Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
Register for free to join our community of investors and share your ideas. You will also get access to streaming quotes, interactive charts, trades, portfolio, live options flow and more tools.
vmw licensing new deals.....no more perpetual license, which could herald v management statement of no perpetual licenses.....cuz wades a crook?
so's mills.
would that tell us something?
Merry Christmas to us. longer lives for all of us good people.
remembering vmw patent based on v ip 266 for 'testing'; lg/broadcom/vmware/vmware and dell; dell sold off vmw for broadcom to buy without alerting the general investing public to their ultimate quest. and it's the lg adopted nephew now trying to cut out the former ceo's family? timing says the old ceo set it up, but the adopted ceo is trying to become the new king over the old samsung family and the rest of soko. heck , they even had the samsung guy in jail, but now he's out and likely trying to negotiate a deal with the wife and daughters. but likely , they already have a deal? but if the deal hinges on v ip.......and the old ceo's stating of legacy for his wife and daughters....a problem for the new guy? or , that 's one scenario? now to complicate things more, mike lynch....security/vip. discussions with lg/sammie/ etc during the v against the world x msft litigation? were they in a deal, which got sidelined by v ip? valde , one would think, should have interesting information or suspicions..meetings he didn't get to attend? or the other boards x wade, farias, mills? But it's just my fantasy/ies.
====
Certainly! Let’s explore the fascinating connection between Broadcom’s Test Data Management (TDM) and time and frequency.
Broadcom’s Test Data Management (TDM):
Broadcom’s Test Data Manager (TDM) is a comprehensive solution for managing test data across various environments.
Key features of Broadcom’s TDM include:
Data Privacy and Compliance: Helps address data privacy and compliance issues related to corporate mandates and regulations.
Discovery and Profiling: Identifies personally identifiable information (PII) across multiple data sources.
Mainframe Support: Allows testing using small, rich subsets of test data directly within the mainframe.
Environment Cloning: Automatically clones data sets provisioned for testing, enabling parallel work by multiple teams.
SAP and Modern Environments: Supports testing in legacy environments (including mainframe and SAP applications) as well as modern mobile and microservices environments123.
Time and Frequency:
Time and frequency are fundamental concepts in physics and metrology.
NIST’s Time and Frequency Division is a leader in time and frequency measurement and control.
Their work includes:
Maintaining standards for time and frequency.
Providing official time to the U.S.
Research and service activities in time and frequency metrology.
NIST’s projects cover topics such as atomic clocks, lasers, cold atoms, and quantum computing45.
In summary, Broadcom’s Test Data Management enhances data privacy and compliance, while NIST’s Time and Frequency Division ensures accurate timekeeping and frequency standards for scientific and technological advancements14. 🌟⏱️
Certainly! Let’s explore the connection between LG Electronics and Broadcom Corporation:
LG Electronics and Broadcom’s 5G WiFi Technology:
LG Electronics has chosen Broadcom’s 5G WiFi technology (based on the IEEE 802.11ac standard) for use in select 2013 LG digital TV models.
By adopting Broadcom’s technology, LG enables consumers to seamlessly stream and share high-resolution content between mobile devices and smart TVs.
This partnership allows LG consumers to escape small screens and reliably stream HD-quality video onto larger displays.
The 5G WiFi technology delivers dramatic capacity, range, and power benefits.
It significantly improves home wireless range, provides higher-capacity video streaming, and reduces power consumption in mobile devices.
LG Electronics leads the market with next-generation digital TV innovations, enhancing the consumer’s viewing experience1.
Broadcom’s Commitment to 5G WiFi:
Broadcom introduced the industry’s first 5G WiFi chips at CES 2012.
The company committed to enabling the adoption of 5G WiFi technology across all wireless product segments.
The LG partnership marks an important milestone—the industry’s first 5G WiFi Smart TV.
Broadcom continues to expand the ecosystem of 5G WiFi products available to consumers and drive rapid adoption of this technology1.
In summary, LG’s adoption of Broadcom’s 5G WiFi technology enhances the connectivity and streaming capabilities of LG digital TVs, providing consumers with a seamless experience for sharing content between devices1. 🌟📺
Certainly! Let’s explore the connection between LG Electronics and Broadcom Corporation:
LG Electronics and Broadcom’s 5G WiFi Technology:
LG Electronics has chosen Broadcom’s 5G WiFi technology (based on the IEEE 802.11ac standard) for use in select 2013 LG digital TV models.
