The “Information Extinction Horizon” – A Hybrid Theorem

Parkinson’s Law suggests that “work expands to fill the time available for its completion.”  The Peter Principle posits, “in any hierarchy people tend to rise in the hierarchy through promotion until they reach the levels of their respective incompetence.” Murphy’s Law states that “whatever can go wrong, will go wrong, at exactly the wrong moment.”

All three ideas developed before the current age of exponential, media expansion.  What is so amazing is, that in the age of the Internet, and myriad TV channels, these three principles combine to form a valid hybrid theorem I have dubbed the “Information Extinction Horizon,” (IEH). This new IEH theorem states that, “as media content expands to fill existing bandwidth, it declines logarithmically to inane, bogus levels of incredibility, intellectual value, journalistic validity, and schlock, while simultaneously accelerating from bare facts to all possible interpretive opinions, and providing exactly the wrong information to the wrong people, at the most inopportune time, or, worse yet, no information of discernible value at any time.  This is a clear refutation of e=mc2.

Major corollaries to the IEH theorem relate to the milieu of internet blogging outlets, social media platforms and any other posts of personal and political natures, including pure invention, and pictures of what one’s dog ate for breakfast (including recipes).

Using Google News as a proof, rate the value and verity of their current page of articles.  In your analysis, include the sub-articles and the number of outlets with different, (apologists use the word “nuanced”) versions of the same reportage.  Notice how the results form nebulae, galaxies, solar systems and planets of personal, political, regional, national, celebrity, and sports-team-loyalty cohorts.

Also notice how futile efforts to filter searches of any topic have become.

Added support to the new hybrid theorem is Parkinson’s Law of Triviality: “members of an organization give disproportionate weight to trivial issues.”  Browsers and search/advertising engines of major internet “organizations” amplify and degrade the value of content at the same time with advertising “pollution.”

For now, we must rely on anecdotal evidence and impressions to support the new theorem, but then, anecdotal is the essence of the theorem to begin with.

Stephen Hawking 100-Year Horizon – Human Nature Will Not Let US Survive

The most sacrosanct assumptions in projections of the future pertain to the uninhibited “right” to have children.  Arguments galore might pan the notion that having children is not a right, it is a luxury the future may not afford.

Ask yourself:

What is the source of pollution?

What is the source of famine?

What is the source of war?

The answer to all the problems posed by fatalists is simple:  people.

People, from birth to grave consume and emit.  Without technology, with technology, it does not matter.  Being alive adds to the problems we work so hard to offset.  Yes, you and I demand food, water, clothing, shelter, and many products and services that require resources.

In the extractive era, all we had to do was harvest.  We fished, hunted, drank water, felled trees, built fires, made tools, developed agriculture, and diverted rivers to allow us to harvest even more from nature.  And what did we contribute in exchange for the bounty we consumed?  Effluence.

So vast was the trove of resources, we had the energy, tools, and bodies to plant and husband, delve and drill, sail and dive, smelt and forge ourselves weapons and consumptive infrastructures.

The constant threat of extinction was real and constant.  The rate of mortality for mothers and babies was daunting.  The mortality of hunters and soldiers was also constant.  Not only was procreation allowed, it was demanded of women by men, relatives, and religions.

Numerous times, depopulation was significant, through wars and diseases.  The specter of extinction haunted our species, and still does in nuclear and cosmic ways.

It is ironic that the solution to our fears is the source of our threats – more people. Preserving resources ranks lower than species’ survival.  Increasing consumption of resources, and the byproducts that creates, threatens our existence.

Our nature demands that we dig our own graves, rather than curb our breeding.  Is it wrong?  Define wrong.

Millions of Americans Install Russian “Spyware” on PC’s

In the 21st century, anyone in America, without awareness and knowledge of computers, is as vulnerable as a “babe in the woods.”  The information age has vaulted into predominance of American’s attention without the benefit of requisite education, warnings, and orientation.  And this extends to all the people who, together, run our government.

Unfortunately, computers have become easy to use too quickly, and recklessly; it is like giving a hammer to a baby.  Americans can send and receive emails, visit on Skype, download free “stuff,” shop til their fingers or credit cards give out, bare their most intimate and inane secrets and weaknesses, seek love, watch videos, etc.

Americans are as ignorant about “hacking,” as they are about “fracking.”  “Hacking” sounds like chopping away at something like wood, or meat.  The concepts of computer hacking are not too different, except computer hackers are trying to log in to computer networks by trying to identify an administrative  user account; otherwise they test countless combinations of usernames and passwords.  They are burglars trying to steal valuable information, such as Ms Clinton-related emails, or damage, or hijack your system for ransom.  They look for anyone who has access to everything interesting and “hack” their account.

Hackers count on users being careless and simple in choosing their log in credentials. Sometimes users use their home computers or laptops to connect to their work computers. That means a “hacker” can find out how to connect to other network computers through your computer using your credentials.

How do they get into your system?  Through the internet, mostly through email links or attachments, otherwise they use multiple login attempts.  Sometimes, seemingly innocent emails or downloads can install software that gives a hacker the keys to everything on your computer, including your identity information, accounts, and financial information.

So, we take steps to protect ourselves with anti-virus, and anti-malware programs.  These programs learn and have access to every intimate detail about your computer and its connections to the internet.  They are supposed to detect, deter, and destroy any harmful files that come your way.  But wait; what if this software is turned against you?

