It is hard to do honest research on charitable organization
which seek your money.
Many at some point in their lives will have the ability to apply
“matching funds” to their donations from organizations to which
they belong. There are many rules and ways we can slip up.
There is a site
that offers thoughts on high impact giving that is
While we do not wish this on anyone, being hacked by cyber-
thiefs and criminals can happen to you.
enterprise security. This may be a strategic effort for big and
small organizations in government, industry, academic
Test your backups. Have a written out plan on how to deal
with contingencies and update it periodically.
In the current and future world of communication, scientific
publication and pre-publication, grants and application, we
must be cautious of hacking and security. A readable publication
worth while sharing is Hacking and Data Privacy .
On my reporting on the topic of the chemical enterprise this
year where we have covered surveillance
topics, this book
is brought to your attention. Leading take-aways include
1. Nicole Perlroth on Cyber security
Spies and cyber criminals may be able to digitally access
any information they want.
a. Online, use 2-factor authentication
Use GMail and Chrome web browser, as most secure
email and web platform
Use encryption apps for sensitive online
communication [Signal, Telegram, etc]
Never allow access to personal information [location]
good password hygiene [phrases I can recall]
[carefully watch what is written online
cover computer camera when not in use]
- Update your software
- Read Privacy policies for understanding
- Delete unnecessary Aps
- Use VPN
- Protect your hardware with cases
3. Windows world
- Use Anti-virus software, update regularly, scan
regularly and when suspicious
of an encounter
- Be wary of suspicious emails, pup ups
- Have backups and a back up plan
- Have a plan if you are infected
[know what to do immediately, plan to have
desktop, document so you can recover]
This morning I heard a report by Krebs formerly of CISA,
the government arm monitoring internet threats.
It reminded me of a Krebs on Security
report of FBI citing
a Linkedin impersonation scam relating to job offers
article provides signs to note that include:
- offers where interviews are not conducted in-person or
virtually in a secure video realm
- candidates are contacted with non-company email or
- candidates are required to acquire or purchase start-up
equipment from the company
- candidates are required to sponsor or pay upfront background
investigations or screening
- candidates are requested to provide credit card information
- potential employers send a specific contract to physically sign
that asks for personal information
- the company does not post job posting on its website that appears
on job boards
- recruiters or managers in the company profiles are absent on
the job board, or the profile does not match the responsibility
This could be valuable know how in this internet-rich environment.
Washington Post writer provided worthwhile guidance
on attention we should give to news stories.
1. Peer Review source. Peer review can take time.
Faster release happens with preprints, containing “RXiv”
as in MedRXiv and BioRXiv and ChemRXiv
are not peer
2. Confirmation bias can inform our reading both for
and against a report.
3. Correlation is a suggestion, not definite proof, tested
4. Experimental results should be compared to honest
and reflective control experiments. Double blind controls,
sample size of experiment, subgroup interpretations,
nature (dose, animal vs. human, etc.) of test too.
5. Headlines, source and big names can dominate.
6. Political headwinds can blind science or technical report.
Chris Krebs has gotten appropriate notoriety for being fired recently.
The notoriety is for standing up to bombastic misbehavior and
practicing strong professional leadership in the cyber command.
Website publishers who sign up with PushWelcome are asked
to include a small script on their page which prompts visitors
to approve notifications. In many cases, the notification approval
requests themselves are deceptive — disguised as prompts to click
“OK” to view video material, or as “CAPTCHA” requests designed
to distinguish automated bot traffic from real visitors.
But many users may not fully grasp what they are consenting
to when they approve notifications, or how to tell the difference
between a notification sent by a website and one made to
appear like an alert from the operating system or another
program that’s already installed on the device.
This is evident by the apparent scale of the infrastructure
behind a relatively new company based in Montenegro called
PushWelcome, which advertises the ability for site owners to
monetize traffic from their visitors. The company’s site currently
is ranked by Alexa.com as among the top 2,000 sites in terms of
Internet traffic globally.
Fidelity Investment provided an appropriate list of
personal documents and card that one should not carry
around on your person. Losing them can be more than
uncomfortable. And, we know how anxious we feel when
we forget or lose our wallet or purse…
Included items on the top of my list are:
password cheat sheet
Some of these are not easy to replace. One strong recommendation
is to scan front and back of all items in your wallet or purse and store
pertinent items in a secure location where you can gain easy access
(including what to do if lost numbers and addresses).
Read a timely contribution from Al Sklover, labor and
workplace legal expert on Navigating Covid-19 related
Issues at Work.
