THIS IS LARGEST FONT SIZE available as a selction in settings/blocks. WORKS FOR LIST BLOCKS. zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz
2. A REAL ASSET is something physical, like gold, land or a house.
3 A SECURITY is a FINANCIAL DOCUMENT representing ownership in a real asset or another security. Securities can be bought and sold.
4. SECURITIZATION is the formation of a relationship between a security & real assets or a security that bundles other securities into one.
In the former case, a security that represents immediate ownership in real assets can be called a BASIC 1ST LEVEL SECURITY. STOCKS are 1st level securities because they give immediate ownership to real assets. COLLATERALIZED LOANS are quasi 1st level securities, because they are backed by real assets, meaning if the borrower defaults on the terms of the loan, then he can be forced to transfer his ownership in those real assets to the lender.
In the latter case, where a security bundles other securities together . these securities are collectively called MULTI-LAYERED NESTED SECURITIES. STOCK INDEXES (like the DOW & SP500) tend to be 2ND LEVEL SECURITIES. Investing in securities that go beyond 2 levels is highly discouraged.
5. STOCKS are securities giving evidence of ownership in things like a business entity.
6. LOANS are IOUS (aka, NOTES or BONDS) . COLLATERALIZED LOANS are SECURED LOANS. Without being collateralized, ie, backed by real assets, loans are UNSECURED LOANS. Regardless, loans may or may not pay a one-time simple or a repetitive periodic INTEREST based upon the amount of the PRINCIPLE & duration of the loan.
7. The government borrows on its good looks alone.
The DOLLAR is a government unsecured IOU/LOAN that does not pay interest. The value of the dollar depends upon its economic scarcity in relation to the availability of goods and services.
.INFLATION occurs when there are too many dollars in relation to the availability of good and services. DEFLATION is the opposite. The best defense against inflation is ownership of real assets.
The FEDERAL RESERVE BANK will attempt to curb excessive inflation by raising interest rates. This is done by specifying a higher inter-bank transfer rate or by selling off government bonds for a cheaper price, thereby increasing their effective interest rate which varies inversely with .price. But the Fed Reserve Bank normally tolerates some small periodic inflation.
A TREASURY BOND is a government unsecured IOU/LOAN that does pay interest. It’s distribution is encouraged by the Fed Reserve Bank who buys new issues of federal government bonds by creating a book keeping entree that credits the federal governments account with cash, while making an off setting debit entree to its own account with the value of the alleged purchase. It is a really astonishing hocus pocus of book keeping. Anyway, they then proceed to sell the bonds for a price which inversely impacts the effective interest rate of the bonds.
B. THINGS TO DO & NOT DO.
1. Don’t think you can make a killing or a living in the stock market, unless you become a stock broker.
2. Do not spend more than you can afford to lose.
3. Do not borrow to buy.
4. Observe the economic environment. Are interest rates rising, falling or flat? Is the value of the dollar rising or falling? Are people trading wisely or not? Are they borrowing money to invest, & if so do they have the asset resources to pay for their borrowing in case of a market failure? Go to a stock brokers web site & monitor the DOW JONES INDEX & SP500 INDEX, along with other indexes by pulling up their price history charts and observing trading trends going back at different points in time. Are prices rising, falling or just flat. A good economic trading environment is usually indicated by slightly upward trends. But beware of radical price swings, because they indicate a potential market malady. You will hear terms like “BULL” or “BEAR” to describe market conditions, indicating a lot of people are buying or selling. It boils down to the more, the merrier. The fewer, the less happier. (For more info on “how to”, go to the next section.)
5. And monitor the security you are interested in buying or selling, observing the same trends as previously described.
6. When buying, wait until there is a small dip after reaching a peak, thereby assuring there are prospective traders in the security out there who might take a small loss in the security if the price drops from the peak at which they bought it.
7. When selling, put you sell price half way between the price you bought it and the most recent peak higher than when you bought it.
8. In both buying and selling, use LIMIT TRADES where you set the maximum price you will pay in a buy or the minimum price you will accept in a sell.
9. And by all means, do not buy any MULTI-LAYERED NESTED SECURITIES.
C. THE INS & OUTS OF SECURITIES TRADING.
1. THE ELEMENTS OF SECURITIES TRADING.
a. The EXCHANGE is the actual physical market place where securities are traded on the exchange floor between buyer and seller agents during on work days (M-F) during normal working hours.
b. A SECURITIES BROKER is an agent who represents a buyer or seller in dealing with the exchange and places orders with the exchange. Most brokers now have web sites providing detail price info and trader ordering processing services for a small commission.
2. HOW TO PLACE AN ORDER. (Minors under 18 not permitted) Since you are reading this post, you are already connected to the internet and half way there. Simply find a broker’s website and create an account the same as you would in accessing a social web site. The broker’s website should provide all the tools you need for selecting and ordering specific securities trading. Since investment banks hire brokers, you may have to go to the investment bank’s web site. Important to note that an investment bank should not be considered to be the same as a regular bank, since the 2008 crash was ultimately caused by the Lehman Brothers & Bear Stearns investment banks bad practices of buying more than they had in real assets to backup/cover.
And even though real estate is a sound investment, the investor needs to be careful of REITS, REAL ESTATE INVESTMENT TRUSTS, because there are some really bad characters out there.
In this site-id post you can select a category from the list below, which will take you to the last post made in that category followed by all subsequent posts in that category appearing in reverse chronological sequence. To return to this post, click on the up-arrow in the lower right corner of your screen. Or you can click on the menu in the upper right corner & click on “Home”. To exit to the aaarrrg.com main web site hosting this blog, click on the “Leave-Blog” link in the menu.
In this future, you will be able to select a specific author to see only those posts relevant to that author or category. However at the current time the only author is the administrator.
To see all posts in reverse chronological sequence, regardless of category or author, just scroll past this site-it post.
With the influx of illegal migrants and in view of the wide spread fraud in the 2020 election, a great concern has arisen regarding the integrity of our national election system. Our current election system is a piece of crap. It is a hodgepodge of manual and batch systems ripe with fraud. That a secure online real time election system “database” has not been made available by now is an absolute crime. What is presented herein is to suggest a solution to that dilemma.
A HIERARCHICAL DATABASE PRIMER:
What is a “database”, you ask? It is an electronic filing organization that provides an externally accessible entree points to “Master/Parent Records” which in turn provide internally navigatable link chains to more “Nested Detail/Child Records”. It is a piece of electronic infrastructure contained on a serving computer. Today, there are all kinds of things called “databases”. But there is one in particular that is the grand daddy of them all, ie, the hierarchical database.
