Would you like to react to this message? Create an account in a few clicks or log in to continue.


Page 1 of 11 1, 2, 3 ... 9, 10, 11  Next

Go down

Computers: - Page 2 Empty Computer Science Reading List

Post  Shelby on Mon Oct 26, 2009 1:40 pm

Last edited by Shelby on Tue Nov 03, 2009 1:15 am; edited 8 times in total


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty re: Ultimate virus and ad free browsing (and more productive too)

Post  Shelby on Thu Oct 29, 2009 3:44 pm

Shelby wrote:Get:

* Baseline Shield from
* Adblock Plus Firefox addon, With EasyList+EasyPrivacy filters

The baseline makes sure even Flash LSO objects don't persist between baseline restores (i.e. reboot) and the AdBlock filters most of the stuff. Blocked 15 out of 40 resource hogs on Yahoo Finance! Yahoo Finance loads nearly instantly now, even over my slow connection.

Browsing is so much incredibly faster and no viruses can every persist past a reboot!

You really should switch to Firefox 3.x, then following addons:

* Adblock Plus, With EasyList+EasyPrivacy filters - filters most ads before they load, speeding up browsing, reduces errors/crashes, uncluttering the webpage, then you can restore them from "ASP" stop sign icon

* Flashblock - replaces every Flash video/animation even ads, with a button to click if you want to load&display them

* Split Browser - allows you to split the browser window (horiz or vertical) with a drag-able bar (vertical or horiz) so you can see 2 or more webpages simultaneously side-by-side, which is especially productive in a large 19% wide screen. Works with the multiple tabs (pages open) of Firefox.

* Image Zoom - I don't use this too much, but you can right click on images, then roll the mouse wheel to zoom in/out on them in fine increments.

* Multiple Tab Handler - enables group operations of multiple tabs (pages open), and it integrates well with Split Browser.

Also advisable to add the Rollback product, which is same as Baseline Shield, much better than Deep Freeze or Norton and others, because of the ability to recover even if OS won't start and the faster performance of restores.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Topologically efficient URLs and P2P network topologies

Post  Shelby on Sun Nov 01, 2009 5:58 pm

See also my architectural comments about BitTorrent free loading and opportunity cost minimization.

This post continues from this one.

Something I wrote in email on Sat, April 26, 2008 3:13 am:

In short, the technological architectural problem must be solved in the context of the economic problem (see bold text below).

Deterministic vs Random P2P Topology
>From what I remember off the top of my head from my prior research, the
deterministic P2P topologies
each peer a segment of the resource locator hash key
. Within a
segment, peers communicate with each other to make sure sufficient
redundancy is maintained. Deterministic topologies are more deterministic
in terms of performance, but anonymity & resistance to attack is weak.

The random (non-deterministic) P2P topologies (e.g. BitTorrent?)
poll peers (outside their local portion of the global DHT)
, then the
segmentation of the resource locator hash key builds statistically over
time, as requested resources statistically gravitate to peers closer to
their requests over time. Statistical topologies have stronger anonymity
and resistance to attack, but are
deterministic (more statistical) in terms of performance

It seems in both cases, we only need a resource locator hash key that is
statistically uniformly distributed? Thus taking the MD5 hash of a URL is
sufficient? Thus the URL is the superset of the URL, by applying MD5 when
P2P request is desired.

So as I wrote before dash, my design is already generalized enough and the
market demand will be created for the P2P storage. Then all someone has
to do is write a plugin for the browser which redirects a URL to an MD5
hash locator in a P2P topology. See the URL access and superset P2P
access (by taking the MD5 has of the URL) can operate in parallel. The
client can try either and take the first one that returns the resource.
There is no chicken & egg problem because URLs can build out the market,
then anyone can supplement with P2P parallelism. The P2P parallelism
provides the advantage of more robust performance and will allow users to
publish persistant data to the P2P network, thus avoiding the need to
maintain a URL location permanently. One could simply plugin existing
P2P networks like BitTorrent, so there is certainly no chicken or Egg
problem as the networks already exist.

This above successfully addresses and deals with the following prior posts:

shelby;34847 wrote:dash, I have an engineering conceptual question that I
would like to ask you to help me solve.

URL (Universal Resource Locator) references a specific host (IP via DNS),
then a path within that host to a resource.

What would be the ideal structure for a resource locator which references
a resource that is distributed across a P2P network? I understand a MD5
hash can uniquely identify a resource, but it contains no optimization
hints on locating the resource. How would a transient P2P storage work
and how should the resource locator thus be optimally encoded?

I say "transient", because the most efficient energy design would be one
that cache's resources at clients that are on, with sufficient redundancy
or even deterministic redundancy, that there is always at least a few
machines on the network which are on and have a copy of (chunks of) the
resource. Rather than requiring the distribution of new web appliances,
the market will be most efficient if leverages existing PCs via new
software. Software paradigms are always more energy efficient (spread
faster), than adding hardware paradigm shifts. Remember that bandwidth is
not free, so we must increase efficiency by using underutilized (wasted)

I am currently using URLs in my design, and I want to contemplate how to
decentralize the resource locator. I think this is last key design
concept I need to conquer. The market will create the demand. This
superior resource locator should be a superset of URL, so URLs can be used
to build the market size, then P2P can be phased automatically via a more
efficient program that gets distributed as this design spreads out.

