|
|
Stealing from one is plagiarism; stealing from many is research.
I'm retired. There's a nap for that...
- Harvey
|
|
|
|
|
o/~ Plagiarize,
Let no one else's work evade your eyes,
Remember why the good Lord made your eyes,
So don't shade your eyes,
But plagiarize, plagiarize, plagiarize...
Only be sure always to call it please, "research". ~/o
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Plagiarized from Tom Lehrer - Lobachevsky
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
Please tell Mr. Reynolds, that this is ain't no programming...
Skipper: We'll fix it.
Alex: Fix it? How you gonna fix this?
Skipper: Grit, spit and a whole lotta duct tape.
|
|
|
|
|
Kent Sharkey wrote: I think I saw that program in Q&A He's the one who can spell correctly.
Or should I say: "the Only one ~~"
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
It would be quite difficult to build a truly working system this way, imho. The output of current machine learning systems are statistical and input/reaction type, meaning it only produce probabilities and may not have "long time memories" (I might be wrong, since I am not an expert in machine learning at present), while programming is a very "precise" and correlated process, any error or mismatch in naming or logic in the execution sequence of the program will most likely kills the program. How one can "debug" a complex system build this way (a black box) that may have plethora of random "bugs" hidden. How could one trust such kind of systems to really "work".
In addition, from my own experiences, program synthesis from existing codes requires knowing, or constructing meta information about the existing codes, so that they can be turned into parameterized templates, which is quite hard for "deep learner", without the guidance from a human, especially the original coder ...
|
|
|
|
|
Information security professionals need to get beyond 'blaming the user' says expert. "This is everybody's fault but mine"
|
|
|
|
|
Sure, user's don't need to know the difference between malware flavors.
However, pretty much any hack against a non-trivial target uses social engineering.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
If users wander through warez sites like a blind man hopping through a minefield and click on everything they see like a cat high on catnip... it's the SysAdmin fault. He did in fact not train them properly (i.e. with a big stick and a salt-loaded shotgun).
* CALL APOGEE, SAY AARDWOLF
* GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
* Never pay more than 20 bucks for a computer game.
* I'm a puny punmaker.
|
|
|
|
|
Half of the web’s traffic is now encrypted, according to a new report from the EFF released this week. Of course, most of that is just pig latin and ROT-13
|
|
|
|
|
This message is double encrypted in ROT-13.
I'm retired. There's a nap for that...
- Harvey
|
|
|
|
|
|
|
New research from Washington University in St. Louis shows that, more than often than not, people fall short in determining which co-workers might be trying to edge them out on the job. "There's battle lines being drawn again. Nobody's right if everybody's wrong again"
|
|
|
|
|
Opening sentence: Everyday in the workplace, colleagues actively compete for a limited amount of perks, including raises, promotions, bonuses and recognition. Raises, promotions, bonuses, and recognition are not perks, and it should be "number of"
Since it's obviously going to be annoying to read, I lost interest right there.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
"What language will it be I'd have no clue but there will still be people who write C++ or C# code down in the engines or device drivers but when someone thinks of business solutions they will be programming in models" revealed Judah who is one the senior most executives in Microsoft's services division About as likely as coders becoming models
Of course excluding model/coder Lyndsey Scott, and Sean.
|
|
|
|
|
I think he means VBA?
(Somewhere deep in the bowels of a data centre two eyes blink open. A paperclip awakes...)
|
|
|
|
|
ah yes... like cicadas, this idea comes around every 17 years.
|
|
|
|
|
|
|
Ransomware targeting the Android operating system has grown by over 50% in just a year, as more consumers switch from their PCs to their smartphones, making the mobile OS ecosystem a more worthwhile target for cybercriminals. I guess it is true that Android is the new Windows
|
|
|
|
|
"Who encrypts my phone gives me an excuse to buy a new one."
-- Wm Shakespeare, 1564-1616, Othello
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Google confirmed yesterday it was shutting down its Site Search service, which is the commercial version of the free service Google Custom Search, also known as Custom Search Engine (CSE). I know, "Google cancels something" isn't news, but some might be using this
And surprise, it means more ads.
|
|
|
|
|
I have an application that has a search function. It's a big system, over 30 TB of content. I built the search site using Autonomy's IDOL intelligence engine.
It would never even occur to me to taint our good name with Google advertisements splattered all over it. I can't imagine the person who would do this. They must not care at all.
|
|
|
|