Tagged
Repeat this mantra:
Only decentralize when inevitable.
Only decentralize when inevitable.
Only decentralize when inevitable.
Tagged
Tagged
This is what society gets for not using open knowledge: some of its best minds will be bound to waste endless hours reversing some useless technology.
With that said, even when you do have the source code, reading run logs and using debuggers are a sort of reverse engineering at heart.
One of the most jaw dropping reverse engineering projects Ciro has ever seen is the Super Mario 64 reverse engineering project.
How software engineers view science:
Science is the reverse engineering of nature.
Ciro Santilli had once assigned this as one of Ciro Santilli's best random thoughts, but he later found that Wikipedia actually says exactly that: en.wikipedia.org/wiki/Reverse_engineering ("similar to scientific research, the only difference being that scientific research is about a natural phenomenon") so maybe that is where Ciro picked it up unconsciously in the first place.
Ciro Santilli is a fan of this late 2010's buzzword.
It basically came about because of the endless stream of useless software startups made since the 2000's by one or two people with no investments with the continued increase in computers and Internet speeds until the great wall was reached.
Deep tech means not one of those. More specifically, it means technologies that require significant investment in expensive materials and laboratory equipment to progress, such as molecular biology technologies and quantum computing.
And it basically comes down to technologies that wrestle with the fundamental laws of physics rather than software data wrangling.
Computers are of course limited by the laws of physics, but those are much hidden by several layers of indirection.
Full visibility, and full control, make computer tasks be tasks that eventually always work out more or less as expected.
The same does not hold true when real Physics is involved.
Physics is brutal.
To start with, you can't even see your system very clearly, and often doing so requires altering its behaviour.
For example, in molecular biology, most great discoveries are made after some new technique is made to be able to observe smaller things.
But you often have to kill your cells to make those observations, which makes it very hard to understand how they work dynamically.
What we would really want would be to track every single protein as it goes about inside the cell. But that is likely an impossible dream.
The same for the brain. If we had observations of every neuron, how long would it take to understand it? Not long, people are really good at reverse engineering things when there is enough information available to do so, see also science is the reverse engineering of nature.
Then, even when you start to see the system, you might have a very hard time controlling it, because it is so fragile. This is basically the case of quantum computing in 2020.
It is for those reasons that deep tech is so exciting.
The next big things will come from deep tech. Failure is always a possibility, and you can't know before you try.
But that's also why its so fun to dare.
Stuff that Ciro Santilli considers "deep tech" as of 2020:
- brain-computer interface
- fusion power. The question there is, when is "deep", "too deep"?
Applications of power, we have to remember it is there to notice how awesome it is!
- lightning
- motors
- sending nad receiving communication signals
- computers, which in turn can do computations and improved communication
- www.iter.org/sci/MakingitWork ITER page mentions that 80% of energy goes out on neutrons and that capturing this is a major challenge[ref]
- 2024 DARPA announcement: x.com/DARPA/status/1819112110988657075
We're requesting info & ideas for fundamental breakthroughs to enable high-power, direct conversion from nuclear energy into electricity by converting reactor neutrons to alphas or betas for voltaics.
Most promising approaches as of 2020:
Once again, relies on superconductivity to reach insane magnetic fields. Superconductivity is just so important.
Ciro Santilli saw a good presentation about it once circa 2020, it seems that the main difficulty of the time was turbulence messing things up. They have some nice simulations with cross section pictures e.g. at: www.eurekalert.org/news-releases/937941.
Types:
- chemical explosive. Almost a synonym for explosive in most contexts.
Tagged
Tagged
Tagged
Tagged
Tagged
Setting: you are sending bits through a communication channel, each bit has a random probability of getting flipped, and so you use some error correction code to achieve some minimal error, at the expense of longer messages.
This theorem sets an upper bound on how efficient you can be in your encoding, for any encoding.
The next big question, which the theorem does not cover is how to construct codes that reach or approach the limit. Important such codes include:
But besides this, there is also the practical consideration of if you can encode/decode fast enough to keep up with the coded bandwidth given your hardware capabilities.
news.mit.edu/2010/gallager-codes-0121 explains how turbo codes were first reached without a very good mathematical proof behind them, but were still revolutionary in experimental performance, e.g. turbo codes were used in 3G/4G.
But this motivated researchers to find other such algorithms that they would be able to prove things about, and so they rediscovered the much earlier low-density parity-check code, which had been published in the 60's but was forgotten, partially because it was computationally expensive.
TODO how close does it get to Shannon's limit?
Man-in-the-middle attack
quantumcomputing.stackexchange.com/questions/142/advantage-of-quantum-key-distribution-over-post-quantum-cryptography/25727#25727 Advantage of quantum key distribution over post-quantum cryptography has Ciro Santilli's comparison to classical encryption.
BB84 is a good first algorithm to look into.
