WORKERSEDGE
Menu

Winter/Spring 1943

            Chuck sits in the Michigan Avenue train station trying to get used to his stiff uniform. Twelve weeks of Army boot camp starts in four days. The hernia that prevented Ford's from hiring Chuck straight out of high school didn't prevent the Army from drafting him a few years later.

            Whose brilliant idea, Chuck thinks, to pull a couple dozen drunken mongrels off the streets of Detroit and plop 'em into a single Army unit? The beer money should hold out until Utah at least, Chuck assures himself. How bad can boot camp be? Twelve weeks until the free sea cruise. Pacific theater or Europe? Anybody's guess, thinks Chuck as he boards the train. He stows his duffel and heads straight for the bar car.

            Ten weeks later, Chuck is sitting on a bench beside U.S. 101 outside Paso Robles. He's thinking about his last beer on that westbound train. Chuck wonders how hot it has to get for his U.S. Army-issued hat to melt. Beside Chuck sits Pawlecki, a skinny kid from Detroit's east side. In Chuck's shirt pocket, now sticky from sweat, is a folded sheet of paper containing the addresses of a dozen San Francisco nightclubs.

            Chuck intends to spend the next 48 hours slowly emptying the contents of his wallet in many of those bars. Once he shakes Pawlecki, that is. The bus north is only 15 minutes behind schedule, but Chuck is fidgeting, standing, sitting, standing again, staring up the empty highway.

            Chuck watches a Ford Roadster whistle by. It brakes hard, makes a squealing u-turn, and pulls up next to Chuck. The passenger door opens. Out of the car pops Gianni Bartoli. He rushes past Chuck saying, "I gotta take a wicked leak," which he does into a nearby manzanita bush.

            Chuck says to Gianni's back, "How many years I don't see you and all you got is 'I gotta take a wicked leak'?" Gianni appears to ignore him.

            When he finishes, Gianni walks back to the Roadster and flips up the rumble seat. "You soldier boys want a ride to the City?", he asks them.

            "Heck yeah," says Pawlecki and makes for the seat.

            Chuck just stares at Gianni. "I promise I won't drive," Gianni says with a straight face. As Chuck squeezes into the rumble seat next to Pawlecki, the driver turns to give him the once-over. Her long, dark hair is pulled back. Dark complexion, light green eyes, lower lip pouting slightly. Chuck feels naked under her cool, easy gaze.

            "You're Chuck?", she asks him. She sounds disappointed, thinks Chuck.

            Before he can manage a reply, Gianni tells her, "Can you believe it?" He shakes his head and laughs.

            "You're not the uniform type, paly," Gianni says.

            Chuck addresses the driver. "You know you can't believe a thing this guy says, right?"

            "Hold onto your hat, Chuck," she says as she puts the Roadster in gear, makes a wide U-turn, and floors it. Chuck's cap flies into the road. The Ford's engine is so loud no one in the car bothers speaking. Chuck wants a cigarette but knows he'd never strike a match in that breeze.

            The two-lane highway crosses and recrosses the Salinas River. Chuck watches the brown water roil just inches below road level in some spots. The hills rising on either side of the river are green like Chuck has never seen before, and dotted with wild flowers from bottom to top.

            Halfway between Salinas and Gilroy, the driver turns the Roadster into narrow two-track path and heads for a small, steep-roofed cottage. Gianni leans toward Chuck in the rumble seat and says, "Gotta make a stop." The driver pulls the car right next to the cottage's front door.

            Gianni jumps out before the car has stopped. Two strides and he's at the door. He enters the cottage like he owns it, exits almost as fast. The car is moving before Gianni is all the way inside. Chuck and Pawlecki nearly bounce out as the Roadster roars back down the rutted path.

            Chuck feels the bullet whistle over his head before he hears the shot behind him. A second later the car is fishtailing through the brush. And like that the Roadster is back on the highway heading north. In a hurry. The driver is punching Gianni in the shoulder. He's laughing. The driver punctuates her blows with adjectives: "Dirty... stinking... lying... worthless...."

            Gianni says,"You made your point."

            The driver says through a clenched jaw, "No guns I said." She slaps Gianni's ear.

            "Enough," he says, waving a finger. She slaps at that too.

            Chuck shouts to Gianni over the Roadster's engine,"What was that about?"

            "Artichokes," Gianni replies. That explains it, thinks Chuck.

            Pawlecki asks Chuck, "Is this guy in the service?"

            "You might call him a member of the auxiliary," Chuck replies. "Support staff," he adds.

            Gianni in California, thinks Chuck. A hundred thousand servicemen, gambling, guns, girls. Where else would he be? Chuck regards the driver. She hasn't turned her head since the tussle with Gianni following the quick detour. Chuck is aching for another glimpse of those green eyes.

            As the Roadster nears San Francisco, Chuck realizes he's freezing. Pawlecki leans forward and asks Gianni, "You got any blankets up there?"

            Gianni laughs. Without turning around, he says, "Big, tough G.I.'s."

            Chuck is ready to trade the rumble seat for a bar stool. Right on cue, the driver pulls the Roadster onto the gravel outside the Seven Mile House. "You're buying," Gianni says, pointing at Chuck.

            As soon as Gianni, Chuck, and Pawlecki exit the Roadster, the driver says, "I'm gone," and takes off, showering them in dust and gravel.

            Chuck watches the Roadster fly down Bayshore Boulevard and disappear. "Nice car," he says to Gianni.

            Pawlecki says, "Anybody else thirsty?"

            Inside the Seven Mile House, the afternoon crowd is half service men and half rail yard workers. Gianni nods at the bartender, who nods back. Gianni leads Chuck and Pawlecki into a room at the back of the bar. A large, round table and six wooden chairs nearly fill the small space. The barman comes in and places a pitcher of beer, three glasses, and a plate of sandwiches on the table. Gianni pours, the soldiers dig in.

            Two ham-and-cheese-on-sourdough sandwiches later, Chuck asks Gianni, "Who is she?"

            "The driver?", Gianni replies."Uh-uh. Not your type."

            "Believe me," Chuck tells Gianni, "she's exactly my type. Where did she go?" Gianni shrugs. "When is she coming back?" Gianni shrugs again.

            Chuck tries an end-around. "How you been making your money these days?"

            Gianni drains his beer glass and refills it. "The usual," he says.

            "Booze, gambling, and girls?", Chuck guesses.

            "Vegetables, mostly," Gianni answers. "Lotta soldiers, lotta farmers, me smack in the middle."

            "I never took you for the grocery type," Chuck tells Gianni.

            "The lettuce doesn't get to the mess line all by itself," Gianni explains.

            Chuck nods. Gio and his trucks.

            "I make more on black market gasoline than I do on hootch and gambling," Gianni says. "Opportunity knocks."

            Chuck stands. "Speaking of opportunity," he says, "I got some California women to charm out of their panties. Which way to Market Street?"

            Gianni slides a nickel across the table. "Streetcar runs every 10 minutes," he tells Chuck. "The California women can't wait to meet you."

            Chuck hits Pawlecki's chair. "Drop your kielbasa and zip up," he says. As he buttons his jacket, he tells Gianni, "Don't fire that driver."

            Gianni tips back his chair. "We got plenty of trucks need drivers," he says to Chuck. "If the Army thing doesn't work out for you," he adds.

            "Work for your brother. Hmm. Tempting," Chuck says. They both start cackling. "I'll take my chances with the Axis." They both stop laughing.

            "I'll know where to find you," Gianni says to Chuck as he and Pawlecki scuffle toward the door. "For the next couple of weeks, anyway."

--------------------------------------------------------------------------------

            Chuck and Pawlecki watch the tram turn left from Geneva onto Bayshore. As they board, the driver says, "G.I.'s ride free."

            They take a seat near the back of the car. Pawlecki says, "I like this town."

            "We've only seen two blocks and one bar," Chuck replies.

            "Yeah," says Pawlecki, "I drank a pitcher of beer, ate four sandwiches, rode all the way, and ain't cracked my wallet once. My kinda place."

            Chuck watches the traffic heading south as the streetcar makes it's way north toward downtown. He hopes for a glimpse of that Ford Roadster.

            Pawlecki lasts three bars. Then Chuck decides to check him into a $2-a-night hotel room in the Tenderloin before he spews on his uniform. After he puts Pawlecki to bed (fully dressed, on his side in case he "burps" in his sleep), Chuck takes a cab to Jillie's on Market Street.

            Chuck is happy to see the place is jumping at the early hour of 10 p.m. He's even happier to see almost as many women as men in attendance. Standing at the bar waiting for his gin and tonic, Chuck spots Lt. Bedders attempting to make time with a young woman. She's ignoring him.

            The lieutenant has been the source of unending grief for Chuck and his unit of Detroit misfits since the day they arrived at Camp Roberts. Halfway through his gin and tonic, Chuck decides even hard-ass junior officers deserve a good time. He wends his way to the woman at the bar.

            "Good evening, Lieutenant," Chuck says. "I hope I'm not interrupting anything." Chuck smiles at the woman, who gives him a sideways glance.

            "As a matter of fact, private," Lt. Bedders begins, but Chuck cuts him off. "I didn't get a chance to congratulate you at camp," Chuck says. The lieutenant stammers, the woman at the bar looks bored, Chuck forges ahead. "The Colonel's Citation," he says. "Well done, sir."

            Chuck holds out his hand. Lt. Bedders shakes it blandly, still stuttering. Chuck turns to the woman. "This officer's going places," he says. Chuck turns back to the confused second lieutenant. "You'll make captain by fall, sir," he tells him. "Then, well, the sky's the limit, eh?"

            The woman turns on her barstool and gives the lieutenant a smile. "Thank you, private," says Lt. Bedders. "But you men deserve the credit."

            My work is done, thinks Chuck as he salutes the lieutenant, tips his hat to the woman on the stool, and returns slowly to his gin and tonic.

            By the time Chuck signals the bartender for another, the barstool woman's open-toed, high-heel shoe is massaging the lieutenant's pant leg.

            Lots of women here prettier than Lt. Bedders' pickup, thinks Chuck. He even catches a few smiles aimed his way through the bar's smoky haze. Chuck finishes his drink and considers buying a third, and one for the short, busty blonde who's been flirting with him from across the bar.

            Chuck wonders, How many Roadsters could there be in San Francisco? He straightens his tie and heads for the door. So long, cute li'l blonde!

            After walking two blocks toward the Ferry Building, Chuck loses interest in Market St. He spots Coit Tower far to his left and heads for it.

            This must be North Beach, thinks Chuck as he turns left onto Broadway from Montgomery. Four drunken sailors nearly knock him into traffic. Chuck steadies himself and follows the sound of a swing band coming from an open cafe door a block away. Another pack of navymen approaches.

            Peering inside, Chuck sees everyone in the room is moving. Fast. This is the place, he thinks, and wedges his way past the knot at the door. Chuck finds himself dancing with two different women before he can make his way to the bar. There's too much music for the room, he thinks.

            The six-piece band is crowded on a low riser that takes up most of one wall. Opposite the band is a bar where the patrons stand three deep. Between the band and the bar is a whirl of jumping, bouncing skirts and uniforms. Chuck's thirst pushes him into the throng lining the bar.

            Chuck finds a gap between two women standing at the short bar. The bartender walks up and silently puts a drink on the bar in front of him. Chuck takes a sip. Gin and tonic. I like this bartender, he thinks. The bartender walks by again and says as he passes, "On the house."

            I really like this bartender, Chuck thinks. The woman to his left eyes Chuck over her shoulder. Chuck smiles and raises his glass to her. "What are you drinking?" Chuck asks the woman. She's wearing a tight wool skirt and flower-print blouse. She turns around without a word.

