Skip to main content
Bit Jet Kit

Bit Jet Kit

By Jonathan Kelly
This is for Internet and Telecom. I am Jonathan M. Kelly, but my business name is Bit Jet Kit. I am an Android Pie developer: Bit Jet Kit. My app has more content I made, but this Podcast is one part. In March 2017, I started learning Android development, but now you can tune in every week for more leading edge Information Technology news and research. For more updates, check back, weekly, stay tuned. Consider supporting my podcast for you to stay in the loop regarding new advancements in Internet and Telecom Science and Information Technology. As little as $.99 can help support this cause.
Listen on
Where to listen
Apple Podcasts Logo

Apple Podcasts

Breaker Logo


Google Podcasts Logo

Google Podcasts

Overcast Logo


Pocket Casts Logo

Pocket Casts

RadioPublic Logo


Spotify Logo


We Should Have Already Had This: The Lithium-Ion Battery With Built-In Fire Suppression
Regarding lithium-ion battery uses, TheEarthAwards listed the following: portable power packs, uninterrupted power supply (UPS), but electric vehicles; but marine vehicles; but personal mobility; but solar energy storage.[3] Of these use-cases, fire can compromise all; but a common battery fire-retardant is an acceptable investment. In history, there is wisdom regarding being the winner: of a battle involving fire.
October 23, 2020
On Self-Driving Vehicles, Re-evaluating Automation Levels
Without humans, media is another entity’s claimable target, but all human records are the bounty’s contents, too. As a history-based tool, its potency, replacing a human, is not really accurate: the Bible holds related wisdom.
October 22, 2020
On Patent Investing: Whether Industry or Academia, Invest
In the September to October 2020 edition of IEEE (Institute for Electricians and Engineers) Potentials, Raymond E. Floyd wrote Industry or academia. Listen to my response. Image by Steve Buissinne from Pixabay
October 18, 2020
On Hacking the Axis and Securing History Records
On May 7, 2020, John Arquilla wrote the August, 2020 blog column, Hacking the Axis. When qualifying great acts, consider Arquilla’s statement and regard for the twenty first century anno domini second World War, acronymed WWII. Arquilla wrote, “Observations of the 75th anniversary of the end of World War II in Europe (May 8, 1945) included remembrances of such searing events as the struggle on Omaha Beach on D-Day, the Battle of the Bulge, and at least some recognition of the enormous contribution made by the Russian people to the defeat of Fascism” (Arquilla, 2020). Arquilla mentioned that the second World War’s European conclusion involved great physical struggles. Arquilla’s lesson learned began at the beginning of his column: in public security, physical might is important, and this is an utter security aspect. However, there are relevant cybersecurity nomenclature examples worth reviewing history heretofore. I believe the Bible offers a message that can be balanced, well, because Computer Science exists.  Image by Pexels from Pixabay
September 1, 2020
On the Topic of Domestic Graduate Students, I AM
In the September 2020 edition of Communications of the ACM, Moshe Y. Vardi wrote Where Have All the Domestic Graduate Students Gone. Vardi wrote, “Tech industry giants Apple, Amazon, Facebook, and Google were all founded by first- or second-generation immigrants” (link). As stated previously in another article I wrote, Vardi wrote that in the month of June during the year 2020 AD, President Trump suspended new work visas and banned tens of ten thousands of foreigners against establishing employment within the U.S.A.: this was temporary. Image by WikiImages from Pixabay
August 23, 2020
Stakeholder Contexts and Industry Standards: ISO/IEC 38500 IT Governance, but then an IT Compliance Framework
In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3). Image by Darwin Laganzon from Pixabay References Anonymous. (2016). JOBS MARKET: Me and my job. SC Magazine, 27(6), 15. Holt, A. L., Safari Books Online (Firm), & Books24x7, I. (2013). Governance of IT: An executive guide to ISO/IEC 38500. Swindon, UK: BCS, The Chartered Institute for IT. Olutoyin, O., & Flowerday, S. (2016). Successful IT governance in SMES: An application of the technology-organisation-environment theory. South African Journal of Information Management, 18(1), 1-8. doi:http://0-
August 22, 2020
Cyber Security: The New Digital Frontier, but the Same Spirit Battle
When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” (New International Version, Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. For the hearing impaired, here is the readable version of this podcast: link.  Image by Tumisu from Pixabay
August 20, 2020
On Neuromorphic Chips: Advanced AI, Deep Learning, and Neural Network Computer Architecture
In the August 2020 edition of Communications of the ACM, West Linn, OR, USA-based author and journalist, Samuel Greengard wrote Neuromorphic Chips Take Shape. The available data Greengard had is the claim that a Caltech (California Institute of Technology) professor invented this technology, neuromorphic chips. In this Podcast, I discussed the efficacy of this research. On, Search 'Neuromorphic Chips' on the top-right search link.  Image by FunkyFocus from Pixabay
August 19, 2020
On the Secure Internet of Medical Things
Bit Jet Kit: On the Secure Internet of Medical Things In the August 2020 Edition of Communications of the ACM (the Association for Computing Machinery), Chief Internet Evangelist at Google and 2012 AD to 2014 AD ACM president, Vinton G. Cert, wrote On the Internet of Medical Things, a column regarding healthcare and the widespread availability of household Internet and Telecom technologies applicable to healthcare. This Podcast is my response to this article in the August 2020 Edition of Communications of the ACM. For those with hearing difficulties, check out my blog entry: on my Bit Jet Kit Web site, search 'On the Secure Internet of Medical Things.' It is my written version for readers. Image by Colin Behrens from Pixabay
