domingo, 31 de maio de 2020
[Pensé] I haven't done the test yet, the Possibility test, most everything indicates, that the bigger the Block (10, 100, 1000), the greater the possibilities of generating numbering.
[Nasdaq Index] (S12)(T16) +1 is Factor in "S" (S13) < T16 HIGH (⬆)
(1M) _ _ --_ _--- (S2,T2,S2,T3) < (S4) (T5)
(6M) ---_ _-- (T3,S2,T2) < (T5) (S2)
= (S12) (T16) +1 is Factor in "S" (S13) < (T16) HIGH⬆
[Rever] Industrial control and protection logic network
[...] Very high reliability figures cannot be formally justified for a piece of software. Failure probabilities lower than 1E-4 are rarely claimed or justified even in a highly diversified software system, and there is not an accepted approach for the use of quantitative evaluation for software reliability between the different countries. The situation is even more difficult concerning figures for software CCF. The current state of the art for the quantification of software reliability relies mostly on holistic approaches, such as conformance to appropriate safety standards such as IEC 61508, or statistical testing. The EU Euratom FP7 project HARMONICS (Harmonised Assessment of Reliability of Modern Nuclear I&C Software) will tackle the problem of software reliability quantification using analytical and Bayesian approaches that take into consideration all the information available, in particular evidence obtained by V&V.
[...] The logic network works for supporting logical inference of Bayesian network. In the result of some learning experiments using interactive data, we have confirmed that the proposed interactive learning method is useful for scene context reasoning.
[Rever] Prime numbers keep your encrypted messages safe — here's how
19 Jan 2018
[...] Don't know if you've heard, but there's a new largest known prime number in town.
On 26 December, mathematicians scored a late Christmas present when a computer owned by a 51-year-old engineer in the US discovered the numerical beast, which starts with a 4 and ends in 1 — with 23,249,423 digits in between.
If you need a refresher on the definition of a prime number, it's a number larger than 1 that's divisible only by itself and 1.
The first few primes are 2, 3, 5, 7 and 11. The rest, like 4 for instance, are not prime: 4 can be broken down to 2 times 2, as well as 4 times 1.
But when mathematicians and computer scientists talk about large prime numbers — hundreds or thousands of digits long — it's often in the context of encryption: big primes, they say, help send secure messages between people, or computers.
So why is that?
Introducing the RSA algorithm
Prime numbers are fundamental to the most common type of encryption used today: the RSA algorithm.
The RSA algorithm was named after the three mathematicians who first publicly unveiled it in 1977.
They commercialised the idea and did very well out of it.
(A mathematician at the UK Government Communications Headquarters devised it separately four years earlier, but it wasn't considered useful and ended up being shelved. Oops.)
The RSA algorithm, in essence, allows a message to be encrypted without the sender knowing the key, says Lynn Batten, a mathematician and security researcher at Deakin University.
Here's how it works. The maths might seem a bit gnarly, but… that's kind of the point. Stick with it!
Public key locks private messages
Let's say I want to send you an encrypted message.
To do this, you need to make a public key, which comprises two numbers, available to me.
First, you choose two prime numbers: 11 and 17. These aren't your key — just a starting point. In calculations, we call these numbers p and q.
You keep p and q private. (Yes, you need to mind your Ps and Qs.)
Multiply p and q to get 187. Let's call this value N — it's one of your public key numbers.
Your second public number is a smaller one, which you can choose, and goes by the nickname e.
There are some rules that restrict your choice*, but let's say you pick 7.
Congratulations! You've now set up your encryption scheme. Easy, hey?
Now publish N and e wherever you like — shout them from the rooftops if you want — but "you'd usually publish it on an online directory just like a telephone number", Professor Batten said.
How to encrypt a message…
Now I'm going to send you a message outlining how many bottles of beer are on the wall — 99, of course — but we don't want anyone else to know.
(Even if the message isn't a number, it can easily be represented as one; your phone or computer has made that conversion for you to read this article.)
