Skip to main content

Featured Post

Utilizing Media: A Response to Deepfakes

  Of the ACM (the Association for Computing Machinery), a magazine called Communication of the ACM's edition releases 1 month before its stated release month. In the latest edition, regarding March 2021, of Communications of the ACM , Column Editor, Susan J. Winter wrote Computing Ethics: What To Do About Deepfakes . Regarding Winter’s desire to halt or hinder illegal or unethical deepfakes, a video technology like wearing a full body masking suit, Winter wrote, “Here are three areas where technical experts can make positive contributions to the development of synthetic media technologies: education and media literacy, subject defense, and verification” (Winter, March, 2021). Winter was saying actions such as teaching and having disruptive technology knowledge, researching professionally, and proving concepts are parts of deepfake experts’ calculus. But this much work specializes such that entry level, junior, work will probably be offered to overqualified professionals. Technic

To Robert Sedgewick, a Response: Computer Science Shall Be Required, Conditionally


Requiring Computer Science


On October 28, 2019, Robert Sedgewick wrote Should Computer Science Be Required (link). Sedgewick wrote, "Every college student needs a Computer Science course, and most need two or more." Of Computer Science educators, Sedgewick believed: at least one Computer Science course is the profession-entry requirement. Sedgewick accorded: recognizing the "truth": the increasing educator count; but educators have not met this need. 

Is Computer Science Normal

Sedgewick asked: was requiring each college student one Computer Science course normal? Sedgewick described his question: debatable. For all students: As an available necessity, Sedgewick supported Computer Science. Except Computer Science, Sedgewick stated colleges and universities: in almost any course discipline, they are allowing enrollment: for any student.

The Limited Instructed

In Scripture, instructors defined the limited instructed. To his Corinth-located family, the Tarsus man, Saul, sent (link), "Be careful, however, that the exercise of your rights does not become a stumbling block to the weak" (1 Corinthians 8:9, New International Version). The Apostle Paul was saying that carefully helping others shall benefit others specifically when it is acceptable content to do so.


Princeton has a rough outlook, here.


Princeton University is a civilization-leading university, but Princeton University caused the weak to stumble. Instead, Princeton did not shine above the earth, but failed, because her rights exercised accused all universities and colleges: against the history of every human civilization's achievements, Robert Sedgewick's questioning of the foundation of civilization's technology framework, its normalcy, cursed all societies. Adding to further damage, Sedgewick said to hold on because he did not know if every college student should learn Computer Science. 

When learning Computer Science, be sure and learn case and civil law.

I do not believe every student should learn Computer Science because law is rarely taught: in my B.S. in Computer Science program, I studied Computer Science ethics, and this included case law, and this curriculum is rare. With my efforts, starting young, Computer Science programs shall be required, but the requirement is lower family income, and the small business population increasing because the federal government security budget is too large. The White House stated (link): the 2020 Fiscal Year President's cybersecurity budget is $17.4 billion; against the 2019 Fiscal Year estimate, this is a $790 million increase.

Countering Web brower insecurity is as complex as downloading the right app.

With most computing devices being Android, 74.31% (Update: the 74.31 link is broken), now virtually one hundred percent (link), downloaded apps can counter excessive Web browser surfing. Focused Android device attacks shall have specialized responses that either: devolve to Smart phone hit-and-runs, or they involve larger coordinated Hardware manufacturer attacks, and these are both targeting Android Pie because Pie is the PC AI basis. Then, more money can fund anti-gun-violence than $25 million, this year: on TheScientist, Ashley Yeager reported this mentioned United States 2020 gun-violence research budget (link).

Into three terminals, an Information Technology infrastructure localized.
Image by Gerd Altmann from Pixabay

Comments

stimyanmar said…
Pretty good post. I just stumbled upon your blog and wanted to say that I have really enjoyed reading your blog posts. I hope you post again soon. Big thanks for the useful info. Computer Science Program

Popular posts from this blog

In response to the Institute of Industrial Science, the University of Tokyo’s Circular Reasoning: Spiral Circuits for More Efficient AI

Circular Reasoning On June 14, 2020, the IIS (Institute of Industrial Science) at the UTokyo (University of Tokyo) wrote  Circular Reasoning: Spiraling Circuits for More Efficient AI ; but a Press Release from this institute is giving a synopsis on this topic. On this press release, the IIS wrote, “Researchers from the Institute of Industrial Science at the University of Tokyo designed and built specialized computer hardware consisting of stacks of memory modules arranged in a 3D-spiral for artificial intelligence (AI) applications” (IIS, June 14, 2020). The IIS continued on, saying this research is allowing a singular way work can be done regarding the next generation energy efficient AI devices (Here is a current generation, but energy efficient, AI device, Android Pie: link ) shall be implemented into production.             The Fundamentals of Machine Learning                On this press release, the IIS is explaining the fundamentals of ML (Machine Learning). The IIS wrote, “Mach

IS the Future of AI “Women?”

Interdisciplinary Campus Culture On April 14, 2020, Katy Rank Lev wrote the Carnegie Mellon University’s (CMU) news article The Future of AI is Female . Since artificial intelligence’s (AI) initial measurement, wrote Lev, CMU built AI. Lev wrote that each of the colleges CMU is representing contribute to make AI a new field, describing this AI as a frontier, humanity can democratize: from healthcare, the eventual goal area is education. In a rush, Lev cut the conversation short, and Lev mentioned CMU’s interdisciplinary campus culture as the source of the effective AI women, but this is despite women historically not represented as scientists, technologists, and engineers, and math (STEM), worldwide. But CMU is spotlighting undergraduate students and highly honored faculty members, and Lev is including these women because she agrees with the Women in Tech movement as far as the East is from the West: CMU is the best Computer Science University with AI, and this is IT at this point in

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Contact Form

Name

Email *

Message *