Posts
Showing posts from August, 2023
Defining the normal computer control problem by whpearson 4 min read 25th Apr 2017
- Get link
- X
- Other Apps
https://www.lesswrong.com/posts/Gv7be4R57a38m5xrE/defining-the-normal-computer-control-problem There has been focus on controlling super intelligent artificial intelligence, however we currently can't even control our un-agenty computers without having to resort to formatting and other large scale interventions. Solving the normal computer control problem might help us solve the super intelligence control problem or allow us to work towards safe intelligence augmentation. We cannot currently keep our computers doing what we want easily. They can get infected with malware, compromised or they get updates that may be buggy. If you have sufficient expertise you can go in and fix the problem or wipe the system, but this is not ideal. We do not have control our computers, without resorting to out of band manipulation. n this language the normal computer control problem can be defined as. What type of automated system can we implement to stop a normal general purpose computer system misb...
Ideological engineering and social control: A neglected topic in AI safety research? by Geoffrey Miller Sep 1 2017
- Get link
- X
- Other Apps
This would allow improved 'anti-terrorism' protection, but also much easier automated monitoring and suppression of dissident people and ideas. Over the longer term, inverse reinforcement learning could allow AI systems to learn to model the current preferences and likely media reactions of populations, allowing new AI propaganda systems to pre-test ideological messaging with much more accuracy, shaping gov't 'talking points', policy rationales, and ads to be much more persuasive. https://forum.effectivealtruism.org/posts/oXzRPoCmYkEySevj8/ideological-engineering-and-social-control-a-neglected-topic
😰 Fear of SQL Coding? NEW LLM beats ChatGPT 3.5 in SQL!!!
- Get link
- X
- Other Apps
How to RUN "CODE LLAMA" on Free Colab [Full Code Inside]!!!
- Get link
- X
- Other Apps
you should NOT host your own email server! (and here is why)
- Get link
- X
- Other Apps
🍩 Donut (Document Understanding Transformer) for transforming images of ...
- Get link
- X
- Other Apps
Why Do LLM’s Have Context Limits? How Can We Increase the Context? ALiBi...
- Get link
- X
- Other Apps
How to Fine-Tune Open-Source LLMs Locally Using QLoRA!
- Get link
- X
- Other Apps
Efficiently Build Custom LLMs on Your Data with Open-source Ludwig
- Get link
- X
- Other Apps
Algorithms You Should Know Before System Design Interviews
- Get link
- X
- Other Apps
Naval Ravikant - The 6 BIGGEST Middle Class Habits Keeping You in the Ra...
- Get link
- X
- Other Apps
ORIGINAL FATHER OF AI ON DANGERS! (Prof. Jürgen Schmidhuber)
- Get link
- X
- Other Apps
My Overkill Home Network - Complete Details 2023 spookyghost Aug 10, 2023 • 22 min read
- Get link
- X
- Other Apps
Link In this post I will hopefully detail my entire home network. Some of this has been in separate posts explaining single items, but nowhere do I have all of the network in one post with all the changes since last year. Here is a full shot of the rack in my house. Its in a centrally located closet which happens to have a 2ft x 2ft chase into the attic, which is very handy for running network cables. The rack itself is the 25u adjustable StarTech Rack which I've been quite pleased with.
Small is GOOD - New StableCode 3B AI Coding Assistant!!!
- Get link
- X
- Other Apps
Explained: The conspiracy to make AI seem harder than it is! By Gustav S...
- Get link
- X
- Other Apps
Ian Interviews #6: Ljubisa Bajic and Jim Keller, Tenstorrent
- Get link
- X
- Other Apps
AMD's MI300 Chip: A Game Changer for AMD and Threat for Nvidia Stock?
- Get link
- X
- Other Apps
Biometrics are NOT a good method of user verification.
- Get link
- X
- Other Apps
https://learn.microsoft.com/en-us/previous-versions/tn-archive/cc512578(v=technet.10)?redirectedfrom=MSDN https://www.schneier.com/blog/archives/2005/04/security_risks_2.html https://www.schneier.com/blog/archives/2009/01/biometrics.html https://www.schneier.com/crypto-gram/archives/1998/0815.html#biometrics From Schneier on security blog: "On the other hand, biometrics are easy to steal. You leave your fingerprints everywhere you touch, your iris scan everywhere you look. Regularly, hackers have copied the prints of officials from objects they’ve touched, and posted them on the Internet. We haven’t yet had an example of a large biometric database being hacked into, but the possibility is there. Biometrics are unique identifiers, but they’re not secrets. And a stolen biometric can fool some systems. It can be as easy as cutting out a signature, pasting it onto a contract, and then faxing the page to someone. The person on the other end doesn’t know that the signature isn’t v...
Infiltration of command to an air-gapped network using a laser installed...
- Get link
- X
- Other Apps