I look you up on a directory and find your public key — your N and e — 187,7.
Then the calculations start. I raise my message to e (it's an exponential, get it?).
In other words, I multiply 99 x 99 x 99 x 99 x 99 x 99 x 99 (seven times) and end up with a very large number. It's more than 93 trillion.
I then divide this massive number by your N (187). The answer to this calculation is still pretty big (498,430,667,329.9412) — but in fact, all I'm interested in is the remainder.
Remember learning fractions and decimals? Divide a large number by a small number and you can end up with leftovers. For instance, 6 divided by 4 equals 1 with a remainder of 2.
(In maths jargon, this is called the modulus.)
In our encryption example, the remainder is 176. And it's this number that I send to you; that's our encrypted message. We don't care if it's intercepted, because only you can decipher it.
Aren't we clever?
... then decrypt it
But how the devil do you decrypt 176 to get my real message, 99?
Well, you start with another secret number called d.
It's calculated based on your two original, secret prime numbers (p and q) and your public e. In this case (trust me**) it's 23.
And now the numbers get even bigger. You take my message (176) and multiply it by itself 23 times, ending up with a mammoth figure that's 50-odd digits long.
Then divide this new, monster number by N (187, the product of your original primes p and q) and find the remainder.
Bingo! The remainder is 99 — my original message.
There you have it: an encrypted, then decrypted, message.
All up, you keep p, q and d secret; N and e are public.
There are, of course, online calculators that do all these sums for you. And in real encryption, you'd never choose simple prime numbers like 11 and 15 as p and q, Professor Batten explained.
You'd go for much larger primes, hundreds or maybe thousands of digits long.
The reason prime numbers are fundamental to RSA encryption is because when you multiply two together, the result is a number that can only be broken down into those primes (and itself an 1).
In our example, the only whole numbers you can multiply to get 187 are 11 and 17, or 187 and 1.
It's easy enough to break 187 down into its primes because they're so small.
But when you use much larger prime numbers for your p and q, it's pretty much impossible for computers to nut them out from N.
Massive Mersenne primes
Still, computers are getting faster and more powerful all the time, so mathematicians continue to search for large prime numbers.
And when it comes to the biggest known prime numbers, Mersenne primes are most prolific.
Named after a French polymath, Mersenne primes take the form of 2 multiplied by itself a certain number of times, minus 1.
The Boxing Day prime is a Mersenne prime: it's 2 multiplied by itself 77,232,917 times, minus 1.
Nine of top 10 largest known primes fall into the Mersenne category.
Mersenne primes hold a special place in encryption too.
It turns out that in binary — the language of computers — Mersenne primes can be denoted as strings of 1s only.
For instance, the number 3 is written as 11 in binary. 7 is 111, 15 is 1111, 31 is 11111 and so on.
But as neat and effective as RSA encryption is, it won't be our secret-keeper of choice forever.
When quantum computers, capable of performing billions of calculations each second, start unpicking public keys to break them down to their primes, RSA will no longer be safe.
RSA isn't the only encryption technique out there though, and research teams are already finding ways to ensure we stay secure in the quantum computing age.
As Professor Batten said: "There are plenty of other [techniques] that will do just fine."
* For the mathematically keen, these are the rules for finding your e:
Take 1 off p and q, then multiply them. In our case, this means 10 times 16, which gives us 160.
Your e can be anything you like, as long as it doesn't share any prime factors with 160: that is, 2 or 5.
So in our case, e can't be 2, 4, 5, 10, 20, 40 or 80. We went with 7.
** For the even keener — this is how you calculate d:
Remember how you took 1 off p and q and multiplied them to get 160? You then add 1 to this and divide by e. 161 divided by 7 is 23. That's our d!
Block Z10 in "Reformulation of creation Password"
[340064 ]
_____________
[ 1 ] [ 2 ] [ 3 ]
[ 4 ] [ 5 ] [ 6 ]
[ 7 ] [ 8 ] [ 9 ]
[ * ] [ 0 ] [ # ]
[...]
