Search This Blog

Translate

August 31, 2020

On Hacking the Axis and Securing History Records

 

On Security Requirements, Review Physical Might


On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis. When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect.

Emergent Cybersecurity Requirements

With physical security, there is an emergent cybersecurity necessity that John Arquilla discussed. Arquilla mentioned then first HPCs (high performance computing), and their titles; but they are likely not conversed and regarded to. On remembering World War II, Arquilla wrote, “Yet in all this, I suspect the role of the first “high-performance computing” capabilities of the Allies—known as Ultra in Britain, Magic in the U.S.—will receive too little attention” (Arquilla, 2020). Indeed, a computer system called Magic during World War II ought to have been kept a secret that is, until the right place and time because the United States is historically a Christian nation (link), thus so that titling would have probably disrupted the Allied war effort, and made the United States an international laughing stock. Something like an inflatable tank would not have worked on the Nazis (link): as a matter of honor, this would have been called disrespectful, internationally, and beating the Allies would have been a matter of honor that the Allies would be viewed as more of the same problem that caused Nazism’s evil to multiply into the blitzkrieg offensive: sin (NIV, Exodus 18:9-12).

A Reflection on Simon Subtitled Magus

During 2020, I met a magician: on this magician, male, telling me his title, he quickly spoke that his title was limited to slight of hand tricks. In Scripture, a sorcerer named Simon wanted to buy the του παρακλετος του πνευμα του αγιον—in English, the Holy Spirit. The book of Acts (NIV), probably written by Simon Peter, states:

Now for some time a man named Simon had practiced sorcery in the city and amazed all the people of Samaria. He boasted that he was someone great, and all the people, both high and low, gave him their attention and exclaimed, “This man is rightly called the Great Power of God.” They followed him because he had amazed them for a long time with his sorcery. But when they believed Philip as he proclaimed the good news of the kingdom of God and the name of Jesus Christ, they were baptized, both men and women. Simon himself believed and was baptized. And he followed Philip everywhere, astonished by the great signs and miracles he saw. (Acts 8:9-13).

Indeed, this was a time of great signs, for a sorcerer accepted the baptism. However, turmoil transpired: it was not everlasting. The book of Acts (NIV) states, “When Simon saw that the Spirit was given at the laying on of the apostles’ hands, he offered them money and said, “Give me also this ability so that everyone on whom I lay my hands may receive the Holy Spirit.” (Acts 8:18-19). However, this was not the end of the story: more can be read in the NIV Bibles that I linked a few times (and on purchasing this book, I may get a commission, so thank you ahead of time.). In the case of the magician I met whose name was Joey, this year, I was studying the King James Bible and the New International Bible, but this magician wanted me having a close Wiccan Bible encounter. Against it, I wanted no connection, so I departed that environment: with my integrity intact, I believe (NIV, Romans 12:19, 16:17). Therefore, magic still holds the same meaning against me advancing an approximate two thousand years: even flair and strange division can seem exciting, but ultimately good news is a better worst-case: for each sin, offer the good news; the alternative is individually counting the tricks a sorcerer can perform then requesting them.

This is a proposition: a workable history traversing tool

In asymptotic notation, the sin-law contrast can be considered an AVL (Adelson-Velsky and Landis) over Height Balanced tree, zero, negative one, and negative two on one side, one being the root; two, three, and four where one altitude has a sin divided as one branch, and this tree’s other branch contains a law and prophecy offered, traversal per branch. Thus so, one traversing one branch requires one step per law totaling O (n) for space, but on these binary branches requiring work for sorting, searching, and deleting, the logarithm will eventually even, well, with balance factors. The lesson, here, is Romans 6:11. Work remains required, O(log n) for finding the sin, sorting the sins committed with the laws prohibiting them per sin and per law, and baptizing and giving the Holy Spirit when applicable, making the man, woman, or child born anew, and the worse O(n) for space because compartmentalizing the law and the prophets into organized doctrine shall require a step by step effort. During my Johns Hopkins University studies, starting today, I shall endeavor this effort. My studies shall be EN 605.601 and EN 605.611. Eventually, through self-study and research: through a research article portal, I shall post my findings. I believe this shall require a few years maximum, so 2024. Moving forward, I shall address the archaeological and text data that is available, and I want this published so the general public shall review it. For more Data Structures and Algorithms information, I recommend the book I studied: during my undergraduate program (link).

