Dealing with failure

Dealing with failure

Dealing with failure

Failure

I guess failure is largely down to perception unless you want to be brutally honest and black and white. You could look at it a lot of different ways and try to take the positives out of your journey that ultimately lead to failure to achieve what you set out to.

I am always fascinated by Mixed martial arts fighters in the UFC. I’m a big fan as they have to train so incredibly hard and have a lot of courage. Can you imagine getting I to a cage with another guy who is at the top of his game both physically and skills wise and really wants to punch you on the nose. That’s gonna hurt! So the fighters put a lot of effort in making sure they do not get smacked on the snout.

UFC

UFC

Apart from the effort and courage, only one out of the two guys or girls is going to win. Both have probably trained equally as hard as each other but only one will win. There is success or fail. No half way.

Maybe it will be a close fight or maybe one will get steam rolled but even then the one getting steam rolled could still pull a win off like Anderson Silver verses Chael Sonnen. Anderson got beaten up for 4 and a half rounds and then got Chael in a choke hold with his legs and won the fight. But, it means Chael lost, he didn’t become world champion, he didn’t beat Anderson Silver.

Michael Jordan

Michael Jordan

My question is how do we look at these things. Do we say well done you did well or do we say you lost. End of. You failed. The human ego is a fragile thing. You have to be strong to deal with failure, get out of bed and go for it again to try and succeed. No one became world champion at anything and never tasted defeat.. Ever..

I have failed at a few things recently. My biggest failure to date is not being with my son every day. I tried everything I could to be with his mother so that I could be with my little boy but it simply didn’t work out. Above all else I felt he deserved to grow up with his mum and dad. I really tried hard and sacrificed a lot to make that happen but eventually it was taken out my hands. And I had to deal with the ultimate failure. I had failed to be there for him every day.

Steve Jobs

Steve Jobs

We are so close and have such an amazing relationship that I cherish and am grateful for. I didn’t want to lose that. I still see him a few times a week and we still have a great relationship but I don’t have him with me every day. So I failed.

Motivation

Motivation

My second failure was an extreme Ironman I was training for. My friend Darren and I had done the race the year before on only 3 months training. It wasn’t enough for a 2.4mile swim in the North Sea, a 112 mile bike ride which included 4500 metres of climbing and a marathon which included running up and down Ben Nevis in Scotland.

We both finished. It was pretty tough to say the least but we finished. This time we both had the worst pre week possible. I was sick (probably from stress) so wasn’t feeling my best and worst of all I didn’t feel like eating which is rather important when you’re about to burn off 10 000 calories. Darren also had a dodgy tummy.

extreme ironman

Mid way through an Extreme Ironman

The day before a little wheel broke on my derailler so that needed running about and fixing. Lucky there was a bike mechanic at the race start so it was all fixed but there were a few other niggles to sort.

Now I don’t eat a lot of carbs anymore as this helps me have a six pack. Mostly meat and vegetables. So when we had a large carb dinner the night before, it transpired it wasn’t the best for me.

After a nice 3.30am wake up call we headed off to a chilly (12 degrees) 2.4 mile swim in the North Sea. The swim went well for both of us despite going a little off course.

Extreme Ironman in Scotland

Extreme Ironman in Scotland

The bike started fine but then everything seized up in my back. I was in a huge amount of pain. While I can deal with a lot of pain, I actually started loosing power too. After 40 miles I was stuffed. I had another 20 miles to get to the second check point (we skipped the first) which was seriously hard work and very mentally challenging.

Reaching the check point where my girlfriend and other friends where patiently waiting I told then I was done. I was a wreck. They didn’t get it though, they said I would be fine but I was trying to tell them I really wasn’t.. Not even a little.

Luckily Darren’s wife, Fran is also a skilled therapist so lay me on the grass and gave me a back treatment. This eased it and I felt loads better. I wasn’t really up for eating much. I had eaten more than usual but not enough much to the frustration of my crew who where trying to bribe me to eat by offering sexual favours… I was tempted!

