Skip to main content

Featured Post

Utilizing Media: A Response to Deepfakes

  Of the ACM (the Association for Computing Machinery), a magazine called Communication of the ACM's edition releases 1 month before its stated release month. In the latest edition, regarding March 2021, of Communications of the ACM , Column Editor, Susan J. Winter wrote Computing Ethics: What To Do About Deepfakes . Regarding Winter’s desire to halt or hinder illegal or unethical deepfakes, a video technology like wearing a full body masking suit, Winter wrote, “Here are three areas where technical experts can make positive contributions to the development of synthetic media technologies: education and media literacy, subject defense, and verification” (Winter, March, 2021). Winter was saying actions such as teaching and having disruptive technology knowledge, researching professionally, and proving concepts are parts of deepfake experts’ calculus. But this much work specializes such that entry level, junior, work will probably be offered to overqualified professionals. Technic

On Hacking the Axis and Securing History Records


On Security Requirements, Review Physical Might

On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis. When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect.

Emergent Cybersecurity Requirements

With physical security, there is an emergent cybersecurity necessity that John Arquilla discussed. Arquilla mentioned then first HPCs (high performance computing), and their titles; but they are likely not conversed and regarded to. On remembering World War II, Arquilla wrote, “Yet in all this, I suspect the role of the first “high-performance computing” capabilities of the Allies—known as Ultra in Britain, Magic in the U.S.—will receive too little attention” (Arquilla, 2020). Indeed, a computer system called Magic during World War II ought to have been kept a secret that is, until the right place and time because the United States is historically a Christian nation (link), thus so that titling would have probably disrupted the Allied war effort, and made the United States an international laughing stock. Something like an inflatable tank would not have worked on the Nazis (link): as a matter of honor, this would have been called disrespectful, internationally, and beating the Allies would have been a matter of honor that the Allies would be viewed as more of the same problem that caused Nazism’s evil to multiply into the blitzkrieg offensive: sin (NIV, Exodus 18:9-12).

A Reflection on Simon Subtitled Magus

During 2020, I met a magician: on this magician, male, telling me his title, he quickly spoke that his title was limited to slight of hand tricks. In Scripture, a sorcerer named Simon wanted to buy the του παρακλετος του πνευμα του αγιον—in English, the Holy Spirit. The book of Acts (NIV), probably written by Simon Peter, states:

Now for some time a man named Simon had practiced sorcery in the city and amazed all the people of Samaria. He boasted that he was someone great, and all the people, both high and low, gave him their attention and exclaimed, “This man is rightly called the Great Power of God.” They followed him because he had amazed them for a long time with his sorcery. But when they believed Philip as he proclaimed the good news of the kingdom of God and the name of Jesus Christ, they were baptized, both men and women. Simon himself believed and was baptized. And he followed Philip everywhere, astonished by the great signs and miracles he saw. (Acts 8:9-13).

Indeed, this was a time of great signs, for a sorcerer accepted the baptism. However, turmoil transpired: it was not everlasting. The book of Acts (NIV) states, “When Simon saw that the Spirit was given at the laying on of the apostles’ hands, he offered them money and said, “Give me also this ability so that everyone on whom I lay my hands may receive the Holy Spirit.” (Acts 8:18-19). However, this was not the end of the story: more can be read in the NIV Bibles that I linked a few times (and on purchasing this book, I may get a commission, so thank you ahead of time.). In the case of the magician I met whose name was Joey, this year, I was studying the King James Bible and the New International Bible, but this magician wanted me having a close Wiccan Bible encounter. Against it, I wanted no connection, so I departed that environment: with my integrity intact, I believe (NIV, Romans 12:19, 16:17). Therefore, magic still holds the same meaning against me advancing an approximate two thousand years: even flair and strange division can seem exciting, but ultimately good news is a better worst-case: for each sin, offer the good news; the alternative is individually counting the tricks a sorcerer can perform then requesting them.

This is a proposition: a workable history traversing tool

In asymptotic notation, the sin-law contrast can be considered an AVL (Adelson-Velsky and Landis) over Height Balanced tree, zero, negative one, and negative two on one side, one being the root; two, three, and four where one altitude has a sin divided as one branch, and this tree’s other branch contains a law and prophecy offered, traversal per branch. Thus so, one traversing one branch requires one step per law totaling O (n) for space, but on these binary branches requiring work for sorting, searching, and deleting, the logarithm will eventually even, well, with balance factors. The lesson, here, is Romans 6:11. Work remains required, O(log n) for finding the sin, sorting the sins committed with the laws prohibiting them per sin and per law, and baptizing and giving the Holy Spirit when applicable, making the man, woman, or child born anew, and the worse O(n) for space because compartmentalizing the law and the prophets into organized doctrine shall require a step by step effort. During my Johns Hopkins University studies, starting today, I shall endeavor this effort. My studies shall be EN 605.601 and EN 605.611. Eventually, through self-study and research: through a research article portal, I shall post my findings. I believe this shall require a few years maximum, so 2024. Moving forward, I shall address the archaeological and text data that is available, and I want this published so the general public shall review it. For more Data Structures and Algorithms information, I recommend the book I studied: during my undergraduate program (link).

A Top Secret stamp of approval
Image by Tayeb MEZAHDIA from Pixabay

Arquilla, J. (2020, May 7). Hacking the Axis. Communications of the ACM, (08/2020), 8–9.


Popular posts from this blog

In response to the Institute of Industrial Science, the University of Tokyo’s Circular Reasoning: Spiral Circuits for More Efficient AI

Circular Reasoning On June 14, 2020, the IIS (Institute of Industrial Science) at the UTokyo (University of Tokyo) wrote  Circular Reasoning: Spiraling Circuits for More Efficient AI ; but a Press Release from this institute is giving a synopsis on this topic. On this press release, the IIS wrote, “Researchers from the Institute of Industrial Science at the University of Tokyo designed and built specialized computer hardware consisting of stacks of memory modules arranged in a 3D-spiral for artificial intelligence (AI) applications” (IIS, June 14, 2020). The IIS continued on, saying this research is allowing a singular way work can be done regarding the next generation energy efficient AI devices (Here is a current generation, but energy efficient, AI device, Android Pie: link ) shall be implemented into production.             The Fundamentals of Machine Learning                On this press release, the IIS is explaining the fundamentals of ML (Machine Learning). The IIS wrote, “Mach

IS the Future of AI “Women?”

Interdisciplinary Campus Culture On April 14, 2020, Katy Rank Lev wrote the Carnegie Mellon University’s (CMU) news article The Future of AI is Female . Since artificial intelligence’s (AI) initial measurement, wrote Lev, CMU built AI. Lev wrote that each of the colleges CMU is representing contribute to make AI a new field, describing this AI as a frontier, humanity can democratize: from healthcare, the eventual goal area is education. In a rush, Lev cut the conversation short, and Lev mentioned CMU’s interdisciplinary campus culture as the source of the effective AI women, but this is despite women historically not represented as scientists, technologists, and engineers, and math (STEM), worldwide. But CMU is spotlighting undergraduate students and highly honored faculty members, and Lev is including these women because she agrees with the Women in Tech movement as far as the East is from the West: CMU is the best Computer Science University with AI, and this is IT at this point in

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Contact Form


Email *

Message *