Any way, what should the topology of the resource locator be? I think we
should look at bittorrent?

shelby;33839 wrote:dash my 3rd form of storage will be creating a market
for such generic (low cost), distributed (P2P caching) network storage

shelby;33826 wrote:dash, you don't understand. I said the semantics are
the storage-- the whole concept of monopoly of storage disappears... It
is such an extreme paradigm shift, that you are not seeing it. I do not
require clients to be on. I do not want to explain it to you further at
this time. Thanks for your feedback.

The remaining problem for P2P is the
post I made about monetizing the sharing incentive
(which was
spawned conceptually from probably one of the most important & wisest
concepts Jason Hommel ever said to me "you can not make something free,
which is not free"). I will continue to ponder this one (as
Bill Cohen
the creator of BitTorrent does
), maybe others can offer their input?

BitTorrent uses the self-motivation of the download client for improved
performance as the monetization and motivation for sharing upload
. That problem is independent of the design decision I
need to make now for my project described in this thread for
de-centralizing APIs via semantics, as long as I support URLs then I am
fully generalized to any future P2P topology, because a URL can be used as
a hash key and all P2P topologies operate on hash keys.

Economic challenge of P2P is monetizing the sharing incentive of upload

---------------------------- Original Message ----------------------------
Subject: Canceling the open protocol P2P project
From: "Shelby Moore"
Date: Sat, January 6, 2007 10:03 pm
To: "Jason_Hommel"

I am leaving open the possibility of a non-open P2P file streaming method
as discussed further below.

There is no mainstream, legal demand for the open protocol P2P file
delivery network. The robustness of P2P is not something in current
demand, as the advertising and subscription revenue models are able to
fulfill 80% (measured economically, i.e. who cares about asia when they
are economically irrelevant on the internet) of the robustness needs.

The one demand case I can think of is where someone wants to broadcast
video (or other large file type) where bandwidth costs are excessive to
the business model of the site, but doesn't want the viewer (downloader)
to have to stop and pay (or wants them to pay less than the bandwidth
cost). This was the original case that lead me to P2P idea. An open P2P
protocol really doesn't help much, because we have make users pay for each
other's upload bandwidth, else free loading could destroy the network.
Try to monetize this via a form of micropayments, with semi-automated
transactional cost, seems cumbersome for this instant gratification demand

Originally I was envisioning broadcasting internet TV for example.

I am trying to think if there is any way to prevent free loading in less
open P2P protocol, so that upload bandwidth could be shared reciprocally
without needing to introduce monetization. The key seems to be the use of
source website has a hub, to police the sharing of bandwidth among the
viewer's peers, but the problem is that we have no way to verify that the
peer actually sent the bandwidth, as we can't trust the receiving peer
hasn't lied about not receiving the bandwidth. The receiving peer has no
incentive to lie (the bandwidth trade is free and receiving peer needs the
data), except to be malicious. The sending peer has an incentive to lie
in order to conserve upload bandwidth (it already has the data). And I
now realize that we have same problem in monetization case, how can we
know which of the two peers is a liar, when they disagree about whether
bandwidth was transferred between them? I do not remember how I planned
to solve this, if ever I had a solution in mind. I think I had planned to
throttle down those peers which were consistently failing and randomly
rotate peer matchups, thus liars would statistically throttle out of the
network. I could apply this same technique to the policed, free bandwidth
trading case, where liars (or those with saturated bandwidth) lose
download speed.

But this policed idea is only applicable to peers which are viewing
(downloading) simultaneously, as once the download has completed, then the
the peer has what it wants and could stop cooperating. The only stick we
have to control the peer in this free, policed case, is the peer's desire
to get the rest of the file. So this would only be viable when there are
many simultaneous viewers (downloads).

Since this would be real-time (simultaneous), then the another potential
problem is how to fan-out (fork out, think of a tree with the source as
the trunk and peers as branches) fast enough that there isn't a huge
latency between the trunk source and the outer branch peers. The only way
to solve is to have trunk proximate peers send more uploads than they
download, so that fan-out grows geometrically efficient. However, this
places a larger bandwidth cost to the viewer, which may not be preferrable
to paying for the content. Latency is probably not a big issue for file
downloads, only for viewing live video.

This policed, free P2P would probably be best implemented by installing a
webserver on the viewer's computer which would do all the P2P
communication, and thus once installed, would be seamless to a standard
webbrowsing experience. For example, user clicks a link to download a
file, this link will refer to "localhost..." which will invoke the local
webserver to download the file via policed P2P protocol and then pass it
through to the webbrowser. So from user's perspective, it is just like
clicking a normal link. The only extra thing the user needs to do, is to
install the P2P application once (which will install a local webserver on
their computer and configure it with P2P scripts, probably written using
PHP). This seems workable.