The Meaning Of “Hierarchical”:
To understand the meaning of “hierarchical”, a good analogy would be the master directory folders on your computer or cell phone, where you probably have many nested detail sub folders under each master folder. The only difference between this analogy and a hierarchical database is we are not talking directory “folders”. We are talking “records” and their relationship to each other.
The Jargon Back Then:.
Before the computer came along, a “record” was said to be any multi-page document contained within a physical folder which was stored in a “file cabinet”. There was no relationship between records other than their physical proximity to each other. If they were not stapled together, pages could get mixed up. With the advent of the computer, that all changed, and a more precise meaning was given to the terms “record” & “file”.
And Now Fixed-Length Vs Variable-Length Records:
Today, a “record” is a single line (terminated by a carriage return) within a single “page” of a single “file”, all contained within a specific electronic folder. A record is made up of variable-length and/or fixed-length data fields. Obviously if it is comprised of only fixed length data fields, then the entire record is said to be a fixed length record. Otherwise, it must be a “variable length record” . For our purposes here, we will assume it to be a fixed length record.
Record Types:
The record may or may not conform to a specific format, ie, a template that specifies data be arranged into fixed position, fixed length & contiguous “fields” within the record, and if it does, then it is said to be of a specific “record type”. If you wish, you can call a “record-type” a “record-template” . This concept of a “record-type” makes it possible to identify master-detail relationships between record types & eliminate the need for pages or files.
Thus, the hierarchical database came into being as a multi-file entity & became the grand daddy of all databases. General Electric’s Integrated Data Store & IBM’s DL1 were two originating hierarchical databases. And now for the IMPORTANT PART.
THE DATABASE SCHEMA DIAGRAM.
Here we have what is known as a “database schema diagram”. Simply put, it is a map of accessibility to records contained in a database.
This example shows 3 different record-types represented as boxes and their relationship to each other shown as lines connecting the boxes, representing link pointer chains. It should be intuitively clear that the bottom box represents a detail child record-type that is subordinate to the two higher boxes representing master record-types. The lines between boxes represent link pointers chains wherein 1) the master record points to the first detail record, which in turn points to the next sibling detail record, with the last sibling detail record pointing back to the master record or simply dropping dead, ie, the end of the chain. In addition, you can see little circles with squiggly arrows pointing at the two master record-types. These represent external access to the master record-types given a key field.
Let us associate this diagram with a real application, say a Customers Order History. The top record would be the customers id record. The next box down would be his order header records ( note plural). And finally the last bottom record type would be the item records on that specific order. All customer order headers and all customer ordered items would be accessible to anyone knowing the customer number. And all items of a specific order would be accessible to anyone knowing the order number. It is all about record access.
RECORD-TYPE READ-UPDATE PERMISSIONS:
But record-type access is only part of the story. Equally important is the principle of full or partial record “update permissions” which is key to protecting the data within the database. It is one thing to only see data. It is quite another to be able to add, change or delete data. A person’s logon should contain an indication of their level of update permissions. This is what separates administrators from non-administrators. And in our election system, it is what separates citizens from non-citizens.
Hopefully by now it is intuitively clear on how to read a database diagram.
The above image is a schema diagram of what an overall National Election Database should look like. You should note at the top are numbered sectional identities. (Image too small? On your phone, expand it. On your computer, right click and open image in new tab. Or download & save it to resize.)
Key to understanding this map is the concept of “governance levels”. We all understand the divisions within our own government as being federal, state, county, & city which represents the most geographically remote part of our government that includes the progressively nearer parts of our government. These we call the governance levels each of which can be uniquely identified by a single digit.
And each governance level maintains its own records. When these records are all thrown into one big pile, we need to know who can do what with respect to altering these records. This necessitates the need for a way of identifying who has the permission to update records at what governance level. Because any one person should not have update permissions to records within more than one governance level, it should be sufficient to tag any one person’s update permissions with the digit assigned to the governance level. But sometimes, as in the case of the various levels within a state, a 2 digit suffix to the permission-level is required to identify the state.
In this election system, I have assigned numbers to the governance permission-levels as follows: 0 = non-citizen 1 = citizen 2 = citizen precinct-admin 3 = citizen city-admin 4 = citizen county-admin 5 = citizen state-admin 6 = citizen federal-admin This, in essence, identifies the basic workings of this online election system database.
All users will initially be assigned a permissions-level = 0, meaning they have no update ability to any part of the database. After that, any user who is qualified to vote, including any administrator, must provide PROOF OF CITIZENSHIP, which subsequently grants them a user’s permissions-level higher than 0, meaning they have update ability to those parts of the database as specified by their permissions-level.
State governments should not be assigning a permissions-level higher than 0 simply based upon a DMV ID or social security number, because these are issued to citizens and non-citizens alike and are not proof of citizenship. And absolutely no state should be issuing ballots in any form to anyone who has not submitted a validated citizen request. Capisce?
The database diagram, ie, map, can be seen as divided into four sections:
1. The left section 1 represents all user logons (including non-citizens, citizen voters, & citizen administrators) & their online requests records for access & update permissions-level to the appropriate governance-level records in section 3 of the database.
2. The middle-left section 2 represents the administrator control area which provides the mechanism required for validating & identifying citizen logons as distinct from non-citizen logons, as well as identifying citizen logons as distinct from citizen administrator logons.
3. The middle-right section 3 represents the government’s organizational hierarchical levels, ie, governance levels, from the top-down and associated election data.
4. The right section 4 represents the area where administrators create linkages from a citizens’s request to: a. be linked to a government office as a candidate, or b. access a ballot based upon his submission of a ballot request. These requests are serviced by state election administrators who are basically online voter registrars.
The following discusses in detail the workings of each section.
Section 1 – USER LOGONS & UPDATE PERMISSIONS:
This section 1 is the left-hand side of the database map which represents the part of the database that contains all users’ (including all administrators’) logon records. Anybody can create a user logon record with password, regardless of citizenship. In creating a logon, the user must submit his birth date & the last four digits, if not all, of his social security tax-id number, the combination of which should uniquely identify his logon to any election administrator & remain relatively unchanged, even if he moves to a new state. He should also include his zip-code which he should keep up-to-date at all times.
For privacy reasons, access to his user’s logon record is restricted to the individual user who owns the logon. This is to protect the user’s profile from being exposed, including his voting record. Absolutely no one will have access to the user’s logon record & profile. Any data needed by administrators will be plugged into the user’s subsequent request record(s) which will be accessed and updated by administrators.
