Skip to main content

Featured Post

We Should Have Already Had This: The Lithium-Ion Battery With Built-In Fire Suppression

On October 22, 2020, yesterday, Dexter Johnson posted The Lithium-Ion Battery With Built-In Fire Suppression. Within this topic, Dexter Johnson regards a Stanford University research team and the SLAC National Accelerator Laboratory (its former name was the Stanford Linear Accelerator Center[1]). Johnson stated:Now [Yi] Cui and his research team, in collaboration with SLAC National Accelerator Laboratory, have offered some exciting new capabilities for lithium-ion batteries based around a new polymer material they are using in the current collectors for them. The researchers claim this new design to current collectors increases efficiency in Li-ion batteries and reduces the risk of fires associated with these batteries.[2]Johnson was saying this: fires are a current Li-ion battery threat that has been realized, but a new design can secure client use-case safety, and this required this battery redesigned. As this technology approaches marketplace entry points, this shall confront Li-io…

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

               With Cyber Security activated, an easy Smart phone app

Considering Holy Security


When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” (New International Version, Eph 6:11-17 (link)). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity.

On ebay, a Seventh Generation i5 Surface Pro: link

Cyber Security Hygiene

Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along with her clients because true security is inclusive. In this case, if one part of the network is compromised, it could cause a variety of issues that could be preventatively defended against beforehand. Issues such as stolen identities and proprietary data would damage the integrity of the woman’s consulting business, but the damaged image of the company purposefully neglecting the protection of critical data would probably be more difficult to repair (link).

On ebay, a 15.6" AOC Widescreen Flat-Panel USB 3.0-Powered Portable LED Monitor..link

Protecting the Group

Paul called on the body of Christ to protect each other. Paul said, “Keep watch over yourselves and all of the flock of which the Holy Spirit has made you overseers. Be shepherds of the church of God, which he bought with his own blood” (Acts 20:28). Paul was saying that the body of Christ, all of humanity who has been bought with a price, should care for each other as a healthy living being naturally protects its own body. This can be interpreted as the need to protect one another as being a moral obligation (link). Therefore, the woman should reorganize her company to protect it.

On Amazon, an Honor 8A (32GB) 6.09" HD+ Display, Dual SIM 4G LTE GSM Factory Unlocked Smartphone - International Version JAT-LX3 (Black): link


Comments

Popular posts from this blog

In response to the Institute of Industrial Science, the University of Tokyo’s Circular Reasoning: Spiral Circuits for More Efficient AI

Circular Reasoning
On June 14, 2020, the IIS (Institute of Industrial Science) at the UTokyo (University of Tokyo) wrote Circular Reasoning: Spiraling Circuits for More Efficient AI; but a Press Release from this institute is giving a synopsis on this topic. On this press release, the IIS wrote, “Researchers from the Institute of Industrial Science at the University of Tokyo designed and built specialized computer hardware consisting of stacks of memory modules arranged in a 3D-spiral for artificial intelligence (AI) applications” (IIS, June 14, 2020). The IIS continued on, saying this research is allowing a singular way work can be done regarding the next generation energy efficient AI devices (Here is a current generation, but energy efficient, AI device, Android Pie: link) shall be implemented into production.            The Fundamentals of Machine LearningOn this press release, the IIS is explaining the fundamentals of ML (Machine Learning). The IIS wrote, “Machine learning is a ty…

IS the Future of AI “Women?”

Interdisciplinary Campus Culture
On April 14, 2020, Katy Rank Lev wrote the Carnegie Mellon University’s (CMU) news article The Future of AI is Female. Since artificial intelligence’s (AI) initial measurement, wrote Lev, CMU built AI. Lev wrote that each of the colleges CMU is representing contribute to make AI a new field, describing this AI as a frontier, humanity can democratize: from healthcare, the eventual goal area is education. In a rush, Lev cut the conversation short, and Lev mentioned CMU’s interdisciplinary campus culture as the source of the effective AI women, but this is despite women historically not represented as scientists, technologists, and engineers, and math (STEM), worldwide. But CMU is spotlighting undergraduate students and highly honored faculty members, and Lev is including these women because she agrees with the Women in Tech movement as far as the East is from the West: CMU is the best Computer Science University with AI, and this is IT at this point in ti…

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing
On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these two …

Contact Form

Name

Email *

Message *