Thursday, February 29, 2024

Sway with me Rita Hayworth - Oh Rita....

This is total perfection. The best dancing I have ever seen....

Big Pharma - How much power do drug companies have?

The pharmaceutical industry exerts a huge amount of influence on health policy. Some companies develop highly profitable drugs with public money, while others have been found to have covered up serious side effects.

The fight against Covid-19 is further fueling the greed of pharmaceutical companies. Does the industry’s influence threaten public health systems?

The industry has seen major changes in the last decade. Most of the world’s pharmaceuticals are produced by a handful of large corporations, so-called Big Pharma. They’re richer and more powerful than ever. In some cases, they can even call the shots on governmental health policies.

This documentary is the result of more than a year of research, and brings together patients, whistleblowers, lawyers, doctors and politicians, as well as representatives of the industry. Large laboratories are accused of concealing or downplaying research results to maintain their monopolies. Take the manufacturer Sanofi, whose epilepsy drug Depakine triggered a scandal throughout Europe. In the US, Johnson & Johnson has had to stand trial for driving millions of people into opioid addiction. And Novartis is one of several companies now facing huge fines over improper practices in the treatment of macular degeneration, an eye disease.

The pharmaceutical industry gets support from influential doctors. But only one-fifth of German doctors declare what they receive from drug companies. As the world battles the Coronavirus pandemic, this documentary also looks at the lobbying efforts of manufacturer Gilead, as it seeks approval for a promising drug developed largely with public money. Every company is vying to find the next miracle treatment that will help it succeed against the competition.

HardTalk News
World Local Tyranny Webtech Money Motorcycle Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

Gravitas Plus: How Big Pharma pushes dangerous drugs and reaps profits

Bitcoin Will Go on Bull Run in 2024, Saylor Says

Michael Saylor, Microstrategy Inc executive chair and co-founder says Bitcoin will go on a bull run in 2024. He says the approval of a Spot Bitcoin ETF could be the biggest development on Wall Street in 30 years. Saylor is on "Bloomberg Crypto." #hardtalknews hardtalknews.com

How To Grow $100 To $10,000 Trading Crypto

Wednesday, February 28, 2024

Ann-Margaret Still Rides at 82!

At age 82, Ann-Margret is living life in the fast lane.

The "Bye Bye Birdie" and "Viva Las Vegas" actress was recently at the Women’s Image Network’s 25th Women’s Image Awards in Beverly Hills, where she revealed one thing that keeps her young — a Harley-Davidson.

"It’s lavender, and it’s got white daisies all over it," the star gushed to People magazine. "There [are] flowers on the back fender and the front fender. … I love speed. Not the drug."

Ann-Margret has a pink Harley-Davidson with flowers. (Courtesy of Ann-Margret)

The performer told the outlet that after a decades-long career in Hollywood, she has zero plans to slow down. Ann-Margret described how she took dance lessons early on in life to prove to her parents she was born to entertain.

She was born Ann-Margret Olsson in Sweden in 1941. She moved to the U.S. as a child. In her college years, Ann-Margret performed at nightclubs while she focused on her studies during the day.

"I remember wanting to be in show business all my life," Ann-Margret told the outlet. "And I remember one day I said to mother and daddy, ‘I want to talk to you. It’s a very, very important thing for me and I want to get into show business.’"

Ann-Margret said her father inspired her to ride. (Darlene Hammond/Hulton Archive)

She said she received her parents' blessings. She was eventually discovered by comedian George Burns, who gave her a spot on his Las Vegas show. She soon skyrocketed her way to the top of the box office charts.

In May, Ann-Margret told Fox News Digital she still rides her Harley.

"It was my daddy who inspired me to ride," she explained at the time. "Before he met my mother, he had a couple of motorcycles. One was an Indian and the other a BSA. And my uncle, my mother’s brother, had a big motorcycle. When I was 10 years old, I would ride on the back of his bike with him. … He would take me to the Norwegian border, and we would go into Norway. There’s no way I could forget that motorcycle.

Ann-Margret as Kim McAfee and Jesse Pearson as Conrad Birdie in the 1963 film "Bye Bye Birdie." (John Springer Collection/CORBIS)

"The speed, being in the elements, the wind and the rain, the sleet and hail – oh gosh, I get very excited when I even talk about it. … Today, I’ve got this incredible Harley-Davidson motorcycle. It’s very funny when you see it parked next to all the other bikes. It’s lavender with daisies. It’s quite unique."

During the ‘60s, Ann-Margret became a sought-after sex symbol, a title she never had any qualms about.

Thousands of service personnel listen to Ann-Margret sing one of her numbers in Vietnam, circa 1966. Her new perfume available at AnnMargretPerfume.com supports the Vietnam Veterans Memorial Fund. (PhotoQuest)

"I was flattered," she chuckled. "The idea that some guy would come up to me and say, ‘Hey, I think you’re sexy.' Oh man, what’s not to love?"

Ann-Margret became a sought-after sex symbol in the '60s. (Avalon)

In 1964, Ann-Margret appeared opposite Elvis Presley in "Viva Las Vegas," one of the most recognizable films from the singer’s career. For decades, even long after Presley died in 1977 at age 42, many have speculated about their relationship when cameras stopped rolling. For the actress, what happened in Vegas stays in Vegas. She has only spoken of their friendship and experience of bringing the beloved musical to life.

"It was a joy working with E.P.," she said. "We felt music the same way. We would listen to music, we would look at each other and woo! We would be moving the same way."

But before sparks flew with the hip-swiveling icon, Ann-Margret appeared alongside Pat Boone in 1962’s "State Fair." During one steamy scene, she sent hearts racing as she nibbled on the entertainer, known for his squeaky clean image.

Ann-Margret as Rusty Martin and Elvis Presley as Lucky Jackson in the musical film "Viva Las Vegas," 1964.   (Silver Screen Collection)

"It was on his left shoulder!" she proudly said. "As a matter of fact, I saw him two days ago here in Los Angeles. And, of course, I reminded him of that. And I did it again! He said, ‘Thank you.' He he loved it."

Life continues to be an adventure for Ann-Margret,  and she wouldn’t have it any other way.

Ann-Margret attends the Women's Image Network Awards at Saban Theatre Feb. 21, 2024, in Beverly Hills, Calif.  (Unique Nicole)

"I’ve got a lot of energy. It doesn’t come in a bottle," she boasted. "I am just blessed that my mother and father gave me such great energy. And there’s no negativity here. … They instilled in me all of these wonderful things that I still carry with me. You don’t whine about things. You just go out and do the things that you love. And I just feel blessed with the life that I’ve been given."

HardTalk NewsWorld
Local Tyranny Webtech Money Motorcycle Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearXPrivate
Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit 
Dump the Sim in Your Cellphone
Check Out: mediahead.ca | privynet.ca | hardrider.net

Tuesday, February 27, 2024

British country names explained

US presidential candidate Cornel West: 'Biden is a war criminal'

American voters feel “impotent and hopeless” as they approach an election where the main choices are a “neo-fascist Pied Piper” (Donald Trump) or “the war criminals of the Democratic Party”, argues independent presidential candidate Cornel West.

West, one of the United States’s pre-eminent philosophers and justice activists, tells host Steve Clemons that President Joe Biden is enabling Israeli genocide and that Israel cannot be secure if “precious Jewish security and safety is predicated on the domination of precious Palestinians”.

West argues that recent talk of a two-state solution is “subterfuge – a refusal to deal with the 700,000 Israeli settlers in the West Bank”.

HardTalk News
World Local Tyranny Webtech Money Motorcycle Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

Las Vegas: The Shady Life in America's Most Sinful City | ENDEVR Documen...

Homeless in Vegas - Where Poverty Meets Big Money:

• Homeless in Vegas: Where Poverty Meet...

This two part series focuses not on the millions of tourists who flock to the city’s hotels and casinos but on those who choose to live in Vegas, some of the 1.3 million inhabitants whose lives play out in the shadow of the Strip.