By adopting Broadcom’s technology, LG enables consumers to seamlessly stream and share high-resolution content between mobile devices and smart TVs.
This partnership allows LG consumers to escape small screens and reliably stream HD-quality video onto larger displays.
The 5G WiFi technology delivers dramatic capacity, range, and power benefits.
It significantly improves home wireless range, provides higher-capacity video streaming, and reduces power consumption in mobile devices.
LG Electronics leads the market with next-generation digital TV innovations, enhancing the consumer’s viewing experience1.
Broadcom’s Commitment to 5G WiFi:
Broadcom introduced the industry’s first 5G WiFi chips at CES 2012.
The company committed to enabling the adoption of 5G WiFi technology across all wireless product segments.
The LG partnership marks an important milestone—the industry’s first 5G WiFi Smart TV.
Broadcom continues to expand the ecosystem of 5G WiFi products available to consumers and drive rapid adoption of this technology1.
In summary, LG’s adoption of Broadcom’s 5G WiFi technology enhances the connectivity and streaming capabilities of LG digital TVs, providing consumers with a seamless experience for sharing content between devices1. 🌟📺
"Humphrey Chen, executive director of New Technologies, Verizon Wireless added, “We’re seeing interest from Verizon Wireless customers in the area of mobile personas, which allow a personal mobile phone to be leveraged in a professional setting in a secure way that is IT-approved. The kind of virtualization VMware offers helps to make this happen, and we're evaluating ways to help our customers achieve this.”"
personas, quantum states/fourier transforms/ time to frequency
time division multiplexing.
frequency components.......and how granular do you want the frequency transforms....time to frequency transformations...and frequency to time transformation?
emPath and time priority systems.
Certainly! Let’s explore the fascinating connection between time and the electromagnetic state.
Electromagnetic Waves in the Time Domain:
Maxwell’s equations predict the existence and velocity of electromagnetic waves based on simple measurements of vacuum’s permittivity and permeability.
In vacuum, the charge density ? = J¯¯¯ = 0, simplifying Maxwell’s equations:
Faraday’s law in vacuum: ? × E ¯ = - µ o ? H ¯ ? t
Ampere’s law in vacuum: ? × H ¯ = e o ? E ¯ ? t
Gauss’s law in vacuum: ? · E ¯ = 0
Gauss’s law in vacuum: ? · H ¯ = 0
The electromagnetic wave equation (Helmholtz wave equation) emerges:
? 2 E ¯ - µ 0 e 0 ? 2 E ¯ ? t 2 = 0
Quantum Electromagnetic Waves:
Quantum mechanics extends this understanding to the microscopic scale.
Photons, as quantum particles, exhibit wave-particle duality.
The electromagnetic field is quantized into discrete energy levels.
Quantum electrodynamics (QED) describes the interaction of charged particles with electromagnetic fields.
Time Evolution of Quantum States:
Quantum states evolve over time according to Schrödinger’s equation.
The time-dependent wave function describes the probability distribution of a quantum system.
Electromagnetic interactions influence this evolution.
In summary, the relationship between time and the electromagnetic state is fundamental in both classical and quantum physics. Understanding how electromagnetic waves propagate and evolve over time is essential for various scientific and technological applications123.
ex-wife?
Certainly! Let’s explore the fascinating connection between quantum computers and the Fourier transform.
Quantum Fourier Transform (QFT):
The Quantum Fourier Transform (QFT) is a fundamental operation in quantum computing.
It is the quantum analogue of the classical discrete Fourier transform (DFT).
The QFT efficiently computes the Fourier transform of a quantum state, revealing the frequencies present in that state.
Key points about the QFT:
Applications: The QFT plays a crucial role in various quantum algorithms, including:
Shor’s algorithm: Used for factoring large numbers and breaking classical encryption schemes.
Quantum phase estimation algorithm: Estimates eigenvalues of unitary operators.
Hidden subgroup problem algorithms: Solve problems related to group theory.
Efficiency: The QFT can be efficiently implemented on a quantum computer using a decomposition into simpler unitary matrices.