The current testing I am doing with XAMAPP local webserver

Last edited by Shelby on Mon Nov 02, 2009 4:29 am; edited 2 times in total


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Base classes can be _ELIMINATED_ with interfaces

Post  Shelby on Mon Nov 02, 2009 3:28 am

I was correct before, except I conflated the word "extended" with "eliminated" in my mind:

The most robust solution to Tim Sweeney's problem is to rethink what a "class" should be:

Theorems included at above link.

This is my final email to you all on the matter of OOP sets.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Essence of Functional Programming for Imperative Programmers

Post  Shelby on Wed Nov 04, 2009 7:04 am

New concise guide I am creating:

I was able to condense Category theory and implementation of Monads to one screen:

Overall, I think I have a unique method for comparing and condensing the explanation of the transistion from imperative to pure functional. What you think?

It is a work-in-progress, so corrections, feedback, and flames are welcome. I will do the OOP section next and incorporate the explanations from these posts:
(data vs. Module)
(interface vs. virtual)

P.S. The link will not change if you want to link to it now. If you mirror it, please update your mirrors periodically. There is no copyright claimed, I don't believe in copyrights any more. I intend to publish everything as PUBLIC DOMAIN (i.e. no license at all, because licenses impact composability). If I want to charge, I will put functionality behind an unpublished interface (i.e. Module).

P.P.S. I only started learning functional programming about a week ago.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty How to block an IP at low level on Windows XP (probably works in Vista)

Post  Shelby on Thu Nov 12, 2009 9:50 am

> My DLink router is accessible via:
> I tried setting an admin password, but doesn't seem
> to block access. How can I block that IP address at low level in Windows
> (i.e. isn't there a file in SYSTEM folder where you can resign IPs or
> something)? I can then block access to that file after I edit it by
> creating a new Windows user login that doesn't have access to that file.

%windir%\system32\drivers\etc\hosts does not work. Thanks for the tip to use IPSec in policy editor.

Here is exactly how to do it (already tested in IE and FF):

1. Start -> Run secpol.msc
2. In left pane, right-click "IP Security Policies On Local Computer"
3. Choose All Tasks -> Import Policies...
4. Select the attached file
5. In right pane, right-click "Block DLink Router", choose Assign

Here is how I created that policies configuration:

1. Start -> Run secpol.msc
2. In left pane, right-click "IP Security Policies On Local Computer"
3. Choose Manage IP filter lists and filter actions...
4. In dialog box under "Manage IP Filters" tab, click Add button at bottom
4a. Type "DLink Router" in Name, and "" in Description
4b. Check "Use Add Wizard", click Add button
4c. In Add Wizard, Source = "My IP", Dest = ""
4d. In Add Wizard, Protocol = "TCP" (else DNS blocked for all domains)
5. In dialog box under "Manage IP Filters" tab, click Add button at bottom
5a. Type "Block" in Name, choose Block radio button
6. Click Ok to dismiss dialog box
7. In left pane, again right-click "IP Security Policies On Local Computer"
8. Choose Create IP Security Policy...
9. Type "Block DLink Router" for Name and description as 4a, uncheck "Active default response rule"
10. In dialog box after Wizard (editing the new rule), do not check the rule just created by that Wizard, but add a new rule and select the IP filter and action created above, and check it to active it.
11. In right pane, right-click "Block DLink Router", choose Assign
12. In left pane, right-click "IP Security Policies On Local Computer"
13. Choose All Tasks -> Import Policies...
14. Save to the attached file


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Accepted my Idea for Fixing "space leaks" in Pure Functional Programming

Post  Shelby on Thu Nov 12, 2009 10:00 am

One of the key creators of Haskell, accepted my idea and marked it as a "feature request". I was very happy to see that my idea was not shot down too early. If you read the sub-links on that page, you will see I think it is one of the key changes needed to move pure functional programming to the mainstream, and as mainstream I assert has potential to leap computer utility forward by an order-of-magnitude (perhaps similar in magnitude to what the internet did to computers in 1995).


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Who will be the 1st to have 1 billion users?

Post  Shelby on Tue Nov 17, 2009 9:04 am

I have plan to usurp Twitter by sticking a proxy between them and the developing world:

Fairwell to the gold community. I hope to do a lot of good with education as part of my plan.

Keep at least 10% of your net worth in gold&silver, as the we move 3+ billion into the workforce, with some similarities (and some big differences, increasing taxes!) to when we moved 300+ million boomers into workforce in 1970s.

