|
With C++11 we got the possibility to define our own suffixes. They can be applied to integer, floating point, character and string literals of any flavor. Literally the best new feature
Yet another way that you can make your C++ code look like "not C++" code.
|
|
|
|
|
One of those features that is great when done right, but can be super confusing if not. I added custom suffixes in some recent code and then took them out when I found myself repeatedly looking at the header to remind myself what they were (they can be comparable to excessive abbreviations.)
For time, though, they are awesome: 1s or 100ms.
|
|
|
|
|
Yeah, I was thinking of saying, "Please read the 'A word of caution' five times first" with this one. I see it being useful in some cases, but hella-confusing in most (like his string example at the bottom of the article).
TTFN - Kent
|
|
|
|
|
That string example looks just fine to me, but relies on a couple of other features introduced. Compared to the alternative it replaces (listed above), it offers a damn sight more expressiveness without runtime cost - exactly what I expect from new C++ features.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
Researchers Martin Abadi and David Andersen demonstrated that neural networks can devise a simple encryption technique using machine learning. Oh great. Now SkyNet can talk about us behind our backs.
Or in front, as it's encrypted.
|
|
|
|
|
Yes, but can they invent their own decryption?
|
|
|
|
|
Researchers at the Georgia Institute of Technology have developed a system that teaches people Morse code within four hours using a series of vibrations felt near the ear. So you'll be ready when the pony express shuts down
|
|
|
|
|
That was a timely bit of research then.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
To make matters worse, there is no fix. "And look on death itself! up, up, and see the great doom's image!"
|
|
|
|
|
Sounds a bit overwrought.
#SupportHeForShe
Government can give you nothing but what it takes from somebody else. A government big enough to give you everything you want is big enough to take everything you've got, including your freedom.-Ezra Taft Benson
You must accept 1 of 2 basic premises: Either we are alone in the universe or we are not alone. Either way, the implications are staggering!-Wernher von Braun
|
|
|
|
|
Dooooooom! DoooOOOooOOOOoOOm! We are all doooooooooooooo...ooo...mmmmmmmmed!
TTFN - Kent
|
|
|
|
|
Again? I thought I was doomed last week? Or was it September? I lose track.
cheers
Chris Maunder
|
|
|
|
|
"...For example, let's say an attacker was able to persuade a user to run a malicious executable, ..."
Well, there goes security...
I'd rather be phishing!
|
|
|
|
|
That was my thought - if you can persuade a user to run a malicious executable, all bets are pretty well off.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
Kent Sharkey wrote: "And look on death itself! up, up, and see the great doom's image!"
Kind of cool actually[^]
DURA LEX, SED LEX
GCS d--- s-/++ a- C++++ U+++ P- L- E-- W++ N++ o+ K- w+++ O? M-- V? PS+ PE- Y+ PGP t++ 5? X R++ tv-- b+ DI+++ D++ G e++>+++ h--- ++>+++ y+++* Weapons extension: ma- k++ F+2 X
If you think 'goto' is evil, try writing an Assembly program without JMP. -- TNCaver
When I was six, there were no ones and zeroes - only zeroes. And not all of them worked. -- Ravi Bhavnani
|
|
|
|
|
In other news, you get someone's passwords by convincing them to open their saved logins, click the show passwords button, take a screen shot of them and then send that bitmap.
|
|
|
|
|
Oracle is appealing a federal court judge's decision striking down its bid for a retrial in a $9 billion copyright infringement suit against Google over the use of Java code in the Android operating system. Apparently, they can't handle the truth
|
|
|
|
|
I'm having a deja-vu... They must have changed the Matrix (actually, Oracle may be changing the Matrix sooner than they release a new version of Java EE ).
|
|
|
|
|
Apple's long-awaited MacBook Pro refresh is finally here and it's... well, pretty much what we expected. What happens if you jam an iPad into a Macbook?
Still, I'm sure it's "Brilliant! Genius! So innovative!"
|
|
|
|
|
No Air laptops!!
(anyway, I will not have the money for nice things (excep for vacations) for another 10 months; knocks on wood that my gadgets hold up up to that point)
I'd rather be phishing!
|
|
|
|
|
The Air is doomed. Along with Apple's consistent and simplified product line.
(Actually, I'm guessing the Air will live for another year or two, then maybe they'll have a MacBook Air SE. In rose gold, natch. And then they'll point to a "partner" who makes one that's actually a little better and cheaper, and then they'll wash their hands of it.
And yes: I miss Steve. Evil but focused and consistent)
cheers
Chris Maunder
|
|
|
|
|
Something tells me Microsoft may have stolen their thunder with the new Surface Studio and the Surface Book refreshes.
Apple look more and more like a one trick pony nowadays - entirely reliant on iPhone revenue.
Good time to sell APPL.
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
New privacy rules require opting-in to sensitive sharing. Don't click here to not reject our never not sharing all your stuff
|
|
|
|
|
Are you kidding me! I'm blocking ads, they want my browser history.
The best way to make your dreams come