I dreamt that I drove in pitch darkness with an empty fuel tank in the middle of nowhere only to get to my best friend so he could tell me about his idea for a startup. Now that I woke up, I still think it’s an incredible idea. Since both of us lack the resources to actually pull it through, I’m going to share it with the rest of the world and if anyone interested in picking it up, talk to me.

He named the idea “Among friends” and it’s essentially like classified ads but slightly more interesting, because it’ll have things like “I have 2 giveaway tickets for a show in Glasgow tomorrow night” or “any interesting hiking ideas for the weekend?” or “I’m looking for interesting vegan dessert recipes”. My friends can provide suggestions or link to other people posts (such as “I’m looking for tickets for tomorrow’s show!”). Imagine classified ads that are prioritised by your friendship relatedness.
The things you offer or look for can have an expiration date, making them more critical and important ; They can be location-based to make them more relevant, but the important part is that your actions get scored: If all I do is giving loads of shitty tips, I’m just spamming the system; but if I help people solve their problems, I become a valuable friend. If I re-post a friend’s problem or vouch for a solution I help resolving a problem.
The technical challenging part of building such a system would be understanding the text, in order to avoid context-based forms (“oh, a recipe? so fill in the ingredients and the instructions and tag whether it’s gluten-free or vegan or kosher…”). Forms discourage people. The system should work in plain language.
The future of social networks is in a turmoil as Facebook are checking the boundaries of what they can do and how can they profit, following their connection to the US election fiasco. Their business model has evolved tremendously over the years but in general, it always went towards the hyped “status” (or “public notifications”) as used by twitter. For that job, I think twitter is great (it was even better when it forced messages to be condensed) and I would leave that aside. I dare to think that the next stage in social networks evolution won’t be about what you got to say, rather then what you got to offer to solve my questions.

Originally this blog aimed to cover both technical aspects and the philosophy issues related to my Theodorus project (which I’m somewhat shameful to say isn’t really progressing as I’m busy with other stuff, such as blog-writing). So this post is going to be very technical and probably won’t interest some of the demographics, yet as I write to my own amusement you may choose to skip this one, or not.

As most of modern day programming languages (ES6 included) have classes, we’ve grown used to them, but as originally javascript works differently, I believe it forces us to a better understanding of what classes actually are. The original “C” didn’t have classes either, but it had “structs”, which is a collection of other structs and basic type variables, like integers and array of characters (later to evolve to strings). And then someone came up with the brilliant idea of adding methods into those structs, and thus C++, the upgraded version of C, had classes. So now we have classes which are strongly related to Object-Oriented-Programming (OOP). The idea is to encapsulate methods and information regarding a certain business-logic concept. This assures “safer” interaction between several concepts as they are forbidden from touch each other private parts.

OOP is bad. But our head is so wrapped around it, it’s kinda hard to think past it, and here is where javascript comes to the rescue. Javascript, being the only prototypal language, talks about different scopes, where each function creates a new scope on top of the current scope, while keeping all underlying scopes available, so this code will work:

(function external() {
  var foo = 1;

  (function internal() {
    var bar = 2;
    console.log (foo+bar); // output 3

  console.log (bar === undefined); // output is true

The “bar” variable existed only within the internal function and once it passed, it died. but note that “foo” variable was available in the internal function as well. How about this code:

(function the() {
  var foo = 1;
  (function plot() {
    var foo = 2;

    (function thickens() {
      console.log (foo); // output 2

    (function further() {
      var foo = 3;
      console.log (foo); // output 3

  console.log(foo); //output 1

As the scopes are stacked one on top of the other, each function will first find the nearest variable with the name it’s looking for. It’s worth mentioning, though, that accessing lower levels of the scope is more expensive than the immediate levels so it is better to pass the variables along.

However, despite creating layers of scope, the magical word “this” which is often used in many languages still points out to the enclosing object, and in our example – it’s the same object. But we can create a new enclosing object using the word “new”:

function Bar(){}

Bar.prototype.whoAmI = function () {

return this;


var foo = new Bar();

console.log(this); // output "Window"

console.log(foo.whoAmI()); // output "bar(){}"

you might have noticed the word “prototype” there. Javascript functions have an object attached to them called prototype, which is a collection of functions that all new instances of the enclosing object will “inherit”. And that’s great, because I can create an object, let’s say “foo”, which is an instance of “Bar” and if now I’ll add a new method to Bar’s prototype, foo will be updated as well!

function MyClass(){}

var instance = newMyClass();

console.log(typeof instance.myMethod); // output "undefined"

MyClass.prototype.myMethod = function () {
  return true;

console.log(typeof instance.myMethod); // output "function"

So unlike any other language, with javascript I don’t need to initially declare all the class’ capabilities. I can do it whenever I want, if I want. I can also have my class inherit several prototypes. so my Robo-dog can have both dog and robot attributes, and not forces to extend only one of them.