Over the course of the two episodes Trevor meets Las Vegans who have won and lost big, people who might fare better living somewhere far away from the pull of the bright lights and some who have seen firsthand the glamour – and violence – of a place that unveils more about human foibles than any other city on earth.

Through their stories Trevor reveals something far more tangible about Sin City in the 21st century than the neon mirage that lies at its heart.

00:00 Episode 1 Trevor also meets former high-class prostitute Annie Lobert who at the height of her career was making $2million a year. Tucked away in a secret corner of the sprawling suburbs, Annie now runs a safe house for prostitutes trying to get away from their violent pimps.

00:43:24 Episode 2 Trevor’s journey into Vegas wouldn’t be complete without sampling the high life. In a 3 million dollar apartment overlooking the Strip, he meets one of the world’s most successful poker players, Antonio Esfandiari also known as the Magician. Antonio holds the record for winning the biggest cash prize in poker - $18,346,673 on the turn of a single card.

▬▬▬▬▬▬▬▬▬ Subscribe ENDEVR for free: https://bit.ly/3e9YRRG Facebook: https://bit.ly/2QfRxbG

HardTalk News World Local Tyranny Webtech Money Motorcycle Music Movie Email: info@hardtalknews.com | Web: hardtalknews.com Private Browsers: DuckDuckGo, Qwant Or SearX Private Operating Systems: Linux or Tails Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How Check Out: mediahead.ca | privynet.ca | hardrider.net

Decadence and Downfall: The World's Most Expensive Party

In 1971, the Shah of Iran, the self-proclaimed 'king of kings', celebrated 2,500 years of the Persian monarchy by throwing the greatest party in history.

Money was no object - a lavish tent city, using 37km of silk, was erected in a specially created oasis. The world's top restaurant at the time, Maxim's, closed its doors for two weeks to cater the event, a five-course banquet served to over sixty of the world's kings, queens and presidents, and washed down with some of the rarest wines known to man. Over a decadent five-day period, guests were treated to a pageant of thousands of soldiers dressed in ancient Persian costume, a 'son et lumiere' at the foot of Darius the Great's temple, and the opening of the Azadi Tower in Tehran, designed to honour the Shah himself.

Every party leaves a few hangovers. This one left a country reeling, never to recover. It crystallised the opposition, led by the Ayatollah Khomeini. More than any other event, this party marked the break between the king of kings and the people of Iran he reigned over.

HardTalk News
World Local Tyranny Webtech Money Motorcycle Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Check Out: mediahead.ca | privynet.ca | hardrider.net

Hasidic Jews of New York

Jewish religious leader reveals Israeli aggression

Yisroel Dovid Weiss, Rabbi and spokesman for Neturei Karta, talks to TRT World about the Israeli attack on Palestine. #Israel #Palestine #Gaza Subscribe:
http://trt.world/subscribe
Livestream: http://trt.world/ytlive
Facebook: http://trt.world/facebook
Twitter: http://trt.world/twitter
Instagram: http://trt.world/instagram
Visit our website: http://trt.world

Monday, February 26, 2024

Justin Trudeau Send $3Billion to Ukraine On Latest Expenditure

Worst Prime Minister in Canadian History... @hardtalknews

TRUDEAU GIVING UKRAINE $ 3 BILLION DOLLARS

Justin Trudeau just announced that Canada will provide $3 billion in financial & military aid to support Ukraine.

Meanwhile, millions of Canadians eat at a food bank each month. Members of the Canadian military live in tent cities due to the cost of living crisis.

TRUDEAU IS MAD. $3 BILLION DOLLARS from our small country. Out of the pockets of our hard earning citizens. He is so out of touch and each day he is in office we decline noticeably. A 4TH CARBON TAX ON THE WAY.

Canadians are having trouble keeping their homes, their apartments, putting food on the table and this idiot is giving ukraine $4 Billion dollars.

Where is the opposition governments. Can't they stop this?

HardTalk News World Local Tyranny Webtech Money Motorcycle Music Movie Email: info@hardtalknews.com | Web: hardtalknews.com

MORONS - Meghan Markle & Prince Harry SNUB Netflix

Netflix pays harry hundreds of millions of dollars and Harry gives Hulu Invictus footage. Harry wants it all.

HardTalk News World Local Tyranny Webtech Money Motorcycle Music Movie Email: info@hardtalknews.com | Web: hardtalknews.com

Sunday, February 25, 2024

Economist predicts the 'biggest crash of our lifetime' in 2024


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

Economic Reset: Ray Dalio's Warning On Money 2024/5


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

Do These 7 Things NOW to Get RICH in the 2024 Recession


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

Robert Kiyosaki: 2008 Crash Made Me Billionaire, 2024 Will Do Same


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

How to Use the 2024 Recession To Get RICH


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

The Stock Market CRASH of 2024 Incoming!


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

Kevin O'Leary Bitcoin - 2024


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

How To Multiply $1000 in 2024 Warren Buffet


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

Investing Plan for 2024


Enjoy This Video

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

ONE Index Fund for 2024, Make it This One

Investing in index mutual funds can be a prudent long-term strategy for many investors, providing broad market exposure with relatively low fees and minimal maintenance. However, it's essential to conduct thorough research and consider various factors before making any investment decisions. Here's a detailed overview of how to approach an index mutual fund investment bet for 2024:

Choose a Broad Market Index: Index mutual funds typically track a specific market index, such as the S&P 500, which represents a broad cross-section of the U.S. stock market. Alternatively, you might consider international index funds, bond index funds, or sector-specific index funds, depending on your investment goals and risk tolerance.

Research Fund Options: Once you've selected the type of index fund you want to invest in, research available fund options from reputable fund providers. Look for funds with low expense ratios, which can significantly impact long-term returns. Consider factors such as historical performance, fund size, and the fund manager's track record.

Diversification: Diversification is key to reducing risk in your investment portfolio. Consider allocating your investment across multiple index funds to achieve broad market exposure. For example, you might invest in a combination of domestic and international stock index funds, along with bond index funds, to create a diversified portfolio that aligns with your risk tolerance and investment objectives.

Asset Allocation: Determine your desired asset allocation based on your investment goals, time horizon, and risk tolerance. Younger investors with a longer time horizon may be more comfortable with a higher allocation to stocks, while those nearing retirement may prefer a more conservative allocation with a higher proportion of bonds.

Cost Considerations: Pay attention to the costs associated with investing in index mutual funds, including expense ratios, transaction fees, and any potential account maintenance fees. Choose funds with low expense ratios to minimize the impact on your investment returns over time.

Monitor and Rebalance: Regularly review your investment portfolio to ensure it remains aligned with your investment objectives and risk tolerance. Rebalance your portfolio as needed to maintain your target asset allocation, especially after significant market movements or changes in your financial situation.

Long-Term Perspective: Index mutual fund investing is best suited for investors with a long-term perspective. Avoid making impulsive investment decisions based on short-term market fluctuations or trying to time the market. Instead, focus on maintaining a disciplined investment approach and staying invested for the long term.

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

FBI and The Democratic Party

Discussing the relationship between the FBI and the Democrats, requires careful consideration of historical context, institutional dynamics, and specific instances of alleged corruption or bias. Here's a detailed overview:

Historical Context: The FBI, established in 1908, is the principal federal investigative agency in the United States. Over its history, it has been involved in various high-profile cases, including those related to organized crime, espionage, terrorism, and public corruption.

Political Neutrality: The FBI, like other law enforcement agencies, is expected to operate with political neutrality, conducting investigations without regard to partisan interests. The agency's mission is to enforce federal laws and protect national security, irrespective of political affiliation.

Instances of Corruption: Throughout its history, the FBI has faced allegations of corruption and misconduct. These instances have involved agents acting outside their authority, engaging in criminal behavior, or abusing their power for personal or political gain. Such cases are typically investigated internally or by other oversight bodies.

Political Influence and Oversight: While the FBI is meant to operate independently from political influence, its actions can sometimes intersect with political interests. Political leaders, including those affiliated with the Democratic Party, may express opinions or exert pressure on the FBI in certain cases. Additionally, congressional committees provide oversight of the FBI's activities, which can involve inquiries into potential abuses of power or misconduct.

