PDF Archive

Easily share your PDF documents with your contacts, on the Web and Social Networks.

Share a file Manage my documents Convert Recover PDF Search Help Contact



KMS, Artificial Intelligence, & The Economist 20150509 .pdf



Original filename: KMS, Artificial Intelligence, & The Economist 20150509.pdf
Author: x2.4

This PDF 1.4 document has been generated by Writer / LibreOffice 4.1, and has been sent on pdf-archive.com on 27/05/2015 at 06:07, from IP address 111.94.x.x. The current document download page has been viewed 892 times.
File size: 1.2 MB (47 pages).
Privacy: public file




Download original PDF file









Document preview


What do we learn from KMS technology? An Artificial Intelligence.
by Sando Sasako

Contents
The Microsoft's MVP (Most Vetted Person)........................................................................................1
The Nasty Things.................................................................................................................................2
WHAT IS AN AI?................................................................................................................................4
Defining Artificial Intelligence............................................................................................................4
Purpose of Artificial Intelligence.........................................................................................................5
Human Intelligence Defined.................................................................................................................5
Self-Awareness.....................................................................................................................................6
Some Human-Age Creatures................................................................................................................6
Algorithm, A Messing Device to Human Intelligence.........................................................................7
Algorithm in Briefs...............................................................................................................................7
Algorithm, A Means for Logical Deduction........................................................................................8
The Binary System...............................................................................................................................8
Google's Algorithm..............................................................................................................................9
THE APPENDICES
TAP-9 Adapter to tame grueling MCIDs in dealing with KMS technology......................................10
Some crash log files............................................................................................................................14
How to troubleshoot the Key Management Service (KMS)...............................................................15
KMS Overview.......................................................................................................................15
KMS Host...............................................................................................................................15
KMS Client.............................................................................................................................17
What Does Support Ask For?.................................................................................................20
Windows 7: How to Rearm Microsoft Office 2010 to Extend Activation.........................................21
'Rearm' trick extends Office 2010 free ride to 180 days....................................................................23
Deploying Volume Activation for Office 2010..................................................................................25
The Microsoft Tool Kits.....................................................................................................................27
Three versions of MSTK compared.......................................................................................27
Office 2010 Toolkit Switches of Office Toolkits (2.1.2).......................................................27
Main Tab of Office Toolkits (2.1.2).......................................................................................27
Rearm.....................................................................................................................................27
AutoRearm.............................................................................................................................28
AutoRearm Tab of Office Toolkits (2.1.2).............................................................................28
What is KMS?........................................................................................................................28
AutoKMS...............................................................................................................................29
AutoKMS Tab of Office Toolkits (2.1.2)...............................................................................29
Paths Tab of Office Toolkits (2.1.2).......................................................................................29
How KMSAutoEasy v1.06v6 by Ratiborus feeds the KMS Server Emulator Service......................30
Dealing and Cracking Microsoft Office 2007....................................................................................34
Intelligence Defined...........................................................................................................................35
The PageRank Algorithm...................................................................................................................36
Artificial Intelligence: The Promise and The Peril.............................................................................37

WHAT DO WE LEARN FROM KMS TECHNOLOGY? AN AI.

