Skip to main content

Featured Post

Utilizing Media: A Response to Deepfakes

  Of the ACM (the Association for Computing Machinery), a magazine called Communication of the ACM's edition releases 1 month before its stated release month. In the latest edition, regarding March 2021, of Communications of the ACM , Column Editor, Susan J. Winter wrote Computing Ethics: What To Do About Deepfakes . Regarding Winter’s desire to halt or hinder illegal or unethical deepfakes, a video technology like wearing a full body masking suit, Winter wrote, “Here are three areas where technical experts can make positive contributions to the development of synthetic media technologies: education and media literacy, subject defense, and verification” (Winter, March, 2021). Winter was saying actions such as teaching and having disruptive technology knowledge, researching professionally, and proving concepts are parts of deepfake experts’ calculus. But this much work specializes such that entry level, junior, work will probably be offered to overqualified professionals. Technic

AIOps will help telcos manage AI at scale – a must in 5G networks

 

AI’s Profound Effect on CSPs’ Businesses


In August, 2020, Vice President of the TM Forum’s AI & Customer Experience, Aaron Boasman-Patel wrote AIOps will help telcos manage AI at scale – a must in 5G networks. Boasman-Patel wrote, “AI is going to have a profound effect on communication services providers’ (CSPs’) businesses” (Boasman-Patel, August, 2020). I believe this is an ideal, pillar-of-civilization, opportunity because AIs are special learners that advance to high-rank single task ‘completionists’ such as Go, the game, and chess, the game. Boasman-Patel continued by stating that it is desired that AI will transform CSPs’ networks, IT, and service operations, and this will enable their delivery of new and complex services that the digital ecosystem will allow across it. He also stated that the McKinsey Global Institute estimates that AI knew hot to contribute an added benefit to gross domestic product for a minimum of one decade that is, 1.2% annual growth, or $13 trillion dependent on economic activity by 2030.

5G is a Driver

On 5G and AI, Boasman-Patel went and then said these two technologies are not the entirety of entrance unlocking motivators for cognitive and autonomous network development. Boasman-Patel stated, “The advent of new wireless technologies such as 5G have the potential to add even more complexity to the network, particularly in radio access network (RAN) operations)” (Boasman-Patel, August, 2020). This radio technology is the pillar-of-civilization opportunity that I regarded hint-worthy and hint-feasible because an AI can rapidly optimize the Networks and Telecommunications signals that computer information systems produce on the Internet and World Wide Web. Boasman-Patel added that there is an estimated 2025 device connections count: one hundred billion, approximately – this desirably is a pressurizing event on networks.

Zero-touch is the goal

With Zero-touch being the goal, Boasman-Patel said as little as four hundred incidents to as many as ten thousand incidents knew how to lead to this. In maintenance, I would rather not be ruled by an incident seller because: as the Proverb states, “The prudent see danger and take refuge, but the simple keep going and pay the penalty” [NIV (link), Proverbs 22:3 (link)], and remember the Proverb 22:7 (link). As this high incident count will increase overhead too much, Boasman-Patel stated CSPs are required to unleash AI and automation within their intranet operations and extranet operations because this is for management of increased traffic. However, Boasman-Patel expressed his concern that large-scale AI deployments within operators’ intranets and extranets, their networks, makes large challenges against operations including: of hundreds to thousands of AI modularities and components, governance, deployments, and operations; and controls; and maintenances; but this is a long-term goal of these technologies eventually forming a portion of CSPs’ central IT and networks and telecommunications, and information systems architecture.  

AI software models are black boxes

In addition, Boasman-Patel wrote that AI software models are black boxes, and I believe this was because AI is quite sophisticated, but with Sundar Pichai, a businessman and business technologist by training, him being the CEO of Google during the development of Android Pie and after its release means Android is a division of an IT company by an IT CEO’s vision, and this is evidenced by Sundar Pichai appearing in court rather than Larry Page or Sergey Brin, the co-founders of Google: I believe Google, a well known CSP, has ventured from their Computer Science origins into IT well in maintenance, but not totally in innovation because Pie is facing the same threat that other AIs have: crime, but especially video game system application emulation and video game software application. On the third Proverb chapter, the thirty-first Proverb states, “Do not envy a violent man, and do not emulate his lifestyle” [ISV (link)]. Since the dot-com boom of the early 00’s, malicious Internet and World Wide Web users have gone to terrible lengths pirating violent video games, and they emulated these characters. This can generate pits young men and women are not ready to confront. The original evolving Christians were required to support the Bible by formal evolution: Christianity does not teach that piracy is good, against this is theft law, Exodus 20:15 (link). However, USA Christianity is declining.

