Skip to main content


Showing posts from August 16, 2020

Featured Post

On Trust, Bias, and Privilege: my Response to 'Anti-Blackness is no glitch'

In Winter 2020, Stephanie T. Jones and Natalie Melo wrote ‘Anti-Blackness is no glitch’: The need for critical conversations within computer science education . Jones and Melo mentioned, “The conversation around and application of computer science often reinforces neoliberal ideals” (Jones, Melo, November 25, 2020, pg. 42). Jones and Melo were saying this: the computer science revolution and organizational IT network futuristic left-wing best standards access is telling. For Trust, I am Checking my Privilege But this is not excluding contemporary conversations: any futuristic conversation based on personal interpretation is not from ABBA, so it is not prophecy (NIV, 2 Peter 1:20). For your review, Peter wrote, "For prophecy never had its origin in the human will, but prophets, though human, spoke from [ABBA] as they were carried along by the Holy Spirit" (2 Peter 1:21). You, reader, can predict something shall happen, but prediction is uncertain: it is a terminating series ca

Stakeholder Contexts and Industry Standards: ISO/IEC 38500 IT Governance, but then an IT Compliance Framework

ISO / IEC 38500 IT Governance ^ Compliance In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3).  SMEs Linked to Measurable Successful Outcomes With regard to small and medium-sized enterprises, or SMEs, Olaitan Olutoyin and Stephen Flowerday suggested that the IT governance structure and the operational governance processes are linked to measurable successful outcomes by three key pillars (2016). Olutoyin and Flowerday (2016) said that the thre

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

                Considering Holy Security When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” ( New International Version , Eph 6:11-17 ( link )). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. On ebay, a Seventh Generation i5 Surface Pro: link Cyber Security Hygiene Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of thos

On Neuromorphic Chips: Advanced AI, Deep Learning, and Neural Network Computer Architecture

Neuromorphic Chips to Become Affordable In the August 2020 edition of Communications of the ACM , West Linn, OR, USA-based author and journalist, Samuel Greengard, wrote Neuromorphic Chips Take Shape . The available data Greengard had is the claim that a Caltech (The California Institute of Technology) professor invented this technology, neuromorphic chips. Greengard wrote, “The concept of a brain-like computing architecture, conceived in the late 1980s by California Institute of Technology professor Carver Mead, is suddenly taking shape” (Greengard, Aug 2020, p. 9). Since the date, today, is around forty years later, this technology has remained dormant, but not in the research, thus so recent advancements probably allowed neuromorphic chips to become affordable (With LTE capabilities, see current pricing of a standard productivity PC, an i5 Microsoft Surface Pro: ( link ). With 3G capabilities, alternatively see the current pricing of a legacy, but GPU intensive PlayStation Vita: (

On the Secure Internet of Medical Things

The Internet and Telecom of Medical Things In the August 2020 Edition of Communications of the ACM (the Association for Computing Machinery), Chief Internet Evangelist at Google and 2012 AD to 2014 AD ACM president, Vinton G. Cerf, wrote On the Internet of Medical Things , a column regarding healthcare and the widespread availability of household Internet and Telecom technologies applicable to healthcare. Related to the novel coronavirus, COVID-19, Cerf wrote that he experienced an unsettling doctor’s call because Cerf’s goal, a doctor analyzing his health, was rejected, but the offered alternative, a video consultation, was inadequate. Cerf wrote, “This led to the natural conclusion that remote detection would be helpful in these conditions” (Cerf, Aug 2020, p. 5). Cerf was saying this: he wanted a solution to the COVID-19 virus, but he had not planned an immediate solution to this contagion passing from one entity to another, so he ought to discuss solutions to this problem. A

Contact Form


Email *

Message *