Showing posts with label data. Show all posts
Showing posts with label data. Show all posts

Sunday, August 10, 2025

Can we trust AI?

    Can we trust AI? 



Artificial intelligence is a tool that doesn't create information from emptiness. That means the AI uses data and information that already exists. If something or somebody changes information from the data sources that the AI uses, the AI gives wrong answers. The AI can use old-fashioned information. In the same way, a human can take an old book of facts from the shelf. 

That is one thing that we must remember. The second thing is that most AI chatbots are owned by companies whose purpose is to bring profits for their owners. That causes a situation where some of the answers that the AI gives are customer-friendly. That means they are made to please customers, or people who pay for those chatbot services. 

However, one of the most important aspects of using AI is that it is actually utilized incorrectly. But the question is, why is it used? Because it makes work more effective. That means people who work with the AI assistants have no time to think and check the answers that the AI gives. The prime focus in AI use is that it makes people do more work. 

The modern business ecosystem has evolved over time, when all products were physical. That means the business ecosystem measures the effectiveness of the worker by simply calculating the number of work performances in a time unit. And that means the number of code lines that a programmer makes determines how effective that person is. And that means there is no time to analyze and think about the product that the AI makes. 


This is the problem with AI. It makes people more effective, and it should leave time to make analyses about the product. But the problem is that if the AI allows the person to work at double speed, that gives the company leaders the opportunity to fire half the workers. That decreases costs. 

When we talk about how AI makes things less effectively than a top-level programmer, we can find one very interesting question. If we analyze that argument closely, we face the claim that all programmers are top-level specialists. All programmers are top-level specialists. And another thing is that some workplaces are so hurried that they have no time to advise junior programmers. Sometimes old workers think that the young comrade is a competitor, and that makes the workplace atmosphere poisonous. 

The person might not dare to ask for advice from workmates. And that causes firing. The thing is that the AI is a tool that can help people. But we must remember that this tool allows us to analyze and think about new possibilities, only if we give it that chance. But we must have time and willingness to check the data that the AI gives. And if we see the AI only as a tool that allows us to cut the personnel costs, that is not the way to make our working life easier. 

If we just copy-paste texts that the AI makes. And don't even try to analyze that data, we don't increase trustworthiness in the company. That means we deliver the decisions to the AI. AI can also use old-fashioned datasets. Or it can use fake or falsified data. That means the AI makes mistakes in the same way as humans. It simply takes the wrong book from the shelf, and then that causes destruction or catastrophe. 

The AI is not immune to fake information. The problem with propaganda home pages is that their page rank are raised by drumming it with net queries. That makes those homepages easier to find. The problem with those pages is this: they use .com or some other neutral terminal identifiers. So, those homepages are not easy to connect to China or Russia. They are operated from servers that are in Western countries. The operators use a remote control to control those servers that operate in Western sockets. 

If the AI uses regular web browsing applications, that means it can select a propaganda page. The popular pages are always at the top of the page lists. And that thing means that the AI selects popular homepages. That decreases the AI's trustworthiness. The AI requires training. That training means that the users must set limits on what kind of sources those systems use. 

Thursday, August 7, 2025

Is the universe made of information?



Is the universe made of information?


Information exists only if we detect it.  But maybe we should call for information. That involves deliberate information as data. Deliberate information exists only if we detect it. 


The fact is that this thing depends on the way we think about information. We can think that all physical things are information. Or we can think. That information is an abstraction that makes something visible. Things like quantum technology are opening the vision about information as separated from material or physical particles. 

The physical particle can carry information. And then we can face things like electromagnetism as the information carriers. The electromagnetic field can carry information, or, in wave-particle duality, the electromagnetic field can transform or condense into a particle. 

Or a particle can turn into the electromagnetic field. That happens in annihilation. Information is independent of direct observation. We know that there are things like eagles, even if we don't see one of them ourselves. Another person can tell us that thing. So, in that case, the medium actor lets us know that there is something called an eagle. And if that person is inaccurate enough, we can even believe that there are eagles on Earth. Eagle is bird and they live somewhere, even if we don't see them. 

The question is, will the universe be a form of information? There is a lot of information about the universe. The thing is that the universe is like Schrödinger's cat. It forms of information and it doesn't form of information. The thing is this. We must determine the information before we can answer that question. If we want that information to mean something, that means the universe is not formed of information. But if information doesn't need to mean anything, that means information forms the universe. 

But if the information must make sense, the universe involves only meaningless oscillations and waves. So when we talk about things like black holes, we talk about information. That vanishes. Or, we talk about information that slides through the event horizon. In that case, the information means the particles and quantum fields that slide into the black hole. That means a black hole collects information, but we cannot reach it through the event horizon. 

The information is substantial, or substance. That means the existence of information depends on the information itself. The material is not a substance because its existence depends on the universe and quantum fields. Without those things, Materia turns into wave movement. But information doesn't need even the universe to exist. If some civilization can exist after the ultimate end of the universe, that civilization has knowledge of the universe. They have information about their past. And they can talk about the universe even if they didn't see it themselves. 

They can make clones of animals that lived in the universe. But for that work, those creatures require physical things. So, information itself cannot make anything. It can interact with the physical universe through sockets. Those sockets can be the DNA molecules that contain information. Those sockets or tensors that connect information with the physical world can be the bits in the computer's mass memory. 

But a computer cannot turn that information into a physical form. Without robots. Robots are tensors that allow computers to turn abstraction into reality. Materia can be destroyed. But information lives forever. Theoretical information can be reorganized into a new form. 

There must be some information stored in the system that the system can sort data into a new form. In human brains, memory cells are like the net eye. They can sort information from those cells into a new form with a very high accuracy. The reason for that is that there are so many small information dots that the brain can put into a new order. And the number of those memory dots determines how accurate that image is. The information can make sense. But that information must not have a match in the real world. 

Or, we just don't find that sense from the captured information. Or maybe we should call that thing signals. But are signals physical things? Maybe, maybe not. That means we capture radio signals from space that involve information about reactions in distant worlds. 

Is some other, intelligent civilization behind some of those radio signals? 

The answer is this: researchers have not detected any confirmed messages from another civilization. 

Or a shorter version is: nobody knows. There might be many messages that mean deliberate information. But researchers and AI don't detect those messages from natural radio signals. That means the search continues. And we are alone until we get an answer. We get an answer only if there is a message that comes from a confirmed alien source. Until that silence continues and the answer remains open. 

