Skip to main content

Posts

Showing posts from September, 2021

Prepare for quantum revolution.

The quantum computer can make real processor-based multi-tasking possible. So it can at least theoretically drive regular computer programs. Quantum computers can drive the code in the lines. Which means that the code has more layer than in row moving code.  The system shares the row of the code to the layers. But there is always a limited number of layers or states in the qubit. So the data flow is also driven in rows. The system is introduced in image II.  (Image II) Every square is the data segment. And the arrow shows the direction of the data flow.  And this ability makes it more powerful than any binary system ever can be. The quantum computers can also have virtual workspaces for regular computer programs. The system can drive the program code also in rows.   In the qubit, the data goes in layers or states. The qubit can drive regular computer programs by using one state for each program. And the quantum system can drive multiple binary code-based programs at the same time. So t

Advanced programming can give CPR for binary computers.

Russian scientists have used the supercomputer for calculating limits for Google's new quantum computer. The thing is that also quantum computers have their limits. There is the possibility to make the same things with binary computers. That is made by using quantum computers. But quantum computers can make the same things faster.  The AI-based memory washes along with the intelligent use of microelectronics. The memory wash means that the memory of the computer is will release.  And the program code is removed from the memory. Whenever the code has traveled around the computer make the use of memory more effective.  Other things like the ability to ask assistance from the other microprocessors of the system give also regular computers that use primary system architecture more power and extend their lifecycle. In that kind of system, the auxiliary processors of the system like processors of the graphics card can share their capacity with the CPU when they have no other things to do

Active stealth suits, quantum stealth, and protective fields can be the next tools for the military.

The poor-man active stealth.  In the beginning, I will write about one of the simplest ways to make the active stealth cloak that bases the flexible screen. The idea is that the image on the screen will turn a user of this chameleon system take by using a quadcopter. The quadcopter would take the image of a certain point of the ground. And then it will mark that point.  Then the user of the cloak must just take that place. And the image will transmit to that screen. And that should make the person that can be a sniper less easy to detect. That thing is the poor-man version of the active stealth suits where are cameras all around it.  And which purpose is to make the user of the system transparent. The use of a quadcopter can be useful in the cases that the person uses only the stealth canvas which is the flexible screen and moves quite a little. And then we can go to the quantum stealth systems and protective fields.  Quantum stealth can base the idea. That the photons just stop in the

The intelligent entirety needs new solutions. But those solutions have not only bright sides.

In the beginning, I must say that the negative things of AI are a highlight too much. The same thing was seen on the internet. The internet and AI are the biggest opportunities for people. Things like the use of land area and how society handles its garbage is the important thing. But in this case, the object is in the AI and synchronizes the society to the harmonic entirety that is effective and less pollutive.  The city is the entirety that connects people, traffic, and things like houses and governmental, communal, and private organizations together. The thing that dominates synchronization of this kind of entirety is the information and the ability to handle the information collected from different sources. And that means the infrastructure must support the information system. And the information system must also support the physical entirety for being useful because only useful things get financial and political support for turning real.  The biggest opportunities are things that

The purpose of the malicious software can turn the computer into a "zombie" that can use as the medium for the hacker operation.

Modern malicious software does not always destroy data. The malicious code can allow hackers to highjack the computers And use them to medium in their operations. Using the highjacked  "zombie machine" as the transmitter the hacker is harder to track. The operation can contain the delivering the trolls and other things in the network. And at the final stage, the hacker would detonate the logic bomb inside the targeted computer. The logic bomb means the computer code that destroys the data in the system that it cannot use to trace the hackers.  A couple of words about malicious software and what is the best place to get an infection? The malicious software is the boogeyman of the internet. People are warned about the pornographic pages that can load malware like a computer virus to the computer. Many people think that computer viruses are just destroying the files in the hard drive. But the thing is not so simple as we might think.  The Troyan horse is a computer virus that pl

The energy crisis will be the next big problem in the EU.

At the beginning of this text, I must say that everybody on this planet knows about climate changing. But what kinds of actions should we do to stopping that process? We can always discuss things. We can repeat that the climate chancing is coming. But when we must do something. There are lots of problems to make decisions. People must give up something if they want to make a change for this global problem.  But what is that thing that should give up? That is the old fashion attitude.  "Because my ancestors did something, I must do something like they do" is the attitude. Because my grandparents went to the workplace every single morning I must do the same thing. When something new is introduced I must always say "no", and if I say something against the common opinion that makes me the black cheap.  While we are thinking about things like remote working, new ways to travel, and other kinds of stuff, the normal reaction is negative. There are arguments that those thin

Could the future covid variants cheat our immune system?

That's a good question. The fact is that new viruses are forming all the time. That means we cannot even know what kind of virus causes the next pandemic virus. The virus that causes the next international epidemics is most probably coronavirus.  The reason for that is that coronaviruses are the most common virus-type that travels through the air. The structure of that virus type makes it very resistant to chemicals that can destroy its genomes. The thing that we must realize is that the next pandemical virus might be advancing in some jungle. And there are lots of people, who cannot go to tests and who don't even care about their health.  If there is no ability to make the tests of infected people there can be many viruses in some areas. And the thing that makes the respiratory tract infections very hard to separate. The first symptoms of those virus infections are always similar. But lethal infection starts to separate from the "harmless infections" soon.  The probl

What is the connection between delirium and cognitive impairment caused by COVID-19?

