|
Genuine artificial intelligence would persist without having its algorithms and data manipulated directly by anything but itself. As soon as devs tinker with it, it becomes something new.
(Then again, is this really artificial intelligence, or just a clever algorithm? I'm quite skeptical of it being the former.)
|
|
|
|
|
Joe Woodbury wrote: if the devs are allowed to tinker with it ... They break it, and it might have to start learning all over again from scratch (or just go completely gaga for a few zillion cycles). That's how AI works.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
As much as modern desktop web browsers can do, their basic concept is stuck in a rut. Like Chrome OS, but with more Opera?
OK, not quite.
|
|
|
|
|
it's rare to see all of them in a browser at the same time. Not since the invention of tabs. It is also as far from a "rich client desktop" as any tabbed webbrowser currently is.
The basic concept of trying to do everything in a single application might be wrong.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
Eddy Vluggen wrote: The basic concept of trying to do everything in a single application might be wrong. You should have joined those of us saying that when the whole, ridiculous "Let's make everything a web-app!" movement started.
Unfortunately, the ship has sailed.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Mark_Wallace wrote: Unfortunately, the ship has sailed. Sounds like it is set in stone.
It's not
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
We can hope, but everywhere I go, people are still moving perfectly good, stable, secure programs to buggy, unstable, insecure web apps.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Fiddler for Linux Beta is now available for download. Try out our free web debugging proxy on Linux today and let us know what you think. I would have thought they already had something like this, but what do I know?
Little. That I know.
|
|
|
|
|
|
4) McAfee antivirus will still be utter cr@p.
DURA LEX, SED LEX
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
When I was six, there were no ones and zeroes - only zeroes. And not all of them worked. -- Ravi Bhavnani
|
|
|
|
|
True, but in his defense I don't think he's been associated with McAfee AV for a very long time.
In this present crisis, government is not the solution to our problem; government is the problem. ~ Ronald Reagan
|
|
|
|
|
Yes I think the same. Still...
DURA LEX, SED LEX
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
When I was six, there were no ones and zeroes - only zeroes. And not all of them worked. -- Ravi Bhavnani
|
|
|
|
|
I'm surprised he was sober enough to pen an article
If it's not broken, fix it until it is.
Everything makes sense in someone's mind.
Ya can't fix stupid.
|
|
|
|
|
Hack attribution - I've been saying it's impossible for years. If you can hack a system, you can misdirect attempts to identify the perpetrators of said hack.
".45 ACP - because shooting twice is just silly" - JSOP, 2010
- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010
- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
Unfortunately our media believes the Hollywood version where the NSA/CIA/FBI/DOD are anti-hacking Gods so when Trump says it's impossible to really know who hacked someone - they call him an idiot.
*Trump can be idiotic at times but in this case he was spot on.
In this present crisis, government is not the solution to our problem; government is the problem. ~ Ronald Reagan
|
|
|
|
|
A new report, Accelerating Velocity and Customer Value with Agile and DevOps, from CA Technologies revealed businesses experienced greater customer satisfaction and brand loyalty when integrating agile with DevOops. "On our own we're fine but united we're dynamite"
|
|
|
|
|
I believe the applicable phrase is "confirmation bias".
|
|
|
|
|
Wait, a website that makes money by writing about Agile and DevOps says that more people should use Agile and DevOps...?
Color me stunned!!
The United States invariably does the right thing, after having exhausted every other alternative. -Winston Churchill
America is the only country that went from barbarism to decadence without civilization in between. -Oscar Wilde
Wow, even the French showed a little more spine than that before they got their sh*t pushed in.[^] -Colin Mullikin
|
|
|
|
|
Twice nothing is still nothing.
Marc
|
|
|
|
|
Two Microsoft employees claim the company made them look at photos and videos "designed to entertain some of the most twisted and sick minded people in the world." Now they're suing. For ... let's just say non-kid sister safe reasons
Then again, what about the VB team?
|
|
|
|
|
Translation... we want free money.
Jeremy Falcon
|
|
|
|
|
The VB team did a great job not leaving this mess alone
BTW: you should overstress this language for complex software
Press F1 for help or google it.
Greetings from Germany
|
|
|
|
|
Well, there's no point trying to get free money from the people who made the videos, because they're all in prison, so who else should they try to get it from?
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Of companies that use two-factor authentication, 74 percent admit that they receive complaints about it from their users -- and nearly 10 percent of them just ‘hate it.’ Would you rather have complaints, or hacks?
|
|
|
|
|
The article is rather an ad for "adaptive authentication".
But to get back to your question: how much business do you lose in case of a hack in comparison to the business lost by perceived inconvenience of authentication?
|
|
|
|