Bugs
It is a known bug with the programming language. :) #GeekyJokes #ProgrammerHumor
It is a known bug with the programming language. :) #GeekyJokes #ProgrammerHumor
Containers are all the rage right now and rightfully so - not only do they help abstract away some of the complexity and dependencies of your apps and solutions, they also make managing of environments, and, deployments much simpler. And the fact that you can do it in a consistent, and repeatable fashion is just icing on the cake. As a simple example, with Docker, on Windows (as in my case), I can run a dockerized app, on a different OS than the host, which can also be interactive. ...
I am writing this on a Microsoft Surface Book, running Ubuntu natively, and there isn’t any Windows option - I blew away, the Windows partition, and there isn’t any other OS on it. Why some of you might think? Well, why not. :) For me the motive is two fold: one am a geek and love to hack what works and cannot work - how else will one learn? And two, explore and see which AI frameworks, tools, and runtimes works better on Linux natively ...
The naming is unfortunate when talking about #AI. There isn’t anything about intelligence - not as we humans know of it. If we can rewind back to the 50’s we can perhaps rename it to something like Computational Intelligence, which is more accurate. And although I have outlined the difference between some of the elements of AI in the past, I wanted to get back to what the intent was and how this area started. ...
So, both these arguments make sense. I can’t decide which one is accurate. Your browser does not support the audio element.
This has been a long time coming - our patent filed a about 4 years ago was finally awarded today by the USPTO. Some details below. United States Patent 10,102,774 Bahree , et al. October 16, 2018 Systems and methods for organizing and presenting skill progression In any organization, the skills collectively possessed by individuals of the organization can determine the capabilities of the organization as a whole. Previously, there was no centralized method or system for managing skills which are complex and wide-ranging. There was also no effective way for individuals to review skills they possess and to discover other skills which they can cross-train and leverage—either to enhance their existing roles and responsibilities, or possibly change skills and get involved with another area and thereby grow their career. The limited visualizations of skill sets offered to the individuals were static and non-interactive, which is not ideal. ...
#MVP you ask? #EnoughSaid
Sometime back, I noticed the car downloaded a large file (5.1 GB) which was a .ssq file. I hadn’t heard of a ssq file, and was curious on what this was. I researched a little and as it turns out, a .ssq file is a compressed file system which is often used in an embedded Linux system, where storage size might be a area of concern. This file-system is called SquashFS, and is usually used on a read-only mode. ...
Something seems to be up, with the car tickling an endpoint for connectivity perhaps? Its only 663 bytes up and 222 bytes down. This is still on v8.1 (36.2) Spotify traffic from Tesla
In case you haven’t been following the news, Tesla is in the process of releasing the new firmware beta. I think many folks online are super interested in new autopilot upgrades. I reverse engineered the associated app and there are certainly a few new end points exposed, as outlined below. Need time to now figure out more details on this and what they entail. Also need time to see what changes in the existing code and json (data structure). ...
Never trust an atom, they make up everything. 🤓 #GeekyJokes
Regularization is a fundamental concept in Machine Learning (#ML) and is generally used with activation functions . It is the key technique that help with overfitting. Overfitting is when an algorithm or model ‘fits’ the training data too well - it seems to good to be true. Essentially overfitting is when a model being trained, learns the noise in the data instead of ignoring it. If we allow overfitting, then the network only uses (or is more heavily influenced) by a subset of the input (the larger peaks), and doesn’t factor in all the input. ...
Wait. I have how many tabs open? I can’t count more than fingers I have, so not sure if this is accurate. Maybe time to reboot. 😄 PS – Yes, I can count using more than 10 (toes, remember?)
Some time ago, I talked about my Tesla Model 3 “keyfob” which essentially uses a Amazon IoT button to call some of Tesla API’s and “talk” to the car. This for me, is cool as it allows my daughter to unlock, and lock the car at home. And of course it is a bit geeky, and allowing one to play with more things. :) ...
Tonight, I was a large download by the car, and saw that it was a .ssq file. The file name is consistent with the firmware naming convention, but I am not sure on what it is. The file itself is 5.11 GB, and in my case its name starts with “NA”. I am guessing, this might be the maps its updating. Below are a couple of screenshots showing this. I am trying to make sense of the binary file, but not making much headway. ...
Neural Networks, today, help in a great set of tasks, that until very recently wasn’t possible at all - be it from computer vision, to medical diagnosis, to speech translation and forms a key cornerstone to a lot of ‘magic’ that Machine Learning and AI offers today. I did blog about Neural Network types (and MarI/O) sometime back ; I surely cannot take credit for creating these three cheat sheets but they are awesome and hope you get to use and enjoy them too. ...
My command prompt history is quite long, and a lot over time is not essentially garbage. I was looking at a way to clean it out. Most of the solutions online I found were not correct - I don’t know if things changed over time, but the latest version of Windows I am on (Windows 10 Pro 1803), it did not work. So, here are two ways that you can do this. One is using the registry editor (RegEdit), and the other is running a simple script that you can either copy and paste from below or you can download and run it . ...
I don’t know how to get to debug / dev mode on a Tesla, but did come across this old post , on how someone was in a test drive, which did have this mode. Now this is quite old, so a lot has changed, but am impressed that a lot of the components and foundational architecture was setup. I am particularly impressed how each cell in the battery pack and report its state. The BMS that you see is the Battery Management System - that firmware is separate from the car’s firmware. ...
Beware of programmers that carry screwdrivers - Unknown
As I was trying to understand more on the capabilities of the car, and what options I can do. The voice recognition on the car is quite impressive, it does seem as good at understanding as Amazon’s Echo, at least in the early days of “Alexa” (but that is a different story for another time). I was trying to understand what things can I control, or the options one has via the voice. I am still not used to it, and keep forgetting, that is a option especially when driving. As of the v8 firmware series, the following are the choices that work for voice. Credit to Ingineer for discovering the full list when hacking the car. ...
Often once hears are Lines of Code (LoC) as a metric. And for you to get a sense of what it means, below is a info-graphic that outlines some popular products, and services and the LoC that takes. Always interesting to get perspective - either appreciate some home grown system you are managing, or worried about a stinking pile you are going to inherit or build. 😄
UPDATE: This cURL script doesn’t work anymore. This was originally published back in 2018 when it was the best way to do this. Over the last few years however Tesla has deprecated this endpoint (/oauth/token) and moved to a SSO service (auth.tesla.com) which is a completely different approach. I’ll have a look and if there is a simple way to do it, then will share it here. I did write a simple Windows (desktop) app called TeslaTokenGenerator, for those who wanted to create authentication tokens for their Tesla, and use with 3rd party apps/data loggers. ...
Inspired by a few folks on a few forums online , I took the liberty to extend their idea using a IoT Button, that acts as a simple “keyfob” for the Model 3. The main goal was being to allow my daughter to lock and unlock the car at home. She is too young to have a phone, and without a more traditional fob, this gets a little annoying. ...
If you have a Tesla, and are using (or wanting to use) 3rd party tools or data loggers, the one think they of course need is to authenticate your details with Tesla. A simple, but insecure way is to use your Tesla credentials - and surprisingly many people just happily share and use this. I wasn’t comfortable doing this - after-all, they have access to your account where you can control a lot of things. Also, there are a few online tools that can generate the auth token, but again I wasn’t comfortable, as I did not know what they saved, or what they did not. :) ...
Thought of the week: Artificial Intelligence stands no chance against natural Stupidity. #ArtificalIntelligence