Authors Posts by Dave G.

Dave G.

I'm Dave. A no-frills, high quality cut-to-the-chase news writer that loves breaking news, political brouhaha and all the theatrics that come with living on Earth. I love Chinese food, paranormal activity and random road trips. Einsturzende Neubaten is great music for relaxing the soul.

I'm Dave. A no-frills, high quality cut-to-the-chase news writer that loves breaking news, political brouhaha and all the theatrics that come with living on Earth. I love Chinese food, paranormal activity and random road trips. Einsturzende Neubaten is great music for relaxing the soul.

  • googleplus
  • linkedin
  • skype

0 0
fake penis

Everything in Hollywood is fake – even the methods used to pass drug screens.

Former Khloe Kardashian beau Lamar Odom has shed light on past transgressions during his basketball career, including an admission that he cheated on a drug test to play for the United States basketball team at the 2004 Olympics in Athens.

In the memoir titled “Darkness to Light,” Odom says he used a prosthetic penis to fool drug test officials after he had been “smoking weed every day that summer.”

Odom says being offered a spot on the team was one of the biggest honors in his career, but that happiness was short lived once an official told him about the well-known mandatory drug testing for Olympic athletes, according to an excerpt from People Magazine.

He received a call from USA Basketball that a drug tester would come to his house in Los Angeles to administer the screening in a few days.

See the original story on

0 186

ST. PETERSBURG – A Russian yoga teacher has been arrested for “illegal missionary activity” under controversial new laws designed to combat terrorism.

Dmitry Ugay is said to have fallen foul of the country’s anti-terror measures, dubbed a ‘Big Brother’ law by Edward Snowden, while giving a talk about the philosophy of yoga at a St Petersburg festival.

The computer programmer was arrested and charged with allegedly conducting illegal missionary activity, which is construed as a missionary activity under the so-called Yarovaya laws brought in last year.

Named after its author MP Irinia Yarovaya, the new legislation, signed off by President Vladimir Putin, includes restrictions on missionary activity, religious groups, and followers of what the government deems non-traditional religions.

Mr Ugay’s arrest comes after he was accused by fellow festival-goer, Nail Nasibulin, of recruiting young people to join his “pseudo-Hindu organisation“.

The 44-year-old claims he was bundled into a police car and ordered to sign a blank piece of paper, which he refused to do.

Two months after his arrest and subsequent release, he now faces a fine at a court hearing next week in St Petersburg, state news agency Rapsi reported.

Two months after his arrest and subsequent release, he now faces a fine at a court hearing next week in St Petersburg, state news agency Rapsi reported.

But Mr Ugay, who admits following Hinduism, strenuously denied the other claims, telling the Meduza news agency: “I did not name a single religious organisation in my speech, nor did I use a single religious book, and did not name a single religious figure apart from Christ and Buddha.”

The arrest has been met with concern in Russia, with critics calling the wording of the Yarovaya law open to interpretation.

Read the full story and meet the instructor at The Independent

0 676
ai technology

Finally, AI Technology for the Sexually Deprived. – The Autoblow AI, a sex toy made for penis-possessing individuals, consists of a rubbery sleeve and a motor housed inside a canister that aims to simulate oral sex. It launched its Indiegogo campaign last week and quickly hit its goal of $50,000. Its biggest advertised advantage over the original model from 2014, the Autoblow 2, is a machine learning algorithm that “continually changes technique” in order to pleasure the user in new and exciting ways.

Instead of repetitive, mechanical motions, this “AI mode” promises to replicate the nuanced and unpredictable motions of a real, human blowjob. In order to do this, the company asked a team of six people to watch and annotate 109 hours of porn and hired machine learning engineers to create a model to take all that data and translate it into what the toy does. This entire process took three years.

The result of this research is the Blowjob Paper, a (definitely not peer-reviewed) study that’s full of sexy—or at least, sexually-themed—algorithmic research: “In this work, we seek to quantify the ‘common’ or ‘typical’ movements involved in oral sex performed on males,” the paper begins. “ To do so, we analyze a continually changes over 108 hours of pornographic video, annotated at each exciting ways the position of the lips along the shaft of the penis. We use quantization techniques to discover sixteen distinct motions, and using these motionsthat aims we design and evaluate a system that procedurally generates realistic movement sequences using deep learning. We quantitatively show that this system is superior to simple Markov Chain techniques.”

