Skip to main content

Hume's guillotine


Kimmo Huosionmaa

This story is fictional, and the origin is in Victorian England, where in some school has been targeted for burglaries. In this story for the thief is made the trap, what would uncover the reason for the crimes, and of course, who was made those burglaries. I don't know if this story true or false, but I will tell it to you now. And I hope that you enjoy it.  Do you know the term "Hume's guillotine"? The term is made by the test, what philosopher name Hume invented when he was tried to figure, who his students would tell the things, what they should not tell to other people. He told the story about the guillotine, what is an execution equipment, what is hanging on the top of the particular door in some building.

The idea is that the tester told different door for every single student, who was alone with him. The guillotine was not allowed to mention the outsiders, but of course, the students were allowed to tell that thing together, of course, the attractive thing behind every door, and the thing was safe behind it, what was filled with money. The idea was to test how loyal those students were to their teacher, or did they loyal for their mates, and share the secret with all the group members?

Or did they tell that thing only for their best friends? Or did they just "forget" to tell that above one of the doors is deadly guillotine to anybody? The idea of the test is, that if some person or persons would hesitate to step in some room, would that mean, that the person has kept the story of the guillotine in the own mind. But if in the front of some door would happen, that many people should not want to go inside the room, would that tell, that who would tell the secret to outsiders.

There is one problem with this kind of tests, the tester must know what are the students or gangsters behind the burglaries. So in the story, most of the safes are filled with cash, but in some safes were the test answers, and some of them were the sin lists of the teachers. The thing what would uncover the burglary was what safe would be broken. Every single safe was filled with one thing, and that would make easy to notice, who was the thief, and what could be the motive for that?

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that