Long story short:
- QKD allows you to generate shared keys without public-key cryptography. You can then use thses shared keys
- QKD requires authentication on a classical channel, exactly like a classical public-key cryptography forward secrecy would. The simplest way to do this is a with a pre-shared key, just like in classical public key cryptography. If that key is compromised at any point, your future messages can get man-in-the-middle'd, exactly like in classical cryptography.
QKD uses quantum mechanics stuff to allow sharing unsnoopable keys: you can detect any snooping and abort communication. Unsnoopability is guaranteed by the known laws of physics, up only to engineering imperfections.
Furthermore, it allows this key distribution without having to physically take a box by car somewhere: once the channel is established, e.g. optical fiber, you can just keep generating perfect keys from it. Otherwise it would be pointless, as you could just drive your one-time pad key every time.
However, the keys likely have a limited rate of generation, so you can't just one-time pad the entire message, except for small text messages. What you would then do is to use the shared key with symmetric encryption.
Therefore, this setup usually ultimately relies on the idea that we believe that symmetric encryption is safer than , even though there aren't mathematical safety proofs of either as of 2020.
Does not require entangled particles, unlike E91 which does.
en.wikipedia.org/w/index.php?title=Quantum_key_distribution&oldid=1079513227#BB84_protocol:_Charles_H._Bennett_and_Gilles_Brassard_(1984) explains it well. Basically:
- Alice and Bob randomly select a measurement basis of either 90 degrees and 45 degrees for each photon
- Alice measures each photon. There are two possible results to either measurement basis: parallel or perpendicular, representing values 0 or 1. TODO understand better: weren't the possible results supposed to be pass or non-pass? She writes down the results, and sends the (now collapsed) photons forward to Bob.
- Bob measures the photons and writes down the results
- Alice and Bob communicate to one another their randomly chosen measurement bases over the unencrypted classic channel.This channel must be authenticated to prevent man-in-the-middle. The only way to do this authentication that makes sense is to use a pre-shared key to create message authentication codes. Using public-key cryptography for a digital signature would be pointless, since the only advantage of QKD is to avoid using public-key cryptography in the first place.
- they drop all photons for which they picked different basis. The measurements of those which were in the same basis are the key. Because they are in the same basis, their results must always be the same in an ideal system.
- if there is an eavesdropper on the line, the results of measurements on the same basis can differ.Unfortunately, this can also happen due to imperfections in the system.Alice and Bob must decide what level of error is above the system's imperfections and implies that an attacker is listening.
Requires entangled particles, unlike BB84 which does not.
Tagged
Tagged
- phys.org/news/2023-02-muon-detectors-remotely-3d-image.html Using muon detectors to remotely create a 3D image of the inside of a nuclear reactor (2023)
The most beautiful ones:see also Section "Animations of molecular biology processes"
- sodium channel
- basically anything that falls in the DNA replication and transcription
Base machinery of the nervous system.
Follow car terminology and be done with it. Also follows marking of all bike shifters.
Full range achieved, going from fastest to slowest works (downshift), but going from slowest to next slowest (upshift) fails. Limits are good, B-tension screw didn't help
- bicycles.stackexchange.com/questions/66811/rear-derailleur-does-not-downshift-properly-shifts-up-smoothly likely good question but with wrong up vs down terminology
It is true, something Ciro Santilli often things about. One likely reason is that the world is broken and most cyclist are speed maniacs willing to put the time in. Unlike Dutch people where everyone cycles.
The images you have to have in mind are:
Yes, Sheldon he has separate American and British English versions of pages!!!
For example, Kross bicycle (2017) had a Schwalbe tyre with markings:When inflated, the tires were about 3.5cm wide as measured with a ruler.
42-622 (28 x 1.60, 700x40C)
And the Mavic A319 rim had markings:
622x19C
In this:
- ISO (Etrto): 42-622. So:
- 42 is the inner rim width. The actual inflated tire is going to be even wider.
- 622 is the bead seat diameter. The actual inflated tire is going to be even wider.
- imperial: 28 x 1.60
- French: 700x40C:
- meaning of the "C" asked at: bicycles.stackexchange.com/questions/16190/what-does-the-c-in-bicycle-tire-size-mean
- www.sheldonbrown.com/tire-sizing.html#french says A is larger than B which is larger than C, and C means 622 mm
- meaning of the "C" asked at: bicycles.stackexchange.com/questions/16190/what-does-the-c-in-bicycle-tire-size-mean
Manuals: si.shimano.com/
Overview of Shimano brands 2018: www.evanscycles.com/coffeestop/advice/the-complete-guide-to-shimanos-mountain-bike-groupsets-and-their-hierarchy
- Shimano Altus RD-M310: almost cheapest MTB
- Shimano Acera RD-M360: second cheapest MTB
- Shimano Alivio RD-M410: third cheapest MTB
- Shimano Claris: entry 8-speed road bike www.youtube.com/watch?v=6dFQDDg6Wt0
- Shimano Sora: 9-speed road bike bike.shimano.com/en-EU/product/component/sora-r3000.html
- Shimano Tiagra: 10-speed road bike bike.shimano.com/en-EU/product/component/tiagra-4700.html
- Shimano Deore: non-shitty MTB, in increasing performance: M610, M6000, M7000, ...)
