Posts

Showing posts from August, 2023

Superintelligence (ASI) and Q&A... - LifeArchitect.ai LIVE

Image

Defining the normal computer control problem by whpearson 4 min read 25th Apr 2017

https://www.lesswrong.com/posts/Gv7be4R57a38m5xrE/defining-the-normal-computer-control-problem There has been focus on controlling super intelligent artificial intelligence, however we currently can't even control our un-agenty computers without having to resort to formatting and other large scale interventions. Solving the normal computer control problem might help us solve the super intelligence control problem or allow us to work towards safe intelligence augmentation. We cannot currently keep our computers doing what we want easily. They can get infected with malware, compromised or they get updates that may be buggy. If you have sufficient expertise you can go in and fix the problem or wipe the system, but this is not ideal. We do not have control our computers, without resorting to out of band manipulation. n this language the normal computer control problem can be defined as. What type of automated system can we implement to stop a normal general purpose computer system misb...

Ideological engineering and social control: A neglected topic in AI safety research? by Geoffrey Miller Sep 1 2017

 This would allow improved 'anti-terrorism' protection, but also much easier automated monitoring and suppression of dissident people and ideas. Over the longer term, inverse reinforcement learning could allow AI systems to learn to model the current preferences and likely media reactions of populations, allowing new AI propaganda systems to pre-test ideological messaging with much more accuracy, shaping gov't 'talking points', policy rationales, and ads to be much more persuasive.  https://forum.effectivealtruism.org/posts/oXzRPoCmYkEySevj8/ideological-engineering-and-social-control-a-neglected-topic

This $250 Ryzen Pre-Built is a BEAST Home Server!

Image

😰 Fear of SQL Coding? NEW LLM beats ChatGPT 3.5 in SQL!!!

Image

An observation on Generalization

Image

How to RUN "CODE LLAMA" on Free Colab [Full Code Inside]!!!

Image

you should NOT host your own email server! (and here is why)

Image

My Brain after 569 Leetcode Problems

Image

🍩 Donut (Document Understanding Transformer) for transforming images of ...

Image

Why Do LLM’s Have Context Limits? How Can We Increase the Context? ALiBi...

Image

How to Fine-Tune Open-Source LLMs Locally Using QLoRA!

Image

Efficiently Build Custom LLMs on Your Data with Open-source Ludwig

Image

Algorithms You Should Know Before System Design Interviews

Image

Naval Ravikant - The 6 BIGGEST Middle Class Habits Keeping You in the Ra...

Image

Bayesian Flow Networks

Image

ORIGINAL FATHER OF AI ON DANGERS! (Prof. Jürgen Schmidhuber)

Image

Some dudes talking about LLMs

Image

My Overkill Home Network - Complete Details 2023 spookyghost Aug 10, 2023 • 22 min read

Image
Link   In this post I will hopefully detail my entire home network. Some of this has been in separate posts explaining single items, but nowhere do I have all of the network in one post with all the changes since last year. Here is a full shot of the rack in my house. Its in a centrally located closet which happens to have a 2ft x 2ft chase into the attic, which is very handy for running network cables. The rack itself is the 25u adjustable StarTech Rack which I've been quite pleased with.

1 Hour Dive into Asynchronous Rust

Image

Small is GOOD - New StableCode 3B AI Coding Assistant!!!

Image

128 Cores & 3D V-Cache EPYC - Launching Today!

Image

ABSOLUTELY BRILLIANT ChatGPT Custom Instructions!!!

Image

Explained: The conspiracy to make AI seem harder than it is! By Gustav S...

Image

Ian Interviews #6: Ljubisa Bajic and Jim Keller, Tenstorrent

Image

Change by Jim Keller, Stanford

Image

AMD's MI300 Chip: A Game Changer for AMD and Threat for Nvidia Stock?

Image

An EPYC Disclosure

Image

Gzip is all You Need! (This SHOULD NOT work)

Image

Signaling an Orb

Image

Unidentified Light Flashing in the Sky

Image

Biometrics are NOT a good method of user verification.

 https://learn.microsoft.com/en-us/previous-versions/tn-archive/cc512578(v=technet.10)?redirectedfrom=MSDN https://www.schneier.com/blog/archives/2005/04/security_risks_2.html https://www.schneier.com/blog/archives/2009/01/biometrics.html https://www.schneier.com/crypto-gram/archives/1998/0815.html#biometrics From Schneier on security blog:  "On the other hand, biometrics are easy to steal. You leave your fingerprints everywhere you touch, your iris scan everywhere you look. Regularly, hackers have copied the prints of officials from objects they’ve touched, and posted them on the Internet. We haven’t yet had an example of a large biometric database being hacked into, but the possibility is there. Biometrics are unique identifiers, but they’re not secrets. And a stolen biometric can fool some systems. It can be as easy as cutting out a signature, pasting it onto a contract, and then faxing the page to someone. The person on the other end doesn’t know that the signature isn’t v...

BONUS: FAA Sued for Illegal Remote ID

Image

Infiltration of command to an air-gapped network using a laser installed...

Image