Is China Leading In Building An AI Driven Future With 5G?

5G will be the thing of the coming years. If I’m understanding what is really going on, 5G can actually allow the plethora of devices to communicate with each other effortlessly. A quick search on Google yields that 5G is 20 times faster than 4G. Whether this is true or not, one thing is true is that devices can speak to each other way faster than before. This opens up more innovation and infrastructure demands.


The video above shows that China is heading in the direction where more machines will replace humans in labor-intensive jobs. The day when we need an extra pair of human hands may be over sooner than later because smarter machines with AI capability can actually think for themselves and carry themselves in jobs effortlessly. Nonetheless, AI machines without 5G will be like a pony just starts learning how to walk.

5G will allow AI machines to transfer data fast and constantly so that things can speed up even more for decision making, planning, communication and so much more. I think with 5G, self-driving car technology is much more believable since you can have many self-driving cars detect each other easier at once with reliable faster 5G data transfer. Furthermore, smart highways and roads are going to get better and more fitting for self-driving cars because 5G will allow faster communication between the cars and the traffic infrastructures.

If you’re guessing I don’t know what I’m talking about, you may be right. After all, 5G is so new and I haven’t seen it firsthand or use it in real life. Nonetheless, according to the information I could Google, 5G is 20 times faster than 4G. Right now I’m using 4G on my smartphone but I think 4G is already quite fast. I can imagine how crazier it could get if I got 5G.

A day ago I briefly encountered an article which described how 5G could destroy the need for the cloud. Then I briefly read over the article’s comments that displeased how the article’s author was too lacking of knowledge since the commenters didn’t see how 5G could destroy the cloud since the cloud is about centralization of data storage.

Personally though, I don’t see how centralizing storage like the cloud could go away since data redundancy is always a priority, especially in the age of AI which is driven by data. Of course, all bets are off when AI becomes self-conscious since such AI needs no human data to drive its own logic. Until then, the cloud stays important.

I also think that 5G could allow the decentralization of networks to become a thing too! How come? Local devices and storages will be able to talk faster to any other storage and device across the world — destroying the needs of having to plan and engineer a network that is catering to the importance of distance. Although we already in the age of information where distance isn’t as relevant as the 19th century for communication, but 5G may make distance even more irrelevant when it comes to data communication.

Basically, instead of waiting for minutes for a movie to be downloaded onto your device, you may only have to wait for a few seconds to have your movie when you use the 5G network. 5G data can cross secure communication channel much faster and more reliable since faster data transfer allows faster data integrity check and whatnot. Perhaps, we could see shopping, banking, and other important financial related activities across the world on the world wide web to be more reliable and faster — better experience overall!

In summary, I think 5G will be awesome! I would love to see not only cellular network but also home network to be able to transfer speed that is as fast as 5G or better. This way, everything will be on the same pace and everyone will be using faster Internet speed. What’s not to like when you can get a whole 4K movie to be downloaded in a few seconds, right?

Crocodile in the Yangtze – How Jack Ma Built Alibaba From Nothing

Real life stories about famous people like Steve Jobs are inspiring.  In China, Jack Ma’s real life story is too also inspiring.  Nobody knows what will the future hold for Jack Ma, but it’s already truly inspiring and amazing to see how Jack Ma has built his Alibaba company in his apartment to the size of Alibaba today which has tens of thousands of employees.  I got to know about Jack Ma’s amazing real life story thus far through Crocodile in the Yangtze documentary which was written and directed by Porter Erisman — a man who once worked for Jack Ma’s Alibaba company.  How Jack Ma from nothing built a company that went to war against Ebay, a truly super large company, in his own country, China, to bringing the competition to Ebay’s doorstep in America is definitely not something everyone can just wake up one day and say I can do that too.  So, check out how Jack Ma had done such an amazing feat through the video right after the break.  Enjoy!

12,000 Startups Are Being Created Every Day In China by Internet Loans

Internet loan companies like Prosper are very few in the United States, but in China these companies are too numerous to count.  These loan companies are less regulated in China, and so the growth of the Internet loan sector is incredible.  Basically, these less regulated Internet loan companies are responsible for at least 12,000 startups every day in China.  Sometimes, it takes as fewer than few minutes to find the funding for a loan.  Some loans can also go up to millions of dollars.  The risks for these loans are there even though the Internet loan companies are doing fine at the moment.  Nonetheless, as we all know the world is full of uncertainties, and so risks are risks.  Sometimes, scam could be created from scammers who target loan companies to bilk out money from everyday investors.  In short, these Internet loan companies rely on Chinese citizens’ greed to provide the funds for both new and old, big and small businesses.  Some struggling businesses, whether they’re big or small, got a second chance through these Internet loans, because traditional banks couldn’t handle the appetite for such risks.  Anyway, check out the video after the break to see the details on how Internet loan companies in China are growing.  Enjoy!

