Ignore the name (neural networks might as well be a footnote). A more appropriate title would be “generic problems and algorithms”.
(Artificial Intelligence: A modern approach by Russell and Norvig)
Ignore the name (neural networks might as well be a footnote). A more appropriate title would be “generic problems and algorithms”.
(Artificial Intelligence: A modern approach by Russell and Norvig)
I agree, and here’s a few different avenues of examples:
If trying to get past interviews, Leet code and hacker rank can be great. They’re not so great for real world problems, but not bad.
Advent of code is a good middle ground between theory and practice in my opinion.
To really learn real world problem solving, I’d recommend implement a specification, without looking at existing implementations. For example, make a basic regex engine (formal Regular Expressions not PCRE expressions), or try to implement the C Preprocessor, or the JS event loop.
“Algorithms to live by” https://www.amazon.com/Algorithms-Live-Computer-Science-Decisions/dp/1627790365
Less technical than you probably want, but it is useful for mapping real world problems to known algorithms.
Elon can’t even save twitter. What makes you think he is single-handedly capable of ending world hunger.
Hmm, so we could say the real problem is when someone has wealth disproportionately larger than what they contributed to the world?
That makes sense to me
Is this true even if a person on an island spends their whole life building a wooden mega yacht for themself?
What’s the big deal? Just solve for …
… = (π^2 / 6) - (1 + 1/4 + 1/9)
Ez
/s
Cool, this is exactly what I was hoping to learn but couldn’t find. It sounds like its still a pretty manual process, but thats okay. If thats how it is righ now, then thats exactly what I want to know.
I’m considering making tools (GUI local app, but also website AUTH frontend/backend tooling) to try and make systems like this more commonplace and standardized. I didn’t know about revocation keys, so I’m glad I heard about that before trying to build my own.
Nailed it
Yeah, sorry I incrementally edited the title before posting and accidentally made it make no sense. I meant publicly announce that a private key was compromised
This could actually be a pretty big deal
Theres this old experimental tool called ZeroNet, and it had some really good ways of managing shared data. You could pin websites and files for other people to access, set limits, bandwidth, etc. It’d be nice to have something similar on peertube, like supporting certain creators by immediately hosting their videos for them. Maybe, for example, hosting their latest three videos.
Wow that’s super interesting to know. So its still got some resistance, but a lot less than I thought. Thanks again for sharing!
Thank you for such a long and detailed post! I indeed did not know about things beyond the SIM, and I didn’t know about the extra details about the country codes either. That is extremely interesting to me.
With the phone spoofing though, does that mean two factor with a phone number is basically useless? If I had authentication based on a MAC address, it would take seconds to break it. But I think, and sure hope, that auth based on phone numbers is more secure.
I think your domain name answer – that for the most part computers didnt need them – is a very satisfying answer.
If I’m understanding correctly, you’re saying that right now the network doesn’t have an exhaustive table of IP addresses to physical locations. It has a cache, and a hierarchy, and the path to a location of the IP is fluid.
But a system where every device could be directly contacted/identified like a Sim card, would effectively require a complete table of “what network is device ABC at”. A table that is updated every time the device changes network connections. It would be like trying to change domain name to point to a different IP address.
The problem is, updating a domain to point to a new IP takes hours or days not seconds, so doing that every time a phone changes WiFi is not practical.
Is that a good summary?
Finally :D thank you so much!
So basically VOIP is “cheating” because its not actually handled by the network directly, the phone company pays for always-online servers, and phone(s) reach out to those server every time they change networks, in order for servers to be able to route calls to them.
Which also means! it is possible to do the same thing for computers, but it requires having
Which also explains why general network providers wouldn’t want to create the infrastructure. Even if universal addresses were given to each device, which simplifies DHCP and address-leasing, and shortens time it takes to handshake with the network, all of that is less of a cost than the infrastructure needed track of devices as they change networks. (And that’s on top of ISP’s being slow to change from the legacy approach of local networks and desktops).
^ which is more the conversation I wanted to have but didnt really get with this post.
Thats a sizable edit!
Yeah 😅 I didnt want it to be this complicated of a question, but I didnt see how else to explain that current addressing systems don’t meet the same need as a phone number.
You’re right it depends on the definition of phone number, and I edited the original post to try and be more clear that I meant the phone number including the country code and area code.
If you’re talking about something other than country/area code though, then that’s news to me.
Thats a valid solution, thanks for saying it!
I think it is good to note this requires either having another system at home or in the cloud to host the VPN right?
This I’m interested in, because its at the edge/limits of my knowledge when it comes to domains and cellular networking.
Are you saying if cell phones had a larger address space, let’s say 32 digits base 10, and every device was given a cell phone number, it would overwhelm the existing infrastructure?
Its a tough problem. You have to find something that you want to exist; like an app or a website or a game. For example, try making a GUI for managing SSH keys. You know, like the ones github makes you create in order to clone and push to a repo. Make a visual representation of those keys (stored in the .ssh folder), and tools to add/delete them.
Along the way you’ll find tons of missing things, tools that should exist but don’t. Those are the “real” projects that will really expand your capabilities as a developer.
For example, I was coding in python and wanted to make a function that caches the output because the code was inherently slow.