Failure

Failure

I headed off on the next 20 mile stint feeling better but not 100%. I got through it to the 80 mile check point and got another treatment from fan. More desperation to get food into me and off on the final hilly 30 miles. I actually started feeling loads better which is interesting.

Having lost all sense of competitiveness I decided to wait for my compatriots, Darren and Steve who I thought were not far behind. Transpired they were further back than I thought but still it was good we all headed off on the marathon together at a brisk walk.

Ironman Triathlon in Scotland

Ironman Triathlon in Scotland

After a few miles my body began to break down despite having had a massage while I waited. My body literally couldn’t walk uphill. It almost came to a grinding halt. I started to jog the downhills to make the time back. I found a slow jog was easier than walking. Steve ran off to try and make the next check point before the cut off time while Darren and I soldiered on.

There were a few people and a car at the bottom of a very steep off road accent. About 2 km uphill at about 30 to 45% incline so no walk in the park. Darren said it was last chance saloon to turn back. I simply didn’t have that button to stop.

Ironman

We started at the lake and climbed up a stupid steep hill

I had sent a text to the girlfriend saying I was concerned I really wasn’t going to make it. All I got back was “you’re fine”. Awesome!

So I headed up the steep incline and miraculously I found another gear and Darren struggled to keep up. I had done a lot of steep uphill training and obviously my body remembered this and I was using a different set of muscles. We actually caught Steve back up.

don't fear failure

Don’t fear failure

It is an extremely tough climb and the ground is rough and soggy to boot. However we got to the top and headed down the other side. A rough goat track with rocks and water. I didn’t make good time and probably should have tried to run. We did a river crossing at the bottom and headed up and onto a dirt road towards the 18 mile check point.

It became apparent we were not going to make the time limit at 18 miles in order to head up Ben Nevis. Steve was ahead of us and we were hoping he was going to be in time. It turned out later he hurt his knee to although he made the check point, he couldn’t go any further.

I was enjoying the environment as we caught up another guy soldiering on by himself. He was actually a local but still found it extremely hard going. The midges made an appearance which were slightly annoying / driving us slowly insane.

We reach a vehicle and some race organisers at about 12 miles who insisted it was time to call it a day. I would have been happy to keep going to 18 miles but the midges were getting frustrating and we didn’t really have a choice.

So.. We didn’t finish. We failed.

Steve Jobs

Steve Jobs

Do we focus on our failure or on our enjoyment of the journey? Do we take the positives out the situation and be realistic compared to the time available to train verses what we really needed to have done to complete the event? Or do we acknowledge we were simply too weak to focus and commit to our training which led to our failure and next time we need to try significantly harder and be significantly more focused and determined to put the work in?

It is a interesting set of questions. It is always important to be positive and not beat yourself down with negativity however you need to accept failure and come back stronger next time. Failure is part of life and it is how you deal with it and bounce back that defines you as a person. Defines your character and strength.

Marilyn Monroe

Marilyn Monroe

Be positive but don’t kid yourself. You did fail and you have to work harder to not fail the next time. At least we never broke the rule of never, never, never give up. However close it was.

I always used to say that failure is not an option. Until I heard someone (Chael Sonnen) say that failure is always an option. The option is always there for you to take. Just choose not to fail.

Phishing or email account hack leads to Nude Celebrity pictures

Nude photos of Jennifer Lawrence (seen here at the Oscars) have been leaked online. But how did the hacker get access? Photograph: Angela Weiss/FilmMagic

Nude photos of Jennifer Lawrence (seen here at the Oscars) have been leaked online. But how did the hacker get access? Photograph: Angela Weiss/FilmMagic

The leak of Nude Celebrity pictures and, allegedly, videos of Jennifer Lawrence by an unknown hacker has security experts – including Apple – interested and puzzled. Although the hacker has posted a list of scores of female celebrities to a chatroom claiming to have more pictures of them, a number of the Celebrity’s have claimed that the photos of them are faked, while others claim they were deleted.

