Suramya's Blog : Welcome to my crazy life…

May 17, 2021

IBM’s Project CodeNet: Teaching AI to code

Filed under: Computer Software,Emerging Tech,My Thoughts — Suramya @ 11:58 PM

IBM recently launched a new program called Project CodeNet that is an opensource dataset that will be used to train AI to better understand code. The idea is to automate more of the engineering process by applying Artificial Intelligence to the problem. This is not the first project to do this and it won’t be the last. For some reason AI has become the cure all for all ‘ills’ in any part of life. It doesn’t matter if it is required or not but if there is a problem someone out there is trying to apply AI and Machine Learning to the problem.

This is not to say that Artificial Intelligence is not something that needs to be explored and developed. It has its uses but it doesn’t need to be applied everywhere. In one of my previous companies we interacted with a lot of companies who would pitch their products to us. In our last outing to a conference over 90% of the idea’s pitched had AI and/or Machine Learning involved. It got to the point where we started telling the companies that we knew what AI/ML was and ask them to just explain how they were using it in their product.

Coming back to Project CodeNet, it consists of over 14M code samples and over 500M lines of code in 55 different programming languages. The data set is high quality and curated. It contains samples from Open programming competitions with not just the code, it also contains the problem statements, sample input and output files along with details like code size, memory footprint and CPU run time. Having this curated dataset will allow developers to benchmark their software against a standard dataset and improve it over a period of time.

Potential use cases to come from the project include code search and cloud detection, automatic code correction, regression studies and prediction.

Press release: Kickstarting AI for Code: Introducing IBM’s Project CodeNet

– Suramya

May 16, 2021

Tiny, Wireless, Injectable Chips created to monitor body functions

Filed under: Emerging Tech,Science Related — Suramya @ 9:10 PM

Injectable chips have long been the boogyman for Anti-Vaxers as they think that people (like Bill Gates) are injecting them with tracking chips to track them and modify their behavior. However, till now this was mostly in the realm of Science Fiction as the smallest chips we had were still quite visible and difficult to power or inject (which is why they were implanted). Now, Researchers at Columbia Engineering have created the world’s smallest single chip system that is small enough that it is only visible under a microscope and is powered using Ultrasonic sound.

This is a great achievement because having injectable chips brings us closer to functioning nano-tech and these chips can be used to monitor physiological conditions, such as temperature, blood pressure, glucose levels, and respiration etc.

These devices could be used to monitor physiological conditions, such as temperature, blood pressure, glucose, and respiration for both diagnostic and therapeutic procedures. To date, conventional implanted electronics have been highly volume-inefficient — they generally require multiple chips, packaging, wires, and external transducers, and batteries are often needed for energy storage… Researchers at Columbia Engineering report that they have built what they say is the world’s smallest single-chip system, consuming a total volume of less than 0.1 mm cubed. The system is as small as a dust mite and visible only under a microscope…

“We wanted to see how far we could push the limits on how small a functioning chip we could make,” said the study’s leader Ken Shepard, Lau Family professor of electrical engineering and professor of biomedical engineering. “This is a new idea of ‘chip as system’ — this is a chip that alone, with nothing else, is a complete functioning electronic system. This should be revolutionary for developing wireless, miniaturized implantable medical devices that can sense different things, be used in clinical applications, and eventually approved for human use….”

The chip, which is the entire implantable/injectable mote with no additional packaging, was fabricated at the Taiwan Semiconductor Manufacturing Company with additional process modifications performed in the Columbia Nano Initiative cleanroom and the City University of New York Advanced Science Research Center (ASRC) Nanofabrication Facility. Shepard commented, “This is a nice example of ‘more than Moore’ technology—we introduced new materials onto standard complementary metal-oxide-semiconductor to provide new function. In this case, we added piezoelectric materials directly onto the integrated circuit to transducer acoustic energy to electrical energy….” The team’s goal is to develop chips that can be injected into the body with a hypodermic needle and then communicate back out of the body using ultrasound, providing information about something they measure locally.