“I had no problem with it.”

I asked Brian Sloan, the creator of Autoblow AI, about his attempt to recruit serious scientists to work on a jerkoff machine. His pitch to them didn’t mince any words.

“I told them I make a sex toy for men focusing on recreating the blowjob experience, and asked if they could use AI to study what really happens during blowjobs, so that I could make my machine give blowjobs like a human,” Sloan told me in an email. “That was enough to cause seven companies to tell me almost immediately that the ‘work was not for them.’ When I asked why, they didn’t want to talk about why.”

That eighth team said yes, and produced the Blowjob Paper, which Sloan said he paid $30,000 for. But for all the beautiful calculations and data collection methods this research holds, one thing is conspicuously missing in the paper: the names of the authors. There are no names on this paper, no research teams to credit, no institutions claiming responsibility for this work. The scientists did the work anonymously because they believed their other clients might drop them if they were publicly associated with it.

Read the rest on

0 82
gig economy

According to OnePoll, worrying about work could take an even bigger toll on the business and the owner. The study was conducted on behalf of Buzz60

Danny Brewer knew that the entrepreneurial life was for him when he saw that the address of one of his bosses after college was, literally, “No. 1, Easy Street.”

This was about a decade ago and soon thereafter Danny started his first business: he became a mobile DJ. While that was a good gig (and still is, see below), everything changed when Brewer went to a trade show and saw an opportunity in the photo-booth business. You know what photo booths are – you see them at weddings and other events, where guests can dress up and get their pictures taken.

Before long, Danny Brewer had five photo booths running, giving us the first insight into how to rock the gig economy (and be well on your way to a four day work week):

Rule No. 1: Duplicate your talents.

One common mistake we see people in the “gig economy” make is that they think too small. They create one gig and stick with it, driving for Uber or whatever. 

What Danny did right is that he didn’t fall into that trap. By hiring other gig workers, or even hiring a staff, you ensure that you will not just be creating a job for yourself, but also a business that can scale. 

Personally, I have someone who does the tech work for the three websites I run, a podcast producer, a video guru, and an assistant (as they say, if you don’t have an assistant, you are the assistant.) 

A few years into his photo booth endeavor, Brewer realized that he had a new challenge. “The market was getting flooded with competition,” he told me. So, instead of competing on price, Brewer again smartly decided to expand; he would run with another idea he had, namely, to manufacture a product.

One of the problems with the photo booth business is that people at the event have to come to the booth and the fun of the booth is limited to that space in the back (or wherever.) Additionally, “our photo booths would lose their ‘energy’ when the band or a DJ would take over the party.”

So Brewer had an idea for a lightweight, mobile photo system that could move around the party and the Ring Roamer was born.

As Danny’s clever ad says, “Nobody puts Roamer in the Corner.” Which brings us to the second rule for success in the gig economy:

Rule No. 2. Diversify or fade out of the gig economy.

This is Danny Brewer’s motto. These days he has four businesses, four ways of bringing in money:

• The mobile DJ business

• The photo booth business

• The Ring Roamer

• Corporate team-building events

If you have read my books or this column for any length of time, you know this is one of my mantras as well. Creating multiple profit centers is key.

Danny Brewer’s story is also illustrative for another lesson, namely:

Rule No. 3. Don’t compete on price.

Many bad things happen when you try to be cheaper than everyone else. First, you shrink your margins. It becomes increasingly difficult to make a profit when you make your product or service cheaper and cheaper.

Second, you have to work harder. Because you make less on each sale when you reduce your prices, you need to work that much harder to make what you used to make. 

Finally, by competing on price, you are – wittingly or unwittingly – creating a brand based on price and not quality or service or creativity or smarts or whatever. Unless you want to become known as “the low price leader,” competing on price is a loser if you intend to grow your small business.