Partisan Perceptions: Public perception of the FBI's relationship with political parties can be influenced by partisan biases. Democrats may view the FBI favorably when its actions align with their interests, such as investigations into political opponents or matters related to national security. Conversely, Democrats may criticize the FBI if they perceive its actions as politically motivated or unjust.

Recent Controversies: In recent years, the FBI has been at the center of several controversies with potential political implications. For example, the handling of the investigation into Hillary Clinton's use of a private email server during her tenure as Secretary of State drew criticism from both Democrats and Republicans. Similarly, the investigation into Russian interference in the 2016 presidential election, including allegations of collusion with the Trump campaign, sparked intense political debate and scrutiny of the FBI's actions.

Calls for Reform and Accountability: In response to allegations of misconduct or bias, there have been calls for reforms to enhance transparency, accountability, and oversight within the FBI. These efforts aim to uphold the agency's integrity and ensure that it operates impartially, regardless of political considerations.

Overall, the relationship between the FBI and the Democratic Party is complex and multifaceted, shaped by historical precedent, institutional norms, and political dynamics. While instances of corruption or bias may occur, the vast majority of FBI agents are dedicated professionals committed to upholding the rule of law and serving the public interest.

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

2024 Warren Buffett: A "Storm is Brewing" in the Banking Industry

Economic Conditions: The state of banks and real estate companies is heavily influenced by broader economic conditions. If the economy is thriving, with low unemployment and strong consumer confidence, banks tend to see increased lending activity, while real estate companies benefit from higher demand for properties. Conversely, during economic downturns, both sectors may face challenges, such as higher loan defaults and decreased property values.

Interest Rates: Banks' profitability often depends on interest rates set by central banks. In a low-interest-rate environment, banks may experience narrower interest margins, while real estate companies may see increased demand due to lower borrowing costs. Conversely, rising interest rates can lead to higher borrowing costs for both homebuyers and developers, potentially dampening demand for real estate.

Regulatory Environment: Regulatory changes can significantly impact banks and real estate companies. Stricter lending standards or new regulations on mortgage lending, for example, can affect banks' profitability and real estate market liquidity.

Technological Disruption: Both sectors are being transformed by technological advancements. Fintech innovations are changing how banking services are delivered, potentially disrupting traditional banks' business models. In real estate, technologies like virtual reality and online platforms are altering how properties are marketed and transacted.

Demographic Trends: Population growth, urbanization, and demographic shifts also influence the demand for banking services and real estate. For instance, in regions experiencing rapid population growth, there may be increased demand for housing and mortgage lending.

Global Events: Geopolitical tensions, natural disasters, or pandemics can have significant repercussions on both sectors. For example, the COVID-19 pandemic led to disruptions in real estate markets, with shifts in remote work impacting commercial real estate demand.

HardTalk News
World Local Motorcycle Webtech Money Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net

Tuesday, February 20, 2024

V4 Motorcycle Engines are Unbeatable... Can You Guess Why?

But the down side is 2 heads, double the work, double the tuning, double the trouble. But maybe its worth it. Whats your experience....

Monday, February 19, 2024

The Tyranny of the Chinese Communist Party

The award-winning "Nine Commentaries on the Communist Party" has inspired hundreds of millions of Chinese people to renounce their ties with the CCP. This video series is based on the book, published in 15 languages and available here: http://www.ninecommentaries.com

Foreword. When speaking about tyranny, most Chinese people are reminded of Qin Shi Huang (259-210 B.C.), the first Emperor of the Qin Dynasty, whose oppressive court burnt philosophical books and buried Confucian scholars alive. Qin Shi Huang's harsh treatment of his people came from his policy of "supporting his rule with all of the resources under heaven." [1] This policy had four main aspects: excessively heavy taxation; wasting human labor for projects to glorify himself; brutal torture under harsh laws and punishing even the offenders' family members and neighbors; and controlling people's minds by blocking all avenues of free thinking and expression through burning books and even burying scholars alive. Under the rule of Qin Shi Huang, China had a population of about 10 million; Qin's court drafted over 2 million to perform forced labor. Qin Shi Huang brought his harsh laws into the intellectual realm, prohibiting freedom of thought on a massive scale. During his rule, thousands of Confucian scholars and officials who criticized the government were killed.

Today the Chinese Communist Party (CCP)'s violence and abuses are even more severe than those of the tyrannical Qin Dynasty. The CCP's philosophy is one of "struggle," and the CCP's rule has been built upon a series of "class struggles," "path struggles," and "ideological struggles," both in China and toward other nations. Mao Zedong, the first CCP leader of the People's Republic of China (PRC), put it bluntly by saying, "What can Emperor Qin Shihuang brag about? He only killed 460 Confucian scholars, but we killed 46,000 intellectuals. There are people who accuse us of practicing dictatorship like Emperor Qin Shihuang and we admit it all. It fits the reality. It is a pity that they did not give us enough credit, so we need to add to it."

Let's take a look at China's arduous 55 years under the rule of the CCP. As its founding philosophy is one of "class struggle," the CCP has spared no efforts since taking power to commit class genocide, and has achieved its reign of terror by means of violent revolution. Killing and brainwashing have been used hand in hand to suppress any beliefs other than communist theory. The CCP has launched one movement after another to portray itself as infallible and godlike. Following its theories of class struggle and violent revolution, the CCP has tried to purge dissidents and opposing social classes, using violence and deception to force all Chinese people to become the obedient servants of its tyrannical rule.

Taiwanese human rights groups assembled against China's tyranny

Activists alert the world to the dire consequences of China's aggressive expansion before the #HumanRightsDay

Jordan Peterson: The radical Left is guilt-tripping the West into oblivion

Dr Jordan Peterson discusses how to win the culture war, with insights from Soviet and Nazi dissidents who stood up against tyranny and compares their struggles with clampdowns on free speech today. He sits down with The Telegraph’s Steven Edginton in a wide-ranging discussion from why Britain was a miracle for the world to if he is addicted to Twitter:

On the culture wars: “The right lacks vision. They play a rearguard game. They don't have a compelling story to tell young people. And because they're conscientious, conservatives are conscientious, it's easy to hoist them on the petard of guilt. And the psychopathic narcissists of the radical left are unbelievably good at that.”

On the personal versus the political: “I think you have to get your psychological house in order before you can be even remotely effective politically in the fundamental sense. Otherwise, you're just a tool of ideology or your own ego.”

On Britain: “English common law is a complete bloody miracle … what a phenomenal accomplishment. And so, yes, I think that makes Britain singular and worthy of tremendous admiration … It's a country that's suffering from far too much guilt at the moment.”

On Twitter: “Twitter isn't optional, it's how I sample the culture. Is it a biased sample? Probably.”

On slavery: “It was the British who decided hands down that slavery was wrong and then did something about it. And that is documented historical reality.”

On the EU and France: “A lot of the centralising tendency that's characteristic of the EU can be laid at the foot of the same spirit that motivated the French, the French revolutionaries … I see the French Revolution in itself as a reflection of something deeper, which is the continuing manifestation of the spirit of Cain.”

The Domestic Fate of U.S. Militarism

Tyranny Comes Home: The Domestic Fate of U.S. Militarism (Stanford University Press, 2018)

Featuring the authors Christopher J. Coyne, Associate Professor of Economics, George Mason University; and Abigail R. Hall, Assistant Professor of Economics, University of Tampa; moderated by Matthew Feeney, Director, Project on Emerging Technologies, Cato Institute.

For many Americans, the distinction between military policy and domestic law enforcement is clear: the U.S. military is deployed abroad and tasked with defense of vital national interests, while at home police officers protect life, liberty, and property by investigating and deterring crimes. But as Christopher Coyne and Abigail Hall explain in their book Tyranny Comes Home: The Domestic Fate of U.S. Militarism, years of policy decisions at home and abroad have eroded this distinction.