That is the problem with things like language science and especially the search for extraterrestrial intelligence, SETI. That means we might have billions of alien messages. But we cannot detect the information that those signals involve. 

Because. We don't know anything about the information systems that they have. So we cannot separate those messages from the cosmic background. That is one version of the theories why we don't have alien contact. That model goes like this. They cannot detect our messages, as we cannot detect their messages. And maybe we should be glad about that possibility. 

We call virtual information imagination. That information can seem very reasonable, like a human who walks on air. We know that thing is impossible, but in the virtual world in our brains, those things might seem very reasonable. Or at least we see those things while we sleep. 

In the human body, neurons connect information with physical things. Neurons use information to control muscles and other things. The information that we get exists only if we detect it. If we don't detect that information, it doesn't exist to us. 


https://thatsthenatureoftime.blogspot.com/

Saturday, October 22, 2022

Why is strong identification important in the world of the internet?



Strong identification is the term that means biometric recognition. In the network's world, everybody is at a distance of 15 seconds. That means we can make contact with people who are 5000 kilometers from us. But there is a possibility that this person lives next door to us. And that means we must be careful and think about what we are saying or writing on the net. 

But then we must realize that there are no harmless hackers. Even if, we think. That there is nothing to hide in our network. We forget one thing. Hackers can break into harmless networks to use that network as a platform to attack. 


The attack can be:


1) Attempt to steal vital information. 


2) Deliver propaganda and disinformation.


Both of those hostile actions can cause the internet will be closed. By connecting a cell phone to the Google account and using a cell phone-based login protocol the account's legal owner gets information if somebody tries to log in to that account without permission. The modern "watchdog" system tells if somebody tries to log in to the system without permission. 

The use of modern equipment makes those systems safer. And things like getting access to Facebook or some other social media accounts by removing the sim card from the cell phone is impossible. 

Hackers can use stolen social media accounts to send messages to the victim's children and ask if there is a paper in the parent's room where the password for some more important user accounts is. The message could be that "hi, I lost my just changed password, and that thing is in under my notebook would you send it to me". 

And then the kid sends that password. So we should teach our children that they should not give any passwords to anybody. Also, tell them that they should tell those kinds of attempts to their parents. 

That kind of attack by using social media to cheat other people to seek paper, where a user wrote a password and shares their data in SMS or social media message. Is a forgotten way to use social media in attacks. In that case, the attacker might borrow a sim card or telephone. That was left on the table after the workday. 

The user must always change the sim card's pin code. If the hacker has access to the office. There is the possibility that this attacker just asks for a new password for the boss' account by using those sim cards. Changing a sim card between telephones is not difficult. And if there is some kind of service for a certain telephone number, the hacker will use that thing for the attack. 

In every company are lists of clients' data. That data consists the contact information like telephone numbers that people like car mechanics can call when the car is ready. And there is the possibility that the hacker makes a social attack against the victim. In that case, the hacker might try to ask for the passwords for some governmental facilities. If their victim is working in those places. 

And how do hackers get that name? They might follow the list of lecturers in open lectures. There might read information like the ICT specialist of some data security company that is the military force's contractor or military forces itself. Then hackers will simply ask for the password. But another thing is that there are no safety data accounts. 

If hackers can break things like the recovery account of Google account, those persons might steal that user's identity. Hackers can steal passwords during lectures very easily. They can simply take a film of the hand movements of the victim. And then they can use slow motion to see where the fingers are on the keyboard. 

So how to act in those places? The best possible thing is to use a biometric login. That thing is impossible to break. And the second best method is to stay logged in. In that case, there is possible to download another browser where accounts' users are logging in to accounts. Then the person can make notes. And then uninstall that browser if that thing is unnecessary. 

In the same way, the person can open their account for lectures and other kinds of symposiums. If there is nothing important, that thing minimizes damages even if somebody steals passwords. Changing password often is not reasonable. Users must always write new passwords somewhere. And if that thing is some kind of paper, there is the possibility that the piece of paper will go to the wrong hands.

So when should a user change the password? When that person worked somewhere else than their own office by using a computer, that is not their property. They should change their password. But that thing is necessary only if the user uses a password. The keyloggers cannot break biometric sensors. And that means bimetric identification is the tool of the next generation. 


https://changeanditsmanagement.blogspot.com/2022/10/why-is-strong-identification-important.html


The product is the tool for making business and without a product is no business.

 

All companies must have a product that they sell. Without product is no business. For businesses, the product is the tool that should bring money to the company. Without a product is no incoming money. The reason for that is that the product is the thing that brings customers. And customers are people who are giving money to the company to get products that the company will offer. 

When a person becomes an entrepreneur that person must realize that money that customers are bringing to the company is not a gift. Customers want those products. And if the product doesn't please them, they will choose some other deliverer for those things. 

Somebody says that products are unequal. Because companies want that people buy new products in the next year. That thing is an urban legend. But the fact is that the product is the base for business. And without product is no business. When everybody buys some product that thing brings it to every pocket. And finally, there is no sale anymore. And if the company is not selling products, that thing causes bankruptcy. 

So, if the company doesn't make new products, that thing causes problems. When some company offers computer games or mobile games, they must realize billions of users might load that game. But then everybody has that game, and why do they want to pay the same license again and again? Those users don't want to gift their money to the company. They want the product for their money. That's why the company must develop new products. 

So it's easier to make an unequal product that is easy to refine, and people are willing to buy the better product next year. If we think about cell phones it's easy to make a phone with a 60 Gb flash memory store. And then the next year company can make the same cell phone with a 120 Gb flash memory store. That thing saves the company from the costs of development. This thing is one of the most interesting things in products.

We must realize that technology turns more advanced. And advanced technology brings new abilities and advances in products. The new products are more tested and more secure than old fashion products. The fast-advancing ICT sector is a good example of an area where is no perfect product. And even the most-perfect products turn old-fashion very fast. 

But what if companies are making only perfect products? At this point, I must say that there is no perfect product. And sooner or later, even the best products turn old. When we think about the oldest mobile telephones the entire telephone turns old-fashion. 

The products are made a little bit worse than they could be. And that thing guarantees that people buy it next year. Maybe that thing is somehow right. But the product must give a response to the new type of threats, and it must follow standards. The information technology world is a race between hackers and defenders. 

When password protection became standard, the hackers turned to use social hacking like cheating the workers. They asked the passwords and misuse the data systems. So biometric recognition removed that problem. Maybe tomorrow we must use the password only once. That "once" is when we started to use internet accounts. 