There is a lot of good that can be said about the gig economy, but lots bad too. The trick is to not work for the gig economy but make it work for you.

Originally appeared on USA Today.

0 1178

SOTU will wait. Which is all part of the plan.

Donald Trump

Say anything you want about Donald Trump, but when it comes to the art of the deal, oftentimes the grand finale is complete before negotiations begin. As our 45th President is proving to the Democratic Party each day, decades of business dealmaking goes much further than decades of college education and lobbying.

Out of fairness, Nancy Pelosi means well. She tries her little heart out each day she shows up to the House she has locked down tighter than Fort Knox. She is working her little hands to the bone to train the freshman class in proper negotiation skills. Problem is, she is holding Americans hostage with her hardline stance against a wall that she once backed.

But Donald Trump is schooling our fearless Speaker in ways she can only imagine.

First, you hold your ground when it comes to keeping your campaign promises. The wall is the finest example of an individual who promises something on the campaign trail and sees it through.

Once you back the Democrats in the corner, you give an ultimatum; give me $5.7 billion to build some type of structure to keep rapists, drugs, murderers and those with ill intent out of our country, or I will close up the government. Since Trump and his Republican following already knew the shutdown was going to happen, you wait for the House to shoot you down.

Shutdown begins. Although 800,000 workers will lose a paycheck or three, you guarantee them back pay. Each day that the government remains closed, you start to expose the Democratic Party for what they really are. You allow grown adults to call you names. You let distasteful journalism start to erode American trust in media.

You shoot have your trusty steed shoot down every attempt to reopen the government before it hits the Senate floor. Democrats start showing their ire, while the Republican camp backs their man.

Then you dial it up a notch.

Donald Trump – Negotiator Extraordinaire

When the State of The Union address is due to be made, you nicely ask Speaker Pelosi to allow the speech to commence. She then shuns the notion, citing lack of security.

Security checks in. There is enough Secret Service staff hanging around to protect the House and President. The notion of allowing Trump to carry forth the good message of prosperity and upcoming work ruminates in the minds of the Democratic Party.

Meanwhile, you tell your faithful Twitter followers to spread a new motto: Build A Wall & Crime Will Fall. It filters down into mainstream media, causing a ruckus all over Twitter.

The next day, Speaker Pelosi announces that the speech will not happen. Finally, Trump concedes and agrees to hold the message to the Free World after the shutdown.

Now Trump retreats back to his camp.

Fortune Favors the Bold

At this point, you are probably wonder how conceding to a catty House Speaker could be deemed a victory.

Exposing the Democratic Party weaknesses is what this is all about. He is breaking down the very values which democracy needed overhauled in the first place.

And it is working perfectly.

The wall will be built, and the deal master will emerge victorious, stamping his 2020 bid and perhaps another term.

0 952
build a wall

In order to secure the southern border and prevent further illegal entry into our country, the message is simple: build a wall and crime will fall. Period. That ‘s the new battle cry our fearless leader is pushing across Twitter:

Yes, it is time to get our barrier constructed.

There is no more beating around the bush. We can no longer stroke the ego of Democrats who think flooding the country with unlawful citizens who refuse to pay taxes and abide by our way of life is prudential.

Imagine the tax revenue we could generate if those who wish to enter our country legally agreed to work and pay taxes. How wonderful it would be if Mexico and Central America would purge corruption from their soil and rebuild their economy to that of an American standard.

Wonderful as it may be, it will not happen. Build a wall and crime will fall.

We can no longer support illegal entry into America. It is ruining the fabric of society. The United States, while not a perfect country by any means, could improve drastically if the Democratic agenda would align with what is practical and frugal for the common welfare.

Over the years, we tried to make it work. We allowed those oppressed by Vincente Fox (et al.) and Central American governments to jump across fences, hide in Cadillacs and run toward a new life. Our days of turning the other cheek are over.

#Buildthewall. Crime will fall. Ask Israel and other countries with protective barriers around their borders – walls work.

Opponents of the wall believe the expenditure will outweigh the long term benefits. After all, people enter through airports, overstay visas and travel thousands of miles on water just for the opportunity to breathe American air. Right?

