|
Why not use this little AI-powered tool to turn a photo of your face into a 3D model, then idly spin it round, pondering exactly how and when super-intelligent robots will liquidate your body and replace you with a perfect 3D-printed simulacra. Worth it just to see the extra-creepy photo of Mark Zuckerberg
|
|
|
|
|
Quote: Resting on a foundation of existing research programs are newly formulated thrusts that all sum into the Electronics Research Initiative, a four-year push with anticipated annual investments in the $200 million range.
Quote: An endpoint of the IDEA program would be the capability for a “no human in the loop,” 24-hour design framework that would enable even nonexperts to design complex electronic technologies, including mixed-signal integrated circuits, system-in-package modules with multiple integrated circuits (ICs), and printed circuit boards. Non-experts ?[^].
More coverage here: [^] Quote: The Domain-Specific System on a Chip (DDSoC) program of the Architectures thrust is driven by the need to rapidly develop multi-application systems through a single programmable framework. Such a framework would enable SoC designers to mix and match general purpose, special purpose (e.g., ASICs), and hardware accelerator coprocessors, as well as memory and I/O elements, into easily programmed SoCs for applications within specific technology domains. One such domain is software-defined radio, which encompasses mobile communications, satellite communications, personal area networks, all types of radar, and applications in the electronic warfare space.
«While I complain of being able to see only a shadow of the past, I may be insensitive to reality as it is now, since I'm not at a stage of development where I'm capable of seeing it. A few hundred years later another traveler despairing as myself, may mourn the disappearance of what I may have seen, but failed to see.» Claude Levi-Strauss (Tristes Tropiques, 1955)
|
|
|
|
|
Security researchers at Cisco Talos discovered that download servers used by Avast (the company that owns CCleaner) were compromised to distribute malware inside CCleaner. But... did it clean it?
|
|
|
|
|
Lucky me, I was too busy and lazy to install the corrupted build. When this became known, I had the version before this.
|
|
|
|
|
Visitors to The Pirate Bay have discovered JavaScript code in the website that 'borrows' your processor for the sake of mining Monero digital coins. "If you are not paying for it, you're not the customer; you're the product being sold"
|
|
|
|
|
Well what do you expect from pirates, history shows that they simply can not be trusted
|
|
|
|
|
|
In the age of agile development and DevOps, developers are increasingly required to take responsibility for all aspects of their code - from quality to maintainability, deployability, scalability and security. OMG
|
|
|
|
|
No. Next question.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
|
While the title of the article might be mildly inflammatory, I thought it did a good job at looking at some of the aspects of TDD that drove me straight to BDD.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Nathan Minier wrote: BDD
Beer Driven Development?
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
It's a corollary to Jeff Bezos' rule: "Only have enough people in a meeting that two pizzas can feed."
"Always have enough beer for your developer team."
TTFN - Kent
|
|
|
|
|
Bourbon.
"There are three kinds of lies: lies, damned lies and statistics."
- Benjamin Disraeli
|
|
|
|
|
Each to their own poison
If you have an important point to make, don't try to be subtle or clever. Use a pile driver. Hit the point once. Then come back and hit it again. Then hit it a third time - a tremendous whack.
--Winston Churchill
|
|
|
|
|
developers are increasingly required to take responsibility for all aspects of their code - from quality to maintainability, deployability, scalability and security.
So before Agile/DevOps, we were responsible for pretty much nothing? Ah, that explains it!
|
|
|
|
|
A quantum computer has simulated the largest molecule to date. For all your Beryllium hydride simulation needs
|
|
|
|
|
Contributed to the Eclipse project by IBM, the OpenJ9 JVM underpins the IBM SDK, Java Technology Edition product that is a core component of many IBM Enterprise software products. "Something old, something new, something borrowed, something Blue"
|
|
|
|
|
The distinction between security.txt and robots.txt is that security.txt will be used to communicate a company's security practices only, and is likely to be read by humans, rather than automated scanners. I'm sure nothing bad will come of conveniently sharing your email and phone number on the Internet
|
|
|
|
|
That's a great idea. Use robots.txt to tell everyone in the world directories and pages you don't want them to see and then use security.txt to allow spammers to get your email and phone number.
|
|
|
|
|
Therefore I propose a new standard file: passwords.txt. A file that will list all the passwords that are not allowed to be used by unauthorized people. A decisive blow to the hackers.
!false - It's funny, because it's true
|
|
|
|
|
Scripting and the command line are important—but not the only way to do things. Oooh. Shiny (just like most sysadmins I know)
|
|
|
|
|
And you get one of these for free [Hula]
|
|
|
|
|
While it might seem like Agile isn't working for you, those might just be growing pains or easy mistakes to fix. Don't give up on Agile. Lack of flexibility?
|
|
|
|
|
Maybe its the PM's that developers give up on?
|
|
|
|