Some Common Grammar Errors #2

Finished reading the grammar book.

A predicate adjective is in the part of the sentence after the verb (predicate):
I feel badly.I feel bad.
DUE must be a predicate adjective.
We were late due to the tire failure.We were late because of the tire failure.
OR Our lateness was due to the tire failure.
PRIOR TO – Prior must also be a predicate adjective.
The letter came prior to the box.The letter came before the box.
OR The arrival of the letter was prior to the box.
Sensory verbs (“look,” “taste,” “smell,” “feel,” “appear”) oftentimes can be either an adjective or an adverb.

She looked differently when she returned.She looked different when she returned.
LINKING VERBS do not refer to something the subject does or experiences, but link the subject to other words, e.g. “to be,” “seem,” “became,” “turned,” “grew,” “proved.”
She became strong and quiet.
Harry proved steady and consistent.
This is the reason why I am reading.This is the reason that I am reading.
What did you paint the house red for?Why did you paint the house red?
Where is the dog at?Where is the dog?
I was angry at my sister.I was angry with my sister.
He is not as tall as his dad.He is not so tall as his dad.
OR He is as tall as his dad.

Gadgets 05/20/2021: Fingerprint sensor lock, portable car powerpack, ENABOT, WattAnt power station

My new tech days are comprised of today’s deals and then upcoming tech that I think kewl.

These seem good, but I wonder how accurate they are. Sometimes the fingerprint functionality is a little sketchy.

This is sweet. I used to have a car powerpack that eventually died:

ENABOT created the EBO, a smart companion that allows you to communicate remotely with it to interact, communicate and connect with your entire family, including your pets.

WattAnt is a quiet power station with interchangeable batteries.

Some Common Grammar Errors #1

Been reading a book on grammar.

1. Predicate Nominative is a noun or pronoun which is 1) located in the predicate (the sentence from the verb onward), 2) usually follows the verb “to be,” and 3) always renames the subject. Other names for the predicate nominative are subjective complement and predicate noun. When a pronoun is serving as a predicate nominative it must be in the nominative case.

Ex: It is I. That was Jane. This is him. That must have been he.

2. Object of a Preposition must be in the objective case. Pronouns serving as objects of the preposition must be objective case.

Ex: Incorrect – Between you and I this should be an easy game.
Correct – Between you and me this should be an easy game.

3. Subject of an infinitive is always in the objective case. Pronouns used as subjects of an infinitive must be in the objective case.

Ex: Incorrect – It was I who he wanted to come.
Correct – It was I whom he wanted to come.

4. A noun/pronoun used in apposition takes the case of the noun/pronoun with which it is in apposition.

Ex: Incorrect – The winners, Jack and her, treated the losers, they and we.
Correct – The winners, Jack and she, treated the losers, them and us.

5. If a gerund is modified by a noun or pronoun, the noun or pronoun needs to be in the possessive case if it stands for a person.

Ex: Incorrect – Mother objected to Jack talking.
Correct – Mother objected to Jack’s talking.

6. Maintain consistent use of tense.

Ex: Incorrect – Last year when I am up in town, she tells the boss a lie.
Correct – Last year when I was up in town, she told the boss a lie.

7. Don’t confuse the present perfect with the imperfect (past).

Ex: Incorrect – Did Jackie bring the car back yet?
Correct – Has Jackie brought the car back yet?

8. Errors in use of subjunctive mood. Correct usage is 1) with the expression of a wish or 2) to express a condition contrary to fact.

Ex: Incorrect – I wish I was as tall as my brother.
Correct – I wish I were as tall as my brother.

Incorrect – If Jackie was here now, she would show you how to cook.
Correct – If Jackie were here now, she would show you how to cook.

9. False conditional – If the conditional mood is to be used correctly, a condition contrary to fact must be involved. If no such condition is really present, the you have a false conditional.

Ex: Incorrect – Every day when I arrived, she would be in her chair.
Correct – Every day when I arrived, she was in her chair.

Gadgets 05/13/21: Solo emotional radio, Wireless charging with seek, new Amazon Echo Buds, Bar Mat, Bike lights!

My new tech days are comprised of today’s deals and then upcoming tech that I think kewl.