So finally, look at this code:

function MyClass() {
  this.constructor.apply(this, arguments);

  // list all exposed functions:

  return this.main;

// list all functions, internal should start with '_'
MyClass.prototype = {
  constructor: function () {
    console.log(arguments); // output: 1,2,3 along with other stuff
  main: function main () {
    return 'main function running';
  external: function external() {
    return 'bar'; 
  _internal: function internal() {
    return 'internal';

myInstance = new MyClass(1,2,3);
myInstance(); // output 'main function running';
myInstance.foo(); // output 'internal' and 'bar'

This code has some nice gems in it as it obfuscate (but not fully hide) code you don’t want everyone to access. It’s puts away the constructor in a separate, more manageable, function; it clearly lists all the function we would like to expose, and allow us to have external name (in our case “foo” is internally called “external”) and if we expose only the created instance and not the class itself, no one would be able to see the code of “_internal”.

So in conclusion, Javascript classes are not so much about OOP-driven, rather than a tool to manage your code better. It’s not about working hours on end to define your interface and abstract classes only to realize the world isn’t modeled as you think (been there, done that), rather than a way to group functions together and say “hey, dataObject, I want you to bark().” –

DataObject.prototype.bark = bark;


Usually the distinction between fantasy and science fiction stems from the first including wizards and dragons while the latter is all about technologies and spaceships. I would claim that fantasy stories more often than not are about a journey in which the hero matures while science fiction is trying to deal with some hypothetical question. “Star wars” in my distinction is actually a fantasy story, despite having spaceships and droids, while “Captain America: civil war” had the potential to become an excellent sci-fi movie had it contemplated on the privacy-vs-security a bit further and not break down to sheer brainless action.
That said, I think Netflix’s “The Circle” is a very good (and horrifying) science fiction movie. Although that unlike “Brave new world“, where it’s actually quite difficult to put the finger on what is exactly wrong in this engineered-to-perfection society, “The circle” isn’t that sophisticated and just like its protagonist, it’s partially excited about the upcoming technological advancements but it’s also terrified of them at the same time. Ignoring the acting and plot and whether they were un/inspiring or un/predictable, I enjoyed contemplating the deep questions that the story raised. I think it’s an interesting story to talk about, much like the movie “Idiocracy” which I found to be incredibly… well… idiotic – it’s not the portrayal of the story rather than the question that lies underneath it that are interesting. In the “Circle” case the questions would be “are we ok with key individuals owning all our information? are we ready to give up on our freedom and privacy for the sake of security and brain-numbing entertainment?”
The movie discusses people’s behaviour when they know they’re being monitored. The protagonist claims, without anyone refuting her or suggesting an alternative, that people become better and don’t do “bad” things when they know they’re being watched. I disagree as it boils down to the question of “who decides what is good or bad” – is having sex is good? is protesting against the government good? Being monitored doesn’t make a person “good”. It makes her “obedient”. Being monitored will prevent the average citizen from breaking the law, from fear of being penalized. Changing people’s behaviour by fear means surveillance is a form of terror. And what if the law is bad? if you’re pro-abortion and the law forbids it? if you meat-eater and the law forbids it? when you have different religious views from the state? or you’re simply a dancer living in Bomont? In its fundamental form, Law is an assertion of power by the people who have it over the rest. Surveillance just gives them more power. You might say that you live in a democracy so by definition you’re the one making the law, but seriously – when was the last time you passed a bill?
Laws aren’t “good”. They might even be “bad” as they’re limitation of power. Laws are a necessity made to limit exploitation of power and we should look carefully against who are they being used because more often than not, people with true power are exempt.
I haven’t read the “Circle” book, which I guess elaborate or portrays the scene differently but at some point the protagonist commits a crime (as she mistakenly believes she’s being unsupervised) but when caught, she confesses and accept to have a “transparent life”, broadcasting her every daily activity (with limited time to go to the toilet). In the movie it might be portrayed that she converted and is now happy with this verdict but personally, I saw it as a punishment. Imagine your life being constantly monitored by anonymous crowed who can comment on your behaviour and looks. After the commons turned AI into nazi, do we truly believe that such form of constant feedback is “mostly” positive?
I was curious who is actually following the protagonist as she received comments from all around the world. Emma Watson is an attractive-looking lady, I’m pretty sure she’ll get many more followers than, say Patton Oswalt (who also plays in the movie), but it’s an interesting to note that her character in the movie didn’t follow anyone herself (so no “following-everyone” culture). Probably because it didn’t contribute to the plot but also because it’s boring to watch someone watching the life of others. The protagonist accept a role of a “content-provider” with millions of watchers – all of which are boring bored people who have nothing to do but wait for the second she gets online in order to greet her “good morning”. That’s another horrible dystopian faith lurking – will our lives absolves into nothingness and watching “big-brother“, being too lazy, tired and broke to actually do something ourselves. A long time ago I read a Canadian blog in which the author counted his favourite activities – reading, writing, walking and meditating. All are free; all require time. But who has time when you’re too busy working to get paid and watching television with the money you’ve earned? But modern day workplace doesn’t allow you to work just as much as you need – a full-time job is required and the “circle” demands even more. it demands your soul (so it seems).
