I don't know about y'all, but this paradox was resolved to my complete
satisfaction in a blog post some years ago, I believe by Scott
Aaronson, though I can't find the link. If the predictor has such a
good success rate, then it must be simulating people's brains, but
since it's not always right, the simulation isn't perfect. The best
strategy for playing this game therefore is to look for indications as
to whether I'm the real me or the simulation when the question is
posed to me, and choose accordingly. Am I floating in a sensory
deprivation tank being asked my choice by a disembodied voice with no
recollection of how I got there and no memory of my childhood? In that
case maybe I'm the simulation, so my answer is that I'll choose just
one box. Is it an ordinary day of my life and a plausible setting with
all of my faculties and recollections intact? Then I'll assume
simulated me had my back and take both boxes.
Take it to a charity shop or thrift store near you that accepts
donations of electronics so that it finds its way to some smart
kid who wants to teach himself or herself about computers.
For another example of betrayal, one of the cronies in Katherine the
Great's court always gave a dog to his girlfriends whenever he started
a new relationship. Then if the dog ever greeted some other guy
familiarly, he inferred he was falling out of favor. He probably
learned that trick when someone did it to him, because he would let
the other guy know how he was rumbled before graciously bowing out.
I worked for a company that made dedicated FPGA based hardware for
high frequency trading by deep-pocketed customers. You can certainly
implement trading strategies running directly on the board with crazy
fast turnaround times, but if a retail trader could benefit from them
we all would have quit our jobs and become independent high frequency
traders. Interestingly, at that point the Linux network stack becomes
a bottleneck so you'll want to go for a proprietary alternative whose
name I don't remember any more (not cheap), which I imagine might also
apply to a Mac, but that's neither here nor there unless you have a
server in close physical proximity to the exchange. Meta-advice: If
you want to learn about FPGAs as a matter of interest, more power to
you. Otherwise, skip the bikeshedding and learn enough about financial
markets to find a niche where you might have an edge.
FreeTube [1], and yt-dlp [2], especially in combination with a
ready supply of VPNs. Switching them around to avoid being
blocked by Google reminds me of adjusting the tuner for better
reception on an old analog tv. Infant me might have imagined a
malevolent being who inhabits the airwaves deliberately causing
interference, and in the world we've created since then that's
not far from the truth. Many thanks to the developers
tirelessly compensating for Google's frequent deliberate
breakage.
It happened to me too, and I was unable to verify myself by any
acceptable means due to being based in a country other than that of my
passport. Having been redirected somewhere else for the identity
verification onboarding, I think the process is outsourced by
Hetzner to a firm of security specialists apparently oblivious to
edge cases. Nice work if you can get it.
There's some other specific character besides spaces that's also not
permitted in passwords. It's a normal printable ascii character but I
can't remember what it is any more, and sometimes it's not caught.
Let's hope nobody signs up with it by mistake.
I have, and the technical support representative at Proton confirmed
it, but not without implying that it was my fault for using rclone. I
asked the official recommendation for Linux users to do automated or
scriptable backups onto a Proton drive and the answer was that some
kind of SDK was planned for the future. Proton drive stopped working
completely with rclone shortly after that, which was about two months
ago.
To be honest, all consumer cloud storage providers get touchy when you access them via API.
Dropbox API refuses to sync certain 'sensitive' files like game backups (ROMs or ISOs). There is no way for Dropbox to know if you own the game and thus can own a backup, they just play file police.
I know everyone says SK combinators can express any computable
function, but I don't get it. How do we write this function foo in
terms of SK combinators alone? Is there some obvious programming trick
I'm missing that makes it trivial? (It wouldn't be the first time.)