|
Seriously? You cited Snopes as a viable defender against "fake news"?
".45 ACP - because shooting twice is just silly" - JSOP, 2010 ----- You can never have too much ammo - unless you're swimming, or on fire. - JSOP, 2010 ----- When you pry the gun from my cold dead hands, be careful - the barrel will be very hot. - JSOP, 2013
|
|
|
|
|
Yes. They actually do research and have been shown to be much more accurate than say InfoWars. Except when dealing with the news about his own ugly divorce and business dealings, of course.
TTFN - Kent
|
|
|
|
|
Kent Sharkey wrote: They actually do research and have been shown to be much more accurate than say InfoWars.
So...InfoWars is now something other than the lowest possible bar? One better:
"Snopes: They have more journalistic integrity than Mad magazine!"
Love ya Kent, but seriously.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
Feel free to show me ones they've had wrong, or better fact checkers (for random internet nonsense mostly).
I picked InfoWars after making the mistake of looking at Facebook and Twitter the other day, and it seems to be used as a news source there more than Mad Magazine.
TTFN - Kent
|
|
|
|
|
Fair, but Mad magazine is less ridiculous by leaps and bounds.
I'll grant you, the number of people that classify InfoWars as news is super sad. I was mostly teasing you over the comparison, i.e. literally saying nothing about the credibility of Snopes.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
Ah, true. Sorry, I overreacted.
And the Spy vs. Spy comic seems to be prescient these days.
TTFN - Kent
|
|
|
|
|
Save The Onion!
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
Microsoft is putting together a service aiming to take the pain out of procuring, provisioning and managing Windows 10 devices that it's currently calling the 'Microsoft Managed Desktop.' "Extended warranty?! How can I lose?"
|
|
|
|
|
Someone might want this, but we hope we never meet them. My Inbox will be so grateful
|
|
|
|
|
All of the apps appear to have been recently acquired by a little-known company. I guess they don't block everything then?
|
|
|
|
|
A new survey of 6,000 tech workers by workplace app Blind shows that over 60% feel they’re not paid enough. "I'm in the hi-fidelity first class travelling set and I think I need a Lear jet"
|
|
|
|
|
|
There we go - proof!
TTFN - Kent
|
|
|
|
|
Microsoft believes device form factors should conform to users, and that's a very different philosophy than its rivals'. When did that change?
|
|
|
|
|
Apple will sue them...
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
This new system is not only visible, but physical: it performs AI-type analysis not by crunching numbers, but by bending light "But what ... is it good for?"
|
|
|
|
|
|
Absolutely nothing...say it again...
Everyone has a photographic memory; some just don't have film. Steven Wright
|
|
|
|
|
Quote: Our all-optical deep learning framework can... Some pretty crappy word choices there, as it isn't 'deep learning' at all - the only thing it is doing is 'transforming' data at that point. All the 'intelligence' was performed way before those plates set the result in metal.
|
|
|
|
|
Researchers from Graz University of Technology, including one of the original Meltdown discoverers, Daniel Gruss, have described NetSpectre: a fully remote attack based on Spectre. With NetSpectre, an attacker can remotely read the memory of a victim system without running any code on that system. Convenience!
|
|
|
|
|
"The attacker then calls the leak gadget... the leak gadget is a fragment of code that speculatively uses an AVX2 instruction."
|
|
|
|
|
In security researcher terms "gadget" is a bit of existing software on the target machine that is being exploited by the attacker.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
That was my point; the claimant said that no code had to be run on the target. He probably meant "no custom code". I figured it was a reporting error, but apparently his original paper said the same. It may have since been corrected.
|
|
|
|
|
ok, without context I'm not sure how I'm supposed to've guessed that was your intent. Every other time I've seen someone commenting on the usage, they were using it as step 1 in an argument that concluded that the attack required installing something else on the target first, at which point the entire exercise was pointless because that malware could pwn the server more directly.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Some have compared WebAssembly to Java applets; in some ways, they’re very right, but in some ways, they’re very wrong. Short answer: no. Longer answer: weeeeelllllllll, not really
|
|
|
|