Skip to main content

Featured Post

The Economics of Autonomy

In ancient legend, there is a Creation story: in contemporary times, it is known as the first book of Moses called the book of Genesis. When God IS creating the world, Genesis (KJV) states, “And God said, Let there be light: and there was light” (Genesis 1:3). According to legend, the 1st great Prophet, named Isaiah, told his faith to his friends, his people, and his enemies. Isaiah wrote, “Behold, God is my salvation; I will trust, and not be afraid: for the LORD JEHOVAH is my strength and my song; he also is become my salvation” (Isaiah 12:2) A man called the Christ was crucified, then according to Roman Empire record, died, but according to Christian legend, rose again. In Christian tradition, Jesus the Christ stated Christians should conclude our prayers to God, our Father, this way: “And lead us not into temptation, but deliver us from evil: For thine is the kingdom, and the power, and the glory, for ever. Amen” (Matthew 6:13). Following Jesus of Nazareth, a New Testament writer,

Of Zero Trust, the Restrictive Drudgery

In recent years, Moore’s Law has begun reaching its limits, and these limits are the sizes of computer hardware. As a history review: when computers were 1st designed, they used vacuum tubes. Through a vacuum tube, this involved an airless vacuum tube meaning ‘0,’ ‘off,’ or air flowing meaning ‘1,’ ‘on.’ In contemporary phones, tablets, and computers, electricity performs this same ‘off’ or ‘on’ task; and with more electric computation devices, but also efficient circuity (electronics components and computation pathways), the more electric computation devices we have, the greater the possible computations. But in size: of the vacuum tube concepts, our common electric versions are reaching the atom’s scale. This is ~1.8E-10: of an approximate average human, it is ~0.00000018% our height. Against Quantum Computing, the basic communication, very much discussed, already, we can discuss another important subject: cyber security. In professional and academic circles, cyber security is not building elaborate 0s and 1s together, and this be cybersecurity’s sufficiency; instead, cyber security combines digital and physical security. One recent cyber security trend is called Zero Trust. 

Zero Trust and Our General Awareness 

On a Web site, Exploding Topics, Exploding Topics co-founder, Josh Howarth wrote The 7 Most Important Computer Science Trends In 2021. Contrary to the tradition, hierarchical trust, Howarth wrote, “Instead, nobody is trusted, whether they’re already inside or outside the network” (Howarth, December 18, 2020). Howarth was saying Zero Trust absolves all entities of criminal liability except the person accessing the network. 

But this is not a good privacy measure: it does not protect the single network accessor from built-in communication errors. In fact, one wrong button press could be all law enforcement requires who criminal liability represents. In application, predictive technology could determine impending accesses: even though access criteria are better than, say, a traditional gas station robbery (clothing and apparel, sex, height & weight, skin color, and any weapon used); i.e. user ID, access portal, location, and time, these, too, can be caused by prior mistreatment such that a false identity is accessed.

This is an offense: it mistreats every employee. 

In a sense, Zero Trust is perfect: for each network access sought, require a validity test. But this proof requires an absolutist attitude such that no failure can be simplified beyond the user ID, and this is a possible primary key. In the strongest case, every single network content requires an access key: from the money to the K-cup dispenser. This is like building AI: for a family’s entire house components. Plus, trusting no one means not even trusting your own authorization and authentication protocols: consider Ray Bradbury’s The Murderer.

In this ad hominem planning: eventually, the man who has enough automation shall stop biting the psychologist’s watch, and he shall fade into the shadows of his cell padding. 

Remember the Golden Rule. 

In IT (Information Technology) business, professionals perform their obligations, and we use many different guiding concepts. The 1 I utilize is Jesus of Nazareth’s. The Gospel of Jesus Christ According to Matthew (NIV) claims, “So in everything, do to others what you would have them do to you, for this sums up the Law and the Prophets” (7:12). Jesus of Nazareth, called the Christ, was saying be fair to the government, Law (of Israel), and the government’s evolvers, the Prophets (of Israel). The Gospel of Jesus Christ According to Luke recorded Jesus of Nazareth having said a briefer and simpler message: “Do to others as you would have them do to you” (6:31). In this case, the rule called Golden is more specialized: we can trust others, and in turn, we can each be trusted. 

Through experience, build team trust. 

In simple terms, bureaucracy slows progress, and we cannot meet deadlines: with absolute ethics required every single time. The ethic, Zero Trust’s, most probable outcome is compromise. Thus, at its most direct, Zero Trust is a bait-and-switch tactic; against hierarchical traditions, a more usable solution is group access. Moderate-sized or small-sized groups having access motivates team leadership initiative including security and privacy. Even executives can modularize their teams, improving the configuration management requirements to deliverables produced or serviced. 

In all organization ranking categories (executive, middle management, and operations), moderate to small-sized IT teams can utilize the Agile methodology: to great effect. In a sense, this is privileged trust’s evolution: program-based or project-based trust management. 


Howarth, J. (2020, December 18). The 7 Most Important Computer Science Trends In 2021. Retrieved February 22, 2021, from


Popular posts from this blog

In response to the Institute of Industrial Science, the University of Tokyo’s Circular Reasoning: Spiral Circuits for More Efficient AI

Circular Reasoning On June 14, 2020, the IIS (Institute of Industrial Science) at the UTokyo (University of Tokyo) wrote  Circular Reasoning: Spiraling Circuits for More Efficient AI ; but a Press Release from this institute is giving a synopsis on this topic. On this press release, the IIS wrote, “Researchers from the Institute of Industrial Science at the University of Tokyo designed and built specialized computer hardware consisting of stacks of memory modules arranged in a 3D-spiral for artificial intelligence (AI) applications” (IIS, June 14, 2020). The IIS continued on, saying this research is allowing a singular way work can be done regarding the next generation energy efficient AI devices (Here is a current generation, but energy efficient, AI device, Android Pie: link ) shall be implemented into production.             The Fundamentals of Machine Learning                On this press release, the IIS is explaining the fundamentals of ML (Machine Learning). The IIS wrote, “Mach

IS the Future of AI “Women?”

Interdisciplinary Campus Culture On April 14, 2020, Katy Rank Lev wrote the Carnegie Mellon University’s (CMU) news article The Future of AI is Female . Since artificial intelligence’s (AI) initial measurement, wrote Lev, CMU built AI. Lev wrote that each of the colleges CMU is representing contribute to make AI a new field, describing this AI as a frontier, humanity can democratize: from healthcare, the eventual goal area is education. In a rush, Lev cut the conversation short, and Lev mentioned CMU’s interdisciplinary campus culture as the source of the effective AI women, but this is despite women historically not represented as scientists, technologists, and engineers, and math (STEM), worldwide. But CMU is spotlighting undergraduate students and highly honored faculty members, and Lev is including these women because she agrees with the Women in Tech movement as far as the East is from the West: CMU is the best Computer Science University with AI, and this is IT at this point in

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Contact Form


Email *

Message *