Crumbling wall of censorship

Understand how the world is being changed by peer-to-peer (P2P) spread of information, and you will get some clue as to why I think I tapping into something HUGE:

One thing I learned from living and working as a journalist and journalism teacher in China back in the 1990s is that the Chinese people, with their long experience of living in a totalitarian dictatorship in which all media are owned and tightly controlled by the state and the ruling Communist Party, are acutely aware that they are being lied to and that the truth is being hidden from them. Accordingly, they have learned to read between the lines, to pick up subtle hints in news articles which honest journalists have learned how to slip into their carefully controlled reports. They have also developed a sophisticated private system of person-to-person reporting called xiaodao xiaoxi or, literally, “back-alley news.” This system used to be word-of-mouth between neighbors and friends. As telephones became ubiquitous, it was done by phone, allowing transmission over long distances quickly. Now there is the internet, which, while it is systematically controlled via what has become known as China’s “Great Firewall” – effectively all of China is like a vast corporate “intranet” which blocks access to outside websites – still allows the flow of email. This is nearly impossible to monitor, particularly when the messages are not bulk mailed to large numbers of addressees.

So in China, reports of corruption, of local rebellions or strikes, of internal struggles within the government or party, or of important news about the outside world that the government wants to keep at bay, manage to circulate widely inside China despite a huge state censorship apparatus.

This alternative highly-personal news network works because the Chinese people know they are being lied to and kept in the dark, and they want to break through that official shroud of secrecy and control.

In the US, in contrast, we have a public that for the most part is blissfully unaware of the extent to which our news is being censored, filtered and controlled. Like the President (who knows better), we boast of our “free press,” and our open society, and indeed, as a journalist, I am free to write what I want to write.

Information can not be owned:

This is why I think I have the correct business model. I am not going to explain it in detail, because I want "first to market" advantage, but my plans should become obvious soon, if I am successful.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Better Answers to Google's Interview Questions

Post  Shelby on Thu Nov 19, 2009 10:02 pm

Apologies if this is quite egotistical, but it is just to demonstrate that most IQ tests are in fact wrong.

Better answers (from me):

Man hole covers are round mainly so they can't fall in the hole, but assuming they are quite heavy this also enables them to be rolled. However this could be a disadvantage if risk of theft is a major factor, in which case the ideal shape is an equilateral triangle or the letter 8, or more generally any N shapes attached together where the maximum of the minimum grouped dimension (i.e. the "width") is greater than maximum dimension of any of the individual shapes.

This is a minimum path optimization question, i.e. finding the shortest distance one needs to travel. The more general answer (if you really want to impress Google), is that if you are given M eggs to break for N floors, then the answer will always be that maximum drops = ((Mth root of N) minus 1) times M = N (inv key)(x^y key) M (equals key) (minus key) 1 (equals key) (multiply key) M. For 2 eggs the 2nd root means square root, for 3 eggs cube root. The reason that the Mth root or N is the shortest path is because it gives you the set with M members that are the smallest numbers that can be multiplied together that result in N. For example, with 1000 floors and 3 eggs, you get cube root of 1000 is 10, so first you drop in 1000/10 = 100 increments, so that is at most 10 drops. Then you drop in increments of 10, then finally increments of 1.

However, note that someone actually deduced a shorter path, and another person derived the generalized equation for 2 eggs and N floors, and another alluded to the M and N generalized form.

The answer given was incorrect, because only included the hour and minute hands, and did not account for a military clock. The more general and correct answer that for the minute and hour hands, then answer = 24 minus (24 divided by number of hours on the clock). For example, for a military clock (13th - 23rd hour on the clock), then the answer = 24 - (24/24) = 23. Also add the minute and second hands, answer = 24 x 60 - 1. Also add the hour and second hands, answer = 24 x 60 - 1.

The correct answer is that it depends on the context of the field of inquiry. To jump to the conclusion that "bad beef" is the magic hexadecimal file marker (I haven't seen that for 20 years and certainly I don't have the long-term sparse memory recall to have clued in on that), is myopically presumptuous without further qualification. Btw, this is the sort of question that I was marked incorrect on IQ tests, but for which I feel the IQ test examiner was wrong.

The answer given was incorrect, and someone else derived the same correct answer that I thought of, which is the phone number is the encryption key, e.g. send the MD5 hash of the phone number, ask Bob to reply whether it matches.

The answer given was incorrect, and someone point out that interestingly a preference for boys will actually lead to more girls in the population! Those with slightly higher probability of reproducing girls, will produce more girls until they produce a boy, but those with slightly higher probability of producing boys, will stop producing boys on their first one. Interesting Biblical rule, that you can not go against God's plan without reaping what you sow. Someone noted the humorous irony.

I was impressed with someone's answer to the blender question. I was thinking that since our mass was less than a piece of paper, that we had no chance of staying in a set position, nor controlling direction blown, unless we could possibly avoid the air vortex and centrifugal force in the center of the blade (but the spinning would probably kill us), so I was thinking to go to the base of the blade axis and find a rubber gasket to bite and make handles to hold on to. In theory, by the same cube root law, our strength to mass ratio would be orders-of-magnitude increased.

The answer given above is incorrect. If you offer all the booty to 51% of the crew, one of them might get motivated to vote against your proposal because they have nothing to lose if your proposal wins (and they might want to try their luck at another proposal that offers them more). Contemplate that deeply! Whereas, the correct answer is to propose that anyone who votes NO will not share in the booty. TADA!

