Sunday, April 22, 2007

Guns Don't Kill, Bullets Do

It was inevitable that the advocates from both sides of the gun control issue would creep from the woodwork, even before the full facts of the Virginia Tech are available. Still, the act of a lone, mentally ill killer, provides nothing new to the arguments heard over and over again from both sides. No one disputes the extensive use of firearms in criminal activities ranging from Armed Robbery to Homicide.

With all the state and federal statues passed to restrict or prevent the illegal use of firearms, their usage rates have not changed appreciably – certainly not enough to say, “This legislation has fixed the problem.” Given this reality, an objective assessment of why all our efforts to use the law have failed to prevent criminal weapons usage, would seem to be far more useful than emotional, reactive efforts to pass (or prevent) new laws.

The root cause of the VT tragedy rested with only one fact. Existing statutes, designed to prevent such horrific killings, were not enforced. In the State of Virginia, a person who has been adjudicated as being a threat to himself or others cannot legally obtain a firearm. Cho Seung-Hui, indeed, fit this criterion. A Virginia Court had found that he fit this criterion, and had ordered him committed. Yet, he was able to legally obtain the weapons used. Somewhere, in the complex information chain, the weapons dealer was not informed that his sale of a handgun was prohibited.

This single instance suggests an answer to the more general problem. For every firearm used in a premeditated criminal act, one or many statutes designed to prevent such acts were not enforced. This same generalization applies to more than the criminal use of firearms. How about the twelve million, or more, illegal immigrants residing in the United States? What could be more apparent than the deliberate failure to enforce deportation and employment laws than actions taken by all levels of law enforcement, from local to Federal? What about the millions of identity thefts occurring each year? The proximate cause for such theft is error… a failure to protect the sensitive personal information leading to these thefts.

In the supply chain, from manufacturer to end-user, two problems occur. With all transactions occurring in the private sector, both error and deliberate action make possible the violations that occur. So the question becomes one of developing policies and procedures which can increase the effective enforcement of existing firearms law. It certainly is not one of passing new or repealing existing legislation. It is one of making the existing legislation work, as intended.

To achieve their intended purpose, a symbiotic relationship exists between the weapon and its ammunition. Neither can operate without the functionality of the other. The gun owner will typically go to the same source for ammunition as he did for the gun. Although each is equally necessary, authorization to purchase a complete weapon system (the gun and the ammunition) is, for all practical purposes, directed at the hardware, with little attention being paid to those purchasing ammunition. Yet, the diversity of available ammunition available for use with a given handgun can raise immediate questions about its intended use. Handgun ammunition best suited for target shooting is quite different from that designed to inflict maximum damage and lethality on human beings.

The requirements for licensing of firearms dealers, set forth in USC Title 18923, make no mention of any knowledge qualifications related to either the weapons or the ammunition intended to be sold, let alone any forensic knowledge which might be helpful in spotting those with criminal purposes. If the sellers of the weapons and ammunition Cho used had such knowledge, the purchase of Hollow Point ammunition in large quantities might very well have raised questions regarding his intent.

While the illegal purchase of a handgun requires some cleverness and knowledge about sources, no such difficulty exists when it comes to the purchase of ammunition. It can be purchased anywhere, including the Internet. Given all of the above, would it not make preventative sense to make the requirements for the purchase of ammunition as rigorous, or even greater than that for purchasing the gun? What about separating those who sell the hardware from those who sell the ammunition, as being completely separate suppliers?

Clearly, those in the community having the most knowledge about ammunition, its performance, and its potential damage to victims are the local/state police and sheriffs. If law enforcement has control of all ammunition, it is in the best position to insure that it does not fall into the hands of criminals or the mentally ill. If all ammunition is sold on the premises, of a law enforcement agency, the chances of theft are far reduced than when fund in a commercial facility.

Once implemented, anyone seeking ammunition would purchase it at police stations, Sherriff’s offices, or State Police facilities. Permits might include a maximum number of rounds, limits on types of ammunition purchased, etc. All of these procedures would be under state control, as are controls on concealed weapons licenses, purchase of destructive or hazardous materials, etc.

