Skip to content
Longterm Wiki

Compute Monitoring

monitoringapproachPath: /knowledge-base/responses/monitoring/
E464Entity ID (EID)
← Back to page12 backlinksQuality: 69Updated: 2025-12-28
Page Recorddatabase.json — merged from MDX frontmatter + Entity YAML + computed metrics at build time
{
  "id": "monitoring",
  "wikiId": "E464",
  "path": "/knowledge-base/responses/monitoring/",
  "filePath": "knowledge-base/responses/monitoring.mdx",
  "title": "Compute Monitoring",
  "quality": 69,
  "readerImportance": 63,
  "researchImportance": 49,
  "tacticalValue": null,
  "contentFormat": "article",
  "causalLevel": null,
  "lastUpdated": "2025-12-28",
  "dateCreated": "2026-02-15",
  "summary": "Analyzes two compute monitoring approaches: cloud KYC (implementable in 1-2 years, covers ~60% of frontier training via AWS/Azure/Google) and hardware governance (3-5 year timeline). Cloud KYC targets 10^26 FLOP threshold (~\\$10-100M training cost), but on-premise compute and jurisdictional arbitrage enable evasion; hardware-level monitoring could address this but faces substantial technical challenges.",
  "description": "This framework analyzes compute monitoring approaches for AI governance, finding that cloud KYC (targeting 10^26 FLOP threshold) is implementable now via the three major providers controlling 60%+.",
  "ratings": {
    "novelty": 4.5,
    "rigor": 6.5,
    "completeness": 7.5,
    "actionability": 7
  },
  "category": "responses",
  "subcategory": "compute-governance",
  "clusters": [
    "ai-safety",
    "governance"
  ],
  "metrics": {
    "wordCount": 4437,
    "tableCount": 7,
    "diagramCount": 1,
    "internalLinks": 30,
    "externalLinks": 0,
    "footnoteCount": 0,
    "bulletRatio": 0.07,
    "sectionCount": 12,
    "hasOverview": true,
    "structuralScore": 10
  },
  "suggestedQuality": 67,
  "updateFrequency": 21,
  "evergreen": true,
  "wordCount": 4437,
  "unconvertedLinks": [],
  "unconvertedLinkCount": 0,
  "convertedLinkCount": 24,
  "backlinkCount": 12,
  "hallucinationRisk": {
    "level": "medium",
    "score": 50,
    "factors": [
      "no-citations",
      "few-external-sources",
      "conceptual-content"
    ]
  },
  "entityType": "approach",
  "redundancy": {
    "maxSimilarity": 22,
    "similarPages": [
      {
        "id": "export-controls",
        "title": "AI Chip Export Controls",
        "path": "/knowledge-base/responses/export-controls/",
        "similarity": 22
      },
      {
        "id": "international-regimes",
        "title": "International Compute Regimes",
        "path": "/knowledge-base/responses/international-regimes/",
        "similarity": 22
      },
      {
        "id": "authoritarian-tools-diffusion",
        "title": "Authoritarian Tools Diffusion Model",
        "path": "/knowledge-base/models/authoritarian-tools-diffusion/",
        "similarity": 21
      },
      {
        "id": "thresholds",
        "title": "Compute Thresholds",
        "path": "/knowledge-base/responses/thresholds/",
        "similarity": 21
      },
      {
        "id": "voluntary-commitments",
        "title": "Voluntary Industry Commitments",
        "path": "/knowledge-base/responses/voluntary-commitments/",
        "similarity": 21
      }
    ]
  },
  "coverage": {
    "passing": 5,
    "total": 13,
    "targets": {
      "tables": 18,
      "diagrams": 2,
      "internalLinks": 35,
      "externalLinks": 22,
      "footnotes": 13,
      "references": 13
    },
    "actuals": {
      "tables": 7,
      "diagrams": 1,
      "internalLinks": 30,
      "externalLinks": 0,
      "footnotes": 0,
      "references": 15,
      "quotesWithQuotes": 0,
      "quotesTotal": 0,
      "accuracyChecked": 0,
      "accuracyTotal": 0
    },
    "items": {
      "summary": "green",
      "schedule": "green",
      "entity": "green",
      "editHistory": "red",
      "overview": "green",
      "tables": "amber",
      "diagrams": "amber",
      "internalLinks": "amber",
      "externalLinks": "red",
      "footnotes": "red",
      "references": "green",
      "quotes": "red",
      "accuracy": "red"
    },
    "ratingsString": "N:4.5 R:6.5 A:7 C:7.5"
  },
  "readerRank": 208,
  "researchRank": 287,
  "recommendedScore": 180.32
}
External Links
{
  "lesswrong": "https://www.lesswrong.com/tag/compute-governance"
}
Backlinks (12)
idtitletyperelationship
hardware-enabled-governanceHardware-Enabled Governanceapproach
hardware-mechanisms-international-ai-agreementsHardware Mechanisms for International AI Agreementsanalysis
thresholdsCompute Thresholdsconcept
international-regimesInternational Compute Regimesconcept
misuse-risksAI Misuse Risk Cruxescrux
ai-compute-scaling-metricsAI Compute Scaling Metricsanalysis
bioweapons-attack-chainBioweapons Attack Chain Modelanalysis
short-timeline-policy-implicationsShort Timeline Policy Implicationsanalysis
holden-karnofskyHolden Karnofskyperson
coordination-techAI Governance Coordination Technologiesapproach
export-controlsAI Chip Export Controlspolicy
governance-overviewAI Governance & Policy (Overview)concept
Longterm Wiki