I would say, now it’s learning that actually sticking your head in the sand is only ever a delaying tactic. But, if it DID learn that, it’d mean it has surpassed us already.
r00ty
I’m the administrator of kbin.life, a general purpose/tech orientated kbin instance.
- 0 Posts
- 441 Comments
r00ty@kbin.lifeto
Technology@lemmy.world•Quantum teleportation between photons from two distant light sources achieved
5·27 days agoYep. I also valid concerns. But those seem to be their next steps. I just wondered if there would be degradation. You wouldn’t even be able to tell until it reached the destination.
Definitely interesting stuff.
r00ty@kbin.lifeto
Technology@lemmy.world•Quantum teleportation between photons from two distant light sources achieved
11·27 days agoThis is for communication, not computation or even cryptography. The point in transferring it this way is so as to maintain the unseen property of the photon.
r00ty@kbin.lifeto
Technology@lemmy.world•Quantum teleportation between photons from two distant light sources achieved
232·27 days agoI think my question on all this would be whether this would ultimately cause problems in terms of data integrity.
Currently most amplifiers for digital information are going to capture the information in the light, probably strip off any modulation to get to the raw data. Then re-modulate that using a new emitter.
The advantages of doing this over just amplifying the original light signal are the same reason switches/routers are store and forward (or at least decode to binary and re-modulate). When you decode the data from the modulated signal and then reproduce it, you are removing any noise that was present and reproducing a clean signal again.
If you just amplify light (or electrical) signals “as-is”, then you generally add noise every time you do this reducing the SNR a small amount. After enough times the signal will become non-recoverable.
So I guess my question is, does the process also have the same issue of an ultimate limit in how often you can re-transmit the signal without degradation.
r00ty@kbin.lifeto
Technology@lemmy.world•Quantum teleportation between photons from two distant light sources achieved
19·27 days agoPretty sure this was made clear in the article but… I’ll outline the little I know on the subject as a complete layman.
Currently we have been able to use quantum effects to create single runs of fibre that cannot be intercepted. That is, if the data is intercepted by any known means the receiver will be able to detect this.
The shortcoming of this method, is that of course when you need to amplify the signal, that’s generally a “store and forward” operation and thus would also break this system’s detection. You could I guess perform the same operation wherever it is amplified, but it’s then another point in which monitoring could happen. If you want 1 trusted sender, 1 trusted receiver and nothing in between, this is a problem.
What this article is saying, is they have found a way to amplify the information without ever “reading” it. Therefore keeping the data integrity showing as “unseen” (for want of a better word). As such this will allow “secure” (I guess?) fibre runs of greater distances in the future.
Now the article does go into some detail about how this works and why. But, for the basic aspect of why this is a good and useful thing. This is pretty much what you need to know.
r00ty@kbin.lifeto
Technology@lemmy.world•Elon Musk says Optimus will 'eliminate poverty' in speech after his $1 trillion pay package was approved
6·1 month agoThis is the world most of us want to live in I would think.
He is not the one to deliver it. He doesn’t really want that. If he did, he wouldn’t want $1t let alone fight to get it. Let alone all the other vile shit he has done, and will do.
Of course not. As the merovingian in the matrix says. French is a fantastic language, especially to curse with.
r00ty@kbin.lifeto
Technology@lemmy.world•AWS crash causes $2,000 Smart Beds to overheat and get stuck upright
9·2 months agoSo far I’ve mostly avoided the whole “things that don’t need to be on the Internet” situation.
Non smart TV (well that period when they started adding smart features but they’re all out of date now so not even connected to the Internet)
All kitchen stuff is just kitchen stuff. No Internet.
Car is still offline.
Only real exception is smart thermostat, and that’s just because when the boiler was installed that’s what they put in.
r00ty@kbin.lifeto
Not The Onion@lemmy.world•British public wrong about nearly everything
8·2 months agoIt’s as true today, as it was then?
r00ty@kbin.lifeto
Not The Onion@lemmy.world•PHOTOS: 'Arc de Trump' revealed as president's latest 'America 250' project
14·2 months agoSure. But it’s to Mars, with Musk.
Yep, same. Well I actually remember finding the best ways to copy a game on a tape error free first. Some, without protection you could just save back to tape for a digital reproduction (and this also allowed tape to disk conversion). Actually those with non destructive copy protection could kinda be copied too if you knew a little Z80 ASM. Others, you needed to copy tape to tape and hope the quality turned out OK.
But yes, then bringing your box of copied disks (Amiga in my case) into school and swapping with your friends was the way to go.
That’s fine. I’ll make my own internet. With blackjack, and hookers. In fact, forget the internet!
r00ty@kbin.lifeto
Programmer Humor@programming.dev•Works if manually restarted by an intern from time to time
7·3 months agoI mean, I have to say I’ve hastened my own demise (in program terms) by over-engineering something that should be simple. Sometimes adding protective guardrails actually causes errors when something changes.
r00ty@kbin.lifeto
Programmer Humor@programming.dev•Works if manually restarted by an intern from time to time
20·3 months agoYes, had the same happen. Something that should be simple failing for stupid reasons.
r00ty@kbin.lifeto
Programmer Humor@programming.dev•Works if manually restarted by an intern from time to time
21·3 months agoYep. It seems they haven’t changed a thing about the format. Probably a script much older than mine on their end is generating it too.
r00ty@kbin.lifeto
Programmer Humor@programming.dev•Works if manually restarted by an intern from time to time
98·3 months agoI have a tool that I wrote, probably 5+ years ago. Runs once a week, collects data from a public API, translates it into files usable by the asterisk phone server.
I totally forgot about it. Checked. Yep, up to date files created, all seem in the right format.
Sometimes things just keep working.
Yeah, no prices. I move on. Same with job ads, no salary no application. If I get an intrusive ad, I’m not buying that product, I’ll deliberately seek out another brand in fact.
Is that a weird attitude to have? I thought it just made sense. We shouldn’t be rewarding this BS.
r00ty@kbin.lifeto
Programmer Humor@programming.dev•Have you been exposed to an IPv6 address at work?
7·3 months agoWith IPv6 for most use cases there’s actually more security. With privacy extensions (pretty sure it’s enabled on windows by default), when you make connections from your device, it uses a “private” IP. That is a randomly chosen address inside your network’s prefix, that changes regularly.
These addresses don’t accept incoming connections. You have a main address that doesn’t really change that you accept connections on. Firewall that for ports you want to allow and then hackers need to port scan 2^64 or 2^80 address space to find your real IPs in your prefix. If they capture your IP from a connection to a web server etc, they won’t have luck scanning you.
Again as per my post above, the biggest risk right now is bad default configurations on many home routers.
r00ty@kbin.lifeto
Programmer Humor@programming.dev•Have you been exposed to an IPv6 address at work?
6·3 months agoThe “firewall” features are called connection tracking and, a firewall. With IPv6 I have my firewall setup very similar to NAT. Established and outgoing new connections are allowed (this is done using connection tracking). Incoming new connections are not allowed unless I open up a specific port.
Home firewalls SHOULD be setup the same for IPv6, a lot are not and IMO is the main problem right now.


More than 51 years if there’s one of those updates that will randomly decide to overwrite the UEFI removing your bootloader entirely :P