> What's going to happen next?
Fingerpointing followed by security theatre, then nothing.
Bruteforcing can be restarted next month.
15233 posts • joined 3 Jun 2008
> What's going to happen next?
Fingerpointing followed by security theatre, then nothing.
Bruteforcing can be restarted next month.
While quantum computing can do the "travelling salesman" type calculations extremely quickly
Not it likely cannot.
Because "travelling salesman" is NP-hard and not likely to be in BQP.
Linux is most definitely not free. What a myth!
That strawman rustle!
It is SUPERIOR to most other languages in just about every way, in its simplicity AND flexibility, and applicability to both low-level "hardware" coding, and high-level "UI" coding.
But today, we have Typed Assembly Language. It is time to go all the way and leave kid stuff behind.
Looking at proprietary code you're not supposed to have and telling someone about it is a shitty career-move for devs and coders, it opens you up to very nasty IP / copyright allegations / lawsuits.
Then just don't tell someone about it.
But I like the "Linox". Better (R) this thing now.
This can only happen when both logical processors on the same physical processor are active.
Combustion can only happen if air contains oxygen
Well, you can always redesign the chip to obfuscate its energy usage,
Here for example, from 2003 (paywallyed): Masking the energy behavior of DES encryption [smart cards]:
Smart cards are vulnerable to both invasive and non-invasive attacks. Specifically, non-invasive attacks using power and timing measurements to extract the cryptographic key has drawn a lot of negative publicity for smart card usage. The power measurement techniques rely on the data-dependent energy behavior of the underlying system. Further, power analysis can be used to identify the specific portions of the program being executed to induce timing glitches that may in turn help to bypass key checking. Thus, it is important to mask the energy consumption when executing the encryption algorithms. In this work, we augment the instruction set architecture of a simple five-stage pipelined smart card processor with secure instructions to mask the energy differences due to key-related data-dependent computations in DES encryption. The secure versions operate on the normal and complementary versions of the operands simultaneously to mask the energy variations due to value dependent operations. However, this incurs the penalty of increased overall energy consumption in the data-path components. Consequently, we employ secure versions of instructions only for critical operations; that is we use secure instructions selectively, as directed by an optimizing compiler. Using a cycle-accurate energy simulator, we demonstrate the effectiveness of this enhancement. Our approach achieves the energy masking of critical operations consuming 83% less energy as compared to existing approaches employing dual rail circuits.
Can someone translate this? I don't know this particular dialect of marketingese.
Do you suffer from delusion?
Please quantify your thoughts in kilowatt and janskys otherwise it's just a waste of time.
Get back to me when the basic problems of von Neumann probes have been solved.
I will be waiting next to my phone.
chain of repeaters between here and Alpha Centauri which can handle the data with ease
A chain of weedy transmitters does not make a viable repeater chain and will definitely not be able to handle anything with ease.
Where do people get that stuff? Stephen Hawing?
You neet to put a RTG on each of those weedy probes and fit them with largish radio dishes.
"Microprobes" these ain't.
I think Afghans and a lot of Iraqis and Syrians want to discuss this "forgiveness" thing.
Do you want your soma served dissolved in a cold martini, sir?
So it's Comey who tapes but it's Trump Emperor who gets whipped for it?
Following his first meeting with Trump on January 6, he [Comey] started recording contents of his private conversations with the president-elect on a secure FBI laptop in his car outside Trump Tower. He didn’t even wait until he got back to the office, he did it in the goddamn parking lot. That’s what you call “eager”. In his testimony he admitted that he kept notes of his private meetings with Trump “from that point forward.”
Does that sound like the normal activities of dedicated public servant acting in behalf of the elected government or does it sound like someone who’s on an assignment to dig up as much dirt as possible on the target of a political smear campaign.
Will the chocolate ration now be increased from 250g to 200g?
Maybe string theory can help?
"because it doesn't believe the life support systems malfunctioned."
Maybe but it could one of those things that keep happening because the overall design is just too hacky, has fundamental problems and you really can't even debug it properly. Like those Toyota "Sudden Unintended Acceleration" events.
pilots being instructed to avoid the specific altitudes where their comrades ran short of breathable air
I don't know what to conclude from that, it sounds like the Linux nouveau driver behaviour.
