Sondheim: You shouldn’t feel safe. You should feel, “I don’t know if I can write this.” That’s what I mean by dangerous, and I think that’s a good thing to do. Sacrifice something safe. Variety, variety, variety, Mr. Sondheim. Don’t let up for a second. Surprise us. Source: Stephen Sondheim, Theater’s Greatest Lyricist – TheContinue Reading
“They Had Me At Gunpoint”: Hertz Customers Keep Getting Arrested For Driving “Stolen” Cars | Zero Hedge
This happened to me with U-Haul. It’s a real thing. It’s a weird thing. Yep, we were driving up Sherman avenue in Hamilton and I noticed two cruisers behind me. It was a one-way street at this point that I was turning onto. I got kind of flustered as I wasn’t sure I could makeContinue Reading
The Origins of the Deep State in North America. PART III.
Source: The Origins of the Deep State in North America. PART III.
Men are afraid to mentor women after #MetToo
A very real scenario. Things are getting very confusing out there, probably on purpose. So many opportunities to exploit and separate. Men are scared of women now. LeanIn.org and SurveyMonkey’s new #MentorHer poll reveals Friday that 60% of male managers report feeling “too nervous” about being accused of harassment to interact with women in “commonContinue Reading
The Origins Of The Deep State In North America, Part 2 | Zero Hedge
Source: The Origins Of The Deep State In North America, Part 2 | Zero Hedge
The Origins Of The Deep State In North America, Part 1 | Zero Hedge
Source: The Origins Of The Deep State In North America, Part 1 | Zero Hedge
Pearl Jam announces $10.8 million to combat homelessness | The Seattle Times
Source: Pearl Jam announces $10.8 million to combat homelessness | The Seattle Times
How To Prepare For A Cyber-Attack | Zero Hedge
Technopedia lists the following consequences of a cyber attack: Identity theft, fraud, extortion Malware, pharming, phishing, spamming, spoofing, spyware, Trojans and viruses Stolen hardware, such as laptops or mobile devices Denial-of-service and distributed denial-of-service attacks Breach of access Password sniffing System infiltration Website defacement Private and public Web browser exploits Instant messaging abuse Intellectual property (IP)Continue Reading
The Empowering Internet Safety Guide for Women
Thank you, Jane for the pointer: Have you ever been harassed in the street? Received a crass message on a dating app? Had a coworker make a comment about your appearance that just didn’t sit right? You’re not alone. With the #MeToo movement, it’s easy to log onto Twitter or Facebook and see just howContinue Reading
“Big Money Coupled With Cheap Money” Never Ends Well… | Zero Hedge
Eat the rich It was a Sunday in April 2017 when a queasy feeling in Darrell Crapp’s stomach sent him rushing home. He found his wife, Diana, lying crumpled on the floor of their Lancaster, Wis., bathroom. She had swallowed a handful of pills. Overwhelmed with debt and with little prospect of turning a profitContinue Reading