#quantum computing hardware
Explore tagged Tumblr posts
computerguru-blogs · 2 years ago
Text
Which Technology Is Making Quantum Computing Easier To Access And Adopt?
What type of Technology is making quantum computing easier to access and adopt?
There are several technologies and platforms that are making quantum computing more accessible and easier to adopt:
1.Cloud-based quantum computing platforms: Several companies, including IBM, Google, Amazon, and Microsoft, offer cloud-based quantum computing platforms that allow users to run quantum algorithms and experiments remotely using web interfaces or APIs. Read more
0 notes
cyphorical · 2 years ago
Text
ChatGPT on Philosophy
Q: If I said that "the universe is its own hardware and software" what theories and authors does that sound like?
A: The idea that "the universe is its own hardware and software" can be interpreted in different ways, but it could be related to several philosophical and scientific theories.
One possible interpretation of this statement is that the universe is a self-organizing system that operates according to its own laws and rules, without any external influence or intervention. This idea is consistent with certain philosophical schools such as pantheism, which views the universe as a divine or spiritual entity.
From a scientific perspective, this idea is similar to the concept of emergence, which is the phenomenon whereby complex systems can arise from simple interactions between their components, without the need for a central controlling entity. The universe could be seen as an emergent system that is self-organizing and self-regulating, with its own "hardware" (the physical laws and constants that govern its behavior) and "software" (the patterns and structures that emerge from those laws).
This idea could be related to the work of several scientists and philosophers, including:
Baruch Spinoza, who proposed a pantheistic view of the universe as a single, infinite substance that encompasses everything
Alan Turing, who developed the concept of a universal Turing machine, which is a theoretical model of a computer that can simulate any other computer or computation
Stephen Wolfram, who has proposed that the universe can be seen as a computational system that generates complex patterns and structures through simple rules and interactions (in his book "A New Kind of Science")
David Deutsch, who has proposed that the universe can be seen as a universal quantum computer that performs calculations through the interaction of elementary particles (in his book "The Fabric of Reality")
18 notes · View notes
1o1percentmilk · 10 months ago
Text
touichirou... using hatori as an antenna..? wireless multicasting..? exhibitionism.....?
2 notes · View notes
dailyplanet-loislane · 1 month ago
Text
The AI Hardware Race: Brain vs. Quantum
Tumblr media Tumblr media
1 note · View note
legendaryearthquakestranger · 2 months ago
Text
Laptop Generations A Comprehensive Guide
Laptop Generations A Comprehensive Guide have come a long way since their inception, transforming from bulky, slow machines into sleek, powerful devices that can rival desktops in performance. With each new generation, laptops bring enhanced features, greater processing power, improved battery life, and innovative designs that cater to the evolving needs of users. This article delves into the…
0 notes
emerging-tech · 3 months ago
Text
Quantum Computing: How Close Are We to a Technological Revolution?
1. Introduction Brief overview of quantum computing. Importance of quantum computing in the future of technology. 2. Understanding Quantum Computing Explanation of qubits, superposition, and entanglement. How quantum computing differs from classical computing. 3. The Current State of Quantum Computing Advances by major players (Google, IBM, Microsoft). Examples of quantum computing…
Tumblr media
View On WordPress
1 note · View note
jcmarchi · 3 months ago
Text
Testing spooky action at a distance
New Post has been published on https://thedigitalinsider.com/testing-spooky-action-at-a-distance/
Testing spooky action at a distance
Tumblr media Tumblr media
Researchers at MIT recently signed a four-year collaboration agreement with the Novo Nordisk Foundation Quantum Computing Programme (NQCP) at Niels Bohr Institute, University of Copenhagen (UCPH), focused on accelerating quantum computing hardware research.
The agreement means that both universities will set up identical quantum laboratories at their respective campuses in Copenhagen and Cambridge, Massachusetts, facilitating seamless cooperation as well as shared knowledge and student exchange.
“To realize the promise of quantum computing, we must learn how to build systems that are robust, reproducible, and extensible. This unique program enables us to innovate faster by exchanging personnel and ideas, running parallel experiments, and comparing results. Even better, we get to continue working with Professor Morten Kjaergaard, a rising star in the field, and his team in Copenhagen,” says William Oliver, the Henry Ellis Warren (1894) Professor within the MIT Department of Electrical Engineering and Computer Science (EECS), professor of physics, associate director of the Research Laboratory of Electronics, and the head of the Center for Quantum Engineering at MIT.