Again this is Biblical natural law at play, wherein you can't conspire against society without reaping what you sow. I also demonstrates why socialism spreads in a democracy-- the group has to force inclusion through equality, but we know equality is a world of no-contrast (nothing with exist).


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Internet Revolution is alive and will continue to change the world more than you think

Post  Shelby on Sun Nov 29, 2009 12:01 am

Read this:

Then this:

And if they try to shut down the internet, we will simply go around them:

Imagine if my internet cafes are separated by a distance of less than 6.2 miles each, I can simply network them using a high gain, directional antenna and a standard wireless router (if I had 1000 net cafes networked together, with a huge cache of the internet, many of the services would still be functional):


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Never imagined I would be launching a business wishing for depression

Post  Shelby on Wed Dec 09, 2009 5:33 am

It turns out that my ability to cut the cost of internet usage in netcafes to 1/2 to 1/4 of current costs, is most ideally matched to a global economy that goes into depression, because in a depression people still need to communicate, and my cost advantage is ignored when people have a lot of disposeable income (who cares if the internet is 10 cents per hour instead of 40 cents).

It also turns out that my cost advantages are rendered irrelevant when the area has high commercial space rental rates, as I can only effect the cost of the computer hardware amortization with my technology. Thus I am most ideally positioned for depression squalor areas, where rentals are near 0.

You may want to read this article about another downwave of global depression being imminent:

Being in highly illiquid investments (e.g. real estates and paper financial instruments) is very risky in this yoyo global economy.

Every dog has his day. Tables are turning on those who made their fortunes in the regime of irredeemable debt financial ponzi (the fiat) system.

Everything (except items manufactured by China) that was purchaseable with loans (i.e. college education, real estate, etc) is way overpriced due the ability to borrow way beyond means to purchase them. In short, mis-allocation. None of these activities are economic.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty How to link into a specific time in a YouTube video

Post  Shelby on Sun Dec 20, 2009 7:40 pm

If you have a link to a video:

Simply add the time at the end, that you want the video to start playing:

The above link will start playing at 3:08 (3 mins and 8 secs).

Apparently you can do similarly to target a page in a PDF file:


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty My rebuttal to MySQL creator's call for socialism

Post  Shelby on Sat Jan 02, 2010 4:09 am

Shelby wrote:I will not support your socialism! If you sold the rights to something, then you no longer control it period!

MySQL can live on in a fork if there is sufficient demand. If there is not sufficient demand to support the development, then it deserves to die.

Let the market decide. Keep the govt and socialism out of it.

I will not sign your petition and I urge others not to, even though I use and depend on MySQL and want it to remain free if possible.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty 1000 cores will require a change in programming paradigms

Post  Shelby on Sun Jan 03, 2010 11:42 pm


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Technology explosion coming

Post  Shelby on Tue Jan 05, 2010 10:38 pm


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Leverage and decentralization

Post  Shelby on Wed Jan 13, 2010 8:19 am

> Easier for me to read a balance sheet and short Lehman.

And you were thus (heroic to those who know) player in the transistion to decentralization of the economy.

Understood that finance is an efficiency leverage. I respect those who enjoy that. I was only able to offer the real negative interest rates correlation with gold and the conceptual understanding of how deflation is equivalent to inflation (wealth draining effect) when the political tender is not constrained to a rare good.

I will email you if I have some near-term quantifiable opportunitities of sufficient size.

> I like your thoughts, but unfortunately they are too theoretical to be
> practical just yet... But I enjoy them.
> The philipino story is fascinating.
> You said before "here in Asia", and you refer again to asia in this
> e-mail. Are you based there now?

Yes I am in SE Asia, which I consider to be sort of a collection of un-united states, than countries. I still have a small corporate presence in USA, but these (2 corps) are scaling down as I am looking for new opportunities in Asia and global in focus (USA included).

Few more thought provoking tidbits, on the stored up energy in the technology realm and some real metrics:

1) Computer power increased million-trillion times in boomers lifetime

"The first machine to solve ballistic tables was a Mark I built by IBM - it weighed five tons, had 750,000 parts and could do three operations per second."

Now desktop computers with a $100 3D graphics can do more than 1 trillion operations per second.

Imagine that in the lifetime of the typical baby boomer, cumulative computing power on earth has increased more than million-trillions fold (given millions of desktop computers in world now, versus only 1 Mark I in 1940s).

million-trillion has 18 zeros!

But put that in perspective to Avogradro's constant, it isn't even yet equivalent to the number of molecules in a gram of matter:

2) China's social networks get 2x more revenue per user because they sell entertainment addons and vanity upgrades, in addition to advertising:

This has to do with the different culture:

The culture is synergistic with the political hoops:

Thus I think there may be a massive opportunity for a decentralizing technology gaining for more economy-of-scale in information sharing (I would need to explain more what I mean by that). Google is failing in China and may exit the market:

The theories I mentioned are apparently in play right now.

