The document discusses various interpretations and aspects of quantum mechanics. It explores interpretations like the Copenhagen interpretation, hidden variable theories, the many worlds interpretation, and issues like wave function collapse and decoherence. It also discusses open questions like the nature of reality according to quantum mechanics and the relationship between the quantum realm and classical physics.
An immersive workshop at General Assembly, SF. I typically teach this workshop at General Assembly, San Francisco. To see a list of my upcoming classes, visit https://generalassemb.ly/instructors/seth-familian/4813
I also teach this workshop as a private lunch-and-learn or half-day immersive session for corporate clients. To learn more about pricing and availability, please contact me at http://familian1.com
Vasil Penchev. Gravity as entanglement, and entanglement as gravityVasil Penchev
Â
1. The document discusses interpreting gravity as entanglement by investigating the conditions under which general relativity and quantum mechanics can be mapped to each other mathematically.
2. It outlines a strategy to interpret entanglement as inertial mass and gravitational mass, and to view gravity as another interpretation of any quantum mechanical or mechanical movement.
3. This would allow gravity to be incorporated into the standard model by generalizing the concept of quantum field to include entanglement, represented by a cyclic Yin-Yang mathematical structure.
The standard model of particle physics attempts to describe the fundamental interactions of nature. It classifies all known elementary particles and their interactions via gauge bosons that mediate four fundamental forces. While successful, it is limited and does not account for gravity, dark matter, neutrino masses, inflation, or the asymmetry of matter and antimatter in the universe. Many theories beyond the standard model have been proposed to address its limitations, such as supersymmetry, grand unification, string theory, and others.
This presentation provides an overview of quantum cryptography. It begins by defining classical cryptography and introducing the idea of public key cryptography. It then explains how quantum cryptography works using polarized photons to securely distribute a key between two parties. The method described is BB84, which uses randomly polarized photons and basis sets to encode information and detect eavesdropping based on error rates. Real-world implementations of quantum cryptography over fiber optic cables up to 150km are mentioned. In summary, quantum cryptography provides unconditional secure key distribution through properties of quantum mechanics such as photon polarization.
An immersive workshop at General Assembly, SF. I typically teach this workshop at General Assembly, San Francisco. To see a list of my upcoming classes, visit https://generalassemb.ly/instructors/seth-familian/4813
I also teach this workshop as a private lunch-and-learn or half-day immersive session for corporate clients. To learn more about pricing and availability, please contact me at http://familian1.com
Vasil Penchev. Gravity as entanglement, and entanglement as gravityVasil Penchev
Â
1. The document discusses interpreting gravity as entanglement by investigating the conditions under which general relativity and quantum mechanics can be mapped to each other mathematically.
2. It outlines a strategy to interpret entanglement as inertial mass and gravitational mass, and to view gravity as another interpretation of any quantum mechanical or mechanical movement.
3. This would allow gravity to be incorporated into the standard model by generalizing the concept of quantum field to include entanglement, represented by a cyclic Yin-Yang mathematical structure.
The standard model of particle physics attempts to describe the fundamental interactions of nature. It classifies all known elementary particles and their interactions via gauge bosons that mediate four fundamental forces. While successful, it is limited and does not account for gravity, dark matter, neutrino masses, inflation, or the asymmetry of matter and antimatter in the universe. Many theories beyond the standard model have been proposed to address its limitations, such as supersymmetry, grand unification, string theory, and others.
This presentation provides an overview of quantum cryptography. It begins by defining classical cryptography and introducing the idea of public key cryptography. It then explains how quantum cryptography works using polarized photons to securely distribute a key between two parties. The method described is BB84, which uses randomly polarized photons and basis sets to encode information and detect eavesdropping based on error rates. Real-world implementations of quantum cryptography over fiber optic cables up to 150km are mentioned. In summary, quantum cryptography provides unconditional secure key distribution through properties of quantum mechanics such as photon polarization.
Quantum cryptography uses principles of quantum mechanics to guarantee secure communication. It allows two parties to generate a shared random key that can be used to encrypt and decrypt messages. There are two main approaches - using polarized photons or entangled photons. Information reconciliation and privacy amplification protocols are used to ensure the keys between the two parties are identical and an eavesdropper gains no information. While traditional man-in-the-middle attacks are impossible, future work aims to increase transmission distances including to satellites. Several research groups and companies are conducting research on quantum cryptography.
This document provides an overview of quantum cryptography. It introduces key concepts like the Heisenberg uncertainty principle, photon polarization, and the need for quantum cryptography due to potential threats from quantum computers. The document describes how quantum key distribution works using protocols like BB84 to generate and test secure encryption keys between two parties by detecting any eavesdropping. It notes that working prototypes have been implemented over fiber optic cables and open air.
This document discusses quantum cryptography. It begins with an introduction to traditional cryptography and then defines quantum cryptography as exploiting quantum mechanical properties like the Heisenberg uncertainty principle and quantum entanglement for cryptographic tasks. It explains how quantum cryptography works by having Alice and Bob send polarized photons in randomly chosen bases and discarding mismatched bases to generate a secret key. It also covers applications like secure online voting and satellite communications, as well as limitations such as short maximum distances and inability to multiplex quantum channels.
Berlin Slides Dualities and Emergence of Space-Time and GravitySebastian De Haro
Â
Holographic relations between theories have become an important theme in quantum gravity research. These relations entail that a theory without gravity is equivalent to a gravitational theory with an extra spatial dimension. The idea of holography was first proposed in 1993 by ât Hooft on the basis of his studies of evaporating black holes. Soon afterwards the holographic AdS/CFT duality was introduced, which since has been intensively studied in the string theory community and beyond. Recently, Verlinde has proposed that Newtonâs law of gravitation can be related holographically to the âthermodynamics of informationâ on screens. I discuss the last two scenarios, with special attention to the status of the holographic relation in them and to the question of whether they make gravity and spacetime emergent. I conclude that only Verlindeâs scheme instantiates emergence in a clear and uncontroversial way. I suggest that a reinterpretation of AdS/CFT may create room for the emergence of spacetime and gravity there as well.