Surveillance issue aside, a workplace that requires 24-7 commitment and expects its employees to attended the non-mandatory events voluntarily should be called “prison”. Perhaps it was a satire but it pretty much resembles my experience when visiting a real-life EvilCorp. This really makes me appreciate my current work-place: Despite my general preference of telecommuting, my current office is in the middle of lushes fields, 20 minutes drive from the home; I work 8 hours a day, including lunch break and approx. a 1hr run twice a week or so. As for the rest of the time – it’s mine to choose what I do and with whom I do it. My work isn’t measured by a punch-clock nor by level and commitment and loyalty to the company, rather than by the output produced. At the end of the day – this is all that should matter. It seems to me that the circle is not a good place for introverts as they to value their privacy too much. Set aside that constant surveillance at the work place is downright illegal, one might claim that “good” employees have nothing to fear, but in reality it curbs creativity for the fear of making a mistake, it creates distrust (as clearly the employers don’t trust their employees), motivates employees to “keep their head down” regarding things that bother them (thus making them bitter) and it prevents the use of aggressiveness as a form of response – usually it’s a good thing, but sometimes less so.
Constant surveillance at the workplace wasn’t the only privacy violation portrayed in the story. For some reason the story didn’t talk about their legality, rather than merely raised an eyebrow. I felt that it somewhat trivialised these crimes; In one scenario the protagonist is informed she drank a medical sensor after it’s already inside of her, without her consent. That’s a doctor’s malpractice. Another scenario was of the protagonist checking her parent’s home-installed cameras until she bumps into them in the middle of some sexual act – pretty much like entering somebody’s home without their approval or knowledge. Nowadays such a privacy violation is purely illegal.
As part of their discussion, the protagonist suggest, to the dismay of her friend who had a change of heart, that everyone should be forced to vote and voting should be done using the privately owned Circle service. Set aside that not-voting is a legitimate way to express the dismay from the political system and its candidates, forcing everyone to share their political opinion to a non-accountable third-party will in no way lead to proper functioning democracy. Forcing people to vote in an oppressive regime is how you get 99% votes in favour of the current dictator. This is how tyrannies work. The protagonist also suggests running government functions, such as paying taxes and voting through privately-held infrastructure, without addressing its legalities, and instead talk about forcing citizen to be registered to the system. It’s worth referencing the Israeli’s attempt to create a unified biometric database of all its citizens and the threats that arise from such an atrocity (imagine this database hacked, where will the citizens get a new fingerprint?). There are two politicians presented in the Circle story – one who questions the company’s motives and quickly find herself under an FBI investigation (as an example of power-exploiting) and the second one that embraces its full-transparency paradigm, at least officially. A legislator explained to me once why he rejects open-doors conferences – “because then the conference will become a circus show and all the deals will take place in shady alleys”. I disagree with him of course – yes, shady political deals will always happen – but it doesn’t mean we should encourage them by providing them a nice and comfy, well-lit room.
I do still think there is a solution that can work in such a technological world, and it lies with the understanding the information has ownership. I should be entitled to know where my information is being used, by whom and for what. There’s not much of a difference between a person stalking me and learning about my routine in order to gain advantage on me and a computer doing the same thing surgically. There should be a law telling me what does the machine knows about me; tell me who has access this information and will allow me to better moderate my behaviour than simply fearing that my data is accessible to everyone at any given time. This is my information and my consent should be required if anyone wants to pry to into it. Imagine that Facebook had a premium version in which your personal data is not accessible to anyone – not even Facebook themselves (I can filter out my own newsfeed, thank you) and it would cost – say 10$ per month. users will then have the option to pay for FB service or enjoy their service for free, in exchange of selling personal information for the same price. Keep in mind that today Facebook’s service is free in exchange for not only giving away personal preferences but foremost being exposed to ads.
There’s nothing technically wrong with digital voting, if you ignore the fact they are much more prone to fraud. The problem with the idea they suggested in the movie is the over-centralisation of all the information (knowledge is power, remember?) to private hands. So why not decentralise it?
can’t we have similar voting tools but running separately? Let every county and every state run its own system, which is open-source and crowd-sourced (not to have a single owner with his own back-door), but still online-accessible?
Apparently the movie was a flop in the box office, presumably because people were not impressed by the dystopian very-near-future it represents, citing that it’s already here, although my conspiracy-theory is that EvilCorp encouraged the media to suppress it by belittling its performance and dismissing the idea behind it (“we probably already live in a scarier world […] than the one The Circle presents as a cautionary tale“). As I said I didn’t bother with the film’s quality on its own so I’m left to be disturbed by the fact people find it an acceptable reality. placing surveillance equipment wherever some pervert or a shadow-government wants should not be ok, not matter how wonderful it is when it saves lives. Even when a stalker saves his victim from some harm – it does not means that stalking should be an acceptable act.
It is not clear in the movie whether the protagonist accepts the company zero-privacy paradigm as it seems through-out the story that she is appalled by it – does she embrace it as a positive thing? deter from it, or reluctantly accept it? This ambiguity fits well with the movie fairy-tale ending, which is different from the book’s grim and hopeless ending. And maybe that’s the movie biggest shortcoming as it tried to both attack the zero-privacy culture on one hand but to embrace it with the other, claiming that zero-privacy can be done “properly”. I claim that it’s not, and once people’s nude photos are exposed from their private personal cloud there is no going back.
Perhaps zero-privacy should be an acceptable as it is inevitable but we as civilisation should first embrace zero-intolerance towards anything that might be hidden, less we accept living in fear that we will be branded out because of our exposed secret (sexual preference? psychological misbehaviour? political opinion? religious belief?). The movie ends in a somewhat disappointing place where the protagonist accepts reality with no privacy but with the help of deus-ex-machine makes the world a little bit more equal (I dare not spoil), while the book has a grimmer ending in which she accepts the indoctrination without the miraculous “zero-privacy is bad but we can make it work”. She just shrugs her shoulders and moves on. Pretty much like the movie’s reviewers…

