Skip to main content

Data gloves and weapon technology



Kimmo Huosionmaa

Have you read the book named "Dr. Adler"? That book is telling a story about a notorious doctor, whose code name was "Dr. Adler", and that man had the weapon, what was a prosthesis, what is transformed as the notorious killing-machine. The shape of this thing was the prosthesis, what was equipped with electromagnetic or resonance weapons, what would explode entire human if it would be targeted to some persons.

The problem with this kind of weapons is that they are connected straight to the nervous system, and this would allow taking the user under the control by some remote station. Those computer-based systems can also input the other data, what their sensors collect, and that means that those systems can be used to program the user for thinking another way. The energy, what those systems need might to create by using plutonium batteries, what would have very long-enduring life.

That kind of solutions can be created in some military laboratories in the world, and modern computer technology would allow creating this kind of thing, Sometimes I have thought, that this kind of thing can be installed in the human body that the person would not even know about that thing. And the idea of this thing is that the prosthesis is put surgically under the skin of the patient or victim, depends on what kind of words we might use about this kind of test-persons.

Datagloves can be used to remote control the robots, but they can be weapons themselves. Those gloves might use gesture control or they can be connected straight to the nervous system. In the first case those clothes weapon system will be activated by drawing a certain form in the air, and in the second case, the attack mode would be activated by the nerves of the hand. And they can operate in a similar way, as the systems, what is surgically installed in the body. They are easier to use because the EEG-system would communicate through the skin, and this system can wear as easily as gloves.

In conventional versions, the gloves can have high-voltage electrodes, what is installed in the insulation layer, what is made by using high-voltage electric insulators. Those gloves can be equipped with the resonance loudspeakers, what can break bones or electromagnetic transmitters, what would form an electric arc to the target or destroy computers by EMP-pulse. The systems that are involved those weapons can be really sophisticated and include things like infrared sensors, what would input the data straight to the nervous system.

Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that