Wrong. TSA and Coast Guard officials will show you data that proves the Democrats are clueless when it comes to where and how people enter the U.S. And if you are one of the millions who believe poll data, perhaps you should grab a ticket and exit America yourself.

Build a wall and crime will fall. A simple message can solve a complex problem that has our country shut down because the Democrats refuse to cough up $5.7 billion in funding – a pittance compared to what they will spend caring for the illegals who keep entering our country without paperwork.

Sure, an added expense to this wall will be the need to add manpower to various sections of the wall. Let us remind the naysayers that American manpower equals tax revenue which illegal immigrants do not help our great nation with.

There is no need to fight this any longer. Just build the wall and crime will fall incrementally over time, and will pay for itself since we will stop funding health care, shelter and other subsidies for those who enter illegally. Not a single one of you can tell me any differently, or at least tell me with verifiable facts to back your claims (Gallup Polls do not count).

Build a wall and crime will fall.

A catchy slogan that we must finally take seriously regardless of what the propagandist Dems say.

0 2752

Have no political skills? No problem - just rig the polls.


A show of hands if a group of Democrats have ever shown up at your door to enumerate your thoughts on Trump, the economy, wars, and our border crisis. Anyone?

Come on. Surely someone out there has been phoned, emailed, or visited in person. Still no one?

Me neither. Chances are, you never will. Polling 77.1% of Americans currently over the age of 18 (2010 Census est.) would be too arduous of a task. So, the next best thing is to auto-dial a few dozen people in all 50 states to get their opinion. From there, assumptions can be drawn.

I’ll explain.

Polls Were Created by Democrats, Right?

It certainly seems possible. I mean, look at the all-star cast contributing to President Trump’s job approval rating – CNN, Washington Post, Economist, and their ilk. Not exactly the type of fan base that burgeons with Republican love.

Polls are easier to manipulate than a drugged hooker. All you need is a small sample size, a few “pointed” questions and a large media audience to convince. It is fairly common for CNN and their ilk to poll 1,500 people then refer to them as “most Americans”.

But what about the opinion of 250+ million people who were never polled? It rarely matters. Because in the eyes of the clueless Democrats, 1,500 people said Trump is doing a bad job – therefore, that’s how you feel.

How low must one political party go to control your thoughts? Polls are often low enough. Regardless if you, your family, extended friends network and half of Norther Montana love Republicans, it rarely matters. Democrats, the media they influence and other outlets backed by Democratic funds run American polls. But why?

Clueless people need some mechanism in place to make you believe they are not actually clueless. Polls are often the perfect opportunity for the manipulation of the truth.

How To Combat Poll Influence

First and foremost, look around at the obvious. Are people lining up and throwing bricks at Trump Tower? Are your coworkers suddenly appalled by the increase in take-home pay? Not many are.

See, Democrats have their own unique way of crying when things are not how they want them to be. So they claim that “President Trump is the worst president of our era” and make you believe Obama was the most admired.

How could you admire an individual that rammed healthcare down your throat, violating your constitutional freedom of choice?

Polls. They run your life, even when you think you are running it just fine. The best way to combat this negativity is to disavow it. Period.

This shutdown certainly proves otherwise.

Let us reshape the focus of a nation by following the truth as we know it.

0 1457

2018 was a wild ride for Bitcoin.

bitcoin technology

Since its introduction to the world in 2009, Bitcoin and Bitcoin technology have made serious waves in the finance industry. It has been called a game changer by many, as evinced by the myriad “offsprings” that came after it, such as Litecoin and Ethereum. Blockchain technology, on which Bitcoin is based, is finding more and more practical applications in spheres beyond the realm of finance – even after many predicted an inevitable bitcoin crash back in 2017.

While it was a paradigm shifter at the time, it’s important to realize that Bitcoin, popular though it may be, is based on rather old technology by modern standards. As such, there is room for improvement, and innovations to the technology crop up periodically.

The previously mentioned Ethereum, for example, has expanded on blockchain technology by creating smart contracts, which automatically form rules and conditions, enforce those rules, and eventually terminate themselves once all conditions have been met or a rule it established has been broken.