I don't yet have a concrete suggestion on how to play it on the investment side. I might be too slow or behind the curve. But a single or small group of programmer(s) can light a match that burns the entire world, if he/they has/have the key insight-- similar in power to financial leverage.

3) We probably won't get to 1000 CPU cores (7 - 11 years, at 4 - 8 now with Moore's law in play) without changing our programming paradigms:

Thus cores idled and Moore's law failing in effect. I don't think so!

The keys are parallelism, composability, and decentralization of control. Efforts should be able to compose without having to be broken, i.e. as what is required now of our fiat system. It will have to break in order to move forward, because the political order is turning deflation into theft. Society can not prosper under theft and thus the break down in the rule of natural law and justice. But nature doesn't ever lose. Decentralization is happening right now on massive scale in Asia.

Somehow this info may help at some point in future to aid an epiphany on some opportunity you are studying.

All the best,


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Re: Computers:

Post  Jim on Wed Jan 13, 2010 10:22 pm

Comment from Shelby a couple of posts back:

"makes sense when you realize that governments have been holding back a technology explosion, which will finally break out"

This reminds me about what I was thinking around 2000. It seemed to me that a huge new generation of technological innovation was about to evolve, but it was, in my opinion, choked off by the Federal Reserve continually raising interest rates over a period of one to two years.


Posts : 963
Join date : 2008-10-23
Location : California

Back to top Go down

Computers: - Page 2 Empty Pent up technology eruption

Post  Shelby on Tue Jan 19, 2010 11:44 am

Jim wrote:Comment from Shelby a couple of posts back:

"makes sense when you realize that governments have been holding back a technology explosion, which will finally break out"

This reminds me about what I was thinking around 2000. It seemed to me that a huge new generation of technological innovation was about to evolve, but it was, in my opinion, choked off by the Federal Reserve continually raising interest rates over a period of one to two years.

Well I view that as a lot of misallocated investment in fantasies, much of it not focused where it needed to be.

More about all of this is a new post I wrote today (the non-technical part is nearer to bottom):

Posted followup in the Parrot discussion list:

Also the Squirrel forum:

ADD: writing code now:

Last edited by Shelby on Mon Feb 01, 2010 7:57 pm; edited 2 times in total


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Technology waves (energy and transportation)

Post  Shelby on Tue Jan 26, 2010 5:23 am

Very interesting read about technology waves near end of this:

Computers: - Page 2 Bloom010 <--- click for article

I think the next transportation wave is the virtual movement of people on the internet.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Folding Screens will make pad notebooks fit in our pocket

Post  Shelby on Fri Feb 05, 2010 3:40 pm

Last edited by Shelby on Fri Feb 05, 2010 3:54 pm; edited 2 times in total


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Transport Yourself electronically

Post  Shelby on Fri Feb 05, 2010 3:48 pm

See prior 2 posts also.

Shelby wrote:...I think the next transportation wave is the virtual movement of people on the internet.

I realized that we will soon be able to transport our bodies electronically at the speed of light (even through the air without a wire).

The key is understanding that once we are able to connect computers directly to our central nervous system, then we can make the body think it is having a real experience that is different from the one the physical body is actually having. At this point, we can transport the body without moving it, to any reality occurring at other physical location.

Actually at this point, as long as we can nurture the brain (with artificial heart, lung, etc), we can live forever.

Inside our brain we will never realize it. We will just sense that we transported and that we are having that experience as if it was 100% real.

Of course the details are that we need to be able to model reality in sufficient fractal detail.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Automation of management

Post  Shelby on Sun Feb 28, 2010 3:22 am

"Jacob Lewis105, you are now unemployed. Do you have other means of employment?"

Of course it knew the answer, but this formality could not be avoided. "No."

"Do you have guest status with any resident?" The robot asked.


"Do you have means of support unknown to me?"

I suppose I could have stashed a cache of gold under my mattress, and this question allowed me to declare it. Such a cache would, of course, be grounds for arrest, so I was screwed either way. "No." I was without any means of support.

"In accordance with ordinance 605.12b, you have been assigned room 140352 in building 16, resident quant C. This assignment provides you with suitable housing and nourishment to sustain your life. Please board the bus."

That was how you ended up in Terrafoam.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Open Source will die!

Post  Shelby on Tue Mar 02, 2010 5:02 pm


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Soon impossible to tax people; if they do not RFID chip the people

Post  Shelby on Fri Mar 05, 2010 12:30 pm

While programming on Copute, I had an epipheny...

Realize this post is important, because if the governments lose the ability to tax soon, then the current socialism will implode very quickly. I think this also explains why our civil liberties under attack. I think it also explains why the government will find it impossible to raise taxes significantly and will instead opt for the indirect inflation tax with simultaneous deflation of leveraged assets (see "Bernanke" link below), but this of course will force people to gold.

I have realized why the governments will eventually be forced to either implode or require an RFID chip implant, for anyone who wants to transact in the local, national, or global economy.

