I align with Yann LeCun’s camp on this matter. I don’t believe that LLMs and machine learning alone will lead us to human-level intelligence. Current models have demonstrated only very limited reasoning capabilities within specific domains—essentially following and recombining similar patterns they’ve ingested during training. If you follow computer scientist and AI researcher Subbarao Kambhampati, a professor at the School of Computing and Augmented Intelligence at ASU, he proposes a...| Posts on Victor's Blog
Take a look at this search of jobs postings at OpenAI for December 25th, 2024. As of the time of this writing, over 150 results in all, 87 results for the term “Software Engineer.” This is a few days after the release of their latest frontier model, o3. This tells me that for the foreseeable future, Software Engineering jobs are safe, if not going to continue to be safe from full automation.| Posts on Victor's Blog
As a computer science student, it’s essential to have a solid foundation in various topics to succeed in the field. In this post, we’ll cover the most critical topics for a computer science undergrad, in no particular order. Maths Calculus Calculus is a fundamental subject that helps understand many computer science concepts, such as optimization, machine learning, and differential equations. It’s essential to have a good grasp of limits, derivatives, basic integrals, and multi-variable...| Posts on Victor's Blog
You read the title, you’re probably thinking “that sounds like it’ll be a crappy idea” or “that sounds exactly like what I want!” For the first person, I hope to convince you that a computer science degree need not take 4 years nor be expensive. For the second, I hope to give you a roadmap to earn an accredited CS degree. But, before I start I want to preface this by saying that I am not advocating you go out to a degree mill and just buy a Diploma from a fake school, I’ll only ...| Posts on Victor's Blog
Back on May 31st, 2024, right as I submitted my last assignment for my capstone course, my last class on my BSCS at WGU, I applied for Georgia Tech’s OMSCS program. In August, days before my graduation ceremony, I heard back that I got accepted into the Spring 2025 cohort of Georgia Tech’s Online Masters of Science in Computer Science and this week I just got my gatech.edu email address.| Posts on Victor's Blog
Over the past four plus months, upon writing this on June 24, 2024 at 3:05 am AST, I had been working on my finishing my Bachelor of Science, Computer Science from Western Governors University. I am proud to say that I am now a proud graduate of WGU and will be attending commencement in September; I already bought the airline tickets plus the cap and gown. In this post I will outline my experience going through the curriculum at WGU, how many credits I transferred from where, and total up how...| Posts on Victor's Blog
Defensive Commits are a strategy for pushing commit to upstream repos that runs part of the ci/cd pipeline locally using git hooks. It fails the hook fails. This allows you to catch integration errors and get feedback quickly. This strategy works best with trunk-based development and ci/cd teams, because it helps avoid breaking the build and reduces dumb mistakes from even being pushed up to main. At Coqui Health, we’ve implemented this strategy successfully and this is now the default way ...| Posts on Victor's Blog
It’s been a long time since I last made a post. More than a year, actually. Since then, I’ve been really busy finding new work, finishing school, and getting my life in order. I want to get back into blogging and I’ve been so full of ideas. Recently I’ve been thinking a lot about finance, economics, and of course programming. I want to share my findings with you in hopes that this will help someone. So with that declaration out of the way, let’s get back to it!| Posts on Victor's Blog
Recently I’ve been thinking a lot about how to apply some DDD principles in Go in idiomatic and simple ways, and I’ve come accross a few patterns I’d like to share. Mainly we’ll be talking about how to apply the concept of Value Objects in Go in two ways. These are examples of how I apply them in my projects and actually use them so these are not just toy examples.| Posts on Victor's Blog
A new threat to your freedom of speech and privacy has appeared. Senators Lindsey Graham (R-SC) and Richard Blumenthal (D-CT) have joined in introducing the EARN IT Act (S. 3398) bill in Congress. This act’s intention is hidden behind the guise of protecting children, but in reality seeks to potentially undermine the end-to-end encryption and security that exists for almost all internet communications, especially social messaging platforms like WhatsApp and other U.S. based messaging platfo...| Posts on Victor's Blog
Stop using frameworks for everything. Just stop. You don’t need a framework to write good code and deliver products. Don’t get me wrong, frameworks are useful, but they are all-consuming and hide the application. So if you shouldn’t depend on frameworks what should you do instead? Clean architecture. More specifically, there are some patterns you can follow to better architect your application and think about the structure of your application and remove the need for frameworks to expres...| Posts on Victor's Blog
I’ve recently gone into doing CQRS with event sourcing along with DDD (Domain Driven Design) principles. I’ve been doing it in Go and want to share how I do it. To begin with, I’ve researched this topic thoroughly; I’ve probably watched and re-watched hundreds of videos and read many posts, articles, and books on it. I am by no means a cqrs/es expert, but I have gained some insight into how to do it. The first thing I want to put out there is that you don’t need a framework to do th...| Posts on Victor's Blog
I’ve been working my first large software project for almost a year now and I’d like to share my learnings from this project. The things I’ve learned, discovered, and realized during this time might be interesting to some, might be old news to others, and might even shed some light on how certain things are done in certain types of projects, but all in all I hope this proves to be an interesting read.| Posts on Victor's Blog
This post was inspired by a talk given by Jared Haight from Microsoft at BSidesPR. Jared talked about giving back to the InfoSec community at a large, and he mentioned things to write about, including Blockchain. Specifically, he asked “WTF is Blockchain?” and said it that if you actually title it like that, he’d read it. So, this is my attempt at writing that description. TLDR: Blockchain is an unchangeable series of blocks that each reference the previous’ block’s contents via a h...| Posts on Victor's Blog
I know I haven’t posted in a long time, but I finally felt I needed an update in my blog. I’ve recently updated some work on my own Go library for EventStore called goro. I made this for my own personal work and my job at ALQMY. I used to use Go.GetEventStore as my prefered library for working with EventStore. It was nice, but I felt it was lacking in many features and was ultimitely very cumbersome to work with, especially when it comes to reading events in a streaming fashion. I modeled...| Posts on Victor's Blog
So Amazon recently announced a new program called Amazon Key. This program would let deliverymen enter the house of people who have purchased the program. I’m really uncomfortable with this idea. For one thing, I don’t want Amazon, much less any other giant company, controlling entrance to my home. Second, this just feels like a whole new invasion of privacy. This is just part of a much bigger problem. Silicon Valley companies are becoming so arrogant and negligent, and they’re giving m...| Posts on Victor's Blog
I’m hosting this blog using Github pages (because I’m cheap.) You can browser through the source code here. I’m using Hugo to generate the static site. Overall it’s pretty great.| Posts on Victor's Blog
Recently Apple published a paper on LRMs (Large Reasoning Models) and how they found that “that LRMs have limitations in exact computation” and that “they fail to use explicit algorithms and reason inconsistently across puzzles.” I would consider this a death blow paper to the current push for using LLMs and LRMs as the basis for AGI. Subbaro Kambhampati and Yann LeCun seem to agree. You could say that the paper knocked out LLMs. More recently, a comment paper showed up on Arxiv and s...| victoramartinez.com