So what improvements in Bitcoin technology can we hope for in 2019?


One of the most major advances to come our way must be in the field of scalability. Scalability refers to the amount of transactions per second Bitcoin’s network can handle. Currently, Bitcoin stands at seven transactions per second.

bitcoin technology

This is pretty slow, especially when contrasted with Ripple, with its 1,500 transactions per second (it can permit much more too, up to 50,000). While it remains unlikely that the scalability problem will be entirely fixed in 2019, work is being done on improving the Lightning Network, which certainly promises to help alleviate it.


The second improvement in line for 2019 should be tokenization of assets. Tokenization refers to a data security measure through replacing sensitive or private information with a token (symbols like numbers or letters), which can then be used by a business as a “key” for said data.

This, among other things, offers better security against theft and fraud. It’s important to note that tokenization is different from tokenizing, which is the splitting of an asset into tokens. Wrapped Bitcoin (WBTC) is also an example of a similar innovation, a sort of Bitcoin/Ethereum hybrid token.

These upcoming improvements are likely just a fraction of what bitcoin technology has to offer in the forthcoming years, let alone the farther future.

Bitcoin Technology Will Amaze You in 2019

You can look at it like this. In 1973, Motorola created the first cellular phone. Upon its first years, many conjectures were made about what this revolutionary piece of technology will evolve into in the future.

However, practically nobody could have even imagined that cellphones would become the fantastical smart multi-purpose devices we consider quite ordinary today.

The same can be said of Bitcoin and blockchain, even all cryptocurrencies. Our speculations may be negative, cynical, or overwhelmingly positive, even radically so, but the truth is we can’t really be sure about the future of bitcoin technology. Only in time will we be able to see to what shores this ship is headed.

But that doesn’t mean it’s useless to theorize about where these pieces of tech are headed. And to do so, it’s vital that you be in the know about their intricacies. If you feel like finding out more about Bitcoin and blockchain technology, Bitcoinfy has an interesting infographic you should check out below:

bitcoin technology in 2019

There’s a lot to learn from it, like Bitcoin’s and blockchain’s history, how they operate, and various other insightful tidbits and stats, all laid out in a delightful artistic style that makes the information easy to digest and hard to forget.

0 779

City departments, hospitals and shipping companies learned the hard way that ransomware will hold anyone’s data hostage. And smile while doing it.


Shortly after the WannaCry ransomware cryptoworm finished swindling Microsoft Windows users out of billions in May 2017, the finger pointing game began. U.S. blamed North Korea, Twitter exploded with conspiracy theories, and everyone scrambled to secure their precious information using whatever methods seemed feasible.

But then an unfamiliar variant of Petya nailed 80 global companies in a politically-motivated attack meant to throttle the Ukraine. Analysts speculated this because ransomware normally allows the release of data after payment, yet Petya didn’t offer this luxury. The origination of the attack clearly implicated Ukrainian cybercriminals, was isolated to roughly 80% of Ukraine companies yet was vehemently denied as being ‘serious’ by Putin’s press secretary, Dmitry Peskov.

A false narrative stole billions by exploiting a vulnerability designed by the NSA. Sounds like some poorly scripted action film, but it’s true to form.

It gets scarier.

SamSam, first discovered in 2016, looks for unpatched server-side software to intrude. Once in, they’re able to lay waste to every Windows computer connected to the network, collecting sensitive data from companies before dumping another payload of ransom requests. Since 2015, SamSam has plundered major companies and wreaked havoc on cities like Atlanta to the tune of $5.9 million.

Nefarious code writers, using only their laptops and desire to hold data hostage, are coming for your digital assets. It’s one ubiquitous threat to multibillion dollar firms and small enterprises that can’t be ignored.

How ransomware distributes its payload

Low-level hackers use sketchy websites, email blasts and pay-per-install schemes to infect computers with ransomware. These methods aren’t nearly as effective since most of society’s computer users are more educated now than 10 years ago. But make no mistake – they still work.

