Slip and fall liability claim

A slip and fall is a premises liability claim, which is a type of personal injury claim. According to the law, a slip and fall accident is an injury caused by a slip or falling object. The victim may be a child, elderly, or otherwise vulnerable.
As is the case with most personal injury claims, the limit of compensation for a slip and fall injury is $500,000, with an additional $500,000 for lost income. Under California’s Consumer Protection Code, a fall and the damages that result from it, are considered the natural consequence of being on public property, such as a city street or sidewalk, or in a private property as a home, that is when the slip and fall claim against landlords and home owners are relevant.
Penalties for injuries from slips and falls in California can include fines of up to $5,000 and/or jail time, both of which can serve to deter others from falling or slipping.
California Law
The consumer protection laws apply to California households. These laws apply to anyone who spends money on goods and services, whether purchased or offered for sale.
Under California’s Fair Credit Reporting Act (FCRA), when a consumer or business contacts a debt collector to get a consumer report on a consumer, this consumer is not considered a consumer debtor and is therefore not subject to state consumer protection laws.
Under California’s Fair Debt Collection Practices Act (DFPA), any “consumer debt” in a collection is considered a valid charge on a consumer’s account.
The state consumer protection laws apply to both licensed and unlicensed debt collectors. Unlicensed collectors are those who do not have a federal license to collect debts in California and, therefore, are considered “unlicensed collectors” under the state law.
The laws in California generally do not apply to illegal debt collectors, but California law enforcement authorities may enforce these laws if the collector violates them.Consumer rights are particularly important when collecting debts for people who cannot give their consent, for example, when collecting a debt from someone who is represented by an attorney or who is barred from receiving payments due to legal incapacity.
Other California Laws
California law also prohibits you from knowingly or recklessly misrepresenting a material fact to a customer or other person when providing them with a service or product.For example, if you tell a customer that your company has high ratings on the Better Business Bureau, when in fact it does not, and you may then turn around and sell the customer “your product” or “our service,” you have violated California law.
California Consumer Statute of Limitations Laws
If you have an immediate claim against you, you may file a lawsuit within two years from the date of the harm, but not if the injury was caused by negligence or a mechanical failure. For example, if you injure someone because you parked on a sidewalk without a street sign, and the

An Ada language library repository

Work has started designing a source text repository for Ada libraries. Hopefully it will soon overtake my own attempt at the same task.

After a short discussion with Thomas Løcke about the subject, I think I’m in favour of having an Ada specific tool/repository because:

  • Using the platform specific package manager is typically restricted to the system administrator.
  • I fear that platform specific package managers have a too simplified view of dependencies, compared to what software developers attempt to put up with.
  • There is some benefit in being able to use the same command to install an Ada source library, no matter which platform you are working on today.

The major challenges I see (which maybe aren’t all that big), are related to documenting and validating which libraries work with which other libraries.

Direct conflicts can be identified through conflicting compilation unit names.

Dependencies can be validated through building a library and running its internal regression test on each of the targeted development platforms.  If the internal regression test passes, one can reasonable assume that the library works with (exactly) the selected versions of the libraries it depends on.  Passing on one development platform should be enough to release, but all the development platforms the combination has passed on should be documented.

Please join the project, and do your bit to move it forward.

SSL security

While SSL is certainly the most popular form of endpoint security, it is just one security framework that can improve the security of an enterprise.

Cybersecurity vs. Information Security vs. Network Security

Server-side firewalls aren’t necessarily the best way to secure your servers. A key recommendation for securing your endpoint network is to secure your applications especially web applications. Be sure to visit websites like to get all the info.

What is HTTPS?

HTTP was designed to be a basic communication protocol, but when trying to keep up with the ever-changing internet, and the ever-growing number of devices on the internet, HTTP is becoming old-fashioned.

The more prevalent protocols that use TCP/IP, such as IMAP, POP, and SMTP, can be more efficient and perform better in many cases. These protocols use smaller packets of information, the TCP or UDP protocols, and can be faster.

An important feature to secure an endpoint is to securely encrypt communications to and from the endpoint. This requires a series of steps.

In order for communication to be encrypted, the sender and receiver must have a shared key or private key. The receiver uses this shared key to encrypt the messages sent from the sender. The sender can use this shared key to verify that the receiver really sent the message. The sender also can inspect the messages received from the receiver to confirm that the messages came from the correct sender.

In order for communication to be sent over an insecure network, the sender and receiver must share their private keys and cannot verify the validity of the data or verify the sender. When the sender and receiver trust each other, they can sign a transaction to verify that the message came from the sender and the receiver. This process is known as sending and receiving keys or messages or PGP.

Using a secured endpoint is relatively easy. This can be accomplished either using SSL, TLS, or even by using Public Key Pinning to secure all communications over your network.

SSLv2 vs. SSL

The TLS protocol was developed as a standard by Netscape Communications Corp., with the following purpose:

To replace the deprecated SSL, so that an end user can authenticate and protect all of the connections to a Web server and server applications.

The TLS protocol is a more advanced protocol than the SSL protocol, and one that includes additional security. TLS is commonly used with data encryption when security is not crucial to your application, such as on a web mail server. This allows you to remove security-sensitive features like the SSL/TLS Certificate forgery protection.

SSLv3 is a newer encryption protocol with many added features, such as features that improve data integrity and confidentiality, authentication to further protect against potential man-in-the-middle attacks, and the use of future cryptography standards. SSL/TLS was abandoned as a service level agreement (SLA) and is now a stable operating standard. TLS is widely used to encrypt all connections in your web application.

Security Services

To secure your server, ensure that security services such as OpenSSL and NSS are running. These applications ensure that your server is not tampered with by a third party. One could say that security services provide you with one of the most important keys to securing your system. – Ada Programming and Documentation

It frequently happens that while surfing around for other things, I suddenly find myself at an Ada related website that I haven’t heard about before. One minute I’m checking out, the worlds most private search engine, and the next I’m looking at the Ada website of Martin Krischik.

The internet is indeed a fantastic place and a marvelous invention.

While clicking around on the website, I soon found myself lead to the Martin Krischik’s home, where we see that he has quite a few Ada projects going:

If you’re a regular reader of comp.lang.ada then you’ll surely have noticed Martin Krischik also, as he often participates in discussions.