Thursday, September 30, 2021

Prepare for quantum revolution.





The quantum computer can make real processor-based multi-tasking possible. So it can at least theoretically drive regular computer programs. Quantum computers can drive the code in the lines. Which means that the code has more layer than in row moving code. 

The system shares the row of the code to the layers. But there is always a limited number of layers or states in the qubit. So the data flow is also driven in rows. The system is introduced in image II. 




(Image II)

Every square is the data segment. And the arrow shows the direction of the data flow. 

And this ability makes it more powerful than any binary system ever can be. The quantum computers can also have virtual workspaces for regular computer programs. The system can drive the program code also in rows.  

In the qubit, the data goes in layers or states. The qubit can drive regular computer programs by using one state for each program. And the quantum system can drive multiple binary code-based programs at the same time. So the quantum computers can make also the real- processor-based multi-tasking possible. And that thing makes it possible to create new and more powerful servers than ever before. 

The race of the leadership in quantum computing is going on. The thing that we must understand about the quantum systems is that the age of the room-temperature operating. And (or) commercial quantum computers are coming. The standard optical cable can operate as the quantum data transporter. The idea is that one of the fibers is acting as 0,1 layers. And other is free to transmit data. 

The system requires that. Each of the glass fibers in the optical data cable is connected to its communication laser. And nanotechnology is making it possible to make that kind of system possible. The data transmitting in the quantum model makes the system safer and fixes the problem of transmitting data between quantum computers. But the bottleneck is the use of quantum computers. The straight use of the quantum system requires operating systems and solutions that are making it possible to use the qubits for some productive work. 

The thing is that we must be sure that our environment and infrastructure are fully capable of revolutionary enlarged data masses that are resulted from large-scale quantum computing. Quantum computing makes many things easier and safer than regular binary computers. But the shadow side is that the supporting infrastructure must also prepare for the quantum systems. 

If we are thinking that the advance of quantum computers is similar to other computers. We must realize that the more powerful systems cause the software developers are starting to make more and more complicated program code. The thing is that the next-generation artificial intelligence can simply generate custom software without human assistance. The user of the AI just says that "I need a CAD program". 

And then the AI just collects that program from the internet. If there is no ready software for download the system just collects the custom software from pieces that it can download from the net. The thing is that even without the room-temperature operating quantum computers the quantum computing will turn more common. The internet allows using of quantum systems remotely over the internet. And that thing can cause risks for the data security. 

The thing is that quantum computers are the most powerful systems. The speed of those machines is so high that they can break any code that is made by using regular computers.



()https://www.fastcompany.com/90680174/ibm-ceo-quantum-computing-will-take-off-like-a-rocket-ship-this-decade


()https://www.newscientist.com/article/mg25133541-600-will-the-us-or-china-win-the-race-for-global-quantum-dominance/

Advanced programming can give CPR for binary computers.



Russian scientists have used the supercomputer for calculating limits for Google's new quantum computer. The thing is that also quantum computers have their limits. There is the possibility to make the same things with binary computers. That is made by using quantum computers. But quantum computers can make the same things faster. 

The AI-based memory washes along with the intelligent use of microelectronics. The memory wash means that the memory of the computer is will release.  And the program code is removed from the memory. Whenever the code has traveled around the computer make the use of memory more effective. 

Other things like the ability to ask assistance from the other microprocessors of the system give also regular computers that use primary system architecture more power and extend their lifecycle. In that kind of system, the auxiliary processors of the system like processors of the graphics card can share their capacity with the CPU when they have no other things to do. That thing is called distributed computing. And it can use over the internet. 

But the binary systems can ever be so powerful as quantum systems. That means the quantum computer would be at the top of the calculation units of tomorrow. Even if they would need massive radiation protection. The thing is that the artificial intelligence-based calculation tools are making supercomputers good machines. And the quantum computers are used across the internet by the binary computer-based remote interface.

The thing is that even if the quantum computer itself is impossible to hack the supporting systems like regular internet and primary computer-based work stations and data input are things that cause vulnerabilities for the quantum systems. The remote control that bases the old-fashion models are the things that are suitable for hackers. So the hackers would not attack the quantum system itself. 

They are trying to hack the binary computers that are used as remote working stations. Those remote working stations operate the interface of the quantum computer. For denying the vulnerability of the quantum system the entire system architecture should turn to the quantum base. 

When we are saying that the quantum system can break every single code on the Earth we might be sure. But the protection level of the binary internet can increase by using intelligent routers. Those routers are routing the data to the different data lines. 

And that makes it the attacking system difficult to get the data entirety from the internet. This kind of system is the CPR that can give a couple of more years for binary system-based supercomputers. But the binary systems remain in portable and personal-use computers. 


()https://scitechdaily.com/russian-scientists-use-supercomputer-to-probe-limits-of-googles-quantum-processor/amp/

()https://kimmoswritings.blogspot.com/

Active stealth suits, quantum stealth, and protective fields can be the next tools for the military.






The poor-man active stealth. 

In the beginning, I will write about one of the simplest ways to make the active stealth cloak that bases the flexible screen. The idea is that the image on the screen will turn a user of this chameleon system take by using a quadcopter. The quadcopter would take the image of a certain point of the ground. And then it will mark that point. 

