A friend called and asked a favor. I’m not exactly the kind to give the shirt off my back so I was immediately wary and assumed a defensive stance. But it turned out all he wanted was to borrow our cat carrier. I said yes. I figured, what the hell.
What is it to actually be considerate of a person other than yourself? And why has this become such a lost art?
Recently it was the Fourth of July. As such, I had strongly considered keeping the cat carrier handy in case the asshole neighbor(s) shot fireworks at our house and set it ablaze. I wanted to be be disaster prepared and able to whisk my kitties away to safety at a moment’s notice.
Alas, I was afflicted by inertia and never got off my lazy ass to get the damn thing. I decided to roll the dice and play the odds. After all, my house wouldn’t burn down. Probably.
Doctors performing likeotomy on a volunteer subject.
A reading from the book of Demotivational Dictionary:
noun (pl. likeotomies) [ usu. in sing. ]
usage of the “favorite” button on tweets about my lobotomy: too bad you are now unable to grok the likeotomy I gave you.
A reading from the book of Demotivational Dictionary.
I’m pretty much a collector of likes. Feel free to share one of your own. I always appreciate them. I think.
[I] want to say thank you to you. I haven’t had an orthodox career and I’ve wanted more than anything to have your respect. The first time I didn’t feel it, but this time I feel it. And I can’t deny the fact that you like me. Right now, you like me! Thank you.
–Sally Fields, March 25, 1985
Sally Field about to bludgeon a cretin who failed to favorite her tweet.
Thank you, Ms. Fields. That’s exactly how I feel each and every time one of my tweets gets a star on the Twitter Walk of Shame. I’ve personally counted more visits by Halley’s Comet, though.
It works like this: You see a tweet you like (or some other masturbatory form of social media expression) and you like it. So you click the little icon that means favorite, like, upvote, star and/or what not. What’s so hard to understand about that?!
It turns out that “like” is sometimes the wrong tone.
“My father molested me every single day until I was eight years old.”
Do you think, somehow, that “like” seems misplaced here?
Prattling on about this nonsense and that is all well and good, but the time has come to put lofty ideas into action. It’s time to be livid.
Pro Tip: You may want to keep some napkins handy just in case veins on your forehead pop.
Sometimes life will lope up on you from behind and give you ample reasons to be angry. Sometimes (although I can’t imagine why) you aren’t even in the mood to be angry yet life will foist itself upon you regardless. It will literally force you to be livid against your will.
True, those are sublime experiences, but they do tend to be rather random and when the chips are down, you really can’t count them.
So, what to do? Take matters into your own hands, of course! With my tried and true techniques, and a bit of practice, so you’ll soon be livid with the best of them, as often as you want and when you need it the most.
Sound too good to be true? It probably is. See? I can feel it working already! Continue reading →
I don’t know things. I just like to posit The Possible with the most negative spin. I guess in my world that makes it The Probable. As you’ll see, I have an active imagination. Imagine the worst to avoid surprises on down the road. -Ed
Have you been worried about what the NSA is up to since the big Snowden season finale reveal? Allow me be the first to say you ain’t worried about nothin’ yet. Or something like that.
That’s the one thing about technology. It’s a curse but it’s also a bigger curse. It’s funny that way.
Tom’s Law #42
Every leap in technological prowess is accompanied by an exponential leap in the Machiavellianism of human beings.
I know that sounds complicated and confusing and chock full of jargon. In layman’s turns it simply means that technology is the means by which we get to be extra shitty to each other. Like always, this can take many forms.
The government, it turns out, likes to make secret arrangements known as “Gentlemen’s Agreements” with the innovators and makers of technology. The public is generally not privy to these manufacturer deals.
In one case, “tiny yellow dots” were generated by color printers and added to printouts. The dots were invisible to the naked eye and could only be seen using a “special kind of flashlight.” These dots are used to watermark the print and encode information specific to the printer like serial number and date and time. The program reportedly existed during the 1990s and was discovered and cracked by the Electronic Frontier Foundation (EFF) in 2005.
Officials at Xerox said that the encoded dots were added at the request of the United States Secret Service which had asked for help and that the program was designed to provide information useful to law-enforcement authorities in tracking down criminals. (Source: Washington Post.)
The process required the involvement of a U.S. consumer (known as the “sucker”) and worked like this:
Sucker buys a printer.
Sucker fills out the warranty “registration” card with factual information and sends it in.
Sucker prints a document using an MS-Word template with help from a paper clip: “It looks like you are writing a death threat and/or extortion demand. Would you like help?”
Law-enforcement cracks the code and is led to the sucker like Hansel and Gretel following a trail of bread crumbs.
Sucker is transformed into a criminal and gets free meals and lodging for a long time to come.
In this particular example, we get a fairy tale outcome and everyone is happy. But the moral, so obvious to you and me in this jaded age, is that the program could have been applied to any of us at any time and for any reason.
Another moral of this story: “Registration” is not required for full warranty eligibility. (In some cases a manufacturer can require it for limited warranty.)
So what’s the deal with those cards often euphemized with adorable names like: Warranty Card, Warranty Registration, Product Registration, etc.