Military equipment and tactics often find their way to police departments thanks to what Coyne and Hall call the “boomerang effect,” which can result in needlessly aggressive policing and violations of civil liberties. What are the origins of the boomerang effect? Can police militarization be reversed? Does modern policing require military-grade surveillance equipment? Join us for a book forum featuring Coyne and Hall, who tackle these and other pressing questions.

Chinese dissident tells story of escaping tyranny.

Chinese civil rights activist Chen Guangcheng speaks at the third night of the 2020 Republican National Convention. #hardtalknews

'Tyranny of the Minority' writers say Constitution not strong enough.

America’s democracy is in an uncharted and fragile place, according to two Harvard government professors. In their new book, “Tyranny of the Minority,” Steven Levitsky and Daniel Ziblatt say politicians are welcoming anti-democratic extremists into their party ranks and part of the problem lies in the Constitution. Laura BarrĂłn-LĂłpez spoke with the writers about how the country got to this point. Stream your PBS favorites with the PBS app: https://to.pbs.org/2Jb8twG Find more from PBS NewsHour at https://www.pbs.org/newshour Subscribe to our YouTube channel: https://bit.ly/2HfsCD6

Avoiding a Tyranny

The delegates to the constitutional convention debate state vs. federal power. Many are eager to avoid a tyranny.

'Tyrants Disarm The People They Intend To Oppress': Chip Roy

Rep. Chip Roy (R-TX) speaks on the House floor during debate on gun control legislation.

The Militarization of Police: When Tyranny Comes Home

Since the end of the Cold War, SWAT teams have proliferated across the United States and the number of no-knock raids on private citizens has risen dramatically. Abby Hall and Chris Coyne explain that this is the result of the boomerang effect– the process by which, in the absence of strong formal constraints, tactics used in foreign interventions abroad are later used to limit the liberties of people back home. Learn more in their new book, "Tyranny Comes Home: The Domestic Fate of U.S. Militarism": https://amzn.to/2qaDNCk Learn more about F.A. Hayek Program research: https://hayek.mercatus.org/ More research from Chris Coyne and Abby Hall: "Doing Bad By Doing Good: Why Humanitarian Action Fails" (2013): https://amzn.to/2ExgUyj Perfecting Tyranny: Foreign Intervention as Experimentation in State Control (2014): http://www.independent.org/publicatio... After War: The Political Economy of Exporting Democracy (2008): https://amzn.to/2GN13gO Why the Disadvantaged Bear the Cost of Police Militarization (2016): http://www.independent.org/multimedia...

Tyranny of the Minority: How American Democracy Came to the Breaking Point

Steven Levitsky is David Rockefeller Professor of Latin American Studies and Professor of Government at Harvard University. He is also Director of the David Rockefeller Center for Latin American Studies at Harvard. His research focuses on democratization and authoritarianism, political parties, and weak and informal institutions, with a focus on in Latin America. He is co-author (with Daniel Ziblatt) of How Democracies Die, which was a New York Times Best-Seller and was published in 25 languages. He has written or edited 11 other books, including Transforming Labor-Based Parties in Latin America: Argentine Peronism in Comparative Perspective (Cambridge University Press 2003), Competitive Authoritarianism: Hybrid Regimes after the Cold War (with Lucan Way) (Cambridge University Press, 2010), Revolution and Dictatorship: The Violent Origins of Durable Authoritarianism (with Lucan Way) (Princeton University Press, 2022), and most recently, Tyranny of the Minority: Why American Democracy Reached the Breaking Point (with Daniel Ziblatt) (Crown Publishers, forthcoming). He and Lucan Way are currently working on a book on democratic survival across the world.

Sunday, February 18, 2024

She Destroys Gender Ideology in 5 Min - Against Woke Doctor

This is a must watch video, because some medical voices want gender changes as early as 5 years old. Can you believe this?

Saturday, February 17, 2024

Setup Any Samsung Phone WITHOUT a Sim

Setting up a cell phone without a SIM card can be a convenient option for various purposes, such as using it as a Wi-Fi-only device for internet browsing, gaming, or accessing apps. While setting up a phone without a SIM card eliminates the need for a cellular plan, there are considerations and steps to take to ensure a smooth experience. Here's a detailed exploration of the process and potential issues involved, as well as tips for finding a Wi-Fi signal:

1. Initial Setup:

SIM Card Removal: When setting up a cell phone without a SIM card, begin by removing any existing SIM card from the device. Most smartphones have a slot or tray for SIM card insertion, which can be accessed by using a SIM ejector tool or a small paperclip.

Power On and Setup: After removing the SIM card, power on the phone and proceed with the initial setup process. This typically involves selecting a language, connecting to a Wi-Fi network, and signing in with a Google or Apple ID to access app stores and cloud services.

2. Wi-Fi Connectivity:

Finding a Wi-Fi Network: To connect to a Wi-Fi network, navigate to the device's settings menu and select the Wi-Fi option. The phone will then scan for available networks in the vicinity. Choose a network from the list and enter the password if required. Public Wi-Fi networks may be available in places such as cafes, libraries, airports, and shopping malls.

Wi-Fi Range and Signal Strength: Wi-Fi signal strength can vary depending on factors such as distance from the router, physical obstacles, and interference from other electronic devices. Positioning the phone closer to the Wi-Fi router or using signal boosters can help improve connectivity and signal strength.

3. Functional Limitations:

No Cellular Service: Without a SIM card and cellular service, the phone will not be able to make or receive traditional phone calls or text messages. However, internet-based communication services such as voice over IP (VoIP) apps, messaging apps, and email can still be used over Wi-Fi.

Limited Functionality: Certain features and services that rely on cellular connectivity, such as mobile data, location-based services, and carrier-specific apps, may be unavailable or limited without a SIM card. Additionally, some apps and services may require a valid phone number for verification purposes.

4. App Installation and Usage:

App Stores: Accessing app stores such as the Google Play Store (Android) or the Apple App Store (iOS) requires a Wi-Fi connection. Once connected, users can search for and download apps over Wi-Fi without the need for a SIM card or cellular data.

Offline Apps and Content: To minimize reliance on internet connectivity, consider downloading offline apps, games, music, videos, and e-books that can be accessed without an active internet connection. Offline maps, productivity tools, and entertainment apps are particularly useful for offline use.

5. Security and Privacy Considerations:

Public Wi-Fi Risks: When using public Wi-Fi networks, exercise caution and be aware of potential security risks such as data interception, malware attacks, and phishing scams. Avoid accessing sensitive information or conducting financial transactions over unsecured or unfamiliar networks.

VPN Usage: Consider using a virtual private network (VPN) to encrypt internet traffic and enhance privacy and security when connecting to public Wi-Fi networks. VPNs create a secure tunnel between the device and the internet, protecting against eavesdropping and data theft.

6. Battery Life and Power Management:

Wi-Fi Usage Impact: Connecting to Wi-Fi networks consumes battery power, so it's essential to manage Wi-Fi usage to optimize battery life. Turning off Wi-Fi when not in use, reducing screen brightness, and disabling background apps can help conserve battery power and extend usage time.

7. Troubleshooting and Support:

Technical Support: If encountering issues during setup or usage, consult the device's user manual or online support resources for troubleshooting guidance. Manufacturer support forums, community forums, and online tutorials can also provide helpful tips and solutions for common issues.

In conclusion, setting up a cell phone without a SIM card for Wi-Fi-only use can provide a convenient and cost-effective solution for accessing online content and services. By following the steps outlined above and being mindful of potential limitations and security considerations, users can enjoy the benefits of internet connectivity without the need for a cellular plan. Whether using the device for entertainment, communication, or productivity, leveraging Wi-Fi connectivity can enhance the versatility and functionality of the device in various contexts.