Then the user of the cloak must just take that place. And the image will transmit to that screen. And that should make the person that can be a sniper less easy to detect. That thing is the poor-man version of the active stealth suits where are cameras all around it. 

And which purpose is to make the user of the system transparent. The use of a quadcopter can be useful in the cases that the person uses only the stealth canvas which is the flexible screen and moves quite a little. And then we can go to the quantum stealth systems and protective fields. 

Quantum stealth can base the idea. That the photons just stop in the air. The idea is taken from photon collisions. The same thing can make the protective field possible.

The photon collisions are creating new ideas to make the stealth technology. The thing that is required for making the object invisible. Is just to deny the radiation echo from its layer. 

So can the series of electrons that have high-speed spin create the electromagnetic radiation that has the same energy load as the incoming photons? If the object is surrounded by using the wave movement that would pull the photons in it that would be the big step for stealth. But also that thing is the big thing for the research of protective fields. 

There have been made tests or theoretical research for an electromagnetic and acoustic system. Which mission is to crush incoming ammunition before it hit the target.  The idea is that the counter weapon destroys ammunition before it can cause damages. Or the ammunition would turn to another direction. 

One of the most promising things to use against missiles is to use laser weapons and optical pointers against incoming missiles. The infrared camera detects the missile and then the 2-10 kilowatt carbon dioxide laser will detonate the incoming missile. 

That thing should make the object invisible because photons cannot reach the surface of the target. If the system can crush the incoming photons. That thing can make it possible to make even the large-size objects invisible to the observer. The problem is that the system must turn every photon separately. The photon collision can also use to turn the DEW:s (Directed Energy Weapons) away from the target. 

The idea is that incoming laser or microwave rays will stop before they cause damages by using counter-radiation. The counter radiation stops laser light in the air. And that thing could use to make the protective field against the craft. Another thing that is planned is to use the microwave field which would vaporize incoming ammunition or detonate the grenades too early. 

()https://kimmoswritings.blogspot.com/


The intelligent entirety needs new solutions. But those solutions have not only bright sides.



In the beginning, I must say that the negative things of AI are a highlight too much. The same thing was seen on the internet. The internet and AI are the biggest opportunities for people. Things like the use of land area and how society handles its garbage is the important thing. But in this case, the object is in the AI and synchronizes the society to the harmonic entirety that is effective and less pollutive. 

The city is the entirety that connects people, traffic, and things like houses and governmental, communal, and private organizations together. The thing that dominates synchronization of this kind of entirety is the information and the ability to handle the information collected from different sources. And that means the infrastructure must support the information system. And the information system must also support the physical entirety for being useful because only useful things get financial and political support for turning real. 

The biggest opportunities are things that can make society an easier and better place to live. The same robots that can make surgical operations remotely can act as remote control soldiers. Robots are multipurpose tools. 


They can give the greatest opportunities for people if they are serving good. They are bringing hope. And they are same time a threat.


 But the same things can be seen in the other technological advantages. The old fashion technology produces carbon dioxide that causes climate change. About the development of the entirety of society is needed new winds. And new ways to think. Those things are needed just now. 

The AI-driven entirety and the effective solutions are in a key role in the society of the future. But when we are making things. We must remember that the same systems are made for making the environment safe. Can use as a tool against us. No technology has only positive effects. And that is the thing that we must realize when we are developing new things. 

The bright future requires new solutions and new ways to think. Climate changes are giving new challenges to the global environment. One of the answers for saving energy is to use intelligent solutions like non-stop adjusting ventilation systems in the building. Also, things like intelligent traffic control will minimize emissions are one of the things that can slow down climate change. 

The idea is that when people are leaving their homes the temperature would drop. And at least in the long period, the energy use in the department is dropping. Artificial intelligence can do almost everything if it has the right tools for controlling its entirety. But the question is where artificial intelligence will get its electricity. Complicated systems require complicated code. 

And only the most powerful computers can run the code that connects the large-scale environment for the dynamic and environmental-friendly entirety. Only quantum computers can make dynamic entireties where are trillions of variables. The idea of this dynamic entirety or AI-driven city is that the data is collected from multiple sources. And then the system would make its adjustments. Technology is one thing that could help in the social problems. 

The thing that makes people like Elon Musk introduce to turn boring and poorly valued works to the robots is also caused criticism. What would those people do, if their work is transferred to robots? Things like clean-up and other things. Are made by migrant workers. And that thing has sometimes caused opinions that those poorly paid works are kept as an example or warning what happens if the person would not educate themselves or make crimes. 

The problem with robot workers is not technology. The problem is in the attitudes. And the fact is that people who are working in clean up and other kinds of sectors are not living by their salaries. The problem with artificial intelligence is that it brings new threats to society. The hackers can reprogram the intelligent car that it would use only one brake. And that thing causes dangerous situations. 

Or they can increase the temperature in the buildings by breaking in the control system. Also, things like killer drones are maybe already in the hands of criminals. The simple killer drone is the quadcopter there is a pistol and launching mechanism. The ultimate tool is also the ultimate threat. The quadcopters are multipurpose tools. 


They can find out thermal leaks in the buildings. And the same systems can search for missing persons at the same time. 


They can wait on the roofs for orders search for lost children. The quadcopter can send its image to the image-recognition system. They can observe things like are the city areas clean or is somewhere fire. But they can also be used for horrible purposes. And this is the thing that we should realize. The same technology that is made for protecting us can use against us. 