            Chuck turns to the woman on his right, who also has his back to him. "Care to dance?" he asks her loudly. He doesn't see the punch coming.

            Chuck happens to be turning his head when the blow lands, so it glances off his right ear. He spins and nails the puncher on the temple. The sailor drops like he's wearing a concrete vest. Two more tars rush Chuck from the dance floor, but one trips on a dancer and face flops. The third sailor lowers his head and rushes Chuck like a bull. Chuck steps aside and the sailor roars head first into the wooden bar rail.

            Good thing these guys do their fighting from a boat, thinks Chuck. They're worthless on land. Chuck downs his drink and heads for the door. Two M.P.s are standing in the entry. Chuck turns back to the bar. The bartender waves him through a gap in the back wall.

            The narrow hall leads down, turns left, passes two low doorways, and ends at a narrower stairway. Chuck descends and winds up in an alley. To the left Chuck sees cars passing on a dimly lit street. To the right is darkness. Chuck turns right and finds two more alleys just as dark.

            Chuck meanders through the alleys of the city, half looking for another bar, half thinking about walking all night, surprised by the quiet. Walking feels right to Chuck, even after weeks of drills on Camp Roberts' endless parade ground. He breathes in the night like an elixir.

            Chuck tops a hill. The bay lays flat as a tarp. Ships line nearly every pier. Driving slowly up the street toward him is a Ford Roadster. The car passes Chuck, turns around, and stops beside him. The passenger door opens. Chuck just stares. A woman's voice says, "No hurry."

            "Nice night for a walk," Chuck says through the open door. "Why not park this heap and join me?" Chuck fights the urge to jump in the car.

            "I'd rather drive, if it's all the same to you," says the woman behind the wheel.

            Chuck asks, "What's your name?" The driver leans sideways.

            "Get in the car, Chuck," she says, looking him square in the eye. Chuck obliges her. The driver turns the car around and heads into town.

            Chuck asks her, "Any particular reason why I shouldn't know your name?"

            "No," she replies. "I just prefer you find out from someone else."

            Chuck settles in as the car heads west on Howard St. "Wherever we're going," he says to the driver, "just tell me Gianni won't be there."

            "Don't know where you're going," the driver replies, "don't know where Gianni is." She hasn't taken her eyes off the road. "I'm going home."

            "Alone," she adds. They drive in silence for ten minutes. Chuck is ready to start walking again. The driver stops in front of an apartment.

            "Where are we?", Chuck asks.

            "Doesn't matter," the driver replies. "Ring number 206."

            "Who shall I say sent me?"

            "They won't ask," she says.

            Chuck turns around after he exits the car, but the driver pulls away from the curb without saying another word. Chuck heads up the stairs. A dozen mailboxes, a dozen bells. Chuck rings 206 and is buzzed in a second later. Maybe they're expecting me, thinks Chuck with a smile.

            Apartment 206 is at the back of the two-story building's top floor. Before Chuck can knock on the door, it opens a crack. Chuck hears music. A slow, bluesy Benny Goodman song is playing. Chuck pushes the door open part way and sees the Victrola against the wall. No one's in sight.

            From inside the apartment, Chuck hears a woman ask, "What are you, shy?"

            Chuck enters and shuts the door. The woman is sitting on a sofa. She's wearing a pale-green robe and gray silk slippers. She puts down the magazine she was reading, stands, and approaches Chuck slowly.

            Chuck meets her half way, takes her in his arms, and kisses her. The song ends, the kiss goes on. Much later, she sighs and says, "Not shy."

            "What's your name?", Chuck asks her.

            "Nora," she answers.

            Chuck says,"I'm--."

            "Chuck," she interrupts. "I thought you'd never get here."

----------------------------------------------------------------------------

            "I gotta go," Chuck tells Nora, but he stays snuggled against her under the bedcovers.

            "Go," Nora says without loosening her embrace a bit.

            "It's noon," Chuck whispers. "I'm due back at camp by 1600."

            "Go, go, go," Nora replies as she rolls on top of him. "Who's stopping you?"

            "Nobody," Chuck replies as the love-making recommences. They haven't left the apartment since Chuck was dropped off early Saturday morning. "I've got three hours to make a four-hour trip," says Chuck as he sits on the edge of the bed tying his shoes. "And to find a goddamn hat."

            "I wouldn't worry so much if I were you," Nora says. She sits up in the bed and lets the sheet sag down to her lap. "You'll get gray hair."

            Chuck drinks in the image of Nora sitting up in the bed. I want to remember how she looks right now, he thinks. Burn it deep in my memory. As he stands and grabs his coat off the back of a chair, Chuck asks Nora, "You wouldn't happen to know the name of the driver, would you?"

            "What driver?", Nora asks sleepily.

            "Never mind," Chuck says. He sits on the edge of the bed and gives her a long kiss. "See ya," he says.

            "Maybe," Nora replies, looking Chuck in the eye. Chuck nods solemnly and leaves without another word.

            Parked at the curb is the Roadster. Chuck isn't surprised to see Gio at the wheel. He does his best to hide his disappointment. "Where's your Cadillac?", he asks from the curb.

            "Let's go, soldier boy," Gio says through the passenger window. "You're not the only one's gotta be someplace." Chuck thinks, this'll hurt.

            "Ok, how much is this ride gonna cost me?", Chuck says as gets in.

            Gio pulls away from the curb. "You see a meter?", he asks with a growl.

            "Gio, you never gave a free ride in your life," Chuck says as the Ford two-seater zips west on Geary toward Playland and the Sutro Baths.

            "All the favors I do for you," Gio mumbles as he makes a hard left on the Great Highway. "All the money I put in your pocket. Damn ingrate."

            "All the frozen water you put in my lungs," Chuck replies. "All the whiskey you left me at the bottom of the Detroit River. Damn sucker."

            "You got paid," Gio tells Chuck, almost apologetically. "You're still getting paid, if you didn't know." He smiles. "Have a nice weekend?"

            The whole thing's a set-up, thinks Chuck. I should've known as soon as Gianni popped out of the Roadster. As soon as Nora kissed me. Nora.

            "Right now the only one paying me is Uncle Sam," Chuck tells Gio. "Let's keep it that way."

            "Okay, fine," Gio says. "Just trying to help."

            An hour later the Roadster is zipping past prune orchards south of San Jose. "There goes one," Gio says, pointing to a tarp-covered truck.

            "One of yours?", Chuck asks Gio, though he knows the answer.

            Gio says, "I got more trucks and freight than I got drivers." Chuck stays mum.

            The Ford is rolling through Hollister when Chuck breaks the long silence: "You know I'm shipping out in a few weeks."

            "Maybe," Gio says.

            "No maybe about it," Chuck tells Gio.

            "If you say so," says Gio. "You were thinking about it, weren't you?" Chuck has to admit it: he was. The devil you know, thinks Chuck. Freighting who-knows-what for Gio here is as likely to get me killed as shipping out in a rifle company.

            Green hills speckled with wild flowers roll by the Roadster's window. A sign announces: Camp Roberts 5 Miles. Chuck reconsiders Gio's offer. I'm just not the AWOL type, thinks Chuck. And Gio's too tight to make it worth the jail time if I get hauled in. War can't be all that bad.

            Gio pulls to the side of the road fifty yards from the camp's front gate. "I'll be in touch," he tells Chuck. "You'll come around, I know."

            "You're gonna come out of this war smelling like clover," Chuck says as he exits the Roadster. "Your brother -- him I'm not so sure about."

            "Gianni's a big boy," says Gio.

            "Yeah," Chuck answers, "but he doesn't have sense enough not to listen to his brother." Chuck walks away.

            Gio pulls the car next to Chuck just before he reaches the camp gate. "Stop by the Seven Mile next time you're in town. That's an order." Chuck bends down to mock-salute Gio through the car's passenger window. He enters the gate thinking, Next time I'm in town could be awhile.

-------------------------------------------------------------------------------

            As soon as he reaches his company's barracks, Chuck is met by Pawlecki, who looks at his watch and says, "Five minutes to spare, Mr. Lucky."

            "How'd you get back so fast?", Chuck asks.

            Pawlecki looks at his scuffed boots. "Took the bus yesterday," he says. "Didn't feel so good."

            Suddenly Pawlecki turns pale. Chuck asks, "Are you gonna get sick again?"

            Pawlecki points behind Chuck, who turns around to see Lt. Bedders. "Private, my office," the lieutenant says.

            Chuck follows Lt. Bedders out the barracks, across the parade ground, and into the regimental HQ. The lieutenant occupies the smallest office in the largest building on the base, after the bowling alley. He takes a seat at a tiny desk.

            Chuck stands in front of the lieutenant's desk, wondering whether he should speak. He decides to wait for Lt. Bedders to break the silence.

            After a minute of shuffling papers, Lt. Bedders says without looking up, "Your unit is an embarrassment, Private." Not to me, thinks Chuck.

            Chuck waits another minute for Lt. Bedders to continue. "Slothful, indolent, baleful, insolent..." Chuck thinks, now he's a poet.

            The lieutenant looks up for the first time. "You showed me something last Friday, Laffingstock. Ingenuity, teamwork, loyalty, potential." Chuck squirms silently. Lt. Bedders continues: "I'm giving your boys one last chance. It's up to you. You're officer of the day tomorrow."

            Great, thinks Chuck. The whole company will be hung over, and it's our last crack at the obstacle course. Looks like another 10 weeks here.

            A plan starts to form in Chuck's mind. Step one: get his hands on some whiskey. In our bunkhouse, that shouldn't be difficult (for a price). Step two: get the rowdies some sleep. No all-night card games in the darkness of the latrine. Step three: a little breakfast-mess sabotage. Step four: get Sgt. York into the infirmary. Half the company would sandbag just to see that pompous ass get a stripe ripped off his sleeve.

-----------------------------------------------------------------------------------

            Oh-eight-hundred hours: the Detroit misfits are lined up, relatively alert, ready to run/crawl under, over, and through various obstacles. Chuck thinks, the front lines of the European and Pacific theaters are littered with rope ladders and mud pits? Sure, right. Army geniuses.

            At least Chuck's plan clicked. Sgt. York's in the infirmary, the company got some real sleep, and they all avoided the eggs at breakfast. I should feel bad about all the laxative in Sgt. York's whiskey-laced tea, thinks Chuck, but I don't. Ditto the sleeping pills in the eggs.

            The company bought Chuck's plan when he spelled it out for them in the barracks last night before lights out: Get the sergeant shipped out. Do it by breaking the camp obstacle-course record with Sgt. York on the sidelines. The Detroit recruits had been sandbagging since day one. They knew they could smoke those farm boys and college stiffs half in the bag. But the harder York pushed them, the harder they pushed back.

            Chuck knew the boys were champing at the bit to show what they could do. They just needed a reason, and screwing York was reason aplenty. 



            As Sgt. Joule approaches, the company stands in groups of three and four at the course start, smoking, mumbling, snickering. He's ticked.

            "Who's in charge here?" the sergeant shouts. The soldiers just look at him. "Who the hell's in charge?" he repeats.

            Chuck says,"Uh, me."

            Sgt. Joule addresses Chuck. "Laffingstock, you've got 30 seconds to get these humps out of my yard and onto those obstacles."

            Chuck shrugs. "We've been waiting on you, sergeant," Chuck says. "Guess you got caught in the crowd at the latrine this morning." Sgt. Joule just scowls.

            Chuck decides to put some space between himself and the fuming sergeant. He approaches Andy Deluca, who's the best athlete in the company. "Say Andy," Chuck says, "we gotta break that record as a group."

            "No sweat," says Andy. "Just feed the slugs some of them eggs you made."

            "Nah," Chuck replies. "Let's let Rollo be the rabbit. He's the only one near your speed. You go last and kick the trailers in the behind." Chuck leans in and whispers, "I'll stay in the pack with my motivator." He shows Andy a 10-penny nail up his sleeve. "That's our  record."

