Skip to main content

Posts

Featured Post

The Economics of Autonomy

In ancient legend, there is a Creation story: in contemporary times, it is known as the first book of Moses called the book of Genesis. When God IS creating the world, Genesis (KJV) states, “And God said, Let there be light: and there was light” (Genesis 1:3). According to legend, the 1st great Prophet, named Isaiah, told his faith to his friends, his people, and his enemies. Isaiah wrote, “Behold, God is my salvation; I will trust, and not be afraid: for the LORD JEHOVAH is my strength and my song; he also is become my salvation” (Isaiah 12:2) A man called the Christ was crucified, then according to Roman Empire record, died, but according to Christian legend, rose again. In Christian tradition, Jesus the Christ stated Christians should conclude our prayers to God, our Father, this way: “And lead us not into temptation, but deliver us from evil: For thine is the kingdom, and the power, and the glory, for ever. Amen” (Matthew 6:13). Following Jesus of Nazareth, a New Testament writer,

On Trust, Bias, and Privilege: my Response to 'Anti-Blackness is no glitch'

In Winter 2020, Stephanie T. Jones and Natalie Melo wrote ‘Anti-Blackness is no glitch’: The need for critical conversations within computer science education . Jones and Melo mentioned, “The conversation around and application of computer science often reinforces neoliberal ideals” (Jones, Melo, November 25, 2020, pg. 42). Jones and Melo were saying this: the computer science revolution and organizational IT network futuristic left-wing best standards access is telling. For Trust, I am Checking my Privilege But this is not excluding contemporary conversations: any futuristic conversation based on personal interpretation is not from ABBA, so it is not prophecy (NIV, 2 Peter 1:20). For your review, Peter wrote, "For prophecy never had its origin in the human will, but prophets, though human, spoke from [ABBA] as they were carried along by the Holy Spirit" (2 Peter 1:21). You, reader, can predict something shall happen, but prediction is uncertain: it is a terminating series ca

We Should Have Already Had This: The Lithium-Ion Battery With Built-In Fire Suppression

  On October 22, 2020, yesterday, Dexter Johnson posted The Lithium-Ion Battery With Built-In Fire Suppression . Within this topic, Dexter Johnson regards a Stanford University research team and the SLAC National Accelerator Laboratory (its former name was the Stanford Linear Accelerator Center [1] ). Johnson stated: Now [Yi] Cui and his research team, in collaboration with SLAC National Accelerator Laboratory, have offered some exciting new capabilities for lithium-ion batteries based around a new polymer material they are using in the current collectors for them. The researchers claim this new design to current collectors increases efficiency in Li-ion batteries and reduces the risk of fires associated with these batteries. [2]   Johnson was saying this: fires are a current Li-ion battery threat that has been realized, but a new design can secure client use-case safety, and this required this battery redesigned. As this technology approaches marketplace entry points, this shall c

On Self-Driving Vehicles, Re-evaluating Automation Levels

On October 18, 2020, Erik Stayton wrote "It’s Time to Rethink Levels of Automation for Self-Driving Vehicles" in the IEEE Society, SSIT (Society on Social Implications of Technology), and the magazine, Technology and Society. On media, regarding the future, Stayton agreed with Lee Vinsel. Regarding standards, Stayton wrote, “As the historian Lee Vinsel argues, standards are not just ways of classifying things. They are also attempts to shape the technological future. Thinking about how the structure of our standards contributes to their use is therefore crucial for making better policy decisions” (Stayton Sept 2020). Stayton was saying this: of the future, technology shall remain a part, but not its complete whole. Against humanity’s centralism is this: in authority, an ultimate media exchange. Without humans, media is another entity’s claimable target, but all human records are the bounty’s contents, too. As a history-based tool, its potency, replacing a human, is not really

On Patent Investing: Whether Industry or Academia, Invest

In the September to October 2020 edition of IEEE (Institute for Electricians and Electrical Engineers) Potentials, Raymond E. Floyd wrote Industry or academia. With the full article title being Industry or academia: Where are the innovators, Floyd explained two different words. Floyd wrote, “Innovation has two common definitions: 1) a new idea, device, or method 2) the act or process of introducing new ideas, devices or methods. In contrast, research is defined as the systematic investigation into and study of materials and sources to establish facts and reach new conclusions” (Floyd, September 2020). Floyd was saying this: for the most people, a supposed new idea or thing, or a supposed new idea’s or thing’s introduction is average innovation description, but research is a system-level investigation, and research might involve discovering or inventing new evidence-based results. To patent-producing research corporations, Floyd applied this knowledge. Floyd stated IBM (International Bu

On Hacking the Axis and Securing History Records

  On Security Requirements, Review Physical Might On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis . When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75 th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect. Emergent Cybersecurity Requirements With physical security, there is an emergent cybersecurity necessity that John

Contact Form

Name

Email *

Message *