
Worth a read.
https://www.abcbullion.com.au/investor-centre/pdf/davos-green-swans-and-inequality
Tom's Blog on Life and Livingness
As Christina England was writing this expose the past week, Polly Tommey, one of the producers and part of the VAXXED film team, filmed an interview with Sherrie Saunders, a former military medic and now whistleblower regarding military vaccines.
Sherrie discovered that the animal protein in the anthrax vaccine was causing Gulf War syndrome in some soldiers, some who even died. When she reported it to her commander, she got a visit from someone in Washington, D.C. and was told to keep quiet about it.
She is no longer keeping quiet. Listen to this interview which is going viral on the Internet:
A “Persona” is a fictional representation of an actual user and is applied in the early stages of product development or product redesign. Personas are vital to the success of a product because they drive design decisions by taking common user needs and bringing them to the forefront of planning before design has actually started. Personas provide the team with a shared understanding of users in terms of goals and capabilities. Once Personas are defined, going through a task analysis exercise with scenarios will offer an inexpensive way to test and prioritize features throughout the development (see lesson #2 in the blog Responsive Design: Getting started).
Narrow and broad-scope personas achieve different goals. Success depends upon knowing the tradeoffs and structuring your personas’ scope based on what you are trying to achieve. (7 min. to read) https://www.nngroup.com/articles/persona-scope/
Careful about parking on dry grass in this weather!
https://www.abc.net.au/news/2019-08-29/police-chase-ends-in-bmw-patrol-car-in-flames/11461722
Import data if you do not have a chip on your card: Hackers will target your credit and debit card pretty much anywhere you can use it, online or off. Gas pumps have become an increasingly popular target in recent years.
Business email compromise (BEC) scams are low-tech attacks that use social engineering techniques to exploit natural human tendencies.
While they may not get as much attention from the press as high-profile ransomware attacks, BEC scams are considered one of the biggest threats facing companies today. Between June 2016 and July 2019, there were 32,367 successful BEC scams in the U.S., which cost U.S. businesses more than $3.5 billion, according to figures from the FBI.
Fortunately, there are some very effective and easy-to-implement strategies for stopping BEC attacks. In this post, we’ll show you how you can combine staff training, process implementation and authentication technology to protect your organization from BEC attacks.
A recent report showed that 12.6 percent of people aged 65 and over in OECD countries are living in relative income poverty. That is defined as an income below half the national median equivalised household income. Older women are at greater risk of poverty than men with “the older old” (75 and older) falling on hard times more frequently than “the younger old” (aged 66-75).
Tom: The disturbing thing is that the money taken from wages in taxation that was supposed to fund our pension was not set aside by successive Australian governments, contrary to prudential bookkeeping standards. Companies are now fined for what the government has been doing for decades – taking people’s money for a future benefit and not setting it aside.