This domain was quite unusual in that it got a fair amount of traffic on only the second or third day of it’s launch. Even more unusual is the fact that there was ZERO content on the site during that time period. Hey if you got an interest in wine and you want this domain then depending on how I feel maybe I’ll sell it to you (I’ll take out all the existing content, pics, words, etc). Wow come to think of it this would have been a great site for good oldGarry Winogrand.
Because you need to switch browsers.
Many people can see only a percentage of pictures that I publish to a post.
I find that Firefox, as great a browser as it is, will sometimes block certain pictures.
So I simply switch over to Chrome or IE. For more info please see the post titled:
Computer Tip for Faster Operation, More Speed, More Horsepower for Your Computer (revealing the best, fastest web browser for you to use)
that you’ll find in the Technology section of this blog.
The title of this post is fake. Neither I, Peter Mack, or TenantX, sells stolen cell phones.
But I will tell you that when you hold an iPhone up to your ear it can be, depending on your physical location, just like holding up a fistful of dollars for someone to come along and snatch out of your hand.
The fake title of this post is meant to mock the stupendous lies and slander that Embassy Apartment/Diamond Apartment management, including San Diego apartment managers Ray and Inga Nardone of 959 Felspar Street, use against tenants they are biased against.
1.to attack or treat with ridicule, contempt, or derision.
2.to ridicule by mimicry of action or speech; mimic derisively.
In some cases their gang (a gang that includes their favorite tenants) use deceit and ploys in order to usurp San Diego’s Just Cause Eviction law. And in other cases, I surmise, being at complete ease with having an unethical and deceitful mindset is the type of devious ease that, I suspect, flows freely through Ray and Inga Nardone’s bloodstream.
Noun: A cunning plan or action designed to turn a situation to one’s own advantage.
The Nardone’s are fond of telling people and fellow tenant’s on Felspar Street that TenantX and I are “a threat” to people. If you’re a San Diego cop who works out of Northern Division you should know this:
A Ray or an Inga Nardone will look you straight in the eye and accuse people, including tenants who live in their building at 959 Feslpar Street, of bad things that are not true. And in some cases a cop will take the word of a Nardone for any number of reasons that include the Nardone’s age (they’re senior citizens), the Nardone’s authoritative job title as that of an apartment manager, which is of course, a higher rank than that of a tenant. If that doesn’t convince the average cop then the Nardone’s sweet, endearing, convincing, double-talking personality will.
From what I’ve read on the Internet, if you ask 10 people if you can make any money by selling stolen iPhones you’ll get answers like:
1) Of course not!
2) Yes you can!
3) Oh I don’t know…
The correct answer is yes you can.
Several weeks ago I watched a few videos that really opened my eyes. The videos showed several men and women, at various locations around the U.S., who had their cell phone snatched right out of their hands by a thief. One victim was a woman who was actually put in a headlock by a man. The thefts were captured on video with a surveillance camera.
In a recent news report given by FOX News San Diego reporter Sherri Palmeri, she stated:
‘These items (the iPhone) are a hot item for thieves not only here on campus but across the nation.’
Ms. Palmeri gave her report from San Diego State University. A FOX News anchor stated that SDSU receives a report of a stolen iPhone on an ‘almost weekly’ basis.
Captain Lamine Secka, he of the SDSU police force, stated that most of the robberies
‘…have been strong arm robberies that involve force where they just basically grab the device from the students or community members.’
Captain Secka went on to say that one cell phone robbery incident involved the use of a gun on campus.
The FCC (Federal Communications Commission) states that 30-40% of robberies in several major cities involve cell phones. Thieves sell the phones online, on Ebay or Craigslist for example. Thieves are also known to cash in the phones at recycling websites and kiosks.
Even more dangerous, the theft of personal information stored in most iPhones. But there are ways to safeguard your information. One safeguard is an application that tracks your stolen iPhone.
The FCC states that the theft of stolen iPhones is rampant and that they intend to launch a website that will allow a victim to report the theft of their phone and then the carrier will in turn block the phone from being used.
I came across one story of a cell phone thief who used a bold ruse in order to steal cell phones. He posed as a cop in uniform. He would then ask a victim for their cell phone in order to, as he claimed, to check the phones serial number. And then he would take off with the phone or trick the victim into thinking that he was a good cop who was keeping the phone as evidence.