Oliver’s team will supervise the funded research, which will focus specifically on the development of fault-tolerant quantum computing hardware and quantum algorithms that solve life-science relevant chemical and biological problems. The agreement provides 18 million Danish kroner (approximately $2.55 million) from the Novo Nordisk Foundation Quantum Computing Program to support MIT’s part in the research.
“A forefront objective in quantum computing is the development of state-of-the-art hardware with consistent operation,” says Maria Zuber, MIT’s presidential advisor for science and technology policy, who helped facilitate the relationship between MIT and the Danish university. “The goal of this collaboration is to demonstrate this system behavior, which will be an important step in the path to practical application.”
“Fostering collaborations between MIT and other universities is truly essential as we look to accelerate the pace of discovery and research in fast-growing fields such as quantum computing,” adds Anantha Chandrakasan, chief innovation and strategy officer, dean of engineering, and the Vannevar Bush Professor of EECS. “The support from the Novo Nordisk Foundation Quantum Computing Programme will ensure the world’s leading experts can focus on advancing research and developing solutions that have real-world impact.”
“This is an important recognition of our work at UCPH and NQCP. Professor Oliver’s team at MIT is part of the international top echelon of quantum computing research,” says Morten Kjaergaard, associate professor of quantum information physics and research group leader at the Niels Bohr Institute at UCPH. “This project enables Danish research in quantum computing hardware to learn from the best as we collaborate on developing hardware for next-generation fault-tolerant quantum computing. I have previously had the pleasure of working closely with Professor Oliver, and with this ambitious collaboration as part of our the Novo Nordisk Foundation Quantum Computing Programme, we are able to push our joint research to a new level.”
Peter Krogstrup, CEO of NQCP and professor at Niels Bohr Institute, follows up, “We are excited to work with Will Oliver and his innovative team at MIT. It aligns very well with our strategic focus on identifying a path with potential to enable quantum computing for life sciences. The support aims to strengthen the already strong collaboration between Will and Morten’s team, a collaboration we hope to make an important part of the NQCP pathfinder phase over the coming years.”
0 notes
quantumuniversitysposts · 1 year ago
Text
CHMW-23 Workshop: Mastering Computer Hardware Maintenance Techniques
 Quantum University's recent "Computer Hardware Maintenance Workshop" garnered rave reviews from participants. This video encapsulates the event's essence, showcasing the hands-on learning, expert guidance, and camaraderie that defined the experience.
To know more, please visit @ https://quantumuniversity.edu.in/
youtube
0 notes
quantimist · 1 year ago
Text
Quantum Computing with Qiskit Free Course | 1 Year | Q World
Exciting News: QWorld’s QClass23/24 Your Gateway to Quantum Computing! Are you ready to dive into the fascinating world of quantum computing, algorithms, and programming? Look no further! QWorld is thrilled to announce the launch of our two-semester-long QClass23/24, beginning in September 2023 and running until May 2024. Join us for an immersive virtual experience that will equip you with the…
Tumblr media
View On WordPress
0 notes
amalgamasreal · 2 years ago
Text
So I don't know how people on this app feel about the shit-house that is TikTok but in the US right now the ban they're trying to implement on it is a complete red herring and it needs to be stopped.
They are quite literally trying to implement Patriot Act 2.0 with the RESTRICT Act and using TikTok and China to scare the American public into buying into it wholesale when this shit will change the face of the internet. Here are some excerpts from what the bill would cover on the Infrastructure side:
SEC. 5. Considerations.
