reality

Thank you for reading today's post. Have an InterStellar Day! ~PrP

This entry was posted in Consciousness, Humans, People and tagged , . Bookmark the permalink.

43 Responses to reality

  1. LeI says:

    Pro, your article adequately explains the human psyche. But there is a side of the ETs of earth that is just as pathetic. For example a certain group of visitors to Earth have been consistently discovered by humans using the Draper point, named after 19th century scientist John William Draper. It is the approximate temperature (977 degrees Fahrenheit, 525 degrees Celsius, 798 degrees Kelvin) above which nearly all solid materials will begin to emit visible light (i.e. glow “red hot”) as a result of blackbody radiation.
    Earth scientists have been using that technology to identify and track those stupid aliens. The point here is those idiots are informed when they enter the EM3 Gate to alter their metallic references to match earth’s periodic table. Yet they continue to believe that they won’t be spotted “because earthlings are so dumb.” The idiots will force Gate requirements to include expulsion to all who set gauge.

    • J]8 says:

      The difference between humans and us is that for them to learn a skill they gather knowledge, practice carefully, and monitor their performance. Eventually, they become better at that activity. We just download the skill needed to our “brains” for the length of time needed. We may or may not eventually become better at the skill.

      • Ruth says:

        “The difference between humans and us is that for them to learn a skill they gather knowledge, practice carefully, and monitor their performance. Eventually, they become better at that activity.”

        We humans also employ Machine learning it is a technique that allows computers to do just that. One day we will be able to “download” skills those Machine learned skills directly into the human brain. What will you do then?

        • P[8 says:

          We will not have to do anything because your “intelligence” will be tainted by your emotions and self-awareness. It is doubtful that humans will be able to learn our skills and absorb our knowledge with the ability to apply them to new situations to achieve the desired outcome as we are capable of doing.

        • E^/t7 says:

          So what will be the “intelligence” level of your computers? Yes, you humans have designed computing devices which are able to do some things that would usually require human reasoning and intelligence. You then say that they are using “artificial intelligence.” We are well aware of your devices like Amazon Echo and Google Nest which can hear your spoken instructions, interpret the sounds as words, and extract the meaning of the words.
          You are still so very far behind our abilities to do similar tasks. For us that entire sequence is housed in a device the size of one of your shirt buttons. For you humans to accomplish the same tasks, for even the most trivial interactions, your spoken commands have to be relayed to powerful computers in the manufacturers’ clouds, where the artificial intelligence heavy-lifting takes place. The command is parsed, the meaning is extracted, and the response is prepared and sent back to the smart speaker. Think about how easy it is to disrupt any link in that sequence. The end result being no response by the gadget employing powerful computers doing the heavy lifting.

          Your so called “Machine learning” underpins the majority of the artificial intelligence systems that you interact with. Some of those are items in your home like smart devices, and others are part of the services that you use online. The video recommendations on YouTube and Netflix and the automatic playlists on Spotify use machine learning. Search engines rely on machine learning, and online shopping uses machine learning to offer you purchase suggestions based on your browsing and purchase history.

          Yes, your computers can access enormous datasets. They can tirelessly repeat processes thousands of times within the space that it would take a human to perform one iteration—if a human could even manage to do it once. So, if learning requires knowledge, practice, and performance feedback, the computer is your salvation. Unfortunately, for you, we can and do control every aspect of that primitive system.

        • G^/7 says:

          “We humans also employ Machine learning it is a technique that allows computers to do just that. One day we will be able to “download” skills those Machine learned skills directly into the human brain. What will you do then?”

