Showing posts with label computers. Show all posts
Showing posts with label computers. Show all posts

Sunday, September 7, 2025

Hacking as the new and old threats.

   Hacking as the new and old threats. 



There are always suspicions that organized crime uses hackers to steal psychiatric papers to get policemen, prosecutors, and judges fired. Same way. Fake papers can also be a tool that allows people in foreign intelligence to make military forces. To kick off their best commanders. Sensitive information can be used to blackmail even top-level politicians. 

Hackers are people who steal data. Some of that data is harmful, or it contains personal, sensitive information. That kind of data can be a very effective tool if someone wants to destroy someone’s reputation. Hackers can steal data from psychiatric services and try to blackmail politicians. One of those cases was the Vastaamo case, where a hacker stole client information from a psychotherapy company. That hacker also sent a SWAT team to a person’s home and marked one aircraft passenger as a bomb carrier. Hackers can also make things like deactivate the payment cards of their victims. 

Or, in some cases, hackers simply steal money from accounts. If a hacker steals 1 euro. From 10,000 bank accounts. Those victims might not even notice that thing. Or do you follow every euro that is lost from accounts? If there is a loss, let’s say 1 euro, do you call your bank? You should tell that thing. Because in those cases, hackers steal a small sum from many accounts. But are hackers evil people? Some of them are. Some of them enjoy their crimes, and they want to hurt people. 

Being an effective hacker. You don't have to be a computer genius. You must only have access to passwords. One unprotected telephone on the desk gives a hacker access to the entire system. If a telephone is left open on a table, the hacker can call the IT support. And ask for access to the system. If that is some very high-level boss's telephone, that makes it possible to create a super user’s access to the system. That allows an intruder to make new users.  And that allows hackers to expand that operation. 

We can say that all criminals are marginal people. But what makes them marginal people? When some ex-neonazi or MC-gang member wants to get back into society, those people carry the criminal stamp. The rest of their lives. Some people ask, can ex-Nazis or other ex-criminals really regret their actions? If we think like that. Criminals are individuals. That means some of them regret, and some of them don’t. 

We will put those people. Into a marginal position in society.  The rest of their lives. And that raises the risk that those people will commit other crimes. If a person is surrounded by other criminals, they cannot re-integrate into normal life. 



Only jobs. What the ex-inmates can get is some kind of cleaning work. They carry a criminal stamp. The rest of their lives. 

So, are hackers criminals that society created? We can say that some of them have criminal behavior. Because of other people. didn’t accept them for who they are. The media introduces computer hobbyists as some stereotype who is not social. Their place in a mental hospital is the message. Those people face demeaning treatment; they have no girlfriends, because some elder guy wants to show that they are alpha members of some school party. What would you feel if somebody yelled at you, “Get out”? Would that be non-respectful behavior?

What if your workplace treats you as necessary furniture, whose mission is to do jobs? But whose mission is to be otherwise invisible. There are people who just wait to fire those ICT support persons. They show their authority to those people all the time. So, what if your workmates treat you without respect? What if you are always an outsider? Would you want to take revenge? Those kinds of outsiders are excellent targets for a criminal gang recruiter. The hyride threat is that those criminals can cooperate with foreign intelligence services. And they can give a tip for those hostile agents. Maybe they get guns or drugs as payment for cooperation. 

And then we must ask why hackers are what they are. In this case, we must ask why computer hobbyists are what they are. Those people are boring nerds who are not in any way interesting.  Do you know those people? Some of them are people who don’t find any social hobbies. They are people who are lonely because nobody wants to play with them. And the computer is their only friend. Then some criminals come and offer money or women to those people. Some hackers are young, and they don’t understand why some criminals want policemen's home addresses. But then. We must realize. People grow into criminal behavior. 

Maybe the first case that. Those people did it for revenge. It’s easy to steal somebody's passwords. To some system, and then send a message to customs or airport security. When we think of things like professional hackers. Those people work for some criminal organizations or governments. 

Some hackers are made by governments. They can be forced to make those things for the military intelligence. Or some criminal organizations can blackmail them. The fact is, this hacker must not be a qualified programmer. That person must not be an extreme computer genius. If the person gets access to the system is enough. One of the oldest tricks is to play some cleaner and then step into the office. And search for those passwords in the places. Like under keyboards or from computer briefcases. 

The question is always who made the initiative.  Who gave the idea for the hacking operation? Or was it the hacker self, or somebody else? That means some sensitive information can be used as a booster in political games. Psychiatric papers are tools that can offer a possibility to clear the competitor out of the way. That means some people can steal those papers. And some other people are willing to pay for that kind of information. 



Wednesday, August 27, 2025

AI doesn’t make U-turns.

   AI doesn’t make U-turns. 

   


We don’t always make our best move. That means we don’t always choose the fastest way to travel between two points. We simply might like another route. We might like things that we see while we travel some other, slower route. And that is inhumane. The AI always predicts that we choose the fastest and most economical route. AI thinks that we don’t look at things like old houses. AI always predicts that we travel to some other place using the fastest route. It believes that we want to make journeys in the shortest time possible. It doesn’t think that somebody chooses a longer route, because that person wants to improve fitness. 

And that is the thing that differs AI from us. 


The difference between the human and AI approach to playing games like chess is this. The AI never plays anything for fun. Or the AI will never “kill time” with games. When humans play chess, sometimes we just move pieces on the chessboard and think of other things. AI always “thinks” that we play games to win. Not just to kill time, when we wait for things like a weekly meeting. This is one of the differences between AI and humans. When AI tries to predict things like interactions in nature. It makes things better than humans. The reason for that is simple. Everything that happens in nature happens in a linear way. When action happens. A reaction follows that action. When snow starts to fall on the slopes, that action continues until the avalanche reaches the bottom of the valley. The avalanche follows the laws of nature. It will not change its mind and start to travel backwards. 

And that is the difference between avalanches and humans. Humans can change minds. When a human starts to walk across the street, that doesn’t mean that the human will go to the other side of that street.  Humans can change their minds and make a U-turn. This is the thing. That makes human nature unpredictable. And that is one thing that evolution is made for: protecting species. And that makes humans difficult prey. When some animals hunted humans. We can run to the thing that seems like a dead end. And then put their spears against attacking animals. This way of making something unpredictable. Makes it hard to predict human behavior. 