This weekend I had the pleasure to attend the CancerDataDive Hackathon hosted by ProductForge at CodeBase. The general idea is gather around a bunch of young enthusiasts for an intensive work and try to come up with cool innovative ideas and proof-of-concepts. This is a great idea for an institute to get developers pay to contribute their skill and capabilities for its endeavor. I also learned that sometimes companies use Hackathon as a recruiting tool. To be honest, I think it’s actually a good idea as you get to see people work and interact with others in something that does feel like fun (as opposed to “feels like work”). I have some reservations as this intensive, incredibly-loud and overly dynamic environment doesn’t really represent real-life (and defiantly not my cup of tea), but still – coping with such intensity should qualify as a good trait.

My 2cents would go for the team-formation-part as I was rushing for another event and I tried to make it as efficient as possible. Fortunately, I immediately targeted the single person who mentioned he had an idea for a project and teamed up with him (later to be joined by 3 other gentlemen). The rest of the people were struggling to both find reasonable teammates but also come up with a startup idea at the same time. I think it might have been much more productive if we could first brainstorm ideas and then create teams based on commitments to ideas rather than “well, these folks don’t strike as psychos, now we need to think what we can”.

For whatever reason, my team decided to base our application on Meteor.js. As I admit that my preferred style of vanilla.js is not feasible for fast-pace project I agreed, hoping to learn more about this framework.

We didn’t try to publish to mobile app, which Meteor presumably allow so I cannot comment on that but I can tell that I found myself cringe as Meteor expect/allows you to write the db-access function in the front-end. In that sense, it doesn’t differentiate between client-side and server-side at all. This flaw isn’t crucial only when you have (near-to) unlimited bandwidth, otherwise your app will falter once you’re actually trying synthesize large volumes of data and send to the front-end only a sub-set. You, as the developer, won’t have the ability to handle it.

We actually came to this problem as reading data from the database happens presumably synchronously but in reality it returns an undefined value only for the function weirdly run in a loop until the data is retrieved. That’s probably one of the worst ways to hand asynchronous command. Instead, I would have advised to pause the code until a response is retrieved (mind not to hog the cpu, though – only the thread) or fork to a separate thread once the data is retrieved.

Another task I found unreasonably daunting is updating a the screen once it already displayed. Yes, I could simply write to DOM myself (which I eventually did) but as Meteor is based on Mustache.js, I didn’t find how to tell the template to re-run itself.

Lastly, accessing component’s variable kept changing depending on the current function – one time it’s this.variable, sometimes it’s this.data.variable and other times it’s Template.instance().variable. Weirdly enough Template.instance() doesn’t indicate which template is being referred so calling a template’s function from a parent function might introduce the wrong template’s scope. Ultimately, for the quick-and-dirty job required, Meteor pulled through, without wasting too much of our time, but for longer hauls I’d rather go Vanilla or any smart framework.

That said, I did enjoy rapid development. It’s incredibly reckless (no time for testing) but I understand why customers would like it as it provides results very quickly. We discussed the financial cost of medical errors, which amounts to roughly 25% of the ministry of health’s budget – and let’s assume this number is right for software bug fixing as well – how much time/resources should we spend on writing tests beforehand? The cap would probably be 25% so I understand why customers would like to save that portion of the money but in reality it’s going to be spent one way or the other.

However, what I learned from this project is that development is incredibly unimportant for hackathons, which is quite sad for the amount of developers that attended – The entire event revolves around thinking about cool ideas and pitching them in  1 minute talk and then a 6 minute presentation. You don’t have to – in fact, you’re expected not to – show your working application as experienced taught them that 72-hrs-worth code is too likely to break down. So my advise is to simply not code at all, rather than make a beautiful mockup and a presentation filled with pictures of cute puglets. Yes, your presentation should talk about your ideas feasibility – both in the sense of development and in the sense of legal issue. That’s why it might be helpful to have an engineer-mentor and lawyer-mentor to give advise but generally – Hackathons are for people who collaborate on ideas and not necessarily on code.