How asleep at the switch, clueless, and careless can we be?  Millions of Americans have blithely installed Russian software on our own computers, supposedly, to protect us from malicious intrusions, and we are surprised when we are violated?  Really?  This software holds the keys to access everything on any computer that uses it, and any computer that connects to it or its networks.

We could have, should have looked beyond the advertising, (even ads on public radio,) and no cost downloads to the company that offers it; but we have not.  Even if you uninstalled the software, did it really remove every trace of itself?  Or, could it have left some tiny, hidden, latent elements designed to give itself a “back door” to your computer?  How would you know?

Anti-virus and anti-malware software is supposed to guard our computers from harm; it has access to everything on our computers and everything from other computers that communicate with; email, surfing, contacts, documents, programs, firewalls, passwords, yes, everything.  It is supposed to identify and neutralize threats from people and programs that seek to ransom, destroy, and steal our most valuable, sensitive information.  How carefully have we researched the sources of the programs and data we have on our computers?

Did you know that Kaspersky Labs, renowned for its anti-virus/malware powers, is owned by Russians and headquartered in Moscow?  Check out this link.  https://en.wikipedia.org/wiki/Kaspersky_Lab

I wonder, how many Democrats, Republicans, Independents, Greens have Kaspersky software on their computers?  I wonder how many other programs we might have downloaded that could be secret agents for our enemies?

 

Parents Addict Children – Screen Zombies

Parents put their babies in front of television and tablet screens to entertain and “babysit” them.  Parents and teachers believe children can advance their knowledge through computer “learning systems.” Parents surrender to the pressure from their preadolescent daughters for smartphones so they can text their friends and share activities through social media.  Children spend hours at their computers and tablets absorbed in online role-playing and video games.

The problem is these children can easily become lifetime addicts to their virtual worlds.  Notice the bent heads of children with their families in restaurants; they are not saying grace.  Check out kids in buses and the back seats of cars; how many are looking out the windows or talking to each other?

Listen for that faint buzzing sound in movie theaters, and watch the Pavlovian response of children who cannot resist answering voice and text messages no matter when or where they are.

Dr. Nicholas Kardaras is an expert in addiction and rehabilitation.  He paints a chilling picture of the futures of these children in his book “Glow Kids.”  He operates rehabilitation centers for drug and alcohol addiction.  The problem with “screen addiction” is there is no way to eliminate the “substance” from their environment; tech stimulations are everywhere, waiting for the addicts to notice and return to them.

The trance induced by these addictions is powerful; people can spend hours at the screen and be totally unaware of the passage of time or the events that happen around them; their lives have been hijacked, and that part of their lives is gone.

Social media addicts get emotionally engaged with people they never met, pictures of somebody’s lunch, and silent “verbal” exchanges. When I was growing up, if someone teased me or called me names, I was taught to say, “sticks and stones can break my bones, but words can never hurt me.”, or “I’m rubber, you’re glue, whatever you say bounces off of me and sticks to you.”, or “so are you.”  It really worked for me (except when sticks or stones, or fists or feet were actually employed.  THAT was what we called bullying;).

Now, kids are committing suicide in response to slurs or embarrassments.  Why would they do that? Think about it; no physical harm was done; a normal person would not react that way; it must be psychological; they would have to be addicts to respond that strongly to “cyberbullying.”  Not knowing about the addiction leaves most adult, non-addicts perplexed about what to do.  Instead of rehabbing and strengthening the psyche of the addict target, we try to outlaw bullying; what a thankless, futile waste of energy and time when dealing with children at that stage of development.

I defer to the experts on what to do and not do, but reading this book would not hurt your understanding of this problem.

A Business Owner’s Response To Obamacare

What a great time to load more burdens on business.  Just as the US economy has leveled off from its scary decline, the federal government has chosen to add regulations and taxes relating to health care insurance to the choice of whether to hire or keep an employee.

I suggest that now is the perfect time to deal with this extra cost head-on with a new concept of employment compensation:  Total Compensation Agreements.  That’s right, fire all your employees and rehire them under TCA’s.  A Total Compensation Agreement would put a number on the total amount the employer will pay for the services of an employee.  If the number is $75,000, then that amount would be allocated among the employer’s costs related to the employee; what was left would be their paycheck.

We are fortunate to live in the age of computers that can calculate how this would work out.  For example, if the employee’s health insurance is $25,000 for a family of 4, the program would subtract that amount from the $75,000 leaving $50,000; if the employer’s cost of  FICA, unemployment insurance, worker’s compensation, etc., was $5,000, that would be subtracted from the $50,000 leaving $45,000; if the employee’s withholding and FICA was $7,500, that would leave take home pay of $37,500.  That is it.

If the business cannot afford to pay more than $75,000 for this employee’s services, or the employee cannot afford to live on $37,500, then no job.

The TCA structure would eliminate all minimum wage employees, and almost all less skilled workers from consideration.  Only those people whose productivity and lifestyle matched the profile would be employed.  Already, many business have found that redesigning their business model to use technology and fewer people makes sense.

What else can a business owner do?  It is either this approach or failure as a business.  Do the numbers.

So far, the only thing a business owner does not have to do is stay in business.