Yottascale 2040: Powered by Grok3Playing around with Grok 3 here to have it run the numbers on building a Yottascale computing system. I would assume that there are a fair…3h ago3h ago
Trump: Method or Madness?April 3, 2016 — I wrote this but did not publish it due to the political hysteria surrounding Trump’s candidacy. In reflection, my…5d ago5d ago
Exploring the Limits of DeepseekI have always been an AI skeptic, and especially a skeptic of AGI/ASI, on various theoretical and practical grounds, but I do think it is…Jan 29Jan 29
Alchemy 2.0 — AI and the Quest for the Elixir Vitae and the Philosophers StoneThe proponents of AI, and in particular its proponents who predict the eminent creation of Artificial General Intelligence (AGI) or…Jan 262Jan 262
Synchronous Replication with High Availability — A New ApproachFor building any computing system High Availability is a desirable and often necessary property. In simple terms, high availability, in…Jan 22Jan 22
Benchmarking Node.js: v12 vs v10, v8, v6, v4 and GoBenchmarks never tell the whole story of how software or hardware performs but they do provide a rough idea that can help when making…May 25, 2019May 25, 2019
Published inEpyclyNode.js MySQL Driver Benchmarks 2018As a developer of the Immutable App Node.js framework, which uses MySQL as one of its storage engines, and as an engineer working on a…Nov 10, 20181Nov 10, 20181
Published inHackerNoon.comDigital Real IDs that Preserve Anonymity are Possible and NecessaryWhether it is fake reviews that mislead consumers and harm businesses, fake user activity that defrauds advertisers, or fake news that is…Sep 22, 2018Sep 22, 2018
Published inHackerNoon.comAutonomous Terror: The Clear and Present Danger of Self-Driving CarsAutonomous cars are one of the most exciting and transformative technologies currently under development. Fully autonomous vehicles would…May 30, 2018May 30, 2018
Published inHackerNoon.comPrivacy & Censorship Resistance Without DecentralizationA new algorithm for transmitting and storing data via the cloud such that the cloud provider cannot identify the data being transmitted or…May 16, 2018May 16, 2018