Skip to main content

Is math real or not? Or are virtual things real or not?


Mathematics plays a vital role in many everyday actions. Things like Pi and trigonometry are in a vital role in geometry used to measure things like houses. And mathematics is used to create quantum decimal numbers. That is used in modern data encryption. 

People sometimes say that mathematics is a virtual thing. So that means math is not real. Another thing is that the world is full of things that are not real or that we must not follow. But leaving those things unattended causes serious situations. Same way as in math. We can say that things like lawbooks are virtual things. Laws are "only" written texts. But breaking them can cause serious consequences. 

Things like traffic lights base are that people follow those orders like red lights "voluntarily". And there are strict rules about what people must do when they see red light. Of course, people can continue driving when they see that stop sign. But if the police see that thing, it causes punishment. And another thing is that driving against red light causes accidents. The question is is the law real or not? 




There is no natural force that makes people follow the laws. But then we must realize that following the law is always better, than following some instincts. Humans made lawbooks. That means the law is a virtual and artificial thing that people must follow. The law itself affects nothing, but authorities that enforce the law are a thing that affects people. 

Sometimes people have discussions about topics like this. Is mathematics a real thing or not? Mathematics follows certain rules. And all mathematical formulas must be solved by following certain rules. We know that 1+1=2. But we also can write on paper that 1+1=300, but that is not right. 

The reason for that is we didn't follow the rules of mathematics. Sometimes computers make mistakes because one of their gates has some kind of overvoltage. And they calculate that 1+1=3. That was the case when people realized how important error detection is. But then we must ask another question from ourselves. That question goes like this. Should we handle everything that affects us as the real thing? 


Math plays a vital role in modern mass encryption.


Mathematical formulas like Riemann's conjecture and Shor's algorithms are not topics in so-called everyday discussions. But those things are playing a vital role in data security. And they are the most used algorithms in everyday cryptology. Without those algorithms, we don't have things like GSM-network. The encryption in messages makes it possible that the devices can filter away information that doesn't mean to it.

 So the encryption allows the device to select only data packages that are for it. And that increases the operational range of things like encoded radio-control devices and allows to use of multiple systems in the same frequency. Also, the same algorithms protect things like online payments. But as I wrote earlier. Encryption is much more than only protecting some messages from outsiders. 


A digital twin of the computer program or otherways saying backup of source code can use to detect attempts to inject non-wanted code into the user interface. 


Active data security means that the system makes a backup using the confirmed code. Then the system protects the digital twin. Then the system compiles that "digital twin" with the application's source code that operates in the user interface. If there are changes between those codes that means the program is corrupted. Or somebody tries to inject non-wanted or non-authorized code into the system. 


But then we must ask, are virtual things real?


We can ask, are things that affect us real? Things like computer programs are quite similar thing as mathematics. Computer programs are only text on computer screens. But those things interact with other things. And without those codes the computers are useless. We can say that all computer programs are similar to machines. 

They don't do anything else than things that are encoded in them. So the computer program is like some kind of steam machine. It makes only things that programmers authorize it to make. All errors and damages that computer programs make. Are made by humans. 

The term digital twin means the virtual model of physical things. Those digital twins are used in some kinds of simulations. But then we can think of the case that the computer program makes a backup copy of itself. Could we say that the backup copy is also a digital twin? That backup is the twin of the virtual thing. The system can use that "twin" to observe code. And if the system compiles those codes with each other it can see does somebody try to change the code or slip malware in the system. 


Comments

Popular posts from this blog

The AI-based PCs will replace current PCs quite soon. A Lenovo director says.

    The AI-based PCs will replace current PCs quite soon. A Lenovo director says.   Lenovo plans to replace current PCs by using new AI-based systems. The AI-based PC is the tool that makes computing more powerful, more effective, and safer than ever before. The Kernel-based AI that guards computers and identifies the users are tools that are required at this time of modern computing. The problem with this type of advantage is that if those AI-based system's servers are in China, makes the PC an ultimate control tool. Another thing is that the host who controls servers can use data collected from the users to create military AI applications. Computer games help to create AI that can respond to all types of actions. And AI also can create things like hypersonic lifting bodies and command systems for military tools. Also, AI can create new types of dual-use systems that control drone swarms in marketing situations for making dragon images in the skies. But the same systems can contro

Quantum computers and ultra-fast photonic microchips can danger even the most secure communication.

"Quantum computers could pose a major security risk to current communication systems in 12-15 years with their exponentially greater speed and code-breaking ability. (ScitechDaily, Today’s Most-Secure Communications Threatened by Future Quantum Computers) Quantum computers can break entire binary cryptography. And that makes all communication unsecured. That is one of the greatest threats in quantum computing. And this brings the arms race to the quantum age. The quantum computer can create codes that any binary computer can break. But the quantum computer can also break old-fashioned codes. And that makes it an ultimate weapon and sabotage tool.   Quantum computers can change the measurements of the ammunition in factories by changing the system calibration. Or it can delete databases from the opponent's computer systems. This thing can delete all SIM cards from mobile telephones. In peacetime, the hackers that operate using quantum systems can steal the names of the counter-

The new 3D printers are coin-size systems.

"The tiny device could enable a user to rapidly create customized, low-cost objects on the go, like a fastener to repair a wobbly bicycle wheel or a component for a critical medical operation. Credit: Sampson Wilcox, RLE" (Scitech, Tiny Titan: MIT’s Revolutionary Coin-Sized 3D Printer Fits in Your Pocket) Researchers created a 3D printer that is coin-size. That kind of printer can create things like microchips. But it's possible. Those tiny 3D printers can also work in extremely large-size projects. In simplest models, the 3D printers are positioned on tracks. The 3D printer itself is the tool, that can be part of the modular production systems.  There are visions of high-temperature metal printers installed on the gantry cranes. That makes those crane printers that can make even ship-size things. The crane that the printer controls can move back and forth and the printer can move horizontally. This kind of thing can turn the crane into a high-temperature 3D printer, that