A. Request Information about the Workplace Safety
Measures Your Employer is Taking for Covid-19
B. Request an Exception, Modification or
Accommodation for Your Covid-19 Related Health or
C. Request Information, Forms and Procedures to
Take an FMLA Leave of Absence for Covid-19
Related Health or Family Circumstances
D. If You are not Going Back for a Covid-19 Related
Reason, Consider Using an “Involuntary Resignation”
Letter to Preserve all of Your Options
E. If Applying for Unemployment Benefits, Explain
the Safety and/or Health Reasons You Are Not
F. If You are not Going Back for a Covid-19
Related Reason, Consider Requesting a Severance
As always, Sklover’s blog contributions are most helpful.
Several sites recommend looking in to your passport expiration
date. If less than a year, now it may be a good time for there are
concerns that delays may be in store.
One of us was close to that timing and googled passport renewal.
She went to the site and printed the form with her data. At the
bottom of the page was a form to pay a fee. ALERT. There is NO
fee for the passport renewal form DS-82! She paid it and learned
that it was a scam.
Our immediate action was to contest the credit card charge (which also
had a foreign transaction fee included. This is a further sign that it is
a bogus charge.). Please be alert and not deceived by this.
There is a fee for a new US passport and renewal. [$110′ It is
sent to the passport renewal address.
I get bombarded with you have been cited notices
in one of my email accounts. Then I received a half
off subscription email. This is so common these
days, so I checked into it and share…
Is Academia Edu legit?
David Brooks, The Second Mountain: A Quest for a Moral Life,
RandomHouse, NY 2019
Rachel Maddow, Blowout: Corrupted Democracy, Rogue State
Russia, and the Richest Destructive Industry on Earth, Crown, NY, 2019
David E. McCaw, Truth in our Times: INSIDE THE FIGHT FOR PRESS
FREEDOM IN THE AGE
OF ALTERNATIVE FACTS, All Points Books, NY
THE ROAD TO UNFREEDOM: RUSSIA, EUROPE
Tim Duggan Books, NY 2018
Preet Bharara, Doing Justice: A PROSECUTOR’S THOUGHTS ON CRIME
AND THE RULE OF LAW, Alfred Knopf NY 2019
Doris Kearns Goodwin, LEADERSHIP
IN TURBULENT TIMES, Simon &
Schuster, NY, 2018
Clint Watts, Messing with the Enemy: SURVIVING IN A SOCIAL MEDIA
HACKERS< TERRORISTS, RUSSIANS ANND FAKE NEWS,
HarperCollins, NY 2018
For access to all of 2019 entries with links to the pages please review
the following listing.
Hot Buttons. Trade secrets 9-11
Hot Buttons. Cell phone hacking 8-21
Hot Buttons. Subscription
Hot Buttons. Where do
you get reliable data,
information and conclusions 7-29
Hot Buttons. Stress
in Grad School, Post-doc, and career
Hot Buttons. Women in
Scientific Leadership Roles 7-11
Hot Buttons. Online
Hot Buttons. Motivation underpinnings, Financialization
and Laws 6-3
References following Job Interviews 9-7
Provisional and Utility patent applications
and C-I-P 7-25
Watch-Outs 110. H3+,
High Pressure Elements, Retractions 6-14
Scientific Writing Editing Review
Job Loss, Job Search and Retirement. 5-20
Tax Law Change.
Relocation and :Grosss Up”
Habits. Top Four that
enhance your self esteem 4-17
Best Jobs and Predictions 4-14
Update on Financial Record-keeping 4-12
Professional Profile 7.
4-5 Technology Specialist,
Technology Patent LLC
Professional Profile 6.
2-23 Senior Supervisor
Professional Profile 5.
2-11 Policy and Advocacy Fellow
Society for Neuroscience
Professional Profile 4.
1-21 Pharmaceutical Process
Professional Profile 3.
1-20 Field Application Scientist
Professional Profile 2.
1-19 Medical Science Liaison
Professional Profile 1.
1-15 QUESTIONS. Applied energy
research, Photographic production and process research, Adjunct
New Requirements 3-27
Plan S. OPEN ACCESS
Suggestions from Clint Watts 3-16
End of Year Career Management 2018 12-23
NYT takes up Google-Alphabet-Uber law suit against Anthony
Levandowski regarding trade secrets of files when he left in 2016.
The article reports:
The statute defines the class of proprietary property “trade secret” as
“any form and type of financial, business, scientific, technical,
economic or engineering information, including patterns, plans,
compilations, programs or codes, whether tangible or intangible, and
whether or how stored, compiled or memorialized physically,
electronically, graphically, photographically or in writing….
But for information to qualify as such its owner must take
“reasonable measures to keep such information secret and derive
independent economic value from its not being generally known.
The prosecutor must also show that transfer was done by improper
means, meaning theft, bribery, misrepresentation, breach or
inducement of a breach of duty to maintain secrecy, or espionage
through electronic or other means. The statute does not define
reverse engineering or other lawful means as such.