And then, we will continue to use biometric recognition. The web camera can follow the user, and if the user changes during the use and continues to use the same account the system can tell supervisors that some wrong person uses someone else's account. 

Old-fashion mobile telephones are the risk. In old Android telephones, thieves must only remove SIM cards. If they want to get access to social media applications. If the phone itself is password protected, that gives better security. But there is the possibility that a misuser blackmails or cheats the password. So the next step is biometric recognition. The fingerprint makes it impossible to misuse the system. Or the misuser must be a registered user. 

This kind of system is telling if some other person will try to use the account without permission. The information of the attempt to log in to the system will be seen on the mobile telephone if the user uses a two-stage login. 

When people are not using old technology enough the network operators will remove the support from those phones. And the reason for that is the costs of the networks. When the operator maintains the network that thing causes costs. 

If there are no users, the costs will raise too high. Maintaining old-fashion systems costs money. And that money is away from some other projects. 

The reason why the networks developed all the time is that modern systems are bringing security. The new type of environment requires secured networks. And that thing must notice in the business and governments. When the Internet developed people trusted that governments are removing things like disinformation and other things from the net. 

But Putin's trolls, along with Chinese hackers, are shown that some governments are not trusted. When we are talking about "trust" trust is the thing that is always earned. Trust is not the thing that is just the world. 

When some of Putin's trolls are delivering disinformation or Chinese hackers will crack the systems people must realize that those actors are working for their governments. They ever are punished. This is why we must concern about the misuse of the internet. The new products must be safer, and we must prepare things like somebody misses a mobile telephone. 


https://networkedinternet.blogspot.com/


Friday, February 18, 2022

The target of marketing is always the masses, not individual persons.



In the point of marketing, we would not even want to use personal internet data. The marketing requires the mass-data or data where is listed products, what typical person or lead is using and what they don't use. 

That means the system requires information about masses, not individuals. The individual data turns the databases more complicated than they are without personnel id. Removing the personal data would there be removed on the table from the database. 

And that thing makes them fit to "kiss(ap)" (Keep It So Simple (as Possible))-model. If we think that one character means nothing in databases that might be true. At least, in the cases where we should handle about 100 lines of data. But when we are collecting data for marketing solutions we need data from thousands or even millions of people. 

And that means if there is some personal information, that makes thousands or millions of lines in databases. That means we might want to use some other type of data for aiming for that kind of marketing. We might want to use some tool to collect data from people. So we might want to know what kind of stuff a person like a typical heavy metal listener buys. 

When we profile some persons for marketing we can send those people queries. But the problem is how to make people answer those queries? And, of course, people should be honest while they are filling those queries. The problem is how to motivate people to fill those things? When we are collecting information for the marketing. we should know what kind of person is the typical user of the service. 

In the political world, the politician should know, who is the typical voter? What kind of things do those people value? And Brexit is made by using this method. The Cambridge analytics created the forms where was asked things that typical EU-resistant thinks important. And that thing made possible that Brexit was successful: multiple politicians promised many things. But they had only one common theme. Britain must get out of the EU. 

There are also made scenarios that Russian intelligence. Would make similar operation for breaking NATO. That means the values of the people. Who is criticizing or is against NATO would be mapped. And that thing would channel voted to politicians who are against NATO. In that system, the political campaigns of the politicians would be different. But there is one certain theme, and that is NATO-critics. In that kind of operation, the denial would turn into a synonym for the criticism.

In that case, we are interested in a typical heavy-metal listener, not individual persons. But how we can collect data about the typical people who listen to some kinds of music? We might put the link to the sale card that is shown in some music videos. There might be certain numbers, and by giving those numbers in some net storage the person can buy something small.  

Or they can use that code as a sale card. The data where that sale is used would be stored in databases. The system can collect data about things that those persons buy, what things are their favorite colors, and other kinds of things. The thing is that this thing is called user profiling. The profile of typical users is helping to aim commercials for the homepages. 


https://www.analyticsinsight.net/what-is-psychographics-how-can-you-gather-psychographic-data/


https://gamesandtehories.blogspot.com/

Wednesday, February 16, 2022

A metaverse is an excellent tool.



Metaverse is the entirety of virtual worlds that are linked together on the internet. That thing means the world. Where people are interacting together as "avatars". Avatars are virtual creatures that would not have any match with the person that they represent. So the person who uses an avatar can take any creature like a dragon or Darth Vader that the person wants. The interacting virtual spaces can be interconnected together. Some of them might be offices. 

And some of them might be some kind of games or lectures. Each of those virtual worlds is like a room, there might be a different theme. And the metaverse is one of the most interesting things on the internet. When we talk about virtual spaces. That connected as the metaverse. We are talking about spaces that might have a connection with reality. 

Or they might be pure imagination. The user of the virtual reality-based metaverse can search things from the films that the rovers send from Mars. Or they can be at the space that is made by using the imagination. Those virtual worlds can involve modified reality like tables on Mars. And those kinds of things can use for research. Or just for fun like game platforms. 

The thing is metaverse is the interactive workspace. It can use by using VR sets. But any kind of screen is enough for communicating with computers by using metaverse. And the next-generation tool can be a GSM-mobile device that uses the VR set. Or it can be BCI (Brain-Computer Interface) that allows a person to connect with the virtual space anywhere where is a data connection. 

The metaverse can use for making many things. It can be used for just fun. But otherwise, users can control things like robots that are sending their data for the controller by using metaverse. When researchers are making a metaverse where they are making the 3D images of things like some land areas they can use multiple satellite systems for making that thing. 

The radar satellites can make the 3D computer topography and the satellites that are using optical systems like cameras can connect images to the radar map. The low- and medium-altitude aircraft can connect more high-resolution images for this map. The robots that are dropped from airplanes can be interconnected with those maps or top. That kind of system can use for research jungles that no man ever visited before. But the 3D metaverses can use for making routes for cruise missiles. 

The metaverse can also interconnect the data that is got from aerial vehicles like manned or unmanned aircraft, naval units, recon satellites, and ground units to one entirety. That makes metaverse an excellent tool for controlling military operations. That allows the high commander to connect the command system with helmet cameras of field operators. And the sensors of aircraft and naval units are also transmitting information to high-command. 