Product registration and warranty cards don’t do very much for the consumer, but they are a gold mine for marketing companies. Notice that many cards go way beyond asking for your name, address and the serial number of the product. Questions such as your age, marital status, salary, education, do you own or rent and what kind of car you drive are common.
“Product warranty cards are information collected under the pretense of a benefit where the information goes straight to marketers. The purpose of a product warranty card is not to protect you, it’s to collect marketing information.”
Voluntarily filling one of these cards out when you don’t have to is the proper procedure for earning the “sucker” moniker. And, for bonus points, you’ve also signed up as a participant in a secret government program. Congratulations.
So that covers one example. What else ya got?
You know those blank CD-ROMs you buy to burn your stuff? Did you know that when you do you’re paying a “royalty” to organizations like the RIAA with the federal government acting as the gatekeeper? The theory goes that you couldn’t possibly want blank CD-ROMs for any other purpose than the illegal sharing of copyrighted content, therefore intellectual property holders are entitled to a piece of the action. Yeah, just like that episode of Star Trek.
Initially, in the United States, there was a market separation between “music” CD-Rs and “data” CD-Rs, the former being several times more expensive than the latter due to industry copyright arrangements with the RIAA. Physically, there is no difference between the discs save for the Disc Application Flag that identifies their type: standalone audio recorders will only accept “music” CD-Rs to enforce the RIAA arrangement, while computer CD-R drives can use either type of media to burn either type of content.
17 U.S.C. § 1008 bars copyright infringement action and 17 U.S.C. § 1003 provides for a royalty of 2% of the initial transfer price for devices and 3% for media. The royalty rate in 17 U.S.C. § 1004 was established by the Fairness in Music Licensing Act of 1998. This only applies to CDs which are labeled and sold for music use; they do not apply to blank computer CDs, even though they can be (and often are) used to record or “burn” music from the computer to CD. The royalty also applies to stand-alone CD recorders, but not to CD burners used with computers. Most recently, portable satellite radio recording devices contribute to this royalty fund.
The moral of this story is really fun. If you’re the sad sack, that one poor son of a bitch who actually obeys the law, you still get to pay the royalty fee. In essence, for being a good person you are rewarded by subsidizing everyone else’s criminality. Of course, if your only use of blank recordable CD-ROMs is backing up your weekly Quickbooks file, you pretty much deserve what you get. Because, what a shitty piece of software.
For a long time the makers of CD-ROM burners secretly installed “generation” controls. This basically prevented people from burning “copies of copies.”
No doubt about it. Apple makes getting screwed look good. That screen is so elegant and well designed.
I went to the store to buy an Apple TV. It’s a device, like a Roku, that streams content from an internet connection to a television. I asked the salesperson if it could be used to send content from the iPad to the TV. “Yep, it does that! Airplay makes it easy as pie! Airplay allows you to share anything from your iPad and project it onto your TV. Your TV essentially becomes a monitor for your iPad.”
“Golly, gee,” I said, forking over my money. “That sounds good to me!”
At no time was I informed that some restrictions may apply. The box (which I still have) said nothing of this. It wasn’t on the store receipt. I don’t recall seeing it on the instructions inside when I finally got home and opened it up. To this day I have no knowledge of ever participating in an “informed consent” decision. Yet, there it sits, on my TV. The message that says, “No, we will not do what you ask. Your TV does act like a monitor, only that it also has the power to refuse requests, albeit politely.”
It’s like a car that won’t drive you to a strip club. Actually, to be honest, it’s like a car that will happily drive you to the Apple Store but suddenly displays a friendly apology when you try to go to the Microsoft Store. (Not that anyone would ever try that.)
The moral here is that the concept of “informed consent” in a retail context is bullshit. You can’t consent to that which was deliberately concealed. “Gotcha,” exclaims Apple. “All your money belong to us.”
What else is going on? Lots and most of it (or all?) takes place without court orders or subpoenas.
Location tracking via mobile phones.
Social media compliance with government requests.
Collection of phone call records.
Eavesdropping on international conversations.
It doesn’t have to be secret and it doesn’t necessarily always come from the government, either. Researchers recently did a study where, using only publicly available “like” information on Facebook, they could deduct, with amazing accuracy, things like an individual’s “intimate personal attributes.” Things like “race, age, IQ, sexuality, personality, substance use and political views.” And that’s using only the Facebook “like” button. Information that Facebook users make publicly available by default. Researchers refer to this sort of data as a “generic class” of digital record. (Source: University of Cambridge.)
Hell, even Pandora, the online music streaming service, recently got in on the act claiming that it can determine the political leanings and voting preferences of its members based on their up/down votes on songs. (Source: Wall Street Journal.)
Data is being collected. And, as incidents like Target and Kickstarter tell us, data is being successfully hacked on a massive scale at an alarming rate. Assuming we trust the collectors to always take our best interests to heart (which we shouldn’t) what about the interests of the people who steal it away? I wonder how much regard they’ll have for us? Dangers like these used to be esoteric thought experiments. Now they are here and growing routine.
