Skip to main content

Featured Post

The Economics of Autonomy

In ancient legend, there is a Creation story: in contemporary times, it is known as the first book of Moses called the book of Genesis. When God IS creating the world, Genesis (KJV) states, “And God said, Let there be light: and there was light” (Genesis 1:3). According to legend, the 1st great Prophet, named Isaiah, told his faith to his friends, his people, and his enemies. Isaiah wrote, “Behold, God is my salvation; I will trust, and not be afraid: for the LORD JEHOVAH is my strength and my song; he also is become my salvation” (Isaiah 12:2) A man called the Christ was crucified, then according to Roman Empire record, died, but according to Christian legend, rose again. In Christian tradition, Jesus the Christ stated Christians should conclude our prayers to God, our Father, this way: “And lead us not into temptation, but deliver us from evil: For thine is the kingdom, and the power, and the glory, for ever. Amen” (Matthew 6:13). Following Jesus of Nazareth, a New Testament writer,

Utilizing Media: A Response to Deepfakes

 Of the ACM (the Association for Computing Machinery), a magazine called Communication of the ACM's edition releases 1 month before its stated release month. In the latest edition, regarding March 2021, of Communications of the ACM, Column Editor, Susan J. Winter wrote Computing Ethics: What To Do About Deepfakes. Regarding Winter’s desire to halt or hinder illegal or unethical deepfakes, a video technology like wearing a full body masking suit, Winter wrote, “Here are three areas where technical experts can make positive contributions to the development of synthetic media technologies: education and media literacy, subject defense, and verification” (Winter, March, 2021). Winter was saying actions such as teaching and having disruptive technology knowledge, researching professionally, and proving concepts are parts of deepfake experts’ calculus. But this much work specializes such that entry level, junior, work will probably be offered to overqualified professionals. Technical experts made deepfake technologies. At this point, I would recommend a reset, and it has a media relation. 

In Robert Stanley’s Making Sense of Media: A Cultural-Historical Approach, media is considered segmented, historically. Stanley wrote, “Gutenberg’s invention didn’t realize its profit potential until a distribution network for books emerged” (Stanley, p.12, n.d.). Stanley was saying the Gutenberg press required a new paradigm: for a book sale, a distributed network.

Against deepfake target mistreatment, Susan J. Winter believed Computer Science stakeholders require more sophisticated technical skill, and we do. In the billions, people learning more simplified Computer Science allows better understanding of the hardware and software, both from a Software Engineering teams’ perspectives and the users’ perspectives. With the Software Engineering teams’ perspectives, better techniques mean more security and privacy privileges and easier industry accessibility.

From the users’ perspectives, better techniques mean more distributed Object Oriented Programming and functional programming accessibilities identifying longer distance networks on average and easier crowdsourcing choices. But division is necessary: we need laws prohibiting deepfake mistreatment. Far be it from me to destroy deepfake technology: simulating human actions can become medical technologies, and these medical technologies can provide safe physician decision paths. And by separating the seriousness of cyber crimes from the comedy of satire (link), we can do this: in direct relation, review a recorded historical event.

According to legend: in ancient history, a man named Moses gave the ancient nation, Israel, the law of Israel from God. In 1 verse, Moses (NIV) is recorded having said to Israel, “Do not set up any wooden Asherah pole beside the altar you build to the LORD your God” (Deuteronomy 16:21). Moses was forbidding paganism from Israel, and this was for the focus on the law given by God, according to legend. But according to legend, King Ahab, husband of a sorceress, Jezebel, invented an Asherah pole, and the Lord’s prophets were killed as a result of this change in authority over Israel (1 Kings 16:33, 1 Kings 18:4). And these passages were claiming there are direct effects of doing unethical things, i.e., Asherah is an idol of sadism and fertility (link). As Susan J. Winter stated deepfake technologies sometimes involve non-consensual sexual activity, this is a form of nonveridical harm, dishonest sadism, and can be linked to the Queen of Heaven.

The next generation is not meant only to reproduce; they should have already been instructed in strong ethical leadership, but Computer Science leaders are not offering easy access paths to jobs. In my graduate school: for example, the Johns Hopkins University Whiting School of Engineering, the foundations courses have been more difficult than my specialization track, Enterprise and Web Development. While a strong foundation allows a strong stand, overburdening entrants prohibits a fast track to, in more cases than not, required experience.

In contrast: within isolated ethics, encouraging general skills like the liberal arts provides more professional diversity. Progressive morals are not as necessary when isolated teams are self-motivated: through proper training. In this manner, excellent technologies including deepfake shall be preserved and evolved. 


Stanley, R. (n.d.). [Https://]. Retrieved February 23, 2021, from 02/23/2021

Winter, S. J. (2021, March). Computing Ethics: What To Do About Deepfakes. Communications of the ACM, 64(3), 33-35.


Popular posts from this blog

In response to the Institute of Industrial Science, the University of Tokyo’s Circular Reasoning: Spiral Circuits for More Efficient AI

Circular Reasoning On June 14, 2020, the IIS (Institute of Industrial Science) at the UTokyo (University of Tokyo) wrote  Circular Reasoning: Spiraling Circuits for More Efficient AI ; but a Press Release from this institute is giving a synopsis on this topic. On this press release, the IIS wrote, “Researchers from the Institute of Industrial Science at the University of Tokyo designed and built specialized computer hardware consisting of stacks of memory modules arranged in a 3D-spiral for artificial intelligence (AI) applications” (IIS, June 14, 2020). The IIS continued on, saying this research is allowing a singular way work can be done regarding the next generation energy efficient AI devices (Here is a current generation, but energy efficient, AI device, Android Pie: link ) shall be implemented into production.             The Fundamentals of Machine Learning                On this press release, the IIS is explaining the fundamentals of ML (Machine Learning). The IIS wrote, “Mach

IS the Future of AI “Women?”

Interdisciplinary Campus Culture On April 14, 2020, Katy Rank Lev wrote the Carnegie Mellon University’s (CMU) news article The Future of AI is Female . Since artificial intelligence’s (AI) initial measurement, wrote Lev, CMU built AI. Lev wrote that each of the colleges CMU is representing contribute to make AI a new field, describing this AI as a frontier, humanity can democratize: from healthcare, the eventual goal area is education. In a rush, Lev cut the conversation short, and Lev mentioned CMU’s interdisciplinary campus culture as the source of the effective AI women, but this is despite women historically not represented as scientists, technologists, and engineers, and math (STEM), worldwide. But CMU is spotlighting undergraduate students and highly honored faculty members, and Lev is including these women because she agrees with the Women in Tech movement as far as the East is from the West: CMU is the best Computer Science University with AI, and this is IT at this point in

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Contact Form


Email *

Message *