Even though a user has created a logon, it does not mean he has update-permissions to any part of the database other than his own logon area. Such update-permissions can only be obtained by submitting a first one-time request record along with proof of citizenship in the form of a picture plus a passport-id or medicare-id or birth-certificate or naturalization-papers. Such submission can be in-person or via online.
Upon entry of the request into the database, a self assigning SYSTEM-USER-ID record will be automatically created for his logon having a permissions-level = 0, meaning he has no update permissions. His unique system-user-id will be formed from the combination of his birth date & last four digits of his social security number to become what might be called a preliminary “voter-id”.
In conjunction with his first one-time request record, the request record will be linked into a federal or state administrator work-list file to notify administrators of the request. And upon approval of his proof of citizenship by an administrator, his permission-level will be appropriately set higher than 0, thereby granting him the update ability he requested. If the user fails to qualify as a citizen, his newly created system-user-id will remain at permissions-level = 0 , meaning he has no update=permission to the rest of the database. Otherwise, he will be assigned a permissions-level number higher than 0.
There are three types of a user requests, any of which can be the first one-time request. a) An ADMINISTRATORS PERMISSIONS REQUEST is simply a request to change ones logon permissions-level to be changed to higher than 1. b) A CANDIDATE REQUEST can be made by any permission-level greater than 0. It must specify the specific Nation-ID, State-ID, County/ District-ID, City-ID & Office-ID for which the user seeks to run. The administrator processing the request must link the request record to the appropriate year & office-id records. c) A BALLOT REQUEST can be made by any permission-level greater than 0. It is simply a request by a user to his lowest level of local election administration to create link chain from his request record to the candidate link records applicable to his geographic area for the year in question. Therefore, he must include his zip code in making the request.
Each user request subsequent to the first request must be validated by the assigned permissions-level in his first one-time request record.
Of course, not every body may have a cell phone or computer which is quite unlikely. In this case they should be able to find a public internet terminal like a library or the county registrars office. In the absence of that, they should obtain a paper ballot, but only upon proof of citizenship which could include having a social security number or some other form of federal id that the user has in mind.
Section 2 – THE ADMINISTRATION CONTROL SECTION FOR SECURING THE ELECTIONS.
This section 2 is the middle-left section of the database schema & represents the area of the database which houses the externally accessible system-user-id records created as described in section 1.
The following applies to this section.
a. Once a user’s system-user-id record is created by submitting his first one-time request, it will be impossible for another user to create a duplicate system-user-id record.
b. The system-user-id record will be qualified by the assignment of a permissions-level number to identify non-citizens from citizens & regular citizens from administrators. The permissions-level numbering is as follows: 0 = non-citizen (no update permissions) 1 = citizen 2 = citizen precinct-admin 3 = citizen city-admin 4 = citizen county-admin 5 = citizen state-admin 6 = citizen federal-admin
c. The first creation of a system-user-id will assign a permissions-level = 0 & remain so until proof-of-citizenship is approved.
d. State level administrator permission-levels 2 through 5 require a 2-character State-ID suffix appended to restrict their update permissions to the state in which they are qualified to serve. For example, we do not want an administrator in Georgia making changes in Arizona. For the rest of this document, we will assume that the permissions level for a state administrator includes that state suffix.
Any administrative level within a state can service any user’s request within the same state for a permissions-level change to 1. But any user’s request for a permissions-level greater than 1 must be serviced within the state & not by any administrative level higher than the permissions-level requested. Any user’s request to be a candidate for office must be serviced within the state & not by any administrator other than an administrator at the same level as the office. Lastly, any user request for a ballot connection must be serviced within the state at the lowest level of administration available to user’s location.
e. Federal administrator logons will be flagged as permissions-level 6 & include employees within the Federal Election Commission, the US State Dept, the Medicare Admin, or the Social Security Admin. All federal administrators must be proven citizens to have level 6 update permissions. if the feds wish to qualify their administrators permission-level, they can attach a 2 character code suffix to the permissions-level number. It should be noted that the Social Security or Medicare Administrations may invalidate a user’s permissions-level by submitting a record linked to the first one-time request record to indicate a deceased user.
f. With the exception of initializing identity records below its level, no administrative level can alter any of the detail records added by the administrative levels above or below its own level.
g. Looking at the database diagram you will note that the users system-user-id record can be linked to either of two header record types. One is a federal administrators work list which queues the feds to a system-user-id that requires attention. The other is the state administrators work list which is a list to queue the state a request requires their attention.
h. Now turning to the feds work list, it is a file of notifications that queue the feds of items requiring their attention. A new user may have submitted a first one-time request using only a passport, medicare or social security number as proof of citizenship. Such a case should result in an automatic notification being put in the feds work list. Or maybe a user in creating their logon specified a combination of birth date and last 4 digits of social security number that conflicts with an existing system-user-id. Again, an automatic notification should go in the feds work list. And yet again, put an automatic notification in the feds work list when a system-user-id is approaching the 4-year permissions-level expiration date. Did you hear me say a “4-year permissions-level expiration date”? Yep, you heard right. We just cannot afford to let deceased citizens continue to vote. So why not automatically notify the fed of a possibly deceased voter?
i. With respect to the state work-list, a work list for each level of state government needs to be identified & accessed by its permissions-level level number and a combination of State-ID, County-ID, City-ID, & Precinct-ID to facilitate processing of user requests at the correct level.
j. With respect to processing the previously mentioned requests, due diligence in validating citizenship & existing citizenship currency is of the utmost importance to prevent any bad actors from trying to game the system & vote as a non-citizen or more than once in any election.
It should be noted that state governments should not be assigning a permissions-level of 1 based simply upon a DMV ID. Nor should states be issuing ballots without a request from a qualified citizen system-user-id, ie, voter-id.
Paper ballots should be eliminated as much as possible. Ballots should only be given out in electronic form to people who have a qualified citizen system-user-id, ie, a voter-id.
For the purpose of validating new first one-time requests, any among the Federal State Dept, Social Security or Medicare Admin should be able to confirm citizenship in the absence of proof-of-citizenship documents. For the purpose of validating citizenship currency, the Social Security &/or Medicare Administrations should inactivate any voter-ids of dead people.
