Re: The real reason they're good at hiding...
You just need to find the areas where ominous music can be heard to be playing...
13580 posts • joined 3 Jun 2008
You just need to find the areas where ominous music can be heard to be playing...
The black hole is detected based on interaction with its low-mass companion... which evidently doesn't zip around with serious fraction of lightspeed.
A high profile public disclosure of the database beyond the original leak could be wreckless
Or rather, it could be "wreckfull"?
Inaccurate terror designations were first revealed by the BBC's Radio 4 which gained 30 minutes of access to the database in August 2015 from a disgruntled customer.
That "customer" would be a bank employee in a bank subscribing to said service?
One of those was the account for the UK Finsbury Park Mosque which was described in a HSBC letter as having "fallen outside of HSBC's risk appetite". ... Sources say HSBC closed on the mosque because it donated money to Palestine during the 2015 Israel-Gaza war.
Well, it's pretty clear where the loss of appetite comes from. It's not fun being on the lawfare end of the "Forever Victim" industry. But who are those "sources"?
Isn't this a comment for another article?
The first thing to employ would be nuclear weapons to clear the skies, followed by anti.aircraft missiles...
Agreement factor 75%
At this point, seems to be more like "chessmasters in the sky". They are not slowed down by any remains of human fighting ritual, so this is like fighting a lawnmower while taking on the role of the possum. Once they get autonomous enough to take off from the carrier and do CAP all by themselves, it's going to be interesting.
Then someone with connections to the MICC will propose to close the feedback loops and give these things nuclear ramjets, just to be sure...
I have never heard of this particular decision fuzzification (is there a book from Springer yet?), but I remember the good old rule-based "TacSoar" (based on SOAR with the "chunking"/rule-learning stripped out) trying to assist air missions back in the 90s (the time of "Strategic Computing Initiative" and all that). It was not very successful and also easily confused by ground-hugging kangaroos, IIRC.
Well, at least our illegal arm drops which are totally unlike "Putin in Ukraine", yes sir, because we are just supporting offshoots of Al Qaeda and not evil Novorossya insurrectionists are arriving at their destination, so at least some of the three-letter agencies are doing their job.
there must be a pseudo-psychological origin for this
No, just Amurrican politicians.
They are always "sending messages" to this or that guy or else threatening to "punish" someone for perceived or potential transgressions.
Like a control-freak nanny that drank too much coffee in the morning.
Besides, isn't Obama just carrying on with Dubya's legacy?
Yeah, but he's really taking up the weight with gusto.
God Help Us All if Hillary is elected. A two-front war with China and Russia using stealthed first-strike tac nukes in a "nuclear ramp-up" scenario? Yes, she can!
To keep the "yanks" (i.e. loutish New Englanders with missionary complexes) in you will have to build a wall at the height of the Mason-Dixon line but that would probably be considered racist nowadays seeing how the Confederate Flag (apparently "a more rectangular variant of the Army of Northern Virginia battle flag") is a "symbol of hate" and gives the PC brigade more conniptions than subliminal messages of terror in TV scan intervals.
"Have you ever participated in persecutions directed by the Nazi government or Germany; or have you ever participated in genocide?"
Not often, but in my advancing age my anger is increasing so this might become a more permanent hobby. (Oy hey I think the US didn't label Kissinger-approved excesses in East Timor or Guatemalan "anticommie" ops genocide, so it's ok if one lent a hand in those hotspots?)
How to traverse DHS-controlled territory: The Matrix Lobby Scene
Don't remind me.
I'm starting to shuffle of this mortal coil, but I still know nothing. On the other hand, I have the books that might tell me something. That's why I eagerly await the AI to go through the walls of text and perform some conclusions that I can depend on...
That being said, I thought "Y Combinator" was just a discussion group about functional programming and combinatory logic, because, well Y Combinator. What's been going on??
Shouldn't he be voting from Shoreditch from a whote-painted glass cubicle straight out of a William Gibson novel?
And why is he using LISP notation?
This is on the level of charver subhuman scum accosting brown-looking persons in the street and telling them to "go home" as happens now...
I will chip in freshly printed EUROs for
the Zyklon Bthe reeducation manuals and well-uniformed guards.
Seriously, who cares about french?? And I'm speaking it every day, btw..
