What is nonlocality and how might it relate to our daily lives?

Nonlocality describes the apparent ability of objects to instantaneously know about each other’s state, even when separated by large distances (potentially even billions of light years), almost as if the universe at large instantaneously arranges its particles in anticipation of future events.*

* I conceptually suggest temporal ‘things’ like within a without time ‘universal-environment’. This is where the past, the present and the future are the same (exist simultaneously). This is as Einstein postulated in his later life. It might be said that the universe is not only aware of itself but also of all things going on within it. I also suggest that we have both a temporal consciousness that relates to space and time, as well as an ontological consciousness (or ‘awareness’) that is not related to space and time. This link demonstrates how this might be the case. Does this evidence of how we are intimately ‘connected’ to the universe as well as our connection with it last for as long as the universe (at least ontologically) exists?

Non locality (also known in physics as entanglement theory) is an operative effect (influence) that can be demonstrated within our mind and brain nexus. This theory is professionally discussed in this video presentation. Nonlocality has been regularly demonstrated by experiment in the physics community. I suggest that this is an internationally respected source.

October 25th 2021

Seven keys that might be useful for you to better understand all that “IS”

I argue that the universe is one of a dynamic relationship between all that is ontological and temporal. I have nominated ontological as being all that is “implicit” in the universe and all that is temporal as being “explicit”. Physicists have long realised that this relationship is “weird”. In my opinion the seven following keys [tools] provide conceptual embryonic insight as to how complex an observer might observe the inner workings of the universe. This is if they are able to observe from the “cosmological-region” of whatever existed prior to the Big Bang. I broadly introduce these keys as follows. More detailed physics theory quotations pertinent to these short opening insights follow in the same order immediately thereafter.

The keys:

A. The act of looking at something somehow changes what it was before you looked at it.

B. How is it that all things have some sort of hidden physical meaning, and perhaps influence other things such as consciousness.

C. It is possible for one thing to be two things at the same time.

D. There are hidden things and potential events ‘sitting somewhere’ waiting to do something in response to something else.

E. There is always a degree of guesswork involved in measuring anything in physics.

F. Given the right circumstances and conditions, ‘things’ can tunnel through solid objects leaving no apparent clue as to how this might have come about.

G. All things and events in the universe are somehow entangled with each other so that they can also share information between themselves, via influences and other causal tendencies to do something, such as when individuals are thinking in between talking.

The widely accepted physics theories that seem to support these seven concepts.

1. Quantum superposition theory

Quantum superposition theory is a principle of quantum mechanics that says that all things (like particles) exist in two states. One state is before they are observed and the other is after they have been observed. The act of observation ‘changes’ things from what they were before.

2. Hidden variables

Hidden variables relate to things that are as yet unknown or unknowable to physics. These include how it is that particles have implicit properties, and the causal implicit properties of consciousness [in other documents I mostly say awareness] at the same time.

3. Indeterminate state

An indeterminate state is something like a photon particle having the properties of being an indeterminate implicit [ontological] wave-like state and an explicit temporal particle state at the same time.

4. Virtual particles

A virtual particle is a particle that could be analogically invisibly ‘seated’ within the fibres of a piece of cloth. This is a piece of cloth that an observer might observe with a needle with cotton in its eye stitching backwards and forwards on either side of the cloth. This means that virtual particles can “mediate” processes between particles as they move from, say, an explicit chemical state to an implicit non- chemical state of some kind. This might include a different type of non-detectable energy or influence. In respect to these words also note the following link and its contents…

Quote:

“…Quantum theory predicts that every particle spends some time as a combination of other particles in all possible ways…”

5. Quantum uncertainty principle

Quantum uncertainty in physics means that there is a limit to what can be known about the smallest scales in nature. This means that the best that science can do is to calculate the probabilities as to where things are and how they might behave. In an everyday sense this means that scientists have difficulties in accurately measuring things in space because space is so turbulent. This also means that there is a degree of guesswork involved in being precise in predicting whether a thing, event or process is going to move or change this or that way, or not.