AI follows the same marks as human psychologists when they try to read humans’ feelings. The ability to use special sensors to see how blood pressure and adrenaline levels rise. If the AI doesn’t have those sensors, it must follow body language. And the way a person speaks. In those cases, the sensor systems that the AI can use. Mean as much as AI itself. If the AI can use lie detectors. It is not very hard to make an algorithm that uncovers lies.  In that case, sensors mean more than an algorithm. 

When we see cases where somebody cheats people who serve as royal guards, we know that thing makes those people angry. Those people, with ultimate strength, can hide that emotion. We might be very angry. But in some cases. We don’t tell this to other people. Animals never hide their emotions. When human turns angry against a superior force. That means humans might not attack. Humans can flee from the field and wait for a better moment to strike. That is one of the things that makes us the ultimate species. 

Let’s go back to the chess game. The algorithm predicts that we always make the best move. And this is the algorithm’s ultimate strength. And that is the algorithm’s ultimate weakness. We might think of cases where a boxer faces many practice opponents. That boxer can win all of them easily. But then in the title fight, the opponent knocks out our boxer. In that case, we forget that. Some boxers can lose their training matches because they bet on that opponent. This means the training opponent can lose matches that nobody sees. But when there is a kind of meaning. That a person can fight differently. This is the thing that AI doesn’t always understand. Humans can save their best moves for the places where those moves mean something. So, we can think about different things than what we make. 


Wednesday, August 20, 2025

The ability to control the mind can be an ultimate training method. But it can also open the darkest visions of dictatorship.

 The ability to control the mind can be an ultimate training method. But it can also open the darkest visions of dictatorship. 



Brightest innovations have darkest sides. That is the thing. That we should somehow learn. This is the thing. That people like Fritz Haber are shown to us. The same person who created ammonia synthesis and made fertilized irrigation possible created chemical weapons that killed millions in the First World War. In the same way. Things like artificial intelligence and brain-implanted microchips are tools. That can make many good things. But those systems can also control things like killer robots. And that means we must realize that all of those systems have two sides, bright and dark. 

The ability to control consciousness and decode thoughts is a tool. That has always fascinated people. The CIA and other intelligence agencies studied those things for a very long time. And an idea is to create a spy who doesn’t know being a spy. The person would walk into the office. And read documents and other things. And then that person goes to the safe place. And after the mark, that person can repeat everything that this person saw and heard. The idea is to use humans as walking recorders who don’t know that they are spies. 

The BCI system can make this thing possible. Brain circuits store information in the microchip, and then that system decodes that data in a safe place. 

That makes them pass things like lie detectors and even sodium amytal interrogation. In some other visions, the consciousness control can be used to hide top-secret technology. What if the operator can make missions using highly classified systems? And then that person will not remember anything. And any details about the missions and equipment are lost in their memories. The ability to control memories is a tool that can have many roles in the future. Controlled memories. Or, so-called synthetic memories are tools that can be used to train complicated things very fast. 



And that thing can save human lives. If a person is in trouble in remote areas. And the only person who can give first aid is person who lacks the needed skills, those systems can offer those skils in a very short time. Those systems can teach complicated algorithms to people, and they can make many things that we don’t even think about possible. Brain implants can be used to teach people things like karate. When we think about things like mind manipulation. We must realize one thing. In the wrong hands, those systems are extremely dangerous. 

When Brain-Computer Interfaces, BCI systems operate with people, they interact with the computer directly through the brain lobes. That means the mind cannot separate data, or information that it gets from the BCI, from information that the person’s own senses will send. And that is the danger of the BCI, that it is a very powerful tool. The BCI can cause a singularity where people are connected with the AI and each other. By those kinds of systems. In the worst cases, the system destroys personality and turns people into a homogenous mass of information. The biggest problem with the BCI-controlled computers is that. A person will not separate what is real and what is a cyber dream. That means the person can simply forget to sit on the computer and then die because of a lack of food and drinking. 

The biggest problem is this: the person. Hackers can target the users of wireless BCI connections. This thing makes remote extortion possible. The same system also offers a way to communicate using brain waves. That thing is called technical telepathy. Technical telepathy is thing that allows a person to control robots and other things using brain-implanted microchips. Those robots send information to the controller’s brain that handles that information. Like it comes from the senses. These kinds of systems are created to control bionic prostheses. But they can also control robots and other things. 


https://www.livescience.com/17449-matrix-inception-brain-manipulation.html


https://www.popularmechanics.com/military/research/a63149552/pentagon-psychic-spies/


https://www.sciencedirect.com/science/article/pii/S2589004223007526


Monday, June 16, 2025

Why does an antique chess console beat Chat GPT in chess?



When we think about those antique ATARI consoles from the 1978 model we always forget that they were not as easy to win as we thought. Those chess programs handled every kind of data as numeric. And the Chat GPT-type artificial intelligence handles that game as visual data. This is one of the things that we must realize when we think about this type of case. Those old chess consoles used very straight, linear tactics. The main difference between modern algorithms and old-fashioned computer programs is that those old programs are linear. And it handles all buttons and movements separately. 

So there is actually a chessbook in those chess programs, that it follows. Those old chess programs were more difficult than some people believe. If you were a first-timer in chess that means you would lose to those consoles. They played very aggressive and straight games against human opponents. The system tested the suitable movements for each button separately button by button. Because the program was linear the movements were made in a certain order. In those chess programs, every movement is determined by the program square by square. The programmer determined the movements for every button and every square separately. And that made those programs quite long. 

Those old-fashioned chess programs have a weakness that if something goes wrong they continue by following that line. There are certain numbers of lines that the program can use. And there is also the end of the line. Those programs can use complete tactics. But their limit is that those programs are fixed. They don’t write their databases and models again if they lose. And that makes those old-fashioned consoles and video games boring. When people learn tactics that it uses they can beat those old-fashioned programs. The limit of those video games is seen in action games. There are always the same points where enemies jump in front of the players. 