The Microsoft's MVP (Most Vetted Person)
by Sando Sasako
Jakarta, 4 May 2015
Microsoft has appointed me as an MVP (Most Vetted Person). Anyhoo, the status was given at once
some time ago in the past as I posted a blog entry on how to resolve the 30-day time bomb
embedded by Microsoft in its Office 2010 products. Take down notice was submitted by Microsoft
to Google. And, the last unforgiven act was as I posted a blog entry (early January 2015) detailing:
1. the sequencing files needed to update Windows 7.
2. the date of the update files released.
3. the size of the update files released.
4. the links of the update files reside.
As a result, within 6 hours and afterwards, MSFT (bing) bots were identified to have scrambled my
blog site as much as 12 times. Each of the links will be assessed inapproriate and be notified to
GOOG to be taken down from GOOG's SERP (Search Engine Result Pages), ASAP.
At the same time, MSFT has been doing it itself, through bing. Its (bing) bots have been using IE
9.0, not the latest and screwed IE 11.0. Yet, Windows Vista still is in place, and Windows 7, not
Windows 8 or Windows 8.1. Remarkable and splendid indeed !
After a while, my computer had been experiencing and under constant massive attacks by port
scanning activities. Crash after crash kept knocking down my computer. Some crash log files are
provided on Attachment – 1. My firewall (ZoneAlarm) reported to have "... blocked traffic to port ...
on your machine from port 27554 on a remote computer whose IP address is 116.27.49.84. ..." The
list of IPs responsible to port scanning to my computer was incredible.
Then, I recalled an article titled by HACIENDA, a GCHQ Port Scanning Program on a wide-scale,
written
by
Pierluigi
Paganini
on
16
August
2014.
http://securityaffairs.co/wordpress/27598/hacking/hacienda-gchq-port-scanning.html
I responded such thing by posting an entry into my blog by mid September 2014, titled by Beating
down the port scanning of HACIENDA, the global internet surveillance program conducted by
intelligence agencies in 5 countries (US, UK, Canada, Australia, New Zealand).
While China (and Hong Kong) has been doing it since mid February 2000. The network/port
scanning policy was established and enforced by the Computing Services Centre (CSC) to take
disciplinary actions if 'unusual' or 'unauthorised' network or port scanning on either the University
network or sites outside the University has been detected. Depending on the type of users, the
responsible parties are to be penalised accordingly. http://www.cityu.edu.hk/csc/netcomp/sep20007.htm
Before long, my computer had come to an end. The mainboard was sentenced to death. The
technician claimed that the processor does not have the electricity to power up. This is not the first
time I uncover the facts of the malfunctioning of hardware. The most easily burnt out devices have
been DVD writers. You can only burn CDs or DVDs in relatively a few limited numbers. That's not
about it. You can not boot through CDs/DVDs having an image of Windows operating system,
neither the bootable Windows operating system. The worst part is your CD/DVD drive won't eject
1

SANDO SASAKO

and release CDs/DVDs having Microsoft products. You need a hammer and a screwdriver to
dismantle the device to rescue your CDs/DVDs.
I suspect nothing but Verify Class ID (verclsid.exe) as the main culprit of responsible to
malfunction the devices and computer parts.

The Nasty Things
Why MSFT has been doing such nasty things? Money. It is what matter most in this lifetime.
Microsoft tries to cashing in what it owns. Billions of US dollars has been poured to finance what
Microsoft wants to accomplish and fail. Each for every attempt what Microsoft has been taking
comes with a price. The .NET technology is one big mess, for example.
The flooding android-based smartphones all over the world has been crippling global computer
sales. So have been the sales of 2 most successful Microsoft Products worldwide, that is Windows
and Office. The offsprings of Windows-based computers (Windows 95) and Office 97 was
celebrated and praised much as it eases the use of spreadsheets, rather than (Lotus) 1-2-3 that
operating in DOS environments. At that time, the DOS-based 123 can only open 1 spreadsheet at a
time. There were many DOS versions operating. MS-DOS, PC-DOS, DR-DOS were to name a few.
The familiarity and all-in-one package office software provided by Microsoft has entangled users
and customers worldwide. Microsoft let the users, home and retail, to be accustomed by the menus,
shortcuts, features, and so on. Freely, almost. It was the strategy of Microsoft to beat Apple (APPL).
APPL has been selling its products exclusively since the beginning.
Oth, to tap the smartphone market, Google use the same old strategy applied by Microsoft. Google
will provide, supply, and enhance the (operating system) software, while the hardware and other
apps are open to anyone complied to Google APIs (Application Programming Interfaces) and the
similar ones developed by Google. Even so, Google has been alleged to stall and/or terminate the
operationalisation of Firefox Operating System in android-based smartphones.
Whatever and whoever the producers are, the existing smartphones are the most dumb gadgets that
worth to be dumped, and thrown away to the trash can. It cannot open the simple text-based files !
What a bump it is !
The sunsetting (desktop and laptop nowadays) computer hardware industry means the business has
no longer lucrative for Microsoft. MSFT has been trying in vain to fish the money in the clear water
(open internet). Its Windows Phones doomed. Its Surface flops. Most of its operating systems
(Longhorn (Windows 2003), Vista, Windows 8 and 8.1) drowned. Its OneNote is gigantic in size
and impractical. Its Outlook has never been brighter, but looming. Its Money has never been
exchanged. Its Project has never been implemented.
Today, what good is left with Microsoft but Windows XP (and Windows 7) and its basic Office
features? These two products are the most profitable cash cows of Microsoft. The question will be:
How much is the price the Microsoft has been tagging for its products and putting it on the shelves
at the moment?