The document outlines the historical development, advantages, characteristics, and requirements of quantum dot lasers compared to quantum well lasers. It discusses how quantum dot lasers confine electrons through small size and tunable energy levels. While early models had bottlenecks like uniformity issues, breakthroughs in temperature stability and modulation have occurred. Future work aims to control dot positioning and size to reduce inhomogeneous broadening and allow injection of cooled carriers.
El documento presenta una lista de planes y programas para el curso 2013/2014 en un colegio, incluyendo el plan de salud y prevenciĂłn de riesgos laborales, el plan de igualdad, el plan de escuela TIC 2.0, el plan de lectura y bibliotecas, el plan de acompaĂąamiento, un programa de alimentaciĂłn saludable y un programa para aprender a sonreĂr. Cada plan o programa detalla el coordinador, los alumnos y profesores participantes.
This document provides an overview of the EE-353 Computer Networks course taught by Dr. Zawar Hussain Shah at NUST. The key points covered include:
- An introduction to computer networks and what will be covered over the course, including network protocols, applications, and design principles.
- The course objectives are to conceptually introduce computer networks and protocols like TCP/IP, understand the design of the Internet, network protocols, and core networking principles.
- The course contents, textbooks, grading policy, labs, and policies are outlined. Students will be graded based on quizzes, exams, assignments and a project.
- Contact details for the professor are provided for any questions.
The document outlines an action plan created by the West Midlands Combined Authority Mental Health Commission to improve mental health and wellbeing in the West Midlands region. Key organizations across the region have signed a concordat agreeing to work together to implement the actions in the plan, which were informed by research, evidence, and input from professionals, service users, and the public. The plan contains five themes of actions to address major issues like employment for those with mental health problems, housing, the criminal justice system, health services, and community involvement. The goal is for this plan to drive long-term, meaningful change in reducing the impact of mental illness in the region.
This document contains an excerpt from a test on revising HTML code. It provides directions for identifying tags, constructing code based on descriptions, and completing an HTML program to display an inspirational quote. The program asks students to fill in missing tags and attributes to display centered text with formatting like bold, italic, underline and strikethrough. It also provides the beginning and ending tags needed to create a valid HTML document.
La impresiĂłn Offset es un mĂŠtodo de reproducciĂłn de documentos e imĂĄgenes en papel u otros materiales mediante la aplicaciĂłn de tinta oleosa sobre una plancha metĂĄlica. La plancha transfiere la imagen o texto a una mantilla de caucho y luego al papel por presiĂłn. El grabado a punta seca es una tĂŠcnica similar al grabado al buril donde el artista dibuja directamente sobre una lĂĄmina de zinc o cobre usando una herramienta puntiaguda, generalmente de diamante, creando surcos con rebabas a uno o ambos lados depend
La resistencia aerĂłbica se obtiene a travĂŠs del metabolismo aerĂłbico, que realizan las cĂŠlulas musculares mediante combustiones, es decir, reacciones quĂmicas en presencia de oxĂgeno. Por estas reacciones las proteĂnas, las grasas y el glucĂłgeno almacenados en los mĂşsculos se oxidan. Este proceso tiene lugar al realizar esfuerzos de mĂĄs de 3 minutos con una frecuencia cardiaca entre 150 y 170 pulsaciones / minuto
Este documento propone la creaciĂłn de un directorio de salud en lĂnea llamado GuateSalud.Com que permita a los proveedores de servicios mĂŠdicos en Guatemala crear pĂĄginas individuales para promover sus servicios. El directorio aprovecharĂa el creciente uso de Internet en Guatemala para conectar a los consumidores con informaciĂłn sobre mĂŠdicos, hospitales y medicinas. Los proveedores mĂŠdicos podrĂan obtener una pĂĄgina gratis a travĂŠs del patrocinio de laboratorios farmacĂŠuticos.
The effect of eight weeks resistance training on the fitness variables of uni...Sports Journal
Â
A total of thirty female (N=30) university level male Badminton players ranging between 18-28 years of
age were taken as subjects for the purpose of the study. The subjects were randomly selected and training
was conducted at ACS College, Jamner. The subjects were further divided into two groups i.e. Group -A
(N=15) as experimental group and Group-B (N=15) as control group. The following fitness variables
were selected for the purpose of the study: Flexibility test (sit and reach test), strength test (vertical jump
test), speed test (50m dash test), agility (shuttle run test), cardio-vascular fitness test (cooper 12 minute
run-walk test). To compare the mean difference between the data, t test was computed with the help of
SPSS Software and level of significance chosen was 0.05. Result shows that resistance training
(Experimental group) have significant effect on the fitness of university level male Badminton players.
The Quantum Internet: Hype or the Next StepJohn Ashmead
Â
What do we mean by the quantum internet? Why do we need more than just quantum computing? What are quantum cryptography, quantum key distribution, quantum sensors? How are these concepts entangled? What are the advantages of the quantum internet? key problems? Who will get to use it? And do we have just a bunch of interesting technologies that all have quantum in their name or can the whole be more than the sum of its parts?
How to build a PostgreSQL-backed website quicklyJohn Ashmead
Â
We will show how to get started building a PostgreSQL-backed website using Ruby-on-Rails. We will look at Model-View-Controller architecture; what tools you need to get started; how to work with the online tutorials; what kind of workflow to use; and which tasks to let Ruby-on-Rails handle versus which are better done by PostgreSQL.
