Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI
Stick’em with the pointy end
Virtual and not so Virtual Space
Be Still my Bleeding Heart …
The Never-ending Privacy Battle
The Many Sides of Bitcoin
Cyber Jihadists
Hacker Gangs
The New Old War
The Sacred Executioner
Scripting Aphrodites
Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI I recently purchased the Cirago USB Bluetooth/Wifi combo to use with my raspberry pi. All things considered, I am quite pleased. Being reasonably versed in google-fu, helped, of course. Since I want the freedom to do some mobile tinkering, I need to access the pi sans a lan. That, and my latest wild hair project […]
Stick’em with the pointy end Since I have been spending a great deal of my time playing in the field of 3D design and printing, I have only recently stumbled upon, and had time to read, “Privacy for Me and Not for Thee,” penned by Catherine A. Fitzpatrick, a human rights activist whom I first encountered in the virtual world […]
Virtual and not so Virtual Space Not long ago, someone asked if I liked 3D printing better than virtual worlds. The short answer is, equally but differently.
Be Still my Bleeding Heart … “Secure web servers are the equivalent of heavy armored cars. The problem is, they are being used to transfer rolls of coins and checks written in crayon by people on park benches to merchants doing business in cardboard boxes from beneath highway bridges. Further, the roads are subject to random detours, anyone with a screwdriver […]
The Never-ending Privacy Battle This brings me back to the Hundredpercent American. To some extent he is a pet of mine. I have always rather liked him, because he has some promising qualities. For instance, he has enormous hospitality. I used to feel personally complimented by the amazing warm-hearted hospitality showered on me by Americans. […] When I realized […]
The Many Sides of Bitcoin Pariah, darling, or somewhere in between. Bitcoin has continued to linger in the daily media spotlight since the shuttering of darknet’s black-market drug bazaar, Silk Road, and the subsequent announcement of the arrest of its alleged owner, Ross William Ulbricht (aka DPR), on October 2, 2013. Media mavens have long cast bitcoin as a sort […]
Cyber Jihadists “We’re facing a very great threat of loosely-coupled, organizational networks that increasingly rely on IT infrastructure to coordinate their movements and recruit young disenfranchised, apathetic guys as suicidal pawns in a sophisticated, dispersed movement. (…)” (AHM, Usenet, September 21, 2001)
Hacker Gangs Meet Jim Script Kiddie (skiddie). He is the guy (usually in his early to mid teens) who comes into a hacker forum, asking inane questions like, “how can I be a hacker?” He also tends to over-indulge in “hacker speak” making him look pretty much like a moron to seasoned (and not so) computer netizens.
The New Old War In 1956, FBI Director, J. Edgar Hoover initiated a program, code-named COINTELPRO (counter intelligence program) ushering in what would become the mainstay for how intelligence communities dealt with domesitic affairs. The sole directive of this program was “to expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of various dissidents and their leaders.
The Sacred Executioner In his book, “The Sacred Executioner,” Hyam Maccoby notes: “A figure in mythology that has received little attention is that of the Sacred Executioner. […] By taking the blame for the slaying, he is performing a great service to society, for not only does he perform the deed, but he takes upon himself the blame […]
Scripting Aphrodites On Wednesday, April 13, 2006, 10-year-old Jamie Rose Bolin was reported missing by her father. Investigators thought she may have been abducted by someone she met online. Oklahoma law enforcement suspected her abductor might be heading just across the border to Texas and requested Texas issue an Amber alert.
image Mini ‘how-to’ Bluetooth/Wifi combo for Raspberry PI
image Stick’em with the pointy end
image Virtual and not so Virtual Space
image Be Still my Bleeding Heart …
image The Never-ending Privacy Battle
image The Many Sides of Bitcoin
image Cyber Jihadists
image Hacker Gangs
image The New Old War
image The Sacred Executioner
image Scripting Aphrodites

Speaking of…

While non-verbal cues can come into play when observing social interaction, words are the very essence of human communication. With words, we can paint pictures of our subjective experience, share intimate and not so intimate information with others, identify common interests, provide consolation, and even entertainment.

