Dupe.
Nobody is using MMF these days even for local runs. As to sfp, check https://fs.com and pick a matching pair that is cheapest. These days it makes sense to use 10G or 25G rather than 1G. Some people run 100G for their homelab, but even used it's pricy and noisy.
IBM does 60 deg C watercooling which can be not a lot of thermal delta in nonarctic environments. It's a lot of km of infrastructure to vent directly if you want to dissipate a nuclear reactor's worth of power in a single site.
A free running cellular automaton (CA) approach in hardware would work, but each cell would be a much souped up SRAM cell, the interactions would be all local and 2D. Considering Cerebras is 40 G SRAM on the 300 mm WSI and is about at the cooling limit I'm afraid you do not have 5 orders of magnitude. Perhaps reversible spintronics can help with the power draw, but you still have to splat a higher dimensional network so not just local interactions into a 2D array.
Notice you have to cool both in the power plant and the DC. And these DCs run up to a GW or more.
Global Financial Crisis 2 is definitely a fast component in the overall collapse process. Unaccounted consumer debt is a useful facet of a diagnostic. We don't know where exactly the spark will originate that will blow up GFC2. It could as well start there, though it's not very probable.
You seem to not be using open source software packaged for multiple architectures or which can be built for your binary target. Most people will be just using a browser and an office suite.
No, that captures just the neuroanatomy. Not the properties like density of ion channels, type, value of the synapse and all the things we don't know yet.
You seem to trust Nvidia. I don't.
I would look into thin clients and Lenovo etc. tiny PC for office on eBay. I run old low power low noise rackmount Supermicros which are nice but hard to find at low prices.
Nicely put. I fully agree with this description.
The provider and national TLAs will see all traffic that is in cleartext and meta traffic which is even more valuable. It can also actively tamper with that traffic. So you're technically incorrect and you assume your threat model is universal. It's not. And, of course, there are use cases for Tor, whether with or without VPN.