Uniform’s Solo takes a pic of you, sends that pic to a API that analyses your face’s emotion–which in turn sends that emotional rating back to Spotify’s emotional valence reading for choosing music: “Solo highlights an AI capability called atypical feature recognition.”
Solo is the smart + emotional AI radio « Kurzweil (

I make a mess with my coffee area and this is a great mat, just like bartenders use:
Highball & Chaser Premium Bar Mat 18in x 12in. 1cm

Moving wireless charging from a distance with auto-seek!
GuRu Technology Sampler on Vimeo

I bought these for the Strand and Fiesta Island bike trails. Very cool USB charging and easily detachable.
Ascher USB Rechargeable Bike Light Set

Amazon’s redesigned the second-gen Echo Buds: 20 percent smaller, two grams lighter: “Four sets of tips and two sizes of wings give you several options to find the best fit. Plus, Amazon put an ear tip fit test inside the Alexa app so you don’t have to wonder if you’ve made the right choice.”
Amazon Echo Buds (2nd gen) review


Model Threats, Apply Controls, Assess, Repeat.

You cannot have 100% security or zero risk. So protecting your digital assets and privacy are never perfect either. Business goes on and you have to accept some level of risk on the internet (and in real life). You need a level of security that fits your needs, security controls that will vary according to your acceptance of risk.

  1. Start with a list of assets you want to protect, e.g. a laptop.
  2. Determine what are the threats to those assets, e.g. theft or compromise.
  3. Determine the consequences of a successful attack/loss/compromise of assets (including privacy or anonymity), e.g. damage to reputation or identity.
  4. Select and apply security controls, starting with greatest risk, e.g. a hardware lock for the laptop, encryption of data at rest on the laptop, or using a VPN connection to protect your online activity on the laptop.
  5. Do the controls work? And how well? e.g. verify encryption is working, update VPN settings, apply patches. If there are weaknesses in the controls, go back to (1).

Take These Steps With Free Packages

The Amazon (or other retailer) brushing scam is going around a lot today(mainly since July 2020). Beware if you receive free Amazon packages. Your customer info (name, shipping address, phone, etc.) could be exposed and scammers can create bogus reviews for themselves. Worse, the scammer seller could send illegal materials and you could be charged. There could also be financial implications for you.

  1. Change your passwords, especially for banking or credit cards.
  2. Check your credit card and bank account statements
  3. Report the scam to Amazon or to the other retailer

Decide the Security Levels You Need

Do you want anonymity, privacy, pseudonymity, or some combination—and for what digital resources?

How important are your emails? How much privacy should your identification have? Are you off the grid? (Or think you are?) Whether you realize it, your digital assets all have security settings to them and possibly to different levels.

The security triad is Confidentiality – Integrity – Availability. Concerning the confidentiality of a resource (such as a file or directory), you will determine what level of access to your content you’re OK with, what level each person or group you know should be assigned, and which content to keep secret as a whole.

Continue reading “Decide the Security Levels You Need”

Taskforce to tackle the ransomware economy

The Institute for Security and Technology (IST) put together [a] coalition teaming up more than 60 software companies, government agencies, cybersecurity firms, financial services companies, academic institutions, and nonprofits to combat ransomware problem. Among the members, Amazon Web Services, Center for Internet Security, Cisco, Citrix, CrowdStrike, Ernst and Young, Deloitte, FireEye, Microsoft, and government organizations including the U.S. Department of Justice, Europol, and the U.K. National Cyber Security Centre(NCSC).

This follows the January takedown of the Emotet botnet by the FBI and law enforcement in Canada and Europe. A similar coalition was unsuccessful in permanently taking down the TrickBot botnet in late 2020.

China hackers target Southeast Asia militaries

Bitdefender has reported that APT group NAIKON targeted military organizations in Southeast Asia between June 2019 and March 2021. With cyber-espionage and data theft as its goal, NAIKON used a backdoor named Nebulae and the RainyDay backdoor as parts of the attack:
“NAIKON is a threat actor that has been active for more than a decade. Likely tied with China, the group focuses on high-profile targets such as government agencies and military organizations in the South Asia region.”

The Hacker News has reported on Chinese hackers targeting military orgs specifically in Vietnam.