XSLT Basics For Transforming One Specific XML Structure To Another XML Structure

I was messing around with R (i.e., a free program that can organize and transform data), and I told R to transform the data into CSV format.  I converted this CSV format file into XML file using one of those CSV to XML free tools on the Internet.  The problem is that the XML file I got from the whole process contains structure in which is radically different from the XML structure that I need to use with a software.  Luckily, XSLT comes to the rescue.  With XSLT, I discover that it’s possible to transform one XML structure to another XML structure.  The problem is that I have no knowledge of how to use XSLT just yet.  Once again, YouTube is a treasure trove of free information, and the YouTube video right after the break introduces me to XSLT basics.  Of course, I may have to do more study and research on XSLT before I would know how to properly transform one XML structure to another XML structure.

Vidxr, New To Go Place For Music Videos

I’m just releasing Vidxr.com, and this will be the to go personal music video playlist weblog for me.  Of course, while adding more awesome music videos to Vidxr, I hope you can check Vidxr out for some enjoyable music video time.

We’re living in a digital age where most things can be shared digitally.  Vidxr is made possible by content sharing features provided by various online services such as YouTube.  Thanks to these web services, I’m able to form Vidxr.

As time goes on, I hope that I will be able to make Vidxr a very likable music video weblog.  If you like what you’re seeing with Vidxr, please let everyone knows about it.  Thank you very much!

How Real Is Cyber Threat?

Technology is like anything else that can be used for good or for evil purposes.  Many things have dual purposes or even more than just dual purposes, and technology is no exception to this fact.  Perhaps, there is an exception to the rule, but my small brain cannot think up one for the moment.  Anyhow, there are forces in the world that are trying to use technology for evil purposes.  For an example, from nuclear to cyber threats.  Nuclear threat has existed for many decades already, and by now most people know what MAD means.  In this blog post I’m not going to bother with voicing my opinion on nuclear threat.  Instead, I’m going to focus on voicing my opinion on cyber threat.

Lately, we have seen big powers like USA and China accuse each other of cyber warfare.  It’s obvious that it’s hard to know who is doing what in term of hacking one another in the cyberspace.  Nonetheless, I think I know why cyber threat is a growing concern.

On the surface, before we unravel all the layers of onion, we truly cannot see why there are fusses about cyber security.  For some people, they think that cyber threat can be dealt with best cyber security practices and no more than that.  Of course, it’s true that cyber security measures such as installing well known antivirus software and firewall are definitely going to help counter most cyber vulnerabilities.  Nonetheless, there are other cyber vulnerabilities out there that won’t be eliminated by even the most powerful firewall and antivirus programs.  Why?  I think there are some well kept or new cyber vulnerabilities that have not been dealt with, because these cyber vulnerabilities are well kept secrets or too new.  By using these cyber vulnerabilities and better hacking tools, hackers are able to wreck havocs on the cyber networks of the world.

When we peel more layers of the onion off, we can see that cyber security is very important.  How come?  In my opinion, it’s about a digital future where money mainly get create in digital form.  This is the future trend that our present (the world) is heading for.  Of course, if we just rely on cyber networks for communication and not for banking and monetization, then cyber security can only be boiled down to privacy and few other things but not of money matters.  Nonetheless, cyber networks as in the Internet can be used for electronic commerce, banking, and the whole nine yards.  This means cyber security is needing to be taken seriously, otherwise hackers can just waltz in and erase, steal, change, and do whatever else to the digital money that belong to various money matter institutions such as banking, electronic commerce giants, and whatnot.

I can imagine a scenario that a group of powerful hackers that is sponsored by a powerful organization hacks a cyber system of a country to a point that they erase all of the digital money from this country, leaving this country as a bankrupted nation.  Nonetheless, this country can totally create new digital money out of thin air if she wants to, but will this be ethically, legally, and sensibly?  Can such an incident be covered up easily?  After all, we’re living in a globalized world, and transactions are having been done globally all the time; something like this if to rain upon a country will not be easily covered up.

This is why I think cyber security issues are so important nowadays.  Without proper measures to protect cyber networks, the vulnerable Internet can gradually weaken the trust of digital money transactions, leaving countries and everyday people seek out the traditional means of doing transactions.  Perhaps, this is why we’re seeing the prevalence of traditional transactions today.  Cash is one good example of traditional transactions.

When I’m hearing how one country is having difficulty in protecting a state secret from being leaked out through the cyber networks, I think it’s absurd that such a country is connecting her secret networks to the Internet in the first place.  I think each country should keep her state secrets on an Intranet that won’t be connected to the regular Internet.  Furthermore, such a country needs to provide physical protections to her Intranet, because when hacking cannot be done remotely someone ought to waltz into such a network physically so the hacking can be done eventually.  For an example, stealing state secrets with the usage of a thumb drive (USB devices or similar devices).

In summary, I think the fusses about cyber security threat are real.  This is why we are hearing countries complain about being victims to hack attacks and whatnot.  Corporations are also experiencing cyber security issues, because corporate espionage can be done through cyber networks with ease.  Whenever an entity is connecting to the Internet and it doesn’t matter what type of entity that is, cyber security issues become real just like any other important issue that matters.  Of course, if there is a day that we do not rely on the Internet anymore and money transactions do not take place in the Internet, then cyber threat will not be a threat of anything but only a historical fact.

Personal Note:  The advance of encryption is also important, because encryption can be incorporated into various network tools to secure the Internet transactions.  With strong encryption, it’s harder for hackers to decrypt the Internet transactions into plain text, thus preventing important information from being leaked.