Quantum Circuit: The discrete Fourier transform on amplitudes can be realized as a quantum circuit using only Hadamard gates and controlled phase shift gates.
The number of qubits in the quantum circuit corresponds to the size of the input state.
Compared to classical DFT, which requires exponentially more gates, the QFT achieves exponential speedup.
Uncertainty Principle: Like its classical counterpart, the QFT exhibits the uncertainty principle. Functions localized in the time domain have spread-out representations in the frequency domain and vice versa.
Fourier Transform:
The Fourier transform is a mathematical tool used in physics, engineering, and mathematics.
It converts a function from the time domain into a representation that describes the frequencies present in the original function.
The output of the Fourier transform is a complex-valued function of frequency.
Imagine decomposing the sound of a musical chord into the intensities of its constituent pitches. The Fourier transform achieves a similar decomposition.
Joseph Fourier introduced the transform while studying heat transfer, where Gaussian functions (important in probability theory and statistics) appear as solutions to the heat equation.
In summary, the Quantum Fourier Transform is a powerful tool in quantum computing, allowing us to analyze quantum states in terms of their frequency components, just as the classical Fourier transform does for classical functions123.
"Certainly! In Texas, for a trust to be valid, it must meet specific requirements:
The Settlor (the person creating the trust) must have a present intent to create a trust.
The Settlor must have the capacity to convey assets to the trust. Capacity includes being over 18 years old, lawfully married, or a member of the armed forces, and being of sound mind.
The trust must comply with the statute of frauds, which generally requires certain contracts to be in writing and signed by those bound by them. If the trust holds real property, it must be in writing.
The trust must have a legal purpose; its terms cannot require the trustee to commit criminal or tortious acts or acts contrary to public policy.
The Settlor must identify the property covered by the trust and place it in the trust for the benefit of the beneficiaries.
The trust must have a trustee who holds legal title to the property for the beneficiaries.
The trust must have ascertainable beneficiaries.
The trust may not violate the Texas Rule Against Perpetuities1.
Regarding corporate licensing documents:
A trust can hold corporate licensing documents as part of its assets.
There is no legal requirement to record a trust in a public forum, such as a court or a state institution. Trusts allow Settlors to manage their property discreetly and distribute it as they choose to beneficiaries1.
In summary, a trust in Texas can indeed hold corporate licensing documents, and its validity depends on meeting the specified requirements. 🌟📜
Learn more
1
raniacombslaw.com"
broadcom just changed the licensing for vmware to subscriptions and ended perpetual licenses.
if, broadcom can do it for vmware, why not for vcsy? or some other company? but i'm thinking broadcom has the chops.
LG and VMware Join Forces to Accelerate Enterprise Adoption of Employee-owned Smartphones
December 7, 2010
Share "LG and VMware Join Forces to Accelerate Enterprise Adoption of Employee-owned Smartphones" on Twitter
Share "LG and VMware Join Forces to Accelerate Enterprise Adoption of Employee-owned Smartphones" on Facebook
Share "LG and VMware Join Forces to Accelerate Enterprise Adoption of Employee-owned Smartphones" on LinkedIn
LG and VMware Join Forces to Accelerate Enterprise Adoption of Employee-owned Smartphones
Partnership Targets New Methods for Businesses to Manage Employee-Owned Mobile Devices
SEOUL and PALO ALTO, Calif., Dec. 7, 2010 – LG Electronics (LG) and VMware, Inc. (NYSE: VMW), today announced a partnership to help enterprises of all sizes improve security and control of sensitive corporate data while enabling more flexible access via employee-owned mobile devices.
Using end user computing technology from VMware, LG is aiming to increase its footprint in the enterprise sector while providing more options for both consumer and business customers. This new technology will enable users to adopt the mobile device of their choice, while allowing corporate IT departments to manage sensitive data on those devices with enterprise-level security and compliance.
Initial efforts include enabling LG smartphones to securely run a work account in isolation from a user's personal account on a single mobile device. With this feature, LG mobile users will be able to safely carry a single device for both personal and work use. Solutions using mobile virtualization technology from VMware are expected to be available on LG smartphones in 2011.