(a) Priority information and communications technology areas.—In carrying out sections 3 and 4, the Secretary shall prioritize evaluation of— (1) information and communications technology products or services used by a party to a covered transaction in a sector designated as critical infrastructure in Policy Directive 21 (February 12, 2013; relating to critical infrastructure security and resilience);
(2) software, hardware, or any other product or service integral to telecommunications products and services, including— (A) wireless local area networks;
(B) mobile networks;
(C) satellite payloads;
(D) satellite operations and control;
(E) cable access points;
(F) wireline access points;
(G) core networking systems;
(H) long-, short-, and back-haul networks; or
(I) edge computer platforms;
(3) any software, hardware, or any other product or service integral to data hosting or computing service that uses, processes, or retains, or is expected to use, process, or retain, sensitive personal data with respect to greater than 1,000,000 persons in the United States at any point during the year period preceding the date on which the covered transaction is referred to the Secretary for review or the Secretary initiates review of the covered transaction, including— (A) internet hosting services;
(B) cloud-based or distributed computing and data storage;
(C) machine learning, predictive analytics, and data science products and services, including those involving the provision of services to assist a party utilize, manage, or maintain open-source software;
(D) managed services; and
(E) content delivery services;
(4) internet- or network-enabled sensors, webcams, end-point surveillance or monitoring devices, modems and home networking devices if greater than 1,000,000 units have been sold to persons in the United States at any point during the year period preceding the date on which the covered transaction is referred to the Secretary for review or the Secretary initiates review of the covered transaction;
(5) unmanned vehicles, including drones and other aerials systems, autonomous or semi-autonomous vehicles, or any other product or service integral to the provision, maintenance, or management of such products or services;
(6) software designed or used primarily for connecting with and communicating via the internet that is in use by greater than 1,000,000 persons in the United States at any point during the year period preceding the date on which the covered transaction is referred to the Secretary for review or the Secretary initiates review of the covered transaction, including— (A) desktop applications;
(B) mobile applications;
(C) gaming applications;
(D) payment applications; or
(E) web-based applications; or
(7) information and communications technology products and services integral to— (A) artificial intelligence and machine learning;
(B) quantum key distribution;
(C) quantum communications;
(D) quantum computing;
(E) post-quantum cryptography;
(F) autonomous systems;
(G) advanced robotics;
(H) biotechnology;
(I) synthetic biology;
(J) computational biology; and
(K) e-commerce technology and services, including any electronic techniques for accomplishing business transactions, online retail, internet-enabled logistics, internet-enabled payment technology, and online marketplaces.
(b) Considerations relating to undue and unacceptable risks.—In determining whether a covered transaction poses an undue or unacceptable risk under section 3(a) or 4(a), the Secretary— (1) shall, as the Secretary determines appropriate and in consultation with appropriate agency heads, consider, where available— (A) any removal or exclusion order issued by the Secretary of Homeland Security, the Secretary of Defense, or the Director of National Intelligence pursuant to recommendations of the Federal Acquisition Security Council pursuant to section 1323 of title 41, United States Code;
(B) any order or license revocation issued by the Federal Communications Commission with respect to a transacting party, or any consent decree imposed by the Federal Trade Commission with respect to a transacting party;
(C) any relevant provision of the Defense Federal Acquisition Regulation and the Federal Acquisition Regulation, and the respective supplements to those regulations;
(D) any actual or potential threats to the execution of a national critical function identified by the Director of the Cybersecurity and Infrastructure Security Agency;
(E) the nature, degree, and likelihood of consequence to the public and private sectors of the United States that would occur if vulnerabilities of the information and communications technologies services supply chain were to be exploited; and
(F) any other source of information that the Secretary determines appropriate; and
(2) may consider, where available, any relevant threat assessment or report prepared by the Director of National Intelligence completed or conducted at the request of the Secretary.
Tumblr media
Look at that, does that look like it just covers the one app? NO! This would cover EVERYTHING that so much as LOOKS at the internet from the point this bill goes live.
It gets worse though, you wanna see what the penalties are?
Tumblr media
(b) Civil penalties.—The Secretary may impose the following civil penalties on a person for each violation by that person of this Act or any regulation, order, direction, mitigation measure, prohibition, or other authorization issued under this Act: (1) A fine of not more than $250,000 or an amount that is twice the value of the transaction that is the basis of the violation with respect to which the penalty is imposed, whichever is greater. (2) Revocation of any mitigation measure or authorization issued under this Act to the person. (c) Criminal penalties.— (1) IN GENERAL.—A person who willfully commits, willfully attempts to commit, or willfully conspires to commit, or aids or abets in the commission of an unlawful act described in subsection (a) shall, upon conviction, be fined not more than $1,000,000, or if a natural person, may be imprisoned for not more than 20 years, or both. (2) CIVIL FORFEITURE.— (A) FORFEITURE.— (i) IN GENERAL.—Any property, real or personal, tangible or intangible, used or intended to be used, in any manner, to commit or facilitate a violation or attempted violation described in paragraph (1) shall be subject to forfeiture to the United States. (ii) PROCEEDS.—Any property, real or personal, tangible or intangible, constituting or traceable to the gross proceeds taken, obtained, or retained, in connection with or as a result of a violation or attempted violation described in paragraph (1) shall be subject to forfeiture to the United States. (B) PROCEDURE.—Seizures and forfeitures under this subsection shall be governed by the provisions of chapter 46 of title 18, United States Code, relating to civil forfeitures, except that such duties as are imposed on the Secretary of Treasury under the customs laws described in section 981(d) of title 18, United States Code, shall be performed by such officers, agents, and other persons as may be designated for that purpose by the Secretary of Homeland Security or the Attorney General. (3) CRIMINAL FORFEITURE.— (A) FORFEITURE.—Any person who is convicted under paragraph (1) shall, in addition to any other penalty, forfeit to the United States— (i) any property, real or personal, tangible or intangible, used or intended to be used, in any manner, to commit or facilitate the violation or attempted violation of paragraph (1); and (ii) any property, real or personal, tangible or intangible, constituting or traceable to the gross proceeds taken, obtained, or retained, in connection with or as a result of the violation. (B) PROCEDURE.—The criminal forfeiture of property under this paragraph, including any seizure and disposition of the property, and any related judicial proceeding, shall be governed by the provisions of section 413 of the Controlled Substances Act (21 U.S.C. 853), except subsections (a) and (d) of that section.