6 Quantum tunnelling

The quantum tunnelling effect is a quantum phenomenon which occurs when particles move through a barrier that, according to the theories of classical physics, should be impossible to move through.

7. Quantum non-local (entanglement) theory demonstrates the indeterminate commonly linked state of all that “IS”. This is an animated version and this is a professional physics version, describing what entanglement is.

I hope that this seven point information might be helpful in you better understanding some of the mysterious happenings in the wider world around us. This might include you and me.

If you feel confused and perplexed by such scientific jargon don’t worry! This is what the physicist Richard Feynman said about this type of complex physics. The quote is linked to a statement that he made to students before one of his lectures.

Quote:

“…Will you understand what I’m going to tell you?… No, you’re not going to be able to understand it-You see, my physics students don’t understand it either. That is because I don’t understand it. Nobody does.”

Understanding 5G. Unraveling some mysteries

I present an article written by Anthony Rutkowski. Rutkowski’s credentials are cited further down. I believe that very few of us are aware of the greater story quietly lurking behind the contemporary international 5G debate.  It seems to me that the author has done a sound job in composing this article. I have emboldened text that I feel that might most interest my readers

Quote:

“The initial, essential step toward understanding 5G is to perform an intellectual body purge of the endless disgorging of cluelessness and disinformation that emerges from the Washington White House and radiates out around that city and then to the outside world that it infects. The institutes, pundits, self-professed experts, summits, and even the U.S. press all pretty much feed out of the same trough of 5G political slop that gets passed around as incantations of ignorance, spin, and K-street lobbying.

The next essential step is the difficult one. Unfortunately, it requires the hard work and a knowledge base obtained from following and analyzing the only authoritative collective sources of 5G information — and that is the multiple global industry bodies where hundreds of technical experts constantly collaborate at diverse locations contributing thousands of input documents per month developing and specifying in great detail, the architectures, services, interfaces, radio links, and capabilities that constitute 5G. These bodies have been working on this effort for the past five years, and publish the resulting documents in a series of releases that resemble computer operating system versions. Release 16 — which is true 5G SA with network core virtualization (as opposed to transitional precursors) — is being accomplished this year. Subsequent releases promise ever more advanced applications and features. The bottom line: 5G is a constantly evolving continuum.

These bodies are usually layered and have endless strings of acronyms like the 3GPP (SA, CT, RAN) core, which is then surrounded by NFV ISG, MEC ISG, ETSI TCs, MEF, ITU-R, ITU-T, OASIS, TCG, IETF, OMA, GSMA, IEEE802. You can search on the acronyms for meanings, access portals, meetings, participants, and input and output materials. Additionally, large swaths of 5G work never make it into the global industry fora, and only appear in patent filings, research literature, and product announcements that require continuous monitoring and assessment. Given the enormous complexity and continuously evolving technical and institutional complexities spread across all these venues, anything approaching a complete understanding is not possible. All 5G knowledge is an approximation at a point in time.

Principal 5G features

A number of basic features can be distilled out of the enormous swirling 5G maelstrom that go far beyond the focus on political trivializations, lobbying, trolling for spectrum, and marketing in the popular press. These features represent a tectonic change far exceeding anything seen in the history of electronic communications – in the way networks and services are instantiated and provided.

  • Virtualization of everything from data centres and local Mobile Edge Computing facilities
  • Partitioned architectures & services on demand transparently across all media using network slicing
  • Shifting away from DARPA internet protocols to low-latency Virtual Carrier Ethernet
  • Prolific ephemeral encryption
  • High-speed mobility support combined with constant dynamic portability to mobile platforms and IOT
  • Commoditized hardware and orchestration of everything else
  • Ubiquitous, high bandwidth radio access capabilities
  • Shift to global “content distribution networks” on demand where discoverable endpoint and traffic intelligence become highly valuable
  • Intelligence shifts from endpoints to middleboxes and data centres
  • Trusted platforms, middlebox based traffic analysis, and auditing become security essentials

Explaining these features and conclusions are beyond the scope of a basic primer, but readers can do their own homework using authoritative source materials.

