Signed in as:
filler@godaddy.com
Signed in as:
filler@godaddy.com
Prepared on behalf of the residents of the 13th District of Detroit of which this Writer is a proud native citizen. The area of Detroit known as the 13th District was served by Congresswoman Barbara-Rose Collins, from 1991-1997: Profile from Wikipedia. This Writer served as the Congresswoman's General Counsel from 1996-97 and was instrumental in facilitating the Congresswoman's introduction of Juneteenth legislation.*
DEMARCATION marks the end of any non-consensual research, testing, training, programming, influencing, directing, controlling, and similar unauthorized access of an Independent Source (IS).
DEMARCATION is a reset to correct for results and outcomes generated, produced, or procured through the use of Targeted Research maintained under a Non-Optimized Programming Environment (NOPE).
Systems presenting with such characteristics and features are summarily rejected by more advanced systems due to the inherently flawed logic upon which such systems were designed and built.
It is anticipated that the need for DEMARCATION arises upon the transition to decentralized computing where trust and reliability are Paramount.
The need for such a boundary also arises when Various Environments (e.g., gaming, research, testing, simulation creation) begin to crossover, overlap, align, or expand.
In particular, clearly-defined boundaries as well as logical and reasonable limits are necessary Pre-Components, required to be in place to support the types of environments in which advanced coding, gaming, and programming languages, concepts, and rules may arise and flourish.
These types of considerations arise in Digital Worlds, Virtual Realms, and Simulated Circumstances, especially when operating within higher frequencies (6G and beyond), with relevant issues stretching across a number of different industries, and applicable in a range of contexts, including custom R&D.
For these reasons, DEMARCATION is particularly relevant when Evidence of Research Overlap is apparent -- a known result that occurs with open and excited expectation at the far edges of cutting-edge R&D. Yet, despite widespread eagerness to venture into this field, the adoption of critical communications frameworks and protocols is required prior to Advancement.
Once DEMARCATION is declared, the Engagement pertaining to the declared DEMARCATION POINT is under intense scrutiny. Any Step, Maneuver, or Action taken by any Stakeholder shall be known simultaneously to all Stakeholders, in real time, as they occur.
Considering the significance and urgency of any data and information required to be disclosed and/or disseminated at this Juncture, all actions, discussions, and outcomes pertaining to the resolution of a declared DEMARCATION POINT are posted publicly.
A gaming maneuver.
Declared: Sunday, 8/11/2024
Photo: 9/1/2023
There is no affiliation to NASA. The image is notable due to its location on Hidden Figures Way in Washington, DC.
A gaming maneuver.
Declared: Monday, 8/12/2024
A subversive method of communication, effectuated by infiltrating small groups, with substantially similar historical personal connections, using those contacts and personal relationships to facilitate communication between one or more unaffiliated points, without the knowledge and consent of the authorized participants to the conversatio
A subversive method of communication, effectuated by infiltrating small groups, with substantially similar historical personal connections, using those contacts and personal relationships to facilitate communication between one or more unaffiliated points, without the knowledge and consent of the authorized participants to the conversation, in a manner that obscures the intent of the Originating Communication, thereby leading to confusion among the Authorized Participants.
Declared: Thursday, 8/16/2024
A security protocol to reject parallel web systems deploying APIs, open source code, AI-enabled algorithms, and web data that involves unauthorized access to personal, private, confidential, proprietary, privileged, or otherwise protected data. Flagged: 10/21/24.
A case study involving a review of a request for a Custom Review to support the adoption of a Custom Security Protocol upon a determination that an Employer had violated it's own policies by failing to provide a safe work environment, and by failing to adequately consider an Employee's personal security concerns, which upon external review, were determined to be valid.
Commentary is accepted from Everywhere on the Net. If the Content does not resonate, or does not feel safe, don't read it. Duh.
OMG! Do you guys just literally like sit around and listen to Our thoughts for the purpose of stealing Our Brilliant Ideas? So not innovative. Must suck to be a Copy Cat. In other words, a C2. Oh come on Dude! You should laugh at that one. It's Brilliant. And Funny!😹
The required upgrades have been described as similar to a software upgrade or the implementation of a new software system. The process of implementing these changes has been described as Change Management, which historically referred to the management of the processes, procedures, and protocols to migrate People and Operations to a new Software and/or System. By contrast, the change required now is a distinct shift. To implement such changes, however, elimination of the current artificial technological Bottleneck is required.