You read that right, you could be fined up to A MILLION FUCKING DOLLARS for knowingly violating the restrict act, so all those people telling you to "just use a VPN" to keep using TikTok? Guess what? That falls under the criminal guidelines of this bill and they're giving you some horrible fucking advice.
Also, VPN's as a whole, if this bill passes, will take a goddamn nose dive in this country because they are another thing that will be covered in this bill.
They chose the perfect name for it, RESTRICT, because that's what it's going to do to our freedoms in this so called "land of the free".
Please, if you are a United States citizen of voting age reach out to your legislature and tell them you do not want this to pass and you will vote against them in the next primary if it does. This is a make or break moment for you if you're younger. Do not allow your generation to suffer a second Patriot Act like those of us that unfortunately allowed for the first one to happen.
And if you support this, I can only assume you're delusional or a paid shill, either way I hope you rot in whatever hell you believe in.
895 notes · View notes
carionto · 1 year ago
Text
Hyperbrake Racing
Everything in Human ships has a manual override. They love automating all processes and reduce any workload to nothing, but also have this compulsive need to be able to take direct control if so desired.
They also have emergency off switches for everything. Yes, including life support. Don't ask, you'll just get a variant of:
"But What If!?"
Obviously, this applies to things you should never under any circumstances shut down preemptively, such as a Hyperspace Jump.
The earliest space-faring civilizations quickly discovered that if a Hyperdrive has a power interruption even for a nano-second your atoms will get dispersed across a few light months. This is why all Hyperdrives have an internal chargeable uninterruptible power supply unit.
Humanity, however, did not allow "Not having any reason whatsoever" to stop them from figuring out a way. Utilizing their ridiculous quantum computer speed and the ability of their fusion reactors to charge a Hyperdrive mid-jump, and with an injection of a disgusting few million lines of hack code that manipulate all related pieces of hardware in just the most nauseating sequences, they created the Hyperbrake.
Also, not a metaphor - braking literally causes Humans to feel nauseous, sometimes throw up, rarely even pass out. Not a single volunteer crew member aboard joint vessels from any of the other Coalition species has dared to "test" what happens to them.
As with nearly all things Humans come across or invent, they will find a use for it should one not occur normally.
_____________________
Near Neptune
Daniel, Samantha, and Nicholas Schreier were three siblings ages 17, 19, and 20, respectively. Today they had "borrowed" their dad's General FordStar mark 980-MZ HaulerHound, a civilian grade transport typically used by small business owners. Dad, however, was an enthusiast, and had modified the "Hound Dog", as he calls it, with a military grade reactor and computer core. He's always been that guy who knows a guy who knows a guy who knows a guy who can get the thing legally enough.
There is a nearby research station that the kids often visit due to their mom working there, but today she was not. Instead, what they are doing, is racing against each other to set the best record. Well, technically the opposite of racing - coming to a halt.
