Forwarded from χаотичні нотатки
either you make things happen, or things happen to you https://oleksandr.works/2019/07/25/news-and-ideas/
oleksandr.works
News and Ideas | Understand the World
Got into a rather nasty car accident. Was waiting in the traffic jam, ended up with a broken shoulder and a totaled car. Right now…
We introduce the heat method for solving the single- or multiple-source shortest path problem on both flat and curved domains. (...) in near-linear time (...) in any dimension, and on any domain that admits a gradient and inner product—including regular grids, triangle meshes, and point clouds. (ACM'17)
https://www.cs.cmu.edu/~kmcrane/Projects/HeatMethod/
https://www.cs.cmu.edu/~kmcrane/Projects/HeatMethod/
TLDR: A good chunk of dependent type benefits, w/o dependent types. Need to check which other languages play nicely with this approach
http://okmij.org/ftp/Computation/lightweight-static-guarantees.html
http://okmij.org/ftp/Computation/lightweight-static-guarantees.html
okmij.org
Lightweight Static Guarantees
The programming style for static assurances, using types to carry capabilities, which are mere references to specifications rather than actual specifications
that's insane. and awesome. DIY semiconductor lithography
> 1975 tech level; still!
http://sam.zeloof.xyz/category/semiconductor/
> 1975 tech level; still!
http://sam.zeloof.xyz/category/semiconductor/
hey look, you can train GPT-2 in under an hour*
* using about $40M worth of hardware. still impressive, though
https://devblogs.nvidia.com/training-bert-with-gpus/
* using about $40M worth of hardware. still impressive, though
https://devblogs.nvidia.com/training-bert-with-gpus/
NVIDIA Technical Blog
NVIDIA Clocks World’s Fastest BERT Training Time and Largest Transformer Based Model, Paving Path For Advanced Conversational AI
NVIDIA DGX SuperPOD trains BERT-Large in just 47 minutes, and trains GPT-2 8B, the largest Transformer Network Ever with 8.3Bn parameters Conversational AI is an essential building block of human…
https://steganography.live/info
Neural Linguistic Steganography - encode your message with a secret key into innocent-looking text with GPT-2!
— I wonder how secure does that look from the cryptanalysis point of view; though one can always cover the message with AES first :)
Neural Linguistic Steganography - encode your message with a secret key into innocent-looking text with GPT-2!
— I wonder how secure does that look from the cryptanalysis point of view; though one can always cover the message with AES first :)
STEGASURAS
STEGanography via Arithmetic coding and Strong neURAl modelS
The TimeViz Browser —
A Visual Survey of Visualization Techniques for Time-Oriented Data
https://vcg.informatik.uni-rostock.de/~ct/timeviz/timeviz.html
A Visual Survey of Visualization Techniques for Time-Oriented Data
https://vcg.informatik.uni-rostock.de/~ct/timeviz/timeviz.html
Symmetric Satellite Swarms and Choreographic Crystals
https://arxiv.org/pdf/1407.5876v2.pdf
https://arxiv.org/pdf/1407.5876v2.pdf
This media is not supported in your browser
VIEW IN TELEGRAM
if you though it's just rich text input that's complicated...
https://lord.io/blog/2019/text-editing-hates-you-too/
https://lord.io/blog/2019/text-editing-hates-you-too/
Writing userspace USB drivers for abandoned devices
> a hell of a roller coaster in USB protocol details, kernel debugging/module reverse engineering, and general video format decoding!
https://blog.benjojo.co.uk/post/userspace-usb-drivers
> a hell of a roller coaster in USB protocol details, kernel debugging/module reverse engineering, and general video format decoding!
https://blog.benjojo.co.uk/post/userspace-usb-drivers
that's why defense in depth is important
https://twitter.com/hashbreaker/status/1198395661403725824
https://twitter.com/hashbreaker/status/1198395661403725824
Twitter
Daniel J. Bernstein
Amazing compendium of failures of "provable security": https://t.co/sTB5xDYMEg. I saw a preprint months ago and the shock value of the huge lists still hasn't worn off. I think (and hope) this will put an end to the delusion that provable-security failures…