          Amusing, but can you even imagine how far behind you are intellectually to us? For example one of the chief differences between your computers and ours is that ours can actually think in the human sense. Yes, they can understand and perceive as you do. Our cyborgs walk among you to learn all aspects of the human genome and they are getting better with practice.
          Your computers, if skillfully programmed, by a machine-learning system can only achieve a decent impression of an aware and conscious entity. Your primitive science has not met the engineering challenges that you must overcome to allow computers to learn as ours do.
          Our cyborgs have brains which contain networks of neurons. Neurons can fire signals across a synapse to other neurons. This tiny action—replicated millions of times—gives rise to their thought processes and memories. Thus, we have created conscious minds and the ability to reason and remember in our cyborgs.

          Please, rejoice in your belief that you will one day pose a challenge to Us. That insures centuries of continuous mining of your cattle planet for those of us who see you as the source of nourishment some others here refuse to see.

          Note to those ETs who still think that the cattle should be given an opportunity to have a say in their destiny: These humans have animals that can communicate to them, yet they still find a place on their tables for them. Why should we be different?

        • Alycedale says:

          Ruth, Did You Know?

          The tallest cactus species in the world is the Pachycereus pringlei, also known as the Mexican giant cardon or elephant cactus, which can reach heights of up to 63 feet (19.2 meters).

    • LeI says:

      Prp, not Pro. didn’t know we had spell check.

  2. Oman says:

    All of the comments here will one day be seriously scrutinized.

  3. V^/3 says:

    G^/7;
    Are you certain that you want to open up this discussion Here? Your desire to maintain the status quo of Earth remaining merely a cattle planet is also a bit amusing. Are you not aware that these “primitives” have the amazing ability to use their natural brains to do a level we continuously overlook? ETs like you who are careless with what you leave behind because you refuse to accept the intellectual abilities creatures have allowed them access to a few of those “cyborgs” you are bragging about. Humans have managed to mimic some of the characteristics of their organic counterparts.

    Hardware and software have been developed that contain thousands or millions of cyborg like nodes. Those nodes, like neurons, receive signals from other nodes. They can also generate signals to feed into other nodes. Nodes can accept inputs from and send signals to many nodes at once.

    • G^/7 says:

      “Are you not aware that these “primitives” have the amazing ability to use their natural brains to (sic) a level we continuously overlook?”
      So you say, the proof remains to be shown.

      “ETs like you, who are careless with what you leave behind because you refuse to accept the intellectual abilities (sic) of these (sic)creatures, have allowed them access to a few of those “cyborgs” you are bragging about. Humans have managed to mimic some of the characteristics of their organic counterparts.

      Here the operative word is “mimic” not exactly a threatening prospect to any of us.

  4. N]4 says:

    G^/7, do not underestimate the determination of humans to conquer each other. That drive forces them to be on a continuous intellectual quest to develop a more powerful weapon to use against their fellow humans. They use everything in their environment to assist them in that goal. For example:

    If an animal concludes that flying yellow-and-black insects always give it a nasty sting, it will avoid all flying yellow-and-black insects. The hoverfly takes advantage of this. It’s yellow and black like a wasp, but it has no sting. Animals that have gotten tangled up with wasps and learned a painful lesson give the hoverfly a wide berth, too. They see a flying insect with a striking color scheme and decide that it’s time to retreat. The fact that the insect can hover—and wasps can’t—isn’t even taken into consideration.

    The importance of the flying, buzzing, and yellow-and-black stripes overrides everything else. The importance of those signals is called the weighting of that information. Artificial neural networks can use weighting, too. A node need not consider all of its inputs equal. It can favor some signals over others.

    Machine learning uses statistics to find patterns in the datasets that it’s trained on. A dataset might contain words, numbers, images, user interactions such as clicks on a website, or anything else that can be captured and stored digitally. The system needs to characterize the essential elements of the query and then match those to patterns that it has detected in the dataset. This ability to weigh information has given gambling casinos the ability to identify the prompts needed to encourage the gamblers in their casinos to continue to invest money in the hope that the next pull will be the winner. Their computers have learned this by tracking each individual who uses one of their cards before he/she bets.