All revenue derived from the sales of ammunition would go to state or local law enforcement agencies, as determined by each state legislature. This would be consistent with other state revenue raising activities such as issuance of hunting licenses, drivers licenses, license plate fees, or admission to state operated recreational facilities.

But what of the case of Cho? While if the plan described above were implemented, the amount of ammunition he purchased and the type of rounds purchased might well have raised the suspicions of police selling ammunition, he might well have been able to maintain an appearance, and construct a credible reason for purchasing the ammunition. Maintaining a state-wide database of all ammunition purchased by an individual by date, number of rounds, and type, as well as maximum limits on aggregate purchases could certainly have raised warning flags, and could well have limited the deaths he caused.

All of which brings us back to the basic question of personal privacy versus the public interest. We have the technology to insure the identity and relevant information about every citizen can be carried on a credit card sized piece of plastic. We could certainly code such a card with information regarding that person’s permission to drive a motor vehicle, purchase a handgun, purchase alcoholic beverages, as well as access permission host of other services that are regulated by the State. We could severely limit identity theft, while at the same time make a medical history available in the event the holder of the card is unable to provide information to those treating him.

Beyond insuring the individual access to services to which he is qualified to receive , and preventing him from engaging in illegal activity, or which accessing services to which he has no permission to receive, there are broader national implications for such an ID card. It would end, once and forever after any question of who among us is a citizen of this country, who a legal guest, and who is illegally present. Ultimately, as each person is furnished a personal ID card, it would sharply reduce the cost and error rate of conducting the decennial census, more accurately specifying the number of members of the House of Representatives, and potentially providing a more frequent census.

Once fully in place, the cost of government would be sharply decreased, violent criminal behavior could be expected to decline, and we could severely limit the potential for terrorist attacks.

Those in opposition cite the erosion of what is interpreted as a Constitutional guarantee of a right to privacy. Ten years ago, in May, 1997, Steven Moore, an economist with the Cato Institute provided congressional testimony which well articulates the principle objections to this perceived invasion of privacy. While the technology has made quantum leaps in capabilities, the issues he raised remain at the core of why we have yet to implement such a plan.

Before the tragedy of Virginia Tech fades from your attention, consider the solutions offered above and take the appropriate action with your lawmakers.

Monday, April 16, 2007

The Religous Right in the Bush Admnistration

While you watch in wonder at the delusional stubbornness of George Bush, you will find yourself bemused by the flakiness of his associates.

Read this article from Salon.com.

Saturday, April 14, 2007

Another Example of Failed Illegal Prevention

This short article shows the problems we have in trying to keep the illegals out!

L.A. Police Sued Over Immigrant Policy - Los Angeles Times

Moral Decline Caused by?


Townhall.com::The Numbers on Moral Decline::By Brent Bozell III

The thrust of the article is that the majority of Americans see the country in "moral decline," with Bozell's explanation for this phenomenon being essentially that this decline results from the media, both traditional and Internet furnished.

After reading this article, I made the following comment:

How can those, now children, teens, or young adults choose anything but immoral behavior when they see or hear of:

1. Their teachers and school administrators deliberately cheating on test scores to get more money for the school district.

2. The hypocrisy of a potential presidential candidate, who, while calling for the impeachment of a President for lying about adulterous behavior, is himself engaged in that same behavior?

3. A President, who vows to do everything to "support the troops," fails to provide long terms care to the wounded, with information about conditions at Walter Reed available four years ago?

4. An Administration which convicted two Border patrol Agents for doing their jobs, lies to obtain the desired verdict, and now allows them to suffer the brutalities of prison life as it fails to pardon them from the consequences of very lies it has used to convict them?

A Google search for "political scandal" brings up more than 2 million pages tracing the immoral/illegal behavior of our political leaders -- much of which is rewarded by reelection or monetary gain, and far less frequently punished.