            From a platform 10 feet above the course start and finish lines, Sgt. Joule yells "Set!"

            Chuck forms the platoon into two scraggly rows. At the last minute, Chuck moves Essenmacher next to Rollo in the first pair, replacing Big Mo Pete, who he places next to himself amidpack. Chuck takes a last quick look back at Andy Deluca, who's standing nonchalant in the rear. Andy flips him off just as Sgt. Joule yells "Go!"

            Rollo and Essenmacher shoot through the first obstacle, followed in five-second intervals by the next 19 pairs of soldiers in the platoon.

            Chuck nears the halfway point of the obstacle course without seeing any inert bodies or hearing anguished screams. Good signs, he thinks. Big Mo has managed to keep pace, but the 20-foot wall is only two obstacles away. Chuck positions the 10-penny nail in his balled-up fist. Chuck knows Big Mo hasn't yet made it over the wall in four previous course runs. Chuck'll be damned if he'll let that happen a fifth time.

            Big Mo slows when he spots the wall ahead. "Pick it up, Mo," says Chuck. "Top speed, grab the rope, walk the wall, hands 'n feet together."

            Chuck's advice holds for Big Mo's first four steps, but then he loses momentum. His feet slip instead of step. His grip on the rope falters. From his spot halfway up the climbing wall next to Mo's, Chuck senses the big guy's about to drop to the ground. He swings to Mo's side.

            Using the rope's momentum, Chuck punches Mo in the bottom with the nail poking two inches out of his fist. The big man howls and scampers. Mo tumbles over the top of the wall in a few giant steps. Chuck hears him land with a thud and a groan. Chuck swings over his wall smiling.

            Chuck tries to help Big Mo get back on his feet, but the guy takes a swing at him from the ground. "You wanna do basic twice?" Chuck asks.

            Mo answers Chuck by taking another swing at him. Chuck grabs Mo's arm and pulls him to his feet. "Kill me at the finish," Chuck tells him.

            Big Mo isn't finishing the obstacle course so much as he's chasing Chuck, who hears him panting and cursing a few steps behind all the way. After he completes the rope swing over the water hazard, Chuck sees the finish line 50 yards and two obstacles ahead. He hears a splash.

            Chuck takes a quick glance over his shoulder and sees that Big Mo came up a few yards short on the rope swing. Now he's cussing even louder. After the penultimate obstacle Chuck realizes Mo is gaining on him and may catch him going under the 30 feet of barbed wire at course end.

            Sure enough, Chuck feels Big Mo grabbing at his boots as they wiggle under the wire, which is now sagging nearly to the ground in places. Chuck spends as much effort kicking back at Mo as he does crawling to the end of the wire, but he finally makes it out and onto his feet.

            The platoon members who have finished the course are resting in the shade of the tall start-finish platform. Sgt. Joule frowns down at them. Chuck turns to head off Big Mo, who rips through the last bit of wire and stammers to his feet. They face each other, huffing and puffing.

            "Mo--", says Chuck before Big Mo lunges at him with a growl. Chuck side-steps him, but Mo catches Chuck's hip with one hand and twirls him. Chuck keeps his feet, but Mo's back on him before he's steady. Chuck falls backward and uses Mo's own momentum to send the big guy flying.

            Most of the platoon members have finished the course. They form a ring around the fighters. "Mo, Goddam--", says Chuck as Mo lunges at him.

            Big Mo goes for Chuck's knees and would've gotten them if only Chuck hadn't knocked him out with a left to the temple first. A cheer goes up. On the platform, Sgt. Joule checks with the timer, shakes his head, and turns toward the platoon pairing up at the start. Andy Deluca grins.

            "We got it," Andy tells Chuck, who is bent over, hands on knees. It takes Chuck a second to realize Andy means they broke the course record.

            Big Mo starts to moan. "Get this bum on his feet," says Chuck as he catches his breath. "We're due at the rifle range at ten hundred hours."

            Chuck gets the platoon through the day's training without anyone getting thrown in the brig. The Detroiters are quieter than usual at mess, and they're downright peaceful while lying in their bunks before lights out. Chuck's half asleep when he sees Sgt. Joule at the end of the barracks.

            The sergeant motions to Chuck and walks into Sgt. York's office. Chuck cusses under his breath, gets up. Almost got away with it, he thinks.

            "Sgt. York has been reassigned," says Sgt. Joule before Chuck's through the office door. "You're OD for the duration. Any questions? Good."

            "Dismissed," says the sergeant. He hasn't looked up from the papers he's shuffling since Chuck entered the office.

            "I'm... Me?", Chuck asks. "Wait, what... Who?", Chuck stammers. "What happened to Sgt. York?"

            "Reassigned, Private," he replies. "Someone has to answer for the eggs. It seems Lt. Bedders had a double helping. Indisposed all morning. The lieutenant thinks you'll keep the mutts in line."

            "In a week you're all shipping out," Sgt. Joule continues. "Just keep them bums on the base and out of the brig. They're your problem now." Sgt. Joule looks up from the papers he's shuffling. "I said dismissed, Private!"

            "Yes, sergeant," Chuck says and walks out of the office.

            Chuck thinks as he walks to his cot: A week as OD then a long boat ride. Hmm. I gotta get off this base, without getting myself locked up. Chuck sits on his bunk, takes a box of matches out his jacket pocket, and regards the number printed on the box under "Seven Mile House."

            Over the next two days of marches and drills, the platoon of Detroit misfits outperforms nearly the entire base, with no artificial edges. By Wednesday night, Chuck's plan is set. All it took was a call to the Seven Mile House, a two-word message for Gianni, and a bribed guard.

            Standing behind a clump of manzanita, Chuck sees headlights approach the camp bus stop. The car rolls to a stop. Chuck comes out to meet it.

            "Where is she?", Chuck asks as he gets in the Roadster.

            "Where's who?", Gianni replies.

            "Maybe I should drive," says Chuck. "Keep us dry."

            Gianni hands Chuck a flask as he speeds south down the middle of the two-lane highway. "I figure," Gianni says, "you got four hours, tops. To the Inn and back to camp, that's one hour."

            Chuck takes a pull on the flask and hands it back to Gianni uncapped. Gianni caps the flask without drinking. "Two hours with Nora," Gianni says with a straight face, "and an hour for us to talk some business."

            "What business do we have?" Chuck asks as he grabs the flask back and takes another drink.

            "That's what we have to talk about," Gianni says.

----------------------------------------------------------------------------

            "How is it possible?", Chuck asks when Nora opens her door at the Paso Robles Inn.

            "What kind of welcome is that?", Nora says with a smile.

            Chuck takes Nora in his arms and kisses her a good long time. "Better," Nora says finally. They kiss again and slowly shed their clothes.

            "How is what possible?", Nora asks Chuck as they lie still in each other's arms. An hour has passed since Chuck first posed the question.

            "How is it possible," Chuck repeats, "for you to look better now than you did when I last saw you?"

            Nora sighs."Knock it off," she says.

            Chuck pours a tall glass of water from the pitcher on the nightstand. He hands it to Nora, who drinks half and hands the glass back to him. "Ta," says Nora and rests her head on Chuck's shoulder.

            Chuck drains the glass, puts it back on the nightstand, and says, "Don't sleep, dove."

            "Mmmm," Nora replies. "Okay, gimme a reason to stay awake."

            Chuck says, "I'll give you two: ETO and Pacific Theater." He slides into her.

            "Mmmm," Nora moans, smiling. "You're not going anywhere, soldier boy. You're needed on the home front." Chuck doesn't hear a word she says.

-------------------------------------------------------------------------------

            "Slow down on the coffee," Gianni tells Chuck as he watches him pour his third cup. It's 4:00 a.m. and they're alone in the inn lobby. Gianni has laid out his plan to Chuck, who listened politely and answered with a single word: "No." As usual, Gianni hears "Yes."

            "Shouldn't we be heading back?", Chuck asks. He's sitting on the edge of his seat.

            "You'll be back in your bunk by reveille," Gianni says.

            "You're not the one who's AWOL," Chuck says.

            "Are you complaining now?", Gianni asks.

            Chuck shakes his head. "I'll be shipping out smiling."

            Gianni leans forward. "You're in a big hurry to get on that boat," he says. "Don't you like California?"

            "Army says go," Chuck says, "I go."

-----------------------------------------------------------------------------------

            Gianni turns off the Roadster's headlights as the car approaches the camp entrance. The sentry post is lit by a single yellow overhead lamp. "That's not Gus," Chuck says when the sentry comes into view. Gianni sets the car's brake and signals Chuck to wait as he exits quietly.

            Gianni walks to the sentry post like he belongs there. A minute later he walks halfway back to the car and signals to Chuck to join him. Chuck follows Gianni back to the small sentry post. The sentry waves Chuck through the open gate. Chuck looks at Gianni, who just shrugs.

            Chuck shakes Gianni's hand and says, "Be nice to Nora."

            "That's your job," says Gianni. He heads back to the car, Chuck heads into the camp.

            Chuck has only enough time to change out of his uniform before reveille. Sgt. Joule sees Chuck standing in the mess line and approaches him.

            "Lt. Bedders' office," Sgt. Joule tells Chuck much too loudly, "Oh-seven-hundred." He exits the mess hall walking like John Wayne with bad blisters.

            If I'd been spotted sneaking in or out, thinks Chuck, I'd be in the brig by now. He tries a half-forkful of Army eggs, sticks with coffee.

--------------------------------------------------------------------------------

            "Whoever made you OD should be promoted, private," Lt. Bedders says as he shuffles through the papers on his desk. Chuck just stands there.

            A minute later, the lieutenant looks up and gives Chuck the once-over. "I see keeping those hoodlums in line has taken its toll," he says.

            "A touch of the flu, sir," Chuck offers to explain being hung over and sleep-deprived. "I'll be fit to ship out with the boys next week."

            Lt. Bedders seems to be considering this. "Yes, well," he says finally, "you've been reassigned to the training division. Congratulations. You report for NCO training at oh-eight-hundred hours," Lt. Bedders continues. "Pack your duffel, corporal."

            Chuck thinks, Me? A corporal?

            "Dismissed," the lieutenant adds after a few seconds of Chuck standing silently, unsteadily.

            "Yes, sir," Chuck says and exits the office.

            NCO school, what is that?, Chuck thinks as he stuffs his gear messily into his duffel. Then it hits him: Did Gianni...? Nah.

            Chuck stands and announces to the barracks, "Gents, they're gonna make me an NCO, do you believe that? You're on your own, God help you."

            Chuck's news is met with silence. A few of his former barracks mates casually exit. "Hey, it wasn't my idea," Chuck explains. No takers.

            "Gotta hand it to you," Andy Deluca says from his bunk across the barracks. "Played your cards beautiful. Dealt a good hand, though, eh?"

            "I didn't play a damn thing," Chuck answers, dropping his duffel. "I'm a draftee just like all of yuz."

            "Friends in high places," says Andy.

            Chuck tries not to sound apologetic. "What friends? York? Joule? Lt. Bedders? Sure, we're forever chumming around." Chuck starts to wobble.

            Andy shakes his head and walks out of the barracks without another word. "Not my idea!", Chuck shouts after him as he picks up his duffel.

-----------------------------------------------------------------------------

            Chuck gets lost twice on his way to the NCO training office. He criss-crosses the camp's broad parade ground multiple times as he searches. The walking perks Chuck up. He has no idea what the Army has in mind for him. Not being shot at is a good start. Nora nearby, even better.

            Chuck's good feeling dissipates quickly when he sees the look on Master Sgt. Tristram Gitzle's face as he enters the NCO training office. The sergeant's a big guy, Chuck can tell even as he sits behind a small, yellow-wood desk. He's fuming, though he's trying not to show it.