From: "Adapting to Thrive in a New Economy of Memory Abundance", Kirk M. Bresniker, Sharad Singhal, and R. Stanley Williams, Hewlett Packard Labs - IEEE Computer 2015/12, pp 44-53:
Simultaneous adoption of massive NVM pools unifying storage and main memory, centimeter-scaling photonics, application-specific computation acceleration, and relegation of I/O to peripheral interfaces could indicate a fundamental shift in information processing that harkens back to Turing. With today’s emphasis on cheap computation, scarce volatile memory, and abundant nonvolatile I/O storage, systems must constantly manage data flow into and out of memory. The application code provides the translation mechanisms between the efficient, dense in-memory representation and the serialized, buffered persistent or communication representation, while the OS maintains application state and mediates hardware resources. Without the state provided by the OS and application code, the in-memory representations are meaningless. Data must be computed to be useful, but what happens when a vast in-memory representation lives much longer than the now ephemeral computation? Data might need to carry its own metadata and be packaged with its own applications and OSs. As with Turing’s universal machine, the heart of the new machine will be memory, with demonstrably correct access to data in perpetuity. Given that this concept of computing could be the catalyst for many profound insights, we have christened it Memory-Driven Computing. Having emancipated memory from computation and made it the centerpiece of computing, how do we guarantee its correctness? Augmenting the interfaces to memory with a state-change mechanism based on a functional language could provide a formally provable evolution of data without side effects as well as a self-describing type system to guarantee continuity of data interpretation. Adding strong cryptography and a capabilities-based permission system could give future generations the confidence that our information legacy is trustworthy.
> if it wasn't unbuffered then no wonder it died...
One would hope to imagine that running low on I/O buffers would not mean that Buckle your seatbelt Dorothy, 'cause Kansas is going bye-bye!
You are overthinking this.
The statement just means that the universe can be modeled as a gas at large scales (contrary to what would be expected if certain approaches like Scale Relativity where right, as you scale out, things gets more uniform, as opposed to what you would see in a fractal structure for example).
"Reverse China Syndrome" would be more accurate.
Huh, it's on amazon. It must be true!
Oh no the "rebel science" guy is back.
Someone sure has opened a transdimensional hole to the dimension of stupid, where chaos reigns.
Trolling for fake controversy.
Pretending that mathematical solutions could be subject to some kind of "conspiracy of silence" or that it matters who wrote which paper when and whether there were errors in the initial version or not. Just compute it by yourself if you must. It's math! (not as if most of the commenters would do that but grad students sure can).
singularities in his gravitational field nullify the theory of General Relativity
No they just mean that GR is not applicable in every situation. That's clearly a "no shit, Sherlock" kind of brainwave.
Now fuck off.
I'll continue being the Register's Norwegian death metal Tinker Bell.
More like the tinfoil brigade cavalry.
More hoies, I reckon.
It would be amazing to see that most of the universe is actually a gas of black holes.
Not sure if this will hold up as we need some "cold" and some "warm" dark matter to match simulations.
What's wrong with you elitist fa**ots? Sounds like good fun with mecha, definitely more than association football. Or any football for that matter.
This. It is on par with adding more nicotine to cigarettes. Or worse, adding nicotine to ice cream. IT IS EVIL... for the most part.
How is killing the boring and getting people to actually want to do something bad?
Unless you are an irredentist Marxist-Leninist who needs to rip the ugly façade of hidden oppression and exploitation off everything and generally is an unfunny guy who bemoans austerity even as your representative just got a 20% payrise?
Does that make the data center a gulag?
Comodo has provided and built a Free SSL model that give SSL for free for 90 days since 2007! Trying to piggy back on our business model and copying our model of giving certificates for 90 days for free is not ethical.
But further down "robinalden" (Comodo Staff) has this to say:
With LE now being an operational business, we were never going to take the these trademark applications any further. Josh posted a link to the application and as of February 8th it was already in a state where it will lapse. Josh was wrong when he said we’d “refused to abandon our applications”. We just hadn’t told LE we would leave them to lapse. We have now communicated this to LE.
So all is hunky dory?
But there's way too much information to decode the Matrix.
You get used to it. I don't even see the code. ... All I see is blonde, brunette, redhead. Do you want a drink?
It's not Utah, but...
Generally, you better be prepared for some finger play!
What once were modest exceptions in Constitutional America morphed into a vast “Constitution-free zone.” The “border” is now a strip of land circling the country and extending 100 miles inland that includes two-thirds of the U.S. population. In this vast region, Customs and Border Protection (CBP) can and conduct warrantless searches.
(Obviously appropriate icon is obvious)
Idiots taking over?
Better stock up on guns!
(Note that I always stay out of gun-free zones. I don't like being the lowest rung in the food chain.)
IBM is basically the republican party of IT (without the little boy molesting show, hopefully), what did you expect to happen to a transgender person?
It had the vague aura of Victorian-era staidness (just LOOK at those bezels and mainframe racks and the reassuring hum of
"No-one ever got fired for buying IBM", yes... but only companies pulling in serious money or swimming in taxpayer largesse could afford to buy IBM. Apparent (and, often with IBM, subsequently surfacing) costs of IT were not really a factor in IBM-acquiring companies.
The absolutely Good Thing about IBM is that it did/does its in-house blue-sky research and puts absolutely innovative stuff on the market. Unfortunately the IBM logo spoils the result, because it means awesomeness has been skillfully laminated with enough boring and ancient proprietary cruft to activate the PHB's hormonal system but maybe that's just me.
> it is still a rather chilling realization that we have created a device with at least as much raw computing power as the best human.
Not really. We have motors that develop more power, materials that are stronger, vehicles that are faster, optical instruments that can see further ...
