|
Utter nonsense. If you want to be on the early/beta release ring you can. Or you can opt to be in the slower ring. With corporate accounts, you can be on an even slower update ring. These people are whining just to whine--it's virtue signalling at its worse.
|
|
|
|
|
It runs cool and uses one tenth the power of traditional spinning drives. It measures up
I wonder how I can work a few into the budget?
|
|
|
|
|
You want to make sure to fill up the entire space, so you need 32.
|
|
|
|
|
The threat was demonstrated this week at the Black Hat security conference in Las Vegas. The threat targets MacBooks that use Apple’s Device Enrollment Program and its Mobile Device Management platform. So, you just have to follow people home from the store?
|
|
|
|
|
At the DefCon hacking conference two researchers demonstrated that using machine learning techniques, you can de-anonymize the authors of code samples. No hiding for the one who broke the build
|
|
|
|
|
Larger cable providers once again take a beating for perceived value—even when it comes to bundled plans It's not just you
|
|
|
|
|
The success shows that advances in artificial intelligence aren’t the sole domain of elite programmers. Size doesn't matter
|
|
|
|
|
Kent Sharkey wrote: Size doesn't matter I would answer you, but that would be soapbox content
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
In the meantime, the Defense Department may be reorganizing how it does space "Now, the lids about to blow, when the Thunderbirds are go"
|
|
|
|
|
Finally
Gone is the Outer Space Treaty, which was started by the US. Next war, attacking sattelites will be normal.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Computer scientists in Australia teamed up with an expert in the University of Toronto's department of English to design an algorithm that writes poetry following the rules of rhyme and metre. Then they came for the Elizabethan poets, and I did nothing as I took STEM classes
|
|
|
|
|
Shall I compare thee to an overheated CPU?
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
This fall, the state will become the first in the US to allow some voters to submit their federal general election ballots using a smartphone app, part of a pilot project primarily involving members of the military serving overseas. Because xkcd is always right
And very timely.
|
|
|
|
|
I've been really disappointed in all the press coverage that this has generated. Everyone is just rehashing the reasons why it's a garbage fire in general, and ignoring the specific reasons what Voatz has been demonstrated to be a tiredump fire at a minimum. (What's known now makes me suspect a good pentest would upgrade it to a coalseam fire.)
- a mess of unneeded, insecure and woefully out of date services running on the same servers as the voting infrastructure.
- hard coded passwords committed to public github.
- claiming to have been audited by 3rd parties who've denied having anything to do with the debacle.
Kevin Beaumont on Twitter: "This is going to backfire. West Virginia are moving to mobile phone voting for this midterm elections - software is a ‘Blockchain voting system’ by “Votez”, a 2018 startup with $2m of funding https://t.co/478mhg4CT6"
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Maybe there is some collusion going on.... If everyone knows it's so bad and they are going to do it anyways; those who don't like the election results have reasons for a recount or a special election
|
|
|
|
|
Recipe for disaster
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
It's possible this will fail but nobody will notice. This is West Virginia. However, if the failure is noticed, it will be blamed on:
1) The Russians
2) Failure to use Agile [correctly]
3) Failure to use Blockchain correctly
What won't be blamed:
1) The managers of Voatz
2) The politicians who wrote the checks
|
|
|
|
|
The new eBook is designed to help you get up to speed with Azure in the shortest time possible and includes practical real-world scenarios. Because you know your boss will ask about it (if they haven't already)
|
|
|
|
|
Cybersecurity researchers at the Georgia Institute of Technology have helped close a security vulnerability that could have allowed hackers to steal encryption keys from a popular security package by briefly listening in on unintended "side channel" signals from smartphones. Because it's OpenSSL, not CompletelyOpenSSL
|
|
|
|
|
Interesting,
It looks like they are were able to capture very a weak zeptojoule signal from a second cell phone. If so then the attacker would probably need to execute code from a second phone within 1-5 meters of the target.
The photograph in the article looks real and it implies that they are attacking a coprocessor hardware implementation of Peter Montgomery's modular multiplication method. In the screenshot the gap labled 'Only 23 data points' seems to be the pattern they are looking for before the Montgomery multiplication algorithm begins. They are probably able to discover the Hamming weights.
If so.. this technique is not new at all... and this type of attack was known as far back as 2002.
What is interesting here is that this can be accomplished with a consumer device.
Best Wishes,
-David Delaune
P.S.
Companies and research groups should not allow anyone to take cell phone pictures of the white board.
|
|
|
|
|
It is always nice to stand on the shoulder of giants. Wouldn’t you rather implement your GUI on something that has been battle tested in the field for years in many different fields? Now your .NET apps can be cute
|
|
|
|
|
"advanced styling scenarios" That's funny.
What does "proped" mean?
|
|
|
|
|
The much anticipated 1.0 release of Julia is the culmination of nearly a decade of work to build a language for greedy programmers. "Half of what I say is meaningless, but I say it just to reach you, Julia"
|
|
|
|
|
the support for rational numbers is neat. 6//9 == 2//3
|
|
|
|
|
Microsoft has taken the oppor-tuna-ty to install a webcam next to its undersea data center, offering live views of just how well the metal container is rusting and the hundreds of fish suddenly interested in cloud data and artificial intelligence. I wonder if they splurged and got one of those treasure chests that opens occasionally?
|
|
|
|