This system allows connecting intelligence like SIGINT, photo recon, and combat troops to one entirety. And when some soldier shoots with a rifle the field commander gets information about that thing. And the system can calculate how many bullets are left. The supply system can automatically send resupply when they are needed. 


https://thoughtsaboutsuperpositions.blogspot.com/

Wednesday, February 2, 2022

When we are collecting information, the focus is on the reason. Why do we make that thing?




Nice-looking data mean nothing in projects. Only honest feedback is a useful tool. For making an organization addictive. Negative feedback is the thing that gives the most useful information. That thing involves data that should make better or other ways. If the homepages of the organization are poor the people should say that. That thing is the signal for making them better. 

And if nobody tells that the homepages are bad. That information would not reach the organizations' directors. So if the leaders of the organization would not know. If there is something wrong, they would not make anything. The reason for that is that leaders need information for making decisions 

But negative feedback is hardest to receive. So the person who collects information should realize that the purpose of the information collection is to bring the right information. Information that is shaped to please the receiver is useless. Only useful information. Is not censored and honestly given. 

When we collect information for some project, we must think a couple of things about the data collection tools. The key element is in the type of information that is collected. There are two ways to handle collected information. And only one is the right thing. The one way to collect and handle data is to select the data that supports us. Selection of the data that pleases us might be a very nice thing to us. 

We get what we want is the thing that might seem very nice. When we want to make some project for the customer we might also give real and honest information. That information might not support the opinions and images that those clients might have. But the fact is that the project makers would not have anything to use with the data that is only what they want. So then we might think about the method how to select the data. Forms and other things are very good tools. 

But how to motivate people to fill out those forms? And to make sure that those people would give the right information. The thing that the organization needs are the right information. And the most useful information for making things better is the negative feedback. 

Honestly saying, that thing is the hardest to read. But the negative feedback is the thing that makes it possible to make the organization better. So we don't do anything about the forms that are filled in 10 seconds. Or we don't do anything about the forms, where is only the series of words "nice-looking thing". 

If we want to improve the additivity of the organization we can make the seminar. Or open some kind of discussion forum. And in that case, we must ask one question. That is "are those people typical users or members of the organization and its services"? 

The problem is that. The people who will participate in the seminars are the most active members or users of the organization. And if there are about 1000 users of the organization and 20 persons are participating we might ask are those people typical users of the organizational services of that precise organization? 

That honest and noncensored data is needed for making marketing applications for the organization. The key element in marketing applications is how to make people choose that organization and the services of that specific organization. So the key question is what that organization can offer that others cannot? 

And what is the benefit of the certain organization to the persons who are selecting services or solutions that they use? The collected data is needed to make the organization more addictive than others. But if that data is faked or it's not right. There is no help from it. Negative feedback is the hardest thing to see. But it's the most useful thing to show what must be improved. 


https://networkedinternet.blogspot.com/

Monday, December 13, 2021

The disinformation about things like the coronavirus spreads in the net.

 

 The disinformation about things like the coronavirus spreads in the net.



The question of why people believe disinformation is that disinformation is pleasing them. Another reason is that people are looking for social relations with people who are similar to them. And the information that is shared on social media is coming from people who we want to please. And those people please us.

So we are not saying that person shares information that is not relevant because we were afraid to lose somebody that might seem important to us. If our friends are sharing the disinformation. We might not dare to resist the hoax information.

Or say that information is not correct or the shared information might be dangerous. The reason for that is we are afraid to hurt somebody in our social network. If some people who we use to think like an authority or who is the central person in our social network are sharing disinformation, we might want to obey that person. That means we might follow that person even if we know that is wrong. 


1) Misinformation means "not correct" or false information. That is not shared in purpose. 


2) Disinformation means the information that is shared in purpose. That purpose might hurt or damage the trust of the authorities. 

Another name for that kind of campaign is propaganda. The military term for that kind of action is PSY-OP or Psychological Operation. 


The most important targets for disinformation are people who are in influential positions. And one of the groups where the disinformation is targeted is journalists. If journalists are affected the information that is shared will turn more powerful. People trust the media and if somebody cheats the reporter that will turn information more powerful. 

The normal way to resist vaccines is to criticize them. Critical attitude means of course the denial attitude. A critical attitude means that person is investigating the background. But in the disinformation campaign, the criticism means that person is against some things like vaccines. In the same way, critical attitude against the refugees and foreigners is turned to denial attitude in the public language. 

So how do we recognize is something disinformation? One version of that thing is that only negative things are collected in the article. I use the term "article" also for texts. Those are written on social media.  

We might analyze who is the person or actor, who is benefits the case that somebody doesn't take vaccines? The person who benefits from the action is often behind that thing.  The thing is that some vaccines are denying also the use of biological weapons. But that thing might not the reason why somebody is resisting the vaccines. 

If the person is vaccinated there is also impossible to die because of some illnesses. That means the vaccines are protecting people, but they also deny lies like being home in flu when a person has a hangover. 

One of the things that can use as the mark for disinformation is that the article or disinformation is driven by using humor or there are some other things like mentions of mental illness of the writer. Things like schizophrenia have not connected with the things like Game theory. 

But for some reason, the creator of the Game theory John Nash is always mentioned as being schizophrenic. 

When I read books about Game Theory there is one remarkable detail. In those texts is mentioned that Nash has that syndrome. So what the schizophrenia has to do with a thing called the Game Theory? Are those people estimating the Game Theory? Or are they estimating the mental condition of John Nash? That is a very interesting detail about writings of the Game Theory. 

Or the article is written in the spirit that something like a denial of vaccines is somehow "cool". Those texts are also appealed to the vanity of people. "Why I must take vaccines"? 

Other people are taking them, but why should I"? I have the right to say "no", and who cares about the hospital places that are reserved for me"? The corona-passes show that the person is taken the vaccines. But the deliverer of the disinformation appeals to selfishness and vanity. 

If we believe those people we should think like this: other people should sit inside. And all things must be closed because somebody doesn't want to take vaccines. 


https://en.wikipedia.org/wiki/Game_theory


https://en.wikipedia.org/wiki/John_Forbes_Nash_Jr.


https://networkedinternet.blogspot.com/

Sunday, November 14, 2021

Vaccines teach the immune system to fight against viruses.



Older people have more chances to fight against viruses than young people because they have more versatile antibodies in their bodies. 

The immune system stores antigens and genetic material of viruses and bacteria. In chemical memory. That chemical memory allows the immune reaction to react faster and more effectively to infections. When the immune cells are winning the battles against viruses and bacteria. 

