Same March, Different Boots

     With many on the purported “Right” openly embracing Leftist tacics, theories, and frameworks, we are seeing not the opposition to the “long march through the institutions” but a continuation of said march, abet with different boots doing the marching.   As James Lindsay explains.

Let’s get some perspective. The Woke Right is not a reaction to the Woke Left; it is the CONTINUATION of the Woke Left into conservative institutions.

The Long March Through the Institutions effectively hit its Leftist limit by maybe 2022 or so at the latest. Leftists had taken or destroyed every institution they actually could take or destroy by then, more or less. And there was massive pushback from conservative institutions that weren’t just based but getting organized quickly and effectively.

The Long March Through the Institutions had to continue INTO conservative institutions (mostly faith and family, into any remaining honest “Alt Media,” together with the more solid wings of the Republican Party and the sectors of the right-wing think tank world that repelled it).

The Long March Through the Institutions has to march into EVERY institution, not just ones that are easy pickings for Leftist intellectuals and bureaucrat types, plus kids.

What does the Long March Through the Institutions do? One of two things. It runs entryist programming to get inside established institutions and to turn them to the revolutionary cause or, when it cannot do this, destroys them. The mechanism is internal infection plus external pressure almost every time.

So the Long March Through the Institutions ran as far as it could run into Left-susceptible institutions by 2022 at the latest, and it was mostly repelled by Right-standing institutions. But the Long March Through the Institutions had to continue into EVERY institution to truly transform society. There can be no remaining solid resistance.

Continue reading

Posted in Progressives, Uncategorized | Tagged , , | Leave a comment

Brain Cells On A Microchip Taught To Play Doom Are Cyborg Gamer Catgirls And Other Kemonomimi Next?

     Perfecting the man-machine interface increasingly involves using neurons for computing, though teaching, or programming them, has bee difficult, until now. Scientists have taught human neuron cells to play Doom.

“According to Cortical Labs, the experiment builds on earlier work in which lab-grown neurons learned to play the classic 1972 game Pong, but Doom presents a far more complex challenge due to its 3D environments and enemy encounters.

“‘To bridge that gap, we needed to translate the digital world of Doom into the biological language of neurons, which is electricity,’ the researchers explained in a February 25 video.

“The system converts gameplay into electrical stimulation patterns delivered to different parts of the neural culture. When enemies appear on one side of the screen, corresponding electrodes stimulate that region of the neurons, which then respond with electrical signals interpreted as movement or shooting commands.

“‘If the neurons fire in a specific pattern, Doomguy shoots. If they fire in another pattern, he moves right, and so on,’ they said.

“Researchers said the cells are capable of basic learning and adaptation, though performance remains limited.”

     The ultimate goal is clear: Developing catgirls and doggirls to become gamers.

Continue reading

Posted in Science | Tagged , , , | 1 Comment

Leviathan’s App Store

     The sudden drive of multiple states to require users hand over information just to use software is bipartisan, with bills in Utah, Alabama, Louisiana, and Texas requiring both app store and app developers on mobile devices.

     The Utah bill, SB 142, puts the onus on both the app store, which may be anyone who offers apps, and app developers, which may be anyone who owns or provides an app that is so offered. Beyond this, it requires the Division of Consumer Protection to establish whatever standards they want for “age verification”. All of this would establish the state can define who can and can not use any software, and sets the technical precedent to go beyond mere “age verification”.

     In Alabama, HB161, does much of the same:

“Consumer protection, app store providers and developers required to take certain actions related to age verification and parental consent, Attorney General authorized to bring action for violations as deceptive trade practice, parents authorized to bring civil action”

     Unlike Utah, Alabama will rely on “industry standards”:

“A developer is not liable for a violation of Section 9(c)(2) if the developer: (i) uses widely adopted industry standards to determine the app’s age category and content description; and (ii) applies those standards consistently and in good faith.”

     Oh, and in order to fall into the “safe harbor” category they will needed to have used: “(1) Used a commercially reasonable age verification process.”

     Both Louisiana, which passed HB 570, and Texas, which passed SB2420 has the same requirements as Alabama. Louisiana extends this to virtual gaming devices and game systems.

     And just were would these standards and processes come from, and why are these bill all using the same age brackets? Maybe because it’s all being pushed by a someone who would financially benefit from it?

     This is about control, and these state legislators are allowing themselves to be used, all “for the children”.

Continue reading

Posted in Progressives, Uncategorized | Tagged , , | Leave a comment

News of the Week (March 15th, 2026)

 

News of the Week for March 15th, 2026


Continue reading

Posted in News of the Week | Tagged | Leave a comment

The Ides of March

I hear a tongue shriller than all the music
Cry “Caesar!” Speak, Caesar is turn’d to hear.

Soothsayer:
Beware the ides of March.

Caesar:
What man is that?

Brutus:
A soothsayer bids you beware the ides of March.

     A little mood music:

Continue reading

Posted in Uncategorized | Tagged , | Leave a comment

Happy Pi Day

     Happy π Day everyone!

     The most accurate value for the number π was calculated in a quite innovative way.

Continue reading

Posted in Education, Science | Tagged | 1 Comment

Firing Line Friday: Prayer in the Public Schools

     In the hopes of encouraging a more civil, and illuminating, discourse, here is another episode of William F. Buckley, Jr.’s “Firing Line”.

     With the Senate election in Texasm, with a potential match up between two candidates, one of who is getting divorced “on Biblical grounds” due to his behavior and the other being accused of heresy for religious justification of his woke views, the question of religion has come up on politics just like it did sixty years ago when William F. Buckley, Jr. and James A. Pike discussed prayer in the public schools.

     Until next Friday.

