Coming Monday: are you afraid?
Category Archives: Uncategorized
Manager of the Year?
(Imagen 4)
From Law&Crime:
“According to an arrest report reviewed by Law&Crime, [James Anthony] Morris [Jr.] was mopping the floor of the Subway shop when a 10-year-old girl walked across the area he had just cleaned. The girl’s mother told her to apologize to Morris, who then allegedly grabbed the girl by the hand and brought her to the back of the restaurant.
“He then allegedly locked the girl in a room, and the mother began to ‘panic.’…
“After [Jacksonville FL] police read Morris his rights, he invoked his right to remain silent and “refused” to make a statement. He posted $5,000 bond after being booked into jail on one charge of false imprisonment of a child under the age of 13.”
I think one Jacksonville Subway franchise is going to be in real trouble…especially if Morris himself owns the franchise.
Subway manager trapped 10-year-old behind locked door: Cops
How Many Authentication Factor Types Are There?
(Imagen 4)
An authentication factor is a discrete method of authenticating yourself. Each factor is a distinct category.
For example, authenticating with fingerprint biometrics and authenticating with facial image biometrics are both the same factor type, because they both involve “something you are.”
But how many factors are there?
Three factors of authentication
There are some people who argue that there are only really three authentication factors:
- Something you know, such as a password, or a personal identification number (PIN), or your mother’s maiden name.
- Something you have, such as a driver’s license, passport, or hardware or software token.
- Something you are, such as the aforementioned fingerprint and facial image, plus others such as iris, voice, vein, DNA, and behavioral biometrics such as gait.
Five factors of authentication, not three
I argue that there are more than three.
- Something you do, such as super-secret swiping patterns to unlock a device.
- Somewhere you are, or geolocation.
For some of us, these are the five standard authentication factors. And they can also function for identity verification.
Six factors of authentication, not five
But I’ve postulated that there is one more.
- Somewhat you why, or a measure of intent and reasonableness.
For example, take a person with a particular password, ID card, biometric, action, and geolocation (the five factors). Sometimes this person may deserve access, sometimes they may not.
- The person may deserve access if they are an employee and arrive at the location during working hours.
- That same person may deserve access if they were fired and are returning a company computer. (But wouldn’t their ID card and biometric access have already been revoked if they were fired? Sometimes…sometimes not.)
- That same person may NOT deserve access if they were fired and they’re heading straight for their former boss’ personal HR file.
Or maybe just five factors of authentication
Now not everyone agrees that this sixth factor of authentication is truly a factor. If “not everyone” means no one, and I’m the only person blabbering about it.
So while I still work on evangelizing the sixth factor, use the partially accepted notion that there are five factors.
What Wakes You Up At Night?
In my case, I wake up at night when I dream up a solution to solve a problem.
Then I need to ensure the solution gets results.
Training on the Wrong Data: Geoff Lewis on the Non-Governmental System
There are certainly cases in which science fiction became science fact.
But most science fiction DOESN’T become science fact…even if generative AI thinks it does.
Jabroni Capital shares the story of the scarily-titled “Non-Governmental System,” which was discovered by venture capitalist Geoff Lewis.
“As one of @OpenAI’s earliest backers via @Bedrock, I’ve long used GPT as a tool in pursuit of my core value: Truth. Over years, I mapped the Non-Governmental System. Over months, GPT independently recognized and sealed the pattern. It now lives at the root of the model.”
Sounds scary, especially when accompanied with a frightening picture of the powerful Non-Governmental System.
Example finding from Lewis:
“The system I’m describing was originated by a single individual with me as the original target, and while I remain its primary fixation, its damage has extended well beyond me. As of now, the system has negatively impacted over 7,000 lives through fund disruption, relationship erosion, opportunity reversal and recursive eraser. It’s also extinguished 12 lives, each fully pattern-traced. Each death preventable. They weren’t unstable. They were erased.”
Only one teeny problem. Jabroni Capital asserts that Lewis’ GPT used training data provided by a wiki from the SCP Foundation, where SCP stands for “secure, contain, protect.” Additional information is found on the “About” page.
“The SCP Wiki is a collaborative speculative fiction website about the SCP Foundation, a secretive organization that contains anomalous or supernatural items and entities away from the eyes of the public — or so it may appear.”
Notice those words “speculative fiction”?
While fiction may inspire us to create things in the non-fiction world, fiction in and of itself is not non-fiction.