Then we can think about things like learning neural networks. Those networks can beat all old chess programs quite fast. The problem is that the neural network must see the game of the console before it can win those systems. AI is like a human. It requires practicing and training. Without knowledge of the opponent’s game, the AI is helpless. There are many ways to teach AI to create tactics against old-fashioned programs. The system can use some modern chess programs and then analyze the opponent’s game to create tactics. 

The other way is the system can analyze the source code and create a virtual machine that it can use to simulate the chess console game. But what do we learn from that case where antique consoles beat the modern AI? Without training the AI is helpless as humans. If the AI has no knowledge of how to play chess, it must search all data including movements of those buttons that make it as helpless as humans. 

Those old-fashioned consoles are RISC applications. They are made for only one purpose. Their code is completely serving the chess game. Modern AI is a complicated system. It can also do many other things than just serving the chess game. And that makes those old consoles somehow difficult to wing, at least when the AI can break its movements and tactics. 


https://en.shiftdelete.net/chatgpt-fails-in-chess/




Tuesday, December 6, 2022

Quantum computers can find dark matter.


"In a new breakthrough, scientists at the U.S. Department of Energy’s Fermilab have found a way to detect dark matter using quantum computers." (ScitechDaily.com/U.S. Dept of Energy Breakthrough: Detecting Dark Matter With Quantum Computers)


1) How do quantum computers detect dark matter?


The idea of quantum computers is that they use very highly controlled superpositioned and entangled photonic qubits. The idea is that the system pack information photons. And then that photon will be superpositioned and entangled. If that superpositioned and entangled photon touches something. 

That "something" causes a disturbance in the energy level of that superpositioned and entangled particle pair. So if the superpositioned and entangled qubit touches the dark matter. That thing causes disturbance of the energy levels. 


2) What the dark matter could be? 


Dark matter is interesting. 85% of the material in the universe is formed of dark matter. That is the gravitational effect whose source is unknown. The thing that makes the dark matter interesting. Is that it can interact with visible material only by gravitation. There are galaxies there is no dark matter. And that tells that it can form similar clouds as visible material. But what is dark matter? 


There are a couple of theories about that thing. 


*Is dark matter a so-called black photon?


The idea of black photons comes from the idea that the Schwinger effect that formed all matter during the Big Bang forms two particles. Schwinger effect forms particle-antiparticle pair. So the photon should also have anti-particle pair. That "anti-photon" should be a so-called "black photon". 


*Dark matter is virtual material. 


The term "virtual material" means that dark matter could be some hollow quantum field. That quantum field can be a 2-dimensional energy ring that causes forming of a virtual black hole in that ring-shaped structure. That thing explains why it's so hard to detect. 

There is a possibility that also hyper energy photons or some unknown very heavy but small particles are forming that mysterious dark matter. That particle could be like Higgs Boson. But it could exist only small moment. And when that particle vaporizes, it forms the thing called dark energy. 

So in this model dark energy and dark matter have the same source. But where that hypothetical vaporization happens? Does it happen in the plasma of the universe or outside the plasma bubble that is called the universe? 


*Dark matter is extremely high and low energy particles. 


The idea is that dark matter can be so high-energy level particles that they are pushing all radiation away from them. That makes those particles act like stealth aircraft. When wave motion travels or flows over them that causes the situation that there is no reflection from that matter. 

In the low energy model, the dark matter is simple flat material. The energy level of that material is so low that it cannot react.


*Dark matter is quantum-size black holes. 


There is the possibility that dark matter is quantum-size black holes or mysterious graviton particles. If that model is true that explains why we cannot see that particle. In that model, the whisk-looking structure of elementary particles would form at the surface of the magnetic field of that extremely small particle. So the quantum-size black hole hovers in the middle of the quark. 


https://scitechdaily.com/u-s-dept-of-energy-breakthrough-detecting-dark-matter-with-quantum-computers/


https://miraclesofthequantumworld.blogspot.com/

Monday, December 5, 2022

Researchers created a holographic wormhole in a quantum computer.



Researchers created a holographic wormhole in a quantum computer. So did they make a wormhole? The answer is yes and no. The holographic wormholes are very weak versions of the wormholes. As I wrote somewhere earlier, the wormhole is not an absolute phenomenon. Its channels across space and time. 

The simulated wormholes show that simulated black holes can exchange information. But exchanging some gravitational waves or electromagnetic wave motion is a little bit different than sending some living animals or even bacteria through that channel. Simulating wormholes can make a revolution in quantum computing. 

Researchers make the simulated black holes by making an electron hole in the 2D atomic structure. Researchers can make Quantum entanglement through those holes. In that case, the energy channel that connects superpositioned and entangled particles will create through two holes linear holes in two opposite 2D structures. Those 2D structures are created by using minimum energy level atoms. 



The measurement accuracy or ability to separate the quantum states in qubits determines the quantum computer's power. So if the system can protect quantum entanglement against outcoming disturbance it allows increased quantum states. And the number of quantum states determines how many parallel lines the quantum computers can use.  

Things like laser rays and other kinds of things can create a so-called "softcore" wormhole that isolates the area from its environment. Or it denies some wavelength of the radiation effect inside the hologram. That thing allows simulation of things that are happening in the real gamma- and gravitational wormholes.

But there is one thing that makes those holographic wormholes interesting. They can protect quantum entanglement against outcoming effects in quantum computers. Hologram wormholes can make it possible to protect the information in light cables, laser communication, and quantum entanglement. 

The hologram or laser ray that is around the light cable or quantum entanglement can deny the outsiders measure the changes in the power of the signals. And that kind of hologram can protect the information in the oscillation circuits. There is the possibility that outsiders can break the communication system by measuring the changes in the electric level in the oscillation circuit. 

If electromagnetic radiation that measurement tool requires hits to the hologram. That system can measure the change in the hologram's energy level. And that thing tells if somebody wants to measure the energy levels in the oscillation circuit. 


https://www.quantamagazine.org/physicists-create-a-wormhole-using-a-quantum-computer-20221130/


https://designandinnovationtales.blogspot.com/


Sunday, August 14, 2022

Living neurons and WARP-speed are the next-generation computing tools.

