Public

Public

451 bookmarks
Custom sorting
Dynamic random-access memory - Wikipedia
Dynamic random-access memory - Wikipedia
Dynamic random-access memory is a type of random-access semiconductor memory that stores each bit of data in a memory cell, usually consisting of a tiny capacitor and a transistor, both typically based on metal–oxide–semiconductor (MOS) technology. While most DRAM memory cell designs use a capacitor and transistor, some only use two transistors. In the designs where a capacitor is used, the capacitor can either be charged or discharged; these two states are taken to represent the two values of a bit, conventionally called 0 and 1. The electric charge on the capacitors gradually leaks away; without intervention the data on the capacitor would soon be lost. To prevent this, DRAM requires an external memory refresh circuit which periodically rewrites the data in the capacitors, restoring them to their original charge. This refresh process is the defining characteristic of dynamic random-access memory, in contrast to static random-access memory (SRAM) which does not require data to be refreshed. Unlike flash memory, DRAM is volatile memory, since it loses its data quickly when power is removed. However, DRAM does exhibit limited data remanence.
Dynamic random-access memory (dynamic RAM or DRAM) is a type of random-access semiconductor memory that stores each bit of data in a memory cell, usually consisting of a tiny capacitor and a transistor, both typically based on metal–oxide–semiconductor (MOS) technology. While most DRAM memory cell designs use a capacitor and transistor, some only use two transistors
·en.wikipedia.org·
Dynamic random-access memory - Wikipedia
Non-volatile random-access memory - Wikipedia
Non-volatile random-access memory - Wikipedia
Non-volatile random-access memory (NVRAM) is random-access memory that retains data without applied power. This is in contrast to dynamic random-access memory (DRAM) and static random-access memory (SRAM), which both maintain data only for as long as power is applied, or forms of sequential-access memory such as magnetic tape, which cannot be randomly accessed but which retains data indefinitely without electric power.
Non-volatile random-access memory (NVRAM) is random-access memory that retains data without applied power. This is in contrast to dynamic random-access memory (DRAM) and static random-access memory (SRAM), which both maintain data only for as long as power is applied, or forms of sequential-access memory such as magnetic tape, which cannot be randomly accessed but which retains data indefinitely without electric power.
·en.wikipedia.org·
Non-volatile random-access memory - Wikipedia
Static random-access memory - Wikipedia
Static random-access memory - Wikipedia
Static random-access memory (static RAM or SRAM) is a type of random-access memory (RAM) that uses latching circuitry (flip-flop) to store each bit. SRAM is volatile memory; data is lost when power is removed. The term static differentiates SRAM from DRAM (dynamic random-access memory) — SRAM will hold its data permanently in the presence of power, while data in DRAM decays in seconds and thus must be periodically refreshed. SRAM is faster than DRAM but it is more expensive in terms of silicon area and cost; it is typically used for the cache and internal registers of a CPU while DRAM is used for a computer's main memory.
·en.wikipedia.org·
Static random-access memory - Wikipedia
What Is an ICO (Initial Coin Offering)? | Binance Academy
What Is an ICO (Initial Coin Offering)? | Binance Academy
Want to learn about Initial Coin Offerings and why many cryptocurrency projects launch their own? What is an ICO? Find out on Binance Academy.
An Initial Coin Offering (or ICO) is a method for teams to raise funds for a project in the cryptocurrency space. In an ICO, teams generate blockchain-based tokens to sell to early supporters. This serves as a crowdfunding phase – users receive tokens that they can use (either immediately or in the future), and the project receives money to fund development.
·academy.binance.com·
What Is an ICO (Initial Coin Offering)? | Binance Academy
Initial Exchange Offering (IEO) | Binance Academy
Initial Exchange Offering (IEO) | Binance Academy
Initial Exchange Offering (IEO) | Definition: The fundraising will be conducted on a well-known exchange’s fundraising platform, such as Binance Launchpad
An Initial Exchange Offering, commonly referred to as an IEO, is a fundraising event that is administered by an exchange. In contrast to an Initial Coin Offering (ICO) where the project team themselves conduct the fundraising, an Initial Exchange Offering means that the fundraising will be conducted on a well-known exchange’s fundraising platform, such as Binance Launchpad, where users can purchase tokens with funds directly from their own exchange wallet.
·academy.binance.com·
Initial Exchange Offering (IEO) | Binance Academy
Introducing LLaMA: A foundational, 65-billion-parameter language model
Introducing LLaMA: A foundational, 65-billion-parameter language model
Today, we’re releasing our LLaMA (Large Language Model Meta AI) foundational model with a gated release. LLaMA is more efficient and competitive with previously published models of a similar size on existing benchmarks.