The current devices measure body temperature, but there are many more possibilities the team is working on.

The only downside is that the anti-vaxers are going to use this as proof that the ‘Government’ is controlling their brains or tracking them. Never mind the fact that they can track you much more easily using the phone you carry everywhere or using the camera’s that are now almost everywhere.

The study was published online in Science Advances: Application of a sub–0.1-mm3 implantable mote for in vivo real-time wireless temperature sensing.

Thanks to Slashdot for the link.

– Suramya

May 15, 2021

Providing Oxygen through the intestines in Mammals is now possible as per research

Filed under: My Thoughts,News/Articles,Science Related — Suramya @ 11:53 PM

It takes a certain kind of mind to decide that today I am going to experiment if mammals can absorb oxygen through their intestines. Apparently a some of the aquatic animals like sea cucumbers and catfish, breathe through their intestines and since humans can absorb medicines through their intestines Takanori Takebe, a gastroenterologist from Cincinnati Children’s Hospital decided to do a study to see if they can absorb oxygen as well. So to test this out they basically injected pure pressurized oxygen into the rectums of the scrubbed mice (the mucus layer was thinned) and four of the seven unscrubbed ones. There was an immediate improvement in the O2 levels of the mice, with 75% the scrubbed mice surviving the procedure.

Obviously that is not a great survival rate and the scrubbing procedure is dangerous/involved but it did prove that mammals can absorb o2 with their intestines. So they looked at using perfluorocarbons which have a high O2 level and giving the rats & pigs an enema of the fluid. They saw an almost 15% improvement in the blood oxygen saturation allowing the subjects to recover from hypoxia.

These two tests prove that mammals can breath through their intestine but there is still a lot of study that needs to be done to check for the safety of this procedure. But if things go smoothly we can be looking at a new way to provide oxygen to patients when O2 canisters are in limited supply like the case currently in India due to the Covid crises.

But this doesn’t mean that mouth to mouth CPR will be replaced with mouth to ass CPR. (I can hear the sigh of relief from medical professional/emergency care folks).

More details on the study: ScienceMag: Mammals can breathe through their intestines
Full Paper: Mammalian enteral ventilation ameliorates respiratory failure

– Suramya

May 14, 2021

NTFS has a massive performance hit on Linux compared to ext4

Filed under: Computer Software,Linux/Unix Related,My Thoughts,Techie Stuff — Suramya @ 12:47 PM

NTFS has long been a nemesis of Linux. I remember in the 2000’s getting NTFS working on linux required so much effort and config changes that I stopped using it on my systems as FAT32 was more than sufficient for my needs at that time. Initially the driver was very unstable and it was recommended that you only use it for Read operations rather than Read/Write as there was a high probability of data corruption. That has changed over the years and the driver is stable. However, there is a massive performance hit when using NTFS vs ext4 on a Linux machine and I saw this when I tried using a NTFS partition on my laptop instead of ext4.

I have a 1 TB drive on my laptop along with a SSD. I dual boot the laptop (need it for my classes) between Windows & Debian and wanted to have all my files available on both OS’s. When I last tried this, ext support on Windows was not that great (and I didn’t feel like searching for options) so I decided to format the drive to NTFS so that I would have access to the files on both OS. The formatting took ages and once the drive was ready I was able to copy my files from the desktop to the laptop. While the files were being copied I noticed very high CPU usage on the laptop and the UI was lagging randomly. Since I was busy with other stuff I let it be and ignored it.

Yesterday I was trying to move files around on the laptop so that the root partition had enough space to do an upgrade and I again noticed that file copy and most of the disk operations were taking way longer than I expected. For example there would be a second of delay when I tried listing the directory when it had a lot of files. So, I decided to test it out. My data on the Laptop is an exact copy of the files on the Desktop. I timed the commands on the desktop with the same command on the laptop and there was a significant difference.

