Three stacked blue boxes with binary digits on them
Bit flipping laboratory & Personal website
No sneaky cookies haunt these pages, but whether someone tracks you I do not know. Information flows through many channels, and every action leaves a trace.

My multimedia mingle!

James Gleick ends his book The Information noting that information is valuable when scarce and difficult to access; but when information becomes abundant, then attention is valuable. In an endless sea of information no human could consume in many lifetimes, the information behind these links captured my attention for a while.

Speaker
2025-08-20
Luddite today means someone who avoids technology, but the term originated during the Industrial Revolution, when cropping machines threatened the livelihood of certain textile workers. The workers formed gangs, broke into mills, and destroyed the machines intended to replace them. Some mill owners fought back. Violence, death, and resentment ensued. Some inventions create jobs, and some inventions destroy jobs.
Television
2025-08-13
Researchers discovered how to create green and red LEDs fairly quickly, but blue LEDs eluded them. Industry understood the potential for digital displays with LEDs of all three primary colors, and funded blue LED efforts well. Shuji Nakamura worked for a small struggling company called Nichia. He convinced his company to let him try to develop a blue LED, and continued long after leadership demanded he stop. His company rewarded him little, but he changed the world.
Document
2025-08-07
Network analyses involving randomness tend to scale poorly because the probability distributions the analyses produce grow quickly. McNetKAT derives from ProbNetKAT and trades some capability for better scalability. It models programs as Markov chains. The probabilistic choice operator is a like a conditional, but the guard is a random variable. A space of equivalence classes of states substitutes for the actual state space to keep it smaller.
Document
2025-08-06
Signaling channels are low-bandwidth, covert, publicly addressible, multi-hop channels. Applications at the endpoints are privy and modified; intermediate nodes are not. Raceboat is a modular framework for routing application traffic through signaling channels. It can mix-and-match unidirectional signaling channels, and supports sockets. It has composable abstractions for message encoding / decoding, interaction with external services that facilitate data transfer, message bundling, and scheduling strategies.
Document
2025-08-05
Choreographic languages can support out-of-order execution without risking communication integrity violations when the processes do not depend on each other. Ozone attaches integrity keys to messages to denote what code the message originated from. Integrity keys replace selection, the sharing of a conditional guard. They allow out-of-order message receipt. They contain dynamic tokens to disambiguate message origin when procedure calls or concurrent processes are involved.
Document
2025-07-29
Bitcoin is a protocol for the exchange of virtual currency without centralized control. Peer nodes have copies of a public ledger called the blockchain. Cryptographic hash pointers make it tamper-proof. Market participants authorize transactions with Digital signatures. Miners extend the blockchain with pending transactions, and Bitcoin rewards them. A requirement to include computationally expensive solutions to puzzles in new blocks sets the cadence of growth.
Document
2025-05-21
AlphaEvolve integrates large language models and evolutionary computation to improve or create algorithms. The prompt sampler provides context about past trials and ideas to the LLM ensemble. The LLM ensemble provides proposed improved algorithms to the evaluator pool. The evaluator pool provides algorithms with quality scores to the program database. The program database provides algorithms to the prompt sampler for improvement or inspiration.
Document
2024-04-17
Players with private data use secret shares and mathematical sorcery to perform arbitrary computations on their data without revealing anything about it beyond what the output of the computation itself reveals: not to each other, and not to any third party. Techniques differ in properties including which finite fields they work in, how many players they support, their efficiency, and against what kinds of adversaries they are secure.
Document
2025-03-25
Algorithm analysis models running time with mathematical expressions. It compares performance ignoring coefficients and constant terms. Greedy algorithms, divide and conquer, and dynamic programming sometimes outperform brute force searches. Does an algorithm exist to solve a problem in polynomial time? If not, can one verify a solution in polynomial time? Reduction techniques compare problems by relative difficulty, even without knowing the performance of the best algorithms.
Speaker
2025-03-17
Human intelligence relies heavily on memorization, interpolation, and reasoning. Large language models can memorize and interpolate, but the ARC benchmark persuasively demonstrates with its easily solvable tasks that they cannot reason in a meaningful way. Program synthesis and discrete program search may complement large language models to cover the deficit. There is a sense in which carefully guarded industry secrets do not count as progress in AI research.
Television
2025-03-12
Aliens have always come to people in dreams, secretly bestowing upon them humanity's greatest ideas. But when Chloe does nothing, the aliens decide to communicate with her more directly. Despite doubt, ambivalence, and life struggles, Chloe agrees to make it happen at the last possible moment. She hopes to find purpose, self respect, and approval from the people in her life. But sometimes ideas turn out to be just okay.
Document
2025-03-11
Performal models systems as networks with nodes augmented by timestamps. It requires empirical latency measurements within nodes, and uses symbolic latency abstraction to model latency across nodes to produce a "formal" upper bound. How do you empirically measure latency? Do you artificially truncate the latency probability distribution domains to achieve an upper bound? Can you also model bandwidth to calculate total operation time?
Document
2025-03-10
Program control structure, termination, timing, observable data distribution, resource exhaustion, and power consumption can all leak information. Security label types enforce information flow policies. Confidentiality prevents flow to inappropriate destinations; dually, integrity prevents flow from inappropriate sources. Label creep occurs when the security labels of data monotonically increase during execution.
Television
2025-02-25
Three blue extraterrestrials teleport human artifacts into their spaceship from a debris field. They engage in inscrutable animated banter, squabble, and amuse themselves by playing with the artifacts. Fragments of the demolished planet Earth drift past the spaceship window. A lighthearted fifteen minutes of fun and indifference at the end of all human conflict, hope, despair, love, and life.
Document
2025-02-22
Choreographies describe interactions between processes in distributed systems. Inference rules can translate a choreography into the many possible traces (message passing sequences) that arise from concurrency. Choreographic programming language constructs avoid starvation and promote compliance and conformance. Through endpoint projection they produce independent executable build artifacts per process.
Document
2025-02-11
Differential privacy usually balances the utility of a dataset with the privacy of the individuals in it. In the secure messaging system Vuvuzela, differential privacy balances the privacy of the users with the efficiency of the system in terms of compute, latency, and network traffic. The percent confidence a powerful adversary can gain over many rounds that Alice and Bob ever communicated translates nicely into the privacy parameter ε.

Steven Baldasty
Proud father, Barefoot runner, Chocolate enthusiast, Seasoned software engineer, Starry eyed PhD student, Novice human
Handsome brown haired man with glasses