A friend of mine once convinced a foreigner that Hebrew has merely 14 words and the entire language is derived out of these words. I recently wondered how gullible must that foreigner be, or is it actually plausible. Reaching the full spectrum of a reasonable language while being constrained to 14 syllables is a bit far-fetched. But what if it was 14 characters and not words? Can we reduce the English language to a small type-set of 14 characters?
For a stater, let’s say we’re keeping only consonants and we’ll use nikkud (a form of punctuation) instead. like in this example in Hebrew, in which the red dots indicate how each consonant should be pronounced – 

After that, we can omit duplicate consonants while still retaining all the available sounds – “x” can be pronounced with “ks” or “z”, “f” can be pronounced with “ph” and so on.
Talking about this with a friend as I fell in love with the intriguing challenge, as he sent me a video of Karina Galperin explaining why Spanish language should be simplified in order to promote equality. This approach, in fact, sees languages a political tool whereas people might be classified according to their spelling capabilities . Coincidently I came across this video of a thrilling spelling contest and it actually made me cringe at the prospect of a language priding itself in being impossible to spell. Language is a tool aiming to help us communicate with one another – preferably as clear and disambiguous as possible.
I googled for the most efficient language and learned that English is actually considered very efficient, which for me meant the bar is quite low when aiming for “the highest possible degree of logic, efficiency, detail, and accuracy in cognitive expression via spoken human language, while minimizing the ambiguity, vagueness, illogic, redundancy, polysemy (multiple meanings) and overall arbitrariness that is seemingly ubiquitous in natural human language“. This has lead me to Ithkuil which is an engineered language, built to be extremely profound but sadly very complex to actually be use (which reminds me the old joke about IBM: “it may be slow but it’s hard to use”). Engineered languages are unlike our normal everyday languages as they haven’t evolved through the course of centuries to include all sorts of weird exceptions (side-note, Do creationist believe in the evolution of languages?). Instead they were preconceived and presumably their creators could have tackled all the problems beforehand. A language, like a software code designed for Space-shuttles, better be right on the first time as “fixes” take generations.
When engineering a language, one must ask whether it should be a relatable language that sounds pretty much like another language (like all latin-based languages are similar) or should it be secretive that no one else could decipher?
During WW2, the Americans used Navajo-native speakers for radio-communication. Navajo, being completely unrelated to any other European or asian language (and having complex grammar regardless) was impossible for the Japanese to decipher without having a native speaker to simply understand it. The story of the WindTalkers is quite incredible on its own.
We should also ask how deep are we ready to go? simply make a unique typography? Perhaps change the way the sentence structure or even fundamentally change the grammar rules into something completely different. I tried tackling those questions on my presumptuous attempt to simplify the English language with a complete disrespect to traditions or reasons that were lost in days past.
For typography, I decided to use the standard latin characters, because many people know how “m” sounds like as opposed to “צ”. Also, creating a new typography means losing all the years of work of thousands of people who created beautiful latin-based fonts.
There are no capital letters in my language. I don’t think they’re necessary. My only exception is that I would use the uppercase “L” instead of the small-case ambiguous “l”. 
Character-set can either be maximal, with vowels and each character having a single sounds (but not having duplicities) like most of the Cyrillic-script languages; or minimal, using consonants and a method to make stronger and softer (much like having “h” after “s” creates a new stronger sound “sh”). I decided to go with the minimal approach as I figured it will take less time to learn the different characters:
  • My set of 15 characters is “a b g d p h L m n r s t y z”
  • Additionally, b̝ becomes softer, to “v” (like in “victory”).
  • g̝ which normally sounds like in “game”, becomes “j” (like in “James”)
  • k̝ which normally sounds like “kangaroo”, becomes “ch” (like “cheetah”
  • p̝ becomes “f” (like “fantasy”)
  • h̝ becomes “kh” (like “akhmed”) or the Spanish sounds of “j” (like “Javier”)
  • s̝ becomes “sh”
  • t̝ becomes “th”
  • y̝ becomes “w”
  • z̝ becomes “zs” (like “Zsa Zsa Gabor”) or “zh” (like “Doctor Zhivago”)
 As I mention, I decided to omit the vowels (leaving only the consonant “a” for the actual sound that you can hear in “apple”). It’s not a simple decision to make, but I think we can learn to read without the vowels (“ppl, u cn hndl ths!”) and it’ll make the words shorter and therefore more digestible. Instead I’ll have nikkud. For this challenge I used characters that appear in standard fonts (although not accessible in common keyboard layout).
  • b͒= ba, sounds like “dad”. It looks like your eyebrows when you try to put on mascara.
    b̆ = bi, sounds like “dip”. It loos like a smile.
  • b̊ = bo, sounds like “mom”. it looks likes an “o” shape.
