People (and employers) who can truly appreciate calculus wouldn't be impressed with a taken calculus course (thousands of students take calculus every year) or even a math BSc, and those who can't, how would they assess how hard your calculus course really was? There is no competition in a typical calculus course. Better ways of signaling the ability of doing hard things, especially for kids, in my opinion, are math/programming/etc contests. That's where you have a real competition and can show what you are capable of relatively to other people who participate and want to win. Also, it's important to note that passing a calculus course includes not only watching lectures or reading a textbook but also extensive problem solving. Typically "hard" college math courses are about memorization of abstract concepts, and taking any of them doesn't really prove you can do hard things (I'm not talking about PhD where you need to make novel contributions, thats crazy hard if you want your research to be competitive). Thats my experience and perspective but I'm living in my bubble.
I feel like you have missed the entire point. The point of the article was not to "signal" that you can do hard things. It was to build up the inner confidence. Competition is great, but largely orthogonal to the concept of having kids learn that they can do hard things.
It's a simple snippet but the code structure is clever in many ways. The enclosure of the whole expression, starting with pd, into () makes it possible to split method chaining into multiple lines without backslashes and start each line with ".". Now we can treat DataFrame methods similarly to verbs from dplyr data grammar and "." similarly to %>% operator. Its now easy to rearrange, add and delete whole lines without thinking if we forgot to add "." to the line above or below. Everything is immutable, no side effects, it's safe to copy the code in a new notebook cell and tweak it a little without worrying about tens of temporary df2_copy1 variables. The .pipe method allows to avoid "df = df[...]" junk, to reuse code fragments and even to use plotting libraries in ggplot fashion. If the chain becomes huge, just put it in a function and apply in to df using pipe method, etc... I wonder if it's possible to add memorization to pipe method to avoid recalculating the whole construction every time when rerunning the cell during debugging.
When I was in high school I read about perlin noise landscape generation technique in a random blog post. I shared the technique with a friend and he was very excited. A week later he presented a program which rendered Minecraft-style landscapes in ortho projection. A few more weeks passed and he added 3D perspective (using alien tech called "projection matrices"), water reflections, grass and day-night cycle animation with shadows from Sun and stars. All this using Pascal and some primitive bundled-in 2D graphics lib.
Another related high school memory is Audiosurf game, where the road and environment are generated using an algorithm based on music tempo. What if we replace this algo with a modern generative model? Probably literally a bad trip.
I guessed correctly by the title that the article is about coding a 3d image, but was waiting for the classic "two balls and a cylinder" scene, which college students naturally come up with in path tracing assignment in computer graphics courses.
This is a national meme in Russia. War and Peace is mandatory reading in schools, but it's always only 3-4 students in class who really read it. Most students just skim through ("read diagonally", as we say), use summary or watch the movie.
In Moscow metro they sometimes ask (but do not enforce) via speakers to stand on both sides of the escalator. I heard this practice was brought by McKinsey from London. In my experience this sometimes works on very short escalators, and on the longer ones people seem to ignore the suggestions. I wonder about the psychological reasons of this behavior.
There is a fun story of a guy who was making several thousand $ a month for a couple of years from a side project, a bunch of fan websites about reality TV show. Unfortunately in Russian, but Google translated version is tolerable:
Suppose a hacker group get their hands on a valuable exploit. They are like LAPSUS$ and are going to make the exploit public access, but also want to make some $. I wonder if the following scheme is theoretically possible:
1. Put the encrypted exploit file into some kind of Blockchain
2. Create a crypto wallet and announce a fundraising
3. As soon as the sum on the wallet reaches, say, $5M, the exploit is automatically and consensually decrypted by the Blockchain system and released to the public.
Exactly right, this is why a market for assassination is unlikely to ever really emerge as a result of blockchain tech. People seem to forget that the only reason it works is because of the structured aligning of potentially competing objectives. There really isn't a way to decentralize an escrow service... I mean, you could try to leverage all the participant's competing interests - but that is a massive presumption and it doesn't even address the question of how. Not through PoW, because turtles all the way down, and not through PoS, because lol Ripple.
I agree with you, but hackers sell exploits to others all the time? One can never be sure that hackers gonna send the actual exploit. You're right the scheme does not protect from that, my initial shower thought was more about the "release to the public" part, so the public can be certain about they will get something when the amount on the crypto wallet hits the threshold.
So, whether a blockchain is used or not, there's no way to know that I'll get what I paid for or an empty text file.
So the blockchain serves no purpose in this instance.
Asking people to send you money, and them trusting you'll send them the exploit is exactly the same and no blockchain is needed (except maybe the bitcoin one, since of course you don't want to use paypal)
Assuming you can establish a zero trust, publicly declared swap of crypto for said key... A smart contract could be established to act like a bounty program for this purpose and could be re-used for sharing other secrets.
You are basically asking me to send you $5M for a car (the exploit) supposedly parked into a garage (the encrypted exploit) whose location is stored on the blockchain (the encryption key).
At the time of me sending you $5M, I do not know whether or not there actually is a car in this garage.
All I can do is trust your words that there is a car in this garage.
Now that I sent you $5M, the blockchain contract reveals the location of the garage.
Now that I have the location of the garage, I make my way there; 2 things can happen:
- I open the garage, there is a car inside
- I open the garage, there is no car inside
At what point in this whole transaction did putting the location of the garage on the blockchain help me (the buyer) in any way? What matters to me as a buyer is getting a car, not the assurance of _maybe getting a car_.
You could have sent me the location by email, fax, pigeon, blockchain contract, facebook messenger, telegram, signal, whatsapp, the outcome would be the same.
You have confirmed that the garage exists and that it will be opened when certain conditions are met without further human intervention. The alternative would not come with a guarentee of the above. Just because the entire process is not zero-trust, does not mean it is not an improvement of the status quo.
If this were to become a recurring endeavour, you can introduce reputation into the system and a refund mechanism if X of Y funds required to unlock the payload are not happy with the contents.
Trust. I know a blockchain is a zero trust network and all that, but if it is a trustworthy group that can prove ownership of an address/the exploit, then I'd think it could work.
I'm a blockchain hater as well, but I'm interested. What is a better platform for something like this, assuming that you trust the actor who owns the address?
> As soon as the sum on the wallet reaches, say, $5M, the exploit is automatically and consensually decrypted by the Blockchain system and released to the public.
For that, all nodes in the blockchain would need to be in possession of the decryption key - which would allow anyone to decrypt the secret as well.