In the AI-driven society, the key element is a safe data network. The internet is in a key role in making the entire work in harmony and effective entirety. If we are trying to move our society to AI-driven we should make the quantum network. The reason for that is that the modern internet is not safe enough. 

The hackers are not striking the quantum computers or quantum systems. They are striking the connection between the quantum computer and the regular network. So the target of the hackers is the binary computer that drives data to the quantum system. Climate change requires new solutions that interconnect multiple taskers to environmental and social entirety. 

When people are developing thing AI they must realize it. That in those systems is same time positive and negative effects. The same systems can serve civil and military authorities. If the system knows where people are and what they will do next. That thing is a bad thing for privacy. But what if you would get the information when the nearest shop is rush hour? Would you rather do something else than stand in rows? Or maybe some people want to spend their time in rows. But some other people want to do something else at that time. 

The effectiveness of the AI depends on the accuracy of the data that it can get. If the person would tell the AI the plans before going to the supermarket or shopping center, the AI can plan the route of that person. But AI requires the information that the person is willing to buy. And also, things like budgets are needed to get if the AI wanted to be effective. 


()https://kimmoswritings.blogspot.com/

Wednesday, September 29, 2021

The purpose of the malicious software can turn the computer into a "zombie" that can use as the medium for the hacker operation.



Modern malicious software does not always destroy data. The malicious code can allow hackers to highjack the computers And use them to medium in their operations. Using the highjacked  "zombie machine" as the transmitter the hacker is harder to track. The operation can contain the delivering the trolls and other things in the network. And at the final stage, the hacker would detonate the logic bomb inside the targeted computer. The logic bomb means the computer code that destroys the data in the system that it cannot use to trace the hackers. 

A couple of words about malicious software and what is the best place to get an infection? The malicious software is the boogeyman of the internet. People are warned about the pornographic pages that can load malware like a computer virus to the computer. Many people think that computer viruses are just destroying the files in the hard drive. But the thing is not so simple as we might think. 

The Troyan horse is a computer virus that plays some kind of utility program. The hackers can use the computers of regular internet users for net attacking banks or companies. The remote computer can use for making illegal things on the internet. Things like port scanning and other things can cause problems for the person who owns the highjacked computer. 

The hackers can try to change the bank account numbers in their targeted homepages or transfer the network traffic to phishing pages. And in that fake homepage, the user would cheat to give the data like the password to the email and other services. The banks are not using paper card-based confirmation numbers anymore. And that thing is making the phishing attack by using fake homepages less effective than before. 

But things like cryptocurrency firms are also suitable targets for hackers. They might try to channel the currency that flows in the bank accounts of the cryptocurrency companies to their bank accounts. Or try to steal the algorithm that is used to make those cryptocurrencies. And then make their own faked crypto money. 

The malicious software is the code that is connected to the thing that looks like useful software. And one of those things that can contain malicious program code is things like Adobe updates from some strange address. The homepage tells that the flash-player requires the update and then there is the link to the page, where that thing can get. And that homepage is not Adobe's official. 

Probably in that update is involved not-wanted code. And that thing is the so-called Troyan horse. The Troyan horse is the malicious software that is playing useful software. And the malicious software can make many other things than just destroy files. One thing that infection can cause is that the hacker is taking the computer under control. And when the user is somewhere else that system would start to send trolls and other things on social media. 

The hacker can cause very much trouble by using remote computers for sending spamming and trolling. In the worst case, the infected computers are used for bot-network attacks against some services. And that thing can cause very big damages claims. And the net would be cut during the criminal prosecution process. 

()https://kimmoswritings.blogspot.com/

Monday, September 27, 2021

The energy crisis will be the next big problem in the EU.




At the beginning of this text, I must say that everybody on this planet knows about climate changing. But what kinds of actions should we do to stopping that process? We can always discuss things. We can repeat that the climate chancing is coming. But when we must do something. There are lots of problems to make decisions. People must give up something if they want to make a change for this global problem. 

But what is that thing that should give up? That is the old fashion attitude.  "Because my ancestors did something, I must do something like they do" is the attitude. Because my grandparents went to the workplace every single morning I must do the same thing. When something new is introduced I must always say "no", and if I say something against the common opinion that makes me the black cheap. 

While we are thinking about things like remote working, new ways to travel, and other kinds of stuff, the normal reaction is negative. There are arguments that those things have never been made before. And that's why we are against the change. 

Our grandparents had no laptop computers and mobile systems. So they had other rationales than we have in the working life. They had no internet where to find the solutions. So they lived in a different world than we are living.

The main problem is that the energy sources must not create carbon dioxide. And in that case, outsourcing and buying electricity outside the borders is not the answer for global warming. But if global warming can be stopped that thing would give a solution also for refugee problems. If people can produce their food in their homelands they must not move to another country. 

But there is still lots to do in the third world countries. A guarantee for food production would help to solve some of the problems. Sometimes the reason for domestic conflicts is the loss of pasture and agricultural lands. When the area of the arable land area decrease and the desert area is growing that causes competition for the right to use the decreasing land resources. 

Energy is the thing that keeps the infrastructure rolling. All our equipment like AI and other things require electricity. And the problem is that when the things like new and powerful computers are made those systems require electricity. When we are thinking that we are getting more and more effective mobile systems. 