I have long thought China needs more focus in security. I hope to have a feature based on the threats posed by the CCP and corporate actors soon.

FBI sends exposed addresses to haveibeenpwned?

Back in January,  Europol, the FBI, the UK’s National Crime Agency, and law enforcement agencies from Canada, France, Germany, Lithuania, the Netherlands, and Ukraine collaborated in the takedown of the Emotet botnet. Emotet included several hundred servers managing a botnet consisting of over 1.6 million computers and devices. Now the FBI has forwarded a list of exposed email addresses to the Australian-built service,

Emotet has usually been distributed in high volume malicious emails. The emails ask receivers to click a link or open harmful attachments disguised as invoices, shipping notices, and COVID-19 information. Enabling macros will install the malware on the device. The really nasty stuff deployed via Emotet is ransomware.

Just type in your email address and click to see if your email is among this and other breaches. Scroll down and view the specific services exposed with your email address.

Turn Old Samsung phones into IOT devices

I wish I had seen this before giving away an old S. It’s a good step for recycling and gives you warm fuzzies. With the latest software update, Samsung phones now have the SmartThings Labs feature on their existing SmartThings app to choose how they want to repurpose older devices, into childcare monitors, a pet care solution, or a light sensor. Earlier in the month, the company announced that the phones can now be attached to a handheld fundus camera called the Eyelike, which were made using Samsung’s own design. (Fundus cameras take images of the rear portion of an eye, including the retina, macula, fovea, optic disc and posterior pole.) The technology will aid healthcare workers in low income areas around the world in assessing eye health.

It’s part of Galaxy Upcycling Program – Samsung US Newsroom

I think they’re on the ball here. Last year, 50 million tons of electronics were discarded. And Apple could do something similar, you’d think, with their new disposable iMacs being an unfortunate sign:

Gadgets 04/21/21: M1 iMac, create music with movement, & more

My new tech days are comprised of today’s deals and then upcoming tech that I think kewl.

I’m really a Win and Linux guy, but you have to admit that the speed and lower temperature output of the new M1 iMac are impressive.

Make your own music with your movements.

Scary! I am intrigued.

Love this idea. I’m a big dog fan. Is it really wrong to want a purebreed?

Alternative to AirPods.

I’m building a small survival kit. Yes, I know I live in a city and there is little you can do to get out in case of a real emergency. But here’s a tool set I just ordered.

Cycling the Strand in the Age of Covid

“We’re going to get you born again hard!”

“O.K. wild man.”

My response is in regard to Lennie’s suggestion of a 50-plus mile bike ride from Tijuana to Ensenada.

“Let’s focus on this right now.”

I was referring to the more-sensible bike trek south down the 7-mile-long Silver Strand Bikeway (Highway 75, part of the 24-mile, bay-encircling Bayshore Bikeway). You just have to use some gentle urging-on with Lennie the Road Warrior. I just want to start with the ride to the Coronado Cays, then to IB on subsequent trips. Let’s not push it, yet.

The strand is a slim sandbar with a beach, bikeway, and highway, a golden rope stringing together Imperial Beach and Coronado proper (also called “the village”). On the east side is San Diego Bay and on the west, the Pacific.

Right now, Lennie’s pressing me to push. “You can do it,” he says.

What a positive guy. Recently, his bike was stolen outside his place in East Village—but was miraculously then sold to his friend who owns a bike shop near him. Positivity and luck. Continue reading “Cycling the Strand in the Age of Covid”

7 Mental Health Tips for These Trying Times

Loneliness, anxiety, and distressing thoughts are part of life in the Age of Covid. I’m among those afflicted this season of woe. Dread sometimes intrudes on ordinary daily life. These thoughts have at times been disorganized and racing.

The Centers for Disease Control and Prevention (CDC) has said during the pandemic depression has increased by four times, anxiety by three times, and suicidal ideation by two times. With job losses and school closings, domestic and child abuse have been proliferating, and life expectancy has dropped 0.5 percent, particularly in the African-American population and among women.

While professionals offline (your healthcare provider) and online (pay services like or can help, I wanted to pass along some behavioral practices that I have learned over the past two decades: Continue reading “7 Mental Health Tips for These Trying Times”