so techniques that we know don’t work for other kinds of software – like trying to deduce everything by armchair thought, verify after-the-fact the correctness of an arbitrarily inscrutable blob, or create the end product by throwing lots of computing power at a brute force search procedure
I am not sure what you mean when you say these techniques “don’t work”. They all seem to be techniques that sometimes produce something, given sufficient resources. They all seem like techniques that have produced something. Researchers have unpicked and understood all sorts of hacker written malware. The first computer program was written entirely by armchair thought, and programming in pencil and paper continues in some tech company interviews today. Brute force search can produce all sorts of things.
In conventional programming, a technique that takes 2x as much programmer time is really bad.
In ASI programming, a technique that takes 2x as much programmer time and has 1⁄2 the chance of destroying the world is pretty good.
I am not sure what you mean when you say these techniques “don’t work”. They all seem to be techniques that sometimes produce something, given sufficient resources. They all seem like techniques that have produced something. Researchers have unpicked and understood all sorts of hacker written malware. The first computer program was written entirely by armchair thought, and programming in pencil and paper continues in some tech company interviews today. Brute force search can produce all sorts of things.
In conventional programming, a technique that takes 2x as much programmer time is really bad.
In ASI programming, a technique that takes 2x as much programmer time and has 1⁄2 the chance of destroying the world is pretty good.