That are using more effective microprocessors. We forget that those systems are using more electricity. Powerful microprocessors need lots of electricity. And in the case of mobile systems, the thing that highlights the effect of those things on electric networks is the mass effect. When million people are updating their mobile systems there is always some kind of effect on energy use. 

We might think that there is no effect if one or two cellphones are using 1 watt more power than others. But if the electric use of the billion cell phones grows one watt, that means the use of electricity grows 1 billion watts. The powerful microprocessors are using more power. And the cell phone must reload all the time.

The answer for the battery use is introduced that when the cell phone is in sleep condition the system uses less powerful auxiliary processors for keeping the system standby. And when those systems are started to use again the main processor will activate. But we must realize that there are lots of other things than just those billions of mobile devices that need electricity. 

The problem with electric supply is that it should not create carbon dioxide. And the second big problem is that it should not just outsource outside the borders of the EU. We must decrease our carbon dioxide production or we are in deep trouble in climate change. So in this case we must understand one thing. Many power sources can seem to renew like wood and methane. But the thing is that those energy sources involving carbon. And carbon is the major problem in climate chancing. 

Only fuels that are not involving carbon can stop climate chancing. Electric cars and other kinds of things are not creating carbon dioxide or monoxide themselves. But the problem is how to produce the electricity for those vehicles. 

Outsourcing energy production outside the borders of the EU gives the energy deliverer power to control the power supply in the EU. And that thing doesn't give answers for the climate changing. We can think that individual people can make things like changing their lights to LED lights. People can switch off their lights and decrease the temperatures of their houses. But the major problem is how to cut the carbon dioxide emissions very fast. We all know about things like climate chancing. There is very much data about that thing. But the thing that is needed is some kind of action to stop that thing. As I wrote at the beginning of this text. 

()https://kimmoswritings.blogspot.com/

Sunday, September 26, 2021

Could the future covid variants cheat our immune system?



That's a good question. The fact is that new viruses are forming all the time. That means we cannot even know what kind of virus causes the next pandemic virus. The virus that causes the next international epidemics is most probably coronavirus. 

The reason for that is that coronaviruses are the most common virus-type that travels through the air. The structure of that virus type makes it very resistant to chemicals that can destroy its genomes. The thing that we must realize is that the next pandemical virus might be advancing in some jungle. And there are lots of people, who cannot go to tests and who don't even care about their health. 

If there is no ability to make the tests of infected people there can be many viruses in some areas. And the thing that makes the respiratory tract infections very hard to separate. The first symptoms of those virus infections are always similar. But lethal infection starts to separate from the "harmless infections" soon. 

The problematic thing is there are people. Whose immune defense is passive or it cannot fight against viruses and bacteria. For those people who have AIDS or some other reason, their immune system is not working all kinds of infections are dangerous. 

The thing that activates the immune system is the antigens of the virus. If the researchers can predict the form of those antigens they could make vaccines before the epidemics start. But the problem is that there are maybe thousands. Or even millions of viruses and their variants all around the Earth. And that makes the creation of the vaccines against every each of them impossible. When a virus will infect the new cell line or cell group it connects some parts of the genomes of those cells in its DNA or RNA.

 And this means the transformation of the viruses is incredible. The transformation means. Sooner or later, the vaccines lose their power because the surface antigens of the virus are chanced. And that means the immune system cannot detect those new variants of the original viruses. And that means the creation of the new vaccines must begin. 

What caused this pandemic? The fact is that the viruses are sometimes escaping and infect people during normal vaccine research. During the testing, there is always possible that the living viruses are slipping into the test animal or infect personnel who are working in the laboratory. The origin of the COVID-19 remains unknown. 

The key question is when those animals that transmit viruses to people got the virus? Are they brought from Africa? Or if they are local what transferred those viruses to the animals that transfer them to humans?

Maybe some Chinese serviceman accidentally brought it from Africa. Or maybe somebody sold infected animals in the marketplace accidentally. I don't know what kind of inspections are made on those animals. And if somebody made a mistake in the secretive laboratory in China. That person would not confess that thing. 

Maybe that virus came to China with tourists or some Africans have sold the animals that infected people from Africa outside the customs. In that case, there was no veterinarian's inspection when somebody brought those infected animals to the country or the marketplace. Nobody knows where those animals got that virus. And that information would help to find out the origin of that pandemic. 


()https://scitechdaily.com/could-future-covid-variants-fully-dodge-our-immune-system/


Image():https://scitechdaily.com/could-future-covid-variants-fully-dodge-our-immune-system/


()https://kimmoswritings.blogspot.com/

Saturday, September 25, 2021

What is the connection between delirium and cognitive impairment caused by COVID-19?




(Image: Wikipedia/Delirium tremens)


The reason why delirium tremens is improving the dangers of the COVID-19 is not so surprising that we might think. Delirium tremens is a disease caused by alcoholism. Many times we forget that alcoholic people are not eating very well. They might have very few vitamins in their food. Or they are eating so badly that they are malnourished. And otherwise, the bacteria in their alimentary canal is disturbing. 

This thing makes the body impossible to receive vitamins. Some alcoholics have bad health conditions and other diseases like cirrhosis or cancer. Along with a lower immune defense, that thing offers the perfect platform for viruses to infect that person. And along with low nutrient levels, those things can cause that the COVID-19 infection will be worse than in other cases. 