My desktop is obviously a lot more powerful than the laptop so I decided to try an experiment where I would run a command on the NTFS drive, then format the drive to ext4 and run the same command. (after copying all the files back). When I did this I saw that there was a massive difference in the time it took to run the command. On ext4 the command took less than 1 second (0.107s) whereas it took almost 34 seconds (33.997s) on NTFS parition. The screenshot for both commands are below:


du -hs command on a ext4 partition


du -hs command on a NTFS partition

That’s a ridiculous amount of difference between the two. So I obviously have to switch back to ext4 which brought us back in a full circle – I still needed to be able to access my files from Windows as well as from Linux. Decided to go a search on the Internet for options and found out that Windows 10 now lets you mount Linux ext4 filesystems in WSL 2. I haven’t tried it yet but I will test over the next few days once I am done with some of my assignments. If there is something interesting I will blog about it in the near future.

As of now, I am back to using ext4 on the laptop and the OS performance is a lot better.

Well this all for now. Will post more later.

– Suramya

May 13, 2021

Some thoughts on the last episode of ‘The Flash’

Filed under: My Thoughts — Suramya @ 12:36 PM

One of the shows I’ve been watching consistently for the past few years is ‘The Flash’ and the last episode of the show was a bit weird and I really need to vent about it. If you have not seen the last episode (Season 7 Episode 9: Timeless) yet stop reading because this post has major spoilers for the episode.

Ok since you are still here, I assume you seen the episode. So lets get started. In the past few episode Barry/Flash has been fighting the ‘forces’ and in the last episode Nora/Speed Force killed the Strength Force. This was a big deal. So now Team Flash is trying to figure out how to stop the other forces who are basically Gods from being killed and removing their powers at the same time. Barry decides that the best way to do that is to travel back in time to prevent the forces from being formed in the first place. It’s like they didn’t learn anything thing from the whole Flashpoint fiasco. The entire team opposes the idea but Barry just handwaves their concerns away to say that he is going to do it even if they disagree. He then pulls in the Timeless Wells who would create a ‘bubble’ around the timeline to prevent it from changing after Barry prevents the forces from being born. This would be a huge paradox and the show just ignores it.

Finally Barry & Wells are back in the past and well into the process of stopping the forces from being born when suddenly Barry does an about face for no good reason (Other than to keep the show going) and lets the forces be born. I don’t mind when the characters change their decision because of some discussion or new input but this guy just makes arbitrary decisions and then changes them for no reason. He is like a Yo-Yo with these decisions and it is really annoying.

Then they both come back to the present and because Iris & Barry have a ‘connection’ to the speed force, they are able to bring Fuerza/Alexa back to life. First of all why have they put her on a medical bed if she is dead? Are they planning on doing experiments on her? Or was it just so that she could be brought back to life because the character was needed in the show.

This episode was just lazy writing and this could have been done a lot better. Let’s see what the next episode brings, hopefully it will make more sense.

– Suramya

May 12, 2021

Using a centrifuge to improve a compressor

Filed under: My Thoughts,Science Related — Suramya @ 11:19 PM

A compressor is such a standard piece of equipment that we no longer think about it and it is used everywhere from pumps to air conditioners. If we can improve the design then it can lead to a huge power savings. A California company (Carnot) has come up with a new design that reduces the noise output, lasts longer and reduces the cost of ownership by 20 percent while using no oil. The new design uses a Trompe and combines it with a centrifuge to get it to work more efficiently.

A Trompe is an ancient technology which uses falling water to compress air. It was used extensively till fossil fuels made it less desirable by producing more power. Historically, miners have used large-scale trompes to power their mining equipment and provided ventilation. In fact a 350-feet-deep trompe was setup in Michigan which was able to produce 5,000 horsepower.