For the purpose of preventing bad actors from voting more than once in any given election every voter must issue a ballot request for every election. Validated voters should not have their ballots automatically setup, ie, issued, to them, because they may have moved to another state. This requirement for the voter to submit a ballot request every election year helps to prevent a voter from obtaining more than one voter-id by changing his logon profile identity, because his previous requests will show his logon was used with another voter-id. However, women who marry should be able to change their name in their logon when they marry.
We must be able to deal with the voter who creates multiple logons. Where he might be able to present different birth dates, he should still be unable to submit more than one social security number in conjunction with the same birth date. And if he randomly picks those numbers, there is a good chance the combination already belongs to someone else
Section 3 – THE ORGANIZATIONAL HIERARCHY & GOVERNANCE LEVELS:
This section 3 is in middle-right part of the database map & represents the identities of our governmental hierarchical levels & their respective offices to be filled by elections. It should be intuitively clear that within the nation are several states, & within states are several congressional districts and counties, & within counties are several cities, & within cities are several zip codes, & within zip codes are precincts. Excluding the zip-code level, each level is assigned an identity number. It should come as no surprise to see that our assignment of each level’s ID number corresponds to a user permission-level number. But to be perfectly explicit, start at the national level as level 6 & proceeding down through the levels, each lower level gets tagged with the next lower level indicator. As a consequence, we have level 6 being the national level, level 5 the state level, level 4 the county & district level, level 3 the city level, level 2 the precinct level. And again, this leaves levels 1 & 0 representing the individual user logon.
a. GOVERNANCE LEVEL 6 INITIALIZATION: We now turn our attention to the initial establishment of this part of the database. So we begin with the feds, because they are the keepers of the database, it being on their computer, & because they have ultimate authority regarding citizenship status. The very top master record is the Nation-ID record is assigned a level-ID = 6 & will be created by the feds via a single backdoor logon with permissions-level-6 . This single backdoor logon will be able to service any permissions-level 0 system-user-ids requesting level 6 permissions as previously discussed, thereby creating more federal administrators.
b. GOVERNANCE LEVEL 5 INITIALIZATION: Before we continue any further, we must state this principle. In section 3 any given administrative level may create the master id header records for the entities one level below it’s own level & provide that level with a single backdoor administrator logon.
Therefore, the feds can create State-ID hybrid master records as detail records to the overall Nation-ID master record, but nothing below those State-ID records. As each State-ID record is created, a single backdoor permissions-level 5 logon for each state will be provided to the lead state administrator for that state. ( Note:This is the one exception to assigning an administrative permissions-level lower than the processing administrator.)
In addition, if the feds are really nice, they might even initialize all system-user-id records setting each system-user-id to permission-level 0 or 1 , even before any real users create their logons. After all, they do have the information to do so, ie, birth date and social security number. But knowing the feds, we cannot count on it. And there really is no need until a user creates a logon.
After initializing the State-ID records, the feds should not be creating or updating any other records in section 3 or section 4 of the database. They can only update the permissions-level in the user’s-system-id record in section 2 of the database & create, update or delete notice records in their own federal work list.
c. GOVERNANCE LEVEL 4 INITIALIZATION: We now turn to the state administration level 5 processes with respect to initializing district and county updating records in section 3, the following holds. In the same fashion as the feds setup the next lower level governance ids, each state’s backdoor level-5 logon will be able to change any level-0 logon to another level-5 administrator logon once the level 0 logon owner submits proof of citizenship either in person or via the logon online administrator request process. And the level-5 administrators will create the County-ID records & District-ID records, along with creating a backdoor level-4 administrator logon for each county. This same cascading process will apply to initializing the lower level governance ids, ie, county, city & precinct ids.
In a similar fashion, each state’s backdoor level-5 logon will be able to change any level-0 logon to another level-5 or level-4 administrator logon once the level 0 logon owner submits proof of citizenship either in person or via the logon online candidate/ballot request process. Any level-5 administrator will create the County-ID records & District-ID records, along with creating a backdoor level-4 administrator logon for each county.
d. GOVERNANCE LEVEL 3 INITIALIZATION: In a fashion similar to the state, each county would setup City-ID records, along with creating backdoor level-3 logons to be used by city administrators in conducting its elections.
e. GOVERNANCE LEVEL 2 INITIALIZATION: In a fashion similar to the county, each city may elect to setup Precinct-ID records, along with creating backdoor level-2 logons to be used by the precinct administrators.
f. OFFICE/PROPOSITION RECORDS: Obviously for each level of governance from city on up there exists departments & offices with positions to be filled, some of which are filled via elections. And so each level of government is responsible for defining those positions to be filled via election. These are the Office-ID records, and each year some or all of them may have vacancies to be filled by candidates.
Section 4 – TYING USER LOGONS TO THE GOVERNMENT ORGANIZATION & ELECTION RECORDS:
The right side of the database diagram deals with linking the user request record-types to the appropriate area of section 3 . Clearly before a voter can request a ballot, there must be candidates to select from.
This brings us to the creation of a candidate-link record by the appropriate level administrator. And how do we do that?
A CANDIDATE REQUEST will call out the specific State-ID, County/ District-ID, & City-ID where applicable & the specific Office-ID. Assuming the would-be candidate is qualified & has a valid Voter-ID, the impacted administrator level will create a candidate link record for the year in question, thus establishing his candidacy.
It should be noted that there are times when there are non-candidate measures at the city, county, or state levels to be voted upon. These are identified as Propositions. They are identified in the same candidate link record-type which is accessible via the voter to the same candidate link record-type as used for candidate-to-office links.
A BALLOT REQUEST is simply a request to his lowest level of election administration to create links between his ballot request master & the candidate link records applicable to his geographic area.
VOTING:
The database is now ready for the voter to make his candidate selections by clicking the appropriate candidate-selection button in each appropriate voter-ballot-link record, at which time a write-permission lock is placed on the voter-ballot-link record. This would prevent anyone from changing candidate-selection button and the corresponding link to the selected candidate record.
POST VOTING RECORD ACCESS:
For secrecy/privacy purposes all cast voter-ballot-link records should be locked from updating by anyone other than the voter and as soon as they are counted. With this one exception, all should be able to view any record at any time, thus providing complete transparency and veracity of an election. In other words, everyone can look anywhere but not touch.
TALLYING UP THE TOTALS:
In addition, currency of vote tabulation is essential. As soon as a voter has locked his voter-ballot record, his vote should be counted and tallies by candidate should be made available. Washington DC should be connected to each state & have access to each state database for the purpose of rolling up ballot totals for each national candidate by state.
