Skip to main content

Posts

Showing posts from August 16, 2020

Featured Post

We Should Have Already Had This: The Lithium-Ion Battery With Built-In Fire Suppression

On October 22, 2020, yesterday, Dexter Johnson posted The Lithium-Ion Battery With Built-In Fire Suppression. Within this topic, Dexter Johnson regards a Stanford University research team and the SLAC National Accelerator Laboratory (its former name was the Stanford Linear Accelerator Center[1]). Johnson stated:Now [Yi] Cui and his research team, in collaboration with SLAC National Accelerator Laboratory, have offered some exciting new capabilities for lithium-ion batteries based around a new polymer material they are using in the current collectors for them. The researchers claim this new design to current collectors increases efficiency in Li-ion batteries and reduces the risk of fires associated with these batteries.[2]Johnson was saying this: fires are a current Li-ion battery threat that has been realized, but a new design can secure client use-case safety, and this required this battery redesigned. As this technology approaches marketplace entry points, this shall confront Li-io…

Stakeholder Contexts and Industry Standards: ISO/IEC 38500 IT Governance, but then an IT Compliance Framework

ISO / IEC 38500 IT Governance ^ Compliance
In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3). SMEs Linked to Measurable Successful OutcomesWith regard to small and medium-sized enterprises, or SMEs, Olaitan Olutoyin and Stephen Flowerday suggested that the IT governance structure and the operational governance processes are linked to measurable successful outcomes by three key pillars (2016). Olutoyin and Flowerday (2016) said that the three k…

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

Considering Holy Security
When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” (New International Version, Eph 6:11-17 (link)). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. On ebay, a Seventh Generation i5 Surface Pro: linkCyber Security HygieneLarry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along wi…

On Neuromorphic Chips: Advanced AI, Deep Learning, and Neural Network Computer Architecture

Neuromorphic Chips to Become Affordable
In the August 2020 edition of Communications of the ACM, West Linn, OR, USA-based author and journalist, Samuel Greengard, wrote Neuromorphic Chips Take Shape. The available data Greengard had is the claim that a Caltech (The California Institute of Technology) professor invented this technology, neuromorphic chips. Greengard wrote, “The concept of a brain-like computing architecture, conceived in the late 1980s by California Institute of Technology professor Carver Mead, is suddenly taking shape” (Greengard, Aug 2020, p. 9). Since the date, today, is around forty years later, this technology has remained dormant, but not in the research, thus so recent advancements probably allowed neuromorphic chips to become affordable (With LTE capabilities, see current pricing of a standard productivity PC, an i5 Microsoft Surface Pro: (link). With 3G capabilities, alternatively see the current pricing of a legacy, but GPU intensive PlayStation Vita: (link))…

On the Secure Internet of Medical Things

The Internet and Telecom of Medical Things
In the August 2020 Edition of Communications of the ACM (the Association for Computing Machinery), Chief Internet Evangelist at Google and 2012 AD to 2014 AD ACM president, Vinton G. Cerf, wrote On the Internet of Medical Things, a column regarding healthcare and the widespread availability of household Internet and Telecom technologies applicable to healthcare. Related to the novel coronavirus, COVID-19, Cerf wrote that he experienced an unsettling doctor’s call because Cerf’s goal, a doctor analyzing his health, was rejected, but the offered alternative, a video consultation, was inadequate. Cerf wrote, “This led to the natural conclusion that remote detection would be helpful in these conditions” (Cerf, Aug 2020, p. 5). Cerf was saying this: he wanted a solution to the COVID-19 virus, but he had not planned an immediate solution to this contagion passing from one entity to another, so he ought to discuss solutions to this problem.

Against ‘9…

Contact Form

Name

Email *

Message *