2

WHAT DO WE LEARN FROM KMS TECHNOLOGY? AN AI.

Nowadays, computer stores in Jakarta donot sell Microsoft Office 2010 anymore, but Microsoft
Office 2013. For Home and Student edition, it was tagged nearly by Rp 1 million per user. While
for Home and Business edition, it was priced by Rp 2.3 million. The bloated Windows 8 and
Windows 8.1 Professional is tagged by Rp 1.9 million, a bit higher than the Windows 7
Professional (Rp 1.8 million). But for its Windows 7 Ultimate, Microsoft is charging much higher,
that is by Rp 3.1 million.
To protect its revenue generation sources, Microsoft has initiated to launch an artificial intelligence,
to protect its interests. They call it the KMS. It was based on the XML technology. The XML
technology has been adopted and adapted while Longhorn in the development process. Microsoft
has been giving absolute protection to its newer operating systems, that is since the release of
Windows 8.
Users very much accustomed with Windows XP (desktop) environment and open access to folders
(of memory cards in andorid-based smartphones) are highly disappointed by Microsoft initiatives,
once again. Windows (Phone) users can only install apps by contacting and downloading the apps
from (Windows) Stores. Microsoft's desire in mimicking the exclusivity of Apple has been judged
to scorned and to no avail.
<hr>

3

SANDO SASAKO

What is an AI?
by Sando Sasako
Jakarta, 5 May 2015
Defining Artificial Intelligence
Artificial Intelligence can be defined as an intelligence that was given, embedded, made, created to
some creature. By nature, such creature does not have the intelligence, nor can generate and build
one. Neither can the creature to improve one in terms of development, duplication, regeneration,
reconstruction, and so on, by default.
Russell and Norvig defined the AI as a creature that can perceive, understand, predict, manipulate a
world far larger and more complicated than itself, and build intelligent entities, that is the more
derived artificial Intelligences. Russell and Norvig compartmentalised AI into 4 categories, that is
by thinking and acting, humanly and rationally.1

mapping the AI.jpg
The thinking is concerned with thought processes and reasoning, whereas the acting addresses
behavior. The humanly measures success in terms of fidelity to human performance, whereas the
rationally measures against an ideal performance measure, called rationality. A rationality system is
rational as it does the "right thing," given what it knows.

1 Stuart J. Russell and Peter Norvig, Artifiial Intelligence: A Modern Approach, 3/e, Prentice Hall, New Jersey,
2010, p.1.
4

WHAT DO WE LEARN FROM KMS TECHNOLOGY? AN AI.

A human-centered approach must be in part an empirical science, involving observations and
hypotheses about human behavior. A rationalist2 approach involves a combination of mathematics
and engineering.

Purpose of Artificial Intelligence
As the creature was given an intelligence by the human, such creature has an objective(s) to what is
sensed and perceived by the human (intelligence). The creature must have human intelligence. To
do so, most importantly, the creature must have some thing to 'do' with the aspects of human
intelligence.
Human senses or feels through the sensors received by human's 'devices', that not implanted but
created by the specialised cells that do their job descriptions. It was carried out within the DNA
soon after zygote experienced mitosis. It was not long after the sperm fertilised the ovum.
The five human senses are sight, hearing, touch, smell, and taste. As human is equipped with such
senses, the human is called sentient. While the sentience, according to Karam, means the ability to
feel and to experience perceptions-in other words, to experience the world through one's senses;
intelligence is defined as the ability to sense, experience, and decide what to do. In other words,
intelligence is defined as the ability to learn new things, to learn from experience, and to use this
knowledge to solve problems.3
Furthermore, some part of having intelligence is being able to make decisions, intelligent decisions,
humanly or rationally. What makes things complicated in the real life is that rational decisions
sometimes are intertwined with human conscience, vice versa. The decision trees are the heart of
expert system.
Human conscience means human values. And humanity values have been passed from generation to
generation, individually and/or socially. What makes human unique is the creativities in dealing
day-to-day activities in real life. Creativity in (human) artistry, language, literacy, music, can
generate ideas and innovations as well. Humour and the associated ones are the mighty examples.