 


The number of connections determines how powerful a neuron is. 


The image above: a small worm or nematode called "Caenorhabditis Elegans" has only 32 olfactory neurons. They are an example that the number of neurons is not important. The way how to use those neurons is more important. And the number of axons or synapsis is the thing that determines the neuron's ability to collect information and handle it.  

Those 37 neurons are all connected with 14 000 receptors. As you can see from that image those neurons have multiple synapses that are coming from two main synapses. These kinds of neurons are giving information about the hybridization of the non-biological and biological components in the microchips. 

The neuron-based bio-computers or organic will revolutionize computing and machine learning. In this kind of system, the living neurons interact with microchips. The data can transmit to those neurons and out from them by using electric impulses. And those systems can use to teach the neurons. 

The bio-computer means that there are microprocessors with organic layers. In those microchips is the living neurons that interact with the non-organic microchips. Those systems require nutrients for their neurons. And maybe one of the missions of the cleaners is to feed the living neurons in the microchips. 

Feeding the neurons can happen through the algae tank. The nutrient will make those algae live, and then they deliver nutrients to the neurons. That will minimize the risk of virus infection in that system. The virus can destroy the entire neuron core of the processor. 

The idea is that the similar effect that makes it possible that the neuron can change its position in the nervous system can use to train living neurons on the computer platform. And then researchers can transfer those neurons to the damaged brains of humans. But living neurons make it possible that computers can learn spontaneously. 

The use of living neurons in artificial intelligence causes problems in legislation and ethics. We should re-estimate the terms animal and human rights. The high-power artificial intelligence can need similar rights to humans and animals. 


**************************************************************


The WARP speed supercomputer requires that the particle rides with energy waves like in Alcubierre drive. The energy wave can form by using side-coming energy impulses. 

In the simplest version, the WARP-speed supercomputer makes a qubit that rides with an energy wave. So the qubit travels in the fullerene nanotubes or miniaturized particle accelerators. 

The outcoming energy impulses make it possible that the particle or qubit travels faster than the photon travels outside the system. The problem with this system is that the data that travels in the qubits can be disturbed. 


****************************************************************


How does the WARP-speed computer works? 


The description of WARP-speed information transmission is simple  "when the system sends information and photon at the same time to the same track. That information comes to its goal before the photon".  The creation of that kind of data transportation is theoretically a very easy process. The needed thing is the quantum stick. When photon impacts that stick. It will push it forward. 

And then, the end of that stick releases another photon or energy impulse. If the quantum stick is rigid. And quantum fields of that stick will not give in. That makes it possible that information travels in this system faster than free photons can transport it. 

Another version is that the system removes quantum fields around the information channel. The hollow high-power laser and maser rays that are surrounding the fullerene nanotubes can use to remove the quantum fields inside that information channel. The system can use two-layer nanotubes. 

Between those nanotube layers is the layer where the isolation radiation goes. And then the DNA-based rigid superconducting structure transports data. Or another version is that electrons or photons are moving in the WARP channel where all quantum fields are removed which makes it possible that those data transportation can move faster than light travels outside that WARP channel.  


https://eurasiantimes.com/brain-cell-powered-ai-raises-technical-ethical-political-concerns/?amp


https://scitechdaily.com/thousands-of-different-scents-scientists-solve-a-30-year-old-mystery/


https://scitechdaily.com/where-neurons-begin-in-the-brain-isnt-necessarily-where-they-end/


https://en.wikipedia.org/wiki/Alcubierre_drive


https://en.wikipedia.org/wiki/Axon


https://en.wikipedia.org/wiki/Synapse


Image: ) https://scitechdaily.com/thousands-of-different-scents-scientists-solve-a-30-year-old-mystery/


https://designandinnovationtales.blogspot.com/


Sunday, August 7, 2022

In the future, robots can call the emergency center when they need computer assistance, like new programs.




Even if spontaneously learning a computer or algorithm is hard to make it's possible, that in the central computer is the library of the computer codes made for different situations. The man-size robots have limited computer capacity. So for making databases and computer code lighter the robot can "forget" the unnecessary code. 

That means the computer deletes the databases after they are used. And then the robot can load the new algorithms into its memory. The ability to change code in the computer makes algorithms less complicated. And robots are more flexible when they can change the components of their program. 

There is an image, where the robot is using the computer. The technology where the programmer can program robots by sending the program code from the computer screens already exists. The system uses a camera or robot's eyes for reading programming code to the computer's memory. When artificial intelligence detects programming code it resends it to a programming tool. 

The new fast-learning algorithms are fascinating tools. A similar algorithm that is used to translate texts from digital images, can be used for programming robots and computers. There is the possibility that the system reads computer program code to a programming tool similar way texts are read to the translation program. So maybe in the future the robot can sit next to the human worker and read the code lines from the computer screen. 

Human size and human-form robots would be the most flexible tools than anything before. The human-looking robots can operate by using the same tools as humans. And the human-looking robot can turn any aircraft or tank in the world into a drone. But the problem is that those systems still have limited computing capacity. The complicated algorithms make it possible that the system can make many things. But what if the robot can ask for help by using regular mobile telephones or interacting with security cameras? 

In the last case, the robot can send a message to the surveillance camera, and then the system can send new instructions to it from the information screen. And in the first case, the robot can simply use the cell phone for asking new computer codes in the form of text messages. The fact is that the new programming code can send to the robot even in the form of a paper letter if the system uses the camera-based reading systems. A similar system makes it possible. That the translation application can read texts from digital images. 

And the computers can send programming code also to programming tools. There is also possible to create a translation program that translates the normally written orders into the form of programming languages. The system can also use speech through the speech-to-text application. And when the operator orders the robot to walk this message will be translated into the regular programming language. 

These kinds of abilities are making robots more powerful and flexible. The ability to send code lines to the robot in the form of text messages makes it possible that robots can operate almost without trouble in areas where internet connections are bad. 

There is the possibility that the robots of tomorrow can use similar mobile applications to a normal person. And if the robot will get in trouble it can send the text message to the central computer that sends the program code to it in the text message. This kind of system makes it possible that robots can interact with controlling systems in many ways. When robots are in trouble they can simply send a message about the situation in the form of laser rays to surveillance cameras. 

