I have written two new articles for my German blog.
One offers a brief overview over factors influencing the perception of truth, particularly on the basis of suggestions, energetic and psycho-energetic fields and links and Jungian archetypes and their influence on what one thinks or believes, be it consciously or subconsciously. (Interestingly, the term “Glaubenssätze”, which I have used there in German, seems to be astonishingly difficult to translate, see this discussion, if you are interested.) You can read it here, and if you do not understand German, maybe Deepl can help. Read more...(225 words, estimated 54 secs reading time)
If you are interested in how gender ideology tries to influence the German language and in my perspective on that, have a look at my respective article in German here. If you do not read German, I could imagine you might understand it with the help of e.g. https://deepl.com. The craziness continues on an even higher level here, but you will only understand the latter article if you know about German grammar. Read more...(169 words, estimated 41 secs reading time)
I recently wrote an article about a paragraph in the Microsoft Services Agreement which, as it seems to me, implies your copyrights are transferred to those receiving your messages or calls, which would not only concern Hotmail / Outlook and Windows online, but also Skype, as it seems to me. You can find the article in German here.
On the Path of Love we go,
forward, to a World of Love.
On the Path of Love we grow,
on that Path, we live – above
and below, it is just ONE,
come my friend, and do not shun
either of the two of them.
Whereas normally the poems just “flow”, in this case, in fact, although I had the impression it was to be published here, I could not first find the ending: I thought of the German “beiden”, which would have perfectly fit, but “both” would not have fitted in rhythmically. What then came, was “neither of these goodies”, but that is informal.. Read more...(146 words, estimated 35 secs reading time)
As you may know, I like beautiful names and domain names. This may also be one reason for having more than one blog. Yet, for my readers, it might be inconvenient having to follow all of them – so I wondered whether to either create a new one and post in various language there (I thought of http://travels.jewel-of-light.org), an idea that came to me while walking through Perth (speaking of names – one beautiful aspect of Waldorf schools, at least in Australia, is that many children have got very beautiful names). However, for now, it seemed I should keep my separate blogs for English (this one) and German (over here). Read more...(303 words, estimated 1:13 mins reading time)
I have been recently telling to some students an old story, which I embellished a bit.
The content of that addition led to the question (which, then, if I reflect upon it, could be a call for me to consider whether I should rather not have added that part….), whether that was my permission to “break the rules”.
That depends, of course, on the nature of the rule or rules to which you are referring, and, possibly, on your aims or motives (which, at this stage, does not imply that the ends justify the means). Read more...(1002 words, estimated 4:00 mins reading time)
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.