|
Slow news day?
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
I assumed that had gone a long time ago. But with undertaking work with military applications, they've seem to have removed the word "don't".
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
They could replace the phrase with a simple mwa ha ha[^]
|
|
|
|
|
Astronomers have spotted an arthropod-shaped nebula shooting off strange lasers, which could only mean there’s more to this nebula’s story than we think. A very large shark?
|
|
|
|
|
The most sophisticated software in history was written by a team of people whose names we do not know. It even knows which spoon to use for the salad course
Yes, it's an answer on Quora, but he put a bit of work into it
|
|
|
|
|
Kent Sharkey wrote: It even knows which spoon to use for the salad course
And it was produced using genetic programming.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
What the article doesn't mention: We might not know the names of the people who have written it, but what we do know is the obvious purpose of this piece of software, and so it's pretty easy to make an educated guess about its origin: Since it was targeting centrifuges for purifying uranium in Iran, it has to be some military or intelligence (or both) organization within the USA. I mean, their interests are quite clear if you look at their geopolitical and geostratgic decisions (or escalations) in the past about twenty years. And they surely have the kind of unlimited resources (in money etc.) to plan and develop such a thing. So changes are pretty high that the name of the author is either NSA or CIA.
|
|
|
|
|
The DNA that creates even something as "simple" as a single celled organism, let alone a mammal.
|
|
|
|
|
A group of iOS app developers concerned with Apple’s App Store policies has formed The Developers Union, an advocacy group that will push the company for “community-driven, developer-friendly changes.” That should lead to some Justice and Tranquility
|
|
|
|
|
Though a comparatively minor release, C# 7.3 addresses some long outstanding complaints from C# 1 and 2. Or as the Windows team would have called it: C# 2017 Service Pack 3 Build 62122 Oscillating Ostrich (OK, that last bit might be Ubuntu)
Good to see they're still fixing stuff from 1.0
|
|
|
|
|
A French nanorobotics team from the Femto-ST Institute in Besançon, France, assembled a new microrobotics system that pushes forward the frontiers of optical nanotechnologies. OK, this "tiny house" movement has gone too far
|
|
|
|
|
The demo involved a new AI assistant making phone calls to two businesses — a hairdresser and a restaurant — to make an appointment and book a reservation, respectively. Uhm, they uh, would never, ah, do anything like that, would they?
I'm surprised there wasn't confusion over, "12pm" as an appointment request.
|
|
|
|
|
We’re releasing an analysis showing that since 2012, the amount of compute used in the largest AI training runs has been increasing exponentially with a 3.5 month-doubling time. "Skynet begins to learn at a geometric rate."
Sorry, had to re-use that one.
|
|
|
|
|
"The word on the street is there’s definitely a shortage of people who can do data science" "Stand back! I'm going to try science."
|
|
|
|
|
Bloomberg May 18: "Millions of Computers Are at Risk of Hacks That Crack Into Their Core" Jordan Robertson [^] Quote: The hacking technique Bulygin found exploits the Spectre vulnerabilities, initially unearthed by Google and other researchers and disclosed earlier this year. The tech giant discovered that millions of computers and smartphones could be compromised by Spectre, which takes advantage of glitches in how processors try to predict what data they believe users will need next, and fetch it in advance. Bulygin’s technique goes a step further by enabling hackers to read data from a particular type of firmware called system management mode memory. The code is linked to access rights that control key functions of the machine, including shutting down the central processing unit if the computer gets too hot or letting administrators configure the system. With access to the SMM memory, hackers can get essentially any data they want.
«... thank the gods that they have made you superior to those events which they have not placed within your own control, rendered you accountable for that only which is within you own control For what, then, have they made you responsible? For that which is alone in your own power—a right use of things as they appear.» Discourses of Epictetus Book I:12
|
|
|
|
|
The Electronic Frontier Foundation is under fire this week, accused of over-hyping “EFAIL”—a set of vulnerabilities in email encryption tools based on PGP, GPG and S/MIME. Security is complicated, part LCXXII
|
|
|
|
|
The bug allowed one Carnegie Mellon researcher to track anyone's cell phone in real time. You are here
|
|
|
|
|
And where was Wally? Did someone spot him?
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
We want privacy, but we also want the efficiency that comes with data processing and the scientific advances that result from big data analytics. Is there a way to serve both individuals and agencies? "Freedom is not about being comfortable. It’s about seizing and using opportunities, and using them responsibly."
|
|
|
|
|
The browser is changing to flag the things that are dangerous, not the ones that are safe. Because they're all secure now?
|
|
|
|
|
Google is breaking up its premium YouTube Red service into two new offerings: a YouTube Music streaming service, and a YouTube Premium for original video content Just in case you run out of free places for music and video
RedTube is not going to like the loss in traffic from people trying to get to YouTube Red.
|
|
|
|
|
Kent Sharkey wrote: RedTube is not going to like the loss in traffic from people trying to get to YouTube Red.
|
|
|
|
|
Embedded software engineers of the future will have a very different skillset from their traditional predecessors. They’ll know how to call an API to make the hardware do something, but they won’t know why or how it does it. I'll finish reading this after I get through all the IoT articles
|
|
|
|
|
|
Randor wrote: This is how Godzilla was created[^]. He was a pissed-off old assembler programmer from the 1970's.
That explains the radioactive fire breath. Every old assembler programmer I knew survived on day/week-old coffee (in styrofoam cups) and smokes (at their desk, of course).
TTFN - Kent
|
|
|
|