They store the genetic information of the successful actions in the genetic memory of the immune system. That genetic information would help the immune system fight against similar viruses in the case that it faces it again. In that genetic databank is stored the knowledge of the antigen of virus and which antibody was the most effective. 

When the immune system fights against viruses. It follows the level of the micro-organisms in the blood and tissues. When cells are destroying they are sending chemical marks of that to blood. And following that mark, the immune system will notice that the destruction of cells is slowing. 

Also, cells are sending chemical marks that they are working right. That mark tells the immune system that the cell is alright. That is one reason why cells have ion pumps.  If something disturbs that mark it means that a virus or some other thing disturbs the actions of those cells. And if that mark is getting low the immune cells will destroy those cells. 

The immune defense of the human body is learning. When the person gets a virus infection the immune system will start to fight against it. During that process, the immune cells are storing the data of the virus type or its antigens. And the most effective antibodies in the genetic memory.

That means the immune defense of the human is unique because we all get little bit different infections. Things like vaccines are also modifying the immune systems. So all of us have individual genetic information stored in the memory of the immune system. So when the person is aging. That means the immune system can find faster the antigens that it need to destroy. 

There is more data stored in the genetic memory that controls the immune system. When a person is aging in a normal environment that thing will increase the level of the stored genetic material. And that allows the immune system can react faster to infections. That is the idea of vaccination. The immune system will learn to fight against viruses and bacteria by storing the genetic material and data of the antigens in its memories. 


https://www.nature.com/articles/s41577-020-0339-9


https://scitechdaily.com/covid-19-the-older-you-are-the-more-antibodies-you-have-better-protection-against-delta-variant/


Image:https://www.nature.com/articles/s41577-020-0339-9

Tuesday, November 2, 2021

Making inquiries is one kind of skill.



For making inquiries we need data. And the target group for inquiries. Registers which involves data of things. Like customers who have the guarantee left. The thing is what data the database is involving is the same. 

The database of the source group is involving the limit. If the forms of the inquiries are sent to a too-large group of people nobody has time to sort and handle the data. AI can be a powerful tool for that thing. The system can filter the forms away.

If the form has been open for too short a time that makes it suspicious. When we are thinking about the form that has been open for about 15 seconds and which involves 20 questions, we might ask how good and useful data that from gives? When we want to make inquiries, we must understand that only valid and qualified data is the thing that brings useful information. 


This kind of database can use in many things. And one of them is when the guarantee ends. Those persons would get an offer to expand their support. 


But in the cases like some associations, the membership registers can use for testing. How satisfied the association has been to its members. The thing is that the best way to ask that thing is to make inquiries. But the thing is that if the association wants new members. The interesting thing is why some new member is involved in the association. 

And then if the maker of the inquiry wants the forms can send to the young and old members. And the thing that gives an effect to those inquiries is that what if the forms can target the oldest and youngest members. That kind of thing makes it possible to analyze how the motive to join the association has changed. 

The thing that the maker of inquiry needs is age. If we want to investigate the attitudes of certain age people. But the parameter can be how long people have been a member of the association? The different thing is how many people will answer those inquiries. 

How to get valid and useful data from forms is another thing. In the real world, people would not even read those questions. They might look that there is a draw for people who are giving their time. And there is one 50 euros gift card and 50 candy boxes for people who are spending their time on the forms. 

A major question is how to motivate people to give their time for feeding the forms? The other thing is that many people are answering inquiries. But they are not even read those questions. And does that thing produce useful information? The data on how long the form has been open by each individual. Might speak harsh language about the interest of people to spend their time in that kind of poll. 

The form might be open for about 20 seconds. And that causes a question about how well the answerers are reading those questions ar? And how useful is the data that form brings is for people who are making those surveys?

The thing that can make things like making inquiries easier to handle is the AI-based system. The idea of this kind of intelligent phonebook is that there is a form where the user inputs data like age limits of the target groups. And another necessary thing. 

Then that system can pick the needed data from the database and then send the E-mail to the target group. The AI can boost the use of the database. And if that database is connected to other applications this thing makes it an effective tool. 

In the place of the members of the association can be the customer register.  The system can sort data by using certain parameters. And one of them is the customers who are conveying about services or products. The thing that would be interesting to know is are those people used that product or service? 

The thing is that the serial number of the product is important, but also things like did the customer use some special offer or advantage that comes from some targeted campaigns. If there are problems with the product, which is offered in some targeted marketing campaigns. 

That thing causes interesting questions. And one of them is: does the group that uses those advantages have some kind of thing that provokes other people to give bad service?  If a certain group of people always conveys there should be discussing what causes that thing. 


Monday, October 25, 2021

There are lots of data stored in superconducting material in the universe.

 


Scientists have long time predicted that there is a connection between the physical universe and information. All material in the universe can turn to energy and backward. So energy is wave movement. And wave movement is information. 

When we are thinking about information like wave movement and especially radio waves there is lots of data stored in superconducting material all around the universe. The problem is how to make that information come out from material? 

But if that thing is someday possible to make. That thing would bring new data about the beginning of the universe and even aliens. The thing is that the metal bites are storing data if they are superconducting. And that data can download to the computers. The process is similar to the qubit and the system must know precisely the frequencies and power of the radio transmission. 

The data is downloaded to the radio by using an antenna or the object will stress from the opposite side by using radio waves. And in that case, the radio signal is used as a carrier. The receiver will observe the changes in the carrier wave. And that thing will make it possible to return the data that is stored in the particles. Of course, the process is not so easy as I described. 

Sources

https://scitechdaily.com/physicist-quantifies-amount-of-information-in-entire-visible-universe/


The black hole laser can have quantum computer and communication applications.



How it works: diagram showing how a soliton (top) plays the role of a mirrored laser cavity (bottom). (Courtesy: Haruna Katayama/Hiroshima University)(https://physicsworld.com/a/black-hole-laser-could-have-quantum-computing-applications/)


The X- or gamma-rays can use for non-radio communication through walls. 

In some visions, robots of tomorrow would communicate by using X-ray systems. The robots are using cathode rays and X-ray cameras for communicating through walls. The X- or gamma-ray-based communication system can make it possible to make a communication system that is impossible to track. 

That kind of theoretical communication system is always immune against the radiosonde.  In the future robots can use X-ray systems for communicating in areas where is lots of radio turbulence. And if some systems like eavesdropping equipment are using X-ray LED for communication that makes them impossible to detect. And the same systems can use to make the X- or gamma-ray images of the targets. So those systems will be multipurpose tools. 