            Play it cool, thinks Chuck. Without looking up from his desk, Master Sgt. Gitzle says, "To your barracks. Sit on your bunk at attention."

            Chuck starts over. "Private Laffing--"

            "I know who you are, Laffingstock," says the sergeant, now in full fume. "I know how you got here."

            That puts you one up on me, thinks Chuck.

            "It is now oh-nine-twenty," says Master Sgt. Gitzle. "You were to report here by oh-nine-hundred."

            Chuck knows better than to attempt an explanation. He asks flatly, "Which barracks am I assigned to, sergeant?"

            "Dismissed," he replies.

            Chuck picks up his duffel and exits the office without another word to Master Sgt. Gitzle. The second barracks behind the office is his. Chuck plops into the first bunk and is asleep before the rusty springs have stopped squeaking. In his dream he stands atop a wooden tower.

            The dream tower pitches over, throwing Chuck toward the ground far below. He wakes up in a heap on the floor. The bunk lies on top of him.

            "I said sit at attention, Private!" yells Master Sgt. Gitzle. Chuck crawls from under the overturned bunk. He stands slowly and unsteadily. Chuck thinks, What'd I do to make this lunk want to kick my ass?

            "Fix that bunk and follow me," the sergeant says. He turns and stomps out.

            Sleepless, hung over, and freshly bruised, Chuck decides now is not the time to put Master Sgt. Gitzle aright. But aright he will be put.

            Trailing the sergeant in a woozy, self-inflicted haze, Chuck marvels at the beautiful California spring day. He thinks, Sure beats Dogbone.