Using the Hyperbrake, they are competing to see who can stop the closest to the stations outer point-defense range without entering it or you automatically lose. After Samantha's turn, they were suddenly contacted by the station. It was Yakovskii, one of mom's colleagues and a frequent guest at dad's barbecues, so they were on sorta good terms. Not by the tone voice coming through the comms rights now though:
"What in the Hell are you thinking!? At first I thought you were just messing around and accidentally did that, but TWICE now!?! I checked the trajectory, if you had stopped a half-second later, you would've ended up mere meters from Neptune's upper atmosphere! Did you account for the possible sudden gravitational pull? Can you maneuver that lumbering ship fast enough to not get pulled down? Not to mention Hyperbraking severely impairs your cognitive abilities for a moment? A moment that you need to be clearheaded for or risk DEATH!?!"
The three siblings could only hang their heads in shame and mutter out some weak apologies. After a moment of silence and reflection, Yakovskii speaks in a warmer tone:
*sigh* "Look, I understand it's a fancy new toy and you want to see what you can do. I get it, I really do. Me and my brother used to play vertical hockey the first time we got our hands on a surplus gravity field generator. But we first figured out how to make sure we didn't break our bones in case it failed. Seriously, never forget to consider your own safety first before you try out new things in a peaceful environment. You're not being chased by pirates or trying to avoid the law or whatever.
Take your time, pick a starting position that's further away and keeps Neptune and any of its moons to the side of the station, then aim for an area of space that only has the outer range of the defenses and empty space ahead from your point of view. And please set the regular Hyperjump destination within Sol, don't just pick a random place. The Hyperbrake sometimes loops in on itself and never executes the brake and can only be reset once out of Hyperspace. You don't want to get stuck in a pointless jump for hours do you?"
After this admonishment, the siblings apologized more energetically and took his advice to heart. They spent the next hour competing until all three were down to single meter differences and kinda got bored, so they docked at the station and hung out with the off-duty staff, played some poker, but then dad barged in and dragged them all home. They were not invited to the barbecue gatherings for two weeks, but only because mom told him to. Personally he was excited about all the data his kids had unknowingly given him with all their jumping and braking, a real stress test for his beautiful Hound Dog.
232 notes · View notes
cyberstudious · 3 months ago
Text
Tumblr media
An Introduction to Cybersecurity
I created this post for the Studyblr Masterpost Jam, check out the tag for more cool masterposts from folks in the studyblr community!
What is cybersecurity?
Cybersecurity is all about securing technology and processes - making sure that the software, hardware, and networks that run the world do exactly what they need to do and can't be abused by bad actors.
The CIA triad is a concept used to explain the three goals of cybersecurity. The pieces are:
Confidentiality: ensuring that information is kept secret, so it can only be viewed by the people who are allowed to do so. This involves encrypting data, requiring authentication before viewing data, and more.
Integrity: ensuring that information is trustworthy and cannot be tampered with. For example, this involves making sure that no one changes the contents of the file you're trying to download or intercepts your text messages.
Availability: ensuring that the services you need are there when you need them. Blocking every single person from accessing a piece of valuable information would be secure, but completely unusable, so we have to think about availability. This can also mean blocking DDoS attacks or fixing flaws in software that cause crashes or service issues.
What are some specializations within cybersecurity? What do cybersecurity professionals do?
incident response
digital forensics (often combined with incident response in the acronym DFIR)
reverse engineering
cryptography
governance/compliance/risk management
penetration testing/ethical hacking
vulnerability research/bug bounty
threat intelligence
cloud security
industrial/IoT security, often called Operational Technology (OT)
security engineering/writing code for cybersecurity tools (this is what I do!)
and more!
Where do cybersecurity professionals work?
I view the industry in three big chunks: vendors, everyday companies (for lack of a better term), and government. It's more complicated than that, but it helps.
Vendors make and sell security tools or services to other companies. Some examples are Crowdstrike, Cisco, Microsoft, Palo Alto, EY, etc. Vendors can be giant multinational corporations or small startups. Security tools can include software and hardware, while services can include consulting, technical support, or incident response or digital forensics services. Some companies are Managed Security Service Providers (MSSPs), which means that they serve as the security team for many other (often small) businesses.
Everyday companies include everyone from giant companies like Coca-Cola to the mom and pop shop down the street. Every company is a tech company now, and someone has to be in charge of securing things. Some businesses will have their own internal security teams that respond to incidents. Many companies buy tools provided by vendors like the ones above, and someone has to manage them. Small companies with small tech departments might dump all cybersecurity responsibilities on the IT team (or outsource things to a MSSP), or larger ones may have a dedicated security staff.