A trompe, often placed in a river, has a simple design. Flowing water falls into an intake pipe which has an air cone (or some other aerating device) on top. The water falling around the cone creates suction, pulling the air down with it. Air bubbles travel down the pipe with the water until reaching an air chamber.

At the air chamber (also called a plenum or reservoir), the bubbles escape from the water. In the process, the air has been compressed, dehumidified, and cooled to the same temperature as the water. The pressurized air can now be put to use.

Meanwhile, the water leaves through the outtake pipe. Air pressure from the reservoir pushes the water upwards, nearly to the same height it originally fell from, and the water returns to the river.

The issue with Trompe is that it needs a large setup if we want to generate enough compression and that is obviously not possible in all places. So the Carnot team explored options to accelerate the water movement and arrived at using a centrifuge. In their setup the compressor sucks in air through a filter at the top and mixes it with water on top of a fast moving drum, this outward force compresses the air and the mixture of air & water is forced out at that bottom where they are separated into air and water as they pass through the exit channel. The image below gives a good overview of how the technology would work:


Model of Carnot compressor

The resultant compressor is very quiet since the only moving parts are the spinning drum powered by an electric motor and an exhaust fan. In lab tests the system was found to operate indoors at below 70 dB. Obviously the technology is still quite new and needs to mature a lot before bulk deployment, but it is very interesting and I see a great future for it if it works as advertised.

Source: Carnot puts a centrifugal spin on a 500-year-old air compressor design
The Trompe: A Basic Overview

– Suramya

May 11, 2021

Stop hating on people because they don’t use the same tools as you

Filed under: Linux/Unix Related,My Thoughts — Suramya @ 6:31 PM

Recently there was an idiot on twitter who kept harassing a lady (@insiderPhd) to tell her that she was not a real hacker because she didn’t use vi. The screen shot of the original post is at the bottom of the post. The quote I really found interesting is “It’s not that you ‘can’t use’ vim’, it is that you haven’t taken ANY time to learn it. If you can learn API hacking tools, you can learn vim. Don’t be lazy!”. How is not learning vim/vi being lazy. I didn’t learn it for a long time because I didn’t need to. Then Matt convinced me that I need to know it and his reasoning was that if a system goes down and you have to boot into recovery mode or are working on an embedded system the only editor you can be sure will be available is vi and that made sense to me. It did take me a while to get comfortable with it but I still prefer a GUI based editor like EditPlus on Windows or kWrite on linux. Does that mean that I am not a ‘hacker’? If so then so be it. I am comfortable with what/who I am and I don’t need you to validate me. Unfortunately, for newcomers into the field this can be discouraging so please stop doing that. Plus, we need to call out these idiots who think they are the sole authority on how is a hacker or a techie or a geek or whatever.

I really don’t understand these guys and it is always a guy who is trying to gatekeep and tell others that they are the sole authority to decide who is a hacker or who is not. Who is in and who is not. I have much better things to worry about than trying to get approval from some jackass who thinks their way is the only way. Remember the famous “infinite diversity in infinite combinations” quote? It means that there is more than one way to do it.

We have a lot of old-timers who are scared of the new generation and their new-fangled ideas. This is because they stopped learning and are now scared that they will be replaced. In one of my previous companies, I was responsible for creating a system that replaced a legacy system with a user friendly web based system. It worked great (if I say so myself) but one of the senior engineers I was working with did everything they could to sabotage the project because they were comfortable with the old system and didn’t want to change. Plus it was job security because hardly anyone else understood the system so they were always needed. My feeling is that if you need to prevent upgrades because you think you would loose your job because only you know the system then understand that the company is already looking for ways to replace you. Single points of failures are a big issue for a company.

