This is for Internet and Telecom. I am Jonathan M. Kelly, but my business name is Bit Jet Kit. I am an Android Pie developer: Bit Jet Kit. My app has more content I made, but this Podcast is one part. In March 2017, I started learning Android development, but now you can tune in every week for more leading edge Information Technology news and research. For more updates, check back, weekly, stay tuned. Consider supporting my podcast for you to stay in the loop regarding new advancements in Internet and Telecom Science and Information Technology. As little as $.99 can help support this cause.
Regarding lithium-ion battery uses, TheEarthAwards listed the following: portable power packs, uninterrupted power supply (UPS), but electric vehicles; but marine vehicles; but personal mobility; but solar energy storage. Of these use-cases, fire can compromise all; but a common battery fire-retardant is an acceptable investment. In history, there is wisdom regarding being the winner: of a battle involving fire.
Without humans, media is another entity’s claimable target, but all human records are the bounty’s contents, too. As a history-based tool, its potency, replacing a human, is not really accurate: the Bible holds related wisdom.
In the September to October 2020 edition of IEEE (Institute for Electricians and Engineers) Potentials, Raymond E. Floyd wrote Industry or academia. Listen to my response.
Image by Steve Buissinne from Pixabay
On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis. When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect. However, there are relevant cybersecurity nomenclature examples worth reviewing history heretofore. I believe the Bible offers a message that can be balanced, well, because Computer Science exists.
Image by Pexels from Pixabay
In the September 2020 edition of Communications of the ACM, Moshe Y. Vardi wrote Where Have All the Domestic Graduate Students Gone. Vardi wrote, “Tech industry giants Apple, Amazon, Facebook, and Google were all founded by first- or second-generation immigrants” (link). As stated previously in another article I wrote, Vardi wrote that in the month of June during the year 2020 AD, President Trump suspended new work visas and banned tens of ten thousands of foreigners against establishing employment within the U.S.A.: this was temporary.
Image by WikiImages from Pixabay
In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3).
Image by Darwin Laganzon from Pixabay
Anonymous. (2016). JOBS MARKET: Me and my job. SC Magazine, 27(6), 15.
Holt, A. L., Safari Books Online (Firm), & Books24x7, I. (2013). Governance of IT: An executive guide to ISO/IEC 38500. Swindon, UK: BCS, The Chartered Institute for IT. Olutoyin, O., & Flowerday, S. (2016). Successful IT governance in SMES: An application of the technology-organisation-environment theory. South African Journal of Information Management, 18(1), 1-8. doi:http://0- dx.doi.org.library.regent.edu/10.4102/sajim.v18i1.696
When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” (New International Version, Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. For the hearing impaired, here is the readable version of this podcast: link.
Image by Tumisu from Pixabay
In the August 2020 edition of Communications of the ACM, West Linn, OR, USA-based author and journalist, Samuel Greengard wrote Neuromorphic Chips Take Shape. The available data Greengard had is the claim that a Caltech (California Institute of Technology) professor invented this technology, neuromorphic chips. In this Podcast, I discussed the efficacy of this research. On BitJetKit.com, Search 'Neuromorphic Chips' on the top-right search link.
Image by FunkyFocus from Pixabay
Bit Jet Kit: On the Secure Internet of Medical Things
In the August 2020 Edition of Communications of the ACM (the Association for Computing Machinery), Chief Internet Evangelist at Google and 2012 AD to 2014 AD ACM president, Vinton G. Cert, wrote On the Internet of Medical Things, a column regarding healthcare and the widespread availability of household Internet and Telecom technologies applicable to healthcare. This Podcast is my response to this article in the August 2020 Edition of Communications of the ACM. For those with hearing difficulties, check out my blog entry: on my Bit Jet Kit Web site, search 'On the Secure Internet of Medical Things.' It is my written version for readers.
Image by Colin Behrens from Pixabay
In August, 2020, Vice President of the TM Forum’s AI & Customer Experience, Aaron Boasman-Patel wrote AIOps will help telcos manage AI at scale – a must in 5G networks. On it, this is a podcast. Image by mohamed_hassan on Pixabay.
Two nights ago, on VS Code (Visual Studio Code), a popular IDE (integrated development environment), I successfully ran a simple box volume calculator app, and the language I used was C++. Listen, and find out more regarding how I accomplished this feat. For the hearing impaired, search 'VS Code'
Episode art: Image by Tawanda Razika from Pixabay
On 17 April, 2020, 5:00 AM Chicago, IL time, Greg Stewart, Klaske van Heusden, and Guy A. Dumont released the IEEE SPECTRUM article How Control Theory Can Help Us Control COVID-19 (link). This is a reflection against the COVID-19 pandemic’s recorded measures.
Image by Gerd Altmann from Pixabay
In October 2019, Tim Kridel wrote Windstream uses intelligent automation to cut provisioning time by 80%. Against technology's sake, Kridel wrote network conversions do not happen. On this podcast, Find out more about NFVs, SDNs, and SD-WANs, and the relevance to contend with civil law.
On this episode, players can learn about the leading edge Microsoft AI Server technology, Azure, used for Microsoft's enterprise Relational Database Management System, SQL Server. However, the social issues surrounding big business are specifically law officers enforcing bureaucracy. This is unsustainable, so I recommend the big RDBMS' nemesis, Android Pie's SQLite database. Further, before Android 10 is selected, Android Pie should be selected for its predictive capabilities as to protect against a Minority Report society.
Image by earvine95 on Pixabay.
This month's Communications of the ACM come with the question: who is in charge of the AI creation and its derivative works, or are these even what man can call works in the software engineering lifecycle? Listen on the platform of your choice.
Image by OpenClipart-Vectors from Pixabay
Against a rushed power shift to women dominating men as the AI leaders, forever, I contended AI and Android Pie have limits for more than women advancing AI, alone.
Image by Gordon Johnson from Pixabay
Smart List: 22 Coding and Computer Science Resources Getting Smart Staff 9 months ago. Because of AI, the value of a computer science degree will “diminish over time,” says investor Mark Cuban
Image by Christo Anestev from Pixabay
In 1986 AD, Daniel C. Dennett wrote Information, Technology, and the Virtues of Ignorance.For Dennett, good is an edible love affair. Toward hell, food adultery is a trajectory. Instead, I believe the trusted way and life is my one true ABBA in the flesh, Jesus Christ.
Image by Lorenzo Cafaro from Pixabay
In September 1996, C. A. Glasbey had been releasing a University of Edinburgh paper, Inference on Binary Images From Binary Data. C. A. Glasbey wrote that digital images had been imperfect reality representations.
Image by Free-Photos from Pixabay
On October 23, 2019, business reporter Dan Ascher released When to fire the boss: A tale of three sackings. Ascher reported that business leaders are close associates with their companies, but without them these companies have little existence.
Image by VisionOfVictor from Pixabay
Between six and seven hours ago, Fox News' Stephen Sorace reported Japan's historic Shuri Castle nearly decimated in raging fire: 'We have lost our symbol.'In Scripture, the Tarsus man, Saul, sent his Thessaloniki-located family a planning message.
Image by Adam Derewecki from Pixabay