(Image: Wikipedia/Delirium tremens) The reason why delirium tremens is improving the dangers of the COVID-19 is not so surprising that we might think. Delirium tremens is a disease caused by alcoholism. Many times we forget that alcoholic people are not eating very well. They might have very few vitamins in their food. Or they are eating so badly that they are malnourished. And otherwise, the bacteria in their alimentary canal is disturbing.  This thing makes the body impossible to receive vitamins. Some alcoholics have bad health conditions and other diseases like cirrhosis or cancer. Along with a lower immune defense, that thing offers the perfect platform for viruses to infect that person. And along with low nutrient levels, those things can cause that the COVID-19 infection will be worse than in other cases.  The use of drugs and especially injected drugs can cause HIV infection and that thing makes every virus and other infections worse than in the case of a so-called normal perso

About AUKUS cooperation: the defense union between Australia, the USA, and the UK.

Above: the B-1-bomber over pacific The question is: why was the AUKUS contract made in secrecy? What kind of things may be a secretive contract involves? But the fact is that this contract will strengthen the independent defense of Australia. That kind of contract always involves communication outposts and the global surveillance network stations.  The contract involved sharing technology with Australia. And that technology allows  Australia to build its new nuclear-powered submarines. But what else that contract involved? Military nuclear technology is one of the most secure and secretive things in the world. And that means Australia has offered something for counter gifts. Are those things involving the new radar technology?  The AUKUS (Australia, The UK, and the USA) cooperation between the USA, Australia, and the UK is the thing that has caused discussions. Australia rejected the French-built diesel-electric submarines and started to create its nuclear submarines with the USA and U

North Korea has tested its new train-mounted missile system.

The new North Korean train-mounted missile system contains ballistic missiles wich range is about 800 kilometers. This is the thing that is told about those missiles. And there is a couple of things that we should know about those probably nuclear-capable systems.  If we are thinking that those missiles cannot be sharp we are wrong. Even the primitive weapon systems can be accurate. During WWII were plans to use hidden radio transmitters to aim the primitive cruise missiles. The idea was that agents were put the transmitters to target. And then the primitive missiles like V-1 or V-2, or radio-controlled  B-17 bombers that carried internal warheads would fly to the target. There is the possibility that the North Korean nuclear weapons are using the guidance system which bases the radio transmitters that are left near the target area. The idea is that this system can activate just before the attack. And then the missile can hit the target with very high accuracy. The ECM system can jam t

How the page rank of the Internet affects our way to think about things?

The term "polarization of information" means that only one version of the data is shared on the Internet. In that model, we have the right to remove all information that is not supporting our conviction. We must only hear things that are supporting our opinions. The same thing happens when homepages or other information somehow feel uncomfortable. Or those things don't support our way to think about them.  We don't have to look at things that we do not tolerate. And that means we can select our sources and information from the homepages that are making us feel comfortable. If somebody disagrees with that thing, we might yell "shut up". And we must not hear people who have counter-arguments.  The problem with the Internet is that the information that people are getting is turning one-sided. We are searching and look at things that feel comfortable to us. And we don't even want to hear counter-arguments. Those are calling in the question or criticize our w

The quantum radar can end the superior of the stealth technology.

The F-22 (Image above) is the 5th generation stealth fighter. The next-generation stealth systems are already coming into service are replacing those old-fashion jet fighters.  But the fact is that the 5th generation stealth systems are well-known and there are projects in the countries like China. Which goal is to make the anti-stealth and stealth systems that are turning old-fashion stealth systems visible.  And they might turn useless. The new type of anti-stealth system can break every stealth system if the system uses the fixed shape of the structure. The idea is to use the radar wavelength that can jump back from the layer of the jet aircraft.  In the other versions, the system co mbines multiple sensors. Those sensors are acting as optic, radar, laser, and acoustic areas. And the system handles them as an entirety.  There are two ways to benefit the quantum technology in anti-stealth systems. The first and more conventional way to use that new technology is just to use the quant

The new artificial intelligence-driven drone technology is an effective threat for enemies. And that technology is under development in China, Russia, and the USA.

Since the USAF uncovered their sixth generation jet-fighter concept there has been thought, what that air force keeps out from the eyes? What are the secrets of the nuclear strike capacity of that air force? And what kind of systems is planned to use in the other military branches? Things like robot submarines are easier to hide than some airborne drones. And there are millions of people who have ever seen a nuclear submarine in real life.  The small-size stealth drones are giving new capacities for things like nuclear submarines. They can use as missiles. But those drones like "Cormorant" can use as air combat vehicles. And in the aircraft carriers and nuclear submarines can involve quantum computers. So the nuclear submarines that can operate small-size stealth drones can also have the quantum computer that controls those drone swarms. And that thing makes them the most powerful system in the world.  Lockheed Martin has developed new large-size combat drones in silence or o

Proxyware programs can risk data security in two ways.

Proxyware software is a tool that can offer the possibility to share the bandwidth of the WLAN support stations. Those programs are offering one of the most impressive possibilities to make problems for the people, which is renting their WLAN connections. The hacker can slip that program to support the station and then start to rent that station to their friends.  But the proxy rental software is also causing one of the most interesting ways to cause problems to the person who owns that data connection. That WLAN support station can be used as the platform for hacker attacks like port scanning and other things that are illegal. When the security team is tracking that attacker, the tracking ends at the captured WLAN station.  Remote-used computers can use for many types of illegal activities.  And authorities can close the WLAN connection because of the hacking. Those kinds of things are also notable threats to data security. The use of some other than their internet connections means t