Technology advancement’s industry failure

creative virtuosity®
abandoned, lost in a pond

In 2004, the human microchip was advanced and approved by Food and Drug Administration and utilized by medical science to assist in the safe location and treatment of Alzheimer patients.  The human microchip was inserted under the skin using a procedure that takes less than 20 minutes and leaves no stitches. By mid-2004, the human microchip technology was formally introduced for use on children as a prevention method against child abduction.

In January 2005, “students at a school district in Northern California, were forced to wear RFID-enabled ID badges as part of an “RFID test” done with the support of a company developing and manufacturing attendance reporting and security systems.  The badges were issued without the parents’ consent, and allowed the school to track and maintain records of students’ movements on campus.”

Human microchip technology has had many roadblocks since the incident in Northern California, because the RFID monitors movement of a child and vital record.  Civil liberties argue that the ability to track people would create “a world where law enforcement officials could read the contents of a person’s handbag, without a person’s knowledge, by simply installing RFID;” indicating the abusive nature of the technology.

However, there are also limitations in frequency ranges provided by the technology which may prohibit proper localization of a child in a situation of abduction. For example, at 128 frequency levels a child could not realistically be located if abducted within 10 miles from a system reader.

The RFID system reader relies on a scanner similar to the ones found in a grocery store when implanted under the skin. Additionally, various reports returned on the testing of animals indicate the human microchip can be expelled or cause infection, scarring and even cancer.

In 2019, the human microchip technology still exists in medical science, as does its privacy breach concerns for use. There were in 424,066 NCIC entries for missing children reported in 2018; as a double-edged sword, human microchip technology fails us based on the same reasons for which it was built. The question of whether human microchip technology can effectively assist in child abduction investigations has not yet been answered.


Hippocratic oaths and hypocrites

creative virtuosity®
the terrible half face

We all know about the history of the Hippocratic oath, you know the one physicians take that state they are sworn to “save lives and administer healing to the best of their ability and judgment;”  but, how does that play ethically in the law sciences?

In 2017, two members of a political party, a police officer and district attorney participated in a courtroom attack on an innocent man and his family in defense of an illegal immigrant that entered the country under Visa Sponsorship of Marriage, left her new husband and then claimed “domestic violence.”  The woman they defended had only been in the country for three months, had absolutely nothing but a character evidence sheet in her case file when the case went to trial and had missed trial court hearing three times when called via subpoena.

The police officer was shown on video,” leading the woman termed as the “complainant” to press charges using the “no habla inglés” method.  In other words, the court case was issued purely on hearsay; built on the conversation of others who spoke English i.e., a woman termed to be a “victim’s advocate” and the police officer.

In the video, the alleged “victim’s advocate” stated that “VAWA was made for women like the complainant” and proceeded to make unverifiable statements about the defendant’s ex-wife, children and grandchildren; stating the ex-wife, a woman who raised three children to adulthood with a respect for education and employment, and was gainfully employed throughout most of her marriage to the defendant; had lived a bad home life.

The complainant that the alleged “victim’s advocate” defended was thirty-eight years old, had been arranged in marriage at least three times previously, never held a job or education, and never bore children.

“The woman was never thrown out of any home or battered, and had ample time to leave the home while the defendant was at work if she was in danger; the nearest neighbor was three feet away from the front door of the home,” stated the witness that took the side of the defendant. The witness herself held a 1995 protective order which was violated for many years; thus, she was not an advocate of the new domestic violence laws as her 1995 case had evidence of physical violence committed against her which had been shown in photographs in the case file.

The witness felt she had been specifically targeted by local area prosecutors at the time of the district court proceedings, as she was called in to attend Federal Jury duty on another more high profile case; the state court called her around the same time for attendance, placing the witness for the defendant at high risk through her appearance in courtrooms.

In 2018, the police officer and district attorney involved in the case lost their seats during the national mid-term elections.  It was found that the initial district attorney that participated in the 2017 attack on the defendant was diagnosed with a mental illness in 2016.  Nevertheless, the attack by the local area police never stopped on the defendant’s family; five women and a man that were a part of the defendant’s family which were either deceased, children, retired or gainfully employed who refused to believe the defendant was portrayed fairly were slandered via the courtroom proceeding by the police officer and the alleged “victim’s advocate.”

The defendant’s case was slightly reduced shortly after appeal petitions were completed via another district court proceeding. However, during appeals, the nursing board would attempt to remove the defendant’s licensing, altering judgment through its interference based on a police report that had been modified more than five times by prosecutors since the report had been filed in 2013. The nursing board threw away the US citizen termed “defendant,” his education and employment based on a mentally unstable district attorney, non-licensed victim’s advocate and police officer who built their case through the enjoyment of cruelty.

Swimming with the sharks…

If you’re a small business like us, you understand the level of competition in the Information Technology environment.  Don’t be fooled by recruiting firms boasting target area candidates.  Recruiting and marketing firms are a dime a dozen. A recent study released by American Staffing Association (ASA) states: “The turnover rate for temporary and contract employment was 386% in 2017.”

creative virtuosity®
competitive business concept

Most recruiting and marketing firms are not required to hire professional recruiters with an understanding in IT and human resource management; therefore, many of your contract employment candidates will be the least skilled in Technical Writing and will require more ramp-up time than an experienced professional with some development, writing and communication skill sets.

In 2019, reducing overhead costs using skilled labor has never been more important. Bureau of labor statistics state: “In April, 1.4 million persons were marginally attached to the labor force. These individuals were not in the labor force, wanted and were available for work, and had looked for a job sometime in the prior 12 months. Among the marginally attached, there were 454,000 discouraged workers i.e., persons looking for work which were strongly made to believe no jobs were available for them. “

Recent state and government shutdowns have caused unnecessary delays and cuts in business budgets, less is not more when seeking contract labor; the more contractor skill sets, the more work you get done.

creative virtuosity provides a unique, dedicated service for businesses seeking technical writing assistance to complete their business development projects.   We work with your flex-time and constraints to ensure that your team gets the attention they need to complete documentation development tasks. Our skill sets encompass various online and print mediums to accommodate the most in business need.