Now, coming back to the original point about tools. I really don’t get why people get so worked up over a simple tool. This whole religious war over vi vs emacs or Windows vs Linux or Android vs iPhone and so on is just silly. It is ok to have a preference, I for example prefer using vi, Linux and Android phones. But that is because those tools work for me and I am comfortable with them. There are aspects of iPhone that I don’t like because of the design philosophy behind it. I have spent hours debating which phone is better and I will continue to do so. That being said, it doesn’t mean that people who don’t use an Android phones are non-technical or uneducated or whatever. End of the day a phone is a tool, it needs to do what I want it to do and respect my freedom to do what I want with it.

It doesn’t matter if I use vi to code or I use an IDE that helps me code. It matters what I do with it, what program I am writing. I can never remember syntax’s for functions, even for languages I have been using for decades. Does that mean I can’t program? of-course not. That’s what google and the reference books are there for. In my 10th Board exam, during my computer science viva I was asked to give the syntax for the locate command and I mixed up the rows & columns parameters and inverted them. My teacher scolded me and told me how can I believe you coded this program if you can’t even tell me the syntax, so I told her that I can always look up the syntax when I am coding and the important part is that I need to know when to use the command, not what the syntax is. There was pin-drop silence after I told her that. I did get full marks so I guess I made sense. But the point is that tools are there to help you. You need to figure out how to use them effectively.

I use Linux on all my machines but Jani and my parents use Windows because that is what works for them. It doesn’t mean that they are scum or unintelligent or whatever, (these are actual terms I have hear people use about folks who use Windows) it is just that for them it doesn’t matter. It is not what is important to them.

Too many people try to use the tools you use as a criteria to like you or hate you and to me that is a sad way to live your life.

I learn a lot from others who are different from me because they have a different view point. If everyone in the world was the same imagine how boring it would be? I am not a singer, but others are and they create great music so does that make them better or worse than me? It doesn’t. They are just different and that is good. We need that diversity.

We all need to stop focusing on the differences and start focusing on how we all love the same stuff.


Original post on Twitter, ranting on how someone is not a hacker because they don’t use vim

– Suramya

May 9, 2021

Teaching Cyber Security basics to kids

Filed under: Computer Security,My Thoughts — Suramya @ 8:04 PM

There is an ongoing effort over at Australia to teach cyber-security to five-year-old kids. I am sure that it will be no surprise to anyone who knows me that I think that this is a brilliant idea. Security is a mindset and the earlier we can teach kids about the pitfalls and dangers online, the safer they will be online.

Our generation grew up with the internet and still I see that most people are not that serious about security. I had a long argument/discussion with Jani on why she had to have a passcode for her phone and why she couldn’t use the same password for everything. Now she understands what I was talking about and uses a password manager with unique password for each account. But that is not the same with my parents, I still have not managed to convince them to use a password manager. 🙁

A little while ago I was talking to mom and she commented that my nephew Vir doesn’t share his account passwords with anyone and when my mom is typing her password he looks away. I credit Vinit for teaching him this and am really happy about it. This is what you get when a kid is taught about security from the get go. Instead of learning it later as an add on. Another year or so and I will have him start using a password manager as well.

Habits learnt as a kid are really hard to unlearn and that is why I think it is really important that we get to kids as early as possible and teach them about cyber security. I mean we already teach them regular security and safety so why not cyber security and safety? Remember, they are spending a lot more time on the computer and the internet than we ever did and they need to be taught how to be careful online.

Well this is all for now. Will post more later.

– Suramya

May 6, 2021

Blast from the Past: Is Your Son a Computer Hacker?

Filed under: Humor — Suramya @ 5:37 PM

While surfing the web, I came across this article on Hacker News from 2001, where a parent found out that their son is a computer hacker and now wants to highlight the symptoms to other parents so that their kids don’t fall to the same trap that he did. I first read this article when I was in college and found it as idiotic and funny then as I do now. Apparently, using AMD or having flash installed on your machine makes you a hacker. So does reading “Programming with Perl” by Timothy O’Reilly. If any of you reading this are parents, please do actual research rather than reading random articles on the web or watching YouTube videos.