August 18, 2020
AIOps will help telcos manage AI at scale – a must in 5G networks
In August, 2020, Vice President of the TM Forum’s AI & Customer Experience, Aaron Boasman-Patel wrote AIOps will help telcos manage AI at scale – a must in 5G networks. On it, this is a podcast. Image by mohamed_hassan on Pixabay.
August 9, 2020
On VS Code, Starting Using C / C++
Two nights ago, on VS Code (Visual Studio Code), a popular IDE (integrated development environment), I successfully ran a simple box volume calculator app, and the language I used was C++. Listen, and find out more regarding how I accomplished this feat. For the hearing impaired, search  'VS Code' Episode art: Image by Tawanda Razika from Pixabay
August 9, 2020
How Control Theory Can Help Us Control COVID-19
On 17 April, 2020, 5:00 AM Chicago, IL time, Greg Stewart, Klaske van Heusden, and Guy A. Dumont released the IEEE SPECTRUM article How Control Theory Can Help Us Control COVID-19 (link). This is a reflection against the COVID-19 pandemic’s recorded measures. Image by Gerd Altmann from Pixabay
July 21, 2020
Windstream Uses Intelligent Automation to Cut Provisioning Time
In October 2019, Tim Kridel wrote Windstream uses intelligent automation to cut provisioning time by 80%. Against technology's sake, Kridel wrote network conversions do not happen. On this podcast, Find out more about NFVs, SDNs, and SD-WANs, and the relevance to contend with civil law.
July 20, 2020
It's Just SQL Server on Azure, Right?
On this episode, players can learn about the leading edge Microsoft AI Server technology, Azure, used for Microsoft's enterprise Relational Database Management System, SQL Server. However, the social issues surrounding big business are specifically law officers enforcing bureaucracy. This is unsustainable, so I recommend the big RDBMS' nemesis, Android Pie's SQLite database. Further, before Android 10 is selected, Android Pie should be selected for its predictive capabilities as to protect against a Minority Report society. Image by earvine95 on Pixabay.
July 19, 2020
Thermalytix--Using AI to Save Lives
Bangalore-based NIRAMAI developed a worthwhile and feasible diagnostic solution for detecting breast cancer in women. Image by Thanks for your Like • donations welcome from Pixabay
June 23, 2020
In Response to, "Legally Speaking AI Authorship?"
This month's Communications of the ACM come with the question: who is in charge of the AI creation and its derivative works, or are these even what man can call works in the software engineering lifecycle? Listen on the platform of your choice. Image by OpenClipart-Vectors from Pixabay
June 19, 2020
IS the Future of AI Women?
Against a rushed power shift to women dominating men as the AI leaders, forever, I contended AI and Android Pie have limits for more than women advancing AI, alone. Image by Gordon Johnson from Pixabay
May 15, 2020
Liberal Arts Computer Science Jobs
Smart List: 22 Coding and Computer Science Resources Getting Smart Staff 9 months ago. Because of AI, the value of a computer science degree will “diminish over time,” says investor Mark Cuban Image by Christo Anestev from Pixabay
November 3, 2019
H.R.2528 - STEM Opportunities Act of 116th Congress, 2019 AD (2019-2020)
On privacy, the US government should reject HR 2528. Image by Nino Carè from Pixabay
November 3, 2019
S. Res 319 Inaccuracy
Congress wants to encourage Hispanic degree earners, but does not have accurate demographic information. Image by Pete Linforth from Pixabay
November 3, 2019
On the military, the police
To government overreach, a computer science response. Image by b1-foto from Pixabay
November 3, 2019
Computer Science Jobs
If you don't have a company employment, then start your own business. Image by geralt on Pixabay
November 3, 2019
Information, Technology, and the Virtues of Ignorance
In 1986 AD, Daniel C. Dennett wrote Information, Technology, and the Virtues of Ignorance.For Dennett, good is an edible love affair. Toward hell, food adultery is a trajectory. Instead, I believe the trusted way and life is my one true ABBA in the flesh, Jesus Christ. Image by Lorenzo Cafaro from Pixabay
November 3, 2019
Inference on Binary Images from Binary Data
In September 1996, C. A. Glasbey had been releasing a University of Edinburgh paper, Inference on Binary Images From Binary Data. C. A. Glasbey wrote that digital images had been imperfect reality representations. Image by Free-Photos from Pixabay
November 3, 2019
When to Fire the Boss: A Tale of Three Sackings
On October 23, 2019, business reporter Dan Ascher released When to fire the boss: A tale of three sackings. Ascher reported that business leaders are close associates with their companies, but without them these companies have little existence. Image by VisionOfVictor from Pixabay
November 3, 2019
China Roundup: Xi’s power on bitcoin, the rise of Alibaba’s new rival
On TechCrunch, eight hours ago, Rita Liao wrote China Roundup: Xi’s power on bitcoin, the rise of Alibaba’s new rival. In Scripture, instruction regards competition. Image by RABAUZ from Pixabay
November 3, 2019
Analysis: Japan's historic Shuri Castle nearly decimated in raging fire: 'We have lost our symbol.'
Between six and seven hours ago, Fox News' Stephen Sorace reported Japan's historic Shuri Castle nearly decimated in raging fire: 'We have lost our symbol.'In Scripture, the Tarsus man, Saul, sent his Thessaloniki-located family a planning message. Image by Adam Derewecki from Pixabay
November 3, 2019
Switch is a Cross-Platform Open Source Application Launcher
On October 27, 2019,'s Martin Brinkmann wrote Switch is a cross-platform open source application launcher. In Scripture, anti-multi-platform support is. Image by Pexels from Pixabay
October 28, 2019