Government cybersecurity work can involve a lot of things, from securing the local water supply to working for the big three letter agencies. In the U.S. at least, there are also a lot of government contractors, who are their own individual companies but the vast majority of what they do is for the government. MITRE is one example, and the federal research labs and some university-affiliated labs are an extension of this. Government work and military contractor work are where geopolitics and ethics come into play most clearly, so just… be mindful.
What do academics in cybersecurity research?
A wide variety of things! You can get a good idea by browsing the papers from the ACM's Computer and Communications Security Conference. Some of the big research areas that I'm aware of are:
cryptography & post-quantum cryptography
machine learning model security & alignment
formal proofs of a program & programming language security
security & privacy
security of network protocols
vulnerability research & developing new attack vectors
Cybersecurity seems niche at first, but it actually covers a huge range of topics all across technology and policy. It's vital to running the world today, and I'm obviously biased but I think it's a fascinating topic to learn about. I'll be posting a new cybersecurity masterpost each day this week as a part of the #StudyblrMasterpostJam, so keep an eye out for tomorrow's post! In the meantime, check out the tag and see what other folks are posting about :D
37 notes · View notes
pareidoliaonthemove · 8 months ago
Text
Left for Dead
Part One
Scott Tracy breathed a sigh of relief as he felt the wheels of the ‘conventional’ jet he was flying left the tarmac.
His never failed to feel lighter once he was no longer touching the earth, but this time the relief was more intense than usual.
As he guided the executive jet – once Jeff’s favourite plane, a sleek long-haul commercial jet that had been the Aviation arm of Tracy Industries flagship product, and dubbed ‘Tracy One’ – exactly through the ‘gateway’ at the end of the runway climb out, the radio crackled to live. The heavily accented English of the Departures Controller for Trondheim Lufthavn gave him his final instructions to clear the Lufthavn’s controlled airspace and join his filed flightpath out of Norway and back to Tracy Island.
He only let himself relax as he hit his cruising speed and altitude, and activated the pre-programmed autopilot.
Reaching back he caught the retractable tray table and dragged it towards him, before picking up his insulated mug, a custom-made gift from Brains that allowed him to ensure he had hot coffee available on a solo flight in the plane.
He couldn’t help glancing back at the safe built into the bulkhead at the back of the cockpit. He still had grave reservations about getting TI involved in the construction of the World Government’s new high-security computer system to be based in Norway; but the World Government had wanted Tracy Industries for their reputation for excellence and security, the TI Board wanted it, and most importantly John wanted it.
Scott tried not to think about the fact that his brother was likely to include a backdoor to the system.
But Scott had been convinced that it was in the best interests of all involved to take the project on, and he had gone to Norway to meet the key personnel and personally take receipt of the plans. TI facilities would produce the various key components and they would be shipped to Tracy Island for construction by one Hiram K. Hackenbacker
Scott sighed, even Brains had been excited by the prospect of getting to look at the designs, and the attendant programming that the hardware would be running. Something about the specifications for the “new ‘unbreakable’ encryption protocols”, and “the next major breakthrough in computing, practically quantum!”
Scott was worried that the two – three if Alan inserted himself into the mix – computer nerds would back-engineer the TOP SECRET computer and incorporate it into International Rescue’s equipment.
When – and Scott was not an optimist when it came to this sort of things, so it was when and not if – the rest of the world figured out that they had that technology, there would be some uncomfortable questions that Scott would be left to try to answer.
And he was resolutely NOT thinking about what Eos could do with all that processing power. Scott had reached a truce with the Space Monitor’s pet AI, but he hadn’t made peace with it … her. She had come dangerously close to killing John, ‘misunderstanding’ or not, ‘self-defence’ or not.
Harming his family was the one sin Scott Tracy could not forgive.
The next hour or so disappeared quietly as Scott brooded on his misgivings, carefully watched the plane’s gauges, and the sky.
Sometime after the onboard computer indicated that it had successfully completed its mandatory handshake with Chinese Air Control Scott stretched, arching his back and spreading his toes within the confines of his shoes. Flying alone was great for relaxation, flying alone long distances however … no matter how good the autopilot, a good pilot never left the controls unmanned.
Tracy One, while fast, was no Thunderbird One. I’m getting soft, Scott thought bemused. Too used to the multiple mach speed of his usual means of transportation.
Settling back into his seat, Scott once more scanned the gauges … only to see them all fade out as the engines whined their rollback to idle and shutdown.