Human Intelligence Defined
Human intelligence is the intellectual capacity of humans, which is characterized by perception,
consciousness, self-awareness, and volition. Intelligence enables humans to remember descriptions
of things and use those descriptions in future behaviors. It gives humans the cognitive abilities to
learn, form concepts, understand, and reason, including the capacities to recognize patterns,
comprehend ideas, plan, problem solve, and use language to communicate. Intelligence enables
humans to experience and think.4
2

By distinguishing between human and rational behavior, we are not suggesting that humans are necessarily
"irrational" in the sense of "emotionally unstable" or "insane." One merely need note that we are not perfect: not all
chess players are grandmasters; and, unfortunately, not everyone gets an A on the exam. Some systematic errors in
human reasoning are cataloged by Kahneman et al. (1982).
3 P. Andrew Karam, Science Foundations: Articial Intelligence, Chelsea House, New York, 2012, p.9.
4 Human intelligence http://en.wikipedia.org/wiki/Human_intelligence, 29 April 2015, at 20:10. See also
Evolution of human intelligence http://en.wikipedia.org/wiki/Evolution_of_human_intelligence; Salter W Sternberg RJ,
(1982). Handbook of human intelligence. Cambridge, UK: Cambridge University Press; N. J. Mackintosh (2011). IQ
and Human Intelligence (second ed.). Oxford: Oxford University Press.
5

SANDO SASAKO

While self-awareness and volition have been the easy parts to be implanted on the creature right
from the start, from design to operational; the other 2 factors, perception-sentience and conscience,
have been the hardest parts. According to Macmillan English Dictionary, volition is defined as the
power or ability to decide something by yourself and to take action to get what you want. A more
usual word is will. For example, Did he come of his own volition?5

Self-Awareness
Self-awareness can be articulated by self-control. The control is binary based, Yes or No, Do This
or Donot Do This, Proceed or Stop. The third option is else, IF-THEN-ELSE. Then, there is the
control theory, intelligent control, the grandchild of cybernetics.
Proceed or continue means that there will be action(s) to be taken, work(s) to be done. The work(s)
can be mechanical and/or electrical, controlled and regulated by the sensory devices. The creatures
will behave in response to changes in the environment.
The mechanical creatures have been invented to ease human lives. They are to work or perform on
human's behalf. Some people name the human-age creatures by artifacts. Some people call it
automata, the mechanical beings that act (on their own), but do not think.6

Some Human-Age Creatures
1. A water clock with a regulator that maintained a constant flow rate. It was known as the first
self-controlling machine, built by Ktesibios of Alexandria (c. 250 B.C.).7
2. Antikythera devices (or mechanisms) was built to track the planet positions and moon
phases. It was built around 100 B.C.8
3. In ancient Greece, Hephaestus is known as the god of craftsmen and technology.
a. Hephaestus built metal automatons, including walking tripods, to help his work
and bring things back and forth from his home to Mount Olympus.
b. Hephaestus created human-like machines made of bronze to help him move from
place to place, according to Homer's epic poem The Iliad.
c. Talos, a giant man made of bronze, Talos was responsible for protecting the
island of Crete from pirates and other invaders. He would circle the island
three times each day to do so.
4. Pygmalion, a sculptor, fell in love with one of his creations. This creation is brought to life
by the goddess Venus.
5. Yan Shi, a craftsman, made an automaton, a mechanical man for the emperor. It acted just
like a person. It was so lifelike as it was able to walk, sing, wink at the ladies of the royal
court. It happened in ancient China, more than 2,000 years ago.
6. In Jewish legends, a golem was a man made of clay that was brought to life, by Judah Loew
ben Bezalel (1520-1609) of Prague, through rituals and magic. It was created to protect
the Jews of the city from attack. However, it became more and more violent and could
5

Volition, Macmillan English Dictionary for Advanced Learners, 2007.
P. Andrew Karam, Science Foundations: Articial Intelligence, Chelsea House, New York, 2012, p.9.
7 Other examples of self-regulating feedback control systems include the steam engine governor (James Watt,
1736-1819), the thermostat (and submarine, Cornelis Drebbel, 1572-1633. These inventions create the mathematical
theory of stable feedback systems. Stuart J. Russell and Peter Norvig, Artifiial Intelligence: A Modern Approach, 3/e,
Prentice Hall, New Jersey, 2010, p.15.
8 P. Andrew Karam, Science Foundations: Articial Intelligence, Chelsea House, New York, 2012, p.9.
6
6


Related documents


kms artificial intelligence the economist 20150509
oil and gas business intelligence
artificial intelligence market in oil and gas
pdf speech voice recognition market
how artificial intelligence ai is disrupting
block chain software


Related keywords