|
Microsoft is putting together a service aiming to take the pain out of procuring, provisioning and managing Windows 10 devices that it's currently calling the 'Microsoft Managed Desktop.' "Extended warranty?! How can I lose?"
|
|
|
|
|
Someone might want this, but we hope we never meet them. My Inbox will be so grateful
|
|
|
|
|
All of the apps appear to have been recently acquired by a little-known company. I guess they don't block everything then?
|
|
|
|
|
A new survey of 6,000 tech workers by workplace app Blind shows that over 60% feel they’re not paid enough. "I'm in the hi-fidelity first class travelling set and I think I need a Lear jet"
|
|
|
|
|
|
There we go - proof!
TTFN - Kent
|
|
|
|
|
Microsoft believes device form factors should conform to users, and that's a very different philosophy than its rivals'. When did that change?
|
|
|
|
|
Apple will sue them...
Oh sanctissimi Wilhelmus, Theodorus, et Fredericus!
|
|
|
|
|
This new system is not only visible, but physical: it performs AI-type analysis not by crunching numbers, but by bending light "But what ... is it good for?"
|
|
|
|
|
|
Absolutely nothing...say it again...
Everyone has a photographic memory; some just don't have film. Steven Wright
|
|
|
|
|
Quote: Our all-optical deep learning framework can... Some pretty crappy word choices there, as it isn't 'deep learning' at all - the only thing it is doing is 'transforming' data at that point. All the 'intelligence' was performed way before those plates set the result in metal.
|
|
|
|
|
Researchers from Graz University of Technology, including one of the original Meltdown discoverers, Daniel Gruss, have described NetSpectre: a fully remote attack based on Spectre. With NetSpectre, an attacker can remotely read the memory of a victim system without running any code on that system. Convenience!
|
|
|
|
|
"The attacker then calls the leak gadget... the leak gadget is a fragment of code that speculatively uses an AVX2 instruction."
|
|
|
|
|
In security researcher terms "gadget" is a bit of existing software on the target machine that is being exploited by the attacker.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
That was my point; the claimant said that no code had to be run on the target. He probably meant "no custom code". I figured it was a reporting error, but apparently his original paper said the same. It may have since been corrected.
|
|
|
|
|
ok, without context I'm not sure how I'm supposed to've guessed that was your intent. Every other time I've seen someone commenting on the usage, they were using it as step 1 in an argument that concluded that the attack required installing something else on the target first, at which point the entire exercise was pointless because that malware could pwn the server more directly.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
Some have compared WebAssembly to Java applets; in some ways, they’re very right, but in some ways, they’re very wrong. Short answer: no. Longer answer: weeeeelllllllll, not really
|
|
|
|
|
When is the most popular time for ordering pizza, Chinese food, or other forms of takeout? You might think there's no set answer, but it turns out that wherever you are in the world there’s a particular time when most people think about getting food. We bring you all the news that fits under your door
Mercifully: "We received no funding for this study."
|
|
|
|
|
Quote: "Successful foraging behavior has been favored by natural selection, which shaped innate, species-specific decision rules that maximize energy gain,"
Or to put it more simply: people are most likely to order pizza when they are either hungry or drunk.
Whenever you find yourself on the side of the majority, it is time to pause and reflect. - Mark Twain
|
|
|
|
|
the economist
I CERTAINLY didn’t set out to create a language that was intended for mass consumption,” says Guido van Rossum, a Dutch computer scientist who devised Python, a programming language, in 1989.
Snakes are NOT slimy. Really!
|
|
|
|
|
Hi,
I think this is because Python is the language that many educational institutions choose to teach. Back in the 1990's there was a controversy over which languages were being taught in the schools. Some people claimed that teaching students to code for a specific platform was basically free advertisement and corporate bias. Many of these schools responded by changing the programming curriculum to use platform independent languages. It would be interesting to cross reference the popularity to the number of schools teaching the programming language.
I am very skeptical about these 'language popularity' graphs that use search engines for measurements.
Here is the most popular programming languages according to GitHub:
languages in GitHub
Best Wishes,
-David Delaune
|
|
|
|
|
Randor wrote: Back in the 1990's there was a controversy over which languages were being taught in the schools. Some people claimed that teaching students to code for a specific platform was basically free advertisement and corporate bias. Many of these schools responded by changing the programming curriculum to use platform independent languages. Yes, one of our complaints at the time.
Schools and universities would go to Open Source hobby-languages that would not be asked in any vacancy listed. Stuff like Java (because it is only corporate bias if it involves a MS product), where they simply could download some tutorials and start "educating".
It took years of whining from corporations and the introduction of .NET before schools started to pick it up. And while they still don't like Microsoft, most schools love their apples.
That's also one of the reasons why Java came so far as it did; it was pushed by educators.
Bastard Programmer from Hell
If you can't read my code, try converting it here[^]
"If you just follow the bacon Eddy, wherever it leads you, then you won't have to think about politics." -- Some Bell.
|
|
|
|
|
Python is a pretty easy and forgiving language; so it's use as an academic tool is understandable and even, to an extent, desirable. Hell, if people in general could figure out if they're going to use 2.7 or 3 I might actually work in it regularly as well.
There is also a link to the Linux community's strange obsession with Py, the prevalence of Linux in the security community, and the growth of cybersecurity as an industry.
My only real issue with it is that, in recent years, it's been following a trajectory similar to PHP and PowerShell; people are using it to write applications rather than relying on the efficiencies of compiled languages. As a tool, though, it's got a purpose that it can serve well, when used properly.
"Never attribute to malice that which can be explained by stupidity."
- Hanlon's Razor
|
|
|
|
|
Quote: In the past 12 months Americans have searched for Python on Google more often than for Kim Kardashian, a reality-TV star. Does this say something about:
1. anything ?
2. the type of person who programs in Python ?
3. Kim Kardashian ?
4. Python ?
«... thank the gods that they have made you superior to those events which they have not placed within your own control, rendered you accountable for that only which is within you own control For what, then, have they made you responsible? For that which is alone in your own power—a right use of things as they appear.» Discourses of Epictetus Book I:12
|
|
|
|