  • ḃ = bu, sounds like “room” (side-note: I challenge you to find a 3 letter english word that has “u” in the middle that actually sounds like “u” (as in “room”) and like a short “a” (like “pug” or “mum”). It looks like a dot as it forces to close your mouth to purse your lips
  • b̄ = be, sounds like “bed”, doesn’t really look like anything; it’s just a “meh”-looking nikkud.
  • Lastly, there is an optional tilda below a letter to to hint it’s a long sound in order to help say a word properly, for example the difference between “Daniel” and “Daniel“:  “d̰͒n̆āl” vs. “d͒n̆ā̰l”. It can also be useful for a word like ṡ̰p – “soup” so it wouldn’t sound like “soop”.
Numbers are also very important. Inspired by Malcolm Gladwell’s observation on Math and Chinese, I would like my numbers to be short words as well. So rather than re-inventing the wheel, number are borrowed from the Chinese system: 0 (L̆ng) 1 (y̆) 2 (ār) 3 (s͒n) 4 (s̆) 5 (ḃ̝) 6 (L̆ẏ) 7 (k̆) 8 (b͒) 9 (ğ̝ẏ) 10 (s̝̆)
The real magic with the Chinese counting system is that there’s no eleven, twelve or any other strange name for numbers. 34 is simply “three-ten-four” (s͒n s̝̆ s̆) so it’s much easier for children to learn how to count all the way up to 99 and it’s makes their life much easier what trying to do simple arithmetics.
I tried to think of the most important words for communication – Yes (ȳs), No (n̊), I or Me (m̆), you (ẏ) and he/she/it (s̝̄). Plurals will be marked with the suffix ās (“es”) so the plural of y·(“you”) will become “ẏās” (pronounced “you-es”).
My language will not have “a/an” determiners. I think it’s useless as their existence makes the default sentence “I eat apple” meaningless. I believe I can do well without them. “The” determiner will be “t̝˜-” as it must come in conjunction using a hyphen with a noun, for example “t̝̄-d̄yt̆” (“The deity”).
English has 12 different tenses. I would like to have a better way to deal with this. Each verb should end with a suffix indicating its tense and time.
  • We’ll take the noun k̆s (kiss) with its verb k̆s̄ (“Kissing”, note that the name of the verb doesn’t include time-indicator), and we’ll examine all the variations of it.
  • Like in English, my verbs don’t indicate gender but I also omit the “s” that appear on for he/she/it (e.g. “he runs“). 
  • Verbs gets one of three suffixes to indicate the time – d (past), n (present) and L (future). The nikkud indicates whether it’s simple, continuous (equivalent to “ing” suffix in English) or perfect and whether it’s active or passive.
In English, when asking a question the verb “be” moves to the beginning of the sentence: “She is running” becomes “Is she running?”. As I don’t want the verb “Be”, I’ll use the Spanish technique to indicate the sentence is a question, having an upside-down question at its beginning – “¿s̝̄ r͒n̄n?”, or “¿ḣ s̝̄?” (“who [is] she?”).
On a technical note, in order to write this post, I used a great free “keyboard-layout-editor” app called Ukelele, in order to make my nikkud characters more accessible. removing 10 characters I didn’t need I had a lot more space to prioritize others things (like brackets for example). Being aware it requires adjustment-time, I enjoyed the idea of putting keys according to their usage-frequency (check out Dvorak’s simplified keyboard that unfortunately never caught on with the general public).
Getting the feel for this application, I played a bit further with the hidden potential of a “better keyboard”. One of the thing I did, as I had plenty of available space on my keyboard, was sorting all the number in a one-hand-accessible layout. I think this should be extremely useful for keyboards that don’t have keypad or lazy people like me who don’t want to move their hand all the way to the keypad –
A language becomes politically-biased as soon as you have honorary title, like the German “Sie” or the Italian “Lei” or being gender influenced more than it should – just see how much more complicated German has become when every noun has a gender, which to be honest is quite arbitrary (changing its “the” to either “der”, “die” or “das”). So no. My language is equal and neutral balanced. There’s no honorary title and there’s no other change in the language when talking about subject of different gender. “f̆” means ♀ (female) and “m̄” means ♂ (male). And on another side-note, I’m annoyed that most english words for females are derived from their male counterpart – “woman“, “female“. The etymology of  “wife” is actually “shame” and the word “girl”, to be honest, is quite derogatory. “m͒m͒” (pronounced “mama”) would mean “parent” whether it’s the mother, the father, the second father or the second mother (as modern family are much more complicated then a mere “mom” and “dad”.
I also decided that my language will not have a word for “god” or “holy”. these will be transversed to “deity” and “divine” respectively. I will also exclude the words “Husband” and “wife” (to be transversed to “spouse”), neither “man” nor “woman” (to be transversed to “person”). Nothing will prevent other people from introducing these words in the future, but at least as far as I was concerned, I think that for a time it would force people into a healthier perspective on religion and gender-equality
So this was my mental-challenge of simplified English. According to WikiHow’s on creating a language I should create a small dictionary to establish my language. I agree, as I think that “playing” with the language will help uncover exceptions or elements left unclear. But as linguistics ain’t my field of expertise and as fascinating (for me at least) as it may be, I should move on and perhaps get back to it if (for whatever reason) this article will gain traction. Personally, I’d love to explore further on the behavior of comparisons, adjective and adverbs in my simplified English. Perhaps in another lifetime.

