|
PeejayAdams wrote: You know, the one where we just use incremental version numbers and rely on people's instinctive ability to realise that version 10.3 is more recent than version 10.2?
MS product version numbers and names have been all over the place ever since Bill Gates decided to call Windows 4 Windows 95.
But usually there will be another number somewhere that follows something like the scheme you cite. I.e., the bigger the number the more recent the version.
Kevin
|
|
|
|
|
But that had me thinking, how much effort would it be to actually embed machine readable data inside a dubstep track, while ensuring that the sound could be enjoyed by humans as well… wub wub wub
|
|
|
|
|
I'm not entirely convinced that encoding in dubstep is the best approach to ensuring the sound could be enjoyed by humans.
(To be honest, I quite enjoy some dubstep, but it maybe doesn't have the broadest reach)
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
A group of 34 companies has signed the Cybersecurity Tech Accord, an agreement promising to defend customers around the world from hacks regardless of where they take place or who the perpetrator might be. Because they've done such a good job so far, I'm sure they'll be 100% successful
|
|
|
|
|
In order for customers to sign up to be a part of this, they need your name, age, government identification info, and facebook status.
|
|
|
|
|
The company is also using its processors’ performance monitoring to detect malicious code. Will it render pretty pictures while doing so?
|
|
|
|
|
|
its flagship operating system was too big and too unwieldy for what it had in mind.
I guess free is an argument one can't counter when the other option is "fix it."
|
|
|
|
|
Following the release of Linux kernel 4.16, Linus Torvalds has said that the next kernel will be version 5.0. Or maybe it won't, because version numbers are meaningless. Mission accomplished?
|
|
|
|
|
In this blog post, I’ll show how to port business logic from WPF and build a phone- and tablet-friendly mobile app for Android, iOS, and UWP. Existing C# code can often be re-used with minimal changes, and the user interfaces can be built using Xamarin.Forms XAML to run across platforms. You know, for all those Windows phones users
OK, it's cross-platform, but I needed to rub some salt in WP wounds
|
|
|
|
|
Public cloud services are now in use in 97 percent of organizations, but one in four have experienced data theft and cloud-first strategies are on the decline. The rest just haven't noticed yet?
|
|
|
|
|
Automated source code analysis of 33 web applications has found that 94 per cent of them have at least one high-severity vulnerability, according to security biz Positive Technologies. Sorry, were we supposed to fix those?
|
|
|
|
|
El Reg: Automated source code analysis of 33 web applications has found that 94 per cent of them have at least one high-severity vulnerability, according to security biz Positive Technologies.
so..
The owners of the 32nd refused to share their source?
The 33rd is so broken it won't even start.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, weighing all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
--Zachris Topelius
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
|
|
|
|
|
In this day and age, there are a seemingly infinite number of things that are pulling your attention to various places. With the invention of the computer and the internet, people are always trying to take your focus through texting, calling, social media, forums, and email. Is that what they're calling cubicles now?
|
|
|
|
|
The article rather assumes some degree of control over your workplace. If you're not working at home, there's nothing here that you can apply in the noisy, open-plan, anti-development environment that you probably find yourself working in.
98.4% of statistics are made up on the spot.
|
|
|
|
|
I managed to get moved to the lab, where the other half of my team (aka my colleague/senior) got moved some years ago.
It would be nice, except that the whole f************** office steps by at least two dozen times a day to waste my coworker time, improvising meetings in the lab while we have a conference room to be used by royal decree for such occurrences.
The average noise decreased but the intensity and frequence of concentration breaking noise increased. Someday I will end in the newspapers.
GCS d-- s-/++ a- C++++ U+++ P- L+@ E-- W++ N+ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t+ 5? X R+++ tv-- b+(+++) DI+++ D++ G e++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
|
|
|
|
|
Researchers demonstrate the entanglement of 20 qubits that work as a true albeit small quantum computer From "5-10 years from tomorrow" to "5-10 years from tomorrow"
|
|
|
|
|
My God! It's full of cats! (In Dave Bowman voice, from 2001: A Space Odyssey)
|
|
|
|
|
State-sponsored Russian hackers are actively seeking to hijack essential internet hardware, US and UK intelligence agencies say. In Mother Russia, routers rout you?
|
|
|
|
|
Is this the joint announcement from the Department of the Bleeding Obvious and the Ministry of the Self-Evident?
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
Dolby Laboratories chief scientist Poppy Crum tells of a fast-coming time when technology will see right through people no matter how hard they try to hide their feelings. "Can't read my, can't read my... No he can't read my poker face"
|
|
|
|
|
Xamarin (and before that, Mono) allowed .NET code to run on multiple platforms for years. These days, there’s a new push in cross-platform with .NET Core and .NET Standard. This post looks at the history of code sharing in .NET and where cross-platform .NET is going with Core and Standard. "Those who do not learn history are doomed to repeat it."
|
|
|
|
|
Hackers are leveraging an IIS 6.0 vulnerability to take over Windows servers and install a malware strain that mines the Electroneum cryptocurrency. People do actually use WebDAV? Wow, learn something new every day.
|
|
|
|
|
Hackers are increasingly targeting "internet of things" devices to access corporate systems, using things like CCTV cameras or air-conditioning units, according to the CEO of a cybersecurity firm. Interesting crossover between the Ocean's Eleven and Finding Nemo movies
|
|
|
|
|
"They then found the high-roller database and then pulled that back across the network, out the thermostat, and up to the cloud."
Go fish.
|
|
|
|