The list of those allegedly affected is long, and includes Jennifer Lawrence, Jenny McCarthy, Rihanna, Kate Upton and the American actress Mary E Winstead. With any hack, the principal questions are: what was the avenue of attack? And where were the photos and videos – if they were real – downloaded from?

It is unlikely according to Apple that their email system has been hacked. Large companies like Apple and Microsoft have dedicated in-house security teams who attempt to break into their own systems regularly.

Rik Ferguson, vice-president of security research at Trend Micro, said; “A wide scale ‘hack’ of Apple’s iCloud is unlikely. Even the original poster is not claiming that,”

As with the many celebrity hacks (and daily hacks that affect less famous people), the simpler and more likely explanation is the leak of an email and password combination, either through guesswork or “phishing”, when users are fooled by authentic-looking sites into entering their login details, which are then used against them.

Apple have said they are still investigating what is claimed to be an attack on its iCloud service but it is unlikely that their whole system has been compromised. The iCloud service is used by millions of iPhone users to store settings and back up all photos (and other data) taken with the phone to Apple’s “cloud” based servers.

Once you have an iCloud user’s email address and password, you can log in to their account and download those photos (including old / deleted ones) and other info.

An extra layer of security that will send a code to the owner’s phone before it allows login would be an example of two factor authentication (2FA) which will greatly increase the security of their iCloud account. Paypal as an example have this exact security measure in place. However’ comparatively few people use 2FA either because they don’t know it is available or it is too much trouble.

Apple has no comment currently on the incident but is still investigating whether the data was all taken from its iCloud service and, if so, to what extent users’ accounts were compromised.

Ferguson suggests that the hacker may have used the “forgot password” link on Apple’s iCloud system after managing to get hold of the various celebrities’ email addresses either directly or by hacking someone else’s device or email system. If anyone used the same password on multiple services, then once the hacking discovered the password on a different site then they could try the same password on the iCloud website.

Lawrence’s publicist did admit the photos are real but did not say how old they are. In a tweet, Winstead suggested a long standing effort by the hacker. “Knowing those photos were deleted long ago, I can only imagine the creepy effort that went into this,” she wrote.

However security experts have pointed out that while a smartphone user thinks they have deleted the photos from their phone – they are still possible to recover from the phone’s memory. Someone may have got hold of her old phone and managed to retrieve the photos. That said, it is unlikely they happened upon a bunch of old Celebrity’s phones.

Modern smartphones routinely save photos to the cloud because they often lack enough capacity for the huge number of photos that people take. Apple’s iPhone by default saves photos to iCloud; Google’s Android to its Google+ service and Microsoft’s Windows Phone to its OneDrive service.

Third-party services such as Dropbox also offer automated photo and data backups. “People take photos and zap them, but don’t realise that they are being uploaded and saved forever,” Cluley told the Guardian. Ferguson agrees: “Deleted doesn’t always mean deleted,” he notes.

The hacker posted a screenshot claiming to be of so-far unreleased videos and images taken on a Windows PC after he had no doubt downloaded them from one of the cloud based services above.

“Two-factor authentication” protects against such hacks because it requires anyone setting up a copy of an existing account on a new device to enter a code that is sent to the primary device – usually a phone. Without that, access is blocked. Apple, Google, Microsoft and Yahoo all offer two-factor authentication on accounts but as mentioned above, this service is not always taken advantage of for different reasons.

Other Celebrity’s have claimed that their naked pictures are infact fake. A representative for Ariana Grande said the photos said to be of her are “completely fake”. Victoria Justice also tweeted that the “so called nudes of me are FAKE people. Let me nip this in the bud right now *pun intended*”

With so many people dealing with Celebrity’s it is possible that someone got hold of their user details, perhaps to manage their social media campaign and then tried these details on other sites. However, it does appear that this has been done by a professional hacking covering their tracks rather than a simple opportunist.