“The enterprise and SMB markets are key areas of focus for LG,” said Ki S. Kim, Vice President of Global Enterprise Solutions at LG Electronics Mobile Communications Company. “Our partnership with VMware is part of LG’s global strategy to develop smart mobile devices for businesses. Enterprise IT organizations are looking for a way to embrace the growing trend of employee-owned mobile devices at work, while still maintaining control over their corporate data. VMware’s industry leadership provides a platform for LG to extend its presence in enterprises and deliver compelling solutions that address the challenges raised by the convergence of IT and mobile communications.”
Enterprises Embrace Employee Owned Mobile Devices
More than ever, organizations are dealing with two fundamental client-computing pain points – providing secure data access to an increasing number of mobile users, and managing the burgeoning diversity of data, applications and client devices within the enterprise. Establishing a new end user computing model to address these points is a fundamental component the VMware “IT as a Service” vision.
“As workforces become more mobile, our customers increasingly view today’s new breed of mobile devices as mission critical tools for their business,” said Dr. Stephen Herrod, CTO and senior vice president of R&D, VMware. “The reality is that today’s employee-owned mobile devices are often more advanced than corporate offerings. As a result, the agile enterprise is looking to embrace new end user computing models that allow users to work on the devices they love. We are excited to work with LG to develop mobile solutions that address the end user desire for affinity and the enterprise desire for manageability, security and control.”
"Smartphones are driving demand for an enhanced mobile experience as business-specific devices lose appeal and employees look to use their personal devices at work,” said Stacy Crook, senior analyst for IDC’s Mobile Enterprise research programs. “For the business market, the individual-liable, employee-owned model is here to stay. Savvy companies will embrace the trend and procure the necessary means to ensure that all devices with sensitive information are managed properly.”
Humphrey Chen, executive director of New Technologies, Verizon Wireless added, “We’re seeing interest from Verizon Wireless customers in the area of mobile personas, which allow a personal mobile phone to be leveraged in a professional setting in a secure way that is IT-approved. The kind of virtualization VMware offers helps to make this happen, and we're evaluating ways to help our customers achieve this.”
About L
borland/delphi/ nyse/intersystems/ and others thought they had everything well in hand, but the msft and lg people figured it out with the uspto rejigger of the patent....keyword arbitrary objects/framework/transformation........not translation.
gosh, i think i saw a netflix on this kind of subject matter.
supreme court of texas? jan 24....but when is the end date for the so ko considerations of the lg heirs claims?
timeline?
idea for script...but it's a secret between me and my private ai, lol. now who's writing style would be best for the story line?
Shondra Rhimes ? tony hillerman? tom cruise? billions?
8 and v ip compiler........etl........v ip transformation the uspto examiner said........you aren't translating...........you are transforming.
fourier transform and time and frequency........keys to pulsed light waves/particles.. novocure, em manipulations, quantum stuff. omniverses.
and if lg negotiated other contract aspects, v ip due diligence would have known about the korean laws of business inheritance and lg's lack of a will and might have taken specific steps to protect v ip from getting into hands of those not desired by v ip......like unfriendly takeover people?
so, what is in the documents of wade's trust, etc. lawyer/trust confidentiality prohibits said lawyer from exposing such documents to non trust enabled eyeballs?
geez, if not true, i could generate via copilot a script for such.......lol. wags.
lg news/nytimes b sunday p1.....LG family dispute over control of company and fortune. wife and daughters vs nephew.....succession in korea? is wade trust holding documents which would shed light on the issues?
i wonder who's got lg's license and other documents pertaining to v ip and perhaps indirectly the ?
might it stipulate who really got lg ownership and rights to v ip?
who's funding wade's persistent fight? and why the change of heart in mills?
is lg the 13% wannabe of ploinks usa?
Is the deceased lg ceo trying to manage from the great beyond?
“Topics in Algebra” by I. N. Herstein is a renowned mathematical textbook that delves into various algebraic concepts. Let’s explore some details about this influential book:
Book Overview:
Title: Topics in Algebra
Author: I. N. Herstein
Edition: 2nd Edition
Publication Date: January 16, 1991
Language: English
Pages: 388
Publisher: John Wiley & Sons
ISBN-10: 0536010900
ISBN-13: 978-0471010906
Content Highlights:
Group Theory: Definitions, examples, subgroups, automorphisms, Sylow’s theorem, and more.