January 1974

Follow the continuing story of Third Sons on Twitter: @Donagh_O_Ragh 
Four new posts each weekday, excluding holidays
Powered by Create your own unique website with customizable templates.
  • workersedge
    • The Weekly >
      • The Weeklies >
        • Excuse me while I duck and cover, March 1, 2018
        • We're running out of words, February 7, 2018
        • Help fight information pollution, January 31, 2018
        • Privacy infographic-palooza, January 24, 2018
        • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
        • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
        • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
        • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
        • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
        • Time to let others do the talking, December 6, 2017
        • Our front-row seat for the crashing and burning of the internet, November 29, 2017
        • Your location location location means money money money for trackers, November 16, 2017
        • YouTube: Unsafe for all ages, November 8, 2017
        • Birthday wishes, November 2, 2017
        • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
        • Addiction by design: Don't let tech products run your life, October 19, 2017
        • Essential internet privacy tips, 2017 edition
        • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
        • The door slams shut on the open internet, September 22, 2017
        • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
        • In business and government, the bullies are calling the shots, September 6, 2017
        • There's no stopping tech giants' surveillance for profit, August 30, 2017
        • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
        • That was the week that was, 2017 revival, August 16, 2017
        • Find the internet security level that's right for your needs, August 9, 2017
        • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
        • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
        • A free press: The antidote to authoritarianism, July 19, 2017
        • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
        • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
        • Keep online trackers at bay without breaking a sweat, June 28, 2017
        • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
        • The price we pay for unbridled digital surveillance, June 14, 2017
        • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
        • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
        • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
        • Just when you thought you couldn't be tracked any closer..., May 17, 2017
        • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
        • America: A tale of two countries, May 3, 2017
        • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
        • The death and ultimate rebirth of the public internet, April 19, 2017
        • An internet dinosaur spits in extinction's eye, April 12, 2017
        • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
        • Simple, free ways to lock down your private data, March 29, 2017
        • Let big data benefit consumers, not marketers, March 22, 2017t
        • Gig economy changes what it means to be an 'employee,' March 8, 2017
        • Privacy: There's just no percentage in it, March 1, 2017
        • Practical security preparations for the worst-case scenario, December 13, 2016
        • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
        • Government phone searches: Return of the 'general warrant', November 29, 2016
        • Before the deluge: Spend your attention wisely, November 23, 2016
        • You can't hide from facial-recognition systems - Or can you? November 16, 2016
        • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
        • Encryption: It's not just for banking anymore, November 1, 2016
        • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
        • Web ad networks are malware authors' best friends, October 18, 2016
        • Privacy is becoming fashionable - Yippee! October 11, 2016
        • How do we bridge the growing media and political divides? October 4, 2016
        • Safety essentials: 10-step security revisited, 11 years later
        • Simple ways to limit the private information you surrender on the web, September 20, 2016
        • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
        • Why internet voting is a terrible idea, September 6, 2016
        • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
        • The web is broken - Guess who's trying to fix it? August 23, 2016
        • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
        • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
        • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
        • It's official: No expectation of privacy on the internet, June 28, 2016
        • How to wrest control of our government away from corporations, June 21, 2016
        • The fight against privacy smashers continues, June 14, 2016
        • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
        • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
        • Privacy threats on parade, May 17, 2016
        • Government goes dark as private lives are exposed, May 10, 2016
        • The great online-advertising swindle, May 3, 2016
        • Modern news media: Too big not to fail? April 26, 2016
        • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
        • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
        • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
        • Five questions, no answers, March 29, 2016
        • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
        • How we lose ourselves in private data collection, March 15, 2016
        • People tracking is about to get even creepier, March 8, 2016
        • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
        • 2016: The first social-media election, March 2, 2016
        • How to build the future of work, February 24, 2016
        • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
        • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
        • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
        • New fronts open in the battle against privacy-invading online ads, January 26, 2016
        • Fifteen ways to stay safe on the Internet, January 19, 2016
        • Prepare for the inevitable theft of your personal information, January 13, 2016
        • 'Hey, gang, let's put on a government!', January 5, 2016
        • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
          • Legal shorts for December 22, 2015
        • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
          • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
        • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
        • How open data can help save the world, December 2, 2015
        • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
        • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015
        • Welcome to the Age of 'Existential Despair', November 10, 2015
        • Get ready for the Attention Economy, November 4, 2015
        • O'Jitterys Catch a Movie, October 27, 2015 >
          • Tech shorts, October 27, 2015
        • Do we have a right to know what they know about us?, October 20, 2015
        • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
          • Tech Short, October 13, 2015: ID by face + social profile
          • Legal Short, October 13, 2015: GOP mega-donor sues Mother Jones, loses, sort of
        • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
          • Tech shorts, October 6, 2015
        • Google, Android, ads, and a tech titan's revenge, September 29, 2015 >
          • Legal shorts, September 29, 2015
        • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
          • Tech shorts, September 22, 2015
        • Campaign 2016: Where's the love? September 15, 2015 >
          • Tech shorts, September 15, 2015
          • Legal shorts, September 15, 2015
        • Three simple ways to improve your privacy, September 8, 2015
        • Use your free Google Voice number to make and receive phone calls, September 1, 2015
        • Reclaiming our government starts with universal Internet access, August 25, 2015
        • Upon further review, times three, August 4, 2015 >
          • Shorts for August 4, 2015
        • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
          • Tech shorts, July 28, 2015
        • Protect yourself while browsing by enabling click to play, July 21, 2015 >
          • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
        • The connection between poverty, hunger, and obesity, July 14, 2015 >
          • Shorts for July 14, 2015
        • A long-overdue turning of the political tide, July 7, 2015
        • Obamacare: A misstep in the right direction, July 7, 2015
        • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
          • Tech shorts, June 30, 2015
        • Obamacare decision imposes limits on executive power, June 30, 2015
        • It's time to get serious about prosecuting Internet threats, June 23, 2015
        • Worst. Supreme. Court. Ever. June 16, 2015 >
          • Tech shorts, June 16, 2015
        • Five indications that we are currently between regimes, June 9, 2015
        • The five-minute Facebook security checkup, June 2, 2015 >
          • Legal shorts, June 2, 2015
        • When ads attack: Web ad networks battle the blockers, May 26, 2015
        • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
          • Tech shorts, May 19, 2015
        • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
          • Tech shorts, May 12, 2015
          • Legal shorts, May 12, 2015
        • We're sitting on a big-data gold mine, May 5, 2015 >
          • Legal shorts, May 5, 2015
        • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
          • Tech shorts, April 28, 2015
          • Legal shorts, April 28, 2015
        • More examples of judges clueless about technology... and one that gets it, April 21, 2015 >
          • Tech shorts, April 21, 2015
        • Should all web traffic be encrypted? April 14, 2015 >
          • Anonymous Internet Map, April 14, 2015
        • More reasons why you need to block web ads, April 7, 2015 >
          • Tech shorts: April 7, 2015
          • Legal shorts: April 7, 2015
        • Web 3.0 returns control of personal information to users, March 31, 2015
        • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
        • An unexpected visit from the Karma Police, March 17, 2015
        • Three views of the future that are certain to curl your hair, March 10, 2015
        • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
        • The tricks of the malware trade: Don't take the bait! February 24, 2015
        • How to ruin your life in 140 characters or fewer, February 17, 2015
        • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
          • Tech shorts: February 10, 2015
        • What's the best way to fix the broken U.S. political system? February 3, 2015
        • Why you should care about your loss of privacy, January 27, 2015
        • The battle against data thieves heats up, January 20, 2015
        • How to combat hate and harassment on the Internet, January 13, 2015
        • Beat ransomware by saving your files to the cloud, January 6, 2015
        • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
        • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
        • Five fantastic Web freebies, December 9, 2014
        • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
        • Telephone tech-support scams are on the rise, November 24, 2014
        • Trading privacy for the public good, November 18, 2014
        • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
          • Hackers owned Home Depot's networks for five months, November 11, 2014
          • Another call for a nationwide breach-notification law, November 11, 2014
        • Comcast battles Netflix, and everybody loses, November 4, 2014
        • Sexting has become part of growing up (gulp!), October 28, 2014
        • Quick, simple fixes for everyday tech glitches, October 21, 2014
        • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
        • Instant access to all your recent files, October 6, 2014
        • iPhone's new Medical ID feature could save your life, September 29, 2014
        • Now you can really lock your phone, September 22, 2014
        • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
        • Three free browser add-ons protect against cyber-crime, September 9, 2014
        • Manslaughter conviction expunged after worker dies in baling machine, August 25, 2014 >
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • Weekly What? August 25, 2014 >
            • No more 'Like' gates to view content, get rewards, August 25, 2014
            • FTC goes after a company that lost customer data, company cries 'Foul!', August 25, 2014
            • A mobile phone company releases customer data -- and it's a good thing, August 25, 2014
            • Clickless approvals don't qualify as 'reasonable notice' for terms of service, August 25, 2014
            • Baby steps closer to authentication that doesn't rely on passwords, August 25, 2014
        • Most data breaches are the result of weak or stolen credentials, August 18, 2014
        • The best government money -- lots and lots of money -- can buy, August 11, 2014
        • The best browser you're probably not using, August 4, 2014
        • It all depends on who's doing the surveilling -- and why, July 28, 2014
        • Be careful what you comment -- it might get you sued, July 19, 2014
        • Never pay for software again (almost) Plus: The pros and cons of cloud computing, July 14, 2014
        • Mind that download! Free phone apps deliver malware, July 7, 2014
        • How to build the future of work, February 24, 2016
        • The end is near for passwords (not really), February 24, 2016
        • Facebook's latest shenanigans, July 1, 2014
      • Privacy Weeklies >
        • The Weeklies >
          • Excuse me while I duck and cover, March 1, 2018
          • We're running out of words, February 7, 2018
          • Help fight information pollution, January 31, 2018
          • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
          • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
          • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
          • Time to let others do the talking, December 6, 2017
          • Our front-row seat for the crashing and burning of the internet, November 29, 2017
          • YouTube: Unsafe for all ages, November 8, 2017
          • Birthday wishes, November 2, 2017
          • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
          • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
          • The door slams shut on the open internet, September 22, 2017
          • In business and government, the bullies are calling the shots, September 6, 2017
          • There's no stopping tech giants' surveillance for profit, August 30, 2017
          • That was the week that was, 2017 revival, August 16, 2017
          • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
          • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
          • A free press: The antidote to authoritarianism, July 19, 2017
          • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
          • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
          • The price we pay for unbridled digital surveillance, June 14, 2017
          • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
          • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
          • Just when you thought you couldn't be tracked any closer..., May 17, 2017
          • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
          • America: A tale of two countries, May 3, 2017
          • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
          • The death and ultimate rebirth of the public internet, April 19, 2017
          • An internet dinosaur spits in extinction's eye, April 12, 2017
          • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
          • Gig economy changes what it means to be an 'employee,' March 8, 2017
          • Privacy: There's just no percentage in it, March 1, 2017
          • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
          • Government phone searches: Return of the 'general warrant', November 29, 2016
          • You can't hide from facial-recognition systems - Or can you? November 16, 2016
          • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
          • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
          • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
          • It's official: No expectation of privacy on the internet, June 28, 2016
          • How to wrest control of our government away from corporations, June 21, 2016
          • The fight against privacy smashers continues, June 14, 2016
          • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
          • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
          • Privacy threats on parade, May 17, 2016
          • Government goes dark as private lives are exposed, May 10, 2016
          • The great online-advertising swindle, May 3, 2016
          • Modern news media: Too big not to fail? April 26, 2016
          • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
          • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
          • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
          • How we lose ourselves in private data collection, March 15, 2016
          • People tracking is about to get even creepier, March 8, 2016
          • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
          • How to build the future of work, February 24, 2016
          • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
          • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
          • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
          • 'Hey, gang, let's put on a government!', January 5, 2016
          • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
            • Legal shorts for December 22, 2015
          • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
          • How open data can help save the world, December 2, 2015
          • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015 >
            • Welcome to the Age of 'Existential Despair', November 10, 2015
          • Do we have a right to know what they know about us?, October 20, 2015
          • Legal shorts, September 29, 2015
          • Campaign 2016: Where's the love? September 15, 2015 >