Another possibility is an IT expert who helped the Celebrity setup a new computer system and then given themselves remote access to this system to grab and steal their data.

This has happened in the case of the “Hollywood hacker” Christopher Chaney, who spread photos from Scarlettt Johansson and Mila Kunis’s email accounts back in 2011, and was sentenced to 10 years in jail in December 2012 and ordered to pay more than $66,000 in restitution.

Chaney was accused of illegally accessing the email accounts of more than 50 people in the entertainment industry between November 2010 and October 2011; in one instance he sent an email from the account of Aguilera’s stylist to the star, asking for scantily clad photos, and then posted them online.

Chaney did eventually apologise, saying that his actions were “probably one of the worst invasions of privacy someone could experience”. It was also claimed he had stalked two people online for more than ten years. A tad creepy.

In the Chaney case, the celebrity’s had their email accounts hacked, and all their emails were being forward despite the password being changed.

So the moral or the story is, if you are a celebrity or not, use two factor authentication where possible. If you need any help or advise, feel free to get in touch.

Colins IT

Video of Jaguar Attacking Caiman Crocodile

Video of Jaguar Attacking Caiman Crocodile

A stunned caiman crocodile gets the shock of it’s life as a Jaguar explodes out of the river and attacks it. The 20-stone jaguar sinks its sharp teeth into the eight-foot reptile before dragging it back across the water and into the jungle. The unbelievable kill sequence was captured by videographer Sally Eagle in the Pantanal Wetlands of Brazil.

It is unusual for any animal to attack a caiman crocodile but there have been previous records of big cats and big snakes attacking and eating them. Anaconda’s have been cut open to reveal a dead caiman inside it’s belly.

Video of Jaguar Attacking Caiman Crocodile

Jaguar attacking Caiman

 

Jaguar attack on Yacare Caiman Caiman yacare on 25 Aug 2013 in the Pantanal, Brazil © Paul Donahue

Jaguar attack on Yacare Caiman Caiman yacare on 25 Aug 2013 in the Pantanal, Brazil © Paul Donahue

Cobra’s severed head kills chef

Cobra’s severed head kills chef

A Chinese chef cooking a special soup dish made from cobra flesh died after he was bitten by the severed snake’s head while throwing it into the dustbin– 20 minutes after it was cut off.

Cobra's severed head kills chef

Spitting Cobra

The chef, Peng Fan was preparing the rare Asian delicacy which uses the flesh from the Indochinese spitting cobra when the snake’s severed head bit him with a full dose of venom, The Mirror reported.

Fan died before he could be treated in hospital by using the cobra’s anti-venom, police said. The Cobra has neurotoxic venom which means it attacks the organs and heart rather than just the site of the bite itself. Without the anti-venom to counter the effects, victims will normally be dead within one to three hours depending on the size of the victim and the amount of venom injected by the snake.

“It is a highly unusual case, but it appears to be just an accident,” a police spokesman said. “He prepared the snake himself and was just unlucky.

The police stated there was nothing that could be done to save the Chinese chef. As the snake’s anti-venom was not administered in time, the patient obviously died.

Diners who were eating in the restaurant at the time of the incident described screams coming from the kitchen.

Lin Sun, 44, who was dining with his wife Su said: “We were in the restaurant having a meal for my wife’s birthday when suddenly there was a lot of commotion and screaming from the kitchen”

“There were calls for a doctor in the restaurant but unfortunately by the time medical assistance arrived, the man had already died.” Most diner left the tragic scene of the restaurant without finishing their meals.

spitting cobra

Spitting Cobra

According to a local snake expert Yang Hong-Chang, all reptiles can function for up to an hour after losing their primary body parts.