Scott swore, unbelieving, hands once more on the controls, as he quickly hit two buttons, setting his transponder to squawk distress mode, and deploying the RAT, a small drop down wind turbine that dropped from the planes undercarriage and caught the airflow, generating enough power to get some gauges and controls working.
Fingers automatically worked at the controls, reconfigure for maximum glide, run through the midair engine restart procedure. And …
Nothing.
As Scott immediately recommenced the restart, he was on the radio: “Mayday, Mayday, Maday. This is November Tango India Zero One Charlie. Twin engine roll back, loss of power. Attempting restarts. Requesting assistance to squawk location.”
No response. Scott cycled through another engine restart attempt as he waited, nervously watching the altitude numbers seemingly freefall. There was no way he was descending that fast, surely?
Two more attempts at transmitting the mayday resulted in silence. The engines refused to restart.
Scott reached for his collar and swore. The meeting had been so high security even IR’s integrated collar coms were not allowed. And Scott had been in such a hurry to get back to the Island that he hadn’t changed his clothes, only ditching the ordinary – albeit obscenely expensive – coat, suit jacket, tie and cufflinks.
No direct link home. No mid-air rescue for Scott Tracy.
No matter. He could manage.
Abandoning his attempts to restart as the altitude numbers screamed down under the threshold.
His plane was going to kiss dirt. All he could do was make it as gentle as possible.
Scott switched his attention to scanning the ground below him, looking for a suitable space. Thank god he had elected to fly west towards home, meaning he was over the Gobi Desert.
Sand was preferable to water, no matter what Gordon said.
Sand would make for a nice soft runway, provided Scott managed a tail-first. Letting a leading edge dig in would be a disaster. Even with the International Rescue approved safety features retrofitted to the standard executive jet, there wouldn’t be much for his brothers to recover if she dug in and flipped, or windmilled around a wing.
“Mayday, Mayday, Mayday. November Tango India Zero One Charlie. Restart negative. Unpowered landing necessary. Requesting immediate assistance to squawk location.”
Scott breathed carefully, focusing on his search and not the possibilities.
There!
Off in the distance Scott spotted a level area, large enough for the plane to coast to a stop on her belly.
He breathed out, mentally calculated the distance and descent, and carefully reconfigured the plane, setting the ailerons and stomping on the rudder to bring her tail around into the head wind and shed speed: side-slipping. He gently slewed her back the other way, ensuring she maintained the correct heading, but shedding altitude and speed.
This was a dangerous aerial ballet. More so than any dogfight he had been in during his service. One wrong move …
Scott’s hands were sweating on the control yoke. His heartbeat deafened him.
Oh, there was going to be so many lost of control drills for his brothers in the future. It had been too long since they had run any.
His luck held all the way down.
He managed to line up to the long axis of the space, and his tail kissed sand at the edge of the smooth space.
Metal screamed as sand ripped at the undercarriage as Scott gently lowered the length of the plane onto the dirt, and deployed all flaps and slats, increasing the resistance to the air, even as the sand resisted the movement of the hull.
And Scott became a passenger.
He kept his feet at the rudder pedals, trying to keep the plane moving in a straight line. Yaw risked rolling. But it was largely a futile effort, the path was set, determined by physics, geology and … geography!
Scott’s heart leapt into his throat as the plane hurled itself over the top of a rising dune that had been hidden by his approach angle. It was a significant drop down the other side, and the plane had lost enough momentum that it had little aerodynamic power.
The nose fell, and Scott heard yelling.
It took the eternity the plane was falling to realise that it must be him.
Impact was hard.
Metal screamed as sections of the cockpit rushed towards him, dislodged and distorted.
Something above him broke loose, swinging down into his field of vision.
It was the last thing Scott saw.
Notes:
This is Part One of my last Febuwhump Prompt from MariaShades, Part Two will actually address the prompt, but work's been mental, and Scott's been a little shit and really didn't want to crash his plane ... Oh well, better late than never.
And if I post this half, I'll stop faffing around with it and actually write the second half. In theory.
47 notes · View notes
inthelittlewood · 1 year ago
Note
I'm not sure if this had been answered/discussed/brought up in the past but I thought I'd ask. So as we know for VTuber!Martyn lore that he's a "datastream defender" but what is actually? Like we have NPC's, players, agents, supposedly ai's, so what would C!Martyn be? Like just a entity, or maybe some sort of glitch? Or is he considered a player due to him being isekai'd from being just a normal guy into the datastream? Or something else completely?
