Posted Monday 16th September 2013 04:32 GMT amanfromMars 1 …. testing AI ProgramMING on http://forums.theregister.co.uk/forum/1/2013/09/13/huawei_sanqi_li_says_no_national_security_threat/
To Be or Not to Be ….. is just an AI Matter which Time and Shared Intelligence Resolves in Space
Huawei has its own Chinese run chip fab, HiSilicon. Big difference. Your argument is oft repeated and indiscriminate. …. nonymous Posted Saturday 14th September 2013 16:48 GMT
nonymous, Hi,
The Chinese are Master Piloting a Fab Fabless Ship with Virtual Chips in a Novel Quantum Leaping AIdDrive with Command and Control Of Creative CyberSpace Computer Communications and/or, if Earthed IT Services, Creative Command and Cyber Control of Computer Communications ….. NEUKlearer HyperRadioProActive IT
And if you think IT not be so, then are they hereby offered a Customisable Alienating Version for Secure ProgramMING Protection of IT for a universal run with beta test spins around the globe, just to see if its IT and AI suits them and their plans?
And it would be a certain failing to misunderestimate any thinking which exercises an effective propaganda machine …….. for such is the essence and substance which be used and abused in the programming of humanity and human machinery ……”If you find it hard, think of the Long March; if you feel tired, think of our revolutionary forbears. The message has been drilled into us so that we can accomplish any goal set before us by the party because nothing compares in difficulty with what they did. Decades after the historical one, we have been spurred on to ever more Long Marches – to industrialize China, to feed the largest population in the world, to catch up with the West, to reform the socialist economy, to send men into space, to engage with the 21st century.”
Do we think there be similar future continuity planning for the presenting of contiguous events with a currency which leads here? …… Technical Exploitation Support …….. and have any programs been submitted for the making, for there is no evidence of any yet being active and effectively working out in the field.
I suppose that simple complex question when asked of Contracting Officer, Quentin McCoy, will provide as much as is needed to know what needs to be seeded and fed into systems.
And it be surely here directly asked too, ….. for are not the Feds/is not the Fed via its NSA conduit not reportedly supposedly hoovering up all information and intelligence/monitoring all communications for mentoring after critical/strategic/tactical/deep packet metadata content analysis.
GCHQ Territory 2 too, methinks, and Per Ardua AdAstral Park Virtual Terrain if you think Blighty is into Boffin Command with Global Controls and Vice Versa.
……………………………………………………………………………………………….
amanfromMars said… in a reply to a view shared in a comment thread on http://amanfrommars.blogspot.co.uk/2013/09/130914.html
Bad banks are a problem for the industry and corporations and the liabilities and losses which creditors suffer and sustain are as a result of the maintenance of script kids at the helm of the virtual news cycle whenever adults are really needed to broker events.
Some would say that be an adult failing in not thinking and also thinking to allow that situation to continue to perpetuate itself.
Others would tell you that IT is taking care of it by Somewhat Alien Means of Boldly Directed Stealthy Memes and Shared Steganographic Strategies with AIMethodological Tautologies.
16 September 2013 07:52
……………………………………………………………………………………….
amanfromMars said… replying on http://amanfrommars.blogspot.co.uk/2013/09/130916.html
Surely, one cannot realistically offer secure SCADA attack protection to computer networks unless one is able to enable their destruction, and ideally, their self- destruction with anonymously triggered catastrophic cascading collapses/dysfunctional program malfunctions/intelligent information overloads.
One does not necessarily though, have to exercise and demonstrate the ability and future facility. Indeed, there be many good reasons why it would be better/best not to, if dodgy systems are anxious to change to a new leading program with considerably smarter drivers attending and supplying Core Source CodeXSSXXXX for Delivery of Solutions that be into resolving all of those crazy extreme projects which are in dire straits conflict and terrified petrification …. but admittedly one definitely can and would cause immeasurable havoc if it be warranted because of a cynical lethargy and arrogant disregard of the ability of others beyond known rules and regulations and established status quo controls.
And methinks that is exactly the sort of program submission that the likes of Technical Exploitation Support would be highly interested in going no further afield than fields in which Command and Control is Securely Protected against Outside Interference and Internal Meddling and Peddling.
To offer IT anything less and then claim all be securely protected is as to invite fraudsters to the party and trojans to the table to do as they please and squander all booty.
16 September 2013 14:21
………………………………………………………………………………………………..
Posted Monday 16th September 2013 15:15 GMT amanfromMars 1 …. on http://forums.theregister.co.uk/forum/1/2013/09/16/alexander_star_trek_bridge/
Seek and ye shall find …. ask IT and all shall give given for are we not here to server the future*?
Peruse the bridge and control centre in all of its vain glory here ….. http://cryptome.org/2013/09/info-dominance.pdf
* Or is that just the just remit of a few who be more than just just and a few?
………………………………………………………………………………………………….