You are currently browsing the category archive for the ‘I’m a computer nerd’ category.
Why is there no seminar on the most important thought experiments? If there is (ideally, at EPFL) then please tell me.
I had to live 29.5 years to first encounter the “Chinese room” (while reading The Emperor’s New Mind). It is by far the most inspiring thought experiment concerning the issue of mind, machines and consciousness that I’ve ever heard of.
If (i) you don’t know what it is and (ii) like to think about questions such as how consciousness arises from mindless cells and if machines will ever be “intelligent” in the sense of a human, then I very strongly advise you to read at least the first paragraph of the Wikipedia article.
Why doesn’t one hear constantly about virtual impostors? What I mean is this:
Suppose somebody without a strong “web presence” and without his/her own homepage really pisses me off. [I usually don’t get mad, but let’s suppose nevertheless.] Then it would be extremely easy for me (and for any other computer geek) to create a fake homepage for this person and to make sure that this homepage is found on Google when searching for that person’s name. Now on this homepage one could put some, for example, links to gay porn sites under the header “My favorite sites”. [For some reason most people would feel insulted, if you consider them to be homosexual, which I personally find extremely silly.]
If this is well done, it might not be immediately obvious that this homepage is not “endorsed” by this person. [Just as neither this nor this page is endorsed by the White House.] Such a page could cause a serious damage to the reputation of this person.
Why does this not happen all the time? Or does this happen constantly on a large scale (… I don’t mean a dozen of cases per year …) and I’m just not aware of it?
Only once or twice per year I hear about cases where somebody (usually somebody’s ex-boyfriend) posts somebody’s (usually somebody’s ex-girlfriend’s) private telephone number, email address and address in a rather “dubious” forum/chat room, along with the offer of various free services. But this kind of evil “revenge” would be even harder to track, if you just go to some random internet cafe or use some software to anonymize your IP address while pulling this “prank“.
So either computer geeks are simply too nice and/or grown-up, or people are actually not as vengeful as one might think … or maybe just not creative enough.
PS: This post is a great test for the comment spam filter, as undoubtedly there will be lots of automated spam comments, given some words used in the text.
A Kodak Ex-1011 digital picture frame with Wifi.
Pictures are uploaded by family members, automatically downloaded from a website and the proud owner doesn’t even need to know what the internet is.
If you’re using Mozilla Thunderbird to read your email, then have a look at a new extension: EagleEye
It allows you to re-discover old friends (= people with a private email address to whom you haven’t written for several months) or keep track of your TODOs (= people with a professional email address where the last email was sent by the other person and not by you, so that you should probably reply). And MUCH more.
I still find it slightly puzzling that during the winter there’s only a few millimeters/centimeters of ice on a lake, but not more.
I simply find it interesting how little heat is lost between the ice and the (liquid) water. Maybe I should sit down some afternoon, look up all the relevant constants and compute the actual heat transfer rate to figure out, after how many weeks/months/years with an air temperature of -5° a “standard” lake would turn into a solid block of ice.
Of course, if the water was constantly being “stirred” (as is the case in most rivers), then the temperature distribution in the lake would be more even and it would take much longer to freeze over, but when it does it should probably turn into a single block of solid ice pretty much instantly. (It might also be fun to figure out, how much of the kinetic energy of the river is turned into heat. If it wasn’t for this dissipation the river would accelerate more and more towards the sea and would flow into the sea at a velocity of several hundred kilometers per hour.)
(If you don’t know this quote.)
Who should a defense talk be given for?
For the reviewers of your thesis (who have read the thesis in detail anyways)?
For the chair of the committee (you usually does not read your thesis in advance)?
For your colleagues (who will at least share some common background knowledge with you)?
Or for your family (you might share the last name with you but probably not a lot of knowledge about your research subject)?
Ultimately, it depends on your own goals and also on the committee members. Still, if somebody asked me for advice on this topic now I’d tell him (from my own experience) that the talk should not be “too accessible” (as was the case for me). At least in the last 10 minutes or so just loose the rest of the crowd, throw in some proofs, go into depth, show off a bit.
In the end, this issue is probably not too crucial though as the grade of your thesis (… in Germany you get a grade for your thesis …) is hardly ever affected by the presentation you give (at least in the domain of computer science). So I’m still glad that I got positive feedback from friends and colleagues outside the domain of information retrieval, even if the “shallowness” of the presentation then motivated the referees to ask some questions which were not directly related to the main contributions of the dissertation. So at least the defense really deserved the name of (self-) defense at the end.
I love her. She’s beautiful. The size is just perfect. Pretty slim. But she lacks (i) a QWERTY keyboard, (ii) a touchscreen and (iii) a higher resolution (640×480) display.
Still, my new Nokia N95 is really growing on me. Nice 5Megapixel camera and a built-in GPS receiver. That alone is enough to conquer my heart.