The use of drugs and especially injected drugs can cause HIV infection and that thing makes every virus and other infections worse than in the case of a so-called normal person who has no vitamin deficiency that passivates immune defense. Or whose immune defense is not busy for some other viruses like Hepatite B. In that case, the immune cells are working with other viruses. And they have no time to start the fight against COVID-19. 

Humans, like all other mammals, have bacteria in the intestine. And the purpose of those bacteria is to handle the nutrient and separate important parts of it for the cells. If those bacteria will be destroyed the person would die because of hunger. In that case, the body just cannot use the nutrient, even if the person eats just like should be eaten. But people who have delirium might not eat enough vitamins at all. 

They might eat mostly meat and sausages. There is also the possibility that those people would not go to coronavirus tests if they feel sick.  And there is also the possibility that they will not take rest in the case of fewer. Along with bad habits like cigarette smoking and especially smoking the same cigarettes with other people and drinking from the same bottles with other people will increase the speed of the spread of the epidemic. 

When we are thinking about the COVID-19 pandemic we must say that there is the possibility that we ever get the complete numbers of the infected persons. There are lots of people who are not going to tests even if they are sick. And in Africa and the Middle East is possible many people don't even know about the COVID-19. Or they have better things to do than going to tests. 

But in the western world, some people are ever thinking about things like COVID-19. Those people are left outside society. They are using drugs and living in their world. We see them all the time, but somehow we cannot force them to test. 


()https://scitechdaily.com/delirium-is-a-common-consequence-of-severe-covid-19-cognitive-impairment-could-be-lasting/

()https://thoughtandmachines.blogspot.com/

Friday, September 24, 2021

About AUKUS cooperation: the defense union between Australia, the USA, and the UK.



Above: the B-1-bomber over pacific

The question is: why was the AUKUS contract made in secrecy? What kind of things may be a secretive contract involves? But the fact is that this contract will strengthen the independent defense of Australia. That kind of contract always involves communication outposts and the global surveillance network stations. 

The contract involved sharing technology with Australia. And that technology allows  Australia to build its new nuclear-powered submarines. But what else that contract involved? Military nuclear technology is one of the most secure and secretive things in the world. And that means Australia has offered something for counter gifts. Are those things involving the new radar technology? 

The AUKUS (Australia, The UK, and the USA) cooperation between the USA, Australia, and the UK is the thing that has caused discussions. Australia rejected the French-built diesel-electric submarines and started to create its nuclear submarines with the USA and UK. And that thing caused disappointment in the French and European governments. The nuclear submarines are making Australia more independent in the defense questions than ever before. 

Those submarines give the Australian navy similar global strike capacity with other navies that are using those systems. Modern nuclear submarines can also carry cruise missiles like BGM-109 "Tomahawk" that can launch from torpedo tubes. And that gives those systems the ability to attack factories and military bases that are a long way from the coastline. 

Nuclear submarines are the most capable systems in naval warfare and the AUKUS cooperation offers Australia a chance to get artificial intelligence-based computing. And other technical solutions that the UK and the USA are developed for their submarines. And Australia can offer their advanced radar technology as the counterplan for that cooperation.

But there is another thing that has caused discussions. That thing is the role of the USA in the conflicts between China and its neighboring areas. The thing is that the USA has many allies around the world. And the thing that frightens the USA is the new modern weapons of China. Even if the USA would win that war, there are millions or even billions of casualties if the warfare expands to a strategic thermonuclear war. 

And even if the conflict remains at the conventional level. There is the possibility that the USA loses one or more of its nuclear-powered aircraft carriers. And that thing causes nuclear pollution in that area. This is the reason, why the interest of the USA is to strengthen the independent defense of its allies. 

The number of equipment in the USA is limited. There is always a possibility there is a crisis at the same time in the South China Sea and Europe. That means the nuclear-powered aircraft carriers are needed in two places at the same time. And those units have a central role in the global operations. 

Whenever the USA must come to help its allies there is the risk of American casualties. Of course, the USA must help its allies when they need help. Because if it doesn't make that thing. The allies will be disappointed. Those contracts between the USA and its allies involving things like the allowance to use the airbases in that area for emergency landing sites for the strategic nuclear bombers. 

The support systems of the strategic bombers like escort fighters and tanker aircraft need those bases. And also the rescue crews are using those bases in the case that the strategic bombers will be dropped by technical error.

Also, those countries are established global electronic surveillance (ECHELON) and communication outposts supporting global intelligence and nuclear weapon operations of the USAF and U.S Navy. Also, the satellite data of the recon satellites is downloaded from those stations. This means that the center allies of the USA in that area need their power tools to defend themselves. Nuclear submarines are the thing that can put the challenge for China. 



()https://www.afr.com/policy/foreign-affairs/australia-crosses-a-strategic-rubicon-20210916-p58s2y


()https://www.jaoi.org/2021/09/h-k-sethi-aukus-pact-france-and-us-seek-to-mend-rift/


()https://www.popularmechanics.com/military/weapons/a34483004/worlds-most-dangerous-submarines-ranked/


()https://theconversation.com/the-aukus-pact-born-in-secrecy-will-have-huge-implications-for-australia-and-the-region-168065


()https://www.theguardian.com/world/aukus


()https://en.wikipedia.org/wiki/AUKUS


()https://en.wikipedia.org/wiki/Tomahawk_(missile)


Image:()https://nationalinterest.org/blog/the-buzz/the-b-1b-bomber-the-us-militarys-flying-missile-truck-22344

()https://thoughtandmachines.blogspot.com/

Saturday, September 18, 2021

North Korea has tested its new train-mounted missile system.