Rather than blaming "the media," or the Internet, a focus on the behavior of our leaders might be far more productive in reversing a trend toward the behavior we say we do not want.

A Suugested solution to the failure of Public Education

Townhall.com::Higher Grades, Lower Scores::By Debra J. Saunders

This article pointing out many of the failures of Public Education inspired me to this response:

We have seen an abundance of explanations for the failure of public education to provide its graduates with even the most modest ability to engage in critical analysis, solutions to problems to which they have not been previously exposed, or the capability to evaluate the ideas of others.

We have been told that the cause is lack of parental responsibility, mediocre teachers, classroom overcrowding, the impact of non-English speaking students, grade inflation, cheating, school violence, the prevalence of drugs, ad infinitum.

I’d like to suggest a more basic answer. Schools don’t exist to foster well prepared, intellectually powerful graduates. To the contrary, such individuals are a threat to the real purpose of Public Education. The real purpose of schools is to develop acceptance of authority, and conformity to the social norms which the schools make massive efforts to insure.

Consider your own education during the period when you were exposed to this process. Research has shown that almost universally, expectations for student knowledges and skills, consists almost entirely of rote memorization, simple description and matching, and the using of rules given by teachers. (The rules for solving Algebra problems is an example of Rule Using – Students simply apply rules they have been given, but do not derive any new rules for themselves.)

Students who evidence curiosity, who want to take side trips from the prescribed curriculum, or worst of all challenge pronouncements of the teacher are subject to responses ranging from insult and sarcasm to failing grades, to suspension or institutional expulsion. (Can you think of anything more ridiculous than a “zero tolerance policy expelling a child for having lemon drops (a “drug”) or a keychain mounted miniature pistol?

We see this phenomenon to an even greater degree in colleges and universities, where students are expected to be docile receptacles of the political and personal agenda of their professors.

As an employee, how many times have you been told by supervisor or manager that your questioning of procedure, process, or company rules is reduced to “My way or the highway?” What about your periodic performance evaluations, when such items as being a “team player,” or “fosters company values,” rather than contribution to productivity become primary factors by which your value as an employee is judged?

The power differential between child and adult teacher is even greater since the child has little choice but to ultimately bow to the demands of the teacher, guidance counselor, or school administrator, while as an adult, you have the opportunity to extricate yourself from a hostile work environment.

Fortunately, technology can provide a potential escape hatch from such an intellectually confining situation. Free or low cost audio/video/whiteboard conferencing software facilitates home based learning, with expert online tutors, or student selected conference group leaders having great freedom to meet the needs of students to exercise creativity, problem solving, and most of all, satisfy curiosity. Structured computer assisted instruction can insure that specific skills are mastered before the student continues to the next problem. Such factors as ethnicity, age, cultural background, and teacher bias are completely eliminated from the factors determining student success.

These tools can either substitute for formal education (e.g., home schooling) or supplement attendance at the local school. Were such a process to be formalized, with the bulk of intellectual skills being acquired through flexible, ever patient technology, schools could focus on those activities which are best served through social interaction. Physical education, social interest clubs, music performance, etc. , are all instances in which putting classmates together are essential to the development of the complete person.

Falling for Junk Science - the tale of Global Warming

Is it an "Inconvenient" or "Unlikely" Truth?

Below are some of the elements that comprise the conjectures of those who advocate taking action to mitigate the damages that are predicted resulting from the presumed warming of the Earth.

1. The global temperature, over the last hundred years, has trended upward, with the actual increases subject to dispute, depending on which “expert” findings are being used.

2. Terrible consequences will result, including a rise in ocean height (ranging in magnitude from 18 inches to 20 feet, depending on whose predictions are in play), which will make shoreline population centers uninhabitable, cause animal species to disappear, generate massive storm systems, and other phenomena, all of which reduce the quality of life on earth.

3. These consequences will occur at some unspecified time in the future, years from now.

4. This rise in temperature is either exclusively or primarily, due to an increased presence of Carbon Dioxide, caused by man-made pollution from cars, power plants, and other industrial sources.