While the snake was clearly dead, there are still some reflexive re-actions which resulted in the the body-less head biting the Chinese chef, Peng.

“It means snakes have the capability of biting and injecting venom even after the head has been severed.” said the snake expert.

Eagle photo

Eagle photo

Eagle

Awesome Eagle Photo

Eagles are large, powerful and strong birds of prey, with a heavy head and beak and fearsome talons. Even the smallest eagles have relatively longer and more evenly broad wings than other birds of prey. They have a more direct, faster flight – despite the reduced size of aerodynamic feathers.

Most eagles are larger than any other raptors apart from larger species of vultures. The smallest species of eagle is the South Nicobar Serpent Eagle (Spilornis klossi)

Eagles have very large hooked beaks for tearing flesh from their prey, strong muscular legs, and powerful talons for grabbing and holding on to their prey. The eagle’s beak is generally heavier than that of most other birds of prey.

Eagles’ eyes are extremely powerful, having up to three and a half times human acuity for the martial eagle, which enables them to spot potential prey from a very long distance.

This keen eyesight is primarily attributed to their extremely large pupils which ensure minimal diffraction (scattering) of the incoming light. The female of all known species of eagle is larger than the male.

Giraffes in the moonlight

Giraffes in the moonlight

Giraffes in the moonlight

Giraffes in the moonlight

The giraffe (Giraffa camelopardalis) is an African even-toed ungulate mammal. The Giraffe is the tallest living terrestrial animal and the largest ruminant. The species name actually refers to its camel-like appearance and the patches of color on its fur.

However, it’s most distinguishing feature is its extremely long neck and legs, its horn-like ossicones, and its distinctive coat patterns. It is classified under the family Giraffidae, along with its closest extant relative, the okapi. The nine subspecies are distinguished by their coat patterns.

9 things to know about the Ebola virus

Ebola began as a handful of cases in Guinea in March but quickly spread to neighbouring Sierra Leone and Liberia.

Here are 9 things to know about what the WHO calls “one of the world’s most virulent diseases.”

Why does Ebola generate such fear? Medecins Sans Frontieres (MSF) describes Ebola as “one of the world’s most deadly diseases.” “It is a highly infectious virus that can kill up to 90% of the people who catch it, causing terror among infected communities,” it says.

There is also no vaccination against it.

There are five subtypes of Ebola, the Zaire strain and the first to be identified is considered the most deadly.

Preliminary tests by the WHO suggested that was was the strain of the Ebola virus identified in Guinea in March but this has yet to be confirmed.

What is Ebola?

The Ebola virus causes viral haemorrhagic fever which is the name given to a group of viruses that affect multiple organs in the body, according to the U.S. Centres for Disease Control and Prevention (CDC). These viruses can also cause internal bleeding.

The virus is named after the Ebola River in the Democratic Republic of Congo (formerly Zaire), which was where one of the first outbreaks occurred back in 1976. In the same year there was another outbreak recorded in Sudan.

The five different strains of the Ebola viruses are named after the areas they originated in. Three of these have been associated with large outbreaks of haemorrhagic fever in Africa.

ebolavirus

These are the Bundibugyo, which is an area of Uganda where the virus was discovered in 2007. There are two Sudan and Zaire sub-types.

There has been a solitary case of Ivory Coast Ebola. Interestingly, this subtype was discovered when a researcher studying wild chimpanzees became ill in 1994 after an autopsy on one of the chips.

Reston Ebola is the final and fifth strain and gets it’s name from Reston in the U.S. state of Virginia, where this strain of the Ebola virus was identified in monkeys imported from the Philippines. While humans have been infected with this strain, the CDC says there have been no cases of human death from this sub-type.

How do you know if you have Ebola? 

Early symptoms of the Ebola virus include sudden onset of fever, weakness, muscle pain, headaches and a sore throat. These symptoms can appear two to 21 days after infection.

