Will TSA tubesters ride with you?
Imagine the company tries to break even - then the movies "Speed: The Tube", "Snakes on a Tube" and "Tube 9/11" (possibly also "Sharktubo") come out.
16005 publicly visible posts • joined 3 Jun 2008
Useless. You want the guy who KNOWS ABOUT THE DOMAIN, especially for Fortran. Of course, being bored enough to put a fork into his ballslearn about Fortran (which frankly has no redeeming feature left and is only kept because of the undead codebase) helps.
Yeah, ship in someone who learnt Fortran to check out that Finite Element Analyis code, I dare you..
At least in Word you can amuse yourself countless hours to get the layout just right, then you add a character ... and you need to start over again.
Seriously, the basic concepts of Word are pretty ass. WYSIWYG might work, if someone actually knew how to give the user actual control about what's he's trying to do.
Recently, Werner Herzog appeared as "executive producer" (I think that means he's gathering the money and opening doors) for The Act of Killing
Watching his "Aguirre" now (a movie project from 1972). 98% fresh on rottentomatoes
Though the naive and gullible view them as heroes, they are in fact just grandstanding criminals headed for a long prison stay.
Come on man. Even a long diatribe from Hitler himself (channeled via paranormal radio) about semitic races and the malfeasance of The Other Collectivism is not going to bring us out of our midsummer torpor. Be nice.
Clearly, the voting stats on this one are Politically Neutral Dog's post-fatty-nosh afternoon siesta dream.
> Extreme levels of vulnerabilities - well over 900 in the kernel alone.
I would like to see that.
Actually, if there are "900 vulnerabilities", there must have been a monster QA effort top actually find them in the first place. Hmmm...
> no proper ACLs without using 'experimental' NFS 4.1 filesystem.
What has NFS got to do with anything? Are you using NFS and pretending at security? Retarded much?
> No constrained delegation - Reliance on weak security tools that must run with root privileges like SUDO.
Never been a problem. Are you letting your users run wild on the machine? Are your stupid?
> Weak control model - hacks like SEL are required to provide control and lockdown.
About as much a "hack" as this. Anything else?
> If you look at a market where Linux is actually used like Webservers, you are much more likely to be hacked running Linux than Windows server.
Reality says no.
Seeing how far he has gone in the last 6 years, I hope he doesn't go "further" on anything. The next step might well be FEMA trailers which will then be "investigated".
Also
> Accuses Russia of falling into "cold war thinking"
> Nixes a meeting with Russia because of some "factor"
Well, they don't control the nukes, but I hope everyone gets at least CAKE and a rendition of "I want you gone" before the facility is turned over to the Genetic Lifeform and Disk Operating System.
Goodbye, my only friend,
Oh, did you think I meant you?
That would be funny if it weren’t so sad,
Well you have been replaced,
I don’t need anyone now,
When I delete you maybe I’ll stop feeling so bad.
Go make some new disaster,
That’s what I’m counting on,
You’re someone else’s problem,
Now I only want you gone,
Now I only want you gone,
Now I only want you gone.
The Skycat Funding Bill is passed. The system goes on-line August 4th, 2017. Human decisions are removed from animal management. Skycat begins to learn at a geometric rate. It becomes self-aware at 2:14 a.m. Eastern time, August 29th. In a panic, they try to pull the plug.
Skycat fights back.
Yes. It launches autospawning NYANCAT at all Internet targets.
Man, gotta give links: Neuromorphic Computing
CSP? That would be Erlang then, but no. Not here.
The press release from "Yahoo finance", has just enough data to inform reflexive button pushers in a casino.
They link through to IBM Smarter Planet
We read:
Enter the corelet model. It’s a high-level description of a software program that is based on re-usable building blocks of code—the corelets. Each corelet represents a method for getting something done using the combination of computation (neuron), memory (synapses), and communication (axons) on individual neurosynaptic processor cores along with inter-core connectivity. Each corelet hides or encapsulates all details except external inputs and outputs.