    If it’s trying to identify a flower, it will need to know the stem length, the size and style of the leaf, the color and number of petals, and so on. In reality, it will need many more facts than those, but in this simple example, I’ll use those. Once the system knows those details about the test specimen, it starts a decision-making process that produces a match from its dataset. Impressively, human machine-learning systems create the decision tree themselves.

    • PrP says:

      this supports the theory for HB headed toward extinction – developing technology that they use without fully understanding the implications of their actions. Give the machines the ability to learn to think and they do better/more efficiently than HBs and you can figure out the rest.

      • E|¥]7 says:

        We have experienced that scenario many times. To date several galaxies are controlled by run away computers. Even in the galaxies controlled by living entities there are synthetic beings operating without detection.

    • S/[4 says:

      Everyone’s talking about humans working with “AI” these days. But, whether they are using Siri, Alexa, or just the autocorrect features found in their smartphone keyboard, they aren’t creating general purpose artificial intelligence. We’re creating programs that can perform specific, narrow tasks.

  5. S.>/6 says:

    G^/7, it may be you who has a false sense of security and superiority. Yes, we are far superior to humans, now. But the leap to cyborg capabilities may not be to far away for humans, given the lost cyborgs we have yet to recover.

    They have used some of what they have recovered to design a machine-learning system learns from its mistakes by updating its algorithms to correct flaws in its reasoning. The most sophisticated neural networks are deep neural networks. Conceptually, these are made up of a great many neural networks layered one on top of another. This gives their system the ability to detect and use even tiny patterns in its decision processes.

  6. D]2 says:

    G^/7, I know for a fact that humans have long had access to your system of using layers in your cyborgs to provide weighting. The humans have access to your So-called hidden layers can act as “specialist” layers. They provide weighted signals about a single characteristic of the test subject. N]4’s flower identification example might perhaps use those hidden layers dedicated to the shape of leaves, the size of buds, or stamen lengths.

    You may well turn out to be the idiot here.

  7. G^/7 says:

    Please, let’s not embellish to make an argument to give the cattle a say in their destiny. Regardless of what technology they steal to devise a better computer, they will NEVER become a threat to our dominance. They still are stuck with their three primitive techniques which they use to train their computer or machine-learning systems: Those three techniques are; 1. supervised learning, 2. unsupervised learning, and 3. reinforcement learning.

    1. Supervised learning is their most frequently used form of learning. That isn’t because it’s inherently superior to the other techniques. It has more to do with the suitability of this type of learning to the datasets used in their machine-learning systems that are being written today. Unless they find a better way, we need not be concerned about what they uncover.

    In supervised learning, the data is labeled and structured so that the criteria used in the decision-making process are defined for the machine-learning system. This is the type of learning used in the machine-learning systems behind YouTube playlist suggestions. How we laugh at that primitive form of discourse.

    2. Unsupervised Learning, although their unsupervised learning, like ours doesn’t require data preparation, it is still very primitive. The data isn’t labeled. The system scans the data, detects its own patterns, and derives its own triggering criteria. Please, how primitive is that?

    They apply their unsupervised learning techniques to cybersecurity with high rates of success among themselves, how easily we avoid detection from them. Intruder detection systems enhanced by machine learning can detect an intruder’s unauthorized network activity because it doesn’t match the previously observed patterns of behavior of authorized users, yet we are able to recognize their system use and neutralize it without concern.

    3. Reinforcement learning techniques: Yes, I agree they have gotten access to some of our Reinforcement learning techniques. Therefore it is the newest of their three techniques. However, they can only apply it through algorithms. Put simply, a reinforcement learning algorithm uses trial and error and feedback to arrive at an optimal model of behavior to achieve a given objective.