5. To have any chance to intervene in these changes, all of the world’s inhabitants must begin immediately to reduce this pollution.

Notice that the likelihood that each assumption is absolutely dependent on the accuracy of the previous assertion. If any assumption is false, or questionable, those following cannot be valid.

Temperature Trending Upward?

Suppose for a moment that based on temperature measurements during the 20th century, advocates of the global warming hypothesis predict that the 21st century will see the following rise in the average yearly global temperature beginning in 2000 with the prediction ending in the year 2100.




Certainly, if we accept this graph, it clearly shows that global temperature is climbing, and at some point, it will rise to a point that will significantly effect the Earth’s climate.

Now, let’s jump ahead to our long removed descendants, assuming they have hung around the Earth, instead of migrating out to the Sun’s planets, or far beyond, to other galaxies.

In the year 3750, scientist begin to track the measured rise and fall of the Earth’s temperature, since 1900. Supposing this graph represents their findings:

The difference in the two graphs represents the most severe of the problems in the calculation of trends. Taken against the age of the earth, or for that matter, the length of time that human beings have inhabited the planet, one hundred years is a completely unreliable base (sample) upon which to premise future predictions.

The Consequences of Global Warming

Given that the trend demonstrated in the first graph is accurate, the rise in oceanic levels is the most devastating of the hypothesized consequences. The cause is presumed to rest with the melting of glaciers throughout the world. Yet, while advocates assert temperature is rising, and polar glaciers are receding as predicted, Antarctic glaciers have been growing. That this is occurring, would seem to reduce the probability of a direct casual relationship between temperature and oceanic height.

A second problem associated with predictions of the magnitude of the change which is forecasted. With a range of 18 inches to 20 feet, (over an undefined period of time) there is obvious disagreement among those making these predictions. There would seem to be several possible reasons for the disparity: (a) investigators are using the same data, with differences in conclusions resulting from the use of varying mathematical models; (b) investigators work from diverse raw data sets, leading to the variances in findings; (c) some combination of (a) and (b). Given this variance, on what is strategic planning to be based?

There is also the problem of establishing a cause-effect relationship between events. The permafrost is liquefying throughout Alaska and much of Russia. This presents serious problems, as the frost line goes to deeper levels of the ground. Yet, while this change is definitely occurring, are we able to say that there is a direct causal linkage between this event and the hypothesized rise in temperature?

Time Frame for Consequences

Earthquakes are a known danger for those located along the Pacific rim – a substantial portion of the world’s population. Scientists can predict the magnitude, the damage that can occur, and the geographic areas likely to suffer loss of life, injury and property destruction. No one doubts that destructive quakes will occur, since there has been much to verify that they do, and excellent data describing their past effects. What cannot be predicted is precisely when quakes will happen. Yet, time probability predictions have been made. For those affected by the San Andreas fault, there is a 70% probability that a magnitude 7.0 or greater quake will occur within the next thirty years.

As described earlier, there is a 1 in 10,000 chance that an asteroid will strike the Earth between 2034 and 2036, causing severe regional damage. A specific impact point is unavailable as of this writing.

Not so with the dire predictions of Global warming. Neither time, nor the extent of damage or destruction have been specified, let alone having any probability estimates attached to such predictions. Yet, we are told that we must take action immediately to prevent the occurrence of this phenomenon.

Ordinarily scientific findings are presented with a confidence level. Thus, we would expect to find a statement such as this: “By 2110, Ocean levels will rise from current height by an average of 2 feet, 6 inches with 95% confidence that that rise will be within 6 inches of the mean.”

No such predictions and associated probability statements are available, so we can have no expectation of the accuracy or likelihood that this range will occur.

The Cause

This is among the most difficult of the methodological assumptions regarding global warming. Again, assuming that the temperature trending posited by climatologists is correct, we come to the most challenging task – that of determining the correct explanation for this trend.