Ethical business requirements for remote computing

How does one place a good candidate in the remote computing environment without creating a secure human interactive business environment which allows daily communication, dedicated work schedules, and assurance of compensation?

creative virtuosity®

One of the biggest issues remote computing faces in the internet environment is integrity and trust.  Ethical business isn’t just about setting a code of conduct for the remote computing environment. The internet includes every type of business and we are not free to govern the type of businesses that reside in it. Therefore, we don’t just struggle with issues of identity theft, data breach, and financial loss; we struggle with finding suitable employment or employment candidates without compromising safety.

Federal Bureau of Investigations states: “Peer-to-peer networks are a primary source of abuse by hackers.” However, for the remote computing environment, peer-to-peer networks are a standard of communication. Peer-to-peer networks offer flexibility in expanding the network to handle a large number of clients as connections can be made on-demand rather than being fixed; client-server functionality is not dedicated. The theory that wide-area networks are more secure for public use just isn’t realistic based on recent data breach statistics, as local-area networks emulate peer-to-peer across wide-area networks. Efficient IP tracking exists in the peer-to-peer environment.

Most business security requirements include some measure of an anti-virus program and restricted access to combat intrusions. There are even enforceable laws that may assist at some level should a lawsuit be filed in effort to prove a case of “fraud in connection with computers;” i.e., 18 U.S.C. § 1030. But, proving internet fraud is as complex as filing the lawsuit.


Writing is an art, not just a science

Here at creative virtuosity we often write content on our pages in open form. But don’t let our writing style sway your views. We are technically minded. Our goal is to understand the science of technology to better assist businesses in their documentation needs.

creative virtuosity®

creative virtuosity is a registered sole proprietorship, founded in 2009. We offer confidence of performance to any business seeking reputable remote technical writing services.  Our in-house technology includes: Robohelp w/Dita Conversion, Microsoft Office, Visio, Sharepoint, Adobe Acrobat DC, Skype, WordPress, and Visual Studio with Team Services.

Cloud engineering the big data concept

On November 29, 2018, Digital Journal released discussion of predictive analysis and big data which states: “It is hoped that the big data analytics approach can be used to gain improved predictions for tornadoes.” Based on its proposition, big data seems to be the right choice for predictive analysis; but, does it really help in natural disaster recovery?

creative virtuosity

The Identity Theft Resource Center (ITRC), end-of-year data breach report indicates “there was a 126 percent increase from 2017 (197,612,748 records exposed) to 2018 (446,515,334 records exposed).” Another report released by Dynamic Technologies states: “hardware failures cause 45% of total unplanned downtime, loss of power (35%), software failure (34%), data corruption (24%), external security breaches (23%), and accidental user error (20%)” and “75% of small businesses have no disaster recovery plan.”

In 2009, Symantec Corporation released a survey indicating that “93 percent of US organizations had to execute disaster recovery plans and the average cost of implementing disaster recovery plans for each downtime incident was $287,000.”

Based on these statistics, disaster recovery provides very little assurance. However, many businesses in the area of medical, government, criminal justice, education, property, and financial services are required to have disaster recovery plans which include manual and automated procedures for backup / restore and data breach. Predictive analysis features are just another necessary evil…

Is Artificial Intelligence really a threat?

creative virtuosity®
artificial intelligence

The threat of artificial intelligence rears its head as recent phenomena targeted toward courtroom proceedings. Its story, covered by on September 22, 2017, boasts scientific design of “a machine-learning algorithm that can accurately predict over 70 percent of Supreme Court decisions. “

So how much of this technology is artificial intelligence and a threat to society? We can assess this based on previous courtroom decisions.  In 1977, the Supreme Court of the United States vacated and remanded decision in Gardner v. Florida. “The Petitioner was denied due process of law when the death sentence was imposed by the Florida Supreme Court, at least in part, on the basis of information that he had no opportunity to deny or explain,” stated Justice Stevens. The information utilized in the case was an informational report which held information of which Gardner was unaware.

On July 13, 2016, a similar report was utilized for sentencing of Eric M. Loomis and evaluated on appeal by the Wisconsin Supreme Court.  The report was comprised of a proprietary algorithm utilized by the COMPAS system which scales violence and recidivism risk principles as part of case triage.   In its opinion, the Wisconsin Supreme Court stated, “The court of appeals certified the specific question of whether the use of a COMPAS risk assessment at sentencing violates a defendant’s right to due process, either because the proprietary nature of COMPAS prevents defendants from challenging the COMPAS assessment’s scientific validity, or because COMPAS assessments take gender into account.”  The court determined, “if used properly, observing the limitations and cautions set forth herein, a circuit court’s consideration of a COMPAS risk assessment at sentencing does not violate a defendant’s right to due process,” further explaining its reasoning for decision was supported by other independent factors; thus, the risk assessment use was not a determinate.

Read more

Identity theft attacks through false recruiting strategies

If you are like us, you probably do not want to provide all your personal identity information in an email for resume submittals. Most of the individuals collecting personal identity information via email are probably not interested in placing your information into a client’s resume database for employment purposes. Many of them are not even professional recruiters, or your resume would be submitted without a push for the personal identity information. We recommend you find a genuine recruiter or submit your resume to the client companies yourself. A recruiting firm that waits to collect personal identity information via an I-9 and actually provides an interview with the client is the safest bet.

Read more