The new North Korean train-mounted missile system contains ballistic missiles wich range is about 800 kilometers. This is the thing that is told about those missiles. And there is a couple of things that we should know about those probably nuclear-capable systems. 

If we are thinking that those missiles cannot be sharp we are wrong. Even the primitive weapon systems can be accurate. During WWII were plans to use hidden radio transmitters to aim the primitive cruise missiles. The idea was that agents were put the transmitters to target. And then the primitive missiles like V-1 or V-2, or radio-controlled  B-17 bombers that carried internal warheads would fly to the target.

There is the possibility that the North Korean nuclear weapons are using the guidance system which bases the radio transmitters that are left near the target area. The idea is that this system can activate just before the attack. And then the missile can hit the target with very high accuracy. The ECM system can jam the signal. But the operators must know the frequency for counteractions. 

In those systems, the agents are leaving the transmitter in the target area. This type of radio transmitter can be activated by radio signals transmitted by the radio system on the homing head of missiles. When the radio signal hits the targeting transmitter, that thing starts to send the aiming signal to the missile. 

The Israeli air force used this type of targeting system in operation "Opera" for targeting its weapons. "Operation Opera" was an Israeli long-range air-strike the Iraqi nuclear reactor in the year 1981. In that strike, an Israeli agent put a little radio transmitter in the reactor room. And then that system sends the signal to aim missiles at the reactor. In that strike, the aircraft activated the aiming system by using the wake-up signal from the radar. And then the weapons flew to that signal. 

In the modern versions, the mobile telephone can use in this type of aiming system. The idea is that this type of system can use without the GPS. To the battlefield would put quadcopters that are equipped with led-lights or radio transmitters. And then the attack aircraft will shoot homing projectiles that are using those systems for aiming themselves. 

I other versions agent or quadcopter will put the mobile telephone on the target, and then the nuclear missile would aim to that point. The thing that makes this type of system very hard to detect is that the tracking signal can activate just before the strike is coming. The activator can be at the nose of an incoming missile. In this case, the missile must know only about the location of the transmitter. It can fly by using an inertial navigation system. When it would turn to return trajectory the radio system activates the aiming transmitter. 


()https://www.dailymail.co.uk/news/article-9996779/North-Korea-reveals-TRAIN-based-missile-fired-two-missiles-Japan-week.html


()https://www.nknews.org/2021/09/north-korea-tested-new-train-launched-ballistic-missile-system-kcna/

()https://en.wikipedia.org/wiki/Operation_Opera


()https://thoughtandmachines.blogspot.com/


Sunday, September 5, 2021

How the page rank of the Internet affects our way to think about things?



The term "polarization of information" means that only one version of the data is shared on the Internet. In that model, we have the right to remove all information that is not supporting our conviction. We must only hear things that are supporting our opinions. The same thing happens when homepages or other information somehow feel uncomfortable. Or those things don't support our way to think about them. 

We don't have to look at things that we do not tolerate. And that means we can select our sources and information from the homepages that are making us feel comfortable. If somebody disagrees with that thing, we might yell "shut up". And we must not hear people who have counter-arguments. 

The problem with the Internet is that the information that people are getting is turning one-sided. We are searching and look at things that feel comfortable to us. And we don't even want to hear counter-arguments. Those are calling in the question or criticize our way to think about things. 

A thing called "page rank" determines the place of the homepages in the list of internet searches. When somebody is clicking the homepage, that thing rises its position in the PageRank list. And that causes problems because cool-looking websites and well-known actors are getting more clicks than some little-known actors. 

That causes that the information is getting from the point of view of the well-known actors. If some homepage is getting more clicks than others that thing puts it before that other homepage. 

The Internet revolutionized information technology and we are facing one thing. We get more information than ever before. But how to select useful information, and what is the correct information? We might forget that people who play an expert might be something else. And separating confirmed and true information from fake news is important. 

But the biggest threat is that the diversity of the information is losing. People are clicking only the homepages that are high in the page rank because those pages are first in the list that causes that the information that people get is turning one-sided. We are reading and looking at the information that pleases us. 


We are not seeing homepages that are against our conviction because we are not clicking homepages that are feeling uncomfortable. And the problem is that when we are clicking something we are looking for cool highlights. The cool name of the homepages is the guarantee for clicks. And clicks are rising the position of the homepage in the page ranks. 

The problem is that we can see decisions only by using the data that is in use at that moment. When we are making decisions. This is why we are making the wrong decision. We cannot officially see to the future. And that is the reason why the decisions are sometimes wrong.  We believe that we are safe, but the Internet is spying on us. And the Internet is the ultimate tool for people who want to affect others. 

Believing something is more dangerous than we believe. We believe that our computers are safe because we are protecting our computers by using the most effective firewalls that we can find from markets. 

But we don't remember that hackers can strike communication between computers. They can record that data or they can put their files in that data flow. 


The biggest threat for the Internet is that the diversity of information is gone. 