While the primary (and clearly conflated with political considerations) explanation, an increased presence of Carbon Dioxide is offered as the direct cause of temperature rise, with this increase in level posited to be linked with man-made pollution. Efforts to offer alternative explanations have been subject to enormous political pressure, directed at diverting attention from these alternatives.

The party line is that there is “consensus” among scientists, and thus, this single explanation represents “settled” science. Consequently, investigators seeking funding to explore theory which question the validity of this explanation, receive little consideration. Yet, many competing theories have been advanced, some of which are listed below:

· Temperature change is cyclical, tied directly to cyclic heating and cooling of the Sun. Significant empirical data exists to correlate these changes with historic changes in long term temperature history.

· Cosmic ray activity is also cyclic in its behavior, again well documented and correlated with temperature.

· A recent (within the last 50 years) increase in CO2 can be linked to deforestation caused both from logging activity, and a number of large wildfires. The result of this reduction of total trees on the surface of the planet naturally increases the CO2 percentage in the atmosphere.

· Cow flatulence, while not the primary cause of for CO2 presence is a contributing factor.

· An increase in the world’s population during the 20th century certainly adds to increasing CO2 levels in the atmosphere, directly attributable to the exhalation of CO2 by this enlarged population

Note that none of these explanations eliminates any of the others. Rather they point to a far more complex set of interactions, ruled out by the simplistic unitary explanation of man-made pollution.

“It’s Our Fault.”

In what has to be one of the largest scams ever foisted on the American public, we have been told that:

· global temperatures are rising, which at some unknown time in the future will severely impact on the quality of life of the planet’s human inhabitants.

· Since this temperature rise is due to the increase in CO2, this increase is directly attributable to man-made pollution.

· With the United States being the leader in industrialization and economic activity, individuals and businesses are, if not the greatest, certainly a significant contributor to man-made pollution.

· Therefore, to save the planet from the effects of global warming, Americans, whether individuals or businesses, must substantially change their behavior. The only way this can be done is at great cost, and consequent reduction in our standard of living.

That there is substantial public willingness to accept such a prescription is puzzling. The probability that all described above is entirely correct is probably in the same range as the chances of winning one of the major state or national lotteries. Those who invest major components of their assets tend to be those who can least afford such investments, and who are tempted by the rewards, rather than giving reasoned consideration to the chances of achieving them.

Lottery participants, if nothing else, know the potential award that could await them. In this instance, participation in this prescription provides no tangible reward, is uncertain as to whether any results will be achieved, and is certain only of the costs.

Interested in getting online tutoring?

If you are interested in getting help with troublesome school subjects, I look forward to being of assistance to you.

To get my information, simply go here for my profile, (Sherwin S - California) which tells you the subjects for which I provide tutoring. You can message me directly from this profile, and I'll respond within 24 hours. My reply will give you an opportunity to see my qualifications to assist you, and the costs of my services.

Tutoring is done exclusively with software which lets us carry on direct phone conversations, and lets you visually interact with resources I assemble for your private use. As you will see when you investigate my background that I am very well qualified to meet your needs.

FCS Inches toward Readiness

It's been a long time coming, but this is the first indication that our military will, within some reasonable time be able to to stand a chance in of prevailing in urban warfare.

That this system has been so long delayed in deployment goes a long way toward explaining why we have been so ineffective in Iraq. Had we had all the capabilities this technology provides, we could have effectively ended the insurgency with far fewer casualties, and at a lower cost than we have suffered.

Even without this new way of waging war, had DOD even fully used the most modern equipment available (improved personal body armor, fully armored vehicles are examples) our casualties would have been greatly reduced.

The recent scandal regarding the Army's unwillingness to use the Trophy RPG killer is an example of how Rumsfeld and the Pentagon have been so derelict in their responsibilities to give the best protection, or show the slightest concern for the courageous men and women fighting a war without purpose.

Police Officer Online - Army Robots - LiveHouse.com.au Aussie blogs hosting Australian:

A Desperation Move

VOA News - Bush Cautions Against Cutting Funds for Iraq Troops

This is a Bush desperate move to prevent Congress from taking control over his Iraq war policy. That he makes this statement is proof that he has finally come to recognize that what he regards as his personal imperial presidency can be controlled by others.