Password Format Block Z10
[XXXxxxXXXx] < 11131111 is Password
______________
[ X ] [ x ] [ # ]
Authentication of 2 factory "Block Z10" (more security).
[XXXxxxXXXx] < 11131111 is Password
[XXXxxXxxxx ] < 111215 is 2 step to "OK"
______________
[ X ] [ x ] [ # ]
sábado, 30 de maio de 2020
[Pensé] I want to see until June and July, I don't want politics during those months. I want to see if there will be containment of the virus in Brazil and advances in economic restructuring. The lack of management will make room for the vice or president of the congress, to take office as ruler of the country. But I don't think that's going to have to happen. This is no time for politics.
[Pensé] Block Z10 "add funds" (mp4)
https://blog.naver.com/zicutake/221984880012
https://youtube.com/watch?v=35o8LDtnctg
[Pensé] That's good, this could bring control of the Infestation.(UV)
[Rever] Scientists Consider Indoor Ultraviolet Light to Zap Coronavirus in the Air
[...] Some researchers hope a decades-old technology might get its moment and be deployed in stores, restaurants and schools.
[...] It has the ungainly name of upper-room ultraviolet germicidal irradiation, and it is something like bringing the power of sunlight indoors.
"We have struggled in the past to see this highly effective, very safe technology fully implemented for airborne infections," said Dr. Edward A. Nardell, a professor of global health and social medicine at Harvard Medical School. "We've done the studies. We know it works."
[...] Ultraviolet light mangles the genetic material in pathogens — DNA in bacteria and fungi, RNA in viruses — preventing them from reproducing. "You've killed it essentially," said William P. Bahnfleth, a professor of architectural engineering at Pennsylvania State University.
[...] Dr. Nardell estimated that installing commercially available fixtures for an intermediate-size warehouse-type store like Walmart would cost about $100,000, which might be too expensive for some smaller businesses.
The systems also add to electricity bills and require cleaning and maintenance. "They're not plug in and walk away forever," Dr. Nardell said.
[...] During five years of experiments at several schools there, students in classrooms outfitted with ultraviolet fixtures were less likely to catch and spread some contagious diseases, such as smallpox and mumps.
The most striking divergence occurred during the spring of 1941 when measles swept through schools around Philadelphia. At Germantown Friends School, one of the schools studied, ultraviolet fixtures had been installed in the primary grade classrooms. There, about 15 percent of children who did not possess immunity to measles — that is, those who had not previously contracted the disease — became sick.
In the upper-grade classrooms, where ultraviolet fixtures had not been installed, more than half of the susceptible students contracted measles.
[Pensé] Can I do this without looking like an unscrupulous handler who "Take the Candy out of Europe"? Would it cause market dispute, and raise the roles of OI telecommunications, on the Stock Exchange?
[Rever] Telefónica deve trazer OpenRAN para Brasil ainda em 2020
[...] Controladora da Vivo, a Telefónica anunciou nesta quarta-feira, 18, uma união com as empresas Altiostar, Gigatera Communications, Intel, Supermicro e Xiling voltada para a implementação de redes de acesso móvel abertas (OpenRAN) em 4G e 5G. As primeiras provas do conceito devem ocorrer ainda em 2020 nos mercados prioritários do grupo, incluindo o Brasil.
[Rever][Analyze] OpenRAN
[...] Project Group is an initiative to define and build 2G, 3G and 4G RAN solutions based on a general-purpose vendor-neutral hardware and software-defined technology.
[...] This project group's main objective is the development of fully programmable RAN solutions based on General Purpose Processing Platforms (GPPP) and disaggregated software so they can benefit from the flexibility and faster pace of innovation capable with software-driven development.
