Skip to main content

Posts

Showing posts with the label Bible

Featured Post

We Should Have Already Had This: The Lithium-Ion Battery With Built-In Fire Suppression

On October 22, 2020, yesterday, Dexter Johnson posted The Lithium-Ion Battery With Built-In Fire Suppression. Within this topic, Dexter Johnson regards a Stanford University research team and the SLAC National Accelerator Laboratory (its former name was the Stanford Linear Accelerator Center[1]). Johnson stated:Now [Yi] Cui and his research team, in collaboration with SLAC National Accelerator Laboratory, have offered some exciting new capabilities for lithium-ion batteries based around a new polymer material they are using in the current collectors for them. The researchers claim this new design to current collectors increases efficiency in Li-ion batteries and reduces the risk of fires associated with these batteries.[2]Johnson was saying this: fires are a current Li-ion battery threat that has been realized, but a new design can secure client use-case safety, and this required this battery redesigned. As this technology approaches marketplace entry points, this shall confront Li-io…

We Should Have Already Had This: The Lithium-Ion Battery With Built-In Fire Suppression

On October 22, 2020, yesterday, Dexter Johnson posted The Lithium-Ion Battery With Built-In Fire Suppression. Within this topic, Dexter Johnson regards a Stanford University research team and the SLAC National Accelerator Laboratory (its former name was the Stanford Linear Accelerator Center[1]). Johnson stated:Now [Yi] Cui and his research team, in collaboration with SLAC National Accelerator Laboratory, have offered some exciting new capabilities for lithium-ion batteries based around a new polymer material they are using in the current collectors for them. The researchers claim this new design to current collectors increases efficiency in Li-ion batteries and reduces the risk of fires associated with these batteries.[2]Johnson was saying this: fires are a current Li-ion battery threat that has been realized, but a new design can secure client use-case safety, and this required this battery redesigned. As this technology approaches marketplace entry points, this shall confront Li-io…

On Hacking the Axis and Securing History Records

On Security Requirements, Review Physical Might
On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis. When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect.Emergent Cybersecurity RequirementsWith physical security, there is an emergent cybersecurity necessity that John Arquilla dis…

Stakeholder Contexts and Industry Standards: ISO/IEC 38500 IT Governance, but then an IT Compliance Framework

ISO / IEC 38500 IT Governance ^ Compliance
In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3). SMEs Linked to Measurable Successful OutcomesWith regard to small and medium-sized enterprises, or SMEs, Olaitan Olutoyin and Stephen Flowerday suggested that the IT governance structure and the operational governance processes are linked to measurable successful outcomes by three key pillars (2016). Olutoyin and Flowerday (2016) said that the three k…

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

Considering Holy Security
When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” (New International Version, Eph 6:11-17 (link)). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. On ebay, a Seventh Generation i5 Surface Pro: linkCyber Security HygieneLarry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along wi…

Data Work and Digitization: The impact of computerized systems and automation on healthcare professionals

Data Work and Digitization
In the Spring 2020 edition of XRDS (CROSSROADS), Vol 26 No.3, Claus Bossen wrote Data Work and Digitization: The impact of computerized systems and automation on healthcare professionals. Bossen began, “After two decades of intensive digitization of healthcare in the U.S. and Europe, we are starting to see the contours of what it is like to work in digitized healthcare environments” (Bossen, Spring 2020). Bossen focused on three digitization topics in the medical environment: EHRs (electronic healthcare records), DRGs (diagnosis-related groups), and CDISs (clinical documentation improvement specialists). EHRs are having the ease of parallelizing information intersecting professionals and organizational peer review groups contrasted from paper-based records, and this includes next-turn no-deadlock distributing and parallelizing things like MR-MRscans and ongoing examining results: giving persons easy to use software without blocks may allow the privilege of se…

COVID-19 Made Internet Access, Broadband and Hotspots an Educational Necessity

I am readyAfter a hiatus: with the readers, I am ready. 
COVID-19 Made Internet Access, Broadband and Hotspots an Educational Necessity
On June 9, 2020, the IEEE Transmitter (Institute for Electricians and Electrical Engineers Transmitter) wrote COVID-19 Made Internet Access, Broadband and Hotspots an Educational Necessity. In this Transmitter article, the IEEE wrote that numerous students experienced academic difficulties because of the novel coronavirus, COVID-19, causing widespread problems. The IEEE wrote, “while virtual learning helps reduce the risk of person-to-person transmission, schools were presented with a new problem: how to ensure every student has internet access so they could continue their education remotely” (IEEE). On the other hand, IEEE Senior Member David Witkowski is enthusiastic about a mobile generation of learners, but concerned regarding people enfortressed only to stay there and avoid public establishments. Witkowski is saying this: even on digital platforms,…

Contact Form

Name

Email *

Message *