Showing posts with label database. Show all posts
Showing posts with label database. Show all posts

Thursday, December 16, 2021

Precise logic vs. fuzzy logic.

 Precise logic vs. fuzzy logic.



The "barren plateaus" trap is one of the most cutting edge things in computing sciences. The precise data handling is working perfectly in a closed and very unilateral environment. But in the open environment, fuzzy logic is a more effective tool. 

And the power of fuzzy logic increases whenever the environment is turning larger and the data is turning more versatile. Fuzzy logic is in the key role for handling non-sorted data mass that is collected from the natural and chaotic environment. 

Have you imagined the situation that you go to the flat, where everything is in a certain order? You can't find anything from there, and then some other person comes in. That person finds everything that is needed less than the second. 

You cannot ever find anything faster than that person because that person knows everything in that room. The person knows every single nail in that flat. And that thing makes an impression.  But the prime question is does that person know anything else?

Does that person ever go outside? We can say that if the person would stay all the time at the same flat that person knows everything that is in the flat. There is no other information than the information about things that are necessary for finding things from a closed environment. 

That person would, of course, look outside sometimes, but the information that person gets is limited. There might be a car in the front of the house. But the person would not know why the car is at the front of the house. 

The limited environment is taking us to the "barren plateaus" trap. The person who lives in a closed environment seems to be wiser and more intelligent than a person who lives in an open environment. 

When the person who lives in an open environment comes into a strange space, that person must search for everything. The person who lives in that closed space must only remember where things are put. And then pick them from those places. 

In closed and very limited space everything can have certain and precise orders. But if the environment is very wide and the data is very versatile. The answer to the problems is fuzzy logic. 

In a closed environment, the person might make notes. And read where things are left. But if we are in an open environment making precise notes for things where we left something is impossible. Or those notes must be very large and that means they turn uncomfortable. 

If the person who is operating in an open environment wants to use precise logic. The person must read all notes all the time. For finding the answer to the question, where that person left for example the screwdriver? 

So the precise logic is not a practical thing for an open environment. The person must turn to use the different types of notes. That person can use multiple memo books where is marked places where is used certain tools. If we want to keep memos by sorting them by place. 

There is the possibility that we forget to put them there if we use the screwdriver. Or if we want to sort data by using places we must always read every single line in every notebook. And hope that if there is a marked screwdriver.  

But what if we sort those memos by using the name of the tools that make it possible to find the individual tool more easily. The most effective thing is to use different memo books for each tool. 

And the data is sorted by the name of the tool. When we want to find the screwdriver we must just take the memo book where is word "screwdriver". We can find the place. Where did we use that tool the last time? The searcher should find it on the last page. 

If there is a mark that the screwdriver is taken for use. But it is not returned which means that the screwdriver probably found that place. And the exact place where the searcher can find that tool. Will be found from the work order. This thing is called fuzzy logic. In computing, those notebooks are the tables of the databases. 

Wednesday, October 18, 2017

Devil's best trick is to claim, that he is not exist



Kimmo Huosionmaa

When we are talking about intruders of data systems, we must know that those intruders might be people who have spent years in the system, before they begin to leak information. This kind of intruder is harmful and hard to remove because he or she had become a member of the team. And that's why those sleepers are very hard to locate and isolate. Many people noticed that is written with spy term, what is in John  Lé Carre's novels.


Those methods are used in everyday life of industrial spying and information stealers world. A methodology of this kind of operation is, that when spying organization will get one person to the certain position of the system, he or she can make very much harm to that system. An agent might use harassment as a weapon with fumigate other workers out of their job and replace them with people like him or herself. That's why in systems must use offensive security, where security workers work undercover that they see what really is going on in their system.


That real-life sleeper is an agent who is put in the system, and that way make very much trouble to his or her clients. The best place to put that sleeper is some antivirus software company's coder, where that person can pollute many systems with malware code. Agent means a hostile operator, who works against companies interests. Normally those agents are very social and people want to believe their stories about how fine workers they are. But when we are talking about agents, we must realize that those persons are more often normal criminals that some governmental workers.


They might work for some criminal organization, what is led by organized crime, whose interests are stealing money from banks with hacking. Those operators might want to steal money from many bank accounts, what means that crime might stay out of security personnel's eye. That kind of criminals might steal the only couple of euros from millions of bank accounts, and because the transfer is so little, some people won't even notice, that their account is missing one or two euros.


And using this "cheese slider" methodology, those gangsters might take a couple of transfers in the same bank. If those people are clever, and use port accounts in many banks, to collect that stolen money in data form. Many gangsters make that kind of mistake, that they steal too much. If somebody realizes suddenly that his or her account is empty, that person normally calls to police. And that makes those money transfers easily to track. Where those people need an agent? They need that person to put their malware program to the server.


That kind of operations must be done outside from building because if all actions will happen inside from house, will data tracked immediately. But when gangsters will make them transfers with remote using the computer, they need access card and another kind of stuff, that they can accomplish the mission. But the problem is that bank's central computer will collect data of those transfers, and if gangsters have done that kind of operation they must destroy that database, that bank can't track them from the net. And that action must be done by malware because if that action is done by the agent the all actions will be uncovered by inner circle job.


But how an agent will rise to that kind of place, where that person make unlimited actions inside that network? Normally the agent will make him needful and helpful actor in the system. That rises he or she social rank in other person eyes. And what makes computer security team suspect that there is an agent inside the system, is that there is more so-called "little mistakes or errors" in system. How can data projector cut communication to the computer if cables are untouchable? Answer in machine or component called router.


Some operator must only disband that data port, and after that computer can't get the connection to the projector.  Normally that happens by giving router orders to shut down that gate what allows communication between data-projector and computer. After that even the best ICT-specialists can't get computer's screen to data-projector. What makes people harass other. One answer is that they do it for money, that somebody can replace some workers with the new one.

https://crisisofdemocracticstates.blogspot.fi/

New self-assembly nanotubes turn the impossible possible.

 New self-assembly nanotubes turn the impossible possible.  "The crystal structure of a carbon bilayer. The purple outer layer and blue...