Ring Theory: Definitions, special classes of rings, ideals, quotient rings, polynomial rings, and more.
Vector Spaces and Modules: Linear independence, bases, dual spaces, and modules.
Fields: Extension fields, Galois theory, solvability by radicals, and more.
Linear Transformations: Matrices, characteristic roots, canonical forms, determinants, and more.
Selected Topics: Finite fields, integral quaternions, and more.
Significance:
I. N. Herstein was a prolific mathematician known for his contributions to algebra and ring theory.
The book underwent extensive revisions in this 2nd edition, particularly in the sections on finite groups and Galois theory.
It covers fundamental algebraic concepts and provides a solid foundation for further study.
Availability:
You can find the book on platforms like Amazon1.
It’s widely used in mathematics courses and self-study.
Whether you’re a student, educator, or math enthusiast, “Topics in Algebra” remains a valuable resource for exploring algebraic structures and their applications. 📚🔢
"Fabric Computing:
Fabric computing involves constructing a computing fabric consisting of interconnected nodes that resemble a weave or fabric when seen collectively from a distance1.
Typically, it refers to a consolidated high-performance computing system with loosely coupled storage, networking, and parallel processing functions.
Key components of fabrics are nodes (processors, memory, peripherals) and links (functional connections between nodes).
The term has been used in various contexts, including grid computing, unified data center fabrics, and platforms like the Azure Services Platform1.
Microsoft Fabric:
Microsoft Fabric is an all-in-one analytics solution for enterprises.
It covers data movement, data science, real-time analytics, and business intelligence.
Services include data lake, data engineering, and data integration, all in one place2.
Data Fabric Software:
Data fabric software unifies data platforms, allowing organizations to integrate data and data management processes.
It creates complete views of data, powering existing processes and enabling rapid development of new use cases3.
In summary, fabric computing and data fabric solutions play crucial roles in modern computing, enabling scalability, dynamic reconfiguration, and efficient data management123."
time and freq fournier transformations, 744 and 'transformations'. chips. but the chips still need data. mle /521 for clean/good data prep?
broadcom and switch with neuromorphic network.
harvard researchers with quantum chip breakthru...all this is coming in last few days.. but they have to been using the 'transformations' of time and freq just to do their r and d. wags.
“Fully homomorphic encryption is an automated solution to get around legal and regulatory issues while still protecting privacy,” says Kurt Rohloff, CEO of Duality Technologies, in Hoboken, N.J., one of the companies developing FHE accelerator chips. His company’s FHE software is already helping financial firms check for fraud and preserving patient privacy in health care research.
Despite the relatively slow pace of today’s unaccelerated FHE, it works because “we address use cases where it’s not really a computation bottleneck, use cases where there is a human in the loop,” such as lawyers negotiating data-use agreements, Rohloff says. Adding a new kind of hardware to his company’s software won’t just speed FHE, it will let it tackle bigger human-in-the-loop problems as well, he says.
How Fully Homomorphic Encryption Works
At first glance, it might seem impossible to do meaningful computation on data that looks like gibberish. But the idea goes back decades, and was finally made possible in 2009 by Craig Gentry, then a Stanford graduate student. Gentry found a way to do both addition and multiplication without calculation-killing noise accumulating, making it possible to do any form of encrypted computation.
One comparison you can use to understand FHE is that it’s analogous to a Fourier transform. For those of you who don’t remember your college signal processing, a Fourier transform is a mathematical tool that turns a signal in time, such as the oscillation of voltage in a circuit, into a signal in frequency. One of the key side effects is that any math you can do in the time domain has its equivalent in the frequency domain. So you can compute in either time or frequency and come up with the same answer.
The genius of fully homomorphic encryption is that it uses lattice cryptography— a form of quantum-computer-proof encoding—as the mathematical transformation. The problem with this approach is that the transformation leads to a big change in the type and amount of data and in the sorts of operations needed to compute. That’s where the new chips come in.
“It’s a new chapter in the history of computing.”
