|
A.I., war, think tank.
I like what you did there.
|
|
|
|
|
Kent Sharkey wrote: "How about a nice game of chess?" I think Tic Tac Toe is better
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
I prefer checkers. When I was only 10 I beat a TRS-80 (back in '78) at checkers by not moving any of my back row of checkers. I gained a king and could continue to move while the computer ran out of moves as all its pieces were moved forward.
I think you can tell I was kind of a genius prodigy for beating the computer that way.
I'm not sure what happened after that.
|
|
|
|
|
Europe is introducing new rules for Google, Apple, Amazon and other large platforms forcing them to handle customer complaints better and be more transparent about rankings. "You've got to try a little kindness"
|
|
|
|
|
A new in-development ransomware was discovered that has an interesting characteristic. Instead of the distributed executable performing the ransomware functionality, the executables compiles an embedded encrypted C# program at runtime and launches it directly into memory. Just-in-Time malware
|
|
|
|
|
A patch for Meltdown created an even bigger flaw for 64-bit Win7 and Server 2008 R2. Now, it's freely available. Hoorah for code sharing
|
|
|
|
|
I am starting to agree with the ones saying that shut off updates is safer than actually updating
M.D.V.
If something has a solution... Why do we have to worry about?. If it has no solution... For what reason do we have to worry about?
Help me to understand what I'm saying, and I'll explain it better to you
Rating helpful answers is nice, but saying thanks can be even nicer.
|
|
|
|
|
After January 2019, businesses will need a commercial license to receive updates for Oracle Java SE products They almost had me with 'end of Java'
|
|
|
|
|
Drinking coffee before a discussion can help people stay focused and feel better about the people in the conversation, suggests a new study that appears in the Journal of Psychopharmacology. I obviously need more coffee today
|
|
|
|
|
"Facebook says it'll crack down on fake accounts, but there are lots of fake Mark Zuckerbergs out there. And they're after your cash." [^]Quote: An examination by The New York Times found 205 accounts impersonating Mark Zuckerberg and Sheryl Sandberg, Facebook’s chief operating officer, on Facebook and its photo-sharing site Instagram. At least 51 of the impostor accounts, including 43 on Instagram, were scams.
«... thank the gods that they have made you superior to those events which they have not placed within your own control, rendered you accountable for that only which is within you own control For what, then, have they made you responsible? For that which is alone in your own power—a right use of things as they appear.» Discourses of Epictetus Book I:12
|
|
|
|
|
The technology could be used by soldiers on the battlefield to print temporary sensors on their bodies to detect chemical or biological agents or solar cells to charge essential electronics. The girl with the drag-and-drop tattoo?
Yeah. I got nothing on this one.
|
|
|
|
|
Kent Sharkey wrote: Yeah. I got nothing on this one.
I was going to get High, but they printed the polarity backwards!
|
|
|
|
|
Computer scientists at Rice University have created a deep-learning, software-coding application that can help human programmers navigate the growing multitude of often-undocumented application programming interfaces, or APIs. Automating 'need codez pls' posts
|
|
|
|
|
Microsoft reveals modular mobile system for multi-player games, analytics, air-traffic control, and trading-desks. Just the thing for all those old tablets you have lying around
|
|
|
|
|
Many scholars believe that the grammar of Sanskrit, which is rule-bound, formula-bound and logical, is the most appropriate to write algorithms, or to be used in machine learning and even artificial intelligence. Namaste, HAL. Now will you open the pod bay doors?
|
|
|
|
|
|
I think you had better let Al Gore know that.
“That which can be asserted without evidence, can be dismissed without evidence.”
― Christopher Hitchens
|
|
|
|
|
Pluralsight, the enterprise technology learning platform, announced the launch of the Pluralsight Technology Index that ranks the demand for skills in certain technologies. For those that really, really, really want to pick their jobs by popularity
or: "I'm sorry that people are so jealous of me... but I can't help it that I'm popular."
|
|
|
|
|
I'm sure it's just a coincidence that they happen to have a lot of classes in the things they're hyping?
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
According to The Washington Post, Lundgren was sentenced to 15 months in federal prison over restore disks for Windows computers. "Don't copy that floppy" (or share that restore, apparently)
|
|
|
|
|
We are thrilled to announce the availability of vcpkg on Linux and MacOS. This gives you immediate access to the vcpkg catalog of C++ libraries on two new platforms, with the same simple steps you are familiar with on Windows and UWP today. I'm certain the guy doing Visual C++ programming on his Mac is thrilled
|
|
|
|
|
The European Space Agency's Rosetta spacecraft arrived at Comet 67P/Churyumov–Gerasimenko in 2014 and subsequently became the first mission to ever orbit around a comet. No little Prince to be found
|
|
|
|
|
25 years ago, the first release of Mosaic web browser appeared and the web, as we know it, began. And HTML is still broken everywhere
|
|
|
|
|
[^]Quote: That all takes us to the nub of the problem. It’s natural to trust one’s own senses, to believe what one sees—a hardwired tendency that the coming age of manipulated video will exploit. Consider recent flash points in what the University of Michigan’s Aviv Ovadya calls the “infopocalypse”—and imagine just how much worse they would have been with manipulated video. Take Pizzagate, and then add concocted footage of John Podesta leering at a child, or worse. Falsehoods will suddenly acquire a whole new, explosive emotional intensity.
But the problem isn’t just the proliferation of falsehoods. Fabricated videos will create new and understandable suspicions about everything we watch. Politicians and publicists will exploit those doubts. When captured in a moment of wrongdoing, a culprit will simply declare the visual evidence a malicious concoction. The president, reportedly, has already pioneered this tactic: Even though he initially conceded the authenticity of the Access Hollywood video, he now privately casts doubt on whether the voice on the tape is his own.
In other words, manipulated video will ultimately destroy faith in our strongest remaining tether to the idea of common reality. As Ian Goodfellow, a scientist at Google, told MIT Technology Review, “It’s been a little bit of a fluke, historically, that we’re able to rely on videos as evidence that something really happened.”
«... thank the gods that they have made you superior to those events which they have not placed within your own control, rendered you accountable for that only which is within you own control For what, then, have they made you responsible? For that which is alone in your own power—a right use of things as they appear.» Discourses of Epictetus Book I:12
|
|
|
|
|
I'm sure there will be a technological solution to this, such as a wifi device that emits an encrypted signature based on time, GPS, possibly biometric data, that can be then be correlated to reality. Any recording device will have to receive this signal and record the signature on a separate channel, which must be merged with a hash of every frame of the video (or whatever a "frame" of audio represents.) Through encryption magic that I don't understand, possibly using a unique public key that is assigned to every single person and is part of the broadcast, embedded in our body somewhere, the authenticity of the video can be verified. Of course, this technology would also need to handle multiple (like, crowds) of people and their authentication broadcasts. Technically, we pretty much already have that capability with smart phones.
|
|
|
|