Skip to main content

Posts

Featured Post

Utilizing Media: A Response to Deepfakes

  Of the ACM (the Association for Computing Machinery), a magazine called Communication of the ACM's edition releases 1 month before its stated release month. In the latest edition, regarding March 2021, of Communications of the ACM , Column Editor, Susan J. Winter wrote Computing Ethics: What To Do About Deepfakes . Regarding Winter’s desire to halt or hinder illegal or unethical deepfakes, a video technology like wearing a full body masking suit, Winter wrote, “Here are three areas where technical experts can make positive contributions to the development of synthetic media technologies: education and media literacy, subject defense, and verification” (Winter, March, 2021). Winter was saying actions such as teaching and having disruptive technology knowledge, researching professionally, and proving concepts are parts of deepfake experts’ calculus. But this much work specializes such that entry level, junior, work will probably be offered to overqualified professionals. Technic

On Hacking the Axis and Securing History Records

  On Security Requirements, Review Physical Might On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis . When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75 th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect. Emergent Cybersecurity Requirements With physical security, there is an emergent cybersecurity necessity that John

On the Topic of Domestic Graduate Students, I AM

Domestic Graduate Students In the September 2020 edition of Communications of the ACM , Moshe Y. Vardi wrote Where Have All the Domestic Graduate Students Gone . Vardi wrote, “Tech industry giants Apple, Amazon, Facebook, and Google were all founded by first- or second-generation immigrants” ( link ). As stated previously in another article I wrote, Vardi wrote that in the month of June during the year 2020 AD, President Trump suspended new work visas and banned tens of ten thousands of foreigners against establishing employment within the U.S.A.: this was temporary. On greater division was the Trump Administration ban against U.S. universities that were operating using international students within only online classes, but remain in the U.S.A. Vardi also spoke on behalf of the entire science and engineering community without a vote and said that I strongly object to this, but I believe my objection is an average one. Against the international community becoming formally anti-U.S.A., n

Stakeholder Contexts and Industry Standards: ISO/IEC 38500 IT Governance, but then an IT Compliance Framework

ISO / IEC 38500 IT Governance ^ Compliance In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3).  SMEs Linked to Measurable Successful Outcomes With regard to small and medium-sized enterprises, or SMEs, Olaitan Olutoyin and Stephen Flowerday suggested that the IT governance structure and the operational governance processes are linked to measurable successful outcomes by three key pillars (2016). Olutoyin and Flowerday (2016) said that the thre

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

                Considering Holy Security When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” ( New International Version , Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. Cyber Security Hygiene Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along with her clients because true security

On Neuromorphic Chips: Advanced AI, Deep Learning, and Neural Network Computer Architecture

Neuromorphic Chips to Become Affordable In the August 2020 edition of Communications of the ACM , West Linn, OR, USA-based author and journalist, Samuel Greengard, wrote Neuromorphic Chips Take Shape . The available data Greengard had is the claim that a Caltech (The California Institute of Technology) professor invented this technology, neuromorphic chips. Greengard wrote, “The concept of a brain-like computing architecture, conceived in the late 1980s by California Institute of Technology professor Carver Mead, is suddenly taking shape” (Greengard, Aug 2020, p. 9). Since the date, today, is around forty years later, this technology has remained dormant, but not in the research, thus so recent advancements probably allowed neuromorphic chips to become affordable (With LTE capabilities, see current pricing of a standard productivity PC, an i5 Microsoft Surface Pro . With 3G capabilities, alternatively see the current pricing of a legacy, but GPU intensive PlayStation Vita . Safely Su

Contact Form

Name

Email *

Message *