But the hackers are not the biggest threat on the Internet. The biggest threat for the Internet and its ability to share information is that the large-size and well-known actors are getting more audience than the little-known actors. 

Because well-known Internet actor gets more clicks than the little known web actor that thing causes that the page-rank that calculates the clicks are ranking the homepages of the well-known actors to the upper position on the screen. And when we are searching for some data, are we ever click the next page in search results? 

Because the page ranking favors the well-known actors. That means the information that got from the net is one-sided. The page-ranking system is originally made for commercial use. It should not use outside its purpose. 

Page-ranking systems have been created for searching products from web stores. That system is not shared political or some commute information. This is the weakness of the page ranking which is made for serving customers who want to buy sneakers. Page-ranking system uses the same method for sorting other web pages. And that thing makes the information unilateral. 

When the page-ranking systems are sorting the homepages of the political parties they are just calculating the clicks that those homepages are getting. This is the reason why the parties. That have so-called "cool names" are getting very much attention. The cool name will bring more clicks. And that is rising the position of the homepages in the page ranking. 

The page-ranking that sorts the homepages by calculating clicks is made for making people easier to find sneakers from the net. That thing was important when people were buying something from the net that paid in minutes. But if we are using page-rank (or any other tool). For a purpose that they are not made, that thing causes the unexpected effect. 

()https://kimmoswritings.blogspot.com/

The quantum radar can end the superior of the stealth technology.




The F-22 (Image above) is the 5th generation stealth fighter. The next-generation stealth systems are already coming into service are replacing those old-fashion jet fighters. 

But the fact is that the 5th generation stealth systems are well-known and there are projects in the countries like China. Which goal is to make the anti-stealth and stealth systems that are turning old-fashion stealth systems visible. 

And they might turn useless. The new type of anti-stealth system can break every stealth system if the system uses the fixed shape of the structure. The idea is to use the radar wavelength that can jump back from the layer of the jet aircraft. 


In the other versions, the system combines multiple sensors. Those sensors are acting as optic, radar, laser, and acoustic areas. And the system handles them as an entirety. 


There are two ways to benefit the quantum technology in anti-stealth systems. The first and more conventional way to use that new technology is just to use the quantum computer that analyzes the data that the multiple sensors are sending the data to quantum computers that are connecting and analyzing that data. 

In this type of anti-stealth system multiple ground-based, air- and seaborne and satellite-based system are working as an entirety. The system uses radio waves, lidars (laser radars) space telescopes. And things like acoustic sensors for uncovering the stealth plane. The spaceborne optical sensors are things that are causing risks for the stealth system. 

The weakness of the satellites is that their location is changing when they are orbiting the earth. If the airborne system must protect things like cities they must hang in a stable position during the operation. One version is to use blimps. The unmanned balloons or airships that can rise to a high atmosphere can carry multiple sensors. 

That can detect stealth aircraft. The idea is that the system sees the aircraft by using optical sensors. The airborne radar can see the shadow of the stealth aircraft when it travels over the ground. The stealth aircraft denies the radar echo from the ground. And the shape of the stealth aircraft is seen as the shadow when it comes between ground and radar. But that system requires an extremely high-resolution radar. 


Another version is to use a laser scanner. The laser scanner scans the surface of the stealth plane. And the shape of it is coming to the screens of the operators when it goes through the laser wall. 


And the Mars helicopter can use as the base for the new type of unmanned, high-flying AWACS system. The rotor blades can be equipped with radar and the helicopter itself can have a CCD camera. The purpose of that camera is to observe the area by using optical systems. Those systems are observing the area by using the wavelengths of infrared and visual light. Also, those helicopters can use lidars (laser scanners) to search stealth aircraft. Those helicopters can hang above certain areas, and they can get energy from the ground. 

The small size makes them harder to target than some airships are. The reason why these kinds of systems are under development. Is that they can hang over a certain land area and observe it intensively. Those helicopters can use microwaves as EMP weapons which mission is to disturb the robot-drone operations in the area. But they can also have a laser system for destroying the incoming missiles. 

In the anti-stealth radars, the system uses the indirect way to see stealth aircraft. The system tries to notice the airflow. Or pressure wave that is escaping from the surface of the aircraft. And it can use radars and laser systems for that mission. 

Quantum technology, which mission is to make a new type of sensors can end the era of stealth. There are many ways to make the quantum radar and one is the plasma field. When stealth aircraft is entering the plasma field, the radar of some other sensors is seeing the interaction between the aircraft and the ion cloud. 

In some of the most futuristic versions of quantum radar, the system acts like a giant electron crystal. That electron crystal sees if something moves its particles. And that makes it possible to notice the stealth aircraft. Other versions of the quantum radars are the chained ions or some other particles. And those radars are feeling the surface of the stealth plane. 


()https://thequantumdaily.com/2021/09/04/chinese-scientists-say-quantum-radar-could-end-stealth-advantage/


Image:()https://thequantumdaily.com/2021/09/04/chinese-scientists-say-quantum-radar-could-end-stealth-advantage/

Saturday, September 4, 2021

The new artificial intelligence-driven drone technology is an effective threat for enemies. And that technology is under development in China, Russia, and the USA.




Since the USAF uncovered their sixth generation jet-fighter concept there has been thought, what that air force keeps out from the eyes? What are the secrets of the nuclear strike capacity of that air force? And what kind of systems is planned to use in the other military branches? Things like robot submarines are easier to hide than some airborne drones. And there are millions of people who have ever seen a nuclear submarine in real life. 