A Top Secret stamp of approval
Image by Tayeb MEZAHDIA from Pixabay
References

Arquilla, J. (2020, May 7). Hacking the Axis. Communications of the ACM, (08/2020), 8–9. https://doi.org/10.1145/3403403958

August 23, 2020

On the Topic of Domestic Graduate Students, I AM


Domestic Graduate Students


In the September 2020 edition of Communications of the ACM, Moshe Y. Vardi wrote Where Have All the Domestic Graduate Students Gone. Vardi wrote, “Tech industry giants Apple, Amazon, Facebook, and Google were all founded by first- or second-generation immigrants” (link). As stated previously in another article I wrote, Vardi wrote that in the month of June during the year 2020 AD, President Trump suspended new work visas and banned tens of ten thousands of foreigners against establishing employment within the U.S.A.: this was temporary. On greater division was the Trump Administration ban against U.S. universities that were operating using international students within only online classes, but remain in the U.S.A. Vardi also spoke on behalf of the entire science and engineering community without a vote and said that I strongly object to this, but I believe my objection is an average one. Against the international community becoming formally anti-U.S.A., native-born U.S.A. citizens should be taught Computer Science and Engineering as intense an education that native-born U.S.A. citizens can handle as possible: I believe that this requires the queen of the sciences, theology, optionally in secular public schools because, there, Joe Biden and Kamala Harris want public schools tuition free, but the ethics of tolerance even failed Greece when Socrates drank hemlock rather than refusing to die against the popular vote (link)...President Obama is a champion to democrats, but President Trump learned from him to become a tyrant, but a more quieted way of saying this is Jonathan Allen’s Yahoo! News article title. Yahoo! News writer, Jonathan Allen, titled his article, Trump is playing the tyrant, because he doesn’t have the people’s consent (link). Without impartial law, the U.S.A. shall fail. This was the basis for the American Revolutionary War. On Amazon Prime, feel free to check out a docudrama about one of the original U.S.A. leaders: John Adams (link).

U.S.A. Science and Engineering Employment 

On the topic of science and engineering, many U.S.A. citizens want employment, but not subservience to paying taxpayer dollars to serve the science and engineering community who do not offer an adequate climbable ladder. Vardi stated, “the lack of an adequate pipeline is a bug, not a feature!” One day, while speaking with a longtime family friend, John P. Gibbons, Jr., son of WWII Air Force Major John P. Gibbons, he told me that CERN was offered to the U.S.A. people on U.S.A. soil; but a U.S.A. citizen responded to a newspaper organization that he did not want these: welfare scientists. Now, CERN is on Switzerland crust, and the benefits of its scientific advancements are cited, there. Universities are often ranked by the number of research citations referenced from them: now, the top three ranked Swiss universities are within the top fifty eight global universities (link).

A History Reminder


As history displays, I believe U.S.A. citizens require morality or else the entire country shall fail, but the Bible contains multicultural wisdom that may prove a saving grace. Between three thousand four hundred and three thousand four hundred seventy years ago, Joshua replaced a high ranking leader of Israel, Moses, but, there, was one fault in Joshua’s leadership that caused terrible consequences. The writer of Joshua stated, “But the Israelites were unfaithful in regard to the devoted things; Achan son of Karmi, the son of Zimri, the son of Zerah, of the tribe of Judah, took some of them. So the LORD’s anger burned against Israel” (NIV Joshua 7:1, link). When one part of Israel sinned, ABBA, my god, had burning anger, and against the U.S.A. is the same. Historically, until the second Gulf War, my native country, the U.S.A., has had a popular reputation as the international leader in morality. My nation’s motto is a latin phrase: in contemporary English, e pluribus unum. That phrase is ‘out of many, one.’ My hope is that people evolve through the Christ as members of the one body of his, Wonderful Counselor, Mighty God, Everlasting Father, Prince of Peace (Isaiah 9:6, link). Even to the point of being wrongfully spoken for, the alternative is being rejected by many in science and engineering, but this is U.S.A. history whose related men should be honored (INT, 1 Pe 2:17).