The problem with the symptoms says the WHO is that these are non specific and can be mistaken for signs of diseases such as malaria, typhoid fever, meningitis or simply flu.

Some patients may also develop a rash, red eyes, hiccups, chest pains and difficulty breathing and swallowing. The early symptoms progress to vomiting, diarrhoea, impaired kidney and liver function and sometimes internal and external bleeding.

Ebola can only be definitively confirmed by five different laboratory tests.

How is it treated?

While there are lots of research and experiments going on there are no specific treatments for Ebola. Patients are isolated and then supported by health care workers.

Health workers Treat patient by hydrating them, maintaining their oxygen status and blood pressure and treating them for any complicating infections
.
There have been cases of numerous health care workers contracting the virus from patients, and the WHO has issued guidance for dealing with confirmed or suspected cases of the virus.

Caregivers are advised to wear impermeable gowns and gloves and to wear facial protection such as goggles or a medical mask to prevent splashes to the nose, mouth and eyes.

The 2012 outbreak in Uganda was controlled by placing a control area around its treatment centre. An outbreak is considered over once 42 days — double the incubation period of the disease — have passed without any new cases.

What drugs exist to combat the disease?

2 American missionary workers infected with Ebola were given an experimental drug called ZMapp, which seems to have saved their lives. The drug, developed by a San Diego firm, had never been tried before on humans, but it showed promise in small experiments on monkeys infected with the disease.

However, rolling out an untested drug during a massive outbreak would probably cause even more problems. Experimental drugs are typically not mass-produced, and it is difficult to track the success of such a drug.

ZMapp’s maker says it has very few doses ready for patient use. Other experimental drugs like Tekmira, produced by a Vancouver-based company that has a $140 million contract with the U.S. Department of Defense to develop an Ebola drug. Phase 1 trials began with its drug in January. But the FDA recently halted the trial, asking for more information.

According to Thomas Geisbert, (a leading researcher at the University of Texas Medical Branch) at least one potential Ebola vaccine has been tested in healthy human volunteers. The NIH announced that a safety trial of another Ebola vaccine will start as early as September.

Only back in March, the U.S. National Institute of Health awarded a five-year, $28 million grant to establish a collaboration between researchers from 15 institutions who were working to fight Ebola.

Grant also said that “a whole menu of antibodies have been identified as potentially therapeutic, and researchers are eager to figure out which combinations are most effective and why”

How does Ebola virus spread?

The World Health Organisation says it is believed that fruit bats may be the natural host of the Ebola virus in Africa, passing on the virus to other animals.

Humans contract Ebola through contact with the bodily fluids of infected animals or the bodily fluids of infected human beings.

MSF says that while the virus is believed to be able to survive for some days in liquid outside an infected organism, various methods will kill it including chlorine disinfection, heat, direct sunlight, soaps and detergents.

MSF epidemiologist Kamiliny Kalahne said outbreaks usually spread in areas where hospitals have poor infection control and limited access to resources such as running water.

“People who become sick with it almost always know how they got sick: because they looked after someone in their family who was very sick — who had diarrhea, vomiting and bleeding — or because they were health staff who had a lot of contact with a sick patient,” she said.

Bats spread the Ebola Virus

Bats spread the Ebola Virus

Can plane passengers become infected?

While the CDC acknowledges it’s possible a person infected with Ebola in West Africa could get on a plane and arrive in another country, the chances of the virus spreading during the journey are low.

“It’s very unlikely that they would be able to spread the disease to fellow passengers,” said Stephen Monroe, deputy director of CDC’s National Center for Emerging Zoonotic and Infectious Diseases.

“The Ebola virus spreads through direct contact with the blood, secretions, or other body fluids of ill people, and indirect contact — for example with needles and other things that may be contaminated with these fluids.”
He added that most people who have become infected with Ebola lived with or cared for an ill patient.

“This is not an airborne transmission,” said Dr. Marty Cetron, director of CDC’s Division of Global Migration and Quarantine. “There needs to be direct contact frequently with body fluids or blood.”

