Super Mario gives wrong impression of plumber's degree

On our first day of class, we had to pull three students from the sewer pipe

January 16, 2017 by Harry Withstander

At the start of every school season, Duke University welcomes hundreds of enthousiastic, motivated students, but after only a semester more than half of them will have dropped out, disillusioned and disaffected. “Young hopefuls arrive with the idea they too can be Super Mario”, Vice President Renzo DiLuigi says.

Almost immediately after the release of the very first Super Mario game in 1985, the Master of Plumbing program saw skyrocketing enrollment numbers. “That’s also where trouble starts”, explains DeLuigi. “On our first day of class, we had to pull three students from the sewer pipe. Party’s very much over for us, then. We learn people how to unclog a toilet, not how to save a princess.”

Jack Fore has been a teacher of Siphon Trap Technology with the Plumbling program. He has seen things develop before his eyes: “First day of the semester, they all come rushing into the car park in their carts, banana in hand. This makes clear to me: They’ll never be an A-grade plumber. If you want to fight with monkeys, why not do Biology, but don’t come wrecking the school building.”

Still, for DiLuigi the profession of plumber still is the best the world has to offer. “In the end, the true plumbers come to the fore. Every year, they generate so much energy on campus. As I use to say: Let’s-a go!”

with permission I guess

[Original, in Dutch, on the Speld; translated with permission]

Two AI tipping point(er)s

You may have misread that title.

It’s about tips, being pointers, two to papers that give such a nice overview of the year ahead in AI-and-ethics (mostly) research. Like, this and this. With, of course, subsequent linkage to many other useful stuff that you’d almost miss even if you’d pay attention.

Be ware of quite a number of follow-up posts, that will delve into all sorts of issue listed in the papers, and will quiz or puzzle you depending on wether you did pay attention or not. OK, you’ll be puzzled, right?

And:
DSCN1441
[Self-learned AI question could be: “Why?” but to be honest and demonstrating some issues, that’s completely besides the point; Toronto]

Electing Coke

Haven’t seen too many comparisons between Coke’s notorious botched A/B testing New Coke on the one hand, and the oh so similar (are they) recent US elections on the other.
If any of you would have a pointer to such an analysis, I’d be glad to hear.

That’s all. And:

[Which side you’d choose ..? Who cares about you / your choice ..? Zuid-As Amsterdam]

Four horsemen, with a badge

Now that ‘our failproof heroes of integrity’ (one of those five words is correct) have gained the right to hack and exploit each and every users’ device in their battle (huh) against the four horsemen, each, all and every proof of misconduct of however grave or minor import that anyone would conduct using any such ‘cyber’ device would not hold in court because no-one can prove it was the general user / suspect (sic) that put the data onto there or used it and the police would be implicated as well but cannot prove satisfactory it wasn’t them.

Obliterating any chance of ever proving actual foul horsemen…

But hey, they seem to have wanted that. For a reason? E.g., the above suspects were in majority already among the pursuers ..?

Why would I care… and:
DSCN8626cut
[Your ‘straight’ thinking…; Zuid-As Amsterdam]

Integrity it is / ain't the quote

Given the recent upswing in attention for integrity, it is not strange but unfortunate to see the phrase and concept being so warped it has become a newspeak pastiche.

Integrity … taken as zealously chasing the company’s apparent only purpose… Integrity, taken as the ‘more than compliance’ ideal, then (almost exclusively) pursued in ways that seek only meek compliance with integrity rules [note the irony of ‘integrity’ and ‘rules’ other than in opposition] to get rid of the Dutch Uncles that without fail (yes) fail their own lessons.

Stemming of course from the misconception or more straighforward, lie that employees are only as integer as they align their efforts with the company’s objectives (when push comes to shove, profit being the only one that matters, don’t lie to me or to yourself or to the world ..!).

But then, you miss the mark. Even those that pursue their bizarre political aims through shooting up / blowing up as many totally innocent and irrelevant strangers, claim their integrity … not with the things you’d consider defensible but they do; in their warped-beyond-repair mind they act sincerely and with integrity to their (idiotic) ideas and morale, ethics.

On a less damaging note, re-study Bruce, e.g., as holiday present to ask for (from yourself ;-), and see that integrity may not be what you’re after after all. Integrity being on the side of, and of, the employees individually, for themselves. If they sell their expertise to some company, it’s only that that they can reasonably be expected to deliver, not all and their soul …!

All this, combined with the ridicule in:

“Integrity is a muscle you have to train every day”.

Which points out that apparently, every day you have to separately train (how?) integrity whereas the pool of metrics to determine the efficacy of the training is a vast desert (as it should; all that is of value, is immeasurable and vice versa) — and do you really need that much training; apparently people will daily find so many more detractors …!?

