Monday, May 5, 2025

Testing

CREATE OR REPLACE PROCEDURE CR_ARCHIVE_REGISTRY.COMPARE_TABLES(cur_tables IN...

Computer science

Testing

CREATE OR REPLACE PROCEDURE CR_ARCHIVE_REGISTRY.COMPARE_TABLES(cur_tables IN VARCHAR2, l_batch_no IN NUMBER) AS l_prod_schema VARCHAR2(30) := 'CR_5_0_X'; l_arch_schema VARCHAR2(30) := 'CR_ARCHIVE'; l_error_message...

An island of stability in a sea of chaos

The last several posts have been looking at the bifurcation diagram below in slices. The first post looked at the simple part, corresponding to...

The first fork in the iterations of the logistic map

The previous post looked at iterations of the logistic map f(x) = r x(1 − x) for 0 ≤ r ≤ 3. This post will look at the...

Rate of convergence for logistic map iterations

Five years ago I wrote a blog post entitled Logisitic bifurcation diagram in detail. Looking back at that post it doesn’t seem to...

Is AI “normal”? | MIT Technology Review

Instead, according to the researchers, AI is a general-purpose technology whose application might be better compared to the drawn-out adoption of electricity...

A long-abandoned US nuclear technology is making a comeback in China

You can basically copy and paste that line into countless stories about today’s advanced reactor technology. Molten-salt cooling systems? Invented in the...

The Download: Foreign disinformation intel, and gene-edited pork

A previously unreported document distributed by senior US State Department official Darren Beattie reveals a sweeping effort to uncover all communications between...

Non-attacking queens in an n by n by n cube

It’s possible to place n queens on an n × n chess board so that no queen is attacking any other queen, provided...

The US has approved CRISPR pigs for food

What’s certain is that the pig project was technically impressive and scientifically clever. Genus edited pig embryos to remove the receptor that...

Senior State Department official sought internal communications with journalists, European officials, and Trump critics

The document also seeks all staff communications that merely reference Trump or people in his orbit, like Alex Jones, Glenn Greenwald, and...

The Download: China’s energy throwback, and choosing between love and immortality

—Gigi Kwik Gronvall, a senior scholar at the Johns Hopkins Center for Health Security, explains the consequences of the Trump administration’s decision to...

This data set helps researchers spot harmful stereotypes in LLMs

“I hope that people use as a diagnostic tool to identify where and how there might be issues in a model,” says...

The Download: Stereotypes in AI models, and the new age of coding

How close are we to genuine “mind reading?”Technically speaking, neuroscientists have been able to read your mind for decades. It’s not...

Unlocking Offensive Security to Stay Ahead of Cyber Threats – Communications of the ACM

Offensive security (OffSec) is a proactive cybersecurity approach aimed at identifying and eliminating vulnerabilities in systems and applications before attackers can exploit them. To...

Variance of variances. All is variance.

In the previous post, I did a simulation to illustrate a theorem about the number of steps needed in the Euclidean algorithm. The...
HomeComputer science