Travelers should take precautions by avoiding areas experiencing outbreaks and avoid contact with Ebola patients.
“It is highly unlikely that someone suffering such symptoms would feel well enough to travel,” IATA said in a statement.

“In the rare event that a person infected with the Ebola virus was unknowingly transported by air, WHO advises that the risks to other passengers are low. Nonetheless, WHO does advise public health authorities to carry out contact tracing in such instances.”

This means determining who had contact with the affected person.

What should flight crew do if Ebola infection is suspected?

The CDC has issued guidance for airline crews on Ebola virus infections.
“As with many other global infectious disease outbreaks, airline carriers, crew members, airports can be very important partners in that front line,” said Cetron. “Being educated, knowing the symptoms, recognizing what to do, having a response protocol, knowing who to call, those are really, really important parts of the global containment strategy to deal with threats like this.”

The CDC advises that when flight crew members encounter a passenger with symptoms that they suspect could be Ebola, such as fever and bleeding, that they keep the sick person away from other passengers. They’ve been instructed to wear disposable gloves and to provide the sickened person with a surgical mask to prevent fluids from spreading through talking, sneezing or coughing.

The airline cleaning crew are also instructed to wear disposable gloves, wipe down surfaces including armrests, seat backs, trays and light switches. The CDC says that packages and cargo should not pose a risk, unless the items have been soiled with blood or bodily fluids.

When someone becomes ill on a flight, the captain is required by aviation regulations to report the suspected case to air traffic control, according to IATA.
What is the risk of catching Ebola on a plane?
How many cases have there been?

The CDC estimates there have been more than 3,000 cases of Ebola and more than 2,000 deaths since 1976.

The last recorded outbreaks before the current one in Guinea were in 2012 — in Uganda and Democratic Republic of Congo.

Ebola Disease Outbreak

Ebola Disease Outbreak

The Uganda outbreak involved a total of 24 probable and confirmed cases, and 17 deaths, according to the WHO, which declared it had ended in October 2012.
MSF said the Uganda outbreak had been the Sudan strain, while the virus found in DRC was the Bundibugyo sub-type.

Before 2014, the most deadly outbreak was the 1976 outbreak in then Zaire, when 280 of 318 infected people died, according to the CDC. In 2000, there were 425 cases of Ebola Sudan in Uganda, which resulted in 224 fatalities.

Scary Truth about Facebook Messenger

This is important to read and understand. I can only report what I have found but can not guarantee how accurate this is. That is, none of it is unbelievable.

We are all a bit sick of having to firstly being forced to use the new messenger app and secondly sick of all the invites to use the stupid thing.

We generally use facebook on our phone more than on our laptop or computer. So at some point you will either have already installed Facebook messenger or at least been invited a number of times.

So let me try and explain what’s happening and what the implications are of using the new app.

facebook messenger

Facebook Messenger

It’s always been OPTIONAL but coming soon to your Facebook experience….it won’t be an option…it will be mandatory if you care to send messages from your phone.

Now you may think this is just another app but what you probably won’t realise is the permissions you must give to Facebook in order to use the Facebook Messenger App.

Here is a short list of the most disturbing permissions it requires and a quick explanation of what it means to you and the privacy settings on your phone.

• Change the state of network connectivity – So Facebook can change or alter your connection to the Internet or your mobile service. You’re basically giving Facebook permission to turn features on your phone on and off and without telling you.

• Call phone numbers and send SMS messages – Facebook is able to automatically send text messages to your contacts on your behalf without your consent.

• Record audio, and take pictures and videos, at any time. Yes, RECORD audio…TAKE pictures and VIDEO….AT ANY TIME!! That means that Facebook can see through your phone’s camera whenever they want.. Facebook can listen to what you’re saying via your microphone whenever they decide to.

