Skip to main content

On Hacking the Axis and Securing History Records

 

On Security Requirements, Review Physical Might


On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis. When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect.

Emergent Cybersecurity Requirements

With physical security, there is an emergent cybersecurity necessity that John Arquilla discussed. Arquilla mentioned then first HPCs (high performance computing), and their titles; but they are likely not conversed and regarded to. On remembering World War II, Arquilla wrote, “Yet in all this, I suspect the role of the first “high-performance computing” capabilities of the Allies—known as Ultra in Britain, Magic in the U.S.—will receive too little attention” (Arquilla, 2020). Indeed, a computer system called Magic during World War II ought to have been kept a secret that is, until the right place and time because the United States is historically a Christian nation (link), thus so that titling would have probably disrupted the Allied war effort, and made the United States an international laughing stock. Something like an inflatable tank would not have worked on the Nazis (link): as a matter of honor, this would have been called disrespectful, internationally, and beating the Allies would have been a matter of honor that the Allies would be viewed as more of the same problem that caused Nazism’s evil to multiply into the blitzkrieg offensive: sin (NIV, Exodus 18:9-12).

A Reflection on Simon Subtitled Magus

During 2020, I met a magician: on this magician, male, telling me his title, he quickly spoke that his title was limited to slight of hand tricks. In Scripture, a sorcerer named Simon wanted to buy the του παρακλετος του πνευμα του αγιον—in English, the Holy Spirit. The book of Acts (NIV), probably written by Simon Peter, states:

Now for some time a man named Simon had practiced sorcery in the city and amazed all the people of Samaria. He boasted that he was someone great, and all the people, both high and low, gave him their attention and exclaimed, “This man is rightly called the Great Power of God.” They followed him because he had amazed them for a long time with his sorcery. But when they believed Philip as he proclaimed the good news of the kingdom of God and the name of Jesus Christ, they were baptized, both men and women. Simon himself believed and was baptized. And he followed Philip everywhere, astonished by the great signs and miracles he saw. (Acts 8:9-13).

Indeed, this was a time of great signs, for a sorcerer accepted the baptism. However, turmoil transpired: it was not everlasting. The book of Acts (NIV) states, “When Simon saw that the Spirit was given at the laying on of the apostles’ hands, he offered them money and said, “Give me also this ability so that everyone on whom I lay my hands may receive the Holy Spirit.” (Acts 8:18-19). However, this was not the end of the story: more can be read in the NIV Bibles that I linked a few times (and on purchasing this book, I may get a commission, so thank you ahead of time.). In the case of the magician I met whose name was Joey, this year, I was studying the King James Bible and the New International Bible, but this magician wanted me having a close Wiccan Bible encounter. Against it, I wanted no connection, so I departed that environment: with my integrity intact, I believe (NIV, Romans 12:19, 16:17). Therefore, magic still holds the same meaning against me advancing an approximate two thousand years: even flair and strange division can seem exciting, but ultimately good news is a better worst-case: for each sin, offer the good news; the alternative is individually counting the tricks a sorcerer can perform then requesting them.

This is a proposition: a workable history traversing tool

In asymptotic notation, the sin-law contrast can be considered an AVL (Adelson-Velsky and Landis) over Height Balanced tree, zero, negative one, and negative two on one side, one being the root; two, three, and four where one altitude has a sin divided as one branch, and this tree’s other branch contains a law and prophecy offered, traversal per branch. Thus so, one traversing one branch requires one step per law totaling O (n) for space, but on these binary branches requiring work for sorting, searching, and deleting, the logarithm will eventually even, well, with balance factors. The lesson, here, is Romans 6:11. Work remains required, O(log n) for finding the sin, sorting the sins committed with the laws prohibiting them per sin and per law, and baptizing and giving the Holy Spirit when applicable, making the man, woman, or child born anew, and the worse O(n) for space because compartmentalizing the law and the prophets into organized doctrine shall require a step by step effort. During my Johns Hopkins University studies, starting today, I shall endeavor this effort. My studies shall be EN 605.601 and EN 605.611. Eventually, through self-study and research: through a research article portal, I shall post my findings. I believe this shall require a few years maximum, so 2024. Moving forward, I shall address the archaeological and text data that is available, and I want this published so the general public shall review it. For more Data Structures and Algorithms information, I recommend the book I studied: during my undergraduate program (link).

A Top Secret stamp of approval
Image by Tayeb MEZAHDIA from Pixabay
References

Arquilla, J. (2020, May 7). Hacking the Axis. Communications of the ACM, (08/2020), 8–9. https://doi.org/10.1145/3403403958

Comments

Popular posts from this blog

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

                Considering Holy Security When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” ( New International Version , Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. Cyber Security Hygiene Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along with her clients because true security i

On Computer Organization and Architecture: the Hierarchy

On study.com, Abirami Thangavel wrote Superscalar & VLIW Architectures: Characteristics, Limitations & Functions. Regarding parallel architectures, superscalar and VLIW, Thangavel wrote: In computer architecture, parallel processing refers to processing of multiple instructions of a program by distributing them among multiple processors. Superscalar and Very Long Instruction Word (VLIW) are parallel architectural models based on Flynn's Taxonomy. Both superscalar and VLIW architectures are capable of executing multiple instructions at one cycle. Each uses a different method for instruction scheduling. While superscalar processors execute instructions dynamically, VLIW uses static scheduling of program instructions.[1] Thangavel was saying this: on Flynn’s Taxonomy, superscalar and VLIW architectures are based, but they have differences. Therefore, on entity priorities, entities have different descriptive capabilities. As follows, a superscalar processor is this: a microproc

Resuming Pace: I Shall Not Be Pursuing a Second Bachelor's Degree

On May the 5th, 2021, I used a strong position deciding my pursuit of a second Bachelor’s degree: my choice was the University of Maryland Global Campus (UMGC, link ), but I decided to resume my Master’s program, by itself.  Let me explain with Scripture: the Gospel of Jesus Christ According to Matthew, specifically. In ancient times, records of a man called Jesus the Christ were written. Among these records was a Gospel, According to Matthew, of Jesus Christ. According to legend, Jesus Christ stated, “Blessed are the meek: for they shall inherit the earth (KJV, Matthew 5:5, link ).” Jesus the Christ was saying those who are submissive shall inherit the earth rather than those who are brash.  In my attempt at starting a second Bachelor’s program, I eventually realized I had been too pushy: I wanted the May 19th start date, and I wanted the admission process expedited, I wanted ease of access between majors, I wanted advantages to the application process because of what UMGC (I was gra

Contact Form

Name

Email *

Message *