The first thing about these hacks is that you must realize that there are no hacks.
It's another one of those "revelations" that will be forgotten soon, only for bigger "revelations" that will be forgotten soon to be issued in the next episode and even bigger "revelations" that will be forgotten soon to be revealed in the episode after that.
Pure Hollywood productions.
The desire of the Empire to go up against Russia is on the par with the desire of Wilhelmine Germany to go up against France. Afterwards, there is regret.
O.J. Simpson when the cops turn up for wife beatings?
Is this a song by Tom Waits.
4 brilliant developers
Yea, about that (but I posted that already)
you'd need a stunningly good reason to do it locally
Like, because you are suddenly just another 3rd world country, possibly even being bombed by the US for insubordination to their foreign policy goals.
When it gets down to it — talking trade balances here — once we've brain-drained all our technology into other countries, once things have evened out, they're making cars in Bolivia and microwave ovens in Tadzhikistan and selling them here — once our edge in natural resources has been made irrelevant by giant Hong Kong ships and dirigibles that can ship North Dakota all the way to New Zealand for a nickel — once the Invisible Hand has taken away all those historical inequities and smeared them out into a broad global layer of what a Pakistani brickmaker would consider to be prosperity — y'know what? There's only four things we do better than anyone else:
1) music 2) movies 3) microcode (software) 4) high-speed pizza delivery
So, okay, in that Neal Stepehenson quote, one would probably have to remove 1), 2) and 3). And who wants pizza?
No wait, there is still fintech. Ah, never mind.
Someone may have though that "Minimal Viable Product" means "compiles and can be shipped" as opposed to "solves core customer problems in a satisfactory way"
"If they're sitting at the computer....then it's not YOUR computer anymore."
How is that relevant?
If the GPS sats are clobbered by a Carrington event
These satellites are not known for trailing very long conductive loops, so I doubt this would even be a problem.
As for a Gamma Ray Burster, you will have to redecorate the whole shop in any case, not sure if the remaining 600 million years of biologically usable Earth will be sufficient though.
really? do you want to go back to typewriters and paper too?
Apparently it would be a very good idea.
The "recall" option only works for the recipients on the same Exchange tenant though.
The only way to make this kind of dumbass attack not happen is clear separationof concern in the office. You deal with the mental health spreadsheet, you physically go to another laptop in the office. And no sneakernet.
We sadly read:
Given the university is supposed to be making mental health a priority
Only in the ago of diversity and social justice. Previously, the university was supposed to make teaching & research a priority.
Given that it is Israel we are talking aboutm Jehova is sure to decorrelate such attempts at freeloading!
As for the case for enriched uranium, secrets diffuse into Israel, not out of it.
will use single photons as the communications medium
Shurely "will use (entangled) photons as the correlation medium" would be the correct way of putting it.
leave early, provided that the hours not worked are subsequently made up
I'm sure they will be made up, I'm totally sure of it.
Magic is for the movies.
Now watching STALKER. Now that's magic, and it doesn't even help.
Can you encode data at one ground station and have it immediately received at the other?
We are talking correlation only, never information transfer.
1) Arrange to create a single quantum system, from which you can split off two qubits
2) Transport qubits to where the business ends are: A. B
3) Extract classical bit from qubit 1 on location A at time T1: cbA. This is a random bit.
4) Extract classical bit from qubit 2 on location B at time T2: cbB. This is a random bit.
5) However we have correlation: cbA = ~cbB (so it's "correlation at a distance", not "action at a distance")
6) If QM is correct, the "single quantum system" effect holds over arbitrarily large distances, and even across time (whatever T1 and T2 are, and they can be exchanged due to special relativity)
After the CIA narrative outlet "The Washington Post" got bought, I figured the next move would be to get moneyed yuppies eat LSD unawares.
This must be it.
Whole-Food fed upper-class crusties consensualized by WaPo augmented reality, while Amazon tat & toilet paper ordered via Alexa is being delivered by drone to their well-defended burbclaves as Deep State operatives monitor their contentment level from Blue Horizon spysats.
Maybe the public cloud sucks it all up?
They also go massively into the RAM-rich smartphones, so production of modules for smartphones has been increased to the detriment of modules used in servers.
