Skip to main content

Kafka and data handling processes. (Grey persons in grey offices)




The offices are always grey. Everybody who is working there is grey, and their mission is to control the data. 

When we are staring at the film "Kafkaesque" above this text, we might realize that data handling is similar to bureaucracy. God is the thing that controls the data process and creates the protocol for handling data. For the system, the superuser who has the right for exterminating the system is the god. If we are thinking of the computer as the Kafkas's bureau. 

We are facing the problem of row-type computing. If the event handler is the man who is walking in the rows the event handler must always deliver its data. Without depending does the data contain enough information or not. When the event handler is taken the data, there is no way to stop the operation until the process ends. 

Order is the key element in computing. If there is chaos in the system, there is no way to make anything. The answer to the chaos problem is simple. Somewhere in the system sits the master controller. The superuser is using the "master's voice". And voices that "everybody halt" and orders the data handlers to read their data at the same time. Or the order can be given in the form, that the data handlers are reading the things that the data handling form requires. 

That means everybody should check do they have all the necessary papers with them. And if every single paper contains a serial number helps it to give new papers if some of those files are missing. And if somebody delivers the data from that bureau, the controller knows what paper is delivered to the street. And because all data handlers are handling the individual data type that helps to track the person who delivered unauthorized data. 

If the system uses two lines there is easy to see the differences in data. In the two-line data handling process every data handler has a pair. And if data that those handlers are carrying contains differences there is an error. The two-line data handling works that when the router brings data in the system, it also doubles the data. 

That makes it possible to see if there are some errors by benefiting from the differences in the data structures. In that system, everything is doubled including the rowing rooms. In that room, the data is delivered to the desk, and then the superuser compiles the papers or data tables and finds out are they identical. If they are identical there are no errors in the data lines. The data is traveling in rows and each paper is combined in the same entirety, which is like film. 

If the data travel in a row, where are many curves the other data handlers can check is the data that the data handler carries right and does it have the right form. But that requests that every data handler has the same data, and in that case, the system can check the traveling data. The check can be made that every single data handler is yelling at the same time. What kind of data should be in their papers. 

Or the persons can send the number of the papers that are delivered back to begin. And that thing is called checksum. The checksum tells is there some papers dropped to the floor. And if every paper is numbered the people can know immediately what paper is missing. So if something is missing the data handler can ask for the missing paper from the colleague who stands at the door. And that means that there is no need for remaking the entire paper stack. Only the missing papers are needed to make. 

If all data handlers are talking at different times, the result is chaos, where nobody can check the data. The man who is keeping himself hunger is the data handler, which is not used. The useless data is removed and the mark of that data turns weaker and weaker all the time when data stands useless. The data security might seem very well done if there are many doors between observer and data. But if the doors are not locked they are useless. 

We can think that the data that is traveling in the system is like black and white bugs. The system is like the giant labyrinth that must know which way it should route those data bites. At every corner in that labyrinth is the router. Or the person who knows where to guide each bite of data. When data is traveling in a mixed form that thing seems like a mess or chaos. But when the routers are sorting that thing turns data into an understandable form. 

Comments

Popular posts from this blog

Schrödinger's cat: and the limits of that idea.

"In quantum mechanics, Schrödinger's cat is a thought experiment concerning quantum superposition". (Wikipedia, Schrödinger's cat). But the same thing can use as model for many other thought experiments.  Sooner or later, or at least in the ultimate end of the universe, the Schrödinger's cat will turn into wave movement. The information that this cat involved exists but the cat does not exist in its material form. The information doesn't ever vanish. It just turns its shape.  We are all trapped in the universe and time. The universe is the space that is entirety to us. There are no confirmed other universities. But the multiverse is a logical continuum for the expanding galactic megastructures.  The problem with natural things is this. They are black and white. They exist or do not exist. Could there be something, that exists and not exists at the same time?  Scrödinger's cat is thinking experiment about case their cat is not dead or not alive. But in this...

The string theory offers a new way to calculate Pi.

"Scientists discovered a new series for pi through string theory research, echoing a 15th-century formula by Madhava. By combining Euler-Beta Functions and Feynman Diagrams, they modeled particle interactions efficiently. Credit: SciTechDaily.com" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Leap in Mathematics) People normally think that. The pi is the ratio of the circumference circle's circumference to the circle's diameter. The Pi is a mathematical constant 3.14159..., the endless decimal number. The Pi is interesting because developers can use that decimal number to make the encryption algorithms stronger.  The idea is that the encryptions program hides the message's original ASCII numbers by multiplicating those numbers with some decimal number. Or the system can add some numbers to those ASCII numbers.  "Aninda Sinha (left) and Arnab Saha (right). Credit: Manu Y" (ScitechDaily, String Theory Unravels New Pi Formula: A Quantum Le...

There are always more than three actors in the real world.

"An international research team is advancing precision timekeeping by developing a nuclear clock using thorium isotopes and innovative laser methods, potentially transforming our understanding of physical constants and dark matter. (Artist’s concept.) Credit: SciTechDaily.com" (ScitechDaily, Unveiling the Thorium Nuclear Clock and Its Time-Twisting Secrets) From Three-body problem... There are no pure three-body systems in nature. There are always more than three components in the system. For making real three-body systems we must separate those three bodies from the environment. Otherwise, there are stable effects. But nobody can predict some effects like distant supernova explosions or sun eruptions.  And one of those things that affect all bodies is time. When radioactive materials decay. That affects the stability and symmetry of the object.  Energy levels affect the existence of things like neutrons. The thorium atom clocks are next-generation tools for time measurement....