—RO CAMMAROTA, INTEL
Computing with FHE means doing transforms, addition, and multiplication on “a very long list of numbers, and each number in itself is very large,” explains Rohloff. Computing with numbers that might require more than a hundred bits to describe is not something today’s CPUs and GPUs are inherently good at. If anything, GPUs have been going in the opposite direction, focusing on less precise math done using smaller and smaller floating-point numbers. The FHE accelerator chips, by contrast, can stream huge volumes of data through hardware that does integer math on numbers that are thousands of bits long to accommodate encryption’s precision needs.
fournier transformation, transformation and 744, time and frequeency
Each accelerator has its own way of dealing with these streams of huge numbers. But they’re all after the same goal—making FHE as fast as today’s unencrypted computing.
DARPA Drives FHE
The quest for hardware that can accelerate FHE got its biggest boost in 2021, when the U.S. Defense Advanced Research Projects Agency (DARPA) began a project called DPRIVE. The goal was to build hardware that could radically reduce the time it took for FHE computing tasks, from weeks to just seconds or even milliseconds. Three participating teams—led by Duality Technologies, Galois, and Intel—are on track to deliver chips designed to make FHE perform within a factor of 10 of traditional computing or even better in 2024.
These chips will be crucial if FHE is to break out of its current niche. “While algorithm and software development has taken us far, it’s not nearly far enough for FHE to be practical in any but a small and narrow set of applications,” says Galois’s David Archer. A distinction of the Galois hardware, called Basalisc, is the use of asynchronous clocking so that the various types of circuits used to do FHE operations can run at their own speed.
kona, "Global web icon
IEEE Spectrum
https://spectrum.ieee.org/homomorphic-encryption
Chips to Compute With Encrypted Data Are Coming - IEEE …
Web1 day ago · Samuel K. Moore 13 hours ago 6 min read Giacomo Bagnara Trust no one. It’s not just a throwaway line from TV thrillers. It’s becoming the goal of computer security, and a technology that can make it a reality has arrived. Called fully homomorphic encryption, or …"
it was a co defendant with farias.......mokta.........something? he was allowed out, but check farias' exwife and that guy?
kona, what about the other person initially named in the calif farias case?
who was the other person named with farias who was allowed out? maybe he's back in?
who did they sell the certificates to? lynch?
kona, i think wade's trust box is the key to many things....where are the certificates, where are some documents, a reason this is going to the texas supreme court?
i hope it's not pandora's box. enron and msft could have used a dc/ac converter/switch...at the time of enron they were saying msft was a partner in some energy distribution thing with them. a soft switch? linux switch was the desire but it didn't work? so i read.....ask winning. on the mpc. i think.
networking like controlling two way traffic/routing for such/authentication of open grids.
mining of energy on distant objects, transmission of such via self generating wormholes? lunar bottling plants/encapsulation of such for distribution? then use the energy to power the m=e/c2...
now think instead of powerline, powered fiberoptic channel for energy and data....like amsc superconducting wire.wags.
also , enter the cruz ip as applied to the powered line of fiber optic channels...has to work thru storms and work like thor's hammer?
powerline communications and backhaul:"Powerline backhaul, also known as PLC (Power Line Communication) backhaul, is a technique used in mesh Wi-Fi systems to improve communication between mesh nodes. Let’s explore how it works:
What is Powerline Backhaul?
In mesh Wi-Fi systems, nodes (such as routers or access points) communicate with each other to create a seamless network.
Powerline backhaul leverages existing electrical wiring in your home to transmit data signals between mesh nodes.
How Does It Work?
Powerline Adapters: Each mesh node is equipped with a powerline adapter.
Data Transmission: The powerline adapter sends data signals over the electrical wiring.
Electrical Circuits: The signals travel through the same electrical circuits that power your lights, appliances, and other devices.
Receiving Node: Another mesh node receives the signals through its powerline adapter.
Improved Communication: Powerline backhaul improves communication between nodes, especially when Wi-Fi signals face interference from walls or other obstacles.
Advantages of Powerline Backhaul:
Stability: Powerline communication is less affected by physical barriers than Wi-Fi signals.
Coverage: It extends coverage to areas where Wi-Fi signals may be weak.
Consistency: Powerline backhaul provides consistent performance across different rooms.
Considerations:
Electrical Wiring Quality: The effectiveness of powerline backhaul depends on the quality of your home’s electrical wiring.
Interference: High-power appliances or noisy electrical circuits can interfere with powerline signals.
