|
From the lady gaga school of design, no doubt.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
A Microsoft Research team has created a competition using Project Malmo, a platform that uses Minecraft as a testing ground for advanced artificial intelligence research. Building a mind: one block at a time
|
|
|
|
|
It likely is possible (all sorts of decision circuits have been created using Redstone), but it will probably be very slow.
What do you get when you cross a joke with a rhetorical question?
The metaphorical solid rear-end expulsions have impacted the metaphorical motorized bladed rotating air movement mechanism.
Do questions with multiple question marks annoy you???
|
|
|
|
|
The open source compiler framework can now produce optimized code for languages that have this threadlike feature, but Swift and Rust are still lagging If you can think of something funny/insightful about coroutines, you're better than I
|
|
|
|
|
yielding many threads...
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
Coroutines are Ok as long as they're not codependent!
Someone's therapist knows all about you!
|
|
|
|
|
Sorry. I got too many ideas at once; I can't choose.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Company announces new privacy policy following revelations that police gained special access to the social networks to track protesters That's their job
|
|
|
|
|
Only we may be evil (or just creepy) - you are not allowed to use us to be evil/creepy.
|
|
|
|
|
They might be evil/creepy as well... but not for free
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
Their ban is to change their service agreement. It's like Ford announcing they are banning drivers from speeding by putting "Don't Speed" in their manual.
|
|
|
|
|
I'm tempted to get a job at fb, just so I can be the one to press the button to delete the NSA's account.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
The last I heard, protesting was a legal activity -- except in police states.
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Called the Sideways Dictionary, the focus is on analogies rather than traditional definitions — for example, BitCoin is “like digital gold,” while a zero-day vulnerability is “like medics discovering a new virus.” It's like a dictionary, but like not
And very blank in my browser, but maybe I made the mistake of viewing it in Chrome
|
|
|
|
|
Kent Sharkey wrote: And very blank in my browser, but maybe I made the mistake of viewing it in Chrome
Apparently Firefox is a mistake as well. All I see is a blank page with a title and login at the bottom It's definitely sideways in that it's either the only dictionary with no content, or the only dictionary that requires a login.
|
|
|
|
|
|
A Ben-Gurion University of the Negev (BGU) researcher has developed a new technique that could provide virtually 100 percent protection against cyberattacks launched through internet videos or images, which are a growing threat. You mean my extensive collection of cat videos could be a problem?
|
|
|
|
|
Kent Sharkey wrote: You mean my extensive collection of cat videos could be a problem? No, they're just an indicator of a problem...
I wanna be a eunuchs developer! Pass me a bread knife!
|
|
|
|
|
Litter-ly yes. They can claws all sorts of problems - and that only scratches the surface.
Ravings en masse^ |
---|
"The difference between genius and stupidity is that genius has its limits." - Albert Einstein | "If you are searching for perfection in others, then you seek disappointment. If you are seek perfection in yourself, then you will find failure." - Balboos HaGadol Mar 2010 |
|
|
|
|
|
Phys.org wrote: "Hackers like videos and pictures because they bypass the regular data transfer systems of highly secure systems, and there is significant space in which to implant malicious code." ..might be due to the fact that an image is never executed.
..and then he goes on about steganography, where these malicious codes are hidden in an image. Which is only dangerous if there is an application on your computer that can actually decode that information and execute it.
Kent Sharkey wrote: Preliminary experimental results show that a method based on a combination of Coucou Project techniques results in virtually 100 percent protection against cyberattacks,
Read more at: any other place outside Phys.org Because all cyberattacks are done using images and video's? Come on, this is someone looking for money trying to sell a solution to a non-problem.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|
|
|
|
The first one is a bug in the browser.
Technet wrote: An attacker could exploit the vulnerability by constructing a specially crafted WMF image that could potentially allow remote code execution if a user visited a malicious Web site or opened a specially crafted attachment in e-mail. [...] In all cases, however, an attacker would have no way to force users to visit these Web sites. Instead, an attacker would have to persuade users to visit the Web site, typically by getting them to click a link in an e-mail or Instant Messenger request that takes users to the attacker's Web site. Viewing a JPG using MS Paint does not execute code.
So, these two cases are 100% of all cyberattacks?
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
modified 14-Mar-17 11:31am.
|
|
|
|
|
Preview of images in outlook?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
100% of all cyberattacks?
With those kind of claims, I'd be selling miracle-water
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
|
|
|
|