0% found this document useful (0 votes)
33 views2 pages

Computational Perplexity and Computational Technology

Uploaded by

Neel Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views2 pages

Computational Perplexity and Computational Technology

Uploaded by

Neel Patel
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Computational perplexity and computational technology.

Can we ever stop and be content without Ray


Kurzweil’s shadow being in the foreground? New technologies include machine learning and deepmind.
Although new, they are fundamentally the neural networks of the past of almost 40 years ago. So why
now? Why do we look at the old and say it is new again? What technologies can we bring back is the
ultimate question? In order to do that we have to study the old and the predictable models.

Today we ask what are the main technologies we are using:

 Data Structures and Algorithms


 Object Oriented Programming

What new technologies would be like to be apart of:

 Google deepmind
 Tensor Flow and Pytorch
 Machine Learning and Deep Learning

How can you bridge the gap?

 Training Simulation
 Statistics and Mathematics

How to keep up with all the information learning?

 Learning to keep libraries and establish an iterative lifestyle. Its obvious what was learned
yesterday might not be what’s today as the curve is exponential.
 So a simple process of exponential learning is implemented.

So lets look at onesaf and the fom today and deep dive into the fundamentals of migrating oop code
into the angular environment.

For Enums:

 Look up the enum type in the fom


 Find the changes
 Look in data model folder for enum
 Make the changes
 Upload to jira and add comments

Platform

 CyberStateCDT nees to be created


 The num I created already
 Then changes to the Platform.java UnderAttack can be made by importing the CyberStateCDT[]
as an array
 Slightly complex save for end Persistent data model objects and common data model object

Gerald hartling ask can you create a setup for NGTS and blcse33
CVR login

 Go to your mil mail


 Find the username
 Then swap cesi sign in user with mil mail user
 Enter pw

BitBucket

 Tried to get Jon to approve


 Tried to clean cache and restart
 Tried to notify IT

How do I push code from BLCSE33

Host containers and private versus host ip address

You might also like