However, Forbes says that Gartner predicts:
Now, Gartner has predicted that DRAM and NAND prices could begin to decline next year, while potentially crashing in 2019. There have been some current trends that support this outlook. For instance, over the last two quarters, expenditures on equipment to produce DRAM is up by about 46%. Major manufacturers are also planning to limit memory content on devices. For instance, the DRAM content of the upcoming iPhone 8 is rumored to be capped at 3 GB, much like the current generation iPhone 7 Plus, as the company looks to keep costs in check.
A bunch of Oompah-Loompas, toiling behind the scenes at removing bales of hate from the premises all day long, singing loudly while they do so.
> Nearer 200.
Shurely you are joking Mr. Hagan, or do you intend to imply that Mr. Babbage was up to more than he let on?
If you are sadistic, you give the ghosts their own machine learning algorithm...
In the sense of a Spitfire being a refinement of a Wright Brothers plane: Yes.
See my answer above.
Machines operate in an environment where the rules prevent them ever doing anything else, so it literally bounds their possible actions.
Well, the point is to allow the rules to be generated, discarded, rebuild, recompressed, weighted, tuned, indexed. analyzed, briefed, debriefed etc. at runtime.
So there are really are no fixed rules, except for the most simple reactive systems. It's like with the spoon, of which you have to realize there is none.
Morpheus knew this: You will always be faster... because they live in a world built on rules.
Morpheus reads a script...
(More in the area of "logic-based rule-based systems" as opposed "let's mess around till it works rule-based systems", there is actually a nice softcover by Cambrdige University Press by Robert Kowalski (who injected the mathematical logic part into Prolog) on what "rule-based systems and logical thinking" are about: "Computational Logic and Human Thinking: How to be Artificially Intelligent". (PDF here)Seems to be a good intro and a contender for a 21st-century update on all those books with titles "how to think logically" etc. that go back to the 19th century at least ... well the book on what is called Port Royal Logic came out in 1683, I see.)
"Blank Slate" AI has died back in the 60s I think (so has "Blank Slate" cognitivie science I would hope).
Well, "Artificial Life/Evolution" would be the closest to it nowadays, but that's a few layers down, so to say.
Next up: The negative-externality-dropping Beast of Redmond creates Roko's Basilisk from old pieces of WinNT networking code. THE END!
My dear academic fellow,
I contend that this is squarely in the tradition of
A better writeup can also be found here:
There is also this mucho-bucko paywalled article in the IEEE Computational Intelligence: A Survey of Learning Classifier Systems in Games which I'm currently reading, indeed I hadn't encountered the framework of the LCS until I stumbled upon said paper (even though I have a copy of Reinforcement Learning: An Introduction, printed 1998, somewhere. Getting old.)
The earlier-talked-about ALPHA air combat NPC also fits into this tradition, it just uses a fuzzy inference system (not sure what that is exactly, it involved another set of equations with sigmas, pis and indexed and/or hatted variables) to do its thing.
This will be 2020, so China may well have the tech in 2 months.
PUTIN PUTIN PUTLER! KIM JON UHNNN!
I had a good laugh earlier, as the Qatar-Saudi split-of-the.terror-supporters is now re-memed to be the work of ... "Russian Hackers"?
The narrative blaming Russia for the Qatar split does not have any evidence to substantiate it, and Sen. Warren went out of her way to ensure none might be revealed today. It is worth pointing out, however, that President Trump personally took credit for the split himself when it first happened, crediting it to his visit to Saudi Arabia just days prior.
Rather, it originates from Qatari state media having quoted the Qatari Emir saying something the Saudis didn’t like, and subsequently attributing the quote to “hackers.” US media outlets saw the word hackers, and naturally assumed Russia, and it appears that as with everything, this has quickly become something everyone is willing to assume is the case.
Is there anything these Russian Hackers can't do? Can they manipulated base reality by the power of Peek and Poke alone? Was phish-multiplying Jesus actually secretly Russian? More on this ... after this message!
(Maybe the Eurasian continent should start thinking about a first strike against the US with all that there is, a last-ditch effort to try to save the world from brainrot and insanity.)
It's not too slow, it's not too fast, it just has speed 1.
Biting the hand that feeds IT © 1998–2017