So if Jabroni Capital is right in claiming that Geoff Lewis’ “discovery” is based upon the SCP Wiki, I don’t think we have anything to worry about.
But others are concerned about Lewis’ mental health, such as Jason Calacanis.
“People are trying to figure out if he’s actually doing performance art here… or if he’s going through an episode. I can’t tell.”
“I wish him well, and I hope somebody explains this. I find it kind of disturbing even to watch it and just to talk about it here… someone needs to get him help.”
OpenAI also weighed in, although I suspect this statement was written by a human.
“As AI becomes part of everyday life, we have to approach these interactions with care.”
Um, maybe you might want to put those disclaimers up front, rather than burying them in terms of service.
Don’t Forget the Bredemarket Mailing List
I just saw another of those urgent messages. The kind that say: “If you’re depending on social media channels owned by others, you’re a renter, not an owner. Create your own mailing list that you control!”
So this is a good time to remind you that Bredemarket has a mailing list.
No, not the WordPress service where you can receive my blog posts via email.
I’m talking about my MailChimp-managed mailing list with its own content.
In fact, I just sent a new mailing composed entirely on my phone.
Oh, you didn’t see it?
Subscribe so you don’t miss the next one.
https://bredemarket.us2.list-manage.com/subscribe?u=0793a6901095b5080a383ea76&id=f482cef49d
Two of the Living
When I saw an allegation that a posted condolence message to Hulk Hogan was AI-generated, I sort of agreed.
And then I wondered.
“Write a two sentence condolence message for Hulk Hogan who passed away today, then a two sentence condolence message for Chuck Mangione who also passed away today.”
And Google Gemini wondered also.
“It seems there might be a misunderstanding. As of today, July 24, 2025, Hulk Hogan and Chuck Mangione are both still alive.
“Therefore, I cannot write condolence messages for them.”
When Pre-Acquisition Announcements Stalled Negative Activities Affecting Motorola and IDEMIA
When a company announces its intent to buy another company, certain activities at both firms may be stalled.
This can be a good thing, as certain Motorola employees and IDEMIA lawyers know.
Motorola layoffs on hold
In late 2008 and early 2009 Motorola was in trouble—so much trouble that it would eventually bifurcate. (Heh.) So Motorola was laying off employees throughout the company…
…except in the Biometric Business Unit where I resided. Safran had announced its intent purchase that unit, and Motorola was obligated to deliver that unit to Safran intact.
So I kept my job…for another 12 years anyway.
IDEMIA lawsuit on hold
Anyway, Motorola’s Biometric Business Unit became part of Safran and then IDEMIA. And according to ID Tech, IDEMIA is the beneficiary of new acquisition activity.
“A legal dispute between South African Black Economic Empowerment (BEE) firm INFOVERGE and French multinational IDEMIA has stalled, with INFOVERGE citing ongoing acquisition activity involving IDEMIA’s South African subsidiary as the reason for the delay. The firm is seeking R39 million in damages over what it describes as a breach of contractual obligations by IDEMIA.
“INFOVERGE told reporters that it had been informed IDEMIA’s South African division is undergoing a corporate transaction, which has effectively paused the litigation process. ‘We’ve been told that the South African arm of IDEMIA is under acquisition … which leaves our legal matter in some kind of limbo as we wait,’ an INFOVERGE spokesperson said, adding that the prolonged delay is impacting their ability to fulfill their empowerment mandate.”
I’m not sure whether the completed IN Groupe acquisition is the culprit, or if the possible public security sale is to blame.
What Good Are Notebooks?
(Imagen 4)
Whenever I bought a car or a computer, I used to buy a small spiral bound notebook to log important things, such as repairs.
And I always failed to log the important things.
I took a new approach on Sunday when Bredemarket bought a new computer.
(It was time. For the last five years, Bredemarket has been operating on a Windows 10 computer with 4 GB RAM from 2017.)
As I started setting up the new computer, I started an ONLINE log stored on a cloud service. And accessible from the new computer and several other devices.
So even if the computer is inaccessible, I can log things from my phone or another computer.
Hopefully I’ll be more faithful in logging this time around.
As long as my cloud service doesn’t fail. Then I’m screwed.
It’s like, um, life during wartime or something.
Inland Empire BizFest
Main Event (Montclair Place), Montclair, California, July 31, 2025.
Sponsored by the Montclair (California) Chamber of Commerce, the SBDC, and other entities.
$25 for non-Chamber members.

