–«•»– remote conferencing software experience references 
      set the background image for your zoom screen 
      unbiased comparison 
        Figure 1. Magic Quadrant for Meeting Solutions 
   There may be a problem with settings compatable simultaniously with zoom, webex, and skype.
   A solution may be to have separate user names for use with each.

–«•»– Local Clubs in Lake County IL 
     RLB CERT   1st Sunday 6:30p

–«•»– parking lot Public Adress (PA) 
    Licensed equipment can be used to broadcast without a license. 

–«•»– reported examples of use of remote software 

 buffalo background image 

–«•»– x place holder 

–«•»– swivels for camera mounting 

POWER –«•»– ring installation One can determine what to do from measurements at the door. –«•»– greenfield, BX limitations If armored cable is too long the inductance of the helix can limit the current to less than the trip current and the shield can get red hot and start a fire. Also, there can often be a loud 60 cycle noise. –«•»– romex burial type UF is suitable for burying and wet locations NM-B cable is suitable only for very specific dry locations you are not allowed to run NM-B wire outside, even through a conduit –«•»– auxilliary power interlock It may be a good idea to design a changeover interlock that can not be defeated with a screwdriver It has been known that a battery backup for a cable or intenet router or modem can backfeed a utility pole transformer an put a high tension voltage on downed power lines. However, often when a backup generator is fired up withut disconnecting from the mains, the load will stall out the generator. –«•»– neutral use checking A breaker on each leg can share a neutral wire; however each such configuration requires a separate neutral wire. The three wires are required to be grouped. The correct isolation of these circuits can be checked with a clamp around ammeter. The clamp can surround all three wires and breakers can be turned on and off while there is a load on the circuits. The current reading will remain zero if things are in proper order. –«•»– recharge electric vehicle in your garage 14-50R receptical 50A 4 wire 2 phase receptical for junction box: HomeDepot 918-302 Menards 363-6060 surface mount box: 449-129
COMPUTER SECURITY –«•»– recover data from many nonfunctioning consoles USB support for any SSD/SATA/IDE 1.5/3.5/5.25 hard drive –«•»– flash memory lifetime flash drives can last 20 years but they can wear out sooner without memory leveling –«•»– protection from pfishing If you get a suspicious popup ad while viewing a web site, report it to: https://support.google.com/websearch/answer/106318?hl=en Also read: https://www.google.com/safebrowsing/static/faq.html#q1 https://www.antiphishing.org/resources/overview/ https://www.stopbadware.org/ If you get a suspicious email report it to: https://support.google.com/mail/answer/8253?hl=en –«•»– report scams to the Office of the Inspector General, socialsecurityadmin –«•»– t troubleshoot your computer It may be that the malicious hackers and crackers are targeting the commercial anti-virus efforts. Open source non commercial tools may be the only resort: FCIV NETSTAT WMIC OPENFILES NET FIND SFC TYPEPERF nmap.org/docs.html PROCMON There may not be any way to comprehensively test everything on your computer without reinstalling or spending money. But, File integrity monitoring (FIM) would be a sure fire way to stop most maliciousness. –«•»– tools vendors –«•»–beware of the compromized supply chain important priorities for organizations –«•»– simple and effective computer protection A relay that stays off after the power comes back on would be a very economical method of surge protection. Industrial motors are protected this way with starters so that a machine will not come back on with no operator. There should be surge protection at the service panel, wall receptical, and power inlet of the computer. e.g. Shurter 693-4431.1003 (Mouser) The inductance of the wire between the devices adds to the protection. Inductance can be added with a ferrite core: e.g.: Fair-Rite 0461167281 or 0461164281 . –«•»– learn programming concepts e.g. declaring variables , iterative processes, assigning values Tex, MathML and asciiMath expressions can be developed. It can be done online without any installation of more plugins, apps, software, etc. –«•»– Zero Trust Architecture In light of the growing number of incidents like the ColonialPipeline incident, orgainizations should have a complete backup operating system as different as possible from the first one. It should make minimal or no use of graphical intefaces, keep data separate form active components, active components shoul be on write protected media which require human manual override for changing, and all other possible protections chris nyhuis of vigilantnow.com: the villians study all of the commercial