Additionally

In addition to connecting to Wi-Fi networks, another option for setting up a cell phone without a SIM card is to use a mobile hotspot device. A mobile hotspot, also known as a portable Wi-Fi router or Mi-Fi device, allows users to create a wireless internet connection by utilizing cellular data networks. Here's how using a hotspot device can enhance connectivity and address potential limitations:

1. Mobile Hotspot Setup:

Activation and Configuration: To use a mobile hotspot, start by activating the device through the carrier or service provider. This typically involves purchasing a hotspot device and selecting a data plan that suits your usage needs. Once activated, configure the hotspot settings, including network name (SSID) and password.

Connecting Devices: After setting up the mobile hotspot, enable the device's Wi-Fi functionality and search for available networks on the cell phone or other Wi-Fi-enabled devices. Locate the hotspot network in the list of available networks and enter the password to establish a connection.

2. Advantages of Using a Hotspot Device:

Flexibility and Mobility: A mobile hotspot provides flexibility and mobility, allowing users to access the internet from virtually anywhere with cellular coverage. Whether traveling, working remotely, or on-the-go, a hotspot device offers reliable internet connectivity without the need for fixed Wi-Fi networks.

Multiple Device Connectivity: Hotspot devices typically support multiple simultaneous connections, enabling users to connect multiple devices, such as smartphones, tablets, laptops, and smart home devices, to the internet simultaneously. This makes it convenient for families, small groups, or teams to share a single internet connection.

Secure Connection: Hotspot devices offer secure, encrypted connections to protect data privacy and prevent unauthorized access. By creating a private Wi-Fi network with a password, users can ensure that their internet traffic remains secure and protected from eavesdropping and interception.

3. Considerations and Limitations:

Data Usage Limits: When using a mobile hotspot, be mindful of data usage limits and overage charges associated with your data plan. Streaming high-definition video, downloading large files, or using data-intensive applications can quickly consume data allowances and incur additional fees.

Network Coverage and Speed: The quality of the internet connection provided by a mobile hotspot depends on factors such as network coverage, signal strength, and network congestion. Users in areas with poor cellular reception may experience slower speeds or intermittent connectivity.

4. Battery Life and Power Management:

Battery Performance: Mobile hotspot devices have built-in batteries that power the device and provide internet connectivity. To optimize battery life, users should conserve power by turning off the hotspot when not in use, reducing the number of connected devices, and adjusting settings to minimize power consumption.

Charging and Portability: Ensure that the hotspot device is adequately charged before use, and consider carrying a portable power bank or charger for extended use while traveling or away from power outlets.

5. Security and Privacy Considerations:

Password Protection: Secure the mobile hotspot with a strong password to prevent unauthorized access and protect against potential security threats. Avoid using default passwords or easily guessable passwords, and regularly update the password for added security.

VPN Usage: Consider using a virtual private network (VPN) in conjunction with a mobile hotspot to encrypt internet traffic and enhance privacy and security. VPNs provide an additional layer of protection against data interception, surveillance, and online threats.

In summary, using a mobile hotspot device offers a convenient and versatile solution for setting up a cell phone without a SIM card, providing reliable internet connectivity from anywhere with cellular coverage. By following best practices for setup, usage, and security, users can maximize the benefits of mobile hotspot technology while safeguarding data privacy and ensuring a seamless online experience. Whether for work, entertainment, or communication, leveraging a mobile hotspot enhances connectivity and productivity in a wide range of settings and scenarios.

HardTalk News
World Local Moto Webtech Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit
Private Dump the Sim in Your Cellphone | HardTalk Webtech Shows How
Check Out: mediahead.ca | privynet.ca | hardrider.net
Opt Out of Our Newsletter | Reply Unsubscribe

Friday, February 16, 2024

Privacy Tools | Must Watch Video and Article

In the age of digital connectivity, concerns about online privacy and data protection have become increasingly prevalent. As individuals and businesses navigate the complexities of the digital landscape, understanding the tools and strategies available to safeguard personal and sensitive information is crucial.

Web privacy tools offer a range of solutions to enhance online security and protect against unauthorized data collection and tracking. Virtual Private Networks (VPNs) encrypt internet traffic, masking users' IP addresses and preventing third parties from monitoring their online activities. Additionally, privacy-focused web browsers such as Brave and Mozilla Firefox offer built-in features to block trackers, cookies, and other forms of online tracking, enhancing user anonymity and data privacy.

Beyond web privacy tools, implementing robust security measures and best practices is essential to safeguard personal and business privacy in the digital realm. Utilizing strong, unique passwords for online accounts, enabling two-factor authentication, and regularly updating software and security patches can help mitigate the risk of unauthorized access and data breaches. Moreover, educating employees and stakeholders about cybersecurity threats and promoting a culture of vigilance and accountability within organizations is critical to maintaining data integrity and confidentiality.

However, despite these efforts, the pervasive collection and exploitation of personal data by big corporations remain a significant concern. Tech giants and online platforms routinely collect vast amounts of user data through tracking cookies, behavioral analytics, and targeted advertising algorithms, often without transparent disclosure or explicit user consent. This data is then monetized and leveraged for various purposes, including personalized marketing, product development, and user profiling.

The commodification of personal data raises ethical and regulatory questions about privacy, consent, and data sovereignty. Governments and regulatory bodies have implemented measures such as the General Data Protection Regulation (GDPR) in Europe and the California Consumer Privacy Act (CCPA) in the United States to enhance data protection rights and empower individuals to control their personal information. However, enforcement mechanisms and compliance frameworks vary, and challenges persist in holding big corporations accountable for data privacy violations.

In response to growing concerns about online privacy and data exploitation, advocacy groups, privacy activists, and policymakers are calling for greater transparency, accountability, and regulatory oversight of big corporations' data practices. Efforts to promote data minimization, privacy by design, and user-centric data governance models seek to rebalance the power dynamics between individuals and corporations in the digital ecosystem.

Ultimately, protecting personal and business privacy in an increasingly interconnected and data-driven world requires a multifaceted approach that combines technological solutions, regulatory frameworks, and individual empowerment. By leveraging web privacy tools, implementing robust security measures, and advocating for stronger data protection rights, individuals and businesses can mitigate the risks of online surveillance, data breaches, and privacy infringements, preserving their fundamental rights to privacy, autonomy, and digital sovereignty.

HardTalk News
World Local Moto Webtech Music Movie
Email: info@hardtalknews.com | Web: hardtalknews.com
Private Browsers: DuckDuckGo, Qwant Or SearX
Private Operating Systems: Linux or Tails
Private Cloud Servers: Skiff, Mega, pCloud, Proton, Sync, Tresorit Cloud Secure File Storage Who Put Privacy First
Check Out: mediahead.ca | privynet.ca | hardrider.net

Wednesday, February 14, 2024

Google Maps Fail | Apple More Private

Google Maps Fail | Apple More Private

The big G Maps is by far the most downloaded navigation app in the US and for good reason. Invading your privacy and surveilling you helps them provide better services. Their entire business model revolves around collecting huge amounts of information about you and selling it to advertisers.

HardTalk News World Local Moto Webtech Music Movie Tel: 1-800-971-5030 Email: info@hardtalknews.com | Web: hardtalknews.com For OS - Use Linux or Tails - Check PrivyNet.ca For a Google Free Lifestyle - Use Private Browsers DuckDuckGo, Qwant or SearX

Tuesday, February 13, 2024

Ultra Privacy Use Linux or Tails OS

LEAKING YOUR LOCATION!

The issue of mobile phone tracking and the privacy implications surrounding it are indeed significant concerns in today's digital age. Here's a detailed exploration of how cell phones track users' movements and collect personal information, along with the associated privacy risks:

1. Location Tracking:

GPS and Location Services: Mobile phones utilize built-in GPS technology and location services to determine users' precise geographic locations. This information is used for various purposes, including navigation, location-based services, and targeted advertising.

Cellular and Wi-Fi Data: In addition to GPS, cell phones also use cellular network and Wi-Fi signals to approximate users' locations. By triangulating signals from nearby cell towers and Wi-Fi access points, mobile carriers and service providers can track users' movements even when GPS is unavailable or disabled.

