Skip to main content

Posts

Showing posts with the label Security

Featured Post

We Should Have Already Had This: The Lithium-Ion Battery With Built-In Fire Suppression

On October 22, 2020, yesterday, Dexter Johnson posted The Lithium-Ion Battery With Built-In Fire Suppression. Within this topic, Dexter Johnson regards a Stanford University research team and the SLAC National Accelerator Laboratory (its former name was the Stanford Linear Accelerator Center[1]). Johnson stated:Now [Yi] Cui and his research team, in collaboration with SLAC National Accelerator Laboratory, have offered some exciting new capabilities for lithium-ion batteries based around a new polymer material they are using in the current collectors for them. The researchers claim this new design to current collectors increases efficiency in Li-ion batteries and reduces the risk of fires associated with these batteries.[2]Johnson was saying this: fires are a current Li-ion battery threat that has been realized, but a new design can secure client use-case safety, and this required this battery redesigned. As this technology approaches marketplace entry points, this shall confront Li-io…

On Hacking the Axis and Securing History Records

On Security Requirements, Review Physical Might
On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis. When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect.Emergent Cybersecurity RequirementsWith physical security, there is an emergent cybersecurity necessity that John Arquilla dis…

Law and Security, but Privacy: Tensorflow ImageNet

During yesterday and today, I studied the Machine Learning language, Tensorflow: on Android Pie, I built an ImageNet app, but it, the first version; but it is Google Copyrighted.

I figured that Tensorflow should have a JS library, so I searched Google, but I found Google's result. It is the first page and top result. On GitHub, Google's Tensorflow.js models, Image Classification, but called MobileNet, is available. On Google Developer Codelabs, there is a MobileNet lab. As I studied, I learned Machine Learning. Of the ImageNet camera app is my Rasperry Pi 3 B+ 4GB image. but view its result:
This script did not work.
Testing the MindNet Camera: Try it Yourself
On the Google Developer CodeLabs, I finished all three parts, but here is part two, but enable your camera:


On The Synergy of Autonomy and Pervasiveness, William John Brinkman and Alton F. Sanders discussed Automated Security Cameras, but they wrote Ethics in a Computing Culture. An Expanding Security Platf…

Analysis: Faketoshi

On November 3, 2019, Anton Lucian wrote A New Fake Satoshi Appears, Claims to Be the ‘Co-Founder of Bitcoin’ (link). Lucian reported, "A new fake Satoshi Nakamoto has come onto the scene, and it didn’t take a second for him to ridiculed on crypto-Twitter and beyond." More than one faketoshi has claimed Bitcoin copyright.


SIMS Gave Fake News The SIMS (Symbiosis Institute of Management Studies) is a Pune, India University (link). At 11:28 PM, 16 Dec 2018, SIMS, Pune, India hosted Jorg Molt, but SIMS Pune reported Jorg Molt is a Bitcoin co-founder.
A New Fake Satoshi Appears, Claims to Be the ‘Co-Founder of Bitcoin’ via @beincryptohttps://t.co/6Zz8YOkdIC#Faketoshi — Jonathan M. Kelly (@BitJetKit) November 4, 2019
This had been disproven, but I have trouble even getting an audience because I am a Christian Computer Scientist: but hypocrisy exists. Today, Emilio Janus reported: during the Nevada World Crypto Conference, Molt flipped off an angry opponent's…

Analysis: On November 2, 2018 Forbes Senior Contributor Davey Winder reported Android Security Warning As ‘Unremovable’ Malware Infects 45,000 Phones So Far

On November 2, 2018 Forbes Senior Contributor Davey Winder reported Android Security Warning As Unremovable’ Malware Infects 45,000 Phones So Far (link).


Davey Winder wrote, "It is not unusual for Android smartphone users to be the target of malware, which is hardly surprising given that there are more than 2.5 billion active Android devices out there." Winder supported an undefined time record: Android smartphone users are malware targets because he gave an undefined maximum total Android device count.

Winder next claimed: cybersecurity criminals will never not follow money, but more users threaten themselves, but they can become worse infected. On the problem, the Xhelper malware, Winder reported: after uninstalled, the Xhelper malware can reinstall, but after a FDR (factory data reset) this malware can reinstall. On Symantec, Winder reporter May Ying Tee's analysis: this software is not a system applications, but the FDR is the solution.

What Symantec's May…

Contact Form

Name

Email *

Message *