Skip to main content

Posts

Computer researchers published a new algorithm that revolutionizes web management.

The new database structures require new and powerful tools to manage databases in non-centralized solutions. The new data structures can be in large areas, and parts of them might be in different computers. This kind of network requires very good management. And fast reactions. In modern computing infrastructure networks play a vital role. When the system collects data from multiple sources, it should observe that data. That left from the source is the same in destiny.  In old times TCP/IP-protocol there system sent checksum or every data packet back to sender to compile that it's not changed is powerful. But when things like AI should collect data even from millions of sources, and then the system creates a new entirety. In that process, the TCP/IP is a too-slow protocol that can handle millions of bits that come from multiple sources. At the same time.  "A logo for SIEVE, created by Yazhuo Zhang, portrays hotter objects in shades of red and colder ones in shades of blue. Zha
Recent posts

Railguns: the next generation of weapons.

 Railguns: the next generation of weapons.  Japan made its first railgun test at sea.  Things like drone swarms require new types of AA systems. Those systems must shoot down high-flying multiple targets with low-cost ammunition. Railguns are weapons that shoot projectiles in the speed of Mach 3 or higher speeds. The famous GAU-8 "Avenger" cannon's ammunition hits the target with a speed of Mach 1,5. And that weapon destroys any tank.  The improved laser-based anti-missile systems can also destroy missiles that attack the ships. And also modern tanks have active defense systems that can destroy the incoming rocket projectiles. The railgun ammunition is small and it's hard to destroy.  The railgun gives warships and other military vehicles the ability to shoot air-ground and sea targets with the same weapon. The rate of fire of the railgun can be very high. Chinese navy tested a hypersonic railgun with a very high rate of fire. These kinds of weapons are tools that can

Killer drones are effective tools.

 Killer drones are effective tools.  The drone can operate two ways on the battlefield.  1) The drone can point targets to other machines like artillery and aircraft. In that case, the drone sends its location to fire control. Then it measures the distance and direction of the target. That data allows the operators to aim weapons at the precise right point.  2) The drone itself can destroy targets. There are two models of that kind of drone.  A) Kamikaze drones. Those drones are miniature-size cruise missiles. Some of them can patrol the battlefield. They can send data from their nose camera to command centers. And when their fuel is ended, those drones can dive against their targets.  B) Weaponized killer drones. Those drones are equipped with weapons. And that makes them like miniaturized combat helicopters or combat aircraft. When people talk about autonomous killing, the question is about the point where operators give fire commands. The operator can give a fire command just after

Cognitive attacks against the VR and automatized computing systems are a real threat.

     Cognitive attacks against the VR and automatized computing systems are a real threat.  Above: Ukranian drone operator uses VR glasses. Those systems are potential targets for cyber-attacks that can deliver propaganda or be used in other psychological or cognitive operations.  The cognitive systems learn from their mistakes. And that thing makes cognitive systems more lethal than any other system. In this version of an essay that handles cognitive attacks, the perspective is on cyber attacks like AI-driven neural networks. Those neural networks operate as independent attackers.  AI must not rest or keep breaks. That means it can attack against other systems 24/7. The attacker can give orders to an AI-based system. Then go to work. When the day is over, return to home or the hacking place. The hacker probably uses an attacking system by using a remote control. That denies the possibility of closing the hacker's internet by tracking the attacking computer. That can hidden in some

The new technology can replace the GPS.

   The new technology can replace the GPS.  The new quantum photonic chips that act based on Weak Value Amplification (WVA) technology can replace GPS. The problem with the GPS is that it sometimes loses its contact with satellites in tunnels and cases where it's jammed.  If a drone operates over open ground-area. It can use DSMAC (Digital Scene-Matching Area Correlation). In that case, there is a satellite or aerial image of the route that the drone should follow on its computer. Then the system compiles those images with images, that the CCD camera takes.  And if images match the drone is on the right route. In some cases the DSMAC uses Lidar but the problem is that especially in war zone things like houses can be destroyed and the land area might be turned different than it just were because of the use of fire. In cases where a drone must go to caves, it must use some other navigation tools than just GPS. The systems that replace the GPS must also be in cases where drones resear

The threat of nuclear terrorism.

 The threat of nuclear terrorism.  The hackers attacked Israel by using the Red Alert warning application as a platform. They claimed that Israel was under nuclear threat. Nuclear terrorism is one of the most frightening things. The problem is that nuclear technology falls in the hands of those who don't care or don't have the skills to protect those platforms.  We should concerned about nuclear terrorism and the escalation of nuclear weapons because of Burkina Faso and Russian atomic cooperation. Also, Iranian military aid to Russia in the Ukrainian war causes the question of whether Iran wants nuclear weapon technology as a counter-gift.  Those hackers created the fake message that Israel was under a nuclear terrorist threat. Those kinds of messages are serious things. Even if they are meant for trolls.  But does the threat of nuclear terror rise? When we think about the situations where Russians sell nuclear power plants to Burkina Faso, that can mean that people like Hamas

When robots are laughing and crying.

When robots are laughing and crying.  Does the AI have feelings?  Does the AI have feelings? Or can it be emphatic? The fact is this program code that controls the AI determines if it can give empathic reactions. The problem with the human nervous system is that we don't make a difference in the writing of empathic letters or telling empathic stories human or AI. Our nervous system is not adapted to AI yet. And that's why we cannot separate text written by AI from text that made by humans.  What does somebody make with AI that can emulate feelings? The fact is that the cyborgs are useful tools for infiltration operations. The human-size robots can have WLAN/6G connections with the central computers. Or they can form a neural network that shares information between all group members. The robots can also act as walking neural network-based supercomputers. That can make complicated solutions.  In those networks, each member shares information and their data-handling capacity all o