The Quantum Internet: Hype or the Next StepJohn Ashmead
Â
What do we mean by the quantum internet? Why do we need more than just quantum computing? What are quantum cryptography, quantum key distribution, quantum sensors? How are these concepts entangled? What are the advantages of the quantum internet? key problems? Who will get to use it? And do we have just a bunch of interesting tech that all have quantum in their name or can the whole be more than the sum of its parts?
Ozâs Tik-Tok to the Mechanical Turk, from Neural Nets & Genetic Algorithms to Chess & StarCraft, from fighting the Coronavirus to flying Killer Drones, from Facial Recognition to Fakes, Deep Fakes, & Anti-Fakes, Artificial Intelligence (AI) is everywhere today. How did it start? What do we mean by AI? What are the basic AI techniques? How is it being used? What are the benefits? risks? and how should we manage AI going forwards?
Quantum cryptography uses principles of quantum mechanics to guarantee secure communication. It allows two parties to generate a shared random key that can be used to encrypt and decrypt messages. There are two main approaches - using polarized photons or entangled photons. Information reconciliation and privacy amplification protocols are used to ensure the keys between the two parties are identical and an eavesdropper gains no information. While traditional man-in-the-middle attacks are impossible, future work aims to increase transmission distances including to satellites. Several research groups and companies are conducting research on quantum cryptography.
This document provides an overview of quantum cryptography. It introduces key concepts like the Heisenberg uncertainty principle, photon polarization, and the need for quantum cryptography due to potential threats from quantum computers. The document describes how quantum key distribution works using protocols like BB84 to generate and test secure encryption keys between two parties by detecting any eavesdropping. It notes that working prototypes have been implemented over fiber optic cables and open air.
This document discusses quantum cryptography. It begins with an introduction to traditional cryptography and then defines quantum cryptography as exploiting quantum mechanical properties like the Heisenberg uncertainty principle and quantum entanglement for cryptographic tasks. It explains how quantum cryptography works by having Alice and Bob send polarized photons in randomly chosen bases and discarding mismatched bases to generate a secret key. It also covers applications like secure online voting and satellite communications, as well as limitations such as short maximum distances and inability to multiplex quantum channels.
Berlin Slides Dualities and Emergence of Space-Time and GravitySebastian De Haro
Â
Holographic relations between theories have become an important theme in quantum gravity research. These relations entail that a theory without gravity is equivalent to a gravitational theory with an extra spatial dimension. The idea of holography was first proposed in 1993 by ât Hooft on the basis of his studies of evaporating black holes. Soon afterwards the holographic AdS/CFT duality was introduced, which since has been intensively studied in the string theory community and beyond. Recently, Verlinde has proposed that Newtonâs law of gravitation can be related holographically to the âthermodynamics of informationâ on screens. I discuss the last two scenarios, with special attention to the status of the holographic relation in them and to the question of whether they make gravity and spacetime emergent. I conclude that only Verlindeâs scheme instantiates emergence in a clear and uncontroversial way. I suggest that a reinterpretation of AdS/CFT may create room for the emergence of spacetime and gravity there as well.
The document outlines the historical development, advantages, characteristics, and requirements of quantum dot lasers compared to quantum well lasers. It discusses how quantum dot lasers confine electrons through small size and tunable energy levels. While early models had bottlenecks like uniformity issues, breakthroughs in temperature stability and modulation have occurred. Future work aims to control dot positioning and size to reduce inhomogeneous broadening and allow injection of cooled carriers.
El documento presenta una lista de planes y programas para el curso 2013/2014 en un colegio, incluyendo el plan de salud y prevenciĂłn de riesgos laborales, el plan de igualdad, el plan de escuela TIC 2.0, el plan de lectura y bibliotecas, el plan de acompaĂąamiento, un programa de alimentaciĂłn saludable y un programa para aprender a sonreĂr. Cada plan o programa detalla el coordinador, los alumnos y profesores participantes.
This document provides an overview of the EE-353 Computer Networks course taught by Dr. Zawar Hussain Shah at NUST. The key points covered include:
- An introduction to computer networks and what will be covered over the course, including network protocols, applications, and design principles.
- The course objectives are to conceptually introduce computer networks and protocols like TCP/IP, understand the design of the Internet, network protocols, and core networking principles.
- The course contents, textbooks, grading policy, labs, and policies are outlined. Students will be graded based on quizzes, exams, assignments and a project.
- Contact details for the professor are provided for any questions.
The document outlines an action plan created by the West Midlands Combined Authority Mental Health Commission to improve mental health and wellbeing in the West Midlands region. Key organizations across the region have signed a concordat agreeing to work together to implement the actions in the plan, which were informed by research, evidence, and input from professionals, service users, and the public. The plan contains five themes of actions to address major issues like employment for those with mental health problems, housing, the criminal justice system, health services, and community involvement. The goal is for this plan to drive long-term, meaningful change in reducing the impact of mental illness in the region.
This document contains an excerpt from a test on revising HTML code. It provides directions for identifying tags, constructing code based on descriptions, and completing an HTML program to display an inspirational quote. The program asks students to fill in missing tags and attributes to display centered text with formatting like bold, italic, underline and strikethrough. It also provides the beginning and ending tags needed to create a valid HTML document.