It's just another step in INGENUITY!
Design errors [of ARM 32], like ... making every instruction conditional
I am totally not au fait with CPU instruction sets as I have abandoned that particular specialization after writing floating point arithmetic operations for NS32032 at uni, but are these instructions for "predicated execution" as used in IA-64 "Merced" and the Zuse Z-3, meant to reduce (or eliminate) branches?
The IEEE Computer Article referenced in the above is actually 'Challenges and Trends in Processor Design', Janet Wilson, IEEE Computer Magazone, January 1998, with the item "Introduction to Predicated Execution" by Web-mei Hwu, University of Illinois, Urbana-Champaign, where we read:
The story of Merced, Intel’s first processor based on its next-generation 64-bit architecture, will continue to unfold in 1998, Intel expects this product of its collaboration with Hewlett-Packard to reach volume production in 1999. To date, however, the two companies have released few details about Intel Architecture 64 (IA-64). One significant change they did admit to at the October 1997 Microprocessor Forum was the switch to full predicated execution, a technique that no other commercial general-purpose processor employs.
[IEEE Computer] wanted to give its readers advance notice of this promising technique. We invited Wen-mei Hwu, a prominent researcher in this area, to explain predication, a topic you may be hearing more about in 1998. -- Janet Wilson
Predicated execution is a mechanism that supports the conditional execution of individual operations. Compared to a conventional instruction set, an operation in a predicated-execution architecture has an additional input operand -a predicate- that can assume a value of true or false. During runtime, a predicated-execution processor fetches operations regardless of their prcdicatc value. The processor executes operations with true predicates normally; it nullifies operations with false predicates and prevents them from modifying the processor state. Using predication inherently changes the representation of a program’s control flow. A conventional instruction set requires all control flow to be explicitly represented in the form of branches, the only mechanism available to conditionally execute operations. An instruction set with predicated execution, however, can support conditional execution via either conventional branches or predicated operations.
Providing compiler support for predicated execution is challenging. Current optimizing compilers rely on control flow representation as the foundation of analysis and optimization. Because predicated code changes the control flow representation, effectively handling it requires an extensive modification of the compiler infrastructure, particularly in the areas of classical and ILP optimizations, code scheduling, and register allocation. An effective compiler must balance the control flow and the use of predication. If resources become oversubscribed or dependence heights (the lengths of the chains of dependent operations) become unbalanced among paths, predicated execution can degrade performance.
Predicated execution started as a software approach to avoiding conditional branches in early supercomputers. Vector architectures such as the Cray 1 and array-processing architectures such as Illiac IV adopted predication in the form of mask registers to allow effective vectorization of loops with conditional branches. During the era of mini-supercomputers, the Cydrome Cydra 5 became the first machine to support generalized predication. Parallel to the Cydra 5, the Multiflow Trace machine adopted partial predication by introducing a single instruction with a predicate input, a select instruction. Contemporary processors, such as the DEC Alpha and the Sparc V9, have adopted the partial-predication approach so they can maintain a 32-bit instruction encoding.
But aren't the libraries all legacy code, in effect?
Yes. This Machine of the Rising Sun will be called the "Armato"!
Kinda a bit late to patent open tech?
Especially if done by a crazy jerk. It is likely that most or even all patents deflate within minutes and be minor variations of well-known "business methods" (like "see door, open door, go through door, close door") (still will be granted I fear).
And it will be defeated by a bunch of peasants in orbit, armed with AK-47...
Aside from the JVM which is sometimes optional
My dear fellow!
Previously under the impression that the incontinent moaning of the employers complaining of the lack of any adequate skills in IT was down to not being able to keep the cake that would be eaten, I am starting to understand their viewpoint.
A good example of this is shown in the movie "Tora, Tora, Tora".
Some would say that said message was suspiciously delayed, and General Marshell suspiciously not on his post at the time, being out doing horseback riding in spite of being fully aware that the Japanes Embassy would deliver a certain note at 07:30 Hawaiian Time. Luckily the aircraft carriers were not in port, eh?
Meanwhile, serious policing is serious: Dude Writes ‘ISIS Beer Funds!!!’ in Venmo Memo, Feds Impound His $42 Transfer
Well if Herr Trump takes over there won't be a discovery phase at Gitmo for all the Muslims and then Democrats.
Cheap liberal demagoguery.
Is he going around threatening to FEMA-trail illegal undesirables and bleeding heart "bombing you hurts me more than it does you" Democrats?
No he isn't.
Though confused, guy's is probably less bad than Hillary, a rancid neocon zombie and pathological liar.
There is a link for "Report abuse", but none for "Report excellent abuse". Pity.
outside cybersecurity experts
Hopefully not one of the "cybersecurity" outfits taken down previously by actually skilled hackers.
One could even rebuild that Kunduz hospital wrecked by US incompetents
So its the girls fault?
Rather than teachers/parents suggesting that science and technology are not areas to be studied by girls?
This falls into "girls don't have their own minds" kind of trap.