Without further ado, read on to find out if your son is a hacker:

———
As an enlightened, modern parent, I try to be as involved as possible in the lives of my six children. I encourage them to join team sports. I attend their teen parties with them to ensure no drinking or alcohol is on the premises. I keep a fatherly eye on the CDs they listen to and the shows they watch, the company they keep and the books they read. You could say I’m a model parent. My children have never failed to make me proud, and I can say without the slightest embellishment that I have the finest family in the USA.

Two years ago, my wife Carol and I decided that our children’s education would not be complete without some grounding in modern computers. To this end, we bought our children a brand new Compaq to learn with. The kids had a lot of fun using the handful of application programs we’d bought, such as Adobe’s Photoshop and Microsoft’s Word, and my wife and I were pleased that our gift was received so well. Our son Peter was most entranced by the device, and became quite a pro at surfing the net. When Peter began to spend whole days on the machine, I became concerned, but Carol advised me to calm down, and that it was only a passing phase. I was content to bow to her experience as a mother, until our youngest daughter, Cindy, charged into the living room one night to blurt out: “Peter is a computer hacker!”

As you can imagine, I was amazed. A computer hacker in my own house! I began to monitor my son’s habits, to make certain that Cindy wasn’t just telling stories, as she is prone to doing at times.

After a few days of investigation, and some research into computer hacking, I confronted Peter with the evidence. I’m afraid to say, this was the only time I have ever been truly disappointed in one of my children. We raised them to be honest and to have integrity, and Peter betrayed the principles we tried to encourage in him, when he refused point blank to admit to his activities. His denials continued for hours, and in the end, I was left with no choice but to ban him from using the computer until he is old enough to be responsible for his actions.

After going through this ordeal with my own family, I was left pondering how I could best help others in similar situations. I’d gained a lot of knowledge over those few days regarding hackers. It’s only right that I provide that information to other parents, in the hope that they will be able to tell if their children are being drawn into the world of hacking. Perhaps other parents will be able to steer their sons back onto the straight and narrow before read this list carefully and if their son matches the profile, they should take action. A smart parent will first try to reason with their son, before resorting to groundings, or even spanking. I pride myself that I have never had to spank a child, and I hope this guide will help other parents to put a halt to their son’s misbehaviour before a spanking becomes necessary.

1. Has your son asked you to change ISPs?

Most American families use trusted and responsible Internet Service Providers, such as AOL. These providers have a strict “No Hacking” policy, and take careful measures to ensure that your internet experience is enjoyable, educational and above all legal. If your child is becoming a hacker, one of his first steps will be to request a change to a more hacker friendly provider.

I would advise all parents to refuse this request. One of the reasons your son is interested in switching providers is to get away from AOL’s child safety filter. This filter is vital to any parent who wants his son to enjoy the internet without the endangering him through exposure to “adult” content. It is best to stick with the protection AOL provides, rather than using a home-based solution. If your son is becoming a hacker, he will be able to circumvent any home-based measures with surprising ease, using information gleaned from various hacker sites.

2. Are you finding programs on your computer that you don’t remember installing?

Your son will probably try to install some hacker software. He may attempt to conceal the presence of the software in some way, but you can usually find any new programs by reading through the programs listed under “Install/Remove Programs” in your control panel. Popular hacker software includes “Comet Cursor”, “Bonzi Buddy” and “Flash”.

The best option is to confront your son with the evidence, and force him to remove the offending programs. He will probably try to install the software again, but you will be able to tell that this is happening, if your machine offers to “download” one of the hacker applications. If this happens, it is time to give your son a stern talking to, and possibly consider punishing him with a grounding.

3. Has your child asked for new hardware?

Computer hackers are often limited by conventional computer hardware. They may request “faster” video cards, and larger hard drives, or even more memory. If your son starts requesting these devices, it is possible that he has a legitimate need. You can best ensure that you are buying legal, trustworthy hardware by only buying replacement parts from your computer’s manufacturer.