La impresiĂłn Offset es un mĂŠtodo de reproducciĂłn de documentos e imĂĄgenes en papel u otros materiales mediante la aplicaciĂłn de tinta oleosa sobre una plancha metĂĄlica. La plancha transfiere la imagen o texto a una mantilla de caucho y luego al papel por presiĂłn. El grabado a punta seca es una tĂŠcnica similar al grabado al buril donde el artista dibuja directamente sobre una lĂĄmina de zinc o cobre usando una herramienta puntiaguda, generalmente de diamante, creando surcos con rebabas a uno o ambos lados depend
La resistencia aerĂłbica se obtiene a travĂŠs del metabolismo aerĂłbico, que realizan las cĂŠlulas musculares mediante combustiones, es decir, reacciones quĂmicas en presencia de oxĂgeno. Por estas reacciones las proteĂnas, las grasas y el glucĂłgeno almacenados en los mĂşsculos se oxidan. Este proceso tiene lugar al realizar esfuerzos de mĂĄs de 3 minutos con una frecuencia cardiaca entre 150 y 170 pulsaciones / minuto
Este documento propone la creaciĂłn de un directorio de salud en lĂnea llamado GuateSalud.Com que permita a los proveedores de servicios mĂŠdicos en Guatemala crear pĂĄginas individuales para promover sus servicios. El directorio aprovecharĂa el creciente uso de Internet en Guatemala para conectar a los consumidores con informaciĂłn sobre mĂŠdicos, hospitales y medicinas. Los proveedores mĂŠdicos podrĂan obtener una pĂĄgina gratis a travĂŠs del patrocinio de laboratorios farmacĂŠuticos.
The effect of eight weeks resistance training on the fitness variables of uni...Sports Journal
Â
A total of thirty female (N=30) university level male Badminton players ranging between 18-28 years of
age were taken as subjects for the purpose of the study. The subjects were randomly selected and training
was conducted at ACS College, Jamner. The subjects were further divided into two groups i.e. Group -A
(N=15) as experimental group and Group-B (N=15) as control group. The following fitness variables
were selected for the purpose of the study: Flexibility test (sit and reach test), strength test (vertical jump
test), speed test (50m dash test), agility (shuttle run test), cardio-vascular fitness test (cooper 12 minute
run-walk test). To compare the mean difference between the data, t test was computed with the help of
SPSS Software and level of significance chosen was 0.05. Result shows that resistance training
(Experimental group) have significant effect on the fitness of university level male Badminton players.
The Quantum Internet: Hype or the Next StepJohn Ashmead
Â
What do we mean by the quantum internet? Why do we need more than just quantum computing? What are quantum cryptography, quantum key distribution, quantum sensors? How are these concepts entangled? What are the advantages of the quantum internet? key problems? Who will get to use it? And do we have just a bunch of interesting technologies that all have quantum in their name or can the whole be more than the sum of its parts?
How to build a PostgreSQL-backed website quicklyJohn Ashmead
Â
We will show how to get started building a PostgreSQL-backed website using Ruby-on-Rails. We will look at Model-View-Controller architecture; what tools you need to get started; how to work with the online tutorials; what kind of workflow to use; and which tasks to let Ruby-on-Rails handle versus which are better done by PostgreSQL.
The Quantum Internet: Hype or the Next StepJohn Ashmead
Â
What do we mean by the quantum internet? Why do we need more than just quantum computing? What are quantum cryptography, quantum key distribution, quantum sensors? How are these concepts entangled? What are the advantages of the quantum internet? key problems? Who will get to use it? And do we have just a bunch of interesting tech that all have quantum in their name or can the whole be more than the sum of its parts?
Ozâs Tik-Tok to the Mechanical Turk, from Neural Nets & Genetic Algorithms to Chess & StarCraft, from fighting the Coronavirus to flying Killer Drones, from Facial Recognition to Fakes, Deep Fakes, & Anti-Fakes, Artificial Intelligence (AI) is everywhere today. How did it start? What do we mean by AI? What are the basic AI techniques? How is it being used? What are the benefits? risks? and how should we manage AI going forwards?
Time dispersion in time-of-arrival measurementsJohn Ashmead
Â
Can we prove that the Heisenberg uncertainty principle does not apply along the energy/time axis in the same way it applies along the space/momentum axis?
Talk given at the International Association for
Relativistic Dynamics
Time dispersion in quantum mechanics -- Philcon 2019 versionJohn Ashmead
Â
We know from quantum mechanics that space is fuzzy, that particles donât have a well-defined position in space. And we know from special relativity that time and space are interchangeable. But if they are interchangeable, shouldnât time be fuzzy as well? Shouldnât the rules of quantum mechanics apply â along the time dimension? Bohr and Einstein â who disagreed on so much â nevertheless agreed on this.
Is time fuzzy? In quantum mechanics space is fuzzy. And in special relativity time and space are interchangeable. But if time and space are interchangeable, shouldnt time be fuzzy as well? Shouldnt quantum mechanics apply -- to time? Thanks to recent technical advances we can put this to the test. We ask: How do you get a clock in a box? How do you interfere with time? When is one slit better than two? And what happens at the intersection of time and quantum mechanics?
Why do we want to go? How do we get there? How do we live there? What might we find? What are the dangers: radiation, low gravity, dust, our fellow humans? Is there life on Mars now? Was there once? and did our own evolution actually start on Mars?
Practical Telepathy: The Science & Engineering of Mind-ReadingJohn Ashmead
Â
The document discusses the history and future of telepathy and mind reading. It covers early concepts of mentalism and ESP, scientific studies by Rhine and modern brain imaging techniques like fMRI. The document also discusses emerging technologies that could enable two-way mind-to-mind communication through brain interfaces and issues around privacy and control of one's thoughts. It presents both opportunities like helping disabled people and risks of not fully understanding the complex human mind.
From Startup to Mature Company: PostgreSQL Tips and techniquesJohn Ashmead
Â
This talk is for people relatively new to PostgreSQL who are wondering:
How do I get going with PostgreSQL -- in a way that wonât create problems later on!