These are Nashville, TN, buildings, but the AT&T Batman Building is a present, towering building.
Image by Lenny Rogers from Pixabay

August 21, 2020

Stakeholder Contexts and Industry Standards: ISO/IEC 38500 IT Governance, but then an IT Compliance Framework


ISO / IEC 38500 IT Governance ^ Compliance


In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3). 

SMEs Linked to Measurable Successful Outcomes

With regard to small and medium-sized enterprises, or SMEs, Olaitan Olutoyin and Stephen Flowerday suggested that the IT governance structure and the operational governance processes are linked to measurable successful outcomes by three key pillars (2016). Olutoyin and Flowerday (2016) said that the three key pillars mentioned technology context of the enterprise, organizational context, and environmental context.

A O (n^2) Rate of Dangerous Change: Converting Target and Legacy Systems

On tangential rhetoric, a possible derivation of the collaborative research comments by Olutoyin and Flowerday is that the narrative of stakeholder involvement related to information technology governance frameworks and networking technology (link) implementations is quantifiable. In exposition, Satyam Tyagi (2016) reflecting that compromising a single low privilege user resulting in the entire Target enterprise compromised indicates Target not understanding legislative requirements for storage data involving integrating more secure systems and documentation for the legacy systems. Therefore, the worst-case is defending each low privilege user. The even worse case that should be replaced is probably a criminal hacker, a cracker, gaining access to any a parallelized system looping with the first loop getting the maximum user accounts then the inner loop injecting the malware used in the hack Tyagi reported in 2016: this is a worse case of n^2. Target’s situation contains similarity to Israel before Christ’s arrival regarding Achan (NIV, Jos 7:13). In response, Target would benefit from demarcating legacy systems that do not enable industry-standard security integrations (link). 

This is a sealed security vault
Image by 8385 on Pixabay

References 
Anonymous. (2016). JOBS MARKET: Me and my job. SC Magazine, 27(6), 15. 
Holt, A. L., Safari Books Online (Firm), & Books24x7, I. (2013). Governance of IT: An executive guide to ISO/IEC 38500. Swindon, UK: BCS, The Chartered Institute for IT. Olutoyin, O., & Flowerday, S. (2016). Successful IT governance in SMES: An application of the technology-organisation-environment theory. South African Journal of Information Management, 18(1), 1-8. doi:http://0- dx.doi.org.library.regent.edu/10.4102/sajim.v18i1.696

August 19, 2020

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

               With Cyber Security activated, an easy Smart phone app

Considering Holy Security

When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” (New International Version, Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity.

Cyber Security Hygiene

Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along with her clients because true security is inclusive. In this case, if one part of the network is compromised, it could cause a variety of issues that could be preventatively defended against beforehand. Issues such as stolen identities and proprietary data would damage the integrity of the woman’s consulting business, but the damaged image of the company purposefully neglecting the protection of critical data would probably be more difficult to repair.

Protecting the Group

Paul called on the body of Christ to protect each other. Paul said, “Keep watch over yourselves and all of the flock of which the Holy Spirit has made you overseers. Be shepherds of the church of God, which he bought with his own blood” (Acts 20:28). Paul was saying that the body of Christ, all of humanity who has been bought with a price, should care for each other as a healthy living being naturally protects its own body. This can be interpreted as the need to protect one another as being a moral obligation. Therefore, the woman should reorganize her company to protect it.

But remember this: man is just as obligated as the woman to act in the righteous Way. Without constant vigilance, the entire organization is at risk due to the fact that man's (male's, but also female's) organizations are built with cohorts and peers rather than no more than 3 entities, 1 leader, but 2 subordinates, ad terminus. This is a binary tree structure, and it is the most efficient means of leaders or subordinates communication to each other.

So, the fact that organizations, top-down communication-based leadership (executives, middle management, but then operations), do not employ the best runtime complexity for, now, who are IT infrastructure-based organizations, is very strange.



