Skip to main content

Writing about methods what is using to mapping the social network

https://hisrtoriaajapolitiikkaa.wordpress.com

Kimmo Huosionmaa

When we are making texts in the social media, we must understand, that they can be in there even forever after we are closing our account. Sharing the texts without permission is of course against copyrights and that's why against law and trust if the person, who wrote that text is told, that the texts should not be shared. This thing must be understood before starting to share any texts in the net. If the person whose texts have been shared without permission or mentioning the source, would that cut the relationships to that person who shared the texts.

But the worst case is, that those texts have been printed or published and because the copyright laws are strict, the person, who makes those prints must pay every print, and the second thing is, if that text has bought profits for the person, who has stolen the text, should those profits pay to the copyright owner, because if the text is stolen, the court of law must say, that the profits must be given to the state or to the person, whose texts have been published. The contract, what is made could save the publisher from the payments, but this contract should follow the orders, what is controlling the contracting and publishing.

The thing, what is always forgotten, is that the form of those texts is telling, that if the text is written by somebody else. The sudden change of the style of writing is telling, that the account is used by some other person, what suppose to be the writer. If the writer had just used the clear and sharp, error-free text, and the text is changing the mode, that the writer stops to follow the linguistic orders. The thing tells that something is changed in the texts.

An analyst can also conclude is the text made in a peaceful place or is it made in when the writer is hurrying. If the observer can follow the writing process, would this person see, is the monitored object in the place, where the disturbing is happening very often. And also the way to use computer tells is there the plugs available or should the user use only the battery, what gives limits for listening to music or use other applications, but this requires full access to the targeted computer. If the opinion of the person suddenly changes, and the person, who was sooner supported free and open source software would transfer to support commercial software, that would tell that some kind of contracts has made between this person and some corporation. And this turns this person to use the commercial tools.

A form of the texts is used to track the people, who are connected together by using social media. And the use of social media is telling something about the hobbies and interests of the people, who are using it. So it can use as the profiling tool for the companies and governments. But it can also uncover the connections between the people. In this case, social media is used for creating a map of the network of some recruiters, what are hiring people for their clients.

In this case, the person is mapping, the phrases, what the persons use are following by using social media is used to find out the connections, what this person has. And even if the person would not want to use social media, the flying words like "don't be afraid of that" in the cases like other people ask permission to come to visit to the monitored person, or the central, whose social relationships wanted to map.

In this case, the weight of the person in the social network acts similarly with the mass of the particles like planets in the universe. If the person has lots of social mass,  the person has something to offer to those contacts. And one thing is clear if the person has lots of connections to high-level jobs. But those job requirements is always higher education, and if the high-educated people are connected with this agent in other social media solutions, would there be workplaces what they can apply.

And if we are taking the opposite case where the uneducated people are connecting with some recruiting agent, would this person have very much workplaces, where the higher education is not needed. But there are some other things, what we can find out of those texts, what are published on the Internet, and one is if some persons are very sure, that they would have the place, would they style to write the things to be different than the persons, who are not so sure about this case, that they would be elected in the workplace.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that