If your son has requested a new “processor” from a company called “AMD”, this is genuine cause for alarm. AMD is a third-world based company who make inferior, “knock-off” copies of American processor chips. They use child labor extensively in their third world sweatshops, and they deliberately disable the security features that American processor makers, such as Intel, use to prevent hacking. AMD chips are never sold in stores, and you will most likely be told that you have to order them from internet sites. Do not buy this chip! This is one request that you must refuse your son, if you are to have any hope of raising him well.

4. Does your child read hacking manuals?

If you pay close attention to your son’s reading habits, as I do, you will be able to determine a great deal about his opinions and hobbies. Children are at their most impressionable in the teenage years. Any father who has had a seventeen year old daughter attempt to sneak out on a date wearing make up and perfume is well aware of the effect that improper influences can have on inexperienced minds.

There are, unfortunately, many hacking manuals available in bookshops today. A few titles to be on the lookout for are: “Snow Crash” and “Cryptonomicon” by Neal Stephenson; “Neuromancer” by William Gibson; “Programming with Perl” by Timothy O’Reilly; “Geeks” by Jon Katz; “The Hacker Crackdown” by Bruce Sterling; “Microserfs” by Douglas Coupland; “Hackers” by Steven Levy; and “The Cathedral and the Bazaar” by Eric S. Raymond.

If you find any of these hacking manuals in your child’s possession, confiscate them immediately. You should also petition local booksellers to remove these titles from their shelves. You may meet with some resistance at first, but even booksellers have to bow to community pressure.

5. How much time does your child spend using the computer each day?

If your son spends more than thirty minutes each day on the computer, he may be using it to DOS other peoples sites. DOSing involves gaining access to the “command prompt” on other people’s machines, and using it to tie up vital internet services. This can take up to eight hours. If your son is doing this, he is breaking the law, and you should stop him immediately. The safest policy is to limit your children’s access to the computer to a maximum of forty-five minutes each day.

6. Does your son use Quake?

Quake is an online virtual reality used by hackers. It is a popular meeting place and training ground, where they discuss hacking and train in the use of various firearms. Many hackers develop anti-social tendencies due to the use of this virtual world, and it may cause erratic behaviour at home and at school.

If your son is using Quake, you should make hime understand that this is not acceptable to you. You should ensure all the firearms in your house are carefully locked away, and have trigger locks installed. You should also bring your concerns to the attention of his school.

7. Is your son becoming argumentative and surly in his social behaviour?

As a child enters the electronic world of hacking, he may become disaffected with the real world. He may lose the ability to control his actions, or judge the rightness or wrongness of a course of behaviour. This will manifest itself soonest in the way he treats others. Those whom he disagrees with will be met with scorn, bitterness, and even foul language. He may utter threats of violence of a real or electronic nature.

Even when confronted, your son will probably find it difficult to talk about this problem to you. He will probably claim that there is no problem, and that you are imagining things. He may tell you that it is you who has the problem, and you should “back off” and “stop smothering him.” Do not allow yourself to be deceived. You are the only chance your son has, even if he doesn’t understand the situation he is in. Keep trying to get through to him, no matter how much he retreats into himself.

8. Is your son obsessed with “Lunix”?

BSD, Lunix, Debian and Mandrake are all versions of an illegal hacker operation system, invented by a Soviet computer hacker named Linyos Torovoltos, before the Russians lost the Cold War. It is based on a program called “xenix”, which was written by Microsoft for the US government. These programs are used by hackers to break into other people’s computer systems to steal credit card numbers. They may also be used to break into people’s stereos to steal their music, using the “mp3” program. Torovoltos is a notorious hacker, responsible for writing many hacker programs, such as “telnet”, which is used by hackers to connect to machines on the internet without using a telephone.