• The privacy settings you have to accept when you install the Facebook messenger app also Facebook to read your phone’s call log, including info about incoming and outgoing calls – Who have you been calling? How long did you talk to them?

• Facebook will be able to read your contact data, including who your contacts are, how many you have, who you call and email and how often. Now Facebook will be able to read e-mails you’ve sent and take information from them to use for their own gain, be that “personalized advertisements” or if it’s for “research purposes”. I think what is more scary is the US Government getting hold of this data.

• Facebook will be able to read personal profile information stored on your device – This means all addresses, personal info, pictures or any other private info.

• Get a list of accounts known by the phone, or other apps you use– Facebook will now have a tally of all the apps you use, how often you use them and what information you keep or exchange on those apps. Probably advertise similar apps to you or more.

Having read up and investigated the permissions I have now deleted the app from my phone and don’t intend to use it ever again. I still have my Facebook app but any messages will have to be done on a computer and not on the phone.

With these kinds of privacy invasions Facebook as a simple company is pushing the boundaries of data protection. I still feel this is more for the benefits of the NSA rather than facebook themselves although Facebook will be delighted to have all this data to customise their marketing even further.

In the good old days we used to setup sudo names to protect our identity. But now with apps like Facebook which are very personal to who we are and our real friends we connect to and interact with, our real data is out there. There is no sudo name pretending to be someone else. The real you is out there for a company like Facebook and others to take full advantage of.

We have forgotten about that desire to protect our identity and we just lay down and let them invade our privacy. Or perhaps we are simply too trusting.

Facebook Messenger

Facebook Messenger

Perhaps this will happen anyway as many people won’t read this or think it is worth taking action. There will be petitions but who knows if it will be enough. It will have to be significant for Facebook to actually reverse their strategy. And as usual, when everything dies down (hype) they will do it anyway.

So please share this and let your friends know the dangers of the Facebook messenger app and to un-install it immediately if at all possible.

Leopard climbing tree

Leopard climbing tree

leopard

Leopard climbing tree

America Has A Secret Super Weapon

Michio Kaku

Dr Michio Kaku

Dr. Michio Kaku Says America Has A Secret Super Weapon.

So why is America seemingly so successful and produces amazing innovations from Silicon valley? When we watch American TV and talk to a lot of people they come across as really stupid. So where do all these Nobel laureates come from?

Well, America has several secret weapons that most nations (especially Americans) have never heard of. The secret weapon, the weapon that keeps the US at the forefront of innovation and scientific progress and high tech, is the H1B.

That is the secret weapon that most nations and people have never heard of. What is it? The H1B is the genius visa. If you are “a genius,” for example you have a PhD, if you have wealth, if you’re an established public figure, then bang, America wants you and you get a green card to go straight into the United States to energize Silicon Valley, which is 50% foreign born.

While Bill Gates and Steve Jobs are not foreign born, 50% of the scientists behind Bill and Steve are foreign-born. There’s a massive brain drain from foreign countries and it the the United States that is sucking in all the top talent and geniuses.

This is where innovation takes place and is rewarded financially. Lets be clear, America does “see the genius in the classroom.” like the young Gates and young Jobs and even the young Albert Einstein.

In the East there is an expression, “The nail that sticks out gets hammered down.” In the East there is this Confucian tradition that you’re not supposed to make your peers look bad by excelling and trying to achieve something beyond their abilities. Don’t make everyone around you look stupid in other words.

However, in the West, there is another saying, and that is, “The squeaky wheel gets the grease.” So, the innovators, the real imaginative thinkers, they are rewarded in the American system, while in the East they are hammered down.

And third, the American college system is not so bad. Even though the high school system generates millions of near-illiterate students, by the time they hit college, then that’s when they begin to accelerate. That’s when they begin to get up to speed if they have it in them.

But the US can not sustain their scientific establishment this way. They can not continue to rely on foreign scientists. They need to generate their own pool of geniuses.