Skip to main content


A New Program: Economic Assistant Robots

Tonight, March the 25th, 2021, I am announcing to my audience the start of a new program: assistant robot technologies. For generations, emergency medical services have cost outrageous prices, but alternatives do not exist. But poor communities have not been afforded opportunities to supply health insurance services to poor friends or poor families. In 2021, this is inexcusable, and it cannot be defended. For in contemporary society, the so-called dog-eat-dog mentality allows convenient wrongs. The hungry captain, Tom Dudley, could say he needed to drink his ship cabin boy, Richard Parker’s blood to survive ( link ). But more cogent: he did not say his poor planning should have cost him his body, and his life. Organizations, today, are changing. Consider Amazon and Tesla. Amazon, who recently displayed her founder, Preston a.k.a. Jeff, Bezos, having retired ( link ) under convenient circumstances ( link ) against consumers and workers. Also, Tesla was recently in the news and her CEO,

Is the Police Using AI a Good Thing? Without preferences, perhaps it is.

On the Wall Street Journal, a video was posted titled Police Unlock AI’s Potential to Montior, Surveil and Solve Crimes ( link ). In New Orleans, appropriate use is the official consensus of the police force. But against the New Orleanian police is the local black or African American community’s focus on politics: previously open conversations about important city events and plans have naturally become more private, but less accessible. Trust Shall Forgo Favoritism Against critics, this live and active system is encouraging the development of circles of trust. And of the liberal, free and open society, this is the needed compromise: where people mistrust AI, the fundamental trust issue seems to be computer information technology taking preference data, and mistreating people. This has evidence when the New Orleanian African American woman on film stated the disproportionate mistreatment New Orleanian police place on New Orleanian black or African American people is infamous: from stop

On Objectivity and Subjectivity: Can Computer Science Become a Hard Science?

On Twitter, yesterday, the President of the United States, Joe Biden, stated a comment regarding a bacteria virus: it is the 1 many are not accustomed to, or feel thrilled with which to share space, COVID-19. But it has caused many responses. And I shall share my response, here. President Biden stated the following: Words have consequences. It’s called the coronavirus. Full stop. — President Biden (@POTUS) March 19, 2021 Remembering its Origins with Fairness This may seem strange and even cryptic to readers because it is. The coronavirus is not the major problem: people forgo death because of coronavirus like HIV (human immunodeficiency virus). Common knowledge is this virus, SARS-COVID-2 (Severe Acute Respiratory Syndrome Coronavirus 2), originated in Wuhan China. But when coronavirus activates and becomes COVID-19 (Coronavirus Disease 2019), then it is deadly. On, Dr. Stuart Ray stated alarming news. Ray said, “New variants of the SARS-CoV-2 virus are detec

Utilizing Media: A Response to Deepfakes

  Of the ACM (the Association for Computing Machinery), a magazine called Communication of the ACM's edition releases 1 month before its stated release month. In the latest edition, regarding March 2021, of Communications of the ACM , Column Editor, Susan J. Winter wrote Computing Ethics: What To Do About Deepfakes . Regarding Winter’s desire to halt or hinder illegal or unethical deepfakes, a video technology like wearing a full body masking suit, Winter wrote, “Here are three areas where technical experts can make positive contributions to the development of synthetic media technologies: education and media literacy, subject defense, and verification” (Winter, March, 2021). Winter was saying actions such as teaching and having disruptive technology knowledge, researching professionally, and proving concepts are parts of deepfake experts’ calculus. But this much work specializes such that entry level, junior, work will probably be offered to overqualified professionals. Technic

Of Zero Trust, the Restrictive Drudgery

In recent years, Moore’s Law has begun reaching its limits, and these limits are the sizes of computer hardware. As a history review: when computers were 1st designed, they used vacuum tubes. Through a vacuum tube, this involved an airless vacuum tube meaning ‘0,’ ‘off,’ or air flowing meaning ‘1,’ ‘on.’ In contemporary phones, tablets, and computers, electricity performs this same ‘off’ or ‘on’ task; and with more electric computation devices, but also efficient circuity (electronics components and computation pathways), the more electric computation devices we have, the greater the possible computations. But in size: of the vacuum tube concepts, our common electric versions are reaching the atom’s scale. This is ~1.8E-10: of an approximate average human, it is ~0.00000018% our height. Against Quantum Computing, the basic communication, very much discussed, already, we can discuss another important subject: cyber security. In professional and academic circles, cyber security is not b

On Datapaths: Accepting, but Surpassing Limits

In Computer Organization and Design MIPS Edition, authors, David A. Patterson and John L. Hennessy wrote a piece of information: they defined single-cycle implementation. On single-cycle implementation, Patterson and Hennessy wrote, “Also called single clock cycle implementation. An implementation in which an instruction is executed in one clock cycle. While easy to understand, it is too slow to be practical” (Patterson & Hennessy 2014). Patterson and Hennessy were saying this: for every instruction, an instruction requires one clock cycle. As this is a scalability issue, increasing the instructions to two: requires two clock cycles. Against the pseudo-infinity within, I shall describe, common case hardware, von Neumann computers: this requires a series because this shall make calculation sufficiently easier than a sequence that has no calculation. The series is this: from 0 instructions to n instructions, the series X is incremented one instruction divided the equivalent clock cyc

Data Pipelines and Data Distribution

As the C programming distributive library, MPI (Message Passing Interface), encourages simultaneous application process task because it is efficient enough, our MIPS 5-stage pipeline system allows simultaneous instruction execution. The potential benefit of applying the principles is the sufficient reduction in program execution time. As a major effect, data hazards can occur: when a pipeline changes its read/write accessibility order because the order differ, sequentially; but specifically, on the unpipelined machine, seen regarding sequentially executing instructions[1,2] . Called a data stall because a stall degrades the ideal program performance, the ideal CPI and pipeline stalled-clock cycles per instruction results in a greater than 1 CPI pipelined CPI. For maintaining accurate overhead, cycle time overhead should not be ignored, so pipelining is accurately calculated, but the result will not be an intuitive one. Thankfully, data forwarding can solve data hazards because forwardi

Contact Form


Email *

Message *