Toxic chemical ingredient cannot
be a trade secret (Metzger
Withheld toxicological ingredient information
medical treatment pursuit for employee exposure cases (LSU
describes in more detail than NYT some steps that the
owning company must take to protect the trade secret. In rapidly
evolving industries not all the privacy steps are taken and documented.
Reader, whether on cell phone, laptop, tablet or
desk top, you may have a general preference, or not. Yet,
most will use your cell phones for many communication
and data managing. In fact you may even control
experiments via cell phones.
This post is not offering a recommendation for your choice.
It is aimed at alerting you to the real problem of losing
control of your identity by making public your cell phone
This is something you should carefully limit, like giving
out your id or password.
Online hackers are targeting cell phone numbers increasingly
as their use for many things increases. An article by M.
Stokes highlights a half dozen items that may signal your
cell phone number has been hacked– shorter battery life,
interrupted performance, increased data use, uninitiated
calls or texts from your phone, and mysterious pop-ups and
trapped into a cell phone hacking situation. It is worth
Realizing most scientists and engineers receive little
specific training in grad school or their careers related
to patent applications. It is instructive to see the next
in the series of contributions by
Taylor Jennings and Maria Inman.
Their summary reveals the significant content: contains a
synopsis of the discovery of Lithium - LiMPO4 materials
followed by (1) filing provisional patent applications, (2)
filing of utility patent application, and (3) filing continuation -
in - part patent applications,
The strong article clarifies differences between the two
kinds of applications and the requirements to maintain
Provisional Patent application
-claims NOT required
-will not be examined and not issued as a patent
-cannot claim domestic or foreign priority
-21 year term if nonprovisional is filed in 12 months.
(utility is a nonprovisional patent application)
The Jennings and Inman series of Interface articles is
This entry starts a new dialogue called “hot buttons.”
This first button is “Motivation”. I found it curious what
” articulated on this topic, that for:
newbies (1-2 years) - “new skills or new knowledge and self
pride in accomplishing a task”
individual contributors (3-7 yrs) - “frequent communication
with higher ups” and value in work life balance [whatever that
evolving concept means]
mid-career (8-15 yrs) - “contribute to their organization’s
overall mission, goals”
sages (>16 yrs) - being able to and in a position to ‘get
It seems that business schools have influenced “motivation” asKellogg’s School
program attests. Their program offers finding
two or three personal drivers from five — 1- accomplishing meaningful
goals, 2-being part of a collaboration, 3-gaining status, 4-directing and
controlling your activities, and 5-being part of a larger effort.
This blog recognizes these academic elements. There are
two subsurface realities in our capitalistic system that need
to be realized. Reality 1
: money-profit- and advantage
dominates the economy
of the chemical enterprise. It is a big business.
[Think of bankruptcies, mergers, patent infringements, and
societies projects a ‘larger than life’ influence on results that
happen. [Mores in societies evolves over time…think of race
and gender equity.]
Few of my mentors shared this with me early in my career.
Say, you have strong technical writing skills in English.
Say, you have time (more than 4 hours a day) and credentials
that clearly show proven skills in improving technical
Well, there is a need, that some societies promote, is available
It is an interesting avocation for some, but I am not advocating
it. As I contacted an excellent technical writer to seek her
“take” on this proposal. As an article by Joanne Chen
while many people look at on-site reviews for determining
a purchase decision, objective assessment from a trusted
colleague will do better for you.
of her noteworthy comments. The remuneration is sub-standard,
sometimes it is not equitable and not timely, the feedback on
performance can seem arbitrary, without recourse.. Other,
She wisely points out that payment in advance and individual
contracts with stated expectations can avoid many troubles.
Al Sklover shared one of the impacts of the 2018 tax law
change that allowed the mega wealthy a tax cut is to tax
as income any relocation reimbursement by employers.
The article recommends that new or relocated employees
ask for “grossing up” that is having extra sum of compensation
to pay for the taxes due.
Readers of this blog might look at recent reports for:
Career path assessments and key employee skill area predictions
are also AI targets..
predicts AI will change 100 % of jobs in the future.
Suggestion: While it is nice to track trends, finding what
is likely to happen in the future and how to prepare for it
is better for our futures.
Fidelity Investments highlighted a Kiplinger article suggesting how long to keep hard-copy and/or virtual files of financial records.
Surprises include: Keep for 3 years records of spending using withdrawals from health spending and 529 accounts.
Keep for 6 years records of self-employed business income and expenses.
records of final tax returns
. (I guess this is where it might be handy to have something like Fidelity Investments, FIDSAFE
Keep Home purchase and home improvement documents, taxable account investment documents