The following is an update as to what transpired when Tenant-X found an iPhone on Embassy Apartment/Diamond Apartment property:
Tenant-X handed the once moist but now dry cell phone over to the San Diego Police Department. Officer Erich D. Bennet, badge #6133, accepted it. It appears as if Officer Bennet then took it to a Verizon store where they charged it up. It was then that the rightful owner was contacted. The incident number generated by SDPD for the recovery of the iPhone is incident number P120 200 260 67. The phone did not appear to be brand new as it was loaded with a lot of files.
For the record, the landlords team of lawyers sent Tenant-X a notice several weeks after the iPhone was found. In that letter TenantX was falsely accused of a bad thing he did not do. Tenant-X will fight their lies and slander in court. And, depending on circumstances, the outcome of the fight might be decided by a jury.
Next week TenantX will be filing a restraining order against a tenant in his building who, accompanied by two of his friends one early morning on Labor Day weekend, caused trouble for TenantX. It was a bad deed that clearly indicates that he, a drunk, bellicose goon, sympathizes with and/or aids and abets Management in their quest to target TenantX. TenantX does not know the identity of the troublemaker.
Advice to those who sympathize with Management and who fall on every word that comes out of the mouth of a Nardone:
MIND YOUR OWN BUSINESS
1. A thug hired to intimidate or harm opponents.
2. A stupid or oafish person.
Decades ago labor management used goons to injure, harass, intimidate and perhaps kill certain employees. Employees who acted as activists by trying to organize a labor union that would benefit employees and hold management accountable for wrongdoing. I’m not sure, but I tend to think that you’ll see goons in action in the movie HOFFA. In that movie Jack Nicholson plays Jimmy Hoffa. As of today, with over 11,000 votes, HOFFA has a 6.5 rating at IMDb dot com.
I’ll end this post with a few words of wisdom: The words that come out of the mouth of Ray and Inga Nardone (and some of their fellow employees and close, favorite tenants) are not words that you can always believe in, especially when they talk bad about a tenant.
Their words, their slander, are not believable because some of the words they choose to use are smear words that are designed to make a good tenant look like a sinner who is going straight to hell on Judgement Day. And, in Tenant-X’s case, they are smear words that management uses when they converse with tenants as, Ray Nardone once said, to help Management create ‘loopholes’ in San Diego’s Just Cause Eviction law.
There’s lots of info on the Internet that’ll provide you with more information about cell phone thieves. If you wish to obtain more information about cell phone users who have had their cell phone stolen out of their hand do what I did just type the keywords ‘snatch and grab cell phone‘ into your favorite search engine and you’ll find relevant videos and text about thieves like the one shown pedaling his bicycle ready and poised to strike in the photo above. Google is not my favorite search engine…
P.S. TenantX wants me to add that he does not like me (Pete Mack) having to represent him by posting about any incident that involves a deed that he’s done in the community that might be interpreted as an act of goodwill towards man, woman or child. Or anything he’s done that benefits humanity or constitutes a random act of kindness. Not only does he not like this type of representation…he’s repulsed by it. He, as mentioned in previous posts, only feels compelled to post about some of the good things he’s done for various reasons. Reasons that include a desire to help other tenants who live in states in the U.S that have a Just Cause Eviction law in place; to combat the nefarious slander, lies, ruses and ploys that Management, certain tenants, and Ray ‘Slander King’ Nardone and Inga ‘Slander Queen’ Nardone create in order to target TenantX with hate and mean spirit; to prevent the destruction of a 15 year record of good rental history. And because, before this blog was launched, he had no voice on Felspar Street, no voice in the community.
1. to cause feelings of repulsion / for example: The scenes of violence in the film may repulse some viewers.
You probably know how to perform the approximate 3 easy basic steps it takes to safely disconnect your external hard drive from your computer, but you may be overlooking a final 4th step that many people ignore. By performing this better-safe-than-sorry 4th step a user can prevent damage to their files or premature death to their EHD (external hard drive). In other words, you really can’t trust the familiar Windows pop-up message that says “The USB Mass Storage Device can now be safely removed from your computer” when it comes time to disconnect the EHD.
Safely Removing an EHD: Go to the system tray located down near the clock and click on the safely remove hardware icon. Windows will then generate a pop-up menu. That menu is an actual list of USB devices that are connected to your computer. In this scenario we’re disconnecting a little piece of very fine jewelry which is your EHD. On that list you’ll see your EHD. Click on the EHD and wait for the pop-up message that says “The USB Mass Storage Device can now be safely removed from your computer.”