Hawking radiation could be an interesting tool for communication. 


The principle of the black hole laser is simple. The laser ray will target to soliton which increases the power of the wave movement. And when the power of the wave movement is high enough that thing should transmit Hawking radiation to outside the soliton. Term soliton means the wave packet that strengths itself. Hawking radiation is one of the most interesting things that can use to transmit data. 

Only black holes are creating this type of radiation. And that means the Hawking radiation can use to data transporter. There is the possibility to make a laser system that can transmit data by using Hawking radiation. If there is some kind of sensor that can receive Hawking radiation. 

And transfer it to the electric signal that things can use to communicate through walls by using some other electromagnetic radiation than radio waves. The Hawking radiation along with Gamma- and X-ray frequencies could open new routes to communication technology. Those frequencies of radiation offer a new way to communicate through walls. 


https://physicsworld.com/a/black-hole-laser-could-have-quantum-computing-applications/


https://en.wikipedia.org/wiki/Soliton


Image:https://physicsworld.com/a/black-hole-laser-could-have-quantum-computing-applications/


https://webelieveinabrightfuture.blogspot.com/


Saturday, October 23, 2021

The AI and computer games




Computer games are offering a good platform for simulating many types of situations where  AI can involve. The game platform might contain man-controlled characters. And AI-controlled characters. 

In those cases, the system and programmers are testing the interaction between physical players and artificial intelligence. The conditions in the game area are not always similar to nature. The communication between physical players and AI is always problematic.

And the reason for that is that AI cannot flex. In the hierarchical system, those kinds of things are causing problems. The reason for that is if the AI must take commands from all human players. That thing makes those characters vulnerable. 

The games which have limited 2D gaming areas like chess are the cases where the AI is always winning humans. The reason for that is that AI ever loses focus. The rules in chess are strict. And they are easy to program for AI. Chess is a solo game where two players are playing against each other. 

But in the games where the key element is teamwork, the AI has problems. It must not react to all words that are said during communication. Otherwise, the AI must react to orders but it must separate orders from the other discussions. The 3D teamwork-based action games can use as the platforms for creating algorithms that make it possible that the robot is working as part of the team.

In the cases that artificial intelligence is operating against a human player, there are no problems. But when artificial intelligence is operating as a part of a team there is a problem. When people are communicating with each other there is always communication. That doesn't mean that the communication includes commands. 

But games are far away from real-life situations where robots and humans are acting together. In games, there is no extra noise. There is no real stress. And all things that players are saying are said clear. In real life dangers like military, high-risk law enforcement, or rescue missions. The speech of people can be unclear. 

And the things like noise and electronic countermeasures can cause problems with communication. Electronic countermeasures are the thing that makes remote control unable to operate at the war zone. So for avoiding the electronic countermeasures. The robots must operate independently. 

The microphones can use to give commands to robots. Giving voice commands is not more difficult than giving commands to humans. The system will transmit speech to the "speech to text" application. Then that text is transmitted to the computer. In this version of the command system, the keyboard is replaced by the "speech to text" application.

The problem with this kind of system is that the keyboard is more accurate than some "speech to text" applications. The computer systems require precisely given commands. And if the person uses dialect or has some other problems with vocabulary the system has difficulties understanding the commands. 

In visions, the commands for robots are given by using the coded radios. This technology makes the operations safer. But that requires clear commands. In this writing, the focus is on independent operating robots. So the operators must give commands to robots similar way as they command other humans. 

Theoretically, those kinds of systems are already in use. But in real life, people are not talking like they should. So people are not compatible with computer systems.  

And the other thing is that independently operating artificial intelligence requires complicated programming code. The simplest solution is to outsource the data handling process to central computers. 

And the robot can interact with supercomputers over the internet. But in the war zone, electronic countermeasures can cut that communication channel. So the independently operating robot requires the internal supercomputer for driving complicated code. Making a compact-size man-looking robot that has internal powerful data processing unit is complicated. And today those systems are at least partially at the theoretical level. 

That is the reason why there are projects. Which goal is to make miniaturized microcircuits and atomic-sized quantum computers. Those atomic quantum computers are the atomic clouds where atoms are acting as qubits. And miniaturized electronics are the ports that are making ports between binary and quantum systems. 

The quantum system is making the brains of the robot. And the binary system is moving its joints. In those systems, every joint in the skeleton of the robot has its independent microchip. Maybe someday those systems are real and their size is small enough that they can install in the man-size robot. But those times are far ahead in the future. 


https://aboutspaceandtech.blogspot.com/

Wednesday, October 13, 2021

Maybe spies are storing data for decrypt by using quantum computers in the future.

Image I


In the NewScientist is an article about topics that spies are storing data for decrypting by using quantum computers in the future. That thing is not science fiction. There is the possibility that the agent stores the captured data in a USB stick. And then in the future that data can be driven to a quantum system. The capacity of quantum computers is limited and there is data in a row waiting for its turn to download in the quantum systems. But the idea for capture and storing data for the analysis in the future is not very difficult to make in practice. 

Nothing is stable in the world of computing. Things that are feeling safe today might be dangered quite soon. Spies and hackers can capture data to electronic storage. And then they can compute that data by using quantum computers when they can get access to the quantum computers. 

When computing quantum systems are turning more common. That means the data that is well encrypted today can turn into a risk for security in the future. The quantum computer can easily break any code that is made by using the primary computer. 

Hostile operators can open those documents that are encrypted by using primary systems quite fast. By using quantum systems. Those are becoming more common in the future. This means that we should seriously think about our data security and prepare for the next generation computing revolution which turns all our systems old-fashion. And old-fashion systems are always a great risk for security at all levels.  

Maybe the new and powerful data handling tools with artificial-intelligence-based image recognition algorithm. That can link with the data centers that are calculating trajectories. And make material analysis can help to solve the historical mysteries. The systems can calculate trajectories of bullets by using the captured images. And the automatized rendering of the images brings new details from the old photographs. 


********************************************************************

This famous V-2 was shot by the British or under the surveillance of British authorities during "Project Backfire". Just after WWII in 1945. And the question is, how many of these kinds of details will uncover by the internet?