If you know me, you know that I like to take what is knowable, that which is established, and treat it like the tip of a giant iceberg. I like to ponder. What else is out there? What else might be going on? Take what is known and extrapolate. Deduct. Guess. Use your imagination.
How would you feel if you went into a job interview and they could pull up a history of everything you had ever search for on the internet? Including phrases like “rubber hose plumpie porn” and what not? Technology makes that scenario not only possible but probable. Don’t forget that computing power is expected to continue to double on a regular basis until it will exceed the combined thinking abilities of every human brain on Earth. That power is going to be used for something.
Police cars currently have the ability to drive through parking lots and scan, in real time, all the license plates. If a car is stolen or the drive has wants and warrants the computer immediately lets them know. What if this scanning technology was extended beyond parking lots and didn’t require a human to operate the system? What if a technology was developed so these types of scanners could be cheaply and easily deployed everywhere that cars go?
I’m also the guy who predicted the NSA Masturbation Database. Imagine if that ever got in the wrong hands? (Meh!) Hackers steal the database, sell it to the Catholic church, and next thing you know, your entire block is being denied holy communion, is excommunicated, or worse!
A lot of people have worried about the day humans will be bar-coded or have RFID-style devices implanted under their skin. But what if the reality turns out to be much more subtle and nefarious than that? “Devices? That hurts. We would never do that to you. You wound us.” What if technological advancement makes it possible to do that, and so much more, using non-invasive means that the individual is literally helpless to prevent?
What then? What will that society look like?
Today’s homework exercise: What else can you imagine? What might be out there right now? Or in the near future? Can you think of any specific examples? Please share them in the comments section below. The NSA will automatically receive a carbon copy.
I believe that people have the right and freedom to believe what they want. I believe that’s a basic human right.
When I meet someone, who knows what they might believe? In all likelihood they believe in God. (In this country I’d say about a 70 to 80 percent chance.) There’s at least a fifty fifty shot their political party affiliation is different than my own. There’s a high probability they believe in at least one idea that I’d consider wonky. (Bigfoot? Probed by aliens? Michele Bachmann is human? Sarah Palin is a decent hunter because she uses a helicopter?) If you think of the political spectrum as a grid, the odds drop even lower, perhaps 1/16th, that we are in the same general neighborhood.
I don’t worry about any of that stuff. I base my opinion of a person on things like how they act, what they say, if there are nice, sound pleasant and reasonable, rub me the right way, etc. Continue reading →
This is the exciting conclusion to a two-part series entitled The Blog That Wasn’t There. When we left I had just accidentally hit the Publish button and created part one. -Ed
We were led to believe that hyperlinks were good. They could lead to other websites. They were part and parcel of the grand “content” scheme, the belief that sharing would occur across the internet.
For example, bloggers could embed video, music, images and more with just a bit of text. Books on blogging advised us that this was the thing to do.
Even WordPress got in on it. They rolled out something called PicApp. It was a way to legally include a vast library of commercial images in your posts. Like a good little foot soldier I used the feature every chance I could get.
What could possibly go wrong?
Bloggy, bloggy wasn’t there
Bloggy, bloggy didn’t care it wasn’t there
Just like my underwear
Bloggy wasn’t there
If you got a bloggy issue, here’s a bloggy tissue
BL to the O to the G G Y
BL to the O to the G G Y
Say it gots no soul but blog has gots a wide gaping hole
Do bloggers ever go back and re-read their own stuff? I do. Perhaps I’m doing a bit of research on a new post or I want to link something in. When I go through this process I’ll often re-read the entire thing. That’s usually when I discover all sorts of horrible typos that my editor failed to catch. Hint: I don’t have an editor.
And I’m just OCD enough to fix them, years later, once discovered.
But as I went through this exercise I began to notice something else. All my contents were gone.
There, on the blog post, where a content used to be… What’s that?
It’s the wide gaping hole of nothingness.
Every spot where I used PicApp in good faith is now an empty rectangle. All of those YouTube videos? They have been replaced by even funner messages like:
The video uploader made the video private
The uploader account no longer exists
The video is no longer available due to a copyright claim by Sony. (You know, the company that wrote fake reviews of its own movies. They are sticklers for the rule of law.)
The video is not allowed in your country.
The uploader has restricted playback on your platform.
YouTube performed an exorcism of the video. (Only applies to Kirk Cameron while trying to promote his latest narcissistic crappy movie.)
Video was deemed “hate speech” after whiny protests by the Church Lady and her cohorts. (Only applies to atheists who are amazing.)
In fact, my research indicates all videos will be removed by YouTube except for the following:
Funny video of cat
Now I go back and look at old posts and I, the inimitable author of same, don’t even have a clue what was supposed to be there. And all this time you actually thought you were building something. Ha ha ha ha!
The moral of this story: It’s obvious. Never, never, never include embed any content in your blog posts. That’s the worst mistake you can ever make.
So, effective immediately, I’m renaming this place The Library Of Gaping Holes Formerly Known As Contents. The Library of Alexandria had nothing on this vast repository of suppositories.
Just consider it my gift to you. Feel free to come on back any time you want your head filled with nothing.