            • Legal shorts, September 15, 2015
          • Reclaiming our government starts with universal Internet access, August 25, 2015
          • Upon further review, times three, August 4, 2015 >
            • Shorts for August 4, 2015
          • The connection between poverty, hunger, and obesity, July 14, 2015 >
            • Shorts for July 14, 2015
          • A long-overdue turning of the political tide, July 7, 2015
          • Obamacare: A misstep in the right direction, July 7, 2015
          • Obamacare decision imposes limits on executive power, June 30, 2015
          • It's time to get serious about prosecuting Internet threats, June 23, 2015
          • Worst. Supreme. Court. Ever. June 16, 2015
          • Five indications that we are currently between regimes, June 9, 2015
          • Legal shorts, June 2, 2015
          • Legal shorts, May 12, 2015
          • Legal shorts, May 5, 2015
          • Legal shorts, April 28, 2015
          • More examples of judges clueless about technology... and one that gets it, April 21, 2015
          • Legal shorts: April 7, 2015
          • Legal shorts, March 31, 2015
          • Legal shorts: March 24, 2015
          • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
          • Legal shorts: February 24, 2015
          • What would George Washington think of his country now? February 16, 2015 >
            • Lobbyists thrive by building relationships with lawmakers, February 17, 2015
            • On the fast track to American fascism, February 17, 2015
            • The one Senator who's speaking truth to power, February 17, 2015
            • Fight terrorism by fighting its source: Corruption, February 17, 2015
            • Anonymous users: Your ISP may ID you on demand -- and not even tell you, February 17, 2015
          • Legal shorts: February 10, 2015
          • What's the best way to fix the broken U.S. political system? February 3, 2015
          • The battle against data thieves heats up, January 20, 2015
          • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
          • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
          • Trading privacy for the public good, November 18, 2014
          • Deregulating the legal profession: Only a matter of time, October 6, 2014
          • Internet companies' transparency reports indicate trademark abuse is on the rise, September 25, 2014
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Most data breaches are the result of weak or stolen credentials, August 18, 2014
          • The best government money -- lots and lots of money -- can buy, August 11, 2014
          • Have 'money addicts' taken over our political system?, August 11, 2014 >
            • Part 2: Money and political power, August 11, 2014
            • Part 3: A contrived distinction between 'venal' and 'systematic' corruption, August 11, 2014
            • Part 4: Fear of political corruption trumps government economic regulation, August 11, 2014
            • Part 5: Investment-oriented political contributions boost the bottom line, August 11, 2014
            • Part 6: Case study: Corporate political corruption, 19th-century style, August 11, 2014
          • Corporate ownership of the U.S. political process, August 11, 2014 >
            • Part 2: Party perpetuation trumps service to the constituency, August 11, 2014
            • Part 3: Party loyalty trumps independent thought, August 11, 2014
            • Part 4: The roots of corporate 'personhood,' August 11, 2014
            • Part 5: Is political corruption actually on the rise? Who knows?, August 11, 2014
          • It all depends on who's doing the surveilling -- and why, July 28, 2014
          • Be careful what you comment -- it might get you sued, July 19, 2014
          • Supreme Court: You can patent software, but only if it's 'transformative,' June 21, 2014
          • Privacy Manifesto
        • Privacy Tips >
          • Privacy infographic-palooza, January 24, 2018 >
            • Data Collection on Consumers infographic
            • How Companies Identify People
            • PayPal Data Sharing
            • Data Collection Guidelines for Businesses
            • What Does It Mean to Be a Success?
          • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
          • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
          • Your location location location means money money money for trackers, November 16, 2017
          • Addiction by design: Don't let tech products run your life, October 19, 2017
          • Essential internet privacy tips, 2017 edition
          • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
          • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
          • Find the internet security level that's right for your needs, August 9, 2017
          • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
          • Keep online trackers at bay without breaking a sweat, June 28, 2017
          • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
          • Simple, free ways to lock down your private data, March 29, 2017
          • Let big data benefit consumers, not marketers, March 22, 2017t
          • Practical security preparations for the worst-case scenario, December 13, 2016
          • Before the deluge: Spend your attention wisely, November 23, 2016
          • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
          • Encryption: It's not just for banking anymore, November 1, 2016
          • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
          • Web ad networks are malware authors' best friends, October 18, 2016
          • Privacy is becoming fashionable - Yippee! October 11, 2016
          • How do we bridge the growing media and political divides? October 4, 2016 >
            • Pew Center Research chart: Political bias of news organizations
          • Safety essentials: 10-step security revisited, 11 years later
          • Simple ways to limit the private information you surrender on the web, September 20, 2016
          • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
          • Why internet voting is a terrible idea, September 6, 2016
          • The web is broken - Guess who's trying to fix it? August 23, 2016
          • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
          • Five questions, no answers, March 29, 2016
          • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
          • 2016: The first social-media election, March 2, 2016
          • The end is near for passwords (not really), February 24, 2016
          • New fronts open in the battle against privacy-invading online ads, January 26, 2016
          • Fifteen ways to stay safe on the Internet, January 19, 2016
          • Prepare for the inevitable theft of your personal information, January 13, 2016
          • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
            • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
          • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
          • Get ready for the Attention Economy, November 4, 2015
          • Tech shorts, October 27, 2015
          • How to find a reliable network speed test, May 2, 2014
          • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
            • Tech Short for October 13, 2015: ID by face + social profile
          • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
            • Tech shorts, October 6, 2015
          • Google, Android, ads, and a tech titan's revenge, September 29, 2015
          • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
            • Tech shorts, September 22, 2015
          • Tech shorts, September 15, 2015
          • Three simple ways to improve your privacy, September 8, 2015
          • Use your free Google Voice number to make and receive phone calls, September 1, 2015
          • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
            • Tech shorts, July 28, 2015
          • Protect yourself while browsing by enabling click to play, July 21, 2015 >
            • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
          • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
            • Tech shorts, June 30, 2015
          • Tech shorts, June 16, 2015
          • The five-minute Facebook security checkup, June 2, 2015
          • When ads attack: Web ad networks battle the blockers, May 26, 2015
          • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
            • Tech shorts, May 19, 2015
          • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
            • Tech shorts, May 12, 2015
          • We're sitting on a big-data gold mine, May 5, 2015
          • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
            • Tech shorts, April 28, 2015
          • Tech shorts, April 21, 2015
          • Should all web traffic be encrypted? April 14, 2015 >
            • Anonymous Internet Map, April 14, 2015
          • More reasons why you need to block web ads, April 7, 2015 >
            • Tech shorts: April 7, 2015
          • Web 3.0 returns control of personal information to users, March 31, 2015
          • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
          • An unexpected visit from the Karma Police, March 17, 2015
          • Three views of the future that are certain to curl your hair, March 10, 2015
          • The tricks of the malware trade: Don't take the bait! February 24, 2015
          • How to ruin your life in 140 characters or fewer, February 17, 2015
          • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
            • Tech shorts: February 10, 2015
          • Why you should care about your loss of privacy, January 27, 2015
          • How to combat hate and harassment on the Internet, January 13, 2015
          • Beat ransomware by saving your files to the cloud, January 6, 2015
          • Five fantastic Web freebies, December 9, 2014
          • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
          • Telephone tech-support scams are on the rise, November 24, 2014
          • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
            • Hackers owned Home Depot's networks for five months, November 11, 2014
            • Another call for a nationwide breach-notification law, November 11, 2014
          • Comcast battles Netflix, and everybody loses, November 4, 2014
          • Sexting has become part of growing up (gulp!), October 28, 2014
          • Quick, simple fixes for everyday tech glitches, October 21, 2014
          • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
          • Instant access to all your recent files, October 6, 2014
          • iPhone's new Medical ID feature could save your life, September 29, 2014
          • Now you can really lock your phone, September 22, 2014
          • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
          • Three free browser add-ons protect against cyber-crime, September 9, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • The best browser you're probably not using, August 4, 2014
          • Never pay for software again (almost), July 14, 2014 >
            • Best free alternatives to top-selling software, July 11, 2011
          • The pros and cons of cloud computing, July 14, 2014 >
            • Three approaches to free encrypted online storage, June 23, 2009
            • Future-proof your data archive, December 30, 2010
            • Ten simple, common-sense security tips, October 9, 2012
          • Browser security settings you gotta change, June 24, 2014 >
            • Beef up Chrome's security, June 24, 2014
            • Batten down the hatches in Firefox, June 24, 2014
            • Enable Internet Explorer's privacy and security features, June 24, 2014
          • Online advertising dangers, June 10, 2014 >
            • U.S. Senate: Self-regulation of online ad networks isn't working, June 10, 2014
            • Free browser extensions give ads the boot, June 10, 2014
            • Claim a property interest in your personal information, June 10, 2014
            • A micropayment alternative to privacy-sucking ads, June 10, 2014
          • Great people make great sites, May 30, 2014
          • Three free privacy add-ons for Firefox and Chrome, May 20, 2014 >
            • Three essential security add-ons for Firefox, Chrome, and IE, May 7, 2013 >
              • How to improve security in Firefox, Chrome, and IE, May 6, 2013
            • Disable third-party cookies in IE, Firefox, and Google Chrome, March 14, 2011 >
              • Add 'do not track' to Firefox, IE, Google Chrome, December 7, 2010
              • Five great Firefox privacy add-ons, July 14, 2010
          • Remove metadata from Office files, PDFs, and images, May 16, 2014
          • Make folders private in Windows 8.1, May 9, 2014 >
            • Enable Vista's hidden administrator, and password-protect its XP equivalent, February 13, 2008
            • How to secure your PC in 10 easy steps, November 15, 2011 >
              • Three approaches to free encrypted online storage, June 23, 2009
              • Amazon Cloud Drive and Box.net go toe-to-toe, April 5, 2011
              • Free VPN service helps keep public Wi-Fi safe, February 14, 2011
              • How to prevent identity theft, September 13, 2011
            • Free utility finds unwanted programs uninstallers miss, February 24, 2014
          • Malware authors target Android phones, May 13, 2014
          • Secure your Facebook account in six easy steps, September 23, 2013
          • How to find the positive in negative comments, April 30, 2014
          • The 'I hate passwords' guide, April 29, 2014
          • Protect your device from malicious ads, April 10, 2014
          • Five ways to save a Web page, September 26, 2011
          • Five essential Windows 8.1 time-saving tweaks, February 3, 2014
          • Best free sites for learning how to write code, December 12, 2013
        • Software Intellectual Property Protections, August 16, 2014 >
          • Introduction: It's a Software World
          • 1. Trademark >
            • a. Registration
            • b. Trademark requirements
            • c. Lanham Act: 15 U.S.C. §§ 1051-1053 and 15 U.S.C. § 1125(a) (a.k.a. § 43(a)) >
              • 1. Distinguish from patent protection
              • 2. Distinguish from copyright protection
              • 3. Trademark-infringement elements >
                • A. Confusion
                • B. Designation of origin
                • C. Famous and distinctive
            • d. Infringement criteria
          • 2. Trade Secrets >
            • a. Uniform Trade Secrets Act
            • b. Software protected by trade secrets
            • c. Limitations on trade-secret protections >
              • 1. Secret and valuable
              • 2. Described with particularity
              • 3. Software trade secrets and patents: Conflicting or complementary?
          • 3. Copyright >
            • a. History of software copyright statute
            • b. Assembling the pieces of the software-copyright jigsaw puzzle >
              • 1. Two types of source code: Declaring and implementing
              • 2. Originality requirement
              • 3. Merger doctrine
              • 4. Abstraction-filtration-comparison test
              • 5. Short phrases
              • 6. Scenes a faire doctrine
              • 7. Structure, sequence, and organization of the Java APIs
              • 8. Interoperability as it relates to copyrightability
              • 9. Fair use
              • 10. Copyright protections vs. patent protections for software
          • 4. Patent >
            • a. U.S. Constitution Article 1 § 8 >
              • 1. In terms of patent law, software is special
              • 2. Software innovations are clearly patentable
            • b. 35 U.S. Code § 101 >
              • 1. Alice Corp. v. CLS Bank International: Procedural history
              • 2. Test for patentability of abstract ideas: Implicit exception to exclusion
            • c. 35 U.S. Code § 102 - Conditions for patentability; novelty, prior art >
              • 1. Section 102(a)'s "known or used" determination (prior art)
              • 2. Section 102(b)'s "on sale" and "disclosure" determinations
              • 3. Section 102(g)'s "abandoned, suppressed, or concealed" determination
            • d. 35 U.S. Code § 103 Conditions for patentability: non-obvious subject matter
            • e. 35 U.S. Code § 112: Specification >
              • 1. Claim construction
              • 2. Doctrine of equivalents and rule of prosecution history estoppel
          • Conclusion
          • Table of Cases
        • Reclaim your personal information
  • Cloud Computing
    • Five tips for protecting cloud data from internal threats
    • What does the future hold for DBAs?
    • Busted: 10 Big Data Myths Exploded
    • Is the cloud ready for speech APIs?
    • From machine learning to super clouds: Competing visions of cloud 2.0
    • Two great reasons for making your cloud data location aware
    • The most common cloud migration mistakes
    • How to prepare for the next cloud outage
    • The new shadow IT: Custom applications in the cloud
    • Drawbacks of running containers on bare-metal servers
    • How to reduce latency in public clouds
    • Mastering the art of container management
    • Hybrid Clouds: Here to stay, or stop-gaps to enterprise cloud?
    • How zero-trust security makes VMs more efficient
    • Ultimate virtualization: The end of infrastructure
    • 21 best orchestration tools for MSPs
    • Cloud governance: The key to effectively scaling your cloud
    • Update or rewrite? A cloud-application perspective
    • New views into cloud application performance
    • Multicloud vs. hybrid cloud
  • The Stories So Far....
    • Story
    • O'Jitterys Catch a Movie, October 27, 2015
  • Mandolinoleum
  • About
  • workersedge
    • The Weekly >
      • The Weeklies >
        • Excuse me while I duck and cover, March 1, 2018
        • We're running out of words, February 7, 2018
        • Help fight information pollution, January 31, 2018
        • Privacy infographic-palooza, January 24, 2018
        • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
        • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
        • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
        • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
        • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
        • Time to let others do the talking, December 6, 2017
        • Our front-row seat for the crashing and burning of the internet, November 29, 2017
        • Your location location location means money money money for trackers, November 16, 2017
        • YouTube: Unsafe for all ages, November 8, 2017
        • Birthday wishes, November 2, 2017
        • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
        • Addiction by design: Don't let tech products run your life, October 19, 2017
        • Essential internet privacy tips, 2017 edition
        • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
        • The door slams shut on the open internet, September 22, 2017
        • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
        • In business and government, the bullies are calling the shots, September 6, 2017
        • There's no stopping tech giants' surveillance for profit, August 30, 2017
        • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
        • That was the week that was, 2017 revival, August 16, 2017
        • Find the internet security level that's right for your needs, August 9, 2017
        • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
        • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
        • A free press: The antidote to authoritarianism, July 19, 2017
        • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
        • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
        • Keep online trackers at bay without breaking a sweat, June 28, 2017
        • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
        • The price we pay for unbridled digital surveillance, June 14, 2017
        • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
        • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
        • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
        • Just when you thought you couldn't be tracked any closer..., May 17, 2017
        • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
        • America: A tale of two countries, May 3, 2017
        • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
        • The death and ultimate rebirth of the public internet, April 19, 2017
        • An internet dinosaur spits in extinction's eye, April 12, 2017
        • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
        • Simple, free ways to lock down your private data, March 29, 2017
        • Let big data benefit consumers, not marketers, March 22, 2017t
        • Gig economy changes what it means to be an 'employee,' March 8, 2017
        • Privacy: There's just no percentage in it, March 1, 2017
        • Practical security preparations for the worst-case scenario, December 13, 2016
        • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
        • Government phone searches: Return of the 'general warrant', November 29, 2016
        • Before the deluge: Spend your attention wisely, November 23, 2016
        • You can't hide from facial-recognition systems - Or can you? November 16, 2016
        • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
        • Encryption: It's not just for banking anymore, November 1, 2016
        • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
        • Web ad networks are malware authors' best friends, October 18, 2016
        • Privacy is becoming fashionable - Yippee! October 11, 2016
        • How do we bridge the growing media and political divides? October 4, 2016
        • Safety essentials: 10-step security revisited, 11 years later
        • Simple ways to limit the private information you surrender on the web, September 20, 2016
        • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
        • Why internet voting is a terrible idea, September 6, 2016
        • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
        • The web is broken - Guess who's trying to fix it? August 23, 2016
        • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
        • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
        • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
        • It's official: No expectation of privacy on the internet, June 28, 2016
        • How to wrest control of our government away from corporations, June 21, 2016
        • The fight against privacy smashers continues, June 14, 2016
        • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
        • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
        • Privacy threats on parade, May 17, 2016
        • Government goes dark as private lives are exposed, May 10, 2016
        • The great online-advertising swindle, May 3, 2016
        • Modern news media: Too big not to fail? April 26, 2016
        • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
        • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
        • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
        • Five questions, no answers, March 29, 2016
        • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
        • How we lose ourselves in private data collection, March 15, 2016
        • People tracking is about to get even creepier, March 8, 2016
        • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
        • 2016: The first social-media election, March 2, 2016
        • How to build the future of work, February 24, 2016
        • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
        • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
        • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
        • New fronts open in the battle against privacy-invading online ads, January 26, 2016
        • Fifteen ways to stay safe on the Internet, January 19, 2016
        • Prepare for the inevitable theft of your personal information, January 13, 2016
        • 'Hey, gang, let's put on a government!', January 5, 2016
        • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
          • Legal shorts for December 22, 2015
        • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
          • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
        • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
        • How open data can help save the world, December 2, 2015
        • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
        • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015
        • Welcome to the Age of 'Existential Despair', November 10, 2015
        • Get ready for the Attention Economy, November 4, 2015
        • O'Jitterys Catch a Movie, October 27, 2015 >
          • Tech shorts, October 27, 2015
        • Do we have a right to know what they know about us?, October 20, 2015
        • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
          • Tech Short, October 13, 2015: ID by face + social profile
          • Legal Short, October 13, 2015: GOP mega-donor sues Mother Jones, loses, sort of
        • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
          • Tech shorts, October 6, 2015
        • Google, Android, ads, and a tech titan's revenge, September 29, 2015 >
          • Legal shorts, September 29, 2015
        • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
          • Tech shorts, September 22, 2015
        • Campaign 2016: Where's the love? September 15, 2015 >
          • Tech shorts, September 15, 2015
          • Legal shorts, September 15, 2015
        • Three simple ways to improve your privacy, September 8, 2015
        • Use your free Google Voice number to make and receive phone calls, September 1, 2015
        • Reclaiming our government starts with universal Internet access, August 25, 2015
        • Upon further review, times three, August 4, 2015 >
          • Shorts for August 4, 2015
        • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
          • Tech shorts, July 28, 2015
        • Protect yourself while browsing by enabling click to play, July 21, 2015 >
          • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
        • The connection between poverty, hunger, and obesity, July 14, 2015 >
          • Shorts for July 14, 2015
        • A long-overdue turning of the political tide, July 7, 2015
        • Obamacare: A misstep in the right direction, July 7, 2015
        • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
          • Tech shorts, June 30, 2015
        • Obamacare decision imposes limits on executive power, June 30, 2015
        • It's time to get serious about prosecuting Internet threats, June 23, 2015
        • Worst. Supreme. Court. Ever. June 16, 2015 >
          • Tech shorts, June 16, 2015
        • Five indications that we are currently between regimes, June 9, 2015
        • The five-minute Facebook security checkup, June 2, 2015 >
          • Legal shorts, June 2, 2015
        • When ads attack: Web ad networks battle the blockers, May 26, 2015
        • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
          • Tech shorts, May 19, 2015
        • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
          • Tech shorts, May 12, 2015
          • Legal shorts, May 12, 2015
        • We're sitting on a big-data gold mine, May 5, 2015 >
          • Legal shorts, May 5, 2015
        • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
          • Tech shorts, April 28, 2015
          • Legal shorts, April 28, 2015
        • More examples of judges clueless about technology... and one that gets it, April 21, 2015 >
          • Tech shorts, April 21, 2015
        • Should all web traffic be encrypted? April 14, 2015 >
          • Anonymous Internet Map, April 14, 2015
        • More reasons why you need to block web ads, April 7, 2015 >
          • Tech shorts: April 7, 2015
          • Legal shorts: April 7, 2015
        • Web 3.0 returns control of personal information to users, March 31, 2015
        • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
        • An unexpected visit from the Karma Police, March 17, 2015
        • Three views of the future that are certain to curl your hair, March 10, 2015
        • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
        • The tricks of the malware trade: Don't take the bait! February 24, 2015
        • How to ruin your life in 140 characters or fewer, February 17, 2015
        • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
          • Tech shorts: February 10, 2015
        • What's the best way to fix the broken U.S. political system? February 3, 2015
        • Why you should care about your loss of privacy, January 27, 2015
        • The battle against data thieves heats up, January 20, 2015
        • How to combat hate and harassment on the Internet, January 13, 2015
        • Beat ransomware by saving your files to the cloud, January 6, 2015
        • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
        • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
        • Five fantastic Web freebies, December 9, 2014
        • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
        • Telephone tech-support scams are on the rise, November 24, 2014
        • Trading privacy for the public good, November 18, 2014
        • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
          • Hackers owned Home Depot's networks for five months, November 11, 2014
          • Another call for a nationwide breach-notification law, November 11, 2014
        • Comcast battles Netflix, and everybody loses, November 4, 2014
        • Sexting has become part of growing up (gulp!), October 28, 2014
        • Quick, simple fixes for everyday tech glitches, October 21, 2014
        • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
        • Instant access to all your recent files, October 6, 2014
        • iPhone's new Medical ID feature could save your life, September 29, 2014
        • Now you can really lock your phone, September 22, 2014
        • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
        • Three free browser add-ons protect against cyber-crime, September 9, 2014
        • Manslaughter conviction expunged after worker dies in baling machine, August 25, 2014 >
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • Weekly What? August 25, 2014 >
            • No more 'Like' gates to view content, get rewards, August 25, 2014
            • FTC goes after a company that lost customer data, company cries 'Foul!', August 25, 2014
            • A mobile phone company releases customer data -- and it's a good thing, August 25, 2014
            • Clickless approvals don't qualify as 'reasonable notice' for terms of service, August 25, 2014
            • Baby steps closer to authentication that doesn't rely on passwords, August 25, 2014
        • Most data breaches are the result of weak or stolen credentials, August 18, 2014
        • The best government money -- lots and lots of money -- can buy, August 11, 2014
        • The best browser you're probably not using, August 4, 2014
        • It all depends on who's doing the surveilling -- and why, July 28, 2014
        • Be careful what you comment -- it might get you sued, July 19, 2014
        • Never pay for software again (almost) Plus: The pros and cons of cloud computing, July 14, 2014
        • Mind that download! Free phone apps deliver malware, July 7, 2014
        • How to build the future of work, February 24, 2016
        • The end is near for passwords (not really), February 24, 2016
        • Facebook's latest shenanigans, July 1, 2014
      • Privacy Weeklies >
        • The Weeklies >
          • Excuse me while I duck and cover, March 1, 2018
          • We're running out of words, February 7, 2018
          • Help fight information pollution, January 31, 2018
          • Another great reason to celebrate the life of Martin Luther King Jr., January 17, 2018
          • Bye-bye, Fourth Amendment: Spy agencies feed tips to law enforcement, January 10, 2018
          • Bring virtue to the internet by keeping trackers at bay, January 3, 2018
          • Time to let others do the talking, December 6, 2017
          • Our front-row seat for the crashing and burning of the internet, November 29, 2017
          • YouTube: Unsafe for all ages, November 8, 2017
          • Birthday wishes, November 2, 2017
          • That Weekly when everything was pretty good, or at least not so bad, October 25, 2017
          • Unreported news story: 'Algorithmic takeover' of journalism, September 27, 2017
          • The door slams shut on the open internet, September 22, 2017
          • In business and government, the bullies are calling the shots, September 6, 2017
          • There's no stopping tech giants' surveillance for profit, August 30, 2017
          • That was the week that was, 2017 revival, August 16, 2017
          • Internet Media 101: The bigger the lie, the greater the profit, August 3, 2017
          • Cyber-crimestoppers: How individuals and companies help nab internet crooks, July 26, 2017
          • A free press: The antidote to authoritarianism, July 19, 2017
          • We're in the midst of the third American Civil War, and democracy is losing, July 5, 2017
          • Pleas for civility meet with... incivility, but that's okay, June 21, 2017
          • The price we pay for unbridled digital surveillance, June 14, 2017
          • Privacy protections may form the basis of antitrust actions against internet giants, June 7, 2017
          • Applying Fourth Amendment search protections to data in the cloud, May 24, 2017
          • Just when you thought you couldn't be tracked any closer..., May 17, 2017
          • Facebook addiction turns users into marketing guinea pigs, May 10, 2017
          • America: A tale of two countries, May 3, 2017
          • The internet: Destroyer of truth, justice, and the American Way, April 26, 2017
          • The death and ultimate rebirth of the public internet, April 19, 2017
          • An internet dinosaur spits in extinction's eye, April 12, 2017
          • Trust Busters 2.0: Dismantling modern monopolies, April 5, 2017
          • Gig economy changes what it means to be an 'employee,' March 8, 2017
          • Privacy: There's just no percentage in it, March 1, 2017
          • The Rough Beast's lies indicate his intentions - Just like the Nazis, December 6, 2016
          • Government phone searches: Return of the 'general warrant', November 29, 2016
          • You can't hide from facial-recognition systems - Or can you? November 16, 2016
          • No consent needed for ISPs to scan email and create ad-targeting profiles of non-customers, August 30, 2016
          • Supreme Court throws 'fruit of the poisonous tree' doctrine under the bus, August 16, 2016
          • Silly questions: Who 'owns' video captured by police? And is Facebook really 'privacy-enhancing'? August 2, 2016
          • It's official: No expectation of privacy on the internet, June 28, 2016
          • How to wrest control of our government away from corporations, June 21, 2016
          • The fight against privacy smashers continues, June 14, 2016
          • Publishers are losing the battle against their ad-blocking visitors - so what's next? May 31, 2016
          • Tech companies resist government attempts to broaden definition of 'personal information', May 25, 2016
          • Privacy threats on parade, May 17, 2016
          • Government goes dark as private lives are exposed, May 10, 2016
          • The great online-advertising swindle, May 3, 2016
          • Modern news media: Too big not to fail? April 26, 2016
          • Internet Confidential: How to establish a privacy right on the public Internet, April 20, 2016
          • The new browser wars: Thou shalt not block our ads and trackers, April 13, 2016
          • FCC to regulate ISP data collection, but Google, Facebook off the hook, April 6, 2016
          • How we lose ourselves in private data collection, March 15, 2016
          • People tracking is about to get even creepier, March 8, 2016
          • Silicon Valley's long-standing connections to the U.S. government, March 2, 2016
          • How to build the future of work, February 24, 2016
          • Why it's a bad idea to trust private companies with the job of protecting our rights, February 16, 2016
          • Your Internet life is an open book: The dark side of online-ad profiling, February 9, 2016
          • Why don't Americans care as much about their privacy as Europeans do? February 2, 2016
          • 'Hey, gang, let's put on a government!', January 5, 2016
          • The appropriate response to living in a surveillance state: Ignore it, December 22, 2015 >
            • Legal shorts for December 22, 2015
          • Re-reinterpreting our constitutional right to bear arms, December 10, 2015
          • How open data can help save the world, December 2, 2015
          • Fair use stages a comeback: New protections against copyright abuse, November 10, 2015 >
            • Welcome to the Age of 'Existential Despair', November 10, 2015
          • Do we have a right to know what they know about us?, October 20, 2015
          • Legal shorts, September 29, 2015
          • Campaign 2016: Where's the love? September 15, 2015 >
            • Legal shorts, September 15, 2015
          • Reclaiming our government starts with universal Internet access, August 25, 2015