2. Data Collection and Profiling:

Apps and Permissions: Many mobile apps request access to users' location data for functionality purposes, such as mapping services or location-based recommendations. However, some apps may collect location data for purposes unrelated to their core functionality, leading to concerns about user consent and data misuse.

Advertising and Targeting: Location data is valuable for advertisers seeking to target users with personalized ads based on their physical whereabouts. By tracking users' movements over time, advertisers can build detailed profiles of individuals' interests, behaviors, and preferences, raising concerns about privacy and surveillance.

3. Privacy Risks and Concerns:

Surveillance and Tracking: The pervasive tracking of users' movements by mobile phones has raised concerns about government surveillance, corporate tracking, and potential abuses of power. Without adequate safeguards and transparency measures, users may be subject to unwarranted surveillance and monitoring of their activities.

Data Breaches and Security Risks: The collection and storage of location data by mobile devices and apps also pose security risks. In the event of a data breach or unauthorized access, sensitive location information could be exposed to malicious actors, leading to identity theft, stalking, or other forms of harm.

4. Regulatory Framework and Protections:

Privacy Laws and Regulations: Governments around the world have implemented privacy laws and regulations to protect users' personal information, including location data. These laws may require companies to obtain explicit consent before collecting location information, provide transparency about data practices, and implement security measures to safeguard sensitive data.

Enforcement and Accountability: Effective enforcement mechanisms are crucial for ensuring compliance with privacy regulations and holding companies accountable for violations. Regulatory agencies may conduct audits, investigations, and enforcement actions against companies that fail to protect users' privacy rights or engage in unlawful data practices.

5. Mitigation Strategies and Best Practices:

Privacy Settings and Controls: Users can mitigate the risks of location tracking by reviewing and adjusting their privacy settings on their mobile devices and apps. This may include disabling location services for unnecessary apps, limiting location sharing to trusted sources, and periodically reviewing app permissions.

Encryption and Anonymization: Mobile devices and apps should employ encryption and anonymization techniques to protect location data from unauthorized access and misuse. By encrypting data in transit and at rest, companies can reduce the risk of data breaches and unauthorized surveillance.

6. Transparency and Education:

User Awareness and Education: Increasing public awareness about the risks of mobile phone tracking and location-based data collection is essential for empowering users to make informed decisions about their privacy. Educational campaigns, privacy guides, and transparency reports can help users understand how their personal information is collected, used, and shared. 7. Advocacy and Accountability:

Consumer Advocacy: Advocacy groups, privacy organizations, and civil liberties advocates play a crucial role in advocating for stronger privacy protections, transparency measures, and accountability mechanisms. By raising awareness, lobbying policymakers, and challenging unlawful data practices, these groups can help safeguard users' privacy rights.

In conclusion, the pervasive tracking of users' movements by mobile phones raises significant privacy risks and concerns about surveillance, data security, and personal autonomy. It is imperative for policymakers, regulators, companies, and users to work together to establish robust privacy protections, promote transparency, and uphold individuals' rights to privacy and digital self-determination.

HardTalk News World Local Moto Webtech Music Movie Tel: 1-800-971-5030 Email: info@hardtalknews.com | Web: hardtalknews.com For a Google Free Lifestyle - Use Private Browsers DuckDuckGo, Qwant or SearX

DE-GOOGLE Google Control

Google's pervasive presence in various aspects of our digital lives has raised concerns about the extent of its control and influence over users' personal data, online activities, and freedom of expression. Here's a detailed exploration of Google's omnipresence and the implications it has on users:

1. Mobile Operating System Dominance:

Google's Android operating system holds the lion's share of the global smartphone market. As the developer of Android, Google integrates its services deeply into the operating system, including Google Search, Gmail, Google Maps, and the Play Store. While Android is open-source, Google's proprietary apps and services are pre-installed on most devices, giving the company significant control over users' mobile experiences.

2. Data Collection and Personalization:

Google collects vast amounts of data from its users across its various platforms and services. This data includes search history, location information, browsing activity, email content, and more. By analyzing this data, Google creates detailed profiles of users to deliver personalized ads and recommendations. While personalized services can enhance user experiences, the extensive data collection raises concerns about privacy and data security.

3. Business Profiles and Reviews:

Google My Business is a platform where businesses can create profiles to manage their online presence on Google Search and Maps. While this service offers businesses valuable visibility and customer engagement opportunities, it also gives Google significant control over businesses' online reputations. Google's algorithms determine how business profiles are displayed in search results and which reviews are highlighted, impacting consumers' perceptions and purchase decisions.

4. Content Moderation and Censorship:

Google's dominance extends to online content through platforms like YouTube and Google Search. As a result, the company plays a significant role in content moderation and censorship. Google's policies dictate what content is allowed on its platforms, including guidelines on hate speech, misinformation, and copyright infringement. While these policies aim to maintain a safe and respectful online environment, they also raise concerns about censorship and freedom of expression.

5. Market Influence and Antitrust Concerns:

Google's dominance in online search, advertising, and other digital services has led to scrutiny from regulators and lawmakers worldwide. Antitrust investigations have focused on Google's alleged anti-competitive practices, including favoring its own services in search results, imposing restrictive contracts on device manufacturers, and stifling competition in online advertising. Critics argue that Google's market power allows it to control access to information and stifle innovation in the digital ecosystem.

6. Challenges to Privacy and Security:

Google's extensive data collection practices raise significant privacy and security concerns. While the company offers various privacy controls and security features, including data encryption and account settings, users may still be vulnerable to data breaches, unauthorized access, and exploitation of personal information. Google's centralized data storage also makes it a lucrative target for hackers and cybercriminals seeking to exploit vulnerabilities in its systems.

7. Alternatives and Consumer Choice:

Despite Google's dominance, there are alternatives available for users seeking to reduce their dependence on Google's services. Open-source platforms like LineageOS offer alternative Android distributions without Google's proprietary apps. Privacy-focused search engines like DuckDuckGo and browsers like Mozilla Firefox provide alternatives to Google Search and Chrome. Additionally, there are alternative email providers, cloud storage services, and productivity tools that prioritize user privacy and data security.

In conclusion, Google's pervasive presence and control over various aspects of users' digital lives raise significant concerns about privacy, freedom of expression, and market competition. While Google's services offer convenience and innovation, users must remain vigilant about the implications of entrusting their personal data to a single corporation. Exploring alternative platforms and supporting initiatives that prioritize user privacy and consumer choice can help mitigate the risks associated with Google's dominance in the digital ecosystem.

HardTalk News World Local Moto Webtech Music Movie Tel: 1-800-971-5030 Email: info@hardtalknews.com | Web: hardtalknews.com For a Google Free Lifestyle - Use Private Browsers DuckDuckGo, Qwant or SearX Toronto Canada | Lewiston NY USA

Private Browsers DuckDuckGo and Qwant

In the age of data breaches and online surveillance, internet users are increasingly turning to private browsers to protect their online privacy. Two popular options in this space are DuckDuckGo and Qwant. These privacy-focused search engines prioritize user anonymity and data protection, but they differ in various aspects. Let's explore the features, privacy policies, and user experiences of DuckDuckGo and Qwant to understand which might be the best choice for privacy-conscious users.

1. Search Privacy:

DuckDuckGo: DuckDuckGo is renowned for its commitment to user privacy. It doesn't track users or store their personal information. Searches are encrypted, and DuckDuckGo doesn't engage in personalized tracking or filter bubbles, ensuring unbiased search results for all users.

Qwant: Qwant also emphasizes user privacy and claims not to track users or store personal data. Like DuckDuckGo, Qwant offers encrypted searches and doesn't create filter bubbles. However, some users have raised concerns about Qwant's data retention policies and its ownership structure, which includes ties to government agencies.

2. Features and Functionality:

DuckDuckGo: DuckDuckGo provides a clean and user-friendly interface with features like instant answers, !bang commands for quick searches on other websites, and customizable settings for enhanced privacy. It also offers browser extensions and mobile apps for convenient privacy protection across devices.