The final step: When users see the “The USB Mass Storage Device can now be safely removed from your computer” message they immediately, seconds later, disconnect the EHD from the USB port or the USB cable. That’s the wrong thing to do because it can take upwards of 15-30 seconds for many EHD’s to shut down. You can tell if your EHD has shut down by simply holding it in the palm of your hand. If it’s still running you’ll feel it vibrating. If it’s turned off there will be no vibration. Disconnect the EHD only when the unit has stopped vibrating.
This is important for several reasons. EHD’s have a high failure rate. Some of them are like eggshells. Many of them crash and burn and become useless 9-12 months after the date of purchase. I know one user whose EHD died several months after the date of purchase. I know the user did not have a dog who chewed on it, nor did the user use the EHD for a frisbee. The EHD sat glued to this particular users desk for 8 months including Easter Sunday in 2010, the day San Diego was rocked hard by a 7.2 earthquake. And then one day the EHD died, an early death it was. One reason for the high failure rate may be due to planned obsolescence.
Planned obsolescence is a strategy that allows a CPM (computer product manufacturer) to sell more units by implementing a certain subtle flaw into the design of an electronic device so it fails sooner rather than later. There’s no sense in hastening the death of an EHD by disconnecting it improperly. Better safe than sorry, make sure your EHD has come to a complete stop before you disconnect it by checking to make sure that it’s not vibrating.
In a future post I’ll explain why I once soaked an EHD in a spaghetti pot filled with water and the unbelievable details involving the day I predicted an earthquake. The prediction came true, the earthquake came to be hours after I made the prediction. In that post I will, with the aid of a qualified polygraph examiner, challenge any skeptics in the San Diego or Los Angeles area who thinks the details are untrue. Then again I’ll go anywhere the skeptic wants to meet if they pay for my travel expenses and the cost of a polygraph exam.
Overview/Premise: Please don’t get in a rut where you find yourself using only one web browser! When you’re connected to the Internet and are using it for any number of countless reasons always have at least 3 different web browsers minimized down at the taskbar ready to place into action at a moments notice when the going gets tough.
Details: Web browsers are like people in that they have different personalities and characteristics. And like people a web browser that is running fine might all of a sudden start acting bad or uncooperative as if it just came down with a cold or flu. I’d be here all day if I were to cite examples as to what I mean by a broswer that starts to act bad or uncooperative, but I’ll give you a couple of different scenarios:
Sometimes you have to fill out a field or two. A “field” are little boxes that require you to enter characters. For instance, you might need to enter your email address into a field when signing up for Netflix. But, for some strange reason, every time you enter a character it does not appear in the field. Or if it does appear in the field it takes several annoying seconds before it appears and thus you are forced to wait a long time to perform a simple procedure. If you’re using Firefox when that happens, simply switch to another browser like Chrome, Opera, Avant, Maxthon, Safari or Internet Explorer.
Another example is a common one that everyone can relate to. All of a sudden you notice that certain web pages take a long time to download. Simply bring up one of the 3 or 4 web browsers you have waiting for you minimized down at the task bar.
The novice who’s new to computers might think that having 5 or 6 web browsers on their machine will cause some sort of damage or conflict, like ramming a stick through the front wheel of a bicycle as the cyclist pedals down the street. There are no conflicts, in fact you’ll be in heaven when you find your current browser of choice stars to act defiant and you discover switching over to a different brand browser easily fixes the problem.
You can think of a web browser as a fast horse, a horse that gets you around the Internet. And your hard drive is a stable where you store your horses. The more horses you have in your stable the better off you’ll be because some horses have bad days or they get injured.
Automation: When you get up in the morning some people automatically urinate and in some cases they automatically grab a cup of coffee. When you boot up your computer you should automatically open at least 3 web browsers and then minimize two of them down at the task bar and keep them there until you go to bed so they’re ready to spring into action when called on.
I would imagine that many people who think their computer is running slow due to a virus or malware or due to a common fluctuation of speed as it relates to their Internet connection (for those who use a cable connection as opposed to DSL) really are experiencing nothing more than a web browser that has just come down with a bad cold. And I’m calling it a “cold” because when you try using the bad browser an hour later, or a day later, it runs fast and strong.
And don’t be swayed by builders who proclaim that their browser is rated the fastest browser on the planet. All web browsers are temperamental and are subject to highs and lows and different conditions that can impact their level of performance in day to day operations.
This is the kind of tip your computer science teacher may not have told you. Teachers are human and they get stuck in a rut where they tend to use the same web browser or application over and over again. And that is why many novice computer users have something they can teach you, me and a professor who teaches a computer science class at M.I.T. or Harvard.