A while back, I saw a video regarding blood-diamonds, which main conclusion is that blood-diamonds cannot be traced and diamonds cannot be certified to be conflict-free. It occurred to me to create an educational game and expose the developing-world biosphere in which blood diamond and other forms of atrocities can thrive.

With my usual limited warranty warning, I should confess it’s been ages since I played a computer game or an real-time-strategy (RTS) game and I’ve actually never played a Massively multiplayer online game (AKA MMPOG). But that never stopped me from yammering.

I would like to suggest a game that caught my interest. It sounded like something that should be out there so I checked the list of top RTS games of all times and they all classified as either historical, fantasy (i.e. orcs and elves) or futuristic or alternate-universe (honorary mention to World in Conflict). So nothing really fell close to my “modern-day” category. I call it “Warlords: think you can do better?”.

Our game takes places in a developing country and like any RTS, the goals are to gather resources, build an army and vanquish the enemy. The aim of the game however is to provide a realistic portrayal of a warlord’s conflicts and challenging the ability to keep morals and principles in a harsh environment.

In the single player’s first campaign, the player leads a raid-party. Starting off with a group of five foot-soldiers, the first mission is to steal a pick-up truck. The following missions are to expand the army by recruiting soldiers by either sheer volunteerism or with a little encouragement of kidnapping or threatening to burn entire villages if they don’t surrender their juveniles.

Unlike most RTS in which the player has different unique units, in this game, the player gathers an army of people, weaponize by whatever means possible and train them accordingly. This means that anyone can throw a grande if s/he has one, but only an experienced soldier can actually aim, and not kill himself accidentally. Also in this game, a soldier who loose limbs can still fight but they’ll never get back to their full potential. It’ll be up to their warlord to decide whether to leave them to die in the battlefield or carry them to health. Very quickly the player will realize that conscious is an expensive obligation.

The first campaign ends with the successful occupation of a mine, with a small help of a foreign agent, who hopes to bargain a better deal with the rising warlord, rather than the previous mine owner. So The second campaign is all about expanding the mining enterprise which requires, once more, recruiting people, one way or the other, to come and work for the warlord. The player will quickly learn that brute force is one way to do business, and another is padding the pockets of certain interests – such as law-officials or religious-leaders. On the other hand, he might be handed out some interesting offers (and later demands) from foreign business-men that happen to cross her/his path.

I’m not denying the possibly of a benevolent warlord who would try to protect her/his people from the cruelty of the other stakeholders, but s/he’ll quickly find her/himself outgunned and outnumbered as albeit it is possible to walk the paths of righteousness, it is really darn hard.

In the final campaign the warlord’s goal is the conquer the entire country, springing from his successful mining business to the top of food chain, mostly by eliminating anything that stands in her/his path.

The units of the game are mostly foot-soldiers with different weapons – from clubs, machetes, bow and arrows to guns, machine guns, grenades, rocket launchers and flame-throwers. There is also a small assortments of transportations units: motorcycles, pick-up trucks and small planes. In the final campaign, as the warlord fights against the country’s army – tanks, choppers and airplanes also come into play. However, unlike any other RTS game in which the player build a vehicle factory, this game is a bit more realistic in which the user can only order online or simply steal existing units. People, ammunition and vehicles are all limited.

Communication towers plays an essential role in the game as without them the user won’t be able to see enemy units on the map beyond her/his own unit range of view. Radio communications will allow her/him to send off hi AI units to remote missions, trusting them to manage on their own, as s/he won’t be able to get a clear status once they engage in battle.

Another important dimension of the game is the AI-unit’s loyalty, as at any moment unit might desert or turn treacherous if it believes the act will benefit it. But there’s no bar to indicate a unit’s loyalty level, the warlord must trust her/his own instincts for that. There are, however, satisfaction-polls to indicate the general feeling of an area or a squadron. It is the warlord’s responsibility to keep his units in check.

In the multiplayer game the player can band together with other players to create stronger coalitions, but can also tax them for protection money and all sorts of agreements that are not exactly well-balanced but more like real-life relationships between different stakeholders. Army bases exists in the multiplayer game and whoever gets to occupy them benefits from their arsenal (until it runs out of course).

Drawing back to the original point, I hope that the game will enrich the players’ knowledge about the developing countries’ state and how the developed world influences them by supporting such warlords and alike. My 2cents tip for anyone who wants to avoid having blood (diamonds) on their hands is simply stop supporting the diamond industry in general as stop believing that a little shiny rock on a ring means anything. but that’s just me.

On 16th of May 2018, the day the Palestinians refer as “Nakba (Catastrophe) Day” to commemorate their loss in their war against Israel (in 1948), at four minutes past ten o’clock in the morning, the prime minister of Israel’s security cabinet meeting was abruptly interrupted as a secretary barged in and asked for the ministers’ permission to turn on the television. Without waiting for their approval, she grabbed the remote and turned it on. A look of puzzlement spread across all the faces in the room, apart from the secretary that seemed to be in panic more than anything else. “What is the meaning of this?” asked the prime minister. “I don’t know sir, it’s on all the channels” she answered, as she switched between the different Israeli channels, all showed the same broadcast. The prime minister turn to look at the head of Mossad who sat next to him and was already on the phone. “It’s everywhere, sir… we cannot trace the source …. and we knew nothing about this… absolutely nothing”. The prime minister took a deep breath “We’re at war”.