antivirus tools so one has to be agile and adaptive to use software that the villians know nothing about stopransomware.gov –«•»– Defense Report –«•»– EMP –«•»– solar flare –«•»– best practice for security & robustness The Next Version Of Fedora Picks Up Rust –«•»– advanced persistent threat www.fireeye.com/current-threats/apt-groups.html list of dozens of miscreant groups https://www.middlebury.edu/institute/academics/centers-initiatives/cyber-collaborative Best Practices for Mitigating Advanced Persistent Threats –«•»– open robust methods without proprietary formats magicCamera hyperFun cran-r-project.org/ .. /rayRender/ .. crypto vulnerabilities –«•»– CISA precautions; SEC precautions: https://www.protocol.com/fintech/bitcoin-cryptocurrency-regulations https://time.com/nextadvisor/investing/cryptocurrency/sec-new-crypto-regulation-gensler/ https://www.sec.gov/news/speech/gensler-remarks-crypto-markets-040422 homeland security: https://www.dhs.gov/science-and-technology/anc attorney general: https://www.justice.gov/archives/ag/page/file/1326061/download –«•»– list of crypto currencies and exchanges –«•»– security hacking incidents –«•»– ransome extortion –«•»– list of ransomware gangs –«•»– list of data breeches –«•»– list of crypto currency heists –«•»– list of spyware –«•»– detect byte order mark (BOM), unicode page, debug,edlin scripts, formats detection, conversion –«•»– U character based human readable non proprietary formats
ENERGY and ENVIRONMENT –«•»– shrublands would be a place to install solar panels without colateral damage. Desart to Power Initiative –«•»– Fuel cells could be used to extend the range of electric cars and with cogeneration and/or Combined Heat and Power (CHP) reduce energy distribution cost and use. And reduce the chances of stranding without a power outlet. A van could be heated overnight while also charging the battery of an electric vehicle. «««««« «««««««««« «««««««««« «««««««««« »»»»»»»»»» »»»»»»»»»» »»»»»»»»»» »»»»»» –«•»– low tech survival vehicles withour computers survival links en.wikipedia.org/wiki/Global_catastrophic_risk#Potential_sources_of_risk en.wikipedia.org/wiki/Survivability Nuclear, Biological and Chemical disaster index Power Cube off grid functionality Glenn Reeves' spreadsheet for calculating your income tax: www.excel1040.com sites.google.com/view/incometaxspreadsheet/home future science fed: Impacts of different types of catastrophes npr Notes From An Apocalypse ISBN 9780385543002 Every library should have a complete set of the Boy Scout merit badge books, so that, people can take care of themselves when everyone else will have to take care of themselves during an emergency. note: Whoever wrote the plumbing book does not understand gaskets and does not understand that nominal iron pipe outside diameters are not even fractions; they are odd decimal numbers. For instance, 3/4 iron pipe has an OD of 1.050" which is more than 1" and less than 1+1/16".
LESS RELEVANT SOCIOLOGICAL ISSUES carjack tracing allow law enforcement to access location information swiftly fentanyl test https://ovsjg.dc.gov/service/private-security-camera-system-incentive-program https://www.wsws.org/en/articles/2018/05/24/reko-m24.html facial recognition technology to police https://wirepoints.org/why-americans-overwhelmingly-reject-critical-race-theory-wirepoints/ https://wirepoints.org/wirepoints-podcast-the-dialogue-episode-14-a-waukegan-history-teacher-takes-on-crt/ –«•»– coronavirus mitigation https://www.bbc.com/news/live/world-47639450 bbc live world news stream newsfeed –«•»– n news, issues and world problems and solutions https://en.wikipedia.org/wiki/Nontheist_Quakers https://en.wikipedia.org/wiki/Giovanni_Pico_della_Mirandola theses pronounced heretical by Pope Innocent VIII in his bull of 4 August 1487 https://plato.stanford.edu/entries/spinoza/ https://en.wikipedia.org/wiki/Bertrand_Russell https://en.wikipedia.org/wiki/Kurt_G%C3%B6del https://en.wikipedia.org/wiki/Max_Weber multiple causes https://www.penguinrandomhouse.com/books/296551/the-protestant-ethic-and-the-spirit-of-capitalism-by-max-weber/ https://en.wikipedia.org/wiki/Iconodulism https://en.wikipedia.org/wiki/St._Bartholomew%27s_Day_massacre a few days after the wedding day –«•»– population control https://en.wikipedia.org/wiki/Haber_process#History https://www.bbc.com/news/av/science-environment-53644147/james-lovelock-gaia-theory-creator-on-coronavirus-and-turning-101 https://en.wikipedia.org/wiki/Gaia_hypothesis#Natural_selection_and_evolution –«•»– wisdom of the ages –«•»– government overreach hazards –«•»– Points that Define a Free Republic novel thing for your garden –«•»– E ontological composition, esperanto «««««« «««««««««« «««««««««« «««««««««« »»»»»»»»»» »»»»»»»»»» »»»»»»»»»» »»»»»» scholar.google listing
© 2009 Wm.   C.   Corwin   Corwin????@gmail∙com   ConcurrentInverse Calculators