          • Upon further review, times three, August 4, 2015 >
            • Shorts for August 4, 2015
          • The connection between poverty, hunger, and obesity, July 14, 2015 >
            • Shorts for July 14, 2015
          • A long-overdue turning of the political tide, July 7, 2015
          • Obamacare: A misstep in the right direction, July 7, 2015
          • Obamacare decision imposes limits on executive power, June 30, 2015
          • It's time to get serious about prosecuting Internet threats, June 23, 2015
          • Worst. Supreme. Court. Ever. June 16, 2015
          • Five indications that we are currently between regimes, June 9, 2015
          • Legal shorts, June 2, 2015
          • Legal shorts, May 12, 2015
          • Legal shorts, May 5, 2015
          • Legal shorts, April 28, 2015
          • More examples of judges clueless about technology... and one that gets it, April 21, 2015
          • Legal shorts: April 7, 2015
          • Legal shorts, March 31, 2015
          • Legal shorts: March 24, 2015
          • Privacy, Inc.: Welcome to the personal-information marketplace, March 3, 2015
          • Legal shorts: February 24, 2015
          • What would George Washington think of his country now? February 16, 2015 >
            • Lobbyists thrive by building relationships with lawmakers, February 17, 2015
            • On the fast track to American fascism, February 17, 2015
            • The one Senator who's speaking truth to power, February 17, 2015
            • Fight terrorism by fighting its source: Corruption, February 17, 2015
            • Anonymous users: Your ISP may ID you on demand -- and not even tell you, February 17, 2015
          • Legal shorts: February 10, 2015
          • What's the best way to fix the broken U.S. political system? February 3, 2015
          • The battle against data thieves heats up, January 20, 2015
          • 'The Interview' and 'I Can't Breathe': Connecting the dots, December 29, 2014
          • Cyberwar? Fuhgeddabouddit! There are plenty more serious threats to fret over, December 16, 2014
          • Trading privacy for the public good, November 18, 2014
          • Deregulating the legal profession: Only a matter of time, October 6, 2014
          • Internet companies' transparency reports indicate trademark abuse is on the rise, September 25, 2014
          • Google patent infringement: The proof's in the Post-its?, August 25, 2014
          • Most data breaches are the result of weak or stolen credentials, August 18, 2014
          • The best government money -- lots and lots of money -- can buy, August 11, 2014
          • Have 'money addicts' taken over our political system?, August 11, 2014 >
            • Part 2: Money and political power, August 11, 2014
            • Part 3: A contrived distinction between 'venal' and 'systematic' corruption, August 11, 2014
            • Part 4: Fear of political corruption trumps government economic regulation, August 11, 2014
            • Part 5: Investment-oriented political contributions boost the bottom line, August 11, 2014
            • Part 6: Case study: Corporate political corruption, 19th-century style, August 11, 2014
          • Corporate ownership of the U.S. political process, August 11, 2014 >
            • Part 2: Party perpetuation trumps service to the constituency, August 11, 2014
            • Part 3: Party loyalty trumps independent thought, August 11, 2014
            • Part 4: The roots of corporate 'personhood,' August 11, 2014
            • Part 5: Is political corruption actually on the rise? Who knows?, August 11, 2014
          • It all depends on who's doing the surveilling -- and why, July 28, 2014
          • Be careful what you comment -- it might get you sued, July 19, 2014
          • Supreme Court: You can patent software, but only if it's 'transformative,' June 21, 2014
          • Privacy Manifesto
        • Privacy Tips >
          • Privacy infographic-palooza, January 24, 2018 >
            • Data Collection on Consumers infographic
            • How Companies Identify People
            • PayPal Data Sharing
            • Data Collection Guidelines for Businesses
            • What Does It Mean to Be a Success?
          • Could artificial intelligence give the tech industry a heart and save us from capitalism run amok? December 21, 2017
          • Your email use is being tracked, and not just by marketers and spammers, December 13, 2017
          • Your location location location means money money money for trackers, November 16, 2017
          • Addiction by design: Don't let tech products run your life, October 19, 2017
          • Essential internet privacy tips, 2017 edition
          • The best response to the Equifax breach: Don't deal with Equifax, September 13, 2017
          • How to deter 'fingerprint' trackers from identifying your computers and devices, August 23, 2017
          • Find the internet security level that's right for your needs, August 9, 2017
          • A novel concept: Let consumers decide which personal data to share with trackers, July 12, 2017
          • Keep online trackers at bay without breaking a sweat, June 28, 2017
          • Privacy tips for the most vulnerable: Children and seniors, May 31, 2017
          • Simple, free ways to lock down your private data, March 29, 2017
          • Let big data benefit consumers, not marketers, March 22, 2017t
          • Practical security preparations for the worst-case scenario, December 13, 2016
          • Before the deluge: Spend your attention wisely, November 23, 2016
          • The 'consumer boycott' of web advertising is gaining momentum, November 8, 2016
          • Encryption: It's not just for banking anymore, November 1, 2016
          • A call to action: Stop the surveillance - by web services, apps, October 25, 2016
          • Web ad networks are malware authors' best friends, October 18, 2016
          • Privacy is becoming fashionable - Yippee! October 11, 2016
          • How do we bridge the growing media and political divides? October 4, 2016 >
            • Pew Center Research chart: Political bias of news organizations
          • Safety essentials: 10-step security revisited, 11 years later
          • Simple ways to limit the private information you surrender on the web, September 20, 2016
          • Top 10 reasons why people hate listicles - and yes, this is a joke headline, September 13, 2016
          • Why internet voting is a terrible idea, September 6, 2016
          • The web is broken - Guess who's trying to fix it? August 23, 2016
          • Dragging the online trackers - kicking and screaming - into the light of day, August 9, 2016
          • Five questions, no answers, March 29, 2016
          • How to fix the Internet: Ratchet down the anonymity, lose the ads, March 23, 2016
          • 2016: The first social-media election, March 2, 2016
          • The end is near for passwords (not really), February 24, 2016
          • New fronts open in the battle against privacy-invading online ads, January 26, 2016
          • Fifteen ways to stay safe on the Internet, January 19, 2016
          • Prepare for the inevitable theft of your personal information, January 13, 2016
          • Separating the bitcoin hype from the blockchain substance, December 17, 2015 >
            • Shorts for December 17, 2015: Trump's legal ineptitude, and eight ways the world is getting better
          • Consumers may be ready to pay for an ad-free, tracking-free Internet, November 18, 2015
          • Get ready for the Attention Economy, November 4, 2015
          • Tech shorts, October 27, 2015
          • How to find a reliable network speed test, May 2, 2014
          • Facial recognition ushers in the Age of Surveillance, October 13, 2015 >
            • Tech Short for October 13, 2015: ID by face + social profile
          • Fantasy sports gambling finally gets scrutinized, October 6, 2015 >
            • Tech shorts, October 6, 2015
          • Google, Android, ads, and a tech titan's revenge, September 29, 2015
          • How to fix problems caused by Apple's flaky iTunes updates, September 23, 2015 >
            • Tech shorts, September 22, 2015
          • Tech shorts, September 15, 2015
          • Three simple ways to improve your privacy, September 8, 2015
          • Use your free Google Voice number to make and receive phone calls, September 1, 2015
          • Coming soon: A more trustworthy form of encryption, July 28, 2015 >
            • Tech shorts, July 28, 2015
          • Protect yourself while browsing by enabling click to play, July 21, 2015 >
            • Tech short, July 21, 2015: Computers now tie emotions to facial expressions
          • Everyday Windows 10 users become beta testers for the Enterprise Edition, June 30, 2015 >
            • Tech shorts, June 30, 2015
          • Tech shorts, June 16, 2015
          • The five-minute Facebook security checkup, June 2, 2015
          • When ads attack: Web ad networks battle the blockers, May 26, 2015
          • Flying the furious skies: How to stay sane on a commercial flight, May 19, 2015 >
            • Tech shorts, May 19, 2015
          • Online shopping tips: Put differential pricing to work for you, May 12, 2015 >
            • Tech shorts, May 12, 2015
          • We're sitting on a big-data gold mine, May 5, 2015
          • The case against web encryption, Title II designation for ISPs, April 28, 2015 >
            • Tech shorts, April 28, 2015
          • Tech shorts, April 21, 2015
          • Should all web traffic be encrypted? April 14, 2015 >
            • Anonymous Internet Map, April 14, 2015
          • More reasons why you need to block web ads, April 7, 2015 >
            • Tech shorts: April 7, 2015
          • Web 3.0 returns control of personal information to users, March 31, 2015
          • Passwords are about to get some much-needed assistance -- from your body, March 24, 2015
          • An unexpected visit from the Karma Police, March 17, 2015
          • Three views of the future that are certain to curl your hair, March 10, 2015
          • The tricks of the malware trade: Don't take the bait! February 24, 2015
          • How to ruin your life in 140 characters or fewer, February 17, 2015
          • Browse better with these three essential freebies (plus one valuable cheapie), February 10, 2015 >
            • Tech shorts: February 10, 2015
          • Why you should care about your loss of privacy, January 27, 2015
          • How to combat hate and harassment on the Internet, January 13, 2015
          • Beat ransomware by saving your files to the cloud, January 6, 2015
          • Five fantastic Web freebies, December 9, 2014
          • How Google, Facebook, and Twitter make billions by offering 'free' services, December 2, 2014
          • Telephone tech-support scams are on the rise, November 24, 2014
          • Tor breach shows there's no such thing as Internet anonymity, November 11, 2014 >
            • Hackers owned Home Depot's networks for five months, November 11, 2014
            • Another call for a nationwide breach-notification law, November 11, 2014
          • Comcast battles Netflix, and everybody loses, November 4, 2014
          • Sexting has become part of growing up (gulp!), October 28, 2014
          • Quick, simple fixes for everyday tech glitches, October 21, 2014
          • Battle of the behemoths: Facebook ad network takes on Google, October 14, 2014
          • Instant access to all your recent files, October 6, 2014
          • iPhone's new Medical ID feature could save your life, September 29, 2014
          • Now you can really lock your phone, September 22, 2014
          • Facebook auto-play videos eat up mobile data allotments, September 15, 2014
          • Three free browser add-ons protect against cyber-crime, September 9, 2014
          • Control which iPhone apps are allowed to stay 'active' when they're off, August 25, 2014
          • The best browser you're probably not using, August 4, 2014
          • Never pay for software again (almost), July 14, 2014 >
            • Best free alternatives to top-selling software, July 11, 2011
          • The pros and cons of cloud computing, July 14, 2014 >
            • Three approaches to free encrypted online storage, June 23, 2009
            • Future-proof your data archive, December 30, 2010
            • Ten simple, common-sense security tips, October 9, 2012
          • Browser security settings you gotta change, June 24, 2014 >
            • Beef up Chrome's security, June 24, 2014
            • Batten down the hatches in Firefox, June 24, 2014
            • Enable Internet Explorer's privacy and security features, June 24, 2014
          • Online advertising dangers, June 10, 2014 >
            • U.S. Senate: Self-regulation of online ad networks isn't working, June 10, 2014
            • Free browser extensions give ads the boot, June 10, 2014
            • Claim a property interest in your personal information, June 10, 2014
            • A micropayment alternative to privacy-sucking ads, June 10, 2014
          • Great people make great sites, May 30, 2014
          • Three free privacy add-ons for Firefox and Chrome, May 20, 2014 >
            • Three essential security add-ons for Firefox, Chrome, and IE, May 7, 2013 >
              • How to improve security in Firefox, Chrome, and IE, May 6, 2013
            • Disable third-party cookies in IE, Firefox, and Google Chrome, March 14, 2011 >
              • Add 'do not track' to Firefox, IE, Google Chrome, December 7, 2010
              • Five great Firefox privacy add-ons, July 14, 2010
          • Remove metadata from Office files, PDFs, and images, May 16, 2014
          • Make folders private in Windows 8.1, May 9, 2014 >
            • Enable Vista's hidden administrator, and password-protect its XP equivalent, February 13, 2008
            • How to secure your PC in 10 easy steps, November 15, 2011 >
              • Three approaches to free encrypted online storage, June 23, 2009
              • Amazon Cloud Drive and Box.net go toe-to-toe, April 5, 2011
              • Free VPN service helps keep public Wi-Fi safe, February 14, 2011
              • How to prevent identity theft, September 13, 2011
            • Free utility finds unwanted programs uninstallers miss, February 24, 2014
          • Malware authors target Android phones, May 13, 2014
          • Secure your Facebook account in six easy steps, September 23, 2013
          • How to find the positive in negative comments, April 30, 2014
          • The 'I hate passwords' guide, April 29, 2014
          • Protect your device from malicious ads, April 10, 2014
          • Five ways to save a Web page, September 26, 2011
          • Five essential Windows 8.1 time-saving tweaks, February 3, 2014
          • Best free sites for learning how to write code, December 12, 2013
        • Software Intellectual Property Protections, August 16, 2014 >
          • Introduction: It's a Software World
          • 1. Trademark >
            • a. Registration
            • b. Trademark requirements
            • c. Lanham Act: 15 U.S.C. §§ 1051-1053 and 15 U.S.C. § 1125(a) (a.k.a. § 43(a)) >
              • 1. Distinguish from patent protection
              • 2. Distinguish from copyright protection
              • 3. Trademark-infringement elements >
                • A. Confusion
                • B. Designation of origin
                • C. Famous and distinctive
            • d. Infringement criteria
          • 2. Trade Secrets >
            • a. Uniform Trade Secrets Act
            • b. Software protected by trade secrets
            • c. Limitations on trade-secret protections >
              • 1. Secret and valuable
              • 2. Described with particularity
              • 3. Software trade secrets and patents: Conflicting or complementary?
          • 3. Copyright >
            • a. History of software copyright statute
            • b. Assembling the pieces of the software-copyright jigsaw puzzle >
              • 1. Two types of source code: Declaring and implementing
              • 2. Originality requirement
              • 3. Merger doctrine
              • 4. Abstraction-filtration-comparison test
              • 5. Short phrases
              • 6. Scenes a faire doctrine
              • 7. Structure, sequence, and organization of the Java APIs
              • 8. Interoperability as it relates to copyrightability
              • 9. Fair use
              • 10. Copyright protections vs. patent protections for software
          • 4. Patent >
            • a. U.S. Constitution Article 1 § 8 >
              • 1. In terms of patent law, software is special
              • 2. Software innovations are clearly patentable
            • b. 35 U.S. Code § 101 >
              • 1. Alice Corp. v. CLS Bank International: Procedural history
              • 2. Test for patentability of abstract ideas: Implicit exception to exclusion
            • c. 35 U.S. Code § 102 - Conditions for patentability; novelty, prior art >
              • 1. Section 102(a)'s "known or used" determination (prior art)
              • 2. Section 102(b)'s "on sale" and "disclosure" determinations
              • 3. Section 102(g)'s "abandoned, suppressed, or concealed" determination
            • d. 35 U.S. Code § 103 Conditions for patentability: non-obvious subject matter
            • e. 35 U.S. Code § 112: Specification >
              • 1. Claim construction
              • 2. Doctrine of equivalents and rule of prosecution history estoppel
          • Conclusion
          • Table of Cases
        • Reclaim your personal information
  • Cloud Computing
    • Five tips for protecting cloud data from internal threats
    • What does the future hold for DBAs?
    • Busted: 10 Big Data Myths Exploded
    • Is the cloud ready for speech APIs?
    • From machine learning to super clouds: Competing visions of cloud 2.0
    • Two great reasons for making your cloud data location aware
    • The most common cloud migration mistakes
    • How to prepare for the next cloud outage
    • The new shadow IT: Custom applications in the cloud
    • Drawbacks of running containers on bare-metal servers
    • How to reduce latency in public clouds
    • Mastering the art of container management
    • Hybrid Clouds: Here to stay, or stop-gaps to enterprise cloud?
    • How zero-trust security makes VMs more efficient
    • Ultimate virtualization: The end of infrastructure
    • 21 best orchestration tools for MSPs
    • Cloud governance: The key to effectively scaling your cloud
    • Update or rewrite? A cloud-application perspective
    • New views into cloud application performance
    • Multicloud vs. hybrid cloud
  • The Stories So Far....
    • Story
    • O'Jitterys Catch a Movie, October 27, 2015
  • Mandolinoleum
  • About