#header-inner {background-position: right !important; width: 100% !important;}

4/30/15

Complete Lesson.

is 'complete lesson' worthwhile to go through, to pay for, or at least 'advantage'?

i think that from a certain perspective it can be.

for example:
1. readying for a shot.
2. aiming.
3. pressing a trigger.
4. reloading a gun.

each of these lessons is worth something, has certain value in itself, but together they are worth more than sum of the parts.

so called 'synergy effect'.

Dragonfly Algorithm is part of something bigger, 'complete lesson', perhaps.

i have insights suggesting this occasionally.

---

'a warning shot' in the air also has it's uses,

perhaps does not require so much of an aim ...

---

see also, if You wish: Ammo Conservation.

etc ...

4/27/15

Software Complexity & Responsibility.

Google Android applications require accepting privileges grant.

depending on application privileges vary.

certain programs require access to phone's features as calling others despite user's knowledge or user's will at user's cost.

other require writing or reading data, that also pose risk of data loss or change etc ...

etc ...

generally every privilege is a risk, the less requirements application has the better, safer for user.

in theory data access could be split into more of more specific, detailed privileges but this requires more learning by users costing them time & perhaps sanity, at least to certain extent.

the less code the better.

i think that smartphones are so advanced technology (UFO in itself for me) that i don't have time of life to understand them completely, there are patches & versions updates as well that complicate matter, making it stressful race against time.

i've written software for android phone that is simple as possible, i've wrote it to not harm, i can't guarantee that someone didn't tamper with it afterwards, modifying it's behavior.

every piece of software on computer system or phone, etc ... poses extra threat to user.

we don't know how our software works, as it uses services of operating system & hardware that we do not understand fully, there are patches & updates as well.

sometimes software is hacked, but 'a top-down business decision' can also activate hidden features of a device as smartphone or computer system as well, for example code parts that breaks it or modifies behavior. because of software integration, communication & service design, perhaps more.

software can be quite selective as to what services or content it serves to certain people, for example there can be conditional instruction 'if' used with IP address of a computer system that decides what to serve certain user(s) when or if at all.

there are many more options as well.

i've wrote Mala Android Smartphone Software for counting Mantras or Prostrations.

i don't guarantee anything, feel free to use or not, at Your own Risk.

4/26/15

Stratics.

only a link here, to avoid data redundancy & inconsitency.

i think it can have uses with Stitie Space & Stitie Machine.

4/23/15

ARM Quant.

i think that Quantum Computers will contain 'Classic Computer' part, which might as well be ARM Architecture - makes very much sense for me.

ARM Architecture = Advanced RISC Machine.

both ARM Technology & Quantum Technology are complex, but powerful.

i think it's worth to prepare for times when they are combined.

perhaps Quantum Part of Quantum Computer is more than a speed-up device, perhaps it's tool of Advanced Physics, which has other uses than average programmer can imagine.

one of ideas used in Quantum Computing is qbit, something different than 4-state, as not too far as i know.

4/21/15

Coffee Terror & more or less 'Legal' Bribes.

i read that Java is Coffee in American English.

i heard that Coffee is very important in Islam's Law regarding 'Women Rights'.

Java is also Programming Language.

Do certain Java Developers earn suspiciously too high wages that cost us freedoms, is it form of bribe taking, in form of a very lucrative contracts?