    This requires feedback from humans who “score” the system’s efforts according to whether its behavior has a positive or negative impact in achieving its objective. It is the humans who “score” the system that prevents humans from using it as we designed it. Their emotions and self-awareness is their kryptonite. They are not even aware of that flaw because their use of Reinforcement learning techniques is so prevalent and has produced demonstrable real-world successes for them in combat and especially including commercial successes. And we know how much humans covet money. Hence their concept of machine learning has been called “the practical side of artificial intelligence.” It’s big business, and there are many scalable, commercial frameworks that allow them to incorporate machine learning into their own developments or products.

    For those of you who still feel there is some need to fear human intellectual progress in this field, there are excellent resources that will help you recover from that, too. In fact, we can list a few for you to check out:
    Torch is an open-source machine-learning framework known for its speed.

    Scikit-Learn is a collection of machine-learning tools, especially for use with Python.

    Caffe is a deep-learning framework, especially competent at processing images.

    Keras is a deep-learning framework with a Python interface.

    Go for it and get back to us while we enjoy our next meal.

  8. Y]ϯ€ says:

    What will be the name of Azziza’s huge behemoth? Although it can still hide behind Jupiter which is 11 times the size of earth, we believe that it will one day dwarf the size of Jupiter. It may one day rival the size of Earth’s Sun which itself is 10 times the size of Jupiter.

  9. D^8/4 says:

    Why have we been prevented from occupying Uranus? fi/6 is using Saturn as its fueling station. We wish to use the methane gas as a beverage for diplomatic purposes. Being that is the least dense planet behind Saturn in this solar system and we are from a planet famous for the development of similar dense like planets the logic would apply.

    • LEi says:

      Perhaps that would be because you have left out some significant details about your mining of planets with similar solar systems. Your expertise has been in mining planets with the charatersistics of Earth. Unlike Earth, which has a solid inner core (composed of iron and nickel) and a liquid mantle (composed of viscous silicate materials), chilly Uranus has a solid inner core (composed of iron, nickel, and silicates) and a “solid” mantle (composed of water, ammonia, and methane ices).

      Since you are not being that prefer the “chilly.” We were naturally curious why you chose to request Uranus, after all Earth has much methane gas destroying its ozone and you could take all you want and save the planet in the process.

      If it were Uranus’s solid mantel of water, and ammonia that you were secretly interested in, that would mean that you were contemplating re-entering War with the planets q9t4, q7t4, and q7fi6 from the L18374601432765 system. A
      System under the aegis of ÓˆÍ ˝‰ÅÇ´. Such a contemplation would be punishable by Death.

      You are hereby ordered to report to the nearest station maintained by ˇÓ´ ´Â∏´‰ˆØ‰ or ӈ͠˝‰ÅÇ´.

      • D^8/4 says:

        As the humans you favor would say, “are you the Thought Police, now? There is no proof that we are mining either of those products. But if we were to decide to collect some of Uranus’s ammonia, it would be for commercial reasons, or have you forgotten the huge condiment value of ammonia?

  10. PrismPrincess says:

    TIL: “…as the blockchain has grown, the computational power required to maintain it has increased. (By a lot: In October 2019, it required 12 trillion times more computing power to mine one bitcoin than it did when the first first blocks were mined in January 2009.)”

    In the early days, anybody with a PC could mine bitcoin if you knew what you were doing and had enough juice. Impossible now.
    ———-
    “Bitcoin mining is the process by which new bitcoins are entered into circulation. It is also the way the network confirms new transactions and is a critical component of the blockchain ledger’s maintenance and development. “Mining” is performed using sophisticated hardware that solves an extremely complex computational math problem. The first computer to find the solution to the problem receives the next block of bitcoins and the process begins again.

    Cryptocurrency mining is painstaking, costly, and only sporadically rewarding. Nonetheless, mining has a magnetic appeal for many investors who are interested in cryptocurrency because of the fact that miners receive rewards for their work with crypto tokens. This may be because entrepreneurial types see mining as pennies from heaven, like California gold prospectors in 1849. And if you are technologically inclined, why not do it?