Petya shoots straight toward the heart of PC’s – the master boot record (MBR). Once there, the cryptoworm will trigger a rewrite of Windows’ bootloader and initiate a computer restart. Once DOS has begun loading, the payload is dropped, encrypting the Master File Table of NTFS, which most Windows-based operating systems are partitioned with.

Throughout the ransom process, the user’s screen will look like CHKDSK (check disk) is running a series of drive sector repairs. Once the required Bitcoin payment is submitted, the ransomware will self-terminate. However, Posteo suspended the hacker’s email account for terms of service violations, meaning those who insisted on paying the ransom couldn’t send payment confirmation.

Petya was powerful enough to knock Chernobyl’s Nuclear Power Plant radiation monitor offline in 2017.

WannaCry was a short-lived yet highly lucrative cryptoworm that affected global computers running Microsoft Windows. Utilizing an exploit in older versions of Windows developed by the NSA and released by The Shadow Brokers dubbed ‘EternalBlue’, the ransomware encrypted data and demanded Bitcoin payment for its release. It worked in tandem with the DoublePulsar backdoor tool, although it was written to self-install as a failsafe.

Although Microsoft quickly patched the exploit in their flagship platform and developed a kill switch to avert further tragedy, 200,000 computers spanning 150 countries were affected, forcing countless businesses and consumers to pony up the requested payment.

Indeed, ransomware is one of society’s most widely disseminated forms of cryptovirology designed specifically to pervade our most valued possession: information. No industry is impervious to its destructive capabilities.

Ransomware targets many industries. Yes, even yours.

If you’re looking for reasons why small businesses can’t ignore cybersecurity, look at how the following industries have been victimized by ransomware over the last three years:


Not only did Atlanta endure their own $51,000 nightmare involving SamSam blocking access to court documents, but Baltimore’s 911 dispatch system was infected. Atlanta has since spent $2.6 million to secure their networks, computers and employ cybersecurity experts to help mitigate future attacks.

Farmington, New Mexico had their records processing and electronic bill payment system upended by ransomware, too. Also forced the City Hall in Springfield, Tennessee to fork over $1,000.

Utilities and Energy

Major utility providers, like Lansing Board of Water & Light (BWL) in Michigan, have seen their share of ransomware attacks. The BWL attack was propagated through email attachment, locking out employees with enterprise-level computers.

In April, the Ukrainian Energy and Coal Ministry website succumbed to a low-level ransomware attack which was quickly mitigated without paying the ransom fee.


Anonymous cyber extortionists bilked a remote Massachusetts school district out of $10,000 in bitcoin in May. The payment was made relatively quick to avoid excessive damage.

University College London, one of today’s most prestigious universities, was attacked in 2017. It’s unclear what the college paid, if anything, to secure their data.


Industry analysts concur that healthcare takes the brunt of ransomware attacks since personal data reaps thousands on black market .onion websites accessible by Tor. For example, Hollywood Presbyterian Medical Center forked over $17,000 back in February 2016.

Victims like the National Health Service hospitals in Scotland and England saw 70,000 connected devices, such as MRI scanners, theater equipment and blood containment refrigerators damaged to some degree by SamSam.


COSCO recently admitted ransomware crippled systems in several worldwide locations, including the United States. Free email addresses offered by Yahoo and Gmail were harvested.

NotPetya, an offshoot of the Petya cryptoworm, affected the world’s largest container shipper, Maersk. FedEx sustained damage from WannaCry, too.

In fact, every industry that owns connected devices such as tablets, computers, servers, scanners and highly technical machinery can fall victim to ransomware. If it uses an internet connection at any point, it’s game. Companies should explore all options available.

Companies can protect themselves. Immediately.

An ounce of prevention sure beats paying $50,000 in bitcoin. Unless you’re flush with cash and prepared to lose customer credit card information, sales data, an entire website and possibly the company itself, start by doing simple prep work, like:

  • Disconnecting all network computers from the internet when a significant speed drop is recognized.
  • Shutting down all devices when something seems afoul.
  • Creating backups which are offline and offsite.
  • Avoiding the use of default passwords (like Admin123)
  • Restricting access to Port 3389 (RDP)
  • Investing in cybersecurity.