Threaded through this array of capabilities is a need for security that is best summed up as constant “cyber hygiene” representing a virtualization reapplication of today’s 20 CIS Critical Security Controls. Unilateral actions undermining public international law like banning a vendor’s hardware because of its place of incorporation are not only unlawful but utterly delusional and counterproductive toward addressing the necessary capabilities. The 5G security capabilities have for several years been developed and evolved continuously in global industry bodies.

The problem here is that understanding all of the above requires a comprehensive level of knowledge and available resources to distill from a broad array of activities — and those resources only exist in a few companies and institutions. As a result, the purveyors of jingoistic 5G snake oil political analysis are left to pursue their trade. Simplistic portrayals of 5G are low-hanging fruit for a world challenged by understanding even the basics of how a smartphone works.

Emerging 5G markets, strategies, and participants

There are arguably four classes of winners in the 5G world. In the near term, they include a few companies and their component suppliers who can exist in the global 5G mass commodity physical “box” game that has a finite market period and extends into developing countries. Their success is synergistic and important to the derivative markets. The three additional, larger, persistent, and even more lucrative market winners in this massive tectonic shift to a tailored, on-demand, content delivery global architecture, are: 1) those who provide the low latency, trusted network slice orchestrations out of cloud data centre/MEC facilities and middleboxes, 2) those who collect and maintain the mobile endpoint identifiers and intelligence to provide resolver services, and 3) those who can maintain and provide content for specific classes of customers.

The providers who fall into all of the above categories are very actively engaged in the real 5G/NFV work. They encompass product vendors and service providers at multiple levels across the globe — in many instances, orchestrating different subsidiaries across multiple countries. Some industry consortiums in the cable, railway, and automobile fields have become prominent. The metrics of the huge commitments of personnel and contributions of intellectual property in submissions are available in all the venues. In the 5G security arena, by any metric, there is only one clear global leader — the UK’s National Cyber Security Centre.

Principal 5G Challenges

Although the challenges are certain to evolve over time, those that are obvious at this point fall into three categories: 1) effective, inclusive global arrangements for extraterritorial orchestrations of 5G architectures and services including access to forensics, 2) concentration of 5G orchestration, resolver and end-point intelligence services in the hands of a few commercial providers, and 3) an inability of government institutions to understand the previous two challenges and their own strategic interests. The last challenge is largely resident in only one nation at the moment.

The first challenge can be potentially satisfied by further extending the many global intergovernmental arrangements developed a century ago for the first global radio-based networks and a quarter-century ago for public internets. To the extent solutions cannot be found, costs will simply be driven up and market access limited by building more national-based facilities that operate within a confined jurisdiction. The second challenge is similar to the first with complex antitrust, privacy, law enforcement, and national security overlays. Nations will similarly insist on geographic jurisdictional compartmentalization. The third challenge will hopefully be solved in the near future.

About the author:

Quote:

 “Principal, Netmagic Associates LLC
Joined on August 15, 2012 – United States
Total Post Views: 602,279

Tony Rutkowski is a Distinguished Senior Research Fellow at the Georgia Institute of Technology’s Center for International Strategy, Technology, and Policy (CISTP) at the Sam Nunn School of International Affairs.  As Executive Vice President for Yaana Technologies, he has served as rapporteur for cybersecurity in ITU-T since 2009 and served as the counselor for two ITU Secretaries-General between 1988 and 1992, co-authored a published ITU history, and led development and authored many regulatory provisions, laws, briefs, treaties, standards, books, and articles as an engineer-lawyer over many years in multiple positions in industry, government and academic institutions.  At one time, he did real engineering – being responsible for the communications and command & control systems as part of the Apollo Launch Teams at KSC Launch Complex 39″  http://www.circleid.com/members/6809/