Weâll go over best practice in:
Table design
Indexing
PostgreSQL types
Stored procedures -- when & how to use, when not
Triggers
How to work with a web framework (i.e. Ruby-on-Rails): what works belongs in the framework, what should be done in the database
Error & exception management
Doing the right amount of planning
Why you might want to build the help system first, and use it to help build the rest.
Nistica has its ownership in Japan, engineering in New Jersey, & manufacturing in Vietnam so weâll take a special look at:
Handling different languages & character sets
Timestamps & time zones
How to sync data from one part of the world to another without letting data fall on the floor or creating infinite loopiness.
Nistica has gone from startup to world player in the manufacture of optical switches. It has run its manufacturing on PostgreSQL from the start, using PostgreSQL to drive every step from assembly to quality assurance & tracking all part data in the database.
Going from the ad hoc procedures appropriate for a startup to the disciplined approaches required by the world market has taught us a lot about how to get the best out of PostgreSQL.
Weâve learned a lot from the PostgreSQL community; now weâd like to share some of what weâve learned from our experience.
Practical Telepathy: The Science & Engineering of Mind-ReadingJohn Ashmead
Â
From van Vogt's Slan to Willis's Crosstalk, telepathy has been a staple of science fiction. But what are the real world chances of reading another person's mind? With MRI & PET scans we can see what images a person is thinking of, with brain implants we can help the blind to see, and -- the way the science is going -- we are only a half-step away from direct mind-to-mind communication. Nothing to worry about here!
What are StarGates? Why & wither wormholes? Dangers of sphaghettification. How to build a wormhole? Negative energy & vortices. At the edge of testable. Today, a bridge of birds, tomorrow the cell phone: nearly impossible today, but tomorrow?
Call them Stargates, Jumpgates, Fargates, Hypergates or just an invitation to every unwanted pest from the far reaches of the Galaxy to visit, they're absolutely necessary if we're to have the glorious Science Fiction action we desperately need. Could they actually be built? Modern physics may permit: how to glue black holes together to build a wormhole, how to avoid the dangers of spaghettification, radiation poisoning and paradox noise, and just what would it take to build one in practice.
Quantum dots (QD) are semiconductors made via several possible routes. John Ashmead discusses how they are made, their properties and their applications in research.
Call them Stargates, Jumpgates, Fargates, Hypertubes or just an invitation to every unwanted pest from the far reaches of the Galaxy to visit, they are absolutely necessary if we are to have the glorious Science Fiction action we desperately need. But could they actually be built? We look at what modern physics has to say: how to glue black holes together to build a wormhole, how to avoid the dangers of spaghettification, radiation poisoning, and paradox noise, and just what it would take to build one in practice.
The document discusses three stories that involve time travel: The Anubis Gates, about a steampunk time machine; 3 Days to Never, about a bicycle-based time machine and a girl transported through time; and Burning Gates of Anubis, a sequel to The Anubis Gates. It provides summaries of the time travel plots and devices in each story.
We look at the history of the multiverse, the big bang theory, the problem of fine-tuning, how it is solved by the anthropic principle, how the combination of eternal inflation & string theory might create many universes, and a bit of discussion as to the odds of the multiverse being true.
We review the double slit experiment, the "central mystery" of quantum mechanics as Feynman put it. We included a number of animations, including some from Larry Latham specially done for this presentation! Unfortunately the animations don't seem to post correctly to slideshare, alas.
How to convert from MySQL to PostgreSQL: discuss history of each, current status, when you might wish to convert, what might motivate you to convert, & how to do so. With references.
The document describes 7 stories from the author's career as a programmer. Each story highlights a different challenge solved through creative technical solutions: 1) Automating stored procedure generation. 2) Generating joins by reading metadata. 3) Mapping fonts to work around software limitations. 4) Creating an easy-to-use program for a coworker with disabilities. 5) Writing a file checking utility in a day. 6) Creating a color-coded report to identify issues across departments. 7) Monitoring remote switches and troubleshooting connection issues. The last story describes consolidating duplicate reports into a single automated report. The moral is to know the technology, business needs, and take time for creative thinking.
FREE A4 Cyber Security Awareness Posters-Social Engineering part 3Data Hops
Â
Free A4 downloadable and printable Cyber Security, Social Engineering Safety and security Training Posters . Promote security awareness in the home or workplace. Lock them Out From training providers datahops.com
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Â
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
Programming Foundation Models with DSPy - Meetup SlidesZilliz
Â
Prompting language models is hard, while programming language models is easy. In this talk, I will discuss the state-of-the-art framework DSPy for programming foundation models with its powerful optimizers and runtime constraint system.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
Â
An English đŹđ§ translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech đ¨đż version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
In the realm of cybersecurity, offensive security practices act as a critical shield. By simulating real-world attacks in a controlled environment, these techniques expose vulnerabilities before malicious actors can exploit them. This proactive approach allows manufacturers to identify and fix weaknesses, significantly enhancing system security.
This presentation delves into the development of a system designed to mimic Galileo's Open Service signal using software-defined radio (SDR) technology. We'll begin with a foundational overview of both Global Navigation Satellite Systems (GNSS) and the intricacies of digital signal processing.
The presentation culminates in a live demonstration. We'll showcase the manipulation of Galileo's Open Service pilot signal, simulating an attack on various software and hardware systems. This practical demonstration serves to highlight the potential consequences of unaddressed vulnerabilities, emphasizing the importance of offensive security practices in safeguarding critical infrastructure.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
âTemporal Event Neural Networks: A More Efficient Alternative to the Transfor...Edge AI and Vision Alliance
Â
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/temporal-event-neural-networks-a-more-efficient-alternative-to-the-transformer-a-presentation-from-brainchip/
Chris Jones, Director of Product Management at BrainChip , presents the âTemporal Event Neural Networks: A More Efficient Alternative to the Transformerâ tutorial at the May 2024 Embedded Vision Summit.