- Shimano Tourney; commuter, likely the shittiest of all lines: bike.shimano.com/en-EU/product/component/tourney.html
They actually carry atomic clocks in them.
Funding:
For computer interfaces see: computer user-interface.
They've been trying to get it to work forever, and it's beeen buggy forever:
Became the default on Ubuntu 21.04: www.omgubuntu.co.uk/2021/01/ubuntu-21-04-will-use-wayland-by-default
It is hard to pinpoint why, but the following useful software just feel bad for some reason:
The ultimate computer user-interface!
And life extension? worldbuilding.stackexchange.com/questions/112022/would-an-invasive-spinal-cord-brain-computer-interface-allow-healthy-individuals
Elon Musk's attempt.
Very very good. Those nice pre-Dot-com bubble vibes.
Might be freely watchable? Wikipedia links to:
But they do start with an FBI warning about copyright. So... erm.
Part 1 - Networking The Nerds talks about the TCP/IP and early machines implementing it:
- 21:00: shows inside The Pentagon. The way the dude who works there opens a his locked office door with an electric switch is just amazing. Cringely also mentions that there's an actual official speed limit in the corridors as he rides a carrier bike slowly through them.
- 21:45: the universities weren't enthusiastic, because people from other locations would be able to use your precious computer time. But finally ARPA forced the universities' hands, and they joined.
- 24:24 mentions that some of the guys who created ARPANET were actually previously counting cards at Casinos in Las Vegas, just like in the 21 (2008) film
- one of the centerpieces of development was at UCLA. The other was the BBN company. 33:55 shows the first router, then called them Interface Message Processor
- the first message was from UCLA to Stanford University. He was trying to write "Login", and it crashed at the 'g'. Epic. They later debugged it.
- towards the end talks about ALOHAnet, the first wireless computer communication done
Part 2 - Serving the Suits
- Robert Metcalfe. He's nice. Xerox PARC. Ethernet.
- Explains what is a "Workstation", notably showing one by Sun Microsystems. This is now an obscure "passé" thing in 2020 that young people like Ciro Santilli have only heard of in legend (or in outdated university computer labs!). Funny to think that so many people have had this idea before, including e.g. the Chromebook
- 10:46 mentions that all of Cisco, Silicon Graphics and Sun Microsystems and where founded at Margaret Jacks Hall, Building 460, at Stanford University.
- he then talks a lot about Sun. Sun became dominant in Wall Street.
- 19:05: Novell, from Utah. How they almost went bust, but were saved at the last moment by Ray Noorda, who refocused them to their NetWare product which was under recent development. It allowed file and printer sharing in IBM PCs. 22:55 shows how they had a live radio host for people waiting on customer support calls!
- 33:56 mentions how The Grateful Dead had in impact on the Internet, as people wanted computers to be able to access The WELL online forum. They still own the domain as of 2022: www.well.com/. It is interesting how Larry Page also liked The Grateful Dead as mentioned at The Google Story, his dad would take him to shows. Larry is a bit younger of course than the people in this documentary.
- 37 show McAfee
- 43:56: fantastic portrait of Cisco
Part 3 - Wiring the World:
- Berners-Lee at CERN and the invention of the URL.
- 1992: US Government allow commerce on the Internet
- Web browser history, Mosaic and Marc Andresseeen.
- 20:45: America Online
- 23:29: search engines and Excite. Google was a bit too small to be on his radar!
- 25:50: porn
- 27: The Motley Fool and advertising
- 30: Planet U grocery shopping
- 31:50: Amazon
- 33:00: immigrant workers, Indians playing cricket, outsourcing, Wipro Systems
- 41:25: Java
- 46:30: Microsoft joins the Internet. The Internet Tidal Wave Internet memo. Pearl Harbour day talk.
- 56:40: Excite Tour. If they had survived, they would have been Google with their quirky offices.
Tagged
Host: Ben Krasnow.
Deals with materials, chemistry, microscopy, electronics.
Uber practical, well described setups deep science stuff, he is awesome and has been at Google since 2014: www.linkedin.com/in/ben-krasnow-6796a94/
Ben studied at University of California, Santa Barbara.
www.youtube.com/watch?v=qiMR6yAFfyA He obtained PhD from UCSB in Materials, exploring, among other things, growth of a semiconductor called lead selenide.
Aweseome dude filmed a bit of the high end univeresity equipment while doing his thesis.
Does deliver good concise ideas. Now we need something on the less concise side of it.
Great chemistry content. Well detailed setups, notably substance extraction from off-the-shelf products.
This dude is mind blowing. Big respect.
Some of the most impressive videos are the ones in which he goes and extracts metals from minerals himself all the way.
But God, the typography of the channel name is so insane! Why no space???
Shame the academic system wasn't compatible with him: www.reddit.com/r/codyslab/comments/f5531p/codys_qualifications/ Maybe there were safety issues involved though.
Social technology
words: 55k articles: 1k