This is my reflection on my experiences

On the Christianity in the United States Wikipedia article, Wikipedia writers reported sixty-five percent of American adults are Christian, by the person and the woman. From 2015, I believe this decline is particularly because of unproven claims: a president such as Donald Trump, middle named John, claiming Christian status by national Census, but being a whoremonger in deed, and many wealthy celebrities supporting the unproven thus accusatory religion, Scientology, and its unproven thus accusatory Dianetics. Without the Jew following the law, the Jew becomes alive to the law, but the Gentile has the same lawful requirement [(NIV (link), Romans 2:10-13 (link)). Further, I noticed many piracy-supporting technologies Amazon.com allows listing: these are strange technologies that I believe caused Sega’s post-Dreamcast (link) decline, the Leyou Millenium acquisition of SNK Playmore – a best-in-class and leading edge video game company (link), and Capcom’s own eventual choice to concentrate on video game remasters (link), future-proofing themselves.

Edit: There was a historical record error -- Capcom did not buy SNK Playmore. 

On those who only know Sega for Sonic the Hedgehog (link), the Sega Genesis (link) was the more intense audio experience contrasted from the NES (Nintendo Entertainment System) because the NES (link) is an 8-bit video game system, but the Sega Genesis is a 16-bit system: these technologies are both based on powers of two in accordance with Moore’s Law. You, reader, on the subject of  Gordon Moore’s Law, you may search for the central Wikipedia article, for starters. However, the Nintendo Entertainment System had Mega Man (link), a very advanced video game at the time of its original generational period, the third. SegaRetro.org/Blast_processing contains a well-made article on Blast Processing, a controversial Sega Genesis technology. SNK Playmore is known for King of Fighters games (link) and Samurai Showdown games (link), but SNK made the Neo Geo (link) group of video game consoles: top dollar computer information systems. After years of piracy, during the Nintendo Gamecube, PlayStation 2, and the shortly made Sega Dreamcast; but also the Microsoft Xbox generation, Capcom made Capcom vs SNK 2 (link): this was a very intense game. SNK Playmore was going out of business because of sales deficits that it continues experiencing, today (link). Next, Capcom made the Arcade-perfect, a term used to describe games that were as good as the arcade technologies, but on video game consoles such as the Sega Saturn (link) and Sega Dreamcast (link), Marvel vs Capcom 2 (link), another very intense video game experience. These game systems were pirated, but then it gets worse: their video games were pirated. With multi-year efforts, these games were multi-million dollar deals, but now this technology is sold wrongly: on Amazon, pirates are given royal exhibition privileges. It actually feels racist. I grew playing games, but AI will collect historical analytics for future regulated-privacy-acknowledging curations.

Against Pie turning into a robotic racist whore simulation as Microsoft’s Twitter bot (link), for example, the best worst-case preparation is having a complete core that secures navigation for a user. This secure navigation will come at the cost of total accessible Internet portals and available World Wide Web sites, but there really is no point to venture into malicious Web sites that have malware or privacy-violating technologies except to get rid of the malware and retrieve lost data: this is really only a job for security professionals any way you look at it.

Image by Julien Tromeur from Pixabay

Comments

Popular posts from this blog

In response to the Institute of Industrial Science, the University of Tokyo’s Circular Reasoning: Spiral Circuits for More Efficient AI

Circular Reasoning On June 14, 2020, the IIS (Institute of Industrial Science) at the UTokyo (University of Tokyo) wrote  Circular Reasoning: Spiraling Circuits for More Efficient AI ; but a Press Release from this institute is giving a synopsis on this topic. On this press release, the IIS wrote, “Researchers from the Institute of Industrial Science at the University of Tokyo designed and built specialized computer hardware consisting of stacks of memory modules arranged in a 3D-spiral for artificial intelligence (AI) applications” (IIS, June 14, 2020). The IIS continued on, saying this research is allowing a singular way work can be done regarding the next generation energy efficient AI devices (Here is a current generation, but energy efficient, AI device, Android Pie: link ) shall be implemented into production.             The Fundamentals of Machine Learning                On this press release, the IIS is explaining the fundamentals of ML (Machine Learning). The IIS wrote, “Mach

IS the Future of AI “Women?”

Interdisciplinary Campus Culture On April 14, 2020, Katy Rank Lev wrote the Carnegie Mellon University’s (CMU) news article The Future of AI is Female . Since artificial intelligence’s (AI) initial measurement, wrote Lev, CMU built AI. Lev wrote that each of the colleges CMU is representing contribute to make AI a new field, describing this AI as a frontier, humanity can democratize: from healthcare, the eventual goal area is education. In a rush, Lev cut the conversation short, and Lev mentioned CMU’s interdisciplinary campus culture as the source of the effective AI women, but this is despite women historically not represented as scientists, technologists, and engineers, and math (STEM), worldwide. But CMU is spotlighting undergraduate students and highly honored faculty members, and Lev is including these women because she agrees with the Women in Tech movement as far as the East is from the West: CMU is the best Computer Science University with AI, and this is IT at this point in

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Contact Form

Name

Email *

Message *