The expansion of AI services necessitates enhanced computational capabilities on edge devices. Temporal Event Neural Networks (TENNs), developed by BrainChip, represent a novel and highly efficient state-space network. TENNs demonstrate exceptional proficiency in handling multi-dimensional streaming data, facilitating advancements in object detection, action recognition, speech enhancement and language model/sequence generation. Through the utilization of polynomial-based continuous convolutions, TENNs streamline models, expedite training processes and significantly diminish memory requirements, achieving notable reductions of up to 50x in parameters and 5,000x in energy consumption compared to prevailing methodologies like transformers.
Integration with BrainChipâs Akida neuromorphic hardware IP further enhances TENNsâ capabilities, enabling the realization of highly capable, portable and passively cooled edge devices. This presentation delves into the technical innovations underlying TENNs, presents real-world benchmarks, and elucidates how this cutting-edge approach is positioned to revolutionize edge AI across diverse applications.
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyScyllaDB
Â
Freshworks creates AI-boosted business software that helps employees work more efficiently and effectively. Managing data across multiple RDBMS and NoSQL databases was already a challenge at their current scale. To prepare for 10X growth, they knew it was time to rethink their database strategy. Learn how they architected a solution that would simplify scaling while keeping costs under control.
How information systems are built or acquired puts information, which is what they should be about, in a secondary place. Our language adapted accordingly, and we no longer talk about information systems but applications. Applications evolved in a way to break data into diverse fragments, tightly coupled with applications and expensive to integrate. The result is technical debt, which is re-paid by taking even bigger "loans", resulting in an ever-increasing technical debt. Software engineering and procurement practices work in sync with market forces to maintain this trend. This talk demonstrates how natural this situation is. The question is: can something be done to reverse the trend?
Best 20 SEO Techniques To Improve Website Visibility In SERPPixlogix Infotech
Â
Boost your website's visibility with proven SEO techniques! Our latest blog dives into essential strategies to enhance your online presence, increase traffic, and rank higher on search engines. From keyword optimization to quality content creation, learn how to make your site stand out in the crowded digital landscape. Discover actionable tips and expert insights to elevate your SEO game.
âHow Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...Edge AI and Vision Alliance
Â
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/how-axelera-ai-uses-digital-compute-in-memory-to-deliver-fast-and-energy-efficient-computer-vision-a-presentation-from-axelera-ai/
Bram Verhoef, Head of Machine Learning at Axelera AI, presents the âHow Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-efficient Computer Visionâ tutorial at the May 2024 Embedded Vision Summit.
As artificial intelligence inference transitions from cloud environments to edge locations, computer vision applications achieve heightened responsiveness, reliability and privacy. This migration, however, introduces the challenge of operating within the stringent confines of resource constraints typical at the edge, including small form factors, low energy budgets and diminished memory and computational capacities. Axelera AI addresses these challenges through an innovative approach of performing digital computations within memory itself. This technique facilitates the realization of high-performance, energy-efficient and cost-effective computer vision capabilities at the thin and thick edge, extending the frontier of what is achievable with current technologies.
In this presentation, Verhoef unveils his companyâs pioneering chip technology and demonstrates its capacity to deliver exceptional frames-per-second performance across a range of standard computer vision networks typical of applications in security, surveillance and the industrial sector. This shows that advanced computer vision can be accessible and efficient, even at the very edge of our technological ecosystem.
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframePrecisely
Â
Inconsistent user experience and siloed data, high costs, and changing customer expectations â Citizens Bank was experiencing these challenges while it was attempting to deliver a superior digital banking experience for its clients. Its core banking applications run on the mainframe and Citizens was using legacy utilities to get the critical mainframe data to feed customer-facing channels, like call centers, web, and mobile. Ultimately, this led to higher operating costs (MIPS), delayed response times, and longer time to market.
Ever-changing customer expectations demand more modern digital experiences, and the bank needed to find a solution that could provide real-time data to its customer channels with low latency and operating costs. Join this session to learn how Citizens is leveraging Precisely to replicate mainframe data to its customer channels and deliver on their âmodern digital bankâ experiences.
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...Alex Pruden
Â
Folding is a recent technique for building efficient recursive SNARKs. Several elegant folding protocols have been proposed, such as Nova, Supernova, Hypernova, Protostar, and others. However, all of them rely on an additively homomorphic commitment scheme based on discrete log, and are therefore not post-quantum secure. In this work we present LatticeFold, the first lattice-based folding protocol based on the Module SIS problem. This folding protocol naturally leads to an efficient recursive lattice-based SNARK and an efficient PCD scheme. LatticeFold supports folding low-degree relations, such as R1CS, as well as high-degree relations, such as CCS. The key challenge is to construct a secure folding protocol that works with the Ajtai commitment scheme. The difficulty, is ensuring that extracted witnesses are low norm through many rounds of folding. We present a novel technique using the sumcheck protocol to ensure that extracted witnesses are always low norm no matter how many rounds of folding are used. Our evaluation of the final proof system suggests that it is as performant as Hypernova, while providing post-quantum security.