The big question is, will Congress have the guts to implement those controls?

Rudy Giuliani's Vulnerabilities - February 12, 2007

Rudy Giuliani's Vulnerabilities - February 12, 2007

ArchiText, A "Back to the Future" Analysis Tool

Introduction

Back in the days when I was a CEO of a Macintosh software publishing company, I designed a powerful text analysis product for the Macintosh platform. When the company closed in 1990, the program disappeared from public view, but to this day, has features that I have found in no other free or low-priced program. For that reason, I am looking for an open source programmer, interested in updating the design elements into a new program, usable on all platforms, and incorporating more modern elements, not available at that time.

The following presents a good overview of the design components all of which the new program should contain.

Import and Split – Creating Nodes

The first step in using ArchiText is to import the corpus of one or more documents into the program. In the example shown below the text of the 9/11 Commission Report is going to be subjected to analysis.

In general, if the document is of any significant length you'll want to split it into categories or sections which represent some logical division of the whole. After creating a new ArchiText file, select the file you're going to use.


You can elect to import the entire file, or to split the file into elements, referred to as “Nodes.” If you choose the former, you will have just one node, having the document name.

If you decide to split into sections, you can use any symbolic character (or combination of symbolic characters) as the target string by which sections are split, as shown above.

In this example, we have split the entire document into chapters, as illustrated in the Node Directory shown below. Double clicking on any of the Nodes will open a window in which the text of the node appears.

Node Selection

Regardless of the analysis you are going to perform, you can select all nodes, an ordered set of nodes, or a discontinuous combination of nodes. Preferences allow you to order nodes alphabetically or by time modified.

Keyword Lists

Typically this is the first analysis you are going to do. Ordinarily, you will have done a lot of tag preparation in the original file, which are referenced to as we go through the analyses, but the specific methodology will be beyond the scope of this introduction to ArchiText.

In the selection above, our interest was in identifying the key terrorist players, so the keyword search was restricted to those nodes where they were discussed.

After selecting the nodes whose words are to be listed, the keyword dialog sets up the parameters for the listing.

Most of these choices are self-explanatory, but the “stop word list” requires some discussion. ArchiText comes pre-loaded with a modifiable list of words – articles, prepositions and auxiliary verbs, which ordinarily are irrelevant to content. Thus, when this item is checked, these words are eliminated from the frequency listings. However, there are times when these words have usefulness for a given analysis, and they can then be included by unchecking this box.

In this partial view of the resulting frequency list, each person has been prefixed by “p-“ which facilitates grouping all of the those named fitting into the category “Person.” For those occurring with high frequency, we will proceed to extract all information regarding them, and combine that information into a single new node only focused on each of them.

Extract and Combine to make new nodes

In our first search, two of the terrorists have been selected. Selecting the “S” tab will automatically initiate the search dialog. Remember that the nodes have been preselected when the keyword list was constructed.

After pressing “Start Search” button, you will see the following results in the Directory.

Notice that the number of occurrences of the names of the two terrorists, within each node, are highlighted. The next step is to extract just this information, and combine it into a new node. To do this, select “Combine Nodes” from the “Analysis” menu.


In the example shown below, we have searched for George Bush, and are extracting all occurrences of his name throughout the nodes.


Select “Embed Node Name” if you want the source nodes named in the new node. After completion, a new node containing only those instances in which Bush is named in a paragraph. The result of this combination looks like this:

This illustration is, of course, only a small potion of the nodes in which the Bush Name occurs. If you wish, you can “drill down” further, building a keyword list for this node alone, and searching for other combinations related to Bush, as they occur within Paragraphs or sentences in which his name occurs. If desired, you could build extracted nodes for any combinations of Bush and other words included in your search.

Identify Relationships – Node Maps

In a 500 page document there are obviously a huge number of relationships between people, events, locations, and other categories. Node Maps facilitate your finding and manipulating these relationships in an infinite number of ways.