While non-verbal cues can come into play when observing social interaction, words are the very essence of human communication. With words, we can paint pictures of our subjective experience, share intimate and not so intimate information with others, identify common interests, provide consolation, and even entertainment. Words are the mechanism by which we share knowledge. Although it is said a picture paints a thousand words, verbal communication can evoke profound emotions. Consider, for example, poetry, prose, or speeches, such as Martin Luther King Jr’s “I have a Dream” speech, which energized people to a cause. Understanding how and why various words may evoke both emotional and/or action responses allows us to better understand what it means to be human. Words define the essence of our individual and shared experience. And they can paint pictures that may be both poignant and sweet, while at the same time resulting in a reminiscence of times past. Enter conversation analysis.

Conversation analysis, the study of words and how they are used in conversation and writing, arose from the field of in the 1960s, during the height of the and era drawing interests from and alike. While various psychology researchers explored this area in relation to interactionist theories, it was not until the late 1990s, that conversation analysis gained significant scientific acceptance as a viable research approach to human behavior. Jonathan Potter and Derek Edwards established the field of in 1997.[1] Since the late 1990s, conversation analysis has been used to explore relationships and interactions in the areas of marriage and family therapies, social and work situations, as well as its original linguistic application.

Unlike psychoanalysis, underlying interpretations are not assigned, at least in the sense of the Freudian or Jungian , to the spoken or written words. Nor are non-verbal cues attended to, as conversation analysis focuses on words and how they are used in the context of conversation. Word patterns may represent themes of a single or group of individuals. For example, the vocabulary of a depressed individual is likely to contain a higher degree of negative, self-defeating word patterns whereas a non-depressed or happy individual will generally use a larger number of neutral or positive words, respectively.[2] Furthermore, subject matter differences between two or more discussants, may signal cross or miscommunication, wherein subjects may be talking at or past each other.[3] Some conversation analyst even argue that word patterns can indicate ulterior motives, such as emotion evoking words commonly used to sell a product or promote a political agenda.[4] [5]

In the scientific arena, researchers may use words to test memory, such as those words used on the Deese/Roediger-McDermott memory test. Other researchers may look at metaphors and attempt to qualify how their use plays in an individual’s world-view. The majority of this type of research falls within the cognitive sciences. This is unsurprising considering cognitive psychology focuses on thought process, which are in turn revealed through verbal communication, and wherein negative patterns are identified, and cognitive distortions corrected through the use of challenging negative self and/or other-defeating, or even self-aggrandizing, statements.

In summary, words are powerful. They can define an individual’s world-view, evoke emotion, or move people to action. We use words to describe the essence of our experience, to give others a view into our life-books. We use words to share information, reminisce, play, and sometimes quarrel. We use words to define who we are and what we hope to be. And we judge others, to some degree, based upon the words they use. In this sense, we are all conversation analysts.


  1. Edwards, Derek; Potter, Jonathan. [1993] Language and causation: A discursive action model of description and attribution
    Psychological Review
    Volume 100 Issue 1, Jan 1993, 23-41.
  2. Drew, Mary L.; Dobson, Keith S.; Stam, Henderikus J. [1999] The negative self-concept in clinical depression: A discourse analysis
    Canadian Psychology
    Volume 40 Issue 2, May 1999, 192-204.
  3. Diamond, Guy; Liddle, Howard A. [1996] Resolving a therapeutic impasse between parents and adolescents in multidimensional family therapy
    Journal of Consulting & Clinical Psychology
    Volume 64 Issue 3, Jun 1996, 481-488.
  4. MacMartin, Clare; Yarmey, A. Daniel. [1999] Rhetoric and the recovered memory debate
    Canadian Psychology
    Volume 40 Issue 4, Nov 1999, 343-358.
  5. MacMartin, Clare. [2004] Judicial Constructions of the Seriousness of Child Sexual Abuse
    Canadian Journal of Behavioural Science
    Volume 36 Issue 1, Jan 2004, 66-80.