Skip to main content


Showing posts from August 16, 2020

Featured Post

Resuming Pace: I Shall Not Be Pursuing a Second Bachelor's Degree

On May the 5th, 2021, I used a strong position deciding my pursuit of a second Bachelor’s degree: my choice was the University of Maryland Global Campus (UMGC, link ), but I decided to resume my Master’s program, by itself.  Let me explain with Scripture: the Gospel of Jesus Christ According to Matthew, specifically. In ancient times, records of a man called Jesus the Christ were written. Among these records was a Gospel, According to Matthew, of Jesus Christ. According to legend, Jesus Christ stated, “Blessed are the meek: for they shall inherit the earth (KJV, Matthew 5:5, link ).” Jesus the Christ was saying those who are submissive shall inherit the earth rather than those who are brash.  In my attempt at starting a second Bachelor’s program, I eventually realized I had been too pushy: I wanted the May 19th start date, and I wanted the admission process expedited, I wanted ease of access between majors, I wanted advantages to the application process because of what UMGC (I was gra

Stakeholder Contexts and Industry Standards: ISO/IEC 38500 IT Governance, but then an IT Compliance Framework

ISO / IEC 38500 IT Governance ^ Compliance In information technology, standards for administration and enforcement of general applications are related to the International Organization for Standardization, or ISO, and the International Electrotechnical Commission, or IEC. The ISO/IEC 38500 IT governance and compliance framework is such a standard. According to A. L. Holt (2013), directors and senior officers understanding their responsibility for governing information technology systems addresses three issues: procured system integration, responding to legislative requirements for storing personal data, and documentation (Part A, Sec. 3).  SMEs Linked to Measurable Successful Outcomes With regard to small and medium-sized enterprises, or SMEs, Olaitan Olutoyin and Stephen Flowerday suggested that the IT governance structure and the operational governance processes are linked to measurable successful outcomes by three key pillars (2016). Olutoyin and Flowerday (2016) said that the thre

Cyber Security: The New Digital Frontier, but the Same Spirit Battle

                Considering Holy Security When Paul, formerly known as Saul of Tarsus, was preaching the good word, he saw the purpose of protecting the assets of a person as ultimately important. Paul said, “Put on the full armor of God, so that you can take your stand against the devil’s schemes” ( New International Version , Eph 6:11-17). Paul said to protect against evil with ABBA's word. In my view, this means applying the spirituality of holy defense to the life of an individual in any place and time. In contemporary times, cybersecurity can be a digital representation of the principalities of holiness effectively protecting against the sins of humanity. Cyber Security Hygiene Larry Magid shared insights about cyber security. Magid said, “So your cyber hygiene isn’t just about protecting you, it’s about protecting all of us” (Magid, 2014). The woman should protect her own interests and the interests of those who she works with along with her clients because true security

On Neuromorphic Chips: Advanced AI, Deep Learning, and Neural Network Computer Architecture

Neuromorphic Chips to Become Affordable In the August 2020 edition of Communications of the ACM , West Linn, OR, USA-based author and journalist, Samuel Greengard, wrote Neuromorphic Chips Take Shape . The available data Greengard had is the claim that a Caltech (The California Institute of Technology) professor invented this technology, neuromorphic chips. Greengard wrote, “The concept of a brain-like computing architecture, conceived in the late 1980s by California Institute of Technology professor Carver Mead, is suddenly taking shape” (Greengard, Aug 2020, p. 9). Since the date, today, is around forty years later, this technology has remained dormant, but not in the research, thus so recent advancements probably allowed neuromorphic chips to become affordable (With LTE capabilities, see current pricing of a standard productivity PC, an i5 Microsoft Surface Pro . With 3G capabilities, alternatively see the current pricing of a legacy, but GPU intensive PlayStation Vita . Safely Su

On the Secure Internet of Medical Things

The Internet and Telecom of Medical Things In the August 2020 Edition of Communications of the ACM (the Association for Computing Machinery), Chief Internet Evangelist at Google and 2012 AD to 2014 AD ACM president, Vinton G. Cerf, wrote On the Internet of Medical Things , a column regarding healthcare and the widespread availability of household Internet and Telecom technologies applicable to healthcare. Related to the novel coronavirus, COVID-19, Cerf wrote that he experienced an unsettling doctor’s call because Cerf’s goal, a doctor analyzing his health, was rejected, but the offered alternative, a video consultation, was inadequate. Cerf wrote, “This led to the natural conclusion that remote detection would be helpful in these conditions” (Cerf, Aug 2020, p. 5). Cerf was saying this: he wanted a solution to the COVID-19 virus, but he had not planned an immediate solution to this contagion passing from one entity to another, so he ought to discuss solutions to this problem. A

Contact Form


Email *

Message *