Skip to main content

Writing about methods what is using to mapping the social network

https://hisrtoriaajapolitiikkaa.wordpress.com

Kimmo Huosionmaa

When we are making texts in the social media, we must understand, that they can be in there even forever after we are closing our account. Sharing the texts without permission is of course against copyrights and that's why against law and trust if the person, who wrote that text is told, that the texts should not be shared. This thing must be understood before starting to share any texts in the net. If the person whose texts have been shared without permission or mentioning the source, would that cut the relationships to that person who shared the texts.

But the worst case is, that those texts have been printed or published and because the copyright laws are strict, the person, who makes those prints must pay every print, and the second thing is, if that text has bought profits for the person, who has stolen the text, should those profits pay to the copyright owner, because if the text is stolen, the court of law must say, that the profits must be given to the state or to the person, whose texts have been published. The contract, what is made could save the publisher from the payments, but this contract should follow the orders, what is controlling the contracting and publishing.

The thing, what is always forgotten, is that the form of those texts is telling, that if the text is written by somebody else. The sudden change of the style of writing is telling, that the account is used by some other person, what suppose to be the writer. If the writer had just used the clear and sharp, error-free text, and the text is changing the mode, that the writer stops to follow the linguistic orders. The thing tells that something is changed in the texts.

An analyst can also conclude is the text made in a peaceful place or is it made in when the writer is hurrying. If the observer can follow the writing process, would this person see, is the monitored object in the place, where the disturbing is happening very often. And also the way to use computer tells is there the plugs available or should the user use only the battery, what gives limits for listening to music or use other applications, but this requires full access to the targeted computer. If the opinion of the person suddenly changes, and the person, who was sooner supported free and open source software would transfer to support commercial software, that would tell that some kind of contracts has made between this person and some corporation. And this turns this person to use the commercial tools.

A form of the texts is used to track the people, who are connected together by using social media. And the use of social media is telling something about the hobbies and interests of the people, who are using it. So it can use as the profiling tool for the companies and governments. But it can also uncover the connections between the people. In this case, social media is used for creating a map of the network of some recruiters, what are hiring people for their clients.

In this case, the person is mapping, the phrases, what the persons use are following by using social media is used to find out the connections, what this person has. And even if the person would not want to use social media, the flying words like "don't be afraid of that" in the cases like other people ask permission to come to visit to the monitored person, or the central, whose social relationships wanted to map.

In this case, the weight of the person in the social network acts similarly with the mass of the particles like planets in the universe. If the person has lots of social mass,  the person has something to offer to those contacts. And one thing is clear if the person has lots of connections to high-level jobs. But those job requirements is always higher education, and if the high-educated people are connected with this agent in other social media solutions, would there be workplaces what they can apply.

And if we are taking the opposite case where the uneducated people are connecting with some recruiting agent, would this person have very much workplaces, where the higher education is not needed. But there are some other things, what we can find out of those texts, what are published on the Internet, and one is if some persons are very sure, that they would have the place, would they style to write the things to be different than the persons, who are not so sure about this case, that they would be elected in the workplace.

Comments

Popular posts from this blog

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

Electric power innovations. Fuel cells in aircraft and solar panels over Arizona canal.

  "ZEROe teams powered on the iron pod, the future hydrogen-propulsion system designed for Airbus’ electric concept aircraft." (Intersting Engineering, Airbus's ZEROe: First engine fuel cell powers up for hydrogen flight) Electric power innovations. Fuel cells in aircraft and solar panels over Arizona canal.  Airbus Zero is a testbed for fuel cells that are used in commercial aircraft. The problem with aircraft is always noise and pollution. If the aircraft uses electric engines. That decreases noise levels and cleans the air, especially around airfields. Lightweight solar panels that can be installed on the wings and body of aircraft can give electricity to electric engines. And they can extend an aircraft's operational range.   The thing that makes this kind of system interesting is that the "flying cars" or cheap VTOL aircraft can use them as a power source. The hydrogen power cells can give energy to electric aircraft at night time. And that makes them m