The reason is because the internet has enabled a technology that will destroy the ability of governments to tax based on current identification capabilities. Without tax, governments will implode and the central banks will be powerless to continue their scam (scroll down on that link to the "Bernanke" section).

I believe it is possible that this new technology will be exploited very soon, and it will topple the current socialism, fiat, and globalization scam. Or the socialism will win and force RFID implants on all people.

The simplest reason is because people can always transaction with physical barter (e.g. silver and gold), which of course can not be monitored by governments with current identification systems. However, this is not a threat to the governments, because it is very inefficient and thus most people won't do it since they now have more efficient methods. Physical barter is barbaric relic that will not be coming back to the mainstream:

Shelby wrote:I think it is important to understand that digital efficiency is the only way to compete with the legal tender monopoly, which may just be giving us a little physical metal rope to hang ourselves with.

However, the internet has enabled a new technology, which no one has yet taken advantage of, but I think they soon will see the opportunity I will now describe.

First, realize that the power of the governments all rests on the ability to prevent people from using someone else's identity to hide taxable income: (see Section 9)

There are billions of poor people around the world, who would gladly allow the use of their identity to route online sales income to, and I suspect that most of them would not feel threatened by the above Anti-Money Laundering law (AML), because they view themselves as poor and hopeless any way. They would take the money, I am sure. Even if they don't, it is quite easy for people to steal identities and earn income from doing that. Proving an identity basically amounts to faxing some documents, such as copy of passport, recent utility bill, and a bank statement. None of this can be 100% tied to a physical person.

So someone just has to create a program which gives control over the income to person who is actually earning it, but routes the record of the income through the other person's identity. This could in fact be done with a P2P program that has no centralized repository, and thus is impossible to shutdown. The actual financial institution, e.g. Paypal, would still be receiving all the correct identification that they require, it is just that the account would be controlled by someone else (actually by P2P program, and in anonymous untrackable way, which is possible via anonymous P2P proxies). You see a program can login into someone's account, if the program has the password, and even the use CAPTCHA will not stop the program, because they can be solved by humans who are then given free access to porn sites for answering the CAPTCHA (God puts everything on earth for a reason).


So it would work like this. Someone wants to sell goods and/or services online using someone else's identity to receive the payment (even offline, but will record the transaction online), thus wants to avoid all taxation. They create an account in the above hypothetical anonymous P2P program. Another person wants to earn money by submitting another person's identity, they also create an account (in the other person's identity) at say Paypal (or any other mutually agreed payment site) but the submission of the creation (and potentially the supporting documentation, i.e. faxes and emailed documents can be sent from a program) is actually performed by this anonymous P2P program. The P2P is a distributed database, it doesn't live in any one place, so it is impossible to shut it down. Paypal just gets a normal account, it can't see that anything peculiar has occurred. The P2P program then takes control of the Paypal account, then it pays for things that each of the two involved parties want to buy (according to their percentage split, perhaps 99%/1%, which is much less than the tax that would have been paid). Neither person can be tracked because the anonymous P2P program is acting on their behalf, and is controlling the Paypal account. It is impossible for Paypal to know whether a program or a real person is doing the login and operating the account (if this seems like magic to you, it is not, it is very simple to do). Neither person has any risk, because the database of their actions is distributed and encrypted in a special way which prevents reverse engineering. To be extra safe, each person could connect to the internet from a WiFi connection and pay for the WiFi account using this special Paypal account, thus even if the authorities track down the IP address back to the WiFi account, it leads the authorities in a circle that mathematically can not be solved. The only procedure I can think of that Paypal could use to detect this, would be to require new accounts do a live real chat on web cam to prove visual identity match on id photo. However, a hacker can change the photo on any document and put on a life-like mask, even a program can be created which sufficiently morphs the face of someone in a video (this is not magic). The incentive depends on how high the govt tax goes. At 100% tax, no one has a choice but do this.

With an RFID implant, it is possible to require that all regulated transactions must identify by this radio frequency implanted device, but the only way this can not be subverted, is there must be an encrypted key database that only the government controls and all transactions have to verify against this database (against each individual RFID public key). This is technically feasible, if society is willing to force this.