The small-size stealth drones are giving new capacities for things like nuclear submarines. They can use as missiles. But those drones like "Cormorant" can use as air combat vehicles. And in the aircraft carriers and nuclear submarines can involve quantum computers. So the nuclear submarines that can operate small-size stealth drones can also have the quantum computer that controls those drone swarms. And that thing makes them the most powerful system in the world. 

Lockheed Martin has developed new large-size combat drones in silence or out of the public eye. And that tells that the battle between the nations continues in the field of the ownership of the most effective mixture of drones and manned aircraft. China and other nations are also making investments in drones and other unmanned systems that can operate airborne, ground, surface, or underwater sectors. 

This thing causes that the new drones and manned aircraft are coming to arms-race also outside the USA. The thing that makes drones very interesting tools is that the losses of the robot aircraft are easy to hide. The requirement for independently operating drones is because the ECM systems can cut the communication between the drones and satellites. The independently operating drones are large-size. The reason for that is that those drones require very much computer power. 

Artificial intelligence requires powerful computer systems. The other version is to use a drone swarm. In drone swarms, every single drone is sharing its computing power. But the problem is that the drone swarm can cripple by using an ECM system. 

Shooting down drones is not more difficult than shooting down manned aircraft. But the problem is how to find those drones. And the thing is that the drones are very cheap and regular missiles are expensive. If there are hundreds or even thousands of small-size drones that are attacking the targets. There are not enough missiles to defend targets against those drones. 

The loss of manned aircraft causes that the pilot is missing or dead. And the robot aircraft are an interesting tool for recon missions. The rumor or my thought about the legendary but mysterious "Aurora" is that this aircraft might be a drone. That causes that nobody ever reported acting as a pilot for that aircraft. 

The drones can attack the ground targets like manned aircraft. But the big-size drone can act also as the platform for the smaller drones that can carry rifle- or pistol-caliber weapons. That thing makes those drones a new kind of threat. The drones can act a similar way the regular aircraft, but they can operate extremely long time. 

Small-size drones have better survivability and they will reach their targets more probable than large-size strategic bombers. The reason why the long-range attack operations are planned to transfer to drones. Is that the small-size aircraft can operate the long-term missions. But those aircraft are not allowing the pilot to do anything else than just sit. And long-range missions are important for hiding the secrets of the newest stealth and high-speed aircraft. 

The extremely long-enduring flight time with airborne refueling makes it possible that the drones can patrol even weeks and they can attack from every direction. And the thing that makes drones problematic is that many nations how effective those systems can be. 

And the idea of the kamikaze drones is taken from the Japanese kamikaze pilots from WWII. The first idea was to create cruise missiles that can return to base if they are not needed. The next version was the remote-control attack aircraft. 

The last ones are independently operating artificial intelligence-driven drones that are capable of air combat and ground attack missions. The nuclear attack drones can have internal nuclear warheads. They can use regular bombs in the "conventional bombing missions". But act as kamikaze in the nuclear strikes. 

Proxyware programs can risk data security in two ways.



Proxyware software is a tool that can offer the possibility to share the bandwidth of the WLAN support stations. Those programs are offering one of the most impressive possibilities to make problems for the people, which is renting their WLAN connections. The hacker can slip that program to support the station and then start to rent that station to their friends. 

But the proxy rental software is also causing one of the most interesting ways to cause problems to the person who owns that data connection. That WLAN support station can be used as the platform for hacker attacks like port scanning and other things that are illegal. When the security team is tracking that attacker, the tracking ends at the captured WLAN station. 


Remote-used computers can use for many types of illegal activities. 


And authorities can close the WLAN connection because of the hacking. Those kinds of things are also notable threats to data security. The use of some other than their internet connections means that. The ability to close the connections of the hackers and track them is getting lower. Even if that connection is closed. It doesn't affect the hacker's internet connection. And the hackers can use the chain of the remote used computers in their work. 

Those things can use for making illegal commercials. If the company that is marketing those products is working in a country where marketing those things is illegal. That thing can cause problems. So those operators can operate by using remote computers which they can operate anywhere on the Earth. 

The remote-control computers are used for marketing things like tobacco or alcohol. Or they can be used for net trolling. If that kind of thing is noticed that causes the cut of the internet connection. So hiding the position of the computer where the work is done is important. 

The chained VPN-protected remote used computers are the thing. That is making it possible that the hackers themselves can sit in the cities like Moscow or Beijing. But there is also the possibility that some of the computers are in those cities, and the hackers are operating from western nations. Those actors can play the game, that they are working for the Chinese or Russian governments. 

But they might also work as net mercenaries, paid hackers who are working for some "private security contractor". Those contractors are the private spying companies. They might play that they are GRU agents. 

But the real employers are the private-owned "detective offices". Which mission is to search and sell business secrets for people who are paying the highest price. Those actors can bed controlled by some governments but they cannot connect to those employers.  Playing the governmental actors will make tracking of those operators slower. 

()https://visionsoftheaiandfuture.blogspot.com/


Computer researchers published a new algorithm that revolutionizes web management.

The new database structures require new and powerful tools to manage databases in non-centralized solutions. The new data structures can be ...