·ai.facebook.com·
Introducing LLaMA: A foundational, 65-billion-parameter language model
Neuroprosthetics - Wikipedia
Neuroprosthetics - Wikipedia
Neuroprosthetics (also called neural prosthetics) is a discipline related to neuroscience and biomedical engineering concerned with developing neural prostheses. They are sometimes contrasted with a brain–computer interface, which connects the brain to a computer rather than a device meant to replace missing biological functionality
·en.wikipedia.org·
Neuroprosthetics - Wikipedia
Penrose tiling - Wikipedia
Penrose tiling - Wikipedia
A Penrose tiling is an example of an aperiodic tiling. Here, a tiling is a covering of the plane by non-overlapping polygons or other shapes, and aperiodic means that shifting any tiling with these shapes by any finite distance, without rotation, cannot produce the same tiling. However, despite their lack of translational symmetry, Penrose tilings may have both reflection symmetry and fivefold rotational symmetry. Penrose tilings are named after mathematician and physicist Roger Penrose, who investigated them in the 1970s.
A Penrose tiling is an example of an aperiodic tiling. Here, a tiling is a covering of the plane by non-overlapping polygons or other shapes, and aperiodic means that shifting any tiling with these shapes by any finite distance, without rotation, cannot produce the same tiling. However, despite their lack of translational symmetry, Penrose tilings may have both reflection symmetry and fivefold rotational symmetry. Penrose tilings are named after mathematician and physicist Roger Penrose, who investigated them in the 1970s.
·en.wikipedia.org·
Penrose tiling - Wikipedia
Tessellation - Wikipedia
Tessellation - Wikipedia
A tessellation or tiling is the covering of a surface, often a plane, using one or more geometric shapes, called tiles, with no overlaps and no gaps. In mathematics, tessellation can be generalized to higher dimensions and a variety of geometries.
A tessellation or tiling is the covering of a surface, often a plane, using one or more geometric shapes, called tiles, with no overlaps and no gaps. In mathematics, tessellation can be generalized to higher dimensions and a variety of geometries. A periodic tiling has a repeating pattern. Some special kinds include regular tilings with regular polygonal tiles all of the same shape, and semiregular tilings with regular tiles of more than one shape and with every corner identically arranged. The patterns formed by periodic tilings can be categorized into 17 wallpaper groups. A tiling that lacks a repeating pattern is called "non-periodic". An aperiodic tiling uses a small set of tile shapes that cannot form a repeating pattern. A tessellation of space, also known as a space filling or honeycomb, can be defined in the geometry of higher dimensions.
·en.wikipedia.org·
Tessellation - Wikipedia
Trolley problem - Wikipedia
Trolley problem - Wikipedia
The trolley problem is a series of thought experiments in ethics and psychology, involving stylized ethical dilemmas of whether to sacrifice one person to save a larger number. The series usually begins with a scenario in which a runaway tram or trolley is on course to collide with and kill a number of people (traditionally five) down the track, but a driver or bystander can intervene and divert the vehicle to kill just one person on a different track. Then other variations of the runaway vehicle, and analogous life-and-death dilemmas (medical, judicial etc.) are posed, each containing the option to either do nothing, in which case several people will be killed, or intervene and sacrifice one initially "safe" person to save the others.
·en.wikipedia.org·
Trolley problem - Wikipedia
Mesa-Optimization - AI Alignment Forum
Mesa-Optimization - AI Alignment Forum
Mesa-Optimization is the situation that occurs when a learned model (such as a neural network) is itself an optimizer. In this situation, a base optimizer creates a second optimizer, called a mesa-optimizer. The primary reference work for this concept is Hubinger et al.'s "Risks from Learned Optimization in Advanced Machine Learning Systems". Example: Natural selection is an optimization process that optimizes for reproductive fitness. Natural selection produced humans, who are themselves optimizers. Humans are therefore mesa-optimizers of natural selection. In the context of AI alignment, the concern is that a base optimizer (e.g., a gradient descent process) may produce a learned model that is itself an optimizer, and that has unexpected and undesirable properties. Even if the gradient descent process is in some sense "trying" to do exactly what human developers want, the resultant mesa-optimizer will not typically be trying to do the exact same thing.[1]   HISTORY Previously work under this concept was called Inner Optimizer or Optimization Daemons. Wei Dai brings up a similar idea in an SL4 thread.[2] The optimization daemons article on Arbital was published probably in 2016.[1] Jessica Taylor wrote two posts about daemons while at MIRI: * "Are daemons a problem for ideal agents?" (2017-02-11) * "Maximally efficient agents will probably have an anti-daemon immune system" (2017-02-23)   SEE ALSO * Inner Alignment * Complexity of value * Thou Art Godshatter EXTERNAL LINKS Video by Robert Miles Some posts that reference optimization daemons: * "Cause prioritization for downside-focused value systems": "Alternatively, perhaps goal preservation becomes more difficult the more capable AI systems become, in which case the future might be controlled by unstable goal functions taking turns over the steering wheel" * "Techniques for optimizing worst-case performance": "The difficulty of optimizing worst-case performance is one of the most likely re
Mesa-Optimization is the situation that occurs when a learned model (such as a neural network) is itself an optimizer. In this situation, a base optimizer creates a second optimizer, called a mesa-optimizer. The primary reference work for this concept is Hubinger et al.'s "Risks from Learned Optimization in Advanced Machine Learning Systems".