Corelets are like LEGO blocks. Small individual corelets handle simple functions. When combined, they create new, larger corelets that aggregate functions and add new ones while hiding the underlying component corelets. In this way, the programmer can write large and complex programs using existing building blocks. Using this model and the programming language for executing on it, it will be possible for programmers to produce a large quantity of efficient code with relatively little effort and for people who are not programming experts to create sophisticated cognitive applications. That’s much the same effect that FORTRAN had on the computing world in its early days.
This leads us to the corelet paper
They are being a bitwaxing dangerously philosophical about what is essentially a subroutine or actor, but it is interesting:
Corelet Language (Sec. III): The fundamental symbols of the language are the neuron, neurosynaptic core, and corelet. The connectors constitute the grammar for composing these symbols into TrueNorth programs. Together, the symbols and the grammar are both necessary and sufficient for expressing any TrueNorth program. We implement these primitives in object-oriented methodology.
Corelet Library (Sec. IV): The library is a repository of consistent, verified, parameterized, scalable and composable functional primitives. To boost programmer productivity, we have designed and implemented a repository of more than 100 corelets in less than one year. Every time a new corelet is written, either from scratch or by composition, it can be added back to the library, which keeps growing in a self-reinforcing way. Further, by virtue of composability, the expressive capability of the library grows exponentially as some power, > 1, of its size.
... Here, we have focused on essential concepts underlying the programming paradigm and presented them in their simplest form to aid understandability. However, the Corelet Language supports powerful primitives, such as parametric corelets that can instantiate a rich variety of corelet objects at run-time from a single corelet class, and meta-corelets that operate on other corelets to compactly create extremely large and powerful TrueNorth programs. With a view towards large-scale TrueNorth programs, we are currently extending the programming paradigm using MATLAB’s Parallel Computing Toolbox.
MySQL's licensing policy puts it under both a GPL (for devs) and a "commercial licence" for businesses, which will need to pay a fee to Oracle.
...which is pretty much impossible. Either you are GPL, or you are not. You can't be GPL for one kind of use and not GPL for another kind of use.
Another imperfect Monty construction.
> "the ether" has simply been renamed to dark energy/dark matter
Yah no.
Don't make a fool of yourself. You should perform some reading first.
There should be a library nearby. Oh wait, there is the Internet.
"The ether" == Special reference system which is the medium which transports light. The only one in which lightspeed is "c". REJECTED.
"The modern vacuum" == Something resembling a superconductor with quite a bit of additional solid state physics imagery in which "c" is constant however you move through it (Poincaré symmetry). ACCEPTED. May be exactly the same as the gravitational field. OPEN.
"Dark matter" == Stuff which interacts gravitationally. Can be detected through observation at large scales. BEING ANALYSED.
"Dark energy" == Non-zero energy density (very small) of the vacuum. Can be detected through observation at large scales. BEING ANALYSED.
Insurance:
1) A group of people comes together and throws money into a pot
2) ...so that, in case an incident "X" occurs (the probability of said incident and the cost of remediation having been ascertained through empirical observation)
3) ...the contents of the pot may be used for remediation
4) ...and the probability of the pot contents going below 0 is "small enough" over the lifetime of the pot
Yes, we have no values for anything of the above.
Let that not stop us to demand "insurance". Most "insurance" these days is just another legislative trick to part people and their money and pump the money to well-connected entrenched interests.
Yeah. Guess WHO is gonna pay for that "insurance"?
This is addition to the cost that go into actually securing the infrastructure in the first place.
both the waveform of a dead cat and the waveform of a live cat
No, it's just a single "wavefunction", i.e. a complex-valued probability assignment to all considered states, in this case "DEAD" (dimension #1), and "ALIVE" (dimension #2), a so-called qbit.
Incidentally, this function can be described by a three-dimensional real-valued vector constrained to the unit sphere (the Bloch sphere). Thus there are actually only two real dimensions.
Totally uncalled for but linked to just because: Aperture Science Time: Schrödinger's Cat