KEEPING THE VOTER-ID ROLLS CLEAN:
Currency of the voter rolls is essential and a responsibility of the feds. Voters who have died would have their Voter-ID record flagged as such. But aside from that, there are bad players who would try to vote more than once. This should be averted by looking out for duplicate Voter-ID and ballot requests in & across all states.
PROS:
What would be the advantages of an online real time election system? First, the election should be completed within 2 days, if not sooner. Second, the voter would cast his ballot directly into the database, thereby eliminating anybody other than the voter from touching his ballot. Third, a voters ballot choices would remain unknown to anyone but the voter. Fourth, since there is only one machine involved, auditing software should be comparatively, making it easy in identifying any other anomalies.
CONS:
There will always be some ding dong who insists on having a paper ballot which necessitates having a batch input system.
HOW TO READ THE DATABASE:
Let’s begin with an analogy in the form of a picture on paper representing an invoice containing a list of purchased items. The top line appears only once & contains information common to all items listed as purchased . The top line is the header, or “master” record. The items listed are “detail” records. Now consider a stack of invoices that all have the same format. They all have the same “master record-type” with the same “detail record-type”.
A database is an electronic file cabinet for all these invoice “record-types”. To be more specific in electronic terms, a “record” is a fixed length string of data broken into “data-fields”, all representing something or having some particular meaning, and a “record-type” is the representation of the collection of all records having a common fixed data content, format & key sort field different from all other records. To look a record-type is the same as looking at the format of a specific record. A record-type is a template or example of what a record looks like. (Note: the word “record-type” is used interchangeably with the word “record”).
Returning to the database diagram, each box represents a “record-type”. You will see boxes around the periphery that have a little short arrow pointing at the box headed by an ellispse, a square or an “x” . These are “External Master Record-Types” which are the basic entree points into the database via their unique id data-fields. The ellispe heading on the arrow means read accessible to all. The square means update accessible to administrators only. The “X” is exclusive to the citizen logon.
You will see that the nation record-type (of which there there is only one for the USA) is directly read accessible by anyone based upon its nation ID. You will also see that each state record-type is directly read accessible by all based upon its unique state ID. The same holds true for the election year and zip code record-types. Another external access point is via each individual citizen’s exclusive login point. Finally, there are three other administrative access points necessary for validating citizen requests.
Outside of the External Master Record-Types, all other record-types are Internal-Detail-Record-Types accessible only through “Link Chaining” which is shown by a link chain line connecting a higher level master box to a lower level detail box. You might notice that each state record is not only accessible as an external master record, but is also accessible via the “Link Chain” from the nation record. By “Link Chaining” I mean there is a link field in each master record-type that points to the first record within a detail record-type, which in turn has a link field that points to the next record within the same record-type, and so on until the last record of that record-type which may or may not point back to the original master records. Note that an internal detail record-type in one link chain can be a master record-type in another chain. Hence, a completely accessible hierarchy is achieved.
Referring to the database diagram, with respect to link chain traversal, the default direction of link chain traversal is always forward from master to the first detail record and from current detail record to the next. if there is no arrow pointing to a detail record-type, it means that the master record is retrievable from any detail record by continuing to traverse the chain to the last detail record which contains the link back to the original master record. However, if there is an arrow pointing to the detail record type, it means the last record in the chain has its next record link null, thereby making it impossible to retrieve the master record of the chain.
To complete the picture, given a nation id of USA, one could directly access the USA record & then traverse the state chain to access all the states within the USA. Similarly, one could access all the counties within a state by first accessing the state record & then traversing the county chain. And so on.
Today’s average browser-to-website user should not find this method of navigation too difficult to understand.
Violations of alleged political correctness detected by AI (bots) SHOULD NOT BE A PROSECUTABLE OFFENSE. As a matter of fact, absolutely no political correctness should be prosecutable, UNLESS IT OCCURS IN THE PRESENCE OF MINORS, and even then the real harm done needs to be justified.
However, there are some forms of obscene expression that have long been determined to be of harm to minors and those should be prosecuted. Yet today there are adults who would have others treat them as minors and carry censorship to the ridiculous ends of the earth, employing that censorship in AI bots.
Our current day electronic mercantile system is possible only because of the banking credit card which enables trading of a government fiat currency for real good and services. But if that fiat currency fails, we ask whether or not there is another possible fool proof electronic trading system. And the answer seems to be “yes” if we consider a gold back crypto currency.
WHY GOVERNMENT CURRENCY INSTEAD OF GOLD: Gold has always been considered globally to be a real currency. There was a time when there was enough gold available relative to earths population to be carried around in small quantities for trading purposes. But then as populations grew, the availability of goods and services increased diminishing their value, while the value of gold increased making it too difficult to slice up gold into extremely small and unmeasurable quantities to be used in physical trading. So sovereign governments began issuing gold backed currencies to enable easier trading.
WHY GOLD BACK CURRENCY WAS ABANDON: In 1931, gold backed currency began to unravel in the most powerful country in the world: England. When the Great Depression hit, the people in England panicked, and started trading in their paper money for gold. It got to the point where the Bank of England was in danger of running out of gold. Quite obviously, when England created its currency, it failed to slice and dice its gold supply into small enough quantities as to allow its currency accommodate the growing population. Had England made its currency to represent extremely small quantities of gold in the first place, it would have been able to better deal with the run on its currency. Nevertheless, it eventually gave up on the gold back currency, opting to allow its currency value to be determined by the gold backed US dollar market, making the US dollar the world’s reserve currency supported by a Federal Banking System. However, for fear of running into the same problem of not being able to sustain a run on its currency, 40 years later, the US government abandoned the gold back dollar. And so we now have pure fiat currency backed only by the faith and confidence in the US government.
THE CURRENT SITUATION: Many of today’s economist argue that being off the gold standard helped to recover from the Great Depression. But what were the real causes of the Great Depression? For one thing, it was too easy to borrow money to be used in gambling on the stock market. So when the market went down, the loans of such money were called in forcing the borrowers to sell at lowered prices resulting in a market crash, a steep sell off. Currency became tight causing bank depositors to withdraw savings in a run on banks and companies to stop hiring. So economists reason that had the government the ability to print more money without basing it upon gold, there would not have been the Great Depression.
Analysis of the economists solution shows that what they really accomplished was a way of devaluating its currency in relation to increased gold value resulting from increased population. In other words, to fight a depression/recession they employ inflation. But what if there is too much inflation? Here they employ higher interest rates.
