Skip to main content

Featured Post

A God of Forces: JEDI, Weighed Against Ending its Cloud Project because of Amazon

During early Eastern Standard Time hours, today, the Wall Street Journal’s John D. McKinnon wrote Pentagon Weighs Ending JEDI Cloud Project Amid Amazon Court Fight ( link ). McKinnon wrote on Washington, District of Columbia soil, Pentagon professionals considered ending the JEDI cloud-computing project (in Software Engineering lingo, it is really a program, the Joint Enterprise Defense Infrastructure): it is because Inc. has pushed litigation against it, and lawmakers are increasing their unfriendliness toward it. According to McKinnon, in 2019, Microsoft Corp. received the JEDI contract award, but Amazon contested this on court soil since then. On the Wall Street Journal, McKinnon continued: in April 2021, a federal judge refused the Pentagon’s demand to dismiss Amazon’s case, but the legal reasoning is unclear ( link ). Following this, Deputy Defense Secretary Kathleen Hicks stated the Pentagon would review JEDI, wrote McKinnon. McKinnon stated Hicks’ statement was on Ap

On the Secure Internet of Medical Things

The Internet and Telecom of Medical Things

In the August 2020 Edition of Communications of the ACM (the Association for Computing Machinery), Chief Internet Evangelist at Google and 2012 AD to 2014 AD ACM president, Vinton G. Cerf, wrote On the Internet of Medical Things, a column regarding healthcare and the widespread availability of household Internet and Telecom technologies applicable to healthcare. Related to the novel coronavirus, COVID-19, Cerf wrote that he experienced an unsettling doctor’s call because Cerf’s goal, a doctor analyzing his health, was rejected, but the offered alternative, a video consultation, was inadequate. Cerf wrote, “This led to the natural conclusion that remote detection would be helpful in these conditions” (Cerf, Aug 2020, p. 5). Cerf was saying this: he wanted a solution to the COVID-19 virus, but he had not planned an immediate solution to this contagion passing from one entity to another, so he ought to discuss solutions to this problem.

Against ‘90s Technology Standards, More Recent Diagnostic Technologies

On the topic of remote detection, Vinton G. Cerf wrote that numerous organizations are already creating IT (Information Technology) solutions that can count its owner’s steps walked, rate of pulse, heart rhythm, and blood oxidation levels; and motion rate; and temperature; and blood-glucose levels; and weight; etc. However, Cerf said, “Until now, these have made local recordings for later analysis” (Cerf, Aug 2020, p. 5). Cerf was saying that the variety of technologies available for monitoring human health is indeed robust, but because it is not real-time online monitoring, the aforementioned technologies’ efficacy is a simple concept: like a PlayStation One Memory Card, save now then upload later, but this is the year 2020, and the PlayStation One was originally 1990’s technology.

The Security of Communication

In Scripture, there is a record of Jesus of Nazareth, called by many, the Christ. Of Jesus of Nazareth (NIV), this is written, “Do not suppose that I have come to bring peace to the earth. I did not come to bring peace, but a sword” (Matt 10:34). Jesus of Nazareth is stating that he is a security personnel against an end to contention. In an age of Internet connectivity, I believe this is the second most vital aspect of security that Cerf should have recognized: communication (John 1:1). With no communication, healthcare facility entrances might as well have a big insurmountable wall in front them: dysfunctioning security adds to instability, but functioning security adds to stability. Cerf not mentioning security communication is strange because, at least in the United States, security organizations such as state police agencies have received United States military technologies, security personnel could easily populate Cerf’s doctor’s office with technologies such as CDC-compliant anti-coronavirus P100 face masks, and aid in guiding ongoing medical treatments within the medical facility. For reference to Information Security, I suggest reading Michael Whitman’s and Herbert Mattord’s Principles of Information Security, 5th Edition: as an undergraduate student, this was my ISYS 331 required textbook. On the subject of patient privacy rights, these ought to be protected because HIPPA exist to enable security entities to select the correct goals in a information systems security program or project rather than limit communication to non-essential conversations. For example, collecting doctor’s office visitor information is non-invasive, and can determine pre-existing condition eligibility willingly given in order for a patient to receive health treatment without getting far into the facility and causing a ruckus with the coronavirus a major current problem, internationally.

On Secure Communications, my Reflection

As a reflection: after high school, I became a more involved online multiplayer gamer: communication is the key to going by the way to blessings or curses (Matthew 15:11). In team based games, I learned this communication is vital to leading a team by an edge through a path onto another team’s base of operations. Whenever I dedicate time to games, I usually earn a high rank or challenge entities who are already high ranked. Cerf called the most invasive, and feasible, health technologies that are linkable to watches or mobile phones the general Internet of Medical Things, but the ideal current applicable terminology ought to be the Secure Internet of Medical Things, and its lifecycle development ought to display the acronym SIMT as the SSDLC (Secure Software Development Lifecycle) is the evolution of the SDLC (Software Development Lifecycle) does. As the related article, On the Internet of Medical Things, is on the Communications of the ACM magazine, this is a vital issue that I believe shall benefit Software Engineers’ time limitations: regardless of worst-case notation, asymptotically selected data structures and algorithms for the fastest miniaturized central processing units, Software Engineers ought to prepare for an added, but wanted, process being communicating with security entities for mission critical activities to avoid increasing overhead beyond worth and feasibility. 

An IoT (Internet of Things) model displaying various Internet and Telecom technologies
Image by Gerd Altmann from Pixabay


Popular posts from this blog

In response to the Institute of Industrial Science, the University of Tokyo’s Circular Reasoning: Spiral Circuits for More Efficient AI

Circular Reasoning On June 14, 2020, the IIS (Institute of Industrial Science) at the UTokyo (University of Tokyo) wrote  Circular Reasoning: Spiraling Circuits for More Efficient AI ; but a Press Release from this institute is giving a synopsis on this topic. On this press release, the IIS wrote, “Researchers from the Institute of Industrial Science at the University of Tokyo designed and built specialized computer hardware consisting of stacks of memory modules arranged in a 3D-spiral for artificial intelligence (AI) applications” (IIS, June 14, 2020). The IIS continued on, saying this research is allowing a singular way work can be done regarding the next generation energy efficient AI devices (Here is a current generation, but energy efficient, AI device, Android Pie: link ) shall be implemented into production.             The Fundamentals of Machine Learning                On this press release, the IIS is explaining the fundamentals of ML (Machine Learning). The IIS wrote, “Mach

IS the Future of AI “Women?”

Interdisciplinary Campus Culture On April 14, 2020, Katy Rank Lev wrote the Carnegie Mellon University’s (CMU) news article The Future of AI is Female . Since artificial intelligence’s (AI) initial measurement, wrote Lev, CMU built AI. Lev wrote that each of the colleges CMU is representing contribute to make AI a new field, describing this AI as a frontier, humanity can democratize: from healthcare, the eventual goal area is education. In a rush, Lev cut the conversation short, and Lev mentioned CMU’s interdisciplinary campus culture as the source of the effective AI women, but this is despite women historically not represented as scientists, technologists, and engineers, and math (STEM), worldwide. But CMU is spotlighting undergraduate students and highly honored faculty members, and Lev is including these women because she agrees with the Women in Tech movement as far as the East is from the West: CMU is the best Computer Science University with AI, and this is IT at this point in

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Contact Form


Email *

Message *