In summary, powerline backhaul enhances mesh Wi-Fi systems by using electrical wiring to create reliable connections between nodes, improving overall network performance. 🌐🔌🏠"
need energy inverter..called also a transforrmer? v ip 744 family. software or software enhanced transformation?
copilot says.:Certainly! Let’s delve into the fascinating world of DC to AC converters, also known as inverters. These devices play a crucial role in various applications, from solar power systems to electric vehicles. Here’s how they work:
Understanding DC and AC:
Direct Current (DC): In DC, electrons flow in a single direction, maintaining a constant voltage. Think of it like a line of ants marching steadily with packets of electrical energy.
Alternating Current (AC): AC power switches direction rapidly (typically 50–60 times per second). It flows into our homes from the electric grid, constantly changing its flow between positive and negative terminals.
Why Convert DC to AC?:
Many appliances are designed for AC power, but small-scale generators (like solar panels or batteries) often produce DC.
To run AC-powered gadgets from a DC source (e.g., a car battery), we need an inverter.
How Inverters Work:
Inverters use electronic switches to rapidly turn DC power on and off.
They create an alternating current by altering the one-way flow of DC.
The process involves an H-Bridge circuit that converts DC’s unidirectional flow into AC’s back-and-forth current.
Inverters also increase the input voltage (e.g., from 12V to 230V) to make it usable by appliances.
Applications of Inverters:
Solar power systems: Convert DC from solar panels to AC for home use.
Electric vehicles: Convert battery DC to AC for motor operation.
Backup power systems: Provide AC power during outages.
Portable devices: Run AC-powered gadgets from DC sources.
In summary, inverters are essential for bridging the gap between DC and AC, enabling us to power our homes, devices, and appliances effectively. 🌞🔌🏠
solar tiles.....memristors?.....gaf and standard industries......solar tiles being made in texas.
memristors last longer thru more cycles , they say.
how to charge the electric vehicles.......solar paint/bodies? roadways? ambient energy grids? back to the future and ambient corp , now ericsson? micron tech? 8 and micron tech.
msft project 2021.....promect management....need sensors, reminder, clocks, hr, payroll, schedules., etc. one more thing for v ip to get paid on?
"The MIT Lincoln Laboratory houses a cutting-edge Microelectronics Laboratory that plays a pivotal role in semiconductor research and fabrication. Let’s delve into the details:
Microelectronics Laboratory at MIT Lincoln Laboratory:
This facility is the U.S. government’s most capable semiconductor research and fabrication center. It spans 70,000 square feet and includes 8,100 square feet of class-10 and 10,000 square feet of class-100 cleanroom areas.
The laboratory supports a wide range of programs and initiatives at Lincoln Laboratory.
Key features of the Microelectronics Laboratory include:
Wafer Fabrication: It is the only non-commercial silicon wafer fabrication facility in the United States with the ability to optically print features as small as 100 nanometers.
Equipment: The facility houses a continually updated suite of 200-mm wafer equipment, including a production-class complementary metal oxide semiconductor (CMOS) toolset, angled ion-implantation, cluster metallization, dry etch equipment, chemical-mechanical planarization equipment, rapid thermal processing, and advanced lithography capabilities.
Research and Development: Staff at the Microelectronics Laboratory are actively developing and fabricating novel technologies, such as fully depleted silicon-on-insulator (FDSOI) CMOS circuit wafers, gigapixel charge-coupled-device (CCD) imager focal planes, photon-counting avalanche photodiode arrays, niobium-based superconducting circuits, photonic integrated radio-frequency and optical microelectromechanical systems (MEMS), and gallium nitride on silicon high-electron mobility transistors (GaNSi HEMTs) and circuits.
Advanced Packaging: The laboratory also supports advanced packaging with precision multichip module (MCM) technology and three-dimensional circuit stacking.
The Microelectronics Laboratory is staffed by approximately 60 technicians, engineers, and scientists, operating in three shifts each day, five days a week.
It holds Trusted Foundry accreditation from the Defense Microelectronics Activity (DMEA) and is ISO-9001 certified1.
Semiconductors:
Semiconductors are materials that exhibit electrical conductivity between conductors (such as metals) and insulators (like ceramics).
They play a crucial role in electronic devices, harnessing electricity for processing power.