Posted in Uncategorized | Tagged | Leave a comment

Having To Choose Between The 2nd & 4th Amendments In Minnesota

     In Minnesota, you may soon be required to choose between the 2nd Amendment and the 4th Amendment, surrendering one or the other in order to avoid braking state statutory law.

          Twin bills, HF 3443 and SF 3654 would ban a myriad of semi-automatic rifles, pistols, and shotguns for being “military-style weapons”. The following would be banned:

Semiautomatic rifles with detachable magazine and also one of the following: “Pistol grip” or even just a “protruding grip”, folding/telesocping stock, barrel shroud, or flash suppresor.

Pistol with either a fixed magazine larger than ten rounds or that can accept a magazine that also has a “protruding grip” for the non-trigger hand, a folding/telescoping/thumbhole stock, barrel shroud, magazine outside of the pistol grip, threaded barrel.

Any shotgun that has a pistol grip, thumbhole stock, a “protruding” grip that can be held by the non-trigger hand, folding/telescoping stock, holds more than ten rounds, or has a detachable magazine.

Also, any conversion kit or part, broadly understood.

Even worse, the “grandfathering” of current owners limits their possession to the home, a licensed firing range, or transportation therebetween… and requires that owners give up their 4th Amendment rights by preemptively agreeing to allow law enforcement to inspect the secure storage of the device without any real limitation.

For even just a smidgen of being permitted to exercise your 2nd Amendment rights, you must surrender your 4th Amendment rights!

      Continue reading

Posted in Gun Rights, Progressives | Tagged , , , , | 2 Comments

More Powerful Lab Grown Brains Mean One Thing: Hyperintellegent Catgirls

     Teaching cells and tissue to think an learn has been an ongoing process. Now, they have developed into the “toddler” stage of learning.

“In a remarkable breakthrough published in the journal Cell Reports, researchers were able to effectively coach lab-grown brains into solving the “cart-pole” problem. The cart-pole problem is an engineering benchmark used in robotics, artificial intelligence — and now cognitive science — to measure how effective systems are at processing information.

“The test basically involves balancing a broomstick upright on your palm. Gravity forces you to constantly adjust your position — move too much or not enough, and the broom falls. Every human needs to solve this problem in order to stand and walk upright. Luckily for us, we have our animal instincts (and more importantly, our inner ears) to guide us through; brain organoids have no such advantage.

“…

“In essence, their success proves that brain organoids are capable of goal-directed learning, similar to the kind of trial-and-error a toddler goes through as they learn to walk. It’s a remarkable achievement for brain science more broadly, coming some 120 years after Henry Van Peters Wilson tore his sponges to shreds.”

     What this means is oblivious: More intelligent genetically engineered catgirls suitable for domestic adoption.

Continue reading

Posted in Science | Tagged , , | 1 Comment

Leviathan’s Operating System

     California passed a law requiring you be verified before using an operating system. Now, Colorado has followed suit, with SB 51.

The bill requires an operating system provider to: Provide an accessible interface at account setup that requires an account holder to indicate the birth date or age of the user of that device to provide a signal regarding the user’s age bracket (age signal) to applications available in a covered application store;

Provide an application developer (developer) that requests an age signal, with respect to a particular user, the technical ability to call an age signal via a reasonably consistent real-time application programming interface that identifies, at a minimum, the user’s age-bracket data; and

Send only the minimum amount of information necessary to comply with the bill. An operating system provider shall not share an age signal with a third party for a purpose not required by the bill.

     Now, New York is considering a similar law, S8102.

PURPOSE OR GENERAL IDEA OF BILL:

To require devices to conduct commercially reasonable age assurance for users under the age of 18 at the point of device activation, unlocking the ability to enforce all other digital privacy and safety laws for underage users

SUMMARY OF PROVISIONS:

Section one of this bill creates a new Article 45-A in the General Business Law (GBL) to require all manufacturers of Internet-enabled devices, operating systems, or application stores to conduct commercially reasonable and technically feasible age assurance for users at the point of device activation.

Device manufacturers would be able to rely on an age assurance method previously identified by the Office of the Attorney General (OAG) under the regulations for the SAFE for Kids Act in Article 45 of GBL, or a method identified under new regulations promulgated by the OAG if OAG believes that updated regulations for this law are necessary. Covered manufacturers would be required to delete information collected for the purposes of age assurance immediately after determining the user’s age and would not be able to favor their own apps over those of third parties by imposing additional restrictions or conditions on the latter.

Applications (apps) would then be required to request the age signal from the device manufacturer at the point of app download and launch by a user. The age signal would be communicated to the app via a real-time application programming interface (API) and would be encrypted. The age signal would communicate whether a user is under the age of 13, between 13 and 15 years old, between 16 and 17 years old, or at least 18 years old and a legal adult.

     Not to be left out, Illinois is considering a similar law, SB3977.

Creates the Children’s Social Media Safety Act. Provides that, no later than January 1, 2028, an operating system provider shall: (1) provide an accessible interface at account setup that requires an account holder to indicate the birth date, age, or both; (2) provide an operator who has requested a signal with respect to a particular user a signal that identifies the user’s age by category; and (3) send only the minimum amount of information necessary to comply with the provision. Provides that an operator shall not offer a platform in the State without conducting age verification as required under the Act to determine whether a user is a minor. Provides that, for all users that the operator has actual knowledge to be a minor, the operator shall use specified default settings for the minor. Provides that a violation of the Act constitutes an unlawful practice under the Consumer Fraud and Deceptive Business Practices Act. Amends the Consumer Fraud and Deceptive Business Practices Act to make a conforming change. Effective January 1, 2027.

     This push for similar language in such a short amount of time in many different states and countries is disconcerting. Brazil has a similar law that is going into effect this month.

Continue reading

Posted in Progressives | Tagged , | 1 Comment