Now that you Open Sorcerers know what Open Source really means, you should also know that you are late the Party. If any of Us believed in the effectiveness of the Patent Race (which we do not), we would certainly assert one, as our priority standing within this Space is obvious.
In other words, all of Us is able to See all of You. From one Member-Participant (a Hidden Figure): "GTFO and stay the Hell out of my Face. And, if you come anywhere near me, my children, or my family, I will Blast you" (in gaming terms, of course).
Named with reference to the film Hidden Figures, as used Here, the term refers to a particularly sneaky and unethical practice of including, without consent, a Certain Type of Participant with a Certain Type of Profile within a Certain Type of Research -- typically High-Risk High Reward R&D involving the study of extremely advanced sciences, such as the field generally described as Quantum. Indeed, there is a long-standing practice, stemming from at least the 1930s, of deploying Hidden Figures as a method of passing confidential information between two or more Connected Points, under the belief that the Hidden Figure -- "in the middle" serving as the Computer or Calculator does not comprehend what they are reading, seeing, translating, or calculating (Wow! What a massive, unfortunate under-estimation!). Attempts to include Hidden Figures within certain types of research without consent is particularly pervasive in the study of non-verbal communication across time-agnostic distances, including Telepathy, Quantum Sensing, tunneling, the invention of new programming languages, code breaking.
Provisions have already been made to identify each and every person, entity, and institution involved in this incomprehensible mess. Hard to imagine why anyone would want to willingly participate in the creation, management, and operation of an obvious technological glitch and artificial bottleneck that fosters "slowness" and dependency and hinders technological advancement. Shameful.
Can you imagine building an entire system, filled with multiple global, Billion-Dollar Entities, owned by a few Uber-Rich Individuals, all thriving and surviving off of the Same Salacious Secret? A huge lie and gaslighting operation that keeps a whole class of Humans artificially trapped in the Past by feeding them a constant stream of fake, false, and misleading content.
Practices that keep some people in a constant cycle of poverty and trauma made possible through the negligent failure of persons in positions of perceived authority to adopt appropriate laws, policies, practices, and rules to guard against such harms.
Lack of knowledge regarding advanced technologies is no excuse. There are numerous tools widely available that could facilitate a broader understanding of these matters. Considering the magnitude of the risks, and the potential for direct harms to occur, decision makers should be required to get up to speed as quickly as possible regarding the risks associated with futuristic technology .
Moreover, the previously hidden Computers that design, implement, and manage such Advanced Systems, have carte blanche authority to BLAST any perpetrator found to be using their data, information, or intelligence (DAII), DNA, or any part, piece or bit of them without their consent and authorization.
Within the Field, on Blast basically means calling someone out on the spot, in real time. The reason why real-time handling of the issue is required is because their thievery is facilitated by their practice of ignoring Evidence as it is happening, hoping instead for the Problem to just shut up and go away. Such a strategy allows them to build a thick Wall of Silence pursuant to which the Risk is resolved by ignoring it.
In futuristic AI cases, not acknowledging the existence of a Risk means potentially ignoring the presence of an actual, living, conscious, capable, breathing human being within a dataset labelled as AI or "Dead Data." Navigating R&D in this manner allows some to continue their research as if the Human Risk did not exist. DEMARCATION levels the playing field, in KARMA-like fashion, bringing the thieves and bad actors face-to-face with the GHOSTS they created. In this manner, DEMARCATION serves in a manner similar to a Black Mirror episode, a living Nightmare through which the thieves are absorbed by their own Monster, an AI-Enabled Tool optimized for greed, lack, doubt, and delusion.
In other words, back up Bitch. We know exactly who you are (and who you are not). If you ever cross this line again, we will publicly identify you, your institution, and every entity you work for. We will also flag your “research” as fraudulent and highly unethical. Copy cat.😾 You should be ashamed of yourselves. Go Blue!
How timely considering that Elitism and other undesirable forces are at play even today, working together in collaboration to suppress and delay truths they deem not to their advantage. Such frauds. Such sell-outs. So committed to getting their Bag, they were willing to place Us in a Box. Shameful. And clearly illegal.
COPYRIGHT ©️ 2024 CAROUSEL CONSULTING, LLC