And then the local information screen can flash the needed program code to the robot. Those flashes can maintain less than half a second. And then the robot will resend the code to the system for making sure that is the right thing. Maybe that emergency center for robots is real in the world of the future. 

Making this kind of system effective requires the central computer must, of course, to know the mission. So when the master of the robot is giving orders about what the robot should do that person must just make a phone call to the computer center and say what the robot must do. 


Image:) https://www.dotmagazine.online/issues/ai-intelligence-in-the-digital-age/ai-changing-the-game-for-good/ai-for-network-infrastructure


Sunday, April 24, 2022

There are over 40 billion cores in the new Chinese binary supercomputer.



The binary supercomputers might look like being history. But ultra-powerful binary computers are needed to operate between humans and quantum computers. The problem with quantum computers is that they cannot yet communicate straight with regular keyboards.

So quantum computers require binary computers as a medium between the operator and quantum computers. The purpose of the binary computer is to code the commands for the quantum systems. 

 Those binary computers are making it possible to input and output data in and out of the quantum computers. Binary computers are needed to make settings for quantum systems and handle the communication between the quantum computer and keyboards and screens. 

Quantum computers are coming more powerful and lightweight than ever before. The size of quantum computers is turning smaller. And that means they might become part of the warships and especially the ASAT systems. The problem with quantum computers is still the error handling. confirmation of the process is very hard. 

But when the problems of the quantum computers are solved. And the borders of their cooperation between binary computers are lost. That thing makes many well-known systems more powerful than ever before. 



https://www.tomshardware.com/news/chinese-supercomputer-40-million-cores-exascale


Friday, March 11, 2022

The 3D printer technology is used to make fully working electric jet engines.



The new uses for 3D printing technology are jet engines and aircraft parts. The thing that makes material sometimes weak in 3D printing is that the air is making bubbles in structure. Metal-based 3D printing is a similar thing to other metal castings. In that process, the system operators must avoid oxygen slips in the 3D printing. Normally air is the thing that makes bubbles and oxides in the layer. 

So that's why the 3D printer should operate in the vacuum chamber that is removing the air from the system and denies oxidation. When the 3D printer is making merchandise. that system is making things by welding them layer by layer. So the product looks like a croissant that is made by using metals or carbon fiber. 

The problem is that when the gasses like air or oxygen slips between those layers it causes bubbles and oxidation. That slag material is making the discontinuity in the merchandise. And this is the reason why the gas must remove around the working area. The metal-based 3D printer is a modified MIG welding machine.  There is also possible to connect the laser system to that 3D printing system. The laser measures the dimensions of the parts. And the laser can also be used for finishing those parts. 




The developing technology allows for the creation of more qualified machines and machine parts. 3D printer technology can use to make car engines, like bocks and pistons, other machine parts, turbines, and even cannons for military use. The only thing that limits the system is the operating temperature. The high-temperature systems can make the system operate with stronger metals like steel, titanium, and chrome. 

The 3D printer technology is developed in NASA and other space agencies. That kind of system is more flexible than carrying some spare parts with them. The 3D printer systems can also use to fix holes in the body of spacecraft. So they are extremely powerful systems in space and other technical industries. 

The metal-based 3D printing technology allows making the gun parts and guns. The 3D printer systems are also used to make parts for high-stress points in super- and hypersonic aircraft. The 3D printer systems can combine with CAD programs. And they can turn to ultimate CAD/CAM (Computer-Aided Design/Computer-Aided Manufacturing). 



https://3dgence.com/3dnews/3d-printing-aircraft/


https://3dprintingindustry.com/news/integzas-latest-3d-printing-project-a-working-electric-jet-engine-205427/


https://www.3dsourced.com/guides/3d-printed-wind-turbine/


https://amfg.ai/2019/05/28/7-exciting-examples-of-3d-printing-in-the-automotive-industry/


https://www.designnews.com/stub/massive-3d-printer-could-build-engine-blocks


https://www.futurebridge.com/industry/perspectives-mobility/3d-printing-a-technology-that-can-print-cars-in-future-on-a-mass-scale/


https://www.modernpowersystems.com/features/feature3d-printing-helping-to-shape-the-future-of-gas-turbines-4204249/


https://press.siemens.com/global/en/pressrelease/first-3d-printed-gas-turbine-blades-siemens-awarded-american-society-mechanical


https://www.zhdlen.com/3d-printed-engine-block/


The next models not made of steel: 


https://wonderfulengineering.com/3d-printed-car-engines/

Tuesday, February 22, 2022

Are we living in a simulation?





A lighthouse is a good example of an isolated place. What if some person lives entirely life in that kind of place. And plays some computer games? Would those games turn to reality? 

Is reality an simulation? Before you will start to laugh we must determine the simulation. Many people believe that simulations are only things like computer programs. But there are also other types of simulations. The main types of simulations are: 


1) Computer-based virtual simulations like computer games. 

2) Physical simulations like military exercises.

3) Hybrid simulations where operators control robots at operational areas. 


The virtual or virtual reality-based simulations are the computer programs that are running on virtual reality. And things like computer games are one version of simulations. 

But the physical simulations also exist. Physical simulations are things like military exercises. The physical simulation means that person would go to some area. And then that person starts to make things like assault practices. Those are needed for some special things. Things like fire simulations for firemen training are also physical simulations. 

When we are thinking about virtual simulations those simulations can be independent. They might not have a connection with the real world. But there is the possibility that there is a hybrid simulation where the operator is controlling things like remote-control jet fighters or field-operating man-looking robots. So the operator would sit on the chair and control things that are happening in the field. That kind of simulation allows making real-life attacks against air defense stations. 


The Solar Warden is the theory of the modern Kaspar Hauser. That fully isolated person would live in a place where is no real contact with outsiders. 


The idea of living in simulation begins with Kaspar Hauser. That boy has grown in a cell where his only toy was the horse(1). You can read his story from Wikipedia. But by using modern technology is possible to make the "modern Kaspar Hauser". Have you ever thought about what happens if some person grows at the lone island or deep-sea base? 