However, there is the possibility of virtual currencies developing (like the very successful gaming currencies in China) which do not interface with existing banking systems, and thus could be entirely P2P anonymous, and thus no need for stealing any identities. The argument against these succeeding is that since they are anonymous, then there is no way to be sure they are backed by any thing of real value, and no way to extract real goods from them. I originally thought that too and dismissed the idea. But the $billions success of the virtual gaming currencies in China, has changed my perspective. The thing is that the competitive money (fiat) also is not backed by anything of real value. The only requirement for a successful currency, is that it is popular and thus you can buy things with it. As the govts increase taxes and oppression (as in China), then people could reach out in desperation to these virtual currencies, or especially if there is some very popular activity which naturally fits such a virtual currency. And actually it is possible to back such a virtual currency with something real. That is programming code. It has a real value, represented by real labor and it can be stored in a P2P database and protected by public-key encryption so that only the creator receives the virtual currency credits. Not only programming code, but any kind of information, including recipes, techniques, engineering, etc. Then there can develop a blackmarket that trades these virtual currencies for actual physical goods. Once that happens, then the virtual currency is actually backed by real hard assets in reality. The market will set the backing, by the price is assigns. The market will be able to judge the growth of the money supply of this virtual currency. The following isn't necessary, as I think information itself as real value that the black market will pay for, but as another possible outcome, lets say that the creator of this new virtual currency, promises (anonymously) that he will back every unit of the currency by a set amount of precious metals. He then loans (at 0% interest) the currency into existence by letting people use it to buy things for free on the internet (say programs, and I already described where these initial "free" programs would come from). Let's say he promises (anonymously) to back the currency at the ratio of his % fee on all transactions (in other words he invests his earnings unselfishly in backing the currency with gold, anonymously though). The market can then determine how truthful the backing is. For example, it is possible the creator offers to give an encrypted treasure map to anyone who turns over anonymously a given number of units of the virtual currency. Since this gold was perhaps planted well in advance, then the creator can not be tracked down if he wise enough. All of the above paragraph happens anonymously via the technology of encrypted P2P and using a WiFi access account paid for with your anonymous payment. If the govt puts an stop to all anonymously paid internet access, then a market demand for stolen access accounts will be created, such as stolen cell phone and iPod access accounts. Also I think it is really hard for the government to do this, if some activity becomes popular. The govt has tried to stop people from sharing their copyrighted music files, but it is still a very popular activity. I am sure the elites see this failure of their power to control popular P2P activities. The government can not stop a hacker from spreading a virus which opens everyone's computer to be an anonymous proxy, thus shielding deleting our IP address and replacing it with someone else's IP address for each activity we do. I really think the govt is threatened by the internet if they push too hard on taxes. And I think shutting down the internet would thrust the masses into a stampede into gold and silver and topple the govts.

========HERE IS THE BIG EUREKA============
After writing that above, I realized a way it could be accomplished. I realized there is no need to hide anyone's identity. Realize that all one needs to avoid taxes is massive inflation. If the amount of money you earned during 2009, is 1/2 of it's value by the time you have to pay your taxes on April 2010, then assuming you invested in something which appreciated at the rate of inflation, then your effective tax cut in half. So now I realize that identity has nothing to do with it! The title of this post is wrong. All that is needed is to back the currency with allocated gold+silver. And when people cash out, let them take the physical gold+silver, that way they have no capital gains (they haven't sold the gold+silver). If this became popular, it would be a self-feeding spiral, because gold+silver would rise in fiat price even faster.

Actually people can do this now. They should plow their income into gold & silver. The currency idea would just make it a little bit easier and less costly for people who only have a small income in online sales, letting them aggregate until it was worth shipping to them.

If the govts react by inducing deflation, then they are toast! They know the debt system will implode if they don't continue to inflate the digits. In that case, everyone (even those who did not use this system) would be walking away from their tax obligations, because who would want to pay last years tax that had increased by a factor of say 10, because of hyper-deflation.

So thus, I think even the RFID chip can not help stop the P2P revolution coming.

The governments will be unable to keep the taxes low, because the welfare states are huge and the cost of maintaining the debt loads are unfathomable. Some people may find it easier to just pay tax if it is low enough, or form a corporation in a lower tax haven, but US Citizens can not do the latter and even if relinquish US citizenship, are liable for taxes for 10 years! One way around this is to route all income to a trusted relative in a lower tax jurisdiction, but if the relative doesn't control the business, the IRS might send you a bill any way. We are indeed heading into turbulent times where the high tax nations will be forced to try to trap their citizens in a high tax regime.

I am not advocating that anyone do any of these things. I am trying to help the governments prepare by presenting this information so that the governments can put their best research into trying to defeat this in advance and I think also realize that they are doomed and it is impossible for them to impose higher taxes. They will just force people to the above system, and they will set in motion the path that will ultimately require socialists to demand RFID tagging of the entire global population. But I think the timing is such that the socialists will fail and we will have a rebirth of freedom. I think maybe the next epoch (100 years from now?), the socialists will win and achieve RFID tagging. But I could be wrong, and they are able to move all the way to RFID tagging on this cycle.

I suspect the top people in elite (CFR, Bilderbergs, Trilateralists) already know this.

Disclaimer: I am not providing tax nor business nor legal advice. These are only my technological observations and I provide no warranties of any kind. Consult your own advisor, and I seek safe harbor from anything any reader might do or not do. I am not responsible for you.


Posts : 3107
Join date : 2008-10-21

Back to top Go down

Computers: - Page 2 Empty Re: Computers:

Post  Sponsored content

Sponsored content

Back to top Go down

Page 1 of 11 1, 2, 3 ... 9, 10, 11  Next

Back to top

Permissions in this forum:
You cannot reply to topics in this forum