Now this would be all well and good assuming an honest government. But what we have learned more recently is that corrupt governments will manipulate the value of currency for selfish gain. Politicians will do what politicians do, lie and cheat. So we have to ask, is there a better way?
THE SCARCITY PRINCIPLE & THE NEED FOR DYNAMIC CURRENCY DENOMINATION VALUATION: Remember we said the value of the gold increases as the world population increases or as the amount of gold decreases. From this the inverse is true, ie, the value of the gold decreases as the world population decreases or as the amount of gold increases. What we want is to eliminate the need for human intervention in dynamically determining the total amount of a hypothetical currency denomination supply as a function/multiple of global population, as well as dynamically increasing or decreasing the value of that hypothetical currency denomination determined by dividing the global population by the total amount of gold available. By basing the total amount of a denomination supply upon global population, you can pretty much be assured you wont run out of gold in backing the denomination should there be a run on the currency.
This task is well suited to a computer. In essence, using a computer we can automatically compute how much gold should be represented by the denomination of a crypto currency, as well as how many denominations should be available world wide.
But the question remains as to who would be allowed to setup and administer such a system. Certainly it should be the owner of gold. It seems likely that the sovereign nation with the most gold would be the dominant provider of such a crypto. Currently it is said that the US has the most gold among sovereign nations.
Crypto Data Mining should be backed by gold. Ultimately the price of goods should be subject to the scarcity of gold. At least that seems to be the manner in which old bartering systems seemed to work. Those who have the most gold would seem to devalue it more than those who have no gold. So they would be more inclined to trade it away for more functional goods and/or services. Those not having gold would be more innovative in producing functional goods and services. to be traded for gold. Govrrnments should not be part of the value in determining market value. But that is easier said than done. Credibility among governments varies. That fact provides some fodder in support of global government, which in turn opens the door to global tyranny. So we seem to be stuck in a catch22 situation. As it stands, it would appear tbat for free market sake, the non globalization of currency is the best we can do. And the best currency is the one backed by gold. For crypto currency to be viable, the data miners should be the owners of gold and their crypto currency should represent a partial ownership in their total holdings of gold, or a portion there of. This assumes that gold has a universal fixed value. Why would one gold owner trade away more gold in exchange for a lesser amount in gold? So different cryptos may slice and dice their gold holdings in different increments. But the overall relative values stay the same.
The desired result is the ellimination of government balloney being construed as value. The bottom line is that a legitimate crypto currency should be a denomination representing a quantity of gold ownership. You in effect are buying gold and using it to purchase goods and services. Trump has endorsed the idea og crypto. Lets just hope he gets it right. Why should gold be the standard global currency?
1. It has been recognized world wide as having value.
2. It is hard to replicate. Anything else other than a precious raw metal is easy to be made to look good.
3. There is no substitute. Once a large scale of gold creates a crypto backed by gold, there would be no need for smaller scale gold owners to create their own crypto, because they could sell their gold to the existing crypto owner. BITCOIN is currently the most viable crypto. BUT IT IS NOT BACKED BY GOLD. And worse yet, those who create bitcoins, the DATA MINERS, are unknowns employing God-Knows-What protocols to create bitcoins. Anotner requirement for a crypto provider is that he must be subject to regular validation audits of his gold holdings.
==========================================
THE IDEA BEHIND FIAT CURRENCY.
We begin with the idea of “value of currency” and the factors that contribute to its inflation or deflation. But what is ‘inflation”? Quite simply, “inflation” is . . THE RISING COST OF GOODS AND SERVICES . . DUE TO THE OVER ABUNDANCE OF MONEY. And “deflation” is just the opposite.
A. THINGS THAT CONTIBUTE TO INFLATION:
1. INCREASED ACCESS TO MONEY.
. . a. PRINTING MORE MONEY.
. . . It should be noted that it is not necessary to physically print more . . . money. All that needs happen is for the Federal Reserve to buy . . . government ious and make a book-keeping entry crediting their . . . own account with a phoney deposit & then debiting their account . . . for the amount of the purchase of those government iuos. . . . He who does the book-keeping controls the economy.
. . b. LOW INTEREST RATES.
. . c. LOW TAX RATES.
. . d. DECREASED . . . POPULATION. MORE . . . MONEY PER PERSON.
2. INCREASED COST OF . . . PRODUCTION DUE TO . . . SCARCITY OF RAW . . . MATERIAL AND/OR . . . LABOR. INCREASED . . . WAGES OR INCREASED . . . ENERGY COST.
3. EXCESSIVE SPENDING. . . MONEY TOSSING. . . TOO MUCH MONEY CHASING . . GOODS AND SERVICES. ESPECIALLY PERTAINS . . TO GOVERNMENT.
B. CURBS AGAINST. MONEY HOARDING
1. DECREASED ACCESS TO MONEY.
. . a. HIGH INTETEST RATES.
. . b. HIGH TAXES.
. . c.. INCREASE IN POPULATION. . . . LESS MONEY PER PERSON.
2. OVER ABUNDANCE OF RAW MATERIAL . . AND/OR LABOR.
3. OVER PRICING, HIGH COURT COSTS, . . CHARGING MORE THAN THE MARKET WILL BARE.
This is why the gov is struggling to gain total control over crypto currency. It takes away their ability to control the market. But crypto does offer a way for the gov to control induviduals.
A FIAT currency is not based upon any commodity like gold. It is strickly a book keeping system maintained by the banking cartel. The world departed from a currency system bssed upon gold back with Nixon. It is probably better to have the value of gold determined by the free market rather than a government opinion. But the hazard of that is that it allows rogue nations to hoard it and possibly upset the existing fiat currencies in use. The same may even be possible with crypto currency since it is like an electronic commodity that has limited supply.
In the end, it would seem that any currency sysyem amounts to the old barttering system in the exchange of goods and services. The question is HOW MUCH DO YOU WANT A THIRD PARTY, like the government, interfering in your exchanges. And if you really want a third party interfering to the extent that it forgets its basic function of securing the nation’s borders, then lots of luck with that, because you wont even have a nation to live in or a government to protect you from unfair trading.
In real estate, the driving priority is location, location, location. In government, the driving priority must be THE BORDER, THE BORDER, THE BORDER.
ARTICLE 14 of the US CONSTITUTION: . SECTION 1 defines a “citizen” as one born here or naturalized. . SECTION 2 defines “state apportionment” as being based upon . . . . . . . . . . . the “numbers” of people in the state, excluding . . . . . . . . . . . “indians”. From this we can infer that only citizens . . . . . . . . . . . be counted in determining each state’s . . . . . . . . . . . representative count. Several Amendments after Amendment 14 make it clear that only “citizens” may vote.