When we are thinking about things like "Solar Warden". In conspiracy theories "Solar Warden" means imaginational space station that is orbiting the sun. We forget that "Solar Warden" might mean the lone island. The idea of that thing is stolen from the novel " The Little Prince". by Antoine de Saint-Exupéry. The "Little Prince" lives on his asteroid. The thing is that the "little Prince" is the symbol of the isolated person. 

So what if we would replace the word "asteroid" by using the word "island"? There is, of course, made a version about that tale where the "island" is the base like nuclear command bunker where the information is fully controlled? What if our Little Prince would live at the Cheyenne Mountain command center all his life? What kinds of things that person might think about the world. What if somebody claims that the world outside Cheyenne Mountain is destroyed in the nuclear war? Would somebody come out and check the things. 

There is one very interesting story about the Finnish lighthouse at Bengtskär. When the youth of the lighthouse guard came to school on the mainland that person didn't even know what were trees. The lighthouse is in a place where are no other islands. And there is the possibility that the person would not see trees before. If the person would not have any other contact with the outer world the people who share information might control everything that isolated person knows. 

And they might call the planet where they are Neptune. Or they can even create their religion for those people who have no other contact with the outer world than some selected person. The thing is that the people who might have no contact with other reality than information that the controller shares might believe that the world is destroyed in the nuclear war. 



(1)https://en.wikipedia.org/wiki/Kaspar_Hauser

Wednesday, February 2, 2022

Are bitcoins safe from attackers who use quantum computers?

The fact is this. There is quite a small number of quantum computers in the world. They are easy to control. And there is no free access to those computers. If the quantum computer is in some cave there is the possibility to double-check the code that s driven by using quantum computers. But if some intelligence service uses that quantum computer. There is the possibility. That it will use as a tool for network attacks. 

Trusted organizations are controlling those systems. And that means the internet is safe from private attackers who use quantum computers. But the problem is that some governments might have a will to attack other states' facilities by using quantum computers. 

Nobody protects people against governmental actors. If the hackers are operating under governmental protection. There is no way to get them to the court. 

The NSA is not the only network intelligence organization in the world. Chinese and Russians are also interesting in quantum computers. And those governments have their way to make hackers cooperate with their military and intelligence organizations. If some hacker would not cooperate those governments will make some trouble to that person who dares to deny their offer. 

In the worst cases, some family members will get in trouble. If the hacker says "no". And the offer goes like this. If the hacker will cooperate with authorities, some of that person's family members would not get a new workplace in carbon mining. 

And one area where quantum computers are the ultimate tools is cryptology. Quantum computers can use to break protective algorithms. The thing is that the benefits and power of quantum computers are well-known. That makes them very financed and very wanted tools.

As I wrote earlier, there are not many quantum computers in the world yet. But the situation can change quite soon. The R&D work around quantum computers continues. And the advantages in that area are impressive. The quantum computers would turn more common all the time. 

And sooner or later also medium and small-size companies can buy those systems. So in those companies may work people with some gang-contacts. And they can offer access to their systems for private hackers.

The biggest threat from the non-governmental sector is that some hackers will get access to quantum computers. And they can use the quantum systems for carking tools. When those quantum systems turn more common, there is the possibility that this kind of quantum system would get into the wrong hands. 


https://physicsworld.com/a/bitcoin-encryption-is-safe-from-quantum-computers-for-now/


https://thoughtsaboutsuperpositions.blogspot.com/

Friday, October 29, 2021

China's new quantum computer has a million times the power of Google's.


China's new quantum computer is the most powerful calculation unit in the world some researchers say. And that thing makes quantum computers very interesting. The Chinese quantum system is programmable and that makes it flexible. The thing in quantum computers is that they are turning more common. And they are the most powerful tools for driving artificial intelligence. 

The new quantum systems mean that the data security of the internet is dangered. And there is the possibility that the main part of the protection based on RSA cryptography will break soon. Or are already broken. The AI is a powerful tool. And even the researchers of that thing are not know all its capacities. 

The AI can observe areas if it is connected with a sensing neural network. That means the AI can search for things like common clothes. It can find out the favorite color of skirts of certain ethnic groups. But it can also search is there some common clothes like a certain type of slips. That people wear in demonstrations. 

And another thing that AI can use is to search genetic data. The genetic information is telling that is there some ethnic groups that are involving the demonstrations more often than some other groups. The AI can find out, what kind of person will win the beauty contests. It can search the typical details of the faces and other parts of the body of people who win those contests. 

The AI and genetics

Artificial intelligence can make many things that were impossible in the past possible. Artificial intelligence can control drone swarms. But it can also search the details of the DNA. So the quantum computer-driven AI can also operate as the assistant for searching similarities in the human DNA. And maybe that ability is making it possible to search the history of mankind in the point of way of genetics. 

The interesting thing might be who first ruled ancient people? And when the proto-society start to separate into different ethnic groups? That kind of thing can also find out by using AI which has powerful platforms. 


https://interestingengineering.com/chinas-new-quantum-computer-has-1-million-times-the-power-of-googles


https://thoughtsaboutsuperpositions.blogspot.com/

Tuesday, November 6, 2018

Inventing the electronic computer was not an easy process


Kimmo Huosionmaa

When we are thinking about one of the most important tools of science, the electronic computer, we must realize that inventing that machine was not easy. The first electronic computers or ENIAC-units were created for making nuclear weapons and code-breaking duties for Los Alamos National Laboratories. But before the computer was ready to operate, the creators of that tool must create the command language and the way to input those commands in for the electronic calculating unit.

Electronic computers are the ultimate tool for calculating long series of calculations, and that's why it can make very sharp calculations for parabolic forms. The ability to calculate long series makes computers a very effective tool for code-breakers. Also, computers can comp databases with extreme speed, and that makes it a very effective tool for controlling the passengers and access to places like movie theaters.

And from the ENIAC is a long journey to modern computers, and there were two things, what revolutionized this thing. The keyboard, what makes those systems or their input panel seems like the copywriter, allowed that the computer can be used by a single user. And the second one was TV, what allowed to use computers without paper.

