that time was to copy everything to another hard drive. There were programs that could be used, but I thought it was important that I do the copying myself. If a program makes a mistake, you can blame the author of the program, but it doesn’t get your files back if you really need them. If you copy folders and files yourself, you know it is being done correctly, and who is to blame if it is not.

Words called commands are used in the Terminal on your Mac. You can find Terminal in Launchpad, by clicking on Utilities. Terminal is very powerful even though it looks like an empty box, or a wimpy text editor. Administrators of both large and small systems use Terminal to maintain, upgrade, and troubleshoot systems they maintain. Don’t be fooled by the looks of Terminal, it is a very powerful tool.

Below are two command strings showing two ways of copying folders and files from the hard drive on your Mac to a usb stick or usb hard drive you have plugged in using Terminal. Terminal is faster than using a program. I have used the second command “rsync” with Linux, but Apple recommends you do not use rsync to copy folder and files on your Mac. More on rsync and Apples warning below.

Commands you may give your Mac by typing in Terminal are done immediately and not processed by a graphical program checking itself to see which boxes you may have checked, and then issuing the (hopefully) proper command.

Most people will never have any real need to use a Terminal. It is worth using Terminal a few times, so you can start to understand how graphical programs you use work. Everything done in a program can be done by typing commands and instructions in Terminal. It would not be quick or fun, but computing was done this way before desktops and Gui’s.

Using these commands in my Mac Terminal, I moved a few files from Movies folder to a usb stick. If you want to try too, use copies of files which are also saved somewhere else. That way if a mistake is made, the power goes out, or something else happens your files are safe.

The first folder and file copy I did on my Mac, I used a command named “rsync” to copy the contents of the folder “Movies” on my Mac hard drive to a plugged in USB stick named usb1. Apple recommends you not use the command “rsync”. Use instead Apples suggested command “rcp”.

Apple says “rcp” is safer than using rsync. If you use the command “rcp” which Apple recommends there can be folders and files on your usb stick or usb hard drive before you copy more folders and files to it. The folders and files there will not be harmed or changed in any way. With rsync where you are copying too needs to be empty. If it is not, rsync erases what is there.

All a Power User Needs

Be a Mac Power User with Terminal. Copy folders and files like a pro.

Read everything below before you try this yourself. This helps saves any confusion from happening while you are trying to copy folders and files while using Terminal.

 

 

 

Copy using RCP:

Plug in your usb stick or usb drive before opening the Terminal. Using the Terminal of your Mac, before typing anything else in Terminal, type exactly as you see, changing the name ‘usb1’ to whatever your usb stick or usb drive is named. You may also wish to change the folder “dir1” to something else, or not. There is one space between rcp and -. One space between pr and Movies. One space between the two / / in the middle.

Here is the command for rcp:  rcp -46pr Movies/ /Volumes/usb1/dir1

What this Terminal Command does is copy everything inside the folder ‘Movies’ to the usb stick or usb hard drive named usb1, copying all files and folders to a folder named “dir1”. The letters -46pr tell rcp to copy everything and keep everything in the order it is in the folder Movies. It would not be good to find your copy was completed with its folders and files all mixed up.

If the files are small, the command will be completed quickly. If they are large files, it may take some seconds. Do not be in a rush, rcp will tell when it is done.

The command “rcp” which Apple suggests should be used instead of “rsync” is preferred and safer to use. According to Apple – using “rsync” is using it at your own risk as it may cause problems. I am not sure why this is so, as “rsync” is a common Linux way of backing up folders and files, or the full contents of a hard drive.

The rsync command and string is below. I used rsync on my Mac without issue, but you should not. I strongly suggest you follow Apples suggestion and only use rcp, just in case rsync does cause a problem on your Mac.

Using rsync – at your own risk on a Mac:

Important rsync note: If your usb stick or usb drive is not empty before using “rsync”, the string “–delete” erases everything on your usb stick or usb drive before the copy is started. If you want what is on your usb stick, or usb drive, you need to save the files somewhere else before you try this. Where you are copying the files to needs to be empty, or it will be erased before copying starts.

Plug in your usb stick or usb drive before opening the Terminal. Using the Terminal of your Mac, before typing anything in Terminal, to try the rsync command, type in the following command, changing the name ‘usb1’ to whatever your usb stick or usb drive is named.

rsync -av –delete Movies/ Movies/ /Volumes/usb1/

If you find using terminal to copy files fun, and you want to learn more, there is wealth of information on the web. Ensure you go to trusted websites for your information. Reading old posts may be simple, but there is no way to know if what was typed is correct. Too often some typed command is not right in these old posts, and they will not work correctly. There are of course people who knowingly posted information that could hurt your Mac. They thought it was funny at the time.

Learning the basics of using Terminal is fun and rewarding. Anyone can point and click. Knowing what and why you are pointing and clicking is real knowledge. Knowledge is fun, and sometimes pays well too. At the very least you will be able to say, “Been there, done that. Got the copy.”