·alignmentforum.org·
Mesa-Optimization - AI Alignment Forum
Consequentialism - Wikipedia
Consequentialism - Wikipedia
In ethical philosophy, consequentialism is a class of normative, teleological ethical theories that holds that the consequences of one's conduct are the ultimate basis for judgment about the rightness or wrongness of that conduct. Thus, from a consequentialist standpoint, a morally right act is one that will produce a good outcome. Consequentialism, along with eudaimonism, falls under the broader category of teleological ethics, a group of views which claim that the moral value of any act consists in its tendency to produce things of intrinsic value. Consequentialists hold in general that an act is right if and only if the act will produce, will probably produce, or is intended to produce, a greater balance of good over evil than any available alternative. Different consequentialist theories differ in how they define moral goods, with chief candidates including pleasure, the absence of pain, the satisfaction of one's preferences, and broader notions of the "general good".
In ethical philosophy, consequentialism is a class of normative, teleological ethical theories that holds that the consequences of one's conduct are the ultimate basis for judgment about the rightness or wrongness of that conduct. Thus, from a consequentialist standpoint, a morally right act (or omission from acting) is one that will produce a good outcome. Consequentialism, along with eudaimonism, falls under the broader category of teleological ethics, a group of views which claim that the moral value of any act consists in its tendency to produce things of intrinsic value
·en.wikipedia.org·
Consequentialism - Wikipedia
Semantic network - Wikipedia
Semantic network - Wikipedia
A semantic network, or frame network is a knowledge base that represents semantic relations between concepts in a network. This is often used as a form of knowledge representation. It is a directed or undirected graph consisting of vertices, which represent concepts, and edges, which represent semantic relations between concepts, mapping or connecting semantic fields. A semantic network may be instantiated as, for example, a graph database or a concept map. Typical standardized semantic networks are expressed as semantic triples.
A semantic network, or frame network is a knowledge base that represents semantic relations between concepts in a network. This is often used as a form of knowledge representation. It is a directed or undirected graph consisting of vertices, which represent concepts, and edges, which represent semantic relations between concepts,[1] mapping or connecting semantic fields. A semantic network may be instantiated as, for example, a graph database or a concept map. Typical standardized semantic networks are expressed as semantic triples.
·en.wikipedia.org·
Semantic network - Wikipedia
Domain-driven design - Wikipedia
Domain-driven design - Wikipedia
Domain-driven design (DDD) is a major software design approach,[1] focusing on modeling software to match a domain according to input from that domain's experts.[2]
Domain-driven design (DDD) is a major software design approach,[1] focusing on modeling software to match a domain according to input from that domain's experts.[2] Under domain-driven design, the structure and language of software code (class names, class methods, class variables) should match the business domain. For example, if software processes loan applications, it might have classes like loan application, customer, and methods such as accept offer and withdraw. Domain-driven design is predicated on the following goals: placing the project's primary focus on the core domain and domain logic; basing complex designs on a model of the domain; initiating a creative collaboration between technical and domain experts to iteratively refine a conceptual model that addresses particular domain problems.
·en.wikipedia.org·
Domain-driven design - Wikipedia
Saadi Shirazi - Wikipedia
Saadi Shirazi - Wikipedia
Saadi Shīrāzī, better known by his pen name Saadi, also known as Sadi of Shiraz, was a Persian poet and prose writer of the medieval period. He is recognized for the quality of his writings and for the depth of his social and moral thoughts.
Saadi Shīrāzī[2] (Persian: ابومحمّد مصلح‌الدین بن عبدالله شیرازی), better known by his pen name Saadi (/ˈsɑːdi/;[3] Persian: سعدی, romanized: Saʿdī, IPA: [sæʔˈdiː]), also known as Sadi of Shiraz (سعدی شیرازی, Saʿdī Shīrāzī; born 1210; died 1291 or 1292), was a Persian poet and prose writer[1][4] of the medieval period. He is recognized for the quality of his writings and for the depth of his social and moral thoughts. Saadi is widely recognized as one of the greatest poets of the classical literary tradition, earning him the nickname "The Master of Speech" or "The Wordsmith" (استاد سخن ostâd-e soxan) or simply "Master" (استاد ostâd) among Persian scholars.