The original image description about this image goes "

V2 missile at X + 2 seconds after launch during British tests for Project Backfire in Cuxhaven, Germany in 1945". (https://v2rockethistory.com/how-rockets-fly/) 


The interesting detail about this famous image of the V-2 rocket is that the rocket itself was launched by British troops during "Project Backfire" in Germany in 1945. That means this rocket was launch under British control. And probably the idea of the "Operation Backfire" was that the German rocket staff introduced British personnel about the use and support of that weapon. 


(https://v2rockethistory.com/how-rockets-fly/)


*************************************************************


The system can search and connect data from many different sources. And that thing can bring new data about the well-known press photos. The ability to collect data from different sources and connect it to its entirety makes the research of history more effective than it ever was. The system can also wash the noise from old tapes and bring new information from the cases that are forgotten or ever mentioned before. 

The same method can use in intelligence work. Intelligence is the same way data handling with every other research. And if artificial intelligence can use as the collection of data, that thing makes many well-known facts more interesting. The ability to handle data with more powerful computers brings details that have never been seen before in the front of great publicity.


https://www.newscientist.com/article/2293341-spies-may-be-storing-data-to-decrypt-with-a-future-quantum-computer/


Image I:https://www.arnnet.com.au/article/584951/dell-networking-enterprise-solutions-partners-ip-infusion/


https://aboutspaceandtech.blogspot.com/

Tuesday, October 5, 2021

The quantum computer can be more than the sum of its parts.



The thing that people normally do not mention. Is that the data that travels through the computer is not depending on the computer itself. Physical computers or hardware are always separated from the "mental" (code-based) or non-material data. 

So the power of quantum computers is a similar thing with regular or binary computers. The hardware and the programs are separated things but they must also operate as a united thing. The thing is why the data is separated from the hardware. The code-based data can multiply as many time as the user want. 

Is that the user can download the same data to many physical machines. So for the result of the data handling the equipment of the data handler is meanless. But the type of the data handling equipment has meant in the time that the operation takes. The quantum system is making the same things that binary computers are doing. But the speed of quantum computers is much, much higher. 

The cooperation between software, operating system, and hardware determine the power of the quantum computer. As well as it determines the power of the regular computer. If the input channel of the data is slow that makes the system slow. The system is entirety but all its parts can be separated into pieces. 

The thing is that the things how the operating system and the production program are working together. How they are handling memory and the speed of the data input in determining the speed of the machine. Until the quantum computers are getting their operating system and keyboard or some other input tool. The data will be driven to the quantum system and back by using binary computers. That means the speed of the binary computer is the bottleneck for the quantum system. 


When the data is used for some productive work it is handled. And handling data means that data cannot take its original form spontaneously.


When the data is traveling through Turing machine. Its form is changing.  While Turing machine handles data it would change it. So when the data is traveling through Turing machine. It will not take its original form again because computing is chacing the entirety of the data. Turing machine doesn't create information from emptiness. 

It collects it from multiple sources and processing the data flow means that Turing machine is putting the pieces of the information together to one entirety. The data can return to its original form. If the data segments are marked as the code what would help to track the source of each data segment. But spontaneously the data that traveled through Turing  machine is not returning its original form. 

 


https://scitechdaily.com/experiments-show-quantum-computers-can-be-better-than-the-sum-of-their-parts/


https://scitechdaily.com/quantum-leap-challenge-uc-berkeley-to-lead-25-million-quantum-computing-center/


Image:()https://scitechdaily.com/quantum-leap-challenge-uc-berkeley-to-lead-25-million-quantum-computing-center/


https://en.wikipedia.org/wiki/Turing_machine


Image:()https://scitechdaily.com/quantum-leap-challenge-uc-berkeley-to-lead-25-million-quantum-computing-center/

https://kimmoswritings.blogspot.com/

Wednesday, November 7, 2018

40 silent minutes, what changed the world.


Picture I
https://gamesandtehories.blogspot.com/

Kimmo Huosionmaa

When K-computer simulated human brains were the ordinary day. For that simulation has the group of scientists used many years, and there was nothing dramatic for that process. There were no flames outside of the laboratory and computer center. And during that simulation, nothing dramatic happened. But those seconds might be changed the world by the more influential way than any moon-flight ever changed. The system was the best in business, and it was located in Japan. The mission was to simulate the functions of the brains. The research team was composed of German and Japanese scientists, and it worked by using K-computer, what has 84 944 core processors for that simulation.

It took 40 minutes to simulate the one second of the human brain activity, and the scientists had got the world fastest supercomputer in use when this happened in 2013. The supercomputer was so-called K-computer and that was the fastest and the most powerful computer in that time. This was one of the worlds most remarkable seconds in history, and that was one of the most advanced steps in the research and investigation of the neuroscience. That thing has not seemed very dramatic, and nothing seemed to happen outside of those calculation units,  but there were spent millions of hours of work, millions of calculations have done, and millions of minutes were spent by taking the MEG pictures and collecting other data from the human nervous system.

The spending 40 minutes for one-second simulation doesn't maybe seem a very effective way to use computer time but in the future, that kind of simulation would make possible to create thinking machine". The computer what can learn things, and process the information, what it gets, and make conclusions, what is called thoughts by using that information. But there is far to the human brain capacity. Human brains have the capacity to think abstract things and this ability separates us from other species.

This is the problem with artificial intelligence. We know that feelings have a role in our thinking process, and if we would give feelings and ability to think abstract things to some computer, that thing can transform the thing that wants the power. Feelings and ability to think abstractive gives computers greed for power, and that might cause the situation, what is like from the "Terminator"-movies. The rebellion of the machines is one of the worst nightmares of artificial intelligence.

Sources

https://io9.gizmodo.com/this-computer-took-40-minutes-to-simulate-one-second-of-1043288954

https://en.wikipedia.org/wiki/K_computer

Picture I

https://static.electronicsweekly.com/news/wp-content/uploads/sites/16/2015/07/K-computer2.jpg

Friday, August 10, 2018

Strange things about WikiLeaks

https://kirjabloggaus.blogspot.com/

Kimmo Huosionmaa

WikiLeaks has brought to the people know the things, what the government would want to hide, but there is one big mystery in this website: why it is not banned by DDOS-attacks? When the governments and private security corporations Emails were delivered to WikiLeaks, it was targeted the short period DDOS-attack, and in some claiming, some of the files were removed or changed during the attack, and in those files were some very interesting knowledge of the cooperation between governmental and private security corporations, what are actually intelligence agencies.