To achieve this, the project helps enable an open ecosystem of complete solutions and solution components that take advantage of the latest capabilities of GPPPs, both at a software level and also using programmable offload mechanisms such as field-programmable gate arrays (FPGA).
The project complements existing TIP projects and focuses on disaggregation of virtualized RAN solutions into different components and ensuring each individual component can be efficiently deployed on GPP platforms.
What is OpenRAN?
Disaggregation of RAN at HW & SW level on vendor neutral, GPP based platforms
Open Interfaces – Implementations using open interface specifications between components (e.g. RU/CU/DU) with vendor neutral hardware and software defined functions
Multiple Architecture Options
– An all integrated RAN with disaggregation at SW and HW level
– A split RAN with RU, BBU (DU/CU)
– A split RAN with RU, DU and CU
Flexibility – Multi vendor solutions enabling a diverse ecosystem for the operators to choose best-of-breed options for their 2G/3G/4G and 5G deployments
Solutions implemented on either Bare Metal or Virtualized or Containerized Platforms
Compliant to the OpenRAN principles as per OpenRAN Charter
Community contributions
The items referenced below are official contributions made to TIP from TIP members.
OpenRAN: The next generation of radio access networks
Radio access networks must evolve with rising data demand. Current telecommunications network infrastructure requires significant upgrades to keep up with increasing network demand. Operators will be compelled to evaluate new radio access network (RAN) technology from various technology providers.
Telecom Infra Project (TIP) has created an OpenRAN project group which focuses on developing a vendor-neutral hardware and software-defined technology based on open interfaces and community-developed standards. Unlike traditional RAN, OpenRAN decouples hardware and software. This gives operators more flexibility as they deploy and upgrade their network architecture in various deployment scenarios and geographies.
[Pensé] Has an error in thought below; the issue of passthrough of 1% the profits, only the profits. I have to revise it.
[Theory][Test] Public Funds System on the Internet; The majority of it is the one who makes the choice. [Part.2]
A good example is the volume. If the volume of negotiations reach $1000 at the end of each month, companies will receive 1 percent of everything.
Then investors will benefit with the variation of the index, the positive 1 percent each percentage of percentage is return to the companies in the index. The variation of the index is based on the quarterly report of companies.
[...]
30/05 2020
[Pensé] I liked it, Richard Ells opened up my ideas a little, the initial idea was funds, but I can substitute digital coins. It's just a test. a demo.
The idea opens space for the creation of indexes, as an investment space for small companies.
sexta-feira, 29 de maio de 2020
[Pensé] Uno Blog em Deepweb "Galaxy3" galaxy3bhpzxecbywoa2j4tg43muepnhfalars4cce3fcx46qlc6t3id.onion/profile/zicutake
[Pensé] Fico feliz em ajudar o Chile, mais vai precisar de ajuda de Fora, se não esse dinheiro vai ser gasto sem Busca da Efetividade do Combate a Mortes e Infestação do Vírus. Precisa de Gestão de fora. Ali tem Política.
[Pensé] SciELO has a wonderful job. There are articles, research, that bring everything together in social, economic, technological and human science.
[Rever][Analyze] Defining cyberterrorism - Laura Mayer Lux / Chile
[Rever] Types of IT Architects: A Content Analysis on Tasks and Skills
[...]ref.: https://scielo.conicyt.cl/scielo.php?script=sci_arttext&pid=S0718-18762020000200103
ENC: Access the full 16-page Cointelligence report on Electroneum
De: Richard Ells
Enviada em: 29/05/2020 17:26
Para: pedrodefilho@hotmail.com
Assunto: Access the full 16-page Cointelligence report on Electroneum
| ||||||||
| ||||||||
|
Click this link to unsubscribe
ENC: Daily Investor Update: U.S. senators urge probe of TikTok on children's privacy
De: Reuters
Enviada em: 29/05/2020 17:02
Para: pedrodefilho1995@gmail.com
Assunto: Daily Investor Update: U.S. senators urge probe of TikTok on children's privacy
|
|