New maps are built in the same way as are new nodes -- by using the create button for maps in the directory dialog. You will note that there are number of nodes which are not on the map, but which are available through selection and pressing the "Add to Map" button. When nodes are deleted from the map, they appear in the left column which is the "On-Call" list. Another way that nodes can be added from the On-Call list is through a search which selects some of the nodes in this list.

One way of visualizing the nodes found in a search is to change the size of the nodes selected by that search. This option is available by selecting, "Change Node Size," in the Map menu found on the main tool bar.

A far more powerful option is available. Using one all of the eight linking tools which are available a "Parent Node" can be connected or linked to each of the nodes to which a relationship exists. One example of this linking is shown in the map below. In this case, Terrorist 001 (Osama bin Laden) is linked to each of the chapters in which his name appears.

As you see below every node which is linked to another is illustrated in the nodes window. Double clicking on any node name opens the note window, and depending on the preference settings, will either open the source node and destination node, or simultaneously open the destination node while closing the source node.



Implications for data mining

The methodology employed here facilitates the discovery of all kinds of relationships between people, events, locations, and in fact anywhere or phrase to any other. Typically as relationships are discovered new sub nodes will be created so that those relationships can be examined and further linked to other relationships.

It is not necessary to do this specialized tagging which will be explained in the following tutorial directed at methods of text analysis. This simply makes it easier to define categories of items making their location and identification easier within ArchiText and providing a basis for quantitative analyses which can flow from these categorical classifications.

Some limitations

While the design of this program offers features which this author has found in no other program, because it was designed in 1988, there are some limitations and deficiencies which demand starting from the beginning and rebuilding the program shell. Listed below are some of the current problems which must be resolved for the program to reach its potential power for its users:

· By far the most serious deficiency in this program is the fact that it will only operate on older Macintosh computers still installed with OS 9x or below. The search and linking functions are available on no other program, except those enterprise-level highly expensive data mining systems. Thus the program needs to be updated such that is usable on any platform.

· As currently constituted the program only can import text in ASCII format, and lacks the capability to open Internet files or read from them.

· There are number of deficiencies in the search algorithm, most particularly in the program's inability to process numerical searches. Thus, a search for a number greater than, equal to, or less than another quantity can not be accomplished currently.

· As displayed above, they the mapping capabilities of the program are very limited and a number of modifications should be made so that more effective pictographic displays are readily available. An example of one such possibility is shown below.

The New Me

Who I Am

Here I am. This lets you get acquainted with me, so you can decide whether the posts to follow are worth your time. Let me tell you a little bit about me. I am 72 years old, and burdened with all of the problems associated with the ancient. While I am able to still drive, I have some mobility problems which largely keep me at home. I live alone in an apartment in Pasadena, California.

I began my working career as a teacher in a middle school in a small town in Michigan. From there, I spent six years at Northeastern University, in Boston. There, I was employed as an administrator for a department charged with developing instructional materials and strategies for the university community. While I loved Boston, the winters there were more than a little brutal. So, in 1977, I moved to California where I've lived ever since.

Once there, I got a job at UCLA as a researcher in telecommunications. Two years later, having been bitten by the home computer bug, I founded what was one of the first educational software companies, publishing software for the Apple Computer. Four years later, I sold the company, and started a second software company, this time directed at the newly developed Macintosh. In 1990, as a result of a lawsuit filed by a competitor, the company was forced out of business.

For the next eight years, I worked as an independent consultant doing research for variety of businesses large and small. In January, 1999 I joined Earthlink, soon becoming a Senior Data Analyst. I worked in that position until April 2003, when, like 3000 others, I was laid off In a Mass Reduction of Force. Since then, I have been in semi retirement, investing in the foreign-exchange market and writing articles for number of publications.

You'll see, from time to time, articles posted here, reflecting my interests in technology, robotics, current affairs, educational reform, neuroscience, and bunch of other stuff.

Enjoy… I’ll look forward to your comments.