Paper Link: https://eprint.iacr.org/2024/257
2. QM-RAY
â˘âBehold the weirdâ
â˘The collapse of the collapse of the wave
function
â˘Existential quantum mechanics
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
3. âBehold the weirdâ
â˘Double slit experiment
â˘Uncertainty principle
â˘Checkpoint Copenhagen
â˘SchrĂśdingerâs Cat
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
4. Double slit
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
5. Uncertainty
principle
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
6. Copenhagen
interpretation
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
7. SchrĂśdinger's Cat
One can even set up quite ridiculous cases. A cat is penned up in a steel
chamber, along with the following diabolical device (which must be secured
against direct interference by the cat)âŚ
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
8. The collapse of the collapse
of the wave function
â˘Collapse real
â˘Hidden variables
â˘Multiverse
â˘Shut-up-and-calculate
â˘âThat which does not destroy youâŚâ
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
9. Objective collapse
â˘Wignerâs Calibrated Panel of Infants
â˘The all collapse all the time channel
â˘Penrose ďŹnds decoherence in a grain of
sand
â˘The case of the highly charged cat
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
10. Wignerâs
Panel of infants
1. Perception
counts as
consciousness.
2. Consciousness
induces
deviations from
laws of physics.
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
11. UniďŹed dynamics for microscopic &
macroscopic systems (1986)
- Ghirardi, Rimini, Weber
â˘Eliminate special role of observer
â˘Posit an interaction which is non-linear,
stochastic, & depends on surround
â˘Get a GRW collapse perhaps every 100
million years
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
12. The road to reality
⢠Tiny mirror in two
states at once
⢠With gravity involved,
this costs energy
⢠Forcing it to pick one of
the two states.
⢠And causing the beam
to lose coherence
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
13. Highly charged cat
Charge up your Let its wave function diffuse
cat
Observe your cat Accelerated charges
radiate
Tune
your
radio
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
14. Hidden variables
â˘Statistic
interpretation
â˘Einstein-
Podolsky-
Rosen: elements
of reality
â˘Bellâs theorem
â˘Bohmian
mechanics
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
15. Einstein podolsky rosen
You canât know both x-spin & z-spin at the
same time, & yet you can.
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
16. Bellâs Theorem
Measure along x, or
along z, or along
their bisector, but
only one
measurement (of
each spin) per
round
One poke per
measurement
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
17. Information Distance
Information distance Information distance
from A to B is the obeys the triangle
uncertainty left in B inequality
when A is known. d ( A,C ) ⤠d ( A, B ) + d ( B,C )
B
d ( A, B ) d ( B,C )
A C
d ( A,C )
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
18. Information ZigZag
1.0
θ left θ right
0.8
0°
0.6
0.4 .020
.0
0.2 10°
50 100 150 .020 .064
( ) ( )
d (θ ) = â lg cos 2 (θ 2 ) cos 2 (θ 2 ) â lg sin 2 (θ 2 ) sin 2 (θ 2 )
p ⥠cos 2 (θ 2 ) 20°
θ = 10° â p (θ ) â 99%, d â .020
θ = 20° â p (θ ) â 96%, d â .064
.064 > .020 + .020 Violates triangle inequality!!!
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
19. The right way to get
it wrong
Nick
Herbertâs
Faster-Than-
Light
Telegraph
June 2012,
ScientiďŹc
American
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
20. Bohmian Mechanics
⢠Well-deďŹned
particles
⢠Guided by a pilot
wave that obeys
SchrĂśdinger
equation
⢠Problems with
many particles,
high energies
⢠Popular, if weird
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
21. Multiverse
â˘Many worlds, many minds, many
words
â˘Quantum suicide/a plethora of
observers
â˘Splitting headaches
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
22. Universes Fork
Observers fork too
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
23. Experimental tests
⢠Quantum suicide
⢠Count of observers (many minds) has implications
⢠Leakage between universes
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
24. Splitting headaches
⢠Why this set of alternatives &
not that?
⢠When does split happen?
⢠How does split happen?
⢠Thatâs rather a lot of
"I am glad of all details," universes, isnât it?
remarked my friend,
"whether they seem to ⢠What counts as an observer?
you to be relevant or
not." ⢠Can different universes chat?
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
25. Shut-up-&-calculate
â˘Arguably most popular
â˘Let the pencil do the
thinking. Or
Mathematica.
â˘Pencils a bit short on
imagination sometimes.
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
26. âWhat we call
`realityâ consists of
an elaborate
papier-machĂŠ
construction of
imagination and
theory ďŹtted in
between a few iron
posts of
observation.â
- John A. Wheeler
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
27. Many Interpretations
⢠Deterministic
⢠Wave function real
⢠Hidden variables
⢠Collapse real
⢠Observer part of
interpretation
⢠Local/non-local
⢠Time symmetric
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
28. âThat which does not destroy you
makes you strongâ
⢠27+ rival
interpretations
â˘Critics such as
Wigner, Bell,
Einstein, âŚ
â˘300+ foundational
experiments
(Auletta)
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
29. Existential Quantum
mechanics
â˘The wave function needs no interpretation
â˘Decoherence
â˘Radical conservatism
â˘At the edge of the known
â˘A game of chess
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
30. Pusey, Barrett, &
Rudolph â˘The quantum state of
a system can be
inferred uniquely
from the physical
state
â˘Provided the
predictions of
quantum mechanics
are correct. (They
are.)
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
31. Decoherence
How does
classical
deďŹniteness
emerge
from the
quantum
sea?
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
32. Decoherence still
cohering
â˘Toy cases
â˘Bound states
â˘Quantum Zeno effect
â˘Stochastic resonance
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
33. Radical
conservatism
Be conservative by
sticking to well-
â˘Cat states
established physical â˘Long range entanglement
principles, but probe
them by exposing â˘Phonons
their most radical
conclusions. â˘Bose-Einstein condensates
- J. A. Wheeler
â˘Majorana fermions
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
34. At the edge of the
known
â˘Entropic gravity
â˘Origin of the
universe
â˘Dark ďŹow
â˘Whispering
gallery of the
multiverse
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
35. A game of chess
â˘Multiple
levels of
analysis
â˘Appropriate
mathematics
http://research.cs.queensu.ca/Parallel/
QuantumChess/QuantumChess.html
â˘Your move!