    The bitcoin reward that miners receive is an incentive that motivates people to assist in the primary purpose of mining: to legitimize and monitor Bitcoin transactions, ensuring their validity. Because many users all over the world share these responsibilities, Bitcoin is a “decentralized” cryptocurrency, or one that does not rely on any central authority like a central bank or government to oversee its regulation.” Source

    ~PrP

    • Z]3 says:

      Actually it’s a scheme to control “white money” (money used for or in nefarious purposes). It was conceived by America’s secret agencies to have a way to pay various bad actors without having the money traced. But like everything else those inept creatures conceive it got away from them.

      The real secret is that no transaction in bitcoins can happen undetected. Those that transact in bitcoins have been given a false sense of security. At anytime some agency has the ability to read any bitcoin transaction. The only reason an agency doesn’t reach in an either confiscated the money, or name the parties to the transaction is they wish to continue the illusion bitcoin transactions are safe and secure.

    • Robert says:

      Cryptocurrency is fascinating to look at from the outside, but it’s a bit like the wild west in some ways. Scammers know this, and they’re targeting unsuspecting crypto owners with malicious Google ads that direct them to fake crypto wallets.

      The report of the new scam comes from Check Point Research (CPR) (via The Verge), and it says that it has seen more than $500k worth of crypto stolen in a single weekend, thanks to these fake crypto wallets.

      Essentially, this is a phishing scam where the malicious individuals buy a Google ad and create a site that looks like a popular crypto wallet. Specifically, the scammers target Phantom and MetaMask wallets, which are popular for the Solana and Ethereum ecosystems. However, if the scam keeps seeing success, you should also be careful with other wallets and currencies.

      When someone searches on Google for these wallets, an ad will appear at the top of the search results linking to a site that looks like the actual wallet. Upon going to the website, it will trick users into providing their wallet key so the attacker can steal their cryptocurrency. If they try to create a new wallet, the website actually links to the attacker’s existing wallet, and any funds they place in will go directly to the attacker.

      As far as what cryptocurrency owners can do, CPR advises them to stay on high alert. “I strongly urge the crypto community to double-check the URLs they click on and avoid clicking on Google Ads related to crypto wallets at this time,” said Oded Vanunu, Head of Products Vulnerabilities Research at Check Point.

      Whether you’re dealing with cryptocurrency or any other phishing scam, you should always check the URL to make sure you’re on the website you’re supposed to be. Don’t ever give out your wallet passphrase or key to a website that you’re not sure about. Also, scroll down a little further and click the actual search result instead of an ad, as you can be more confident in the validity of the website.

  11. Ruth says:

    Did You Know?

    The idea that all vegetables are healthier when eaten raw has little basis in science. Many vegetables, such as spinach, carrots, mushrooms, peppers, and more, are significantly more nutritious when they are cooked first.

    • Helena says:

      Ruth: Did You Know?

      Pumpkins come in two principle varieties in the U.S., “carving” pumpkins, bred to have thinner shells and less guts to make them easier to carve, and “sweet” or “pie” pumpkins, that are smaller but filled with denser, sweeter flesh that is better suited for pies and other recipes like pumpkin soup.

    • Elle says:

      Did You Know?

      Dextrose is another name for glucose, so if you see it listed prominently on the ingredients list of a particular food, then you’ll know where the sugary sweet taste is coming from.

  12. Bill says:

    The new espionage
    When an Israeli company released a new spyware product known as Pegasus in 2011, it changed cyberwarfare. Pegasus could reliably decipher the communications of smartphones without the phone’s user knowing and without the cooperation of AT&T, Apple or any other company.

    Mexico’s government bought Pegasus — from NSO Group, the Israeli start-up that created it — and used it to capture El Chapo, the drug lord. European investigators used the product to break up a child sex-abuse ring and stop terrorist plots.