Qwant: Qwant offers similar features to DuckDuckGo, including instant answers, shortcuts, and customizable search preferences. It also provides browser extensions and mobile apps for seamless integration with users' preferred platforms. Qwant's interface is visually appealing and easy to navigate, catering to users' preferences for a modern search experience.

3. Transparency and Trust:

DuckDuckGo: DuckDuckGo has built a strong reputation for transparency and trustworthiness. It publishes annual transparency reports detailing government requests for user data and its responses. DuckDuckGo's open-source initiatives and commitment to privacy advocacy further bolster its credibility among privacy-conscious users.

Qwant: Qwant has faced scrutiny regarding its ownership structure and data retention practices. Despite claims of not tracking users, some critics question the level of transparency provided by Qwant. While it has made efforts to improve transparency, including publishing a transparency report, there remain concerns about its overall trustworthiness.

4. Global Reach and Accessibility:

DuckDuckGo: DuckDuckGo is widely accessible across various platforms and devices, including desktop browsers, mobile devices, and browser extensions. It offers localized versions for different regions and languages, ensuring a seamless search experience for users worldwide.

Qwant: Qwant is also available on multiple platforms and devices, with browser extensions and mobile apps for widespread accessibility. It caters to an international audience with localized versions in different languages, but its user base is relatively smaller compared to DuckDuckGo.

5. Community and Support:

DuckDuckGo: DuckDuckGo has a vibrant community of users and developers who contribute to its open-source projects and provide support through forums and social media channels. The company actively engages with its user base, soliciting feedback and addressing concerns to improve its services continually.

Qwant: Qwant has a growing community of users, but its support resources may not be as extensive as DuckDuckGo's. However, Qwant has made efforts to engage with its community and address user feedback to enhance its search engine and privacy features.

Conclusion:

Both DuckDuckGo and Qwant offer privacy-focused search experiences with encrypted searches, unbiased results, and user-friendly interfaces. However, DuckDuckGo's strong reputation for transparency, trustworthiness, and community engagement may make it the preferred choice for many privacy-conscious users. Qwant, while also prioritizing user privacy, may need to further improve transparency and address concerns about data retention to compete effectively in the private browser market.

Ultimately, the choice between DuckDuckGo and Qwant comes down to individual preferences and priorities regarding privacy, features, and trust in the provider. Regardless of which option users choose, both DuckDuckGo and Qwant offer valuable alternatives to traditional search engines for those seeking enhanced online privacy and security.

MediaHead Digital Technologies Award Winning Web Publishing Specialists Tel: 1-800-971-5030 Text: 416-879-9230 Email:sales@mediahead.ca | Web: mediahead,ca Software Developers, Publishers, Cloud Integrators

PRIVATE Search Engine DuckDuckGo, Qwant and SearX

DuckDuckGo is indeed renowned for its commitment to privacy and its stance against tracking users' online activities. Here's a detailed report on why DuckDuckGo is considered one of the most private search engines, along with relevant links to support these claims:

No Tracking: DuckDuckGo does not track its users' searches or store any personal information. Unlike many other search engines, which collect data on users' search history, IP addresses, and other browsing habits to personalize ads or search results, DuckDuckGo prioritizes user privacy by avoiding such tracking mechanisms. Source: DuckDuckGo Privacy Policy

Privacy Features: DuckDuckGo offers a range of privacy features designed to protect users' online privacy. These include encryption of searches (HTTPS), preventing search leakage to websites through the use of the "Referrer header," and providing privacy-focused browser extensions and mobile apps. By default, DuckDuckGo blocks third-party trackers and provides a "Privacy Grade" feature, which rates the privacy practices of visited websites. Source: DuckDuckGo Privacy Features

Neutral Search Results: DuckDuckGo is committed to providing unbiased search results and does not engage in personalized filtering or tracking-based customization of search results. This means that all users see the same search results for a given query, regardless of their past search history or preferences. DuckDuckGo's search algorithm prioritizes relevance and quality while maintaining user anonymity. Source: DuckDuckGo Search Quality

Transparency: DuckDuckGo emphasizes transparency in its operations and policies. The company publishes annual "Transparency Reports," which provide insights into government and legal requests for user data, as well as information on how DuckDuckGo handles these requests. This commitment to transparency helps build trust with users concerned about their privacy rights. Source: DuckDuckGo Transparency Report

User Control: DuckDuckGo puts users in control of their privacy settings. In addition to providing comprehensive privacy options within its search engine, DuckDuckGo offers browser extensions and mobile apps that enable users to enhance their privacy protection further. These tools empower users to customize their online privacy settings according to their preferences and requirements. Source: DuckDuckGo Browser Extensions

Open Source: DuckDuckGo has open-sourced many of its components and tools, allowing developers and security experts to review the code for potential vulnerabilities or privacy issues. This open approach to development enhances trust and confidence in DuckDuckGo's commitment to privacy and security. Source: DuckDuckGo GitHub

Education and Advocacy: DuckDuckGo actively educates users about online privacy risks and advocates for stronger privacy protections on the internet. Through its blog posts, social media channels, and public advocacy efforts, DuckDuckGo raises awareness about the importance of privacy and provides practical tips for protecting personal data online. Source: DuckDuckGo Blog

Overall, DuckDuckGo's dedication to user privacy, transparent policies, and commitment to providing unbiased search results make it one of the most trusted and privacy-respecting search engines available today. Users concerned about their online privacy can rely on DuckDuckGo to deliver relevant search results without compromising their personal information.

MediaHead Digital Technologies Award Winning Web Publishing Specialists Tel: 1-800-971-5030 Email:sales@mediahead.ca | Web: mediahead,ca Software Developers, Publishers, Cloud Integrators

Monday, February 12, 2024

Amazon Powerhouse Services

Amazon Services Features to Build Your Business

Amazon Offers a Huge Amount of Services for Web Development

https://youtu.be/JIbIYCM48to?si=RLhn5edcKSnTmAxW Amazon Web Services (AWS) offers a vast array of cloud services, including cloud servers, known as Amazon Elastic Compute Cloud (EC2). There are numerous benefits to using Amazon EC2 for hosting your applications and services. Here's a detailed overview of some of the key benefits along with relevant links:

1. **Scalability**: One of the primary benefits of using Amazon EC2 is its scalability. You can quickly scale your compute capacity up or down based on demand. Whether you need to handle a sudden spike in traffic or scale down during quieter periods, EC2 allows you to adjust your capacity accordingly. This scalability ensures that you only pay for the resources you use, making it cost-effective. [Link: EC2 Auto Scaling https://aws.amazon.com/ec2/autoscaling

2. **Flexibility**: Amazon EC2 offers a wide range of instance types optimized for various workloads, including compute-optimized, memory-optimized, storage-optimized, and more. This flexibility allows you to choose the instance type that best suits your specific requirements, whether you need high CPU performance, memory-intensive applications, or storage-optimized instances. [Link: EC2 Instance Types]https://aws.amazon.com/ec2/instance-types/

3. **Reliability**: AWS data centers are designed for reliability and availability. Amazon EC2 offers a Service Level Agreement (SLA) with a commitment to high availability. EC2 instances are built on top of a highly redundant infrastructure, ensuring that your applications remain accessible even in the event of hardware failures. Additionally, AWS provides features such as Auto Scaling and Elastic Load Balancing to further enhance the reliability of your applications. [Link: Amazon EC2 SLA](https://aws.amazon.com/ec2/sla

4. **Security**: AWS implements robust security measures to protect your data and applications. Amazon EC2 provides features such as security groups and network access control lists (ACLs) to control inbound and outbound traffic to your instances. You can also leverage AWS Identity and Access Management (IAM) to manage user permissions and access to resources securely. Additionally, AWS offers compliance certifications and adheres to industry best practices to ensure the security of your workloads. [Link: Amazon EC2 Security](https://aws.amazon.com/ec2/security/)