The latter item is imperative. Sit back and ponder the time, money and effort expounded in building your company. If you’re not treating your business’s data safety needs with respect, don’t be shocked when others refuse to, either.

The end game? It’s about keeping connected networks and computers vital to your company’s data warehousing secure. Locked down. Surviving the algorithm of ransomware means keeping that algorithm from penetrating our defenses.

The Takeaway

Cybercriminals are cunning. They’re now concentrating their efforts on bitcoin, having created several variations of Petya capable of bilking millions in cryptocurrency in one swipe. Have they shied away from their thieving roots? No. In fact, attacks are happening to corporate servers as we speak.

Ransomware isn’t dying anytime soon, because as long as something of value is attainable, there will always be several rogue organizations gutsy enough to hold it hostage.

The threat of ransomware is real. What does your company stand to lose if ransomware took over your network?

0 2878
survival rate of mesothelioma

The survival rate of mesothelioma is measured in increments of one, five and ten years, depending on which type. For example, the survival rate of peritoneal mesothelioma at 1 year averages 38%. At the 5-year mark, it drops to 10%, with the expected survival rate at 10 years being 4%.

How doctors arrive at these figures depends on numerous factors, although age and overall health prior to and after diagnosis is important in formulating time lines of survival.

Why the survival rate of mesothelioma is important to know

Patients who’ve been diagnosed with either epithelial or peritoneal mesothelioma often contracted their cancerous conditions from:

  • Excessive exposure to asbestos
  • Work in coal mines
  • Other circumstances unknown or determined through testing

Because this type of lung cancer requires an aggressive plan to treat, it’s understandable that people want to know their survival chances. Moreover, to get the compensation mesothelioma victims deserve, attorneys may want to know the mesothelioma survival rates to determine how quickly to work on cases.

Also, individuals may entertain planning their last will and testament should their diagnoses drastically lower life expectancy.

Peritoneal mesothelioma survival rate

Formed within the tissue of the peritoneum, peritoneal mesothelioma is extremely serious, and may quickly advance stages if treatment isn’t started immediately. Because it’s the second most common type of mesothelioma, the survival rate is expected to not last longer than several years.

Heated chemotherapy and surgery are the most effective ways of mitigating this cancer type before it spreads.

A specialist’s quality of care and experience also factors in the survival rate of mesothelioma related to the peritoneum.

Epithelial mesothelioma survival rate

The most studied and great prognoses of all mesothelioma types makes cancer of the epithelioid easiest to gauge survival rates of.

Between 50% and 70% of all mesothelioma cancer cases involve mutated epithelial cells, which are found in several spots within our anatomy. It’s important to act quickly when this type of cancer is detected because while there are more studies done on this mesothelioma type, it’s also the quickest to spread to other areas, like the heart and other vital organs.

The survival rates are 50% at 2 years, and 42% at 3 years. Those with the much rarer sarcomatoid mesothelioma aren’t expected to live past 25 months.

How to increase mesothelioma survival rate

Simple things can be done to improve the survival rate of mesothelioma cancer.

  • Try and avoid working where excessive asbestos could be present. Should this type of work be necessary, protect your mouth, skin and other exposed body parts to avoid the potential for mesothelioma down the road.
  • Maintain a healthy diet as prescribed by your physician.
  • Take all medications as prescribed by physician.
  • Avoid anything which may further damage lungs, such as smoking or drug use.
  • Try various cannabidiol supplements to slow progression of mesothelioma.

Remember, at 10 years, only 4 out of 100 are expected to survive. Learn more about this cancer, the different types and what others are doing to prevent the progression of cancer to survive longer.

If you’re wanting to contribute something about the survival rate of mesothelioma in your family, sound off or drop us an email today.


the Equifax Data Breach

0 2412
The Equifax Data Breach, as you're probably aware, affected roughly 50% of America (up to 99%, depending on how we're looking at this). That...


fake penis

0 0
Everything in Hollywood is fake - even the methods used to pass drug screens. Former Khloe Kardashian beau Lamar...
Show Buttons
Hide Buttons