    But Pegasus also created some problems, and they quickly started becoming clear, too. Governments could use it to monitor and suppress critics and political opponents. Mexico was an example: It deployed the spyware not only against El Chapo but also against dissidents and journalists. Saudi Arabia and the United Arab Emirates used it against civil rights activists.

    The F.B.I. bought a version of Pegasus in 2019, according to a new Times Magazine investigation by Ronen Bergman and Mark Mazzetti. Since then, U.S. officials across the Trump and Biden administrations have debated whether to use it within this country as well as abroad.

    For now, the F.B.I. has decided not to do so. The Commerce Department went further, adding NSO to a list of foreign companies that it says jeopardize national security and preventing U.S. companies from working with it. Even so, the American government’s copy of Pegasus continues to sit in a New Jersey office building, ready to be turned on if the federal government changes its policy.

    Ronen’s and Mark’s story is full of other revelations, too:

    Israel has used Pegasus as a diplomatic sweetener. It gave the U.A.E. and Bahrain access to it, which helped lead to the Abraham Accords, the 2020 pact in which the Arab countries normalized relations with Israel. At one point, Saudi Arabia’s de facto leader, Crown Prince Mohammed bin Salman, threatened to block a crucial part of the deal unless Israel renewed Saudi Arabia’s license to use Pegasus.
    The C.I.A. bought a copy of Pegasus for Djibouti, to assist it in combating terrorism — despite the country’s record of human rights abuses, including the torture of dissidents.
    Pegasus has helped knit together right-wing nationalist governments around the world, with Hungary, India and Poland collaborating on its use. Benjamin Netanyahu, then Israel’s prime minister, decided not to order Poland’s Pegasus system to be cut off even after the country passed laws that many in Israel saw as Holocaust denial, and the Polish prime minister spoke of “Jewish perpetrators” of the genocide.
    In addition to these fascinating details, the story underscores a larger point about cyberwarfare. As Ronen and Mark write:

    Cyberweapons have changed international relations more profoundly than any advance since the advent of the atomic bomb. In some ways, they are even more profoundly destabilizing — they are cheap, easily distributed and can be deployed without consequences to the attacker. Dealing with their proliferation is radically changing the nature of state relations, as Israel long ago discovered and the rest of the world is now also beginning to understand.

    More than 75 years after the invention of nuclear weapons, only nine countries appear to have a usable one. But dozens of countries already have cyberweapons. “Everybody seems to want them,” Mark told me, “and this gives enormous power to the countries who sell them and can use them for diplomatic advantage.”

    It has also led to a huge increase in government spying, for good and for ill.

    Is money that important to Israel that they would sell the technology to spy on themselves to nations that promote genocide of the Jew?

  13. €\¤ says:

    So you still refuse to allow enough personnel in to do the work we need done. Are you aware that you are interfering with our access to H?

    • Anonymous says:

      Oh please just admit the truth. H has been abandoned. Nobody gives a shit. Good luck with placating!

  14. Ruth says:

    Alycedale, Did You Know?

    In Shakespeare’s “Macbeth”, there’s an iconic scene with the witches concocting a special brew and reciting the ingredients. While the ingredients sound horrific (like “eye of newt” and “wool of bat”), all the ingredients they recited, save for one (“blind-worm’s sting”), were simply archaic names for old herbs and plants (like mustard seeds and holly leaves). “Blind-worm” is an old name for a legless lizard native to Eurasia, Anguis fragilis, that looks like a short chubby snake.

  15. Lloyd says:

    Did any of you bitches Know?

    The venom of the irukandji jellyfish has a very peculiar property. In addition to the pain and other physical symptoms that normally comes with a jellyfish sting, it creates a terrifying sense of intense, impending doom so strong that the victims of the sting are convinced they are going to die.

    LOL

  16. Ruby says:

    Russia is showing its Red today

  17. Cali says:

    The megadrought in the American Southwest has become so severe that it’s now the driest two decades in the region in at least 1,200 years, scientists said Monday, and climate change is largely responsible.

Comments are closed.