Your son may try to install “lunix” on your hard drive. If he is careful, you may not notice its presence, however, lunix is a capricious beast, and if handled incorrectly, your son may damage your computer, and even break it completely by deleting Windows, at which point you will have to have your computer repaired by a professional.

If you see the word “LILO” during your windows startup (just after you turn the machine on), your son has installed lunix. In order to get rid of it, you will have to send your computer back to the manufacturer, and have them fit a new hard drive. Lunix is extremely dangerous software, and cannot be removed without destroying part of your hard disk surface.

9. Has your son radically changed his appearance?

If your son has undergone a sudden change in his style of dress, you may have a hacker on your hands. Hackers tend to dress in bright, day-glo colors. They may wear baggy pants, bright colored shirts and spiky hair dyed in bright colors to match their clothes. They may take to carrying “glow-sticks” and some wear pacifiers around their necks. (I have no idea why they do this) There are many such hackers in schools today, and your son may have started to associate with them. If you notice that your son’s group of friends includes people dressed like this, it is time to think about a severe curfew, to protect him from dangerous influences.

10. Is your son struggling academically?

If your son is failing courses in school, or performing poorly on sports teams, he may be involved in a hacking group, such as the infamous “Otaku” hacker association. Excessive time spent on the computer, communicating with his fellow hackers may cause temporary damage to the eyes and brain, from the electromagnetic radiation. This will cause his marks to slip dramatically, particularly in difficult subjects such as Math, and Chemistry. In extreme cases, over-exposure to computer radiation can cause schizophrenia, meningitis and other psychological diseases. Also, the reduction in exercise may cause him to lose muscle mass, and even to start gaining weight. For the sake of your child’s mental and physical health, you must put a stop to his hacking, and limit his computer time drastically.

I encourage all parents to read through this guide carefully. Your child’s future may depend upon it. Hacking is an illegal and dangerous activity, that may land your child in prison, and tear your family apart. It cannot be taken too seriously.
———

– Suramya

May 2, 2021

Infinite Nature: Creating Perpetual Views of Natural Scenes from a Single Image

Filed under: Emerging Tech,Interesting Sites,My Thoughts — Suramya @ 11:28 PM

Found this over at Hacker News , where researchers have created technologies that use existing video’s and images and extrapolate them into an infinite scrolling natural view that is very relaxing to watch and at times looks very tripy. The changes are slow so you don’t see how the image is changing but if you wait for a 20 seconds and compare that image with the first one you will see how it differs.

We introduce the problem of perpetual view generation—long-range generation of novel views corresponding to an arbitrarily long camera trajectory given a single image. This is a challenging problem that goes far beyond the capabilities of current view synthesis methods, which work for a limited range of viewpoints and quickly degenerate when presented with a large camera motion. Methods designed for video generation also have limited ability to produce long video sequences and are often agnostic to scene geometry. We take a hybrid approach that integrates both geometry and image synthesis in an iterative render, refine, and repeat framework, allowing for long-range generation that cover large distances after hundreds of frames. Our approach can be trained from a set of monocular video sequences without any manual annotation. We propose a dataset of aerial footage of natural coastal scenes, and compare our method with recent view synthesis and conditional video generation baselines, showing that it can generate plausible scenes for much longer time horizons over large camera trajectories compared to existing methods.

The full paper is available here Infinite Nature: Perpetual View Generation of Natural Scenes from a Single Image with a few sample generated videos. One of the examples is below:

This is a very impressive technology. I can see a lot of uses for it in video games to generate real estate for flight simulators to fly over or fight over. It can be used for VR world developments or just to relax people. It might also be possible to take footage from TV shows and extrapolate them to allow folks to explore it in VR. (After a lot more research is done on this as the tech is still experimental). We could also simulate alien worlds using pics taken by our probes to train astronauts and settlers realistically instead of relying on fake windows and isolated area’s.

Check the site out for more such videos. Looking forward to future technologies built up over this.

– Suramya

Older Posts »

Powered by WordPress