Somebody has even claimed, that the  CIA has been behind the WikiLeaks and the reason, why almost all the files, what are published in those sites are American origin, but the thing is made for confessing the audience, that the USA would be the primary target for those uncovered secrets. This means that the purpose of publishing those papers is meant for countenancing the persons, who want to steal the papers from the Pentagon or NSA send them to WikiLeaks, where counterintelligence has very easy to find those documents, and then I must say that those files can be used to track the information thief.


This means that in every single file may have the unique code, what is unseen for normal computers. But if the person has the right program, would the number of the handler be seen on the screen. And that number allows tracking the person, who has been downloaded that file, and also foreign partners have their own numbers, that the NSA can track the persons, who deliver the secret material to the Internet. That's why those papers must no be delivered to the Internet.


Those PDF-files seems like the normal, but the NSA:s main computer makes there the covered digital signature in those files. That's why everybody must know, that there are many secrets, what is very interesting, but those papers are meant for confidential. And in the real world, we must ask, is it better to track people by using electronic equipment, or is it more comfortable to make a very large police force, what comes to the people's home for searching the missing persons. This is one argument for supporting the surveillance of the people. But sometimes is clearly seen, that the terrorist attacks are supporting the growing security business.


Those corporations collect very much data, and that can be used for many things. If the information, that is collecting by using Trapwire, would contain business secrets, and somebody would sell those secrets,  some corporations will get very much benefits in their work. And this is one of the most concerning things in the world. If some private intelligence would sell those pictures and data, that would give the very good position for that corporation, that buys those pictures and data from the security corporations.


If some corporations would get too close cooperation with the government, that company would allow accessing the data, what is only reserved for governmental purposes. This means that the surveillance cameras can also collect data from the screens, and in those cases, there would be no sign of the security leak. So those servers data security, what operates surveillance cameras must be extremely highly secured. If the information would leak from secured areas, the benefits, what some company would get are extremely high.

Saturday, February 24, 2018

What is the difference between bio- and genetic manipulation?


(Picture 1)

Kimmo Huosionmaa

There are some differences of bio- and genetic manipulation. Biomanipulation actually means to make artificial cell-lines, and actually, there would be no touch for genomes. One version of biomanipulation is to make artificial retina and surgically implant that retina in the eye, and the retina can be made by cell base, what is filled only with cone cells. Also, two type of vegetables can be connected mechanically, and those combinations make the saplings, what are from an upper vegetable.


Biomanipulation is effective, but it takes time. The modification of the organisms will not transfer to next generations. And mass production of those organisms is very difficult. Genetic manipulation is the more effective way to compile species and give them new features. The needed thing is an artificial virus, what has wanted genome, and that little DNA-bite would be transferred to the nucleus of the cell. The problem is that those manipulated organisms are that those features would transfer to next generations of that organism.


One of the possibility of genetic manipulation for improving some species like a human is to connect genomes to the cells, what makes possible to create chlorophyll in the cells of mammals, and in some visions, those manipulated humans may have roots or threads in the skin, what can take food and water from the air. Those threads might also have harpoon cells, what protects this creature. When we are thinking about the combination of the human and other species, we might face the situation, where we are creating an alien, the species with superpowers. That creature might have a similar nervous system like bugs. It can use only electricity, what means that neurons could connect together and close the synopses.


That would make the brains more effective. Also, those manipulated organisms blood might be poisonous. And the chlorophylls in the skin makes possible to produce sugars in the creatures own body. This might be the route of controlled evolution, and maybe tomorrow we can order the features, what we will have in our next life. In this futuristic scenario the human would record their life by using WLAN-implants, and of course, the body will be cloned. This might make the person live forever. The cloning of the creature will happen by changing the DNA inside the nucleus of just when fertilized ovum. And that would allow making modifications even to human body and mind.

Sources:

Picture 1

https://www.biology-questions-and-answers.com/images/Genetic-Engineering.jpg

https://crisisofdemocracticstates.blogspot.fi/


http://crisisofdemocracticstates.blogspot.fi/p/what-is-difference-between-bio-and.html

Thursday, February 15, 2018

How the Internet-observations officer chooses the individual, who is put under surveillance?


(Picture 1)


Kimmo Huosionmaa

Many people are thinking, that it is safe to avoid the hotel's WiFi networks because the operators can catch the data from the WiFi, but they are entirely wrong in this case. The reason why those persons are wrong is that if they don't use the free Internet, there might be something to hide with those people because they don't use that WLAN even with big laptops, and this makes the observers curious. They are looking for people, who use sophisticated and robust network security when that will compile in the things what they do on the Internet.


The situation, when the safety makes person suspected data criminal is like using the enterprise-level security solutions in-home network, and of course, if those solutions are expensive, could that cause that the interest of put this person under surveillance will grow extremely high. Those surveillance operators will not use only one method to break the privacy of the targeted person, and those operators use normally also telescopes, binoculars and small remote control helicopters in their missions. But the massive number of data will go thru the Internet Sockets all the time.


But somebody will know, that exception to the normal behavior will be noticed by the surveillance team. If some person normally uses credit-cards for paying, but suddenly will that same person starts to use cash, will that cause the reaction in the surveillance screens. And the reason for the change of behavior must be found. Another way to make the surveillance team very interested in avoiding some services.


One of the misunderstandings is just avoiding the franchise hotels, what belong to some ring. In the small independent hotels have the smaller number of information in those databases and the operators must just check the data.  If there were many more users, the data storage will be so large, that the systematical check of that information would be very long action. But in the big and small systems is small differences. Then somebody wants to keep the name as the secret, will this person choose small size system, where the "surface data" flow only in the hands of the small group.


But in the small system, the deep scanning of data will be possible and give more effective information for surveillance operators who work in this kind of system. In big systems, many operators will see "surface data" of the users, but deeper analyze of information will be difficult because there is the larger number of bytes and there are many same-ranked officers who are watching the system. In small system might have only one high-school trained operator or maybe that service is produced by some other actor. This allows those men to work alone without afraid that somebody even sees what is going on.

Picture 1

http://www.sifytechnologies.com/wp-content/uploads/2017/03/datacenterhosting_managedservice_taxialways_fod.jpg

https://crisisofdemocracticstates.blogspot.fi/


http://crisisofdemocracticstates.blogspot.fi/p/how-internet-observations-officer.html

What was before the Big Bang (Part II)

 What was before the Big Bang. (Part II) "Our universe could be the mirror image of an antimatter universe extending backwards in time....