·en.wikipedia.org·
Saadi Shirazi - Wikipedia
SAFEs - Dentons ventureBeyond
SAFEs - Dentons ventureBeyond
What is a SAFE? SAFE stands for Simple Agreement for Future Equity. The SAFE was developed in California and popularized by leading Silicon Valley
MFN Clause: In a most favored nation (MFN) clause, if subsequent convertible securities are issued to future investors at better terms (e.g., a lower valuation cap), the better terms will automatically apply to the investor’s SAFE. This clause falls away on conversion of the SAFE into company stock.
·dentonsventurebeyond.com·
SAFEs - Dentons ventureBeyond
Conway's Game of Life - Wikipedia
Conway's Game of Life - Wikipedia
The Game of Life, also known simply as Life, is a cellular automaton devised by the British mathematician John Horton Conway in 1970. It is a zero-player game, meaning that its evolution is determined by its initial state, requiring no further input. One interacts with the Game of Life by creating an initial configuration and observing how it evolves. It is Turing complete and can simulate a universal constructor or any other Turing machine.
The Game of Life, also known simply as Life, is a cellular automaton devised by the British mathematician John Horton Conway in 1970.[1] It is a zero-player game,[2][3] meaning that its evolution is determined by its initial state, requiring no further input. One interacts with the Game of Life by creating an initial configuration and observing how it evolves. It is Turing complete and can simulate a universal constructor or any other Turing machine.
·en.wikipedia.org·
Conway's Game of Life - Wikipedia
Cellular automaton - Wikipedia
Cellular automaton - Wikipedia
A cellular automaton is a discrete model of computation studied in automata theory. Cellular automata are also called cellular spaces, tessellation automata, homogeneous structures, cellular structures, tessellation structures, and iterative arrays. Cellular automata have found application in various areas, including physics, theoretical biology and microstructure modeling.
A cellular automaton (pl. cellular automata, abbrev. CA) is a discrete model of computation studied in automata theory. Cellular automata are also called cellular spaces, tessellation automata, homogeneous structures, cellular structures, tessellation structures, and iterative arrays.[2] Cellular automata have found application in various areas, including physics, theoretical biology and microstructure modeling.
·en.wikipedia.org·
Cellular automaton - Wikipedia
John von Neumann's Cellular Automata | The Embryo Project Encyclopedia
John von Neumann's Cellular Automata | The Embryo Project Encyclopedia
John von Neumann’s Cellular Automata Cellular automata (CA) are mathematical models used to simulate complex systems or processes. In several fields, including biology, physics, and chemistry, CA are employed to analyze phenomena such as the growth of plants, DNA evolution, and embryogenesis. In the 1940s
Cellular automata (CA) are mathematical models used to simulate complex systems or processes. In several fields, including biology, physics, and chemistry, CA are employed to analyze phenomena such as the growth of plants, DNA evolution, and embryogenesis. In the 1940s John von Neumann formalized the idea of cellular automata in order to create a theoretical model for a self-reproducing machine. Von Neumann’s work was motivated by his attempt to understand biological evolution and self-reproduction.
·embryo.asu.edu·
John von Neumann's Cellular Automata | The Embryo Project Encyclopedia
What is memory safety and why does it matter?
What is memory safety and why does it matter?
Memory safety is a property of some programming languages that prevents programmers from introducing certain types of bugs related to how memory is used. Since memory safety bugs are often security issues, memory safe languages are more secure than languages that are not memory safe. Memory safe languages include Rust, Go, C#, Java, Swift, Python, and JavaScript. Languages that are not memory safe include C, C++, and assembly. Types of Memory Safety Bugs To begin understanding memory safety bugs, we'll consider the example of an application that maintains to do lists for many users.
The data bears out, over and over again, that when projects use unsafe languages like C and C++ they are burdened by an avalanche of security vulnerabilities. No matter how talented the engineers, how great the investment in privilege reduction and exploit mitigations, using a language that is not memory safe simply results in too many bugs. These bugs greatly reduce security, as well as stability and productivity.Fortunately, we do not need to be satisfied with the status quo. The last few years have produced a groundswell of fantastic alternatives to C and C++, such as Rust, Swift, and Go, amongst many others. And this means we don't have to wear memory corruption vulnerabilities as an albatross around our necks for years and years to come, as long as we choose not to. We look forward to a time when choosing to use an unsafe language is considered as negligent as not having multi-factor-authentication or not encrypting data in transit.
·memorysafety.org·
What is memory safety and why does it matter?