2. ELECTORAL & CONGRESSIONAL APPORTIONMENT:
Each state automatically gets 2 electoral votes for its 2 senators plus its representative apportionment based on its percentage of the total population. This means there are 100 total electoral votes over and above the electoral votes based upon population, which makes it possible for a candidate to win the electoral votes while getting less than the popular vote.
Why is this so? The original Constitution was ratified by the states, each state being counted as a person. This continues to be recognized & serves as a protection for the lesser populated states from being dominated by the more populated states. Its only fair. Besides that, the states are the ones who can vote to amend or end the Constitution, since they are they original grantors.
As previously mentioned, each state should get additional electoral votes based upon its percentage of the total citizen population. And the number of representatives allotted to each state should equal its electoral vote. So the whole voting system is proportional and fair. .
Yet democrats are constantly heard complaining about the electoral college claiming it to be a “Threat to their democracy”. This is pure nonsense. They are GREEDY IDIOTS. First of all, our nation is not a “democracy”. It is a “republic”. Only more local areas like counties and cities can call themselves a “democracy”. States are “semi-democracies” because propositions are submitted directly to the electorate. But for that, states are also republics. Their idea of “democracy” is a primitive one that would utterly destroy the idea of a united states. If you are going to play identity politics correctly, then you better differentiate between citizens and non citizens and protect state sovereignty. Otherwise you don’t have a nation, you have a cesspool.
Citizens have a duty to protect each other from wrong, regardless of race, sex, color or creed. CITIZENSHIP IS THE ONLY THING THAT BRINGS US TOGETHER AS A NATION, NOT HUMANITY. Humanity will never bring the world together, because it is always mistreated one way or another. The humanity of today boils down to robbing from one to give to another. It is contrary to free voluntary gifting.
No matter, to democrats who are trying to dumb down US citizens by saying “Democracy is for all people where ever they are and regardless of citizenship”. So yes, citizenship is a threat to “their” primitive democracy. Why do you think the Biden DOJ/FBI seem to be harassing only US citizens and not illegals?
3. HISTORY OF US CENSUS SINCE 1950:
The last time the US census counted the number of US citizens was 1950 at which time there were 151 MILLION citizens of which 31% were children or roughly 51 MILLION children. In 1952, there were 66 MILLION voting citizens. Since 1950 the government appears to obfuscate the census counts, failing to differentiate between citizen and non-citizen populations, thereby distorting each states apportionment of House representative & elector count.
From 1960 onward. we have the following; 1960: 179 MILLION 1970: 203 MILLION 1980: 227 MILLION 1990: 249 MILLION 2000: 281 MILLION 2010: 308 MILLION
In order to determine the number of real citizens as distinct form the number of non-citizens without a distinct number being provided, the only way to approximate the number is via reverse computing. Given a) the total number of presumed citizen voters in a national election, b) the voter turnout, c) the total population, & d) the percentage that are children, it is possible to estimate the total number of citizens, x = a/b- 1/2(c*d) . But this is only a rough estimate & depends upon correctness of the numbers given by the government.
So, for the 2020 election we have:
Voted for Biden in 2020: 81 MILLION Voted for Trump in 2020: 74 MILLION a) Total number of adult citizen Votes: 155 MILLION
b) Voter turnout in 20202: 66.8%
Total number of adult citizen(?) voters: 155 / .668 = 232 MILLION ADULT CITIZENS
In 2020 the total 2020 population was: c) & d) 331 MILLION of which 73 MILLION were minors. Half of children estimated to be citizens: 36 MILLION
Total number of citizens including children in 2020: 232 + 36 = 268 MILLION CITIZENS
Total number of non citizens in 2020: 331 – 268 = 63 MILLION NON-CITIZENS
The national DEFICIT is the current year amount spent minus the current year taxes collected. If more money is taken in than spent it is a SURPLUS. The national DEBT is the accumulation on national deficits over the years. It can only be relieved by surpluses.
The national debt:
In 2000, it was $5.5 Trillion
GWB increased it by $4.4 Trillion to $10 Trillion
Obama increased it by another $9.5 Trillion to $19.5 Trillion.
Trump increased it by another $8 Trillion to $27.5 Trillion
and Biden will increase it by at least $10 Trillion to $ 37.5 Trillion.
Trump is the only one showing a diminished increase. He was not in for two terms. But neither will Biden be in two terms.
B. DEMOCRATS DESTRUCTION OF RATIONAL LIVING & ELECTIONS:
Illegal non-citizens are the perfect paradigm for the democrat global warming issue. After all, they walked here and did not drive. Do democrats really believe they are going to continue walking once they get here? Do democrats really believe that illegals are going to continue voting for them once illegals settle in?
What the democrats have done is to take the BIGGEST POLITICAL GAMBIT IN HISTORY PUTTING IN JEOPARDY THE LARGEST GROUP OF PEACE LOVING CITIZENS EVER IMAGINED.
Democrats are deliberately destroying our democracy by exacerbating election difficulties via allowing untold numbers of foreigners to trespass into our country. Probably one of the greatest difficulties in conducting an election is knowing who is eligible to vote and who is not.
Counties are are suppose to be the first resource to determine this, because they are the central hub for identifying property tax payers. But the property tax rolls only identify property owners, not renters or homeless people or resident non-citizens. Therefore, each county registrar is supposedly charged with the task of identifying citizen voters.
Instead, the states appear to have taken charge of that task. And in so doing have made the task more inaccurate by requiring the motor vehicle departments to register non-citizens for voting as if they are citizens. As a result, the US Constitution is being violated, not to mention the near impossibility of obtaining a drivers license.
It should now be clear to every US citizen that the Democratic Party has become a traitor to our democracy by obfuscating the election process and employing the inflow of illegal entrants in the hopes of maintaining power. They are not without help from some very stupid republicans, aka, RINOS. Those now working in government need to ask themselves how far they are willing to go for a worthless paycheck.
It is clear that democrats have not inspired trust in our election system by maintaining open borders. That fact, coupled with the wide flung use of electronic election systems leaves the US citizen with very little confidence that elections are not rigged. It can be said that no matter which party is in control of the election process, without the electorate being able to validate their own counted ballot and see the accumulation of actual ballots counted for a particular candidate after the fact, there can be no confidence in the electronic tabulated election results.