After a couple of hours, that seemed to feel as eternity for everyone in the state of Israel, the broadcasts returned to normal. Special news reports tried to explain what just happened but no one really knew and no one had a clue. What they did know was that for the past couple of hours a presentation showed every Palestinian that died by an Israeli in the past year, in a descending order, most recent at the start. Each person had her (or his) name written in Hebrew and Arabic, her date of birth and date of death, a picture of her as a child and the title “A moment of silence in the memory of – “. Each person was displayed for exactly one minute before moving on to the next person.
But the hijacking didn’t stop at television broadcasts alone – radio stations were also hacked as well as news media websites. Even their twitter account were blocked during that period, twitting off the same information on a minute interval. All attempts to delete the hijacked accounts failed.
At 15:00 a special goverment meeting was summoned to update the prime-minister of any updates regarding this act of terror. “The truth is, prime minister, that we simply don’t know” reported the head of intelligence. The prime minister was outraged “how can this be?!”. “We don’t know, sir, every trace of the attack simply vanished”. “So far no one claimed responsibility nor made demands, sir. The Palestinians themselves are surprised as we are and mostly mumbling about a biblical-miracle” The prime minister took a deep breath and sat back down, talking to everyone in the room. “The ramification of this are horrendous. Clearly this was a warning shot by someone who will not be afraid to use this weapon again. Gentlemen, pay attention as when we’re hacked we have no way to broadcast anything. if someone decided to attack us at that moment, we’ll be blind and mute”. “Sir, the army-radio seemed to be working ok” added the chief of general staff. “This doesn’t help us to inform the public. We have to assume they can use this weapon whenever they want and for as long as they want”. “The only question we must focus on right now is how can we prepare ourselves against the next attack”, he summarized.
And indeed the second attack was soon the follow on the night of the very same day. A broadcast similar to the first was aired. only sharp-eyed were quick to notice is has been prolonged by one minute. A new name was added at the beginning of the list. A 37 years old person from East Jerusalem who failed to uphold the curfew laws that were imposed due to the recent state of war that has been declared in the morning and was shot on his way home. It was later reported by the Israeli news that he was a terrorist heading to attack in Israel but it seemed that the broadcasting didn’t differentiate between innocent Palestinians and terrorists. Once again, no responsibility was claimed nor demands were raised. But something new happened – any Israeli social media source that tried to report about the hack as it occurred was hacked as well, as if the infection was aware of anything viral. But as it became reasonable to assume that the attack will take place for every Palestinian death, the Israeli goverment has reluctantly decided to ease off the curfew laws to a reasonable limit.
After four more additional days of silenced dread, a Palestinian woman has allegedly stabbed a female Israel Defense Force soldier and was “neutralized” as the army phrase the fact she was shot dead. But this time, the Israeli’s army special unit of hackers were ready for the rogue broadcast and after two minutes they managed to scramble the communications and retrieve back the television signal. The prime minister who was updated on the phone sighed with relief, being certain that he had won this war and the Israeli people are safe from the cyber-terror threat that he personally believe originated from Iran (although even he never believed they hold such capabilities and therefore assumed they were aided by China). His victory would play a crucial card in the upcoming election, he was certain. He turned-on the television to see the news reporter gloating over Israel’s triumph in its battle against terror, only to be horrified again when the broadcast came back on a minute later. Only this time it wasn’t just a couple of hours cover the dead Palestinians from the recent year – it was a week long broadcast that covered the past ten years. And sure was it a long week.
The effects were catastrophic – the economy suffered severely as the trust of Israel’s digital capabilities was compromised; attempts to create peer-to-peer broadcasting alternatives failed as they were hacked as soon as their target-audience was too big. And the most disheartening effect was over the morale as more and more Israelis began to question about the pictures of dead children they are being forced to watch on every channel. True not all were actually children, as the right-wing extremists repeatedly pointed out, but many of them were and in the hearts of the Israelis the picture of justifiably dead terrorist was replaced with a child that might have been an innocent victim.
Attempts were made to stabilize the situation but eventually a random right-wing Jewish illegal settler got into an argument with a Palestinian which lead to physical violence and eventually to the death of the Palestinian. After about of month of quiet, the broadcast started again for a week, which forced the Israeli goverment to admit they simply cannot allow themselves any more Palestinian casualties and thus a meaningful peace process was ensued. A Palestinian terror attack on an illegal settlement was soon to follow, which lead to a similar “punishment” to the Palestinians as well, although some (Israelis mostly) might say it has been by far less affective as the Palestinians didn’t have as many broadcasting agencies as Israel have.
On the 4th of July, 2018, a month and a half after the first cyber-terror attacked that puzzled the world, a similar attack was brought down on the American people. Only it was to their horror that they victims displayed were everyone who died in the last year from an American weapon, world-wide – whether it be victims drone-attack, mass-shooting or simply gun misuse accidents. Later, this month was remembered as “The month the hijacked media forced the US to recall its war industry”.
Following suits, other countries’ national media were hijacked as well, crippling the world’s economy and toppling murderous regimes and their people learned about their atrocious ways.
And then I woke up.