Skip to main content

堆机器才是王道

http://gengwg.blogspot.com/
三种趋势
一种越做越小,客户端的东西都是越做越小
手机,pc,都越来越轻,越来越小
但是这个领域,软件能做的实在不太多,机能受限

还有一个是越做越大,hpc,主机,但是越做越大的主要问题是太贵了
一般公司根本用不起,只能集中在某个特定的领域
比如做科学计算这些,确实需要的地方,来搞,大多数公司还是用不起
就是钱的问题

最后一种是越做越多,分布式基础就是一堆鸟机器往上堆
每一个拿出来都是破烂,但是便宜,没有什么东西是不可替代的
这就非常符合一个公司的利益,一个公司的运作,就是把所有的部件
都搞成螺丝钉,现在cloud进一步强化了这种趋势,同时使得操作更为简化
然后这种东西居然跟很多年前那个Hebb搞的神经网络有共通之处
这个实在是让人没有想到,Hebb死得早,那些理论今天才开始有点曙光
现在分布式还是太简单,人的大脑有850亿个节点,什么时候能在数量上实现这个级别
ai就差不多有点谱了,skynet就有可能造出来,然后遥控终结者出来屠杀人类
象wdong这种以后都是人类灭亡的罪魁祸首,如果有时间机器的话
人类解放军领袖john connor差不多该派个未来战士回来消灭wdong了

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...