|
What happens when a file gets executed in Linux? What does it mean that a file is executable? Can we only execute compiled binaries? What about shell scripts then? If I can execute shell scripts, what else can I execute? Finally, the year of Linux on the desktop.
|
|
|
|
|
New memory offers huge capacities and persistence, but fits in a DDR4 slot. Is it too pessimistic to read this headline and think, "Oh goody, something else hackers and malware can use to screw us over."
|
|
|
|
|
Sean Ewington wrote: Is it too pessimistic to read this headline and think, "Oh goody, something else hackers and malware can use to screw us over."
No, that's just realistic (sadly).
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
Attackers can cause potentially harmful hard drive and operating system crashes by playing sounds over low-cost speakers embedded in computers or sold in stores, a team of researchers demonstrated last week. As Bat Computer crashed for the umpteenth time, Batman regretted putting his computer in a cave filled with bats.
|
|
|
|
|
Attackers can definitely harm hard drives using hammers.
|
|
|
|
|
Lockport, New York, school district have purchased face recognition technology as part of a purported effort to prevent school shootings. "A lot of people at this budget meeting are pitching things like more textbooks and education programs, but I have just two words for y'all: Smart. School."
|
|
|
|
|
Google is drawing up a set of guidelines that will steer its involvement in developing AI tools for the military, according to reports from The New York Times and Defense One. A drone may not injure a human being or, through inaction, allow a human being to come to harm. No wait ...
|
|
|
|
|
Oh good, our service men and women will be armed with Google home pods that negotiate peace settlements based on the facial recognition and knowledge of the adversaries facebook account, shopping trends and smartphone habits. The other guys will be stuck negotiating with mindless killing machines. Does everyone get a ribbon after the war is over too?
|
|
|
|
|
Upon signing up, soldier gets handed an iPod.
"Where's my gun?"
"We no longer use guns; we dox the enemy!"
|
|
|
|
|
A couple of Gartner analysts have recently claimed that Windows is "collapsing"—that it's too big, too sprawling, and too old to allow rapid development and significant new features. From the archives—One PC user ponders switching sides as Windows seems to lose its "wow."
|
|
|
|
|
What a load of whiny crap. The most laughable moment is when he writes "organizations like Gartner depend on trolling to drum up business" without any self awareness.
I've used Macs many times over my career and if Windows apps "suck", then there aren't many printable words left to describe Mac apps. Abominations may be one, but most my words are much harsher. And the worse offender really is Apple.
Another silly moment is his examples of API inconsistencies, most, if not all, of which are documented. If this is what's tripping him up, I advise him to find another profession. (If he wants to gripe, at least unload more on DirectX and the grotesqueness of COM. On the other hand, there is nothing more "fun" than porting an app to Linux/Apple/BSD and eliminating features because there is no support for them.)
|
|
|
|
|
Deep learning has been at the forefront of the so called AI revolution for quite a few years now, and many people had believed that it is the silver bullet that will take us to the world of wonders of technological singularity Memories made in the coldest winter
|
|
|
|
|
The Git community has disclosed an industry-wide security vulnerability in Git that can lead to arbitrary code execution when a user operates in a malicious repository. Git 2.17.1 and Git for Windows 2.17.1 (2) were released and include this fix.
|
|
|
|
|
Have they yet announced the June 2018 Git Security Vulnerability?
|
|
|
|
|
Users of the NPM JavaScript package manager were greeted by a weird error yesterday evening, as their consoles and applications spewed a message of "ERR! 418 I'm a teapot" whenever they tried to update or install a new JavaScript/Node.js package. JavaScript developers from all over the world received the error, and not just in certain geographical regions.
|
|
|
|
|
Sean Ewington wrote: "ERR! 418 I'm a teapot"
Shouldn't this apply only in tea-drinking countries?
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Thankfully JavaScript has never been my cup of tea.
/ravi
|
|
|
|
|
The Wall Street Journal has learned that the US Equal Employment Opportunity Commission is investigating claims that Intel's large-scale layoffs discriminated against older employees. Workers claim Intel was getting rid of older staff.
|
|
|
|
|
If these companies are making bank off of our data and aren’t even managing to keep it safe, shouldn’t we at least get a small cut of the action? 26-year old Londoner Oli Frost thinks so, which is why he put all of his Facebook data up for sale on eBay last weekend. “I realized that I’d been selling my data for free for ages, and decided it was time to cash in.”
|
|
|
|
|
The most surprising result of the benchmark is that LuaJIT’s FFI is substantially faster than C. It’s about 25% faster than a native C function call to a shared object function. How could a weakly and dynamically typed scripting language come out ahead on a benchmark? Is this accurate?
|
|
|
|
|
RTFA (Read The Full/Fine Article). He makes an interesting case.
Freedom is the freedom to say that two plus two make four. If that is granted, all else follows.
-- 6079 Smith W.
|
|
|
|
|
Data brokers in Vermont will now have to register as such with the state; they must take standard security measures and notify authorities of security breaches (no, they weren’t before); and using their data for criminal purposes like fraud is now its own actionable offense. If it’s as successful, other states may soon imitate it.
|
|
|
|
|
I do wonder if Vermont has the infrastructure in place to handle all one of the registrations. Or none? Can their system handle null records?
|
|
|
|
|
Hi, I wrote my new favorite hash table. This article begins, "Hi, I wrote my new favorite hash table."
|
|
|
|
|
Message Removed
modified 31-May-18 10:35am.
|
|
|
|