He's a very unique being where he's a sentient person pulled in to the datastream, so he's essentially living code. Faster than any quantum computer or hardware device for that matter
Things like viruses, firewalls and the like present themselves in more literal/tangible appearances to c!Martyn and him acting out fights, placing, breaking etc. all happens in unfathomably quick fashion compared to lines of code
It's the kind of tech Doc was developing but obviously wasn't done perfecting yet. He's clearly finished the entry method, but not the reassembly/exit method - yikes
138 notes · View notes
ko-existing · 9 months ago
Note
AI isn't even AI, here at least.
True AI has hardware evolved along with programs/software. I've seen it, not "here" though.
These AI chats are just a new structure of algorithmic software that is hardly "intelligent"
They may come out with "quantum computers" here at some point though!
Regardless, the AI stuff is sucky and needs loads of training and is just like touching something twice, instead of just "going within"
💯
Even if someone uses this algorithm-AI bots things, it's not going to do much. Noticing yourself is done by yourself on your own!
10 notes · View notes
realcleverscience · 4 months ago
Text
AI & Data Centers vs Water + Energy
Tumblr media
We all know that AI has issues, including energy and water consumption. But these fields are still young and lots of research is looking into making them more efficient. Remember, most technologies tend to suck when they first come out.
Deploying high-performance, energy-efficient AI
"You give up that kind of amazing general purpose use like when you're using ChatGPT-4 and you can ask it everything from 17th century Italian poetry to quantum mechanics, if you narrow your range, these smaller models can give you equivalent or better kind of capability, but at a tiny fraction of the energy consumption," says Ball."...
"I think liquid cooling is probably one of the most important low hanging fruit opportunities... So if you move a data center to a fully liquid cooled solution, this is an opportunity of around 30% of energy consumption, which is sort of a wow number.... There's more upfront costs, but actually it saves money in the long run... One of the other benefits of liquid cooling is we get out of the business of evaporating water for cooling...
The other opportunity you mentioned was density and bringing higher and higher density of computing has been the trend for decades. That is effectively what Moore's Law has been pushing us forward... [i.e. chips rate of improvement is faster than their energy need growths. This means each year chips are capable of doing more calculations with less energy. - RCS] ... So the energy savings there is substantial, not just because those chips are very, very efficient, but because the amount of networking equipment and ancillary things around those systems is a lot less because you're using those resources more efficiently with those very high dense components"
New tools are available to help reduce the energy that AI models devour
"The trade-off for capping power is increasing task time — GPUs will take about 3 percent longer to complete a task, an increase Gadepally says is "barely noticeable" considering that models are often trained over days or even months... Side benefits have arisen, too. Since putting power constraints in place, the GPUs on LLSC supercomputers have been running about 30 degrees Fahrenheit cooler and at a more consistent temperature, reducing stress on the cooling system. Running the hardware cooler can potentially also increase reliability and service lifetime. They can now consider delaying the purchase of new hardware — reducing the center's "embodied carbon," or the emissions created through the manufacturing of equipment — until the efficiencies gained by using new hardware offset this aspect of the carbon footprint. They're also finding ways to cut down on cooling needs by strategically scheduling jobs to run at night and during the winter months."
AI just got 100-fold more energy efficient
Northwestern University engineers have developed a new nanoelectronic device that can perform accurate machine-learning classification tasks in the most energy-efficient manner yet. Using 100-fold less energy than current technologies...
“Today, most sensors collect data and then send it to the cloud, where the analysis occurs on energy-hungry servers before the results are finally sent back to the user,” said Northwestern’s Mark C. Hersam, the study’s senior author. “This approach is incredibly expensive, consumes significant energy and adds a time delay...
For current silicon-based technologies to categorize data from large sets like ECGs, it takes more than 100 transistors — each requiring its own energy to run. But Northwestern’s nanoelectronic device can perform the same machine-learning classification with just two devices. By reducing the number of devices, the researchers drastically reduced power consumption and developed a much smaller device that can be integrated into a standard wearable gadget."
Researchers develop state-of-the-art device to make artificial intelligence more energy efficient
""This work is the first experimental demonstration of CRAM, where the data can be processed entirely within the memory array without the need to leave the grid where a computer stores information,"...
According to the new paper's authors, a CRAM-based machine learning inference accelerator is estimated to achieve an improvement on the order of 1,000. Another example showed an energy savings of 2,500 and 1,700 times compared to traditional methods"
2 notes · View notes