August 18, 2020

On Neuromorphic Chips: Advanced AI, Deep Learning, and Neural Network Computer Architecture

Neuromorphic Chips to Become Affordable

In the August 2020 edition of Communications of the ACM, West Linn, OR, USA-based author and journalist, Samuel Greengard, wrote Neuromorphic Chips Take Shape. The available data Greengard had is the claim that a Caltech (The California Institute of Technology) professor invented this technology, neuromorphic chips. Greengard wrote, “The concept of a brain-like computing architecture, conceived in the late 1980s by California Institute of Technology professor Carver Mead, is suddenly taking shape” (Greengard, Aug 2020, p. 9). Since the date, today, is around forty years later, this technology has remained dormant, but not in the research, thus so recent advancements probably allowed neuromorphic chips to become affordable (With LTE capabilities, see current pricing of a standard productivity PC, an i5 Microsoft Surface Pro. With 3G capabilities, alternatively see the current pricing of a legacy, but GPU intensive PlayStation Vita.

Safely Surpassing the von Neumann Bottleneck


With maximum efficiency regarded, Greengard mentioned that this contentious model is aiming against the ineffective von Neumann bottleneck: this demands a processor enter an idle state, but it awaits memory data (see a fast external SSD) or other component data inclusively moving; however, this is an intense computation, and it plateaus exponentially worse problems. These exponentially worsening problems not inclusively are AI (see 2001: A Space Odyssey, a popular film regarding advanced data technologies including artificial intelligence), so thus this is a deep learning issue addition, but machine learning is also remaining a power-intensive issue, unfortunately.


This May be the Next Crucial Step Data Science Demands to Survive

On Greengard’s column, Chris Eliasmith, a Systems Design Engineering and Philosophy professor of the University of Waterloo located in Ontario, Canada, stated neuromorphic parallelism is a refreshing standard. Greengard wrote that Eliasmith said, “Neuromorphic chips introduce a level of parallelism that doesn’t exist in today’s hardware, including GPUs and most AI accelerators” (Greengard, Aug 2020, p. 9). According to Greengard, contemporary deep learning systems are dependent against software measurements to play oversimplified neuromorphic systems: they use standardized FPGAs (field-programmable gate arrays), CPUs (Central Processing Units, and GPUs. As Greengard mentions, this technology as a single deliverable chip might be as effective as researchers have begun developing: touch-sensing prosthetics, anti-stroke or anti-Alzheimer’s brain implants, or self-healing electronic skin; or vision technology...other possibilities are predicting an earthquake or, I believe, an economic recession. According to Greengard, this technology shall be knowable as an embedded processor during the next year or two years on commercial markets.

With no many any longer populating the Garden of Eden, invest in Mental Stability.

In Scripture (NIV), there is a record of Adam being taken by ABBA, but then Adam being put in the Garden of Eden: Genesis 2:15. With that event done, then Adam and Eve were driven from the Garden of Eden (Genesis 3:24), investments became a recurring long-term proof that persons were willing to work. In the time of the Ecclesiates being written, this was probably proven by Solomon, kinsman of David, who invested in wisdom literature (Ecclesiastes 1:1), but this was a condemnation of Solomon because Solomon married seven hundred women and had his ways with three hundred concubines, worshipping himself through fertility rituals foreign to Israel (1 Kings 11). However, for others, Biblical wisdom literature has remained relevant over the generations since Solomon passed away because of this: mental illness doctrine like the APA’s (American Psychological Association) has remained unscientific to this day. The unscientific part was recorded in Genesis because Adam died for eating the fruit of the tree of knowledge of good and evil (Genesis 5:5), but more recently, in the APA’s case, not having a biological standard for typical or atypical antipsychotic medications, the related law enforcement conduct, and the court cases surrounding them then the culture supporting this entity. I wish Greengard or anyone he cited would have expressed interest for investing in R & D.


And programming regarding the applicability of neuromorphic chips on mental illness cases, but none did, here. Hopefully, by the time neuromorphic chips are on the market, this shall come to pass, or maybe I shall have this opportunity, myself. 

A Smart phone is serving as a technology hub.
Image by Gerd Altmann from Pixabay

References

Greengard, S. (2020). Neuromorphic chips take shape. Communications of the ACM, 63(8), 9-11. doi:10.1145/3403960



Featured Post

A New Season: Algorithms

A New Season Last month, I decided to work in a company as an SDET (rundown of my initial thoughts: link ). That means ‘Software Developer i...

Contact Form

Name

Email *

Message *