Silicon is a common semiconductor material used extensively in integrated circuits (ICs) and other electronic components.
Semiconductors enable the creation of transistors, diodes, and other essential building blocks of modern technology23.
In summary, the MIT Lincoln Laboratory’s Microelectronics Laboratory stands at the forefront of semiconductor research and development, contributing to technological advancements and national interests."
follow the tea leaves, cookie crumbs,...........rome wasn't built in a day. step by step. layer by layer.mac and phy, layer 7, osi framework? wags.
maybe more an ipsphere/tm forum sized project?
it would seem people are hard at work on the project environment. what tools might they employ?
los alamos and emPath engineers...
Family and Friends
iincludes broadcom....intel, stmicro(who has a license for soft fabric of 8x8), qualcomm, boeing, lmt, etc.
from sbv : reconfigurable fabric: SAWBLADE VENTURES AND NORTHERN
ARIZONA UNIVERSITY ADVANCING CYBER
SECURITY HARDWARE SOLUTIONS BY
GROWING PORTFOLIO
Monday, February 25, 2020 1:25 PM
Austin, Texas, February 25, 2020-Sawblade Ventures, LLC (SbV) is pleased to announce a newly
signed research agreement with Northern Arizona University (NAU).
The teams will study how hardware cybersecurity schemes can be integrated in a suite of
electronic design tools for advanced enablement of the latest security techniques with the ease
of use of an electronic design automation environment.
The teams will focus on,
1) Improving existing EDA tools from Sawblade to work with NAU’s superior PUF (Physically
Unclonable Function) technology.
2) The merging of our blockchain strategies to enable sufficient security for the varied
markets where it is being developed.
3) Improving password management using NAU’s techniques with Sawblade’s
“Reconfigurable Fabric”.
The growing world of data communication has been hurt by increasing malicious attacks.
Sawblade and NAU are committed to improving hardware security integrated into electronic
systems.
“Hardware solutions operating at speed and are embedded, flexible and distributed into circuits
are what is needed to fill the gap left by software and hardware solutions of the past” said Scott
Winning, President and CEO of Sawblade Ventures, LLC. “This is what we offer today, however
with this agreement, we will build onto this, a forward-looking roadmap becoming increasing
impossible to penetrate our customer’s applications.”
“Complex hardware security solutions have been proven by our team at NAU. We continue to
improve this roadmap and the need is to move fast to stay ahead of the curve. Our mission is
to expose our students to alternative technologies to participate and improve security for the
future” commented Dr. Bertrand Cambou, Professor of Practice, Nanotechnology, &
Cybersecurity School of Informatics, Computing, and Cyber Systems at Northern Arizona
University.
===============post quantum secure systems==================
Broadcom Inc.
https://investors.broadcom.com/news-releases/news...
Broadcom Introduces Industry’s First Switch With On-Chip …
WebSAN JOSE, Calif., Nov. 30, 2023 (GLOBE NEWSWIRE) -- In a world’s first for switching silicon, Broadcom Inc. (NASDAQ:AVGO) today announced a novel on-chip, neural-network …
first to the second........don't have to redo the whole thing. sbv/vcsy?
wasn't broadcom a friend of sbv?
v management defused the wade trust potentially hiding the now solutions certificates or deals based on such. the trust manager/s have also likely been duly served?if v can't access it or valde or irs, then those shares are nullified. wags.
v management defused the wade trust potentially hiding the now solutions certificates or deals based on such. the trust manager/s have also likely been duly served?if v can't access it or valde or irs, then those shares are nullified. wags.
does a judge have to rule on the 100% ownership? like the calif court?
kona, you're picking passed actors or nearly passed. we've got to live a few in order to enjoy the patience/waiting it's taken , i hope.
none of us can cheat the grim reaper.
i do want to see or know that self generating channel guide /maybe wormhole is a working technology. think of the potential for exploration of distant planets/moons/asteroids/etc. consider remote mining by e=mc2...light and energy creating mass of specific elements/stuff? or correction of biologic systems/repairs/etc.
plasma environment but wait......there is no air in space. maybe have to invent a system that provides air infront of the plasma generating em. or maybe there's something else....dark matter which could be made into plasma??
linear and non-linear motion vector estimation for the self generating photonic wave guide......wags.