Skip to main content

Featured Post

Resuming Pace: I Shall Not Be Pursuing a Second Bachelor's Degree

On May the 5th, 2021, I used a strong position deciding my pursuit of a second Bachelor’s degree: my choice was the University of Maryland Global Campus (UMGC, link ), but I decided to resume my Master’s program, by itself.  Let me explain with Scripture: the Gospel of Jesus Christ According to Matthew, specifically. In ancient times, records of a man called Jesus the Christ were written. Among these records was a Gospel, According to Matthew, of Jesus Christ. According to legend, Jesus Christ stated, “Blessed are the meek: for they shall inherit the earth (KJV, Matthew 5:5, link ).” Jesus the Christ was saying those who are submissive shall inherit the earth rather than those who are brash.  In my attempt at starting a second Bachelor’s program, I eventually realized I had been too pushy: I wanted the May 19th start date, and I wanted the admission process expedited, I wanted ease of access between majors, I wanted advantages to the application process because of what UMGC (I was gra

To Arti Mehta, a Response: Data, collaboration and life on the edge – Meet the Catalyst winners

On Telecoms Industry Challenges, a Seventeen Team Entry Point
Arti Mehta wrote, "At Digital Transformation Asia this week, 17 Catalyst teams demonstrated their solutions to common telecoms industry challenges." Demonstrating common telecoms industry solutions gives an industry entry point, and it is the least common challenge,  but it is a demonstrated challenge: the problem is a university course topic.
On Catalysts, the Basics
Mehta reported: Catalysts are member- driven, concept-proving communications service providers (CSPs), suppliers, developers, etc. who assemble a quick and successive access  solution. Mehta reported: many leading commerce deployments are a Catalyst assembly. Mehta reported: with sixty-plus companies, and a two hundred plus entry count, this event location was Malaysia. Mehta wrote: the project selection was artificial intelligence (AI), user experience (UX), and virtual intelligence (VI); but also blockchain; but 5G; but etc. Mehta wrote: thirteen industry experts judged each project. 

The Categories, and the Winner
There were four categories: 
  • Outstanding use of TM Forum assets
  • Best new Catalyst in show
    • Winner: AIS, Bharti Airtel, Globe Telecom, KDDI Research, Optus, Singtel, Telkomsel
      • Project: Becoming EDGY
  • Outstanding Catalyst – innovation
  • Outstanding Catalyst – business impact
    • Winner: China Telecom
      • Project: Glaucus-precision on telco data

The Industry Demands Change 
In Scripture, the Apostle Saul sent his son,  Timothy, an assurance message. Saul (NIV) wrote, "For the Spirit God gave us does not make us timid, but gives us power, love and self-discipline" (2 Timothy 1:7). These Catalyst winners are a big project, but it defines overhead wrong: timid because the Play Store is not used, powerless because the consumer Google+ is shutdown and remembered, but hating people because 5G is a health hazard; but not disciplining itself because telcos data is put behind the ™ Forum instruction paywall.
On the basis of the Wachowski Brothers film, "The Matrix," but take it with a grain of salt.
Image by Gordon Johnson from Pixabay

Comments

Popular posts from this blog

Drone Uses AI and 11,500 Crashes to Learn How to Fly

Learning to Fly by Crashing On 10 May, 2017, Evan Ackerman wrote the IEEE (Institute for Electricians and Electrical Engineers) SPECTRUM article Drone Uses AI and 11,500 Crashes to Learn How to Fly. In Ackerman’s article, Ackerman used a block quote by Carnegie Mellon University roboticists Dhiraj Gandhi, Lerrel Pinto; and Abhinav Gupta, the writers of a paper, “Learning to Fly by Crashing” (Gandhi, et. al., 27 Apr 2017). From Ackerman’s block quote from Gandhi, et. al., “[T]he gap between simulation and real world remains large especially for perception problems” (Gandhi, et. al.). Ackerman contrasted known motion from unconfirmed motion without identifying the pre-existing condition called Schrödinger’s cat in the case that the crashes shall eventually happen without outside help: a continuing crash failure, and in security terms this is interned as a false positive because this helps Schrödinger’s cat stay alive or rest buried in the soil. In this case, this drone detects these t

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

                Considering Holy Security When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” ( New International Version , Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. Cyber Security Hygiene Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along with her clients because true security

On Computer Organization and Architecture: the Hierarchy

On study.com, Abirami Thangavel wrote Superscalar & VLIW Architectures: Characteristics, Limitations & Functions. Regarding parallel architectures, superscalar and VLIW, Thangavel wrote: In computer architecture, parallel processing refers to processing of multiple instructions of a program by distributing them among multiple processors. Superscalar and Very Long Instruction Word (VLIW) are parallel architectural models based on Flynn's Taxonomy. Both superscalar and VLIW architectures are capable of executing multiple instructions at one cycle. Each uses a different method for instruction scheduling. While superscalar processors execute instructions dynamically, VLIW uses static scheduling of program instructions.[1] Thangavel was saying this: on Flynn’s Taxonomy, superscalar and VLIW architectures are based, but they have differences. Therefore, on entity priorities, entities have different descriptive capabilities. As follows, a superscalar processor is this: a microproc

Contact Form

Name

Email *

Message *