QM, Reality, & You - John Ashmead - May 27th, 2012 - Balticon http://timeandquantummechanics.com/?p=959
Editor's Notes
Request by Miriam: what is your next talk?\nA problem?\nNext day shipped off a wonderful title (you can see it here)\nNew problem. OK, we have the title, now what?\nAnswer here.\n\nStart with phenomenology\n
Collapse into the selected one\n\n\n
Cordelia Chase put it, behold the weird\n
And entanglement\n\nDefine wave function. For now, a mathematical object that tells us how a particle moves. Later, much discussion.\n
And quanta\n\nClassical physics has limits as well, but in quantum mechanics, like a glob of mercury\n\nEssential for atoms, no uncertainty no atoms\n\n10-8 seconds classically to get down to center\n
Copenhagen interpretation clearest in the Stern-Gerlach experiment: the poster child for the Copenhagen interpretation\n\nhttp://www.pci.uzh.ch/static/documents/Stern-Gerlach-Experiment.jpg\n
This is crazy\n\nKübler-Ross five stages of grieving:\nDenial\nAnger - objections in our case\nBargaining\nResignation - shut up & calculate\nAcceptance\n
\n
\n
“there are only two avenues through which experimentation can proceed to obtain information about [1]: observation of infants where we may be able to sense the progress of the awakening of consciousness, and by discovering phenomena postulated by [2], in which the consciousness modifies the usual laws of physics.\n\nVery scientific. Hard to get naive babies however\n\nhttp://jwsokol.com/scc/wp-content/uploads/2011/07/holden-andrew-portrait-of-a-surprised-baby.jpg\n\n\n\n
Good example of scientific method\n\nEliminates special role since it uses a potential that does all the dirty work\n\nNon-linear, stochastic, & depends on surround actually sounds a lot like decoherence, below.\n\nA bit of a long shot.\n\nMore interesting for the principle. Did kick off a lot of variations! Dickson wrote a book on the whole class of such theories.\n\nNever seen\n\n\n
Tiny mirror should lose coherence from gravity, if weight of grain of dust.\n\nFirst - hard part - calibrate your system. Normal Mach-Zehnder interferometer would see effects of phase. Instead, set up two cavities so that the photon oscillates for a long period of time, perhaps a second, between the two sides, thus never getting to the detector.\n\nIf the mirror is decohered by gravity, then the photon will be detected.\n\nShows up in Verlinde’s entropic gravity\n
Get cat, turn into picture\n\nhttp://scrappinoutloud.blogspot.com/2009/08/black-cat-svg-just-in-time-for.html\n\nhttp://www.halloweenclipart.com/halloween_clipart_images/angry_scared_black_cat_hissing_with_its_back_arched_0071-0810-2316-0831.html\n\nhttp://2e6vizille.wikispaces.com/file/view/1197122845337673748paulshannon_Old_Timey_Radio.svg.med.png/112448403/1197122845337673748paulshannon_Old_Timey_Radio.svg.med.png\n
Picture appropriate to hidden variables, tunneling under the castle\n\nQuantum mechanical statistics a problem for hidden variables\n\n
Bohr’s response; you are only allowed to speak of what you can measure. Feynman: you are only required to speak of what you can measure.\n\n
\n
If you know that when sock A is red, sock B is green 99% of the time, and when sock B is green sock C is blue 99% of the time, then when sock A is red, sock C has to be blue 98% of the time.\n\nInformation distance is a more format, precise way to characterize this.\n
\n
\n
Nice pictures\n\nSee also consistent histories\n
\n
Benefits:\nNo collapse\nObserver included\n
Experimental tests:\n\nQuantum suicide: control the gun via a radioactive decay. But keep the decay from happening using the quantum zeno effect. Now the decay doesn’t happen so the gun doesn’t go off.\n\nAlternative, have a plethora of observers, in MWI in some versions, \n
Quantum suicide\n\nRivers, neurons, branches of timelines\n\nIf the statistics depend on the \n
Pencils & thinking, einstein; sometimes the pencil thinks for me!\n\nModel testing\n\nDefeatist/resignation\n\nAnd keeps you from pushing the boundaries\n
Hidden variables\n\nQuantum mechanics wave functions complete, or so it seems. Statistics alone would indicate this. \n\nhttp://www.forizslaszlo.com/tudomany/wheeler_law_without_law.html \n
\n
Conan quoting Nietzsche, in an unexpected burst of erudition. And time travel. Also, basis of a currently popular song, Stronger.\n\n\n
\n
Last week in nature physics\n\nPrepare two quantum states so cleverly that they will cancel when they intersect. Canceling not something that comes naturally to hidden variable theories. The precise nature of the cancellations lets us infer the original quantum states. Therefore they are real.\n
Venus & the half shell\n\nBack to the crime scene\n\nHow to get some numbers out\n\nhttp://www.armee.gc.ca/35rgc/images/sape.jpg\n\n
A set of harmonic oscillators in a heat bath\n\n
\n
Entropic Gravity - & the collapse?\nOrigin of the universe\nWhispering gallery of the multiverse\n
Quantum mechanics interesting & important, rich source of metaphors. Our successes in understanding it very encouraging, ability to transcend own limitations, even if sometimes we have to let the pencil do the thinking!\n\nBut the stuff we care about exists at a level of abstraction well above that of the quantum. Problems of free will & determinism not a function of classical/quantum: both are deterministic in their own way, but both are incalculable.\n\n\n