5. **Cost-effectiveness**: With Amazon EC2, you only pay for the compute capacity you consume. There are no upfront costs or long-term commitments, allowing you to benefit from a pay-as-you-go pricing model. Additionally, AWS offers various pricing options, including On-Demand Instances, Reserved Instances, and Spot Instances, allowing you to optimize costs based on your usage patterns and budget requirements. [Link: Amazon EC2 Pricing](https://aws.amazon.com/ec2/pricing/)

6. **Integration with other AWS Services**: Amazon EC2 seamlessly integrates with other AWS services, allowing you to build comprehensive and scalable solutions. You can easily integrate EC2 instances with services such as Amazon S3 for storage, Amazon RDS for databases, Amazon VPC for networking, and many more. This integration enables you to leverage the full capabilities of the AWS ecosystem to meet your specific requirements. [Link: AWS Services Overview](https://aws.amazon.com/products/)

7. **Global Reach**: AWS operates data centers in multiple regions around the world, allowing you to deploy your applications closer to your end-users for lower latency and improved performance. Amazon EC2 instances are available in numerous regions and Availability Zones, providing you with the flexibility to deploy your workloads globally while ensuring high availability and fault tolerance. [Link: AWS Global Infrastructure](https://aws.amazon.com/about-aws/global-infrastructure/)

8. **Developer Tools and APIs**: AWS offers a comprehensive set of developer tools and APIs to streamline the deployment and management of EC2 instances. Whether you prefer using the AWS Management Console, command-line interface (CLI), or software development kits (SDKs) for various programming languages, AWS provides the necessary tools to automate tasks, manage resources programmatically, and integrate with your existing workflows. [Link: AWS Developer Tools](https://aws.amazon.com/developer/tools/)

By leveraging Amazon EC2, you can benefit from these features and more to build scalable, reliable, secure, and cost-effective solutions tailored to your specific needs.

Please note that the links provided are to the official AWS documentation, where you can find more detailed information about each topic mentioned.

MediaHead Digital Technologies Award Winning Web Publishing Specialists Tel: 1-800-971-5030 Text: 416-879-9230 Email:sales@mediahead.ca | Web: mediahead,ca Software Developers, Publishers, Cloud Integrators Port Credit, Ontario Canada

103 YEAR Old Doctor Reveals The Secrets To Living Longer

Friday, February 9, 2024

What Happens if Google Locks You Out of Your Email and Storage

Its been happening on an increasing level. People are being blocked from Google Business, Youtube and Gmail. And its very very difficult to get back in or as they call it, reverified. Its can be an aggrevated jouney of frustrating months before you MAY get access to your data.

If you suddenly find yourself locked out of your Google account, it can be a frustrating and concerning experience. Here's what typically happens and what you might encounter:

Initial Notification: You might realize you're locked out when you try to log in to your Gmail, Google Drive, or any other Google service and receive an error message indicating that access is denied.

Reason for Lockout: Google may provide a brief explanation or error message indicating why you're locked out. This could be due to suspicious activity, a violation of their terms of service, a security concern, or another issue.

Verification Process: Google often requires users to verify their identity to regain access to their accounts. This could involve answering security questions, providing a recovery email or phone number, or completing other verification steps.

Appeals Process: If you believe the lockout is a mistake or if you want to dispute the reason for the lockout, Google typically provides an appeals process. You may need to provide additional information or evidence to support your case.

Customer Support: Google offers various support channels, such as help articles, community forums, and direct support options, where you can seek assistance in resolving the lockout.

Timeline for Resolution: The time it takes to resolve a lockout can vary depending on the reason for the lockout, the complexity of the situation, and how quickly you can provide the necessary information or complete the verification process.

Access to Data: While you're locked out, you may not have access to your Gmail emails, Google Drive files, or other data stored in your Google account. This can be problematic if you rely on these services for work, communication, or personal tasks.

Impact on Other Services: Being locked out of your Google account can also affect your access to other services and apps that you use Google credentials to log in to.

Overall, being locked out of your Google account can be disruptive, but it's usually possible to regain access by following the provided instructions, verifying your identity, and resolving any underlying issues. It's essential to act promptly and cooperate with Google's procedures to expedite the resolution process and regain access to your account and data.

How to Send 10,000 Cold Emails a Day

Unlike many videos or systems that attempt to show you how to send a quantity of emails this video does an superb job with great detail and you know that it works. Whether you want to go through the ordeal or not is up to you. Even mainstream bulk mail senders like Mailchimp or Constant Contact make you jump through hopps to send even your legitimate 1500 email. They rant on about whether they are opted in and then want proof and after all that will only allow you to send a limited number for a period of time. There is no easy way to send large lists of clients and prospects.


If you feel you have one, drop a comment. #hardtalknews

How to Send Bulk Emails using Gmail (Free!) | Email Marketing for Gmail

Sunday, February 4, 2024

The Windsor Family Tree Explained on a Map

HardRider Motorcycle Theme Video

HardRider Motorcycle + HardRider Turbo Kits 2024

Best Priced Motorcycle Turbo Kit in North America

NitroBoost Nitrous Kits for Motorcycles

Thrill of the Ride | HardRider Motorcycle 2024

Winston Churchill - Greatest Leader of the 20th Century

Winston Churchill is widely regarded as one of the greatest leaders of the 20th century, especially for his role in guiding Britain and the Allies to victory in World War II. Born in 1874 to an aristocratic family that included his prominent politician father, Lord Randolph Churchill, and American socialite mother, Jennie Jerome, Churchill spent his childhood largely in the care of a nanny and in boarding school, where he struggled to keep up academically. At age 18, he enrolled in the Royal Military College, a major achievement for the young boy who had an early interest in the military and also saw it as a distinct path into politics. After a four-year stint serving as both a soldier and war correspondent around the world, Churchill resigned from the army in 1899 to focus on his career as a writer and politician.

Churchill went on to hold a variety of political positions in both the Liberal and Conservative parties, including first lord of the admiralty, chancellor of the exchequer, secretary of state for war, and, of course, prime minister of the United Kingdom. He also became a prolific and celebrated writer and a renowned orator, whose powerful speeches, such as his famous "We shall fight on the beaches" address, inspired both his country and people around the world. Churchill was known for his eloquence, courage, wit, and vision, but he wasn’t without his faults, and his controversial views on imperialism, race, and social reform remain an equally entrenched part of his legacy. 

Churchill died in 1965 at the age of 90, remaining to some one of the greatest Brits of all time. Churchill Did a Stint as a War Correspondent Churchill struggled through his school years in nearly every subject, history and English being the exceptions. His father steered him away from academics and toward a military career, where it took Churchill three attempts to get into the Royal Military College at Sandhurst (now the Royal Military Academy Sandhurst). In 1895, he joined the 4th Queen’s Own Hussars cavalry unit, and made his first army trip to Cuba — but not for combat. 

Churchill took a short leave to report on the Cuban War of Independence for London’s Daily Graphic. In 1896, his regiment was deployed to India, where he served as both a soldier and a journalist; his dispatches were later compiled into The Story of the Malakand Field Force, his first of many published nonfiction works. His journalism even led Churchill to a notable moment in his young career. While covering the Boer War in South Africa for The Morning Post, he and members of the British army were captured and taken to a prisoner-of-war camp. He escaped by scaling a wall in the dark of night, returning a hero. He Was Awarded the Nobel Prize in Literature in 1953 

Churchill’s war reporting marked the beginning of an esteemed literary career. His first major work following his war dispatch collections was a 1906 biography of his father, titled Lord Randolph Churchill; he also wrote a four-volume biography of his ancestor, the Duke of Marlborough. Churchill's most famous works, however, are his histories of the two world wars, which he both witnessed and shaped. The World Crisis covers the First World War and its aftermath, while The Second World War, throughout six volumes, details the global conflict that made him a legendary leader. 

Churchill also published several collections of speeches and essays, as well as a book on his hobby of painting, Painting as a Pastime. In 1953, his work earned him the Nobel Prize in literature, awarded “for his mastery of historical and biographical description as well as for brilliant oratory in defending exalted human values.” As high an honor as it was, it’s believed that what Churchill truly wanted was the Nobel Peace Prize.