Those things are the most interesting parts of computers, and the last thing, what opened the world of computing for every person in the world was the mouse. The tracking tool, what allowed to draw with the computer and later the graphical interface has also based the use of the mouse. When we are thinking about computers and the men, who are working with them, there are many times some problems to realize that those persons are extreme professionals. And the computing is not very dramatic science, there is nothing happening outside the screen of the computer. But when computer control robots, it can be extremely dangerous for every organism in this planet.

Tuesday, September 11, 2018

The motorway and its role in the Internet designing



Picture I

https://avoimenkoodinmaailma.blogspot.com/

Kimmo Huosionmaa

The motorway has been inspired the creators of the Internet. The International network is called the information superhighway, and the similarity with road and physical traffic is similar. The cars act like data packages and there are a crossroads and another kind of things in the physical world, what are in the different for on the Internet.  The international network is similar but different looking concept than the motorway, but the working principles are the same. When we are sending the data packages to the net, we would probably not know, that some packages have right of way right.


And they are allowed to go first in the net, and in those cases, the router would collect other packages in the memory, and store them until the right of way packages have passed that router. After that, they are allowed to continue their trip on the Internet. The Internet is more flexible than the motorway because it can fix its symmetry, and that would make possible to see the movies by using the net. The system would reserve more space in the cable in the side of incoming data traffic, and the sending side would not need to be so wide. In fact, one bit would be enough for uploading side during the movie.


If the person wants to use some other service during the movie, would the system release more width for that use. If somebody wants to upload photos or movies, would the bandwidth released more in that purpose, on the side of sending data. The idea is, that the system would tell the router before, that there would be coming more data than usual, and the router would adjust the width of the transmission. Also, the system tells the router, what homepage is on the top, and if the film is not interesting, can the system decrease the bandwidth, what is reserved for that movie.


If the motorways would be so flexible as the Internet is, the number of the lanes would be changed by need, and the traffic surveillance systems would tell the road information screens how many lanes can be used in another way traffic. The idea of this system bases the idea, that in many rush-hours the other side of the motorway is actually empty, and there could be taken extra lanes for traffic, but there is only one problem. The center barriers deny that thing. But if the markings would be clear, and the screens would tell the people, that the outer lanes are reserved for the people, who are going outside of the city area, could this system even work, and this would give the idea for flexible highways, and in somewhere they can already exist.

Picture I

https://www.highwaysindustry.com/wp-content/uploads/2017/04/Smart-Motorways-Safety.jpg

Sunday, August 5, 2018

Terminators and Skynet are here



Picture I
https://crisisofdemocracticstates.blogspot.com/

Kimmo Huosionmaa

Terminators and Skynet are not the fantasy anymore. Modern military technology allows making so horrifying weapons, that they would not believe as true. One of the most modern military systems is intelligent mines. what choose their targets. In those mines is the smart component, what is communicating with other systems, and in the real life that means, that own tanks and military personnel can drive or walk over those mines, and the smart component would read the RFID-sensors from their boots or vehicles. This means that own operators would not explode the mines, and that makes them very dangerous.


But when the enemy comes the piezo-electric components feel the pressure but they would not see the recognition sensor, and that allows to explore the mine. Same time the small computer, what is in the mines would send the information of the detonation to the command center, what will send drone or reconnaissance aircraft to check the situation. But when we are talking about the terminators and other military automation, we must realize that also the new human-shaped robots can be used in the combat area from the very long distance.


The satellite control allows that the command team can control the action of those robots from another side from the Earth. That high-class automation is allowing that those robots can operate very independently, and they can be supported by aircraft, what is modified to flying computer centers. Those next-generation command aircraft would be manned, but they can also be used by using remote-desktops and another kind of things, what the modern technology allows to use.


These systems can communicate with robots by using radios or Lasers, what is more, difficult to jam than radio waves.  The man-shaped robots can use the same systems as humans. So they can work on the same missions with humans. In this case, the man-shaped robots can fly aircraft, drive vehicles or operate as the infantryman. And if the aircraft would shoot down the robot can be re-program to operate as the infantry soldier, what would cause terrible situations in the back of enemy lines.


They can also break into the enemy command center and open the fire. This is what makes those units so dangerous. They cannot tell, who have given those orders because their memories could be cleaned. And of course, they can have internal bombs, what detonates them after the mission. This is the modern military technology, what is very effective against any enemy in the world. But this technology can also be misused in some dirty missions, but there is one very big difference between robots and humans. Robots can be destroyed by using computer viruses, and also electromagnetic weapons like ADS (Active Denial System)  would be very effective against computers and communication systems, what plays the vital role in the robot-operations.

Picture I

https://cdn.radiofrance.fr/s3/cruiser-production/2018/01/bf8fdfb6-dbae-4800-b383-5edddb6c9b63/738_010_a7a17150_485.jpg

Wednesday, July 18, 2018

Where would you put the artificial intelligence, what can threaten all the World, if that would be released?

Illustrial photo (RTG of ALSEP)
http://large.stanford.edu/courses/2012/ph241/kumar1/images/f2big.jpg
https://kirjabloggaus.blogspot.com/

Kimmo Huosionmaa

The supercomputers of tomorrow might be not bigger than the RTG of ALSEP, what is for the illustration purpose on the top of the test. People are afraid of the artificial intelligence, and that very understandable. We are all afraid of new things. And the artificial intelligence, that would be more intelligent than human is the very frightening thing.  But if this machine can create new things it would be the threat for many people, who have thought that nothing can threaten their position.


That is a very good question because many people would not even believe, that what kind of artificial intelligence could be the threat for the human race. The computer, what is imitating the human brains is very easy to produce in theory. There would be needed two microchips. Another is working as the Neuron, and another one plays the mirror neuron. That system could possible the spontaneous thinking process.


But there will be another one way to make the computer, what can think creatively.  Here we are thinking about the bio-processors. The supercomputers, what uses the living neurons for making the thoughts. The neuro-computers, what those bio-computers can be might be extremely small size, and the computer itself is actually the superconducting magnet, that would be installed around the cylinder, what is filled with the neurons.


