Traditionally they were done in FORTRAN or C or maybe bespoke DSP code, usually using ordinary boring complex numbers. Sometimes you’ll see FFTs over rings, called “number theoretic transforms”, used to multiply very large integers.
I suppose these days FFTs are used for highly power optimized, very much real-time OFDM transceivers. I’m guessing they’re done in carefully written assembly, possibly automatically generated (by conventional code, not LLMs, at least for existing solutions), possibly with a little bit of hardware help.
It's so trivial to seed. LLMs are basically the idiots that have fallen for all the SEO slop on Google. Did some travel planning earlier and it was telling me all about extra insurances I need and why my normal insurance doesn't cover X or Y (it does of course).
Do you buy oil or products made with it? Then sorry, you made a bet, and in fact you were just ripped off by your own government for the third time in a row.
I don't know anything about tokens. Anthropic says Pro has "more usage*", Max has 5x or 20x "more usage*" than Pro. The link to "usage limits" says "determines how many messages you can send". Clearly no one is getting billed for tokens.
But there is no good reason you can't do that already. Hardware engineers have just been fundamentally unserious about computer use going on 20 years. The PCB design you could do in 2000 already, but now it's still PDF datasheets, people drawing footprints and connecting RX lines to RX lines.
I gotta give the hardware team credit for programmable pins on μc though. It means you just need to bring the pins out to pads and do whatever, instead of each pin has a fixed function so pin 14 MUST go to the next thing. (Within reason; vcc and gnd can't move).
I think we are about a month away from a class action lawsuit, at their revenue they are a juicy target. And god knows they got the entirely self inflicted unholy combination going on, marketing & sales that borders on fraud (X times the usage of plan Y which has Z times of free tier which has unknowable "magic tokens") and then of course the actual fraud, reducing usage in fifteen different non obvious non public ways.
reply