D. DEMOCRATS PROPENSITY FOR LAWLESSNESS & VIOLENCE:
ANTIFA & BLM are two violent groups that democrats seem to love. Where they certainly have a right to speak, they do not have a right to attack and loot businesses, setting them on fire. Contrary to the idiot reporter who can be quoted as saying “This is a peaceful protest”, NO IT WAS NOT. And contrary to the phony democratic party J6 committee claiming J6 was an “insurrection”, NO IT WAS NOT. On J6 there were at least two murders by Capitol Police of which democrats are proud. SHAME ON THEM!
To further their gas-lighting of the American citizen, they claim that “Domestic Terrorism” is on the rise while allowing in real terrorists. “Just look at all those lawless citizen vigilantes supporting Trump who is worse than Hitler”. Yata yata …. yata. How many times now have we heard the term “domestic terrorism” used by Biden’s corrupt DOJ coupled with the democrats slur, ‘Islamaphobia”. Such rhetoric only inflames a society that was evilly attacked by radical Islam on 911 & then told they were not a Christian nation by a deceitful president who used his power to persecute them further. If they had any intentions at all of promoting domestic tranquility, all they would have to do is to BAN SHARIA LAW which is not a religion. Sharia Law is a core part of Islamic ideology and stands completely incompatible with western values. 1948 India should have shown any intelligent person how dangerous Islam Sharia is to western democracy. I would dare say, if you wish to worship Allah instead of Christ, be my guest. But don’t try to push your bull poop laws down our throat.
E. MASTERS OF DECEIT. The Democratic Party Ukrainian Playbook
Where fascism and communism have been traditionally seen as opposites, it would seem that the current Democratic Party, in conjunction with neo conservatives, has practiced a hybrid combination of these two opposites, sometimes appearing as communistic and other times appearing to be fascistic. No matter their ideology, there is one most evident characteristic, ie, their desire to stay in power no matter the cost. And the Ukrainian coup of a duly elected president in 2014 is their playbook.
Note that in 2011 the President of the Ukraine was democratically and legitimately elected. The events of 2013 and 2014 led to an unconstitutional overthrow of the government spawned by neo facists. Today we are very close in this country to repeating that unlawfulness and violence.
This fascist coup of a democratically elected president that took place in the Ukraine in 2014 is the model for todays Democratic Party strategy. When they are out of power or when their power position is threatened, they will stage violent demostrations to make it look like the opposition party is at fault. Just look at how they have staged the Jan 6 “insurrection” which was not an insurrectiion. Compare that to the George Floyd “peaceful” demonstrations that preceeded Jan 6.
The key thing in understanding the Ukrainian 2014 coup is in identifying WHO AUTHORIZED THE POLICE TO ATTACK THE PROTESTORS, knowing it would result in more violence.
Answer: He was known as YATS, the leader of one of the minority fascist parties.
In other words, he was instrumental in getting the opposition government to attack the very protesters he had encouraged to demonstrate at the capital. But he also alerted the protesters, because they were ready to deal with the police when they came. So it was a guaranteed violent clash. It was a perfect Alinsky setup to create a crisis.
Did we not see this same thing happen in the Jan 6 protests when it appears evident that the FBI had embedded operatives to incite violence among the crowd? If not, then please explain how some very obvious inciters of violence were not even touched by the justice system while other more innocent people were given the meanest treatment. This is why it is most important to understand the truth of the 2014 Ukraine coup.
F. DEMOCRAT PARTY DESTRUCTION OF ECONOMY:
This brings us to a discussion of taxation and government spending. How to disperse collective funds will always be an issue as long communism exists. Communism is not Commonism and visa versa. And printing more money is not the answer.
Dispersal of collective funds should only be based upon the common agreement of donors. Not by some dictator. Citizen taxes should only go to the protection of citizens, not non citizens. And the dispersal of funds for reparations of non existent damage is an abomination, as is the dispersal of funds to enemy nations. Dispersal of collective funds for health care should be limited to citizens only.
It might be reasonable to allow permanent resident non-citizens to participate in Social Security because it is a forced savings program not funded by citizen taxes. But certainly Social Security should not be extended to foreigners or adversaries.
At the current time, Congress is failing to observe these principles of funding in performing its duties. Republicans have been a big disappointment in countering the destructive Democratic Party that is doing everything it can to destroy this country while printing and spending money irresponsibly.
CONCLUSIONS: Since 1950 the government appears to obfuscate the census counts, failing to differentiate between citizen and non-citizen populations, thereby distorting each states allotted House representative count & elector count.
IT IS CLEAR THAT THE NUMBER OF REPRESENTATIVES FOR EACH SANCTUARY STATE IS BASED, NOT UPON THE COUNT OF CITIZENS AS REQUIRED BY THE CONSTITUTION, BUT A COUNT OF ALL RESIDENTS, NON CITIZEN AND CITIZEN ALIKE. AS A RESULT EACH STATES NUMBER OF ELECTORS & HOUSE OF REPRESENTATIVES IS ALSO OVER STATED
I will judge Democrats EXPECTING THEM TO BEHAVE AS I DID WHEN JFK AND RFK WERE ASSASINATED. AS A THEN REPUBLICAN, I WOULD NEVER, NEVER BLAME THE VICTIM OR HIS PARTY AS BEING TO BLAME FOR THE VIOLENCE VISITED UPON THEM, AS JOE BIDEN HAS DONE IN BLAMING TRUMP FOR THE VIOLENCE AT HIS RALLY. JOE BIDEN IS A CLASSLESS POS.
There are 2 basic units of measureables in science:
1.MASS which is the amount of matter & implies UNITY. A distinction needs to be made between basic mass and aggregate mass. Scientists today continue to break down mass in search of the snallest basic particle, hence the basic mass. So far they have proven the Higgs Boson to be that particle. Mass is seen as being proof of existence.
2. DISTANCE is the separation between two identifieable masses. It implies an area of space, ie, non-existence. Time is closely related to distance and seen as dependent upon distance. So it is seen as a co-dependent feature of distance.
3. Other units of measure considered to be co-dependent upon the two basic ones:
HEAT
PRESSURE
FORCE
CURRENT
VOLTAGE
ENERGY
etc
I am sure there are others.
But these all resolve to mass and distance.
CONCLUSIONS:
Today there is talk about space as if it were a fabric having mass. I just cant see that.
There is other talk about going back in time.I cannot see that.
There is also talk about multi-dimensions.
Dimensional idemtification is nothing more than arbitrary establishing directional reference.
Multi dimensions may serve a purpose in attempting to describe a reality, but has no reality unto itself.