That kind of computer can also give information on those cells by using magnet fields. The systems bases in the method, that the neurons, what take from bugs can be observed by using MEG ( Magnetoencephalography). That technology would allow communicating with those neurons by using magnet fields. And those cells must be feed by giving them sugars. If we would make that kind of computer, that system could be extremely dangerous. The most effective computer, that people can imagine, is the bio- or neurocomputer, that is connected to the quantum computer. That would give it the superior way to calculate and think without limits.


If it would connect to the Internet, the results could be devastating, if that system hacks some missile computers. The system, that is used could contain two tanks, where the neurons are. One tank is for the neuron, and another tank is for mirror neuron. That kind of machine would be used in the extreme long logic thinking. But the reason for that is very dangerous, the system must locate to the moon or somewhere where it could be controlled in a safe position. The results if that kind of computer would be making something unpredictable would be very dramatic. That is the reason, why the access to that kind of system must be limited. And if the computer would go unstable, that would cause the reason for eliminating that machine.

Tuesday, June 19, 2018

The thoughts about "WikiLeaks"



http://metsantarinoita.blogspot.com/p/the-thoughts-about-wikileaks-kimmo.html

Kimmo Huosionmaa

The thing what might seem nothing may have more meaning, what you ever imagine, and this is the very good way to think when we are going to make little information leak from the NSA. We might want to use some well-known homepage for that action, and why don't we choose the "Wikileaks for that thing, where we would release 2000 pages top secret material to those servers.  The question, what becomes important in this case, is who pays Assange's phone bill?


Of course, there seem to be many servers around the world, what would support that kind of actions, and the next thing, what might be interesting is, who pays the electric bill of those departments, where those servers would stay? Those questions are things, what is very important when we are making the data leaks to the Internet. Also, when seeing that Mr. Assange is traveling very much, we might want to know about who pays for those tickets?


In the real life there are many ways to screw up on the Internet, and one is to make data leaks without thinking those questions because in the worst cases, those servers can be actually "honeypots", what tracks the persons and their IP-addresses from the Internet, and there is one thing, what makes me believe that at least one part of this network is meant for use as the "honeypots", and it is, that none of those servers are isolated from the Internet. This kind of network, of course, should be attractive for the persons, who want to share secret or confidential information across the Internet.


And the technology, what is used in that kind of devices is very nasty. That server could sometimes track the deliverer of that information in seconds, but there is the very big possibility, that this server would deliver a different kind of information for the computers, what is used by leaking the data. Sometimes those "honeypots" would start to round the data, what is meant for the deliverer of the data thru them, and that allows making the illusion, that those data, what the deliverer have sent actually seen in there.


"Honeypots" are trap servers, what mission is to track the hackers, and some of them are copying the IP-address of those computers, but some of those servers can also track the place of the computer, and take the control of those devices cameras and audio-system. They can also connect the computer viruses to the material, what is delivered from that system, and that might collapse the computers, what is downloading the material, and those viruses can be connected to the PDF-documents. Some of them might open the back gate to the system, and the honeypot can now track all data, what is delivered to that computer. In this case, the tracking software would set every data package, what is delivered from that computer the tracking cookie, what would guide the data packages thru the tracking server.


Then somebody starts to leak the information to the Internet, would the "honeypot-server" just set the little cookie in that internet connection. This cookie would set the stable IP-virtual server in that system. And even if the user of the computer uses dynamic-IP, what means that the IP-address of the system changes every time when it would put on, would there still be stable IP in somewhere at the net, and when this computer would put in the net, would the data start to surround thru the "honeypot".  The meaning of this operation would be provocative other leakers to put their information to that server, what would help to track those persons.

Saturday, June 9, 2018

Have you been in this situation, where all choices would be wrong?



Picture I
http://kimmontaidearvioita.blogspot.com/p/have-you-been-in-this-situation-where.html

Kimmo Huosionmaa

Have you ever been in the situation, that your boss would give you the offer, that something, what has been done would be let be, and if you would be silent, you would keep your job? Probably that would seem like the wise choice, but your situation is very bad because your boss would probably kick you off anyway, and the secrecy contract would only protect that person.


The reason for making the bad contracts is that the boss or other offenders would offer something, what is not out of question in that situation. But how can we recognize the form, what makes bad contracts with the workers? The first alarm that the culture in the firm is very bad is that the interviewer asks, what are your family relationships. Those things have nothing to do with the working, and sometimes that question is actually for collecting the information, what can be guessed from the spouses.


That thing might seem very interesting, but sometimes those companies want to ask about the mental situation about those workers. And that information would be used to taking the property from that person. The information is actually the property and in sometimes the persons, who are fishing the information uses the mental disorders to get the passwords to that targeted person's personal files like diaries, and the excuse for that might be, that this person would write too much.


And there is the risk about suicide. When we are thinking about that kind of reasons and chances for getting the information about bank accounts and other confidential things, the information would be meant for the honeypot. The term means the information, what seems like very intelligent and qualified, but the files are pure grab.


When we are looking at the Internet, we might notice, that there are been many writings about Chinese hackers, who would be got the information about top secret files of the United States military forces. Those files could be also hoaxed, what has the purpose to uncover the officers or other personnel, who leaks those informative files to the net.


The same methodology would be used in the other organizations. There is always data, what can help to locate the leaker in the seconds. And some of those files consisted the data, what is also faked. If somebody steals the drawings of the warship from the server of the military forces, that would mean that those vessels are totally unsuitable in the military usage, or they can be dangerous for the users.


Some of the stolen papers would involve the viruses, and those data viruses can sometimes collect themselves together for very complicated software, what can steal information from the network, and in the real war situation that software can destroy entire network from the information when the user of that virus would send the activation code. The idea of that STEALTH-virus is the same as T-1000 from the "Terminator movie".


Those small bits of code can form very large and complicated software when they are connecting together. In this case, the program bits is the control code, what helps them to find the right place in the structure.  And in the wildest dreams that computer virus, what bases the artificial intelligence can take the control of the strategic nuclear missiles, and shoot them to own cities.

Picture I

https://news-cdn.softpedia.com/images/news2/Important-Scottish-Newspaper-Leaks-Private-Data-2.jpg

What was before the Big Bang (Part II)

 What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time....