Plus, those that still cling to the above illogic (mult.) about integrity, may need to train their lung muscles every day in similar vein. Or not. Yes, if you’d really understand integrity, you’d see that it is a similar body function.

Oh well, plus:
DSCN7008
[The aeons old fight of Order versus Chaos, often mistaken as Good versus Evil; Sevilla]

Throwback Thursday: Coke not (?) Classic

This Throwback Thursday (new category indeed — here), we start off with a Piece of Art, both qua visuals and musical score…
Of course, this can only be, and the title refers to, this. Click and admire.

We’re done.

Is quantum computing replacing Turing Machines ..?

About scientists, and quacks.

… stayed as guests in the Ehrenfest home, they were no doubt amused by their host’s pet parrot, which had been trained to say, “But, gentlemen, that is not physics.”

But gentlemen, let’s discuss quantum computing. How can that, and its current state and moreover, its current systemic and systematic (sic the diference) difficulties be explained by taking note of actual ‘computer’ science (theoretical computing), sparse as it is, in the form of the theories surrounding Turing Machines..?
As the latter were proven mathematically (logically) to rule…. All that ever can compute anything, can be represented as a Turing Machine; logically, they’re all (can be made/translated! into) equivalent, computationally.

So, how could one arrive at “Drop all knowledge you had about computing” in the same way as “In this area, gravity no longer exists” …?
I’m really curious.

Plus:
DSCN4588
[Yes gravity’s at work here ..! Barça]

Retrofitting IoT Security

Pitch before I did the idea that for a while be with us will Legacy IoT be, here.
But what about stubbing around it? Developing cheap and easy (necessary since/for backwards compatible, by definition) security solutions that can be plugged onto old IoT stuff.
What ya’reckon, are we too far gone with old IoT and economically-having to keep that alive, or is there sufficiently much more recent stuff to attempt such a thing (and ring-fence the real cr.p)..?

I’m not completely sure how one would approach this thing, technically, but cannot imagine that there aren’t solution models around like, potentially, some form of hardened (lean and mean and armour-coated) enterprise IoT bus thing, possibly with security zones, et al., similar to the obvious and hopefully ubiquitous separation of office automation (why isn’t SAP dead yet? This, some time ago. Oh, might be useful to set up separate mandates to ‘run’ factories yes, which was its original purpose, right; what did E-R-P stand for ..?) from Process Automation, and within the latter, Supervisory Control from operational (close-in) control, engineering-wise, but then with subsets for safe/unsafe hardware.
The isolation stubs could then act as gatekeepers between zones, between potentially-safe and the legacy-most-probably-unsafe.

Though I suspect that the ‘zones’ will have to ‘air’gap at many network layers, including towards the physical end of OSI — meaning that higher up, the connection will have wider gaps, not less why is this so often overlooked ..?

On a separate end note: Where are the wares that should have followed the scares, i.e., we have had a couple of years (yes) now of IoT scares; have the vendors truly stepped in or was it just window dressing e.g., dole out some monitoring tools and good luck with it..?

Progress… and:
DSCN1834
[See? Engineering is beautiful; Brussels]

Rejoice, you the Puzzled

Unless you were doing stuff on Nocial Media (see tomorrow — never mind, I’m not one for linear Time), you may have missed or noticed (same) the release of a facsimile of one of the most veritable puzzles of the ages (Western world), in this here thing, which is posted here. Yeah, that’s how hyperlinks work, I kno, I kno.

So, now you the puzzlers AKA crytographers around the globe, may swoop down in even larger numbers than before, to crack the thing. Or, probably, not. And you knew about this whole thing.

Question: (Why | _ ) hasn’t already some Watson-class frigate AI tool (literally certainly not figuratively) been set loose on this ..? Lack of purpose? Of would it be a good ‘Turing test’ of sorts, if we test the capabilitites (learning/analysis time ..!?) of any AI tool, by the time it would take to make mincemeat out of the Manuscript — Duh-tch for tearing apart. Any attempt after the first successful, would need to be instructed not to find the solution out there on the ‘net, obviously (?) …

One may hope, may one not? And:
h7C312413
[Found it! This is what the Manu is about!!]

WindTalker

Right. So we have a side channel attack where your hand movements over your mobile, when typing in your key, will interfere with WiFi signal patterns in a detectable, traceable way thus revealing your key. Like this (PDF).
Would this, on a second trend note, destroy or obviate even more the need for, Active Access Control ..?

Plus:
20161025_150242
[Mock-up for fabrics not mockery of your security; Stedelijk Amsterdam]

Maverisk / Étoiles du Nord