If there ever was a technology where the rational and responsible act was to hold off and wait and until the bubble pops, āAIā is it.
ai read laterCialdiniās book was a turning point because it highlighted the very real limitations to human reasoning. No matter how smart you were, the mechanisms of your thinkings could easily be tricked in ways that completely bypassed your logical thinking and could insert ideas and trigger decisions that were not in your best interest.
ai read laterMy input stream is full of it: Fear and loathing and cheerleading and prognosticating on what generative AI means and whether itās Good or Bad and what we should be doing. All the channels: Blogs and peer-reviewed papers and social-media posts and business-news stories. So thereās lots of AI angst out there, but this is mine.
ai read laterseveral years ago, I had an epiphany in my self-concept. I finally understood that, to the extent that I am usefully clever, it is less in a Holmesian idiom, and more, shall we say, Monkesque.
ai read laterWe are past the event horizon; the takeoff has started. Humanity is close to building digital superintelligence, and at least so far itās much less weird than it seems like it should be.
ai read laterIn an episode of the "All In" podcast released on Tuesday, Google cofounder Sergey Brin said he has been using AI for some of his leadership tasks since returning to the company.
"Management is like the easiest thing to do with the AI," Brin said.
ai read laterHe began by noting that he is known for coining the term "enshittification" about the decay of tech platforms, so attendees were probably expecting to hear about that; instead, he wanted to start by talking about nursing. A recent study described how nurses are increasingly getting work through one of three main apps that "bill themselves out as 'Uber for nursing'". The nurses never know what they will be paid per hour prior to accepting a shift and the three companies act as a cartel in order to "play all kinds of games with the way that labor is priced".
internet read laterThe reason Iām not diving head first into everything AI isnāt because I fear it or donāt understand it, itās because Iāve already long since come to my conclusion about the technology. Iām neither of the opinion that itās completely useless or revolutionary, simply that the game being played is one I neither currently need nor want to be a part of.
ai read laterI wish the AI coding dream were true. I wish I could make every dumb coding idea I ever had a reality. I wish I could make a fretboard learning app on Monday, a Korean trainer on Wednesday, and a video game on Saturday. Iād release them all. Iād drown the world in a flood of shovelware like the world had never seen. Well, I would ā if it worked.
ai read laterPKI is really powerful, and really interesting. The math is complicated, and the standards are stupidly baroque, but the core concepts are actually quite simple. Certificates are the best way to identify code and devices, and identity is super useful for security, monitoring, metrics, and a million other things. Using certificates is not that hard. No harder than learning a new language or database. Itās just slightly annoying and poorly documented. This is the missing manual.
certificates encryption security read laterRecently, I am learning how Elliptic Curve Cryptography works. I searched around the internet, found so many articles and videos explaining it. Most of them are covering only a portion of it, some of them skip many critical steps how you get from here to there. In the end, I didnāt find an article that really explains it from end-to-end in an intuitive way. With that in mind, I would like to write a post explaining Elliptic Curve Cryptography, cover from the basics to key exchange, encryption, and decryption.
encryption security read laterA description of ECC without using advanced math
security read laterThe network stack does several seemingly-impossible things. It does reliable transmission over our unreliable networks, usually without any detectable hiccups. It adapts smoothly to network congestion. It provides addressing to billions of active nodes. It routes packets around damaged network infrastructure, reassembling them in the correct order on the other side even if they arrived out of order. It accommodates esoteric analog hardware needs, like balancing the charge on the two ends of an Ethernet cable. This all works so well that users never hear of it, and even most programmers don't know how it works.
read later networkingThe theory of lock picking is the theory of exploiting mechanical defects. There are a few basic concepts and definitions but the bulk of the material consists of tricks for opening locks with particular defects or characteristics.
hacking read later interestingSometimes, change is unexpected. More often than not, change sneaks in until it feels grand and inevitable. Gradually, and then suddenly. iOS users have lived through numerous tides of such changes over the past three years.
apple read later