Skip to main content

Featured Post

Utilizing Media: A Response to Deepfakes

  Of the ACM (the Association for Computing Machinery), a magazine called Communication of the ACM's edition releases 1 month before its stated release month. In the latest edition, regarding March 2021, of Communications of the ACM , Column Editor, Susan J. Winter wrote Computing Ethics: What To Do About Deepfakes . Regarding Winter’s desire to halt or hinder illegal or unethical deepfakes, a video technology like wearing a full body masking suit, Winter wrote, “Here are three areas where technical experts can make positive contributions to the development of synthetic media technologies: education and media literacy, subject defense, and verification” (Winter, March, 2021). Winter was saying actions such as teaching and having disruptive technology knowledge, researching professionally, and proving concepts are parts of deepfake experts’ calculus. But this much work specializes such that entry level, junior, work will probably be offered to overqualified professionals. Technic

RISC vs. CISC Architectures: Which one is better?

On January 8, 2018, Scott Thornton wrote RISC vs. CISC Architectures: Which one is better? Thornton stated, “RISC-based machines execute one instruction per clock cycle. CISC machines can have special instructions as well as instructions that take more than one cycle to execute” (Thornton, 2018). Thornton was saying this: between RISC and CISC architectures, the notable difference is instruction timing minus instruction breadth.

In contemporary application, the RISC use case is more common because the instruction per-clock-cycle system is a software testing solution. The proof RISC is a software testing solution is software deregulation: Newcastle University School of Computing’s Brian Randall shared insights. Randall wrote, “It was perhaps only when, in 1969, IBM “unbundled” its software by pricing it separately from its hardware that software became a commodity; and a recognisable software industry, and the notion of package software started to come into existence” (Randall, May 2018). Randall was stating this: on hardware, focus decreased because its software traditions were decoupled.

On applications, this is a modularity solution, but the computer designer remains a higher than hardware or software authority. For Software Engineering Project Management is the computer’s command and control. Therefore, the project management results indicate CISC greater popularity or RISC greater popularity. By department: on Amazon.com, you, reader, can see a much smaller unique hardware selection than unique software selection.

Image by OpenClipart-Vectors from Pixabay

Amazon.com Computer Components, a search


In history, succeeding media rather than decreasing it is called fulfillment. Someone called Jesus the Christ explained this. Between 1989 - 1986 years ago, this entity, also called Jesus of Nazareth explained fulfilling the Law (the law of Israel). Jesus the Christ stated this: 
Do not think that I have come to abolish the Law or the Prophets; I have not come to abolish them but to fulfill them. For truly I tell you, until heaven and earth disappear, not the smallest letter, not the least stroke of a pen, will by any means disappear from the Law until everything is accomplished. Therefore anyone who sets aside one of the least of these commands and teaches others accordingly will be called least in the kingdom of heaven, but whoever practices and teaches these commands will be called great in the kingdom of heaven. For I tell you that unless your righteousness surpasses that of the Pharisees and the teachers of the law, you will certainly not enter the kingdom of heaven. (NIV, Matthew 5:17-20).
Jesus the Christ was saying this: fulfilling a service requires the first instructions, opportunities, and threats; and all instructions, opportunities, and threats thereafter; but the last instructions, opportunities, and threats. In application, computer architecture paradigms shall be understood per increment, yes, but also by their innovations. 

For history contains paradigm shifts: RISC vs CISC architectures are 1 such paradigm shift that is, from computer-hardware-based instructions software became the engineering focus. Therefore, computer hardware shall innovate slower, but greater than iterations shall, and utilizing software: for performance and cost reduction, encourages theory breadth, practice breadth, and application breadth. To the reader, this is my blog, and I rarely get responses, but it is growing. Thus, with you, reader, I shall share the following ARM sophistication like attending a JHU (The Johns Hopkins University) class: it is ARM technologies are not often a complete CISC system, but the RISC-ARM instruction matrices incorporate CISC matrix algebra. In application, eliminating an instruction set’s valued numbers can later be done. But the reduced instructions shall not be NaN. In history, there is a related topic: on complexity and simplicity, appropriateness is explained. 

In ancient times, an ancient man, a formative Christian byshop, the Apostle Paul, sent an Epistle: to his Roman brothers. To his brothers, the Apostle Paul stated, “For your obedience is come abroad unto all men. I am glad therefore on your behalf: but yet I would have you wise unto that which is good, and simple concerning evil” (KJV, Romans 16:19). The Apostle Paul was stating this: Against recognition, be aloof thus divided; on a great scale, not simple minded men working, but the opposite; but evil may receive its non-complex and due recognition. In application, eliminating insufficient CISC use cases may increase an organization’s reputation: increasing IT (information technology) performance and decreasing overhead allows more project management time that is, a project’s effort and a project’s critical path. While this transpires, an organization’s ethic forms, or it transforms. For this reduction allows more planning time and lesson learned time. 

References 

Randell, B. (2018, May). Fifty Years of Software Engineering or The View from Garmisch. Retrieved December 04, 2020, from https://arxiv.org/ftp/arxiv/papers/1805/1805.02742.pdf 

Thornton, S. (2018, January 9). RISC vs. CISC Architectures: Which one is better? Retrieved December 05, 2020, from https://www.microcontrollertips.com/risc-vs-cisc-architectures-one-better/

Comments

Popular posts from this blog

In response to the Institute of Industrial Science, the University of Tokyo’s Circular Reasoning: Spiral Circuits for More Efficient AI

Circular Reasoning On June 14, 2020, the IIS (Institute of Industrial Science) at the UTokyo (University of Tokyo) wrote  Circular Reasoning: Spiraling Circuits for More Efficient AI ; but a Press Release from this institute is giving a synopsis on this topic. On this press release, the IIS wrote, “Researchers from the Institute of Industrial Science at the University of Tokyo designed and built specialized computer hardware consisting of stacks of memory modules arranged in a 3D-spiral for artificial intelligence (AI) applications” (IIS, June 14, 2020). The IIS continued on, saying this research is allowing a singular way work can be done regarding the next generation energy efficient AI devices (Here is a current generation, but energy efficient, AI device, Android Pie: link ) shall be implemented into production.             The Fundamentals of Machine Learning                On this press release, the IIS is explaining the fundamentals of ML (Machine Learning). The IIS wrote, “Mach

IS the Future of AI “Women?”

Interdisciplinary Campus Culture On April 14, 2020, Katy Rank Lev wrote the Carnegie Mellon University’s (CMU) news article The Future of AI is Female . Since artificial intelligence’s (AI) initial measurement, wrote Lev, CMU built AI. Lev wrote that each of the colleges CMU is representing contribute to make AI a new field, describing this AI as a frontier, humanity can democratize: from healthcare, the eventual goal area is education. In a rush, Lev cut the conversation short, and Lev mentioned CMU’s interdisciplinary campus culture as the source of the effective AI women, but this is despite women historically not represented as scientists, technologists, and engineers, and math (STEM), worldwide. But CMU is spotlighting undergraduate students and highly honored faculty members, and Lev is including these women because she agrees with the Women in Tech movement as far as the East is from the West: CMU is the best Computer Science University with AI, and this is IT at this point in

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Contact Form

Name

Email *

Message *