Skip to main content

Featured Post

Pi: The Mathematical Proof God IS Existing

Adapting to the 3G Shutdown

At 8:00 am ET, on January 14, 2022, Senior Personal Technology Columnist of the Wall Street Journal, Joanna Stern, wrote The 3G Shutdown Is Coming – Here’s How That Affects You. Stern wrote, “Starting next month, the third-generation wireless networks that served as a rocket booster for the smartphone will be turned off forever” (link). Stern was saying a paradigm in Internet and Telcom is shifting. With the advent of Web 3, resource scarcity such as the components of microchips is changing the focus of media to faster and more reliable networks. So, businesses will be able to adapt to larger and more detailed data sets, and we will accomplish this by designing scalable secure networks.

The long version of this business adaptation is the optimization of the Web site domain availability granted by the invention of IPv6. Back when the Internet was 1st being built, web developers primarily used IPv4, which allowed 232 URL addresses (roughly 4 billion). As nations evolved the previously leading networks, we have nearly exhausted this resource, but the successor of that technology is allowing for 2128 URL addresses. This is more than 9 orders of magnitude greater in scale. As security is a 1st principle of Software Engineering, this paradigm shift could allow for equal depths of defense, if we build a network carefully.

Even during the great wars of the 20th century, communication was based on natural patterns of navigation. For example, messenger pigeons were used to pass information between allies during wartime, and they proved extremely valuable. In this case, the birds were flying using their evolved senses of path finding, and this is fundamentally predatory-prey, but the scale of IPv6 is astronomical rather than relatable to the human population in the 20th century. This is the meaning: the complexity has shifted to the exponential. 

Consider a Mandelbrot set: its complexity is scaling the same way. You can find the function of this order in nature. For communication, this is a sufficient means on scaling, but this is meaning security is necessarily at most summation of conditions in complexity. For the most reasonable structure we can use is not the form, square, but rather its half, the form, triangle. If you do not believe me, think about it: even though planetary navigation is not perfect, the ancients also knew it as circumnavigation. 

A circle can only be calculated by knowing the irrational, infinite mathematical constant, Pi. The equation is 2 times Pi multiplied by the radius of a circle. In radian format (i.e. the actual value), Pi is the total length of the form, triangle. This is meaning defense should fundamentally be structured, with minimalist penetration capabilities in mind. In the second half of the 20th century CE, Software Engineers evolved programming languages to adapt to this paradigm. B was followed by C, and the concept of objects were introduced to C, with classes.

Even advanced Software Engineers will tell you Java is cumbersome, if they come from a Python background. Since Python was originally designed as an interpreted language, the greatest security risk of running a program written in this language is allowing it to run in the first place. This is removing the defense of critical infrastructures for repetitive processes like a faucet leaking.

Even though water dripping looks minor, according to Astrophysical Journal Letters by Tel Aviv University and Harvard University, water formed less than 1 billion years after the Big Bang (link). Since we can measure the consequences of evolution by studying life above the earth, on the earth, or in the earth, we can studying an atom’s decay rate, which is exponential, and the same formula as population growth rates. According to Joseph Smidt, Brandon Wiggins, Francesca Samsel, Kristin Hoch, Greg Abram, Sam Jones, Alex Gagliano, and Morgan Taylor, water analysis is geometric (link). If the analysis of water in life is geometric, then we can prove the growth of water in the universe is exponential, unless the common ratio of the sequence is 1, -1, or 0. 

So, in plain English, this is meaning security either needs to prepare against great data flow to a sink, or special cases where data points can be pirated one by one. From a neutral point of view, our defensibility ought to include communication. Humanity is a social species. This is meaning, when we are communicating with stakeholders, do not let your guard down. The most reasonable approach in doing so is including the common Internet defenses such as a firewall, a strong password, and constant vigilance against phishing attacks. After reaching the peak security of a model, we need to recall the fundamental nature of security is strategic communication. 

In my professional experience, the most appropriate or justifiable approach to forming a strategy of communication is being a good listener. Amazon, Apple, Meta (formerly Facebook), Microsoft,  and Alphabet employed those who approached the read-only design of Web 1 to design Web 2, to great effect. The lecture style of information dissemination Web 1 enabled is here to stay, and the information exchange based of Web 2 is not going anywhere, either. So, the next step is letting the computer understand the data, itself. But the secret of a computer communicating with itself is this: the computer can train itself by reflection, but the modeling is our job, and the completed training is to our benefit. So, a computer still needs to communicate in order for it to have value, if we are wanting to design our computer’s data-retrieval and data-sending in a defensible way. In order to defend a network, we want to communicate. In order to expand our communication, we want to defend our network. The circular logic is a natural form of defense: it is a geometric. Obviously.


Popular posts from this blog

Pi: The Mathematical Proof God IS Existing

A Brief History of Pi So, back in the ancient world, the Egyptians were building the Great Pyramids of Giza. In this case, Pi is calculated to a precision of 3 digits, 3.142857, with 142857 repeating after the whole number value, 3. Obtained from Wikipedia, This is odd. Consider the Legend of the Seven Sisters (i.e., the Big Dipper, Messier 45): according to astronomers, this legend is approximately 100,000 years old ( link ). Credits: NASA and the Hubble Heritage Team (STScI/AURA); Acknowledgment: George Herbig and Theodore Simon (Institute for Astronomy, University of Hawaii) Now, the early Christians calculated the total lifespan of the world to 7,000 years ( link ). So, I am presented with 2 numbers, 100,000 and 7,000. I remembered the verse, Luke 12:51 ( link ). I decided to test Jesus of Nazareth's purpose and divide the larger value by the smaller value. 100,000 / 7,000 = 14.2871...repeating with 142857 after the initial 6 digit sequence. The strangeness is this

Securiting Content Creators: A Use Case

On January 27, 2022, the New York Times On Tech newsletter writer, Shira Ovida, wrote  Making Money Online, the Hard Way . About Chrissy Chlapecka, a 21 year old living in Chicago, Ovida stated, “Chlapecka posts at least one short video a day on Instagram and TikTok, where she has a combined 4.5 million followers” ( link ). Ovida was saying 1 videographer is being followed by approximately 5 million followers per day, and her work is short videos each day.  The videos are posted on the popular Meta platform, Instagram, founded on October 6, 2010, in San Francisco. Also, the originally Chinese company, TikTok, founded over the month of September 2016, founded in Beijing. With 1 billion users on Instagram and 1 billion users on TikTok, 5 million followers is a hustle, but for a young adult, it *might* be a safe method for earning money. Ovida said there is no drama in the videos, but she is referencing a popular musician, woman to relate to Chlapecka’s image.  Ovida made a point to tell

Metaverse: Proof of Concept

On January 10, 2022, a WSJ (Wall Street Journal) CIO Journal writer, Suman Bhattacharyya wrote Tech Leaders Create Proofs of Concept for the Metaverse . Bhattacharyya (2022) wrote, “Technology companies, including Meta Platforms Inc. and Microsoft Corp., are battling for talent to build the hardware that is crucial for accessing the metaverse” ( link ).  In this case, 2 leading technology companies are in strong competition. So, science will likely emerge from the mixing of professionals between Meta and Microsoft. Bhattacharyya continued uncertain about the timing of the breadth of the metaverse being adopted, if a broad range of businesses design proof-of-concept Software applications, soon, the potential for the stock market value of metaverse economies could theoretically cascade up per virtual layer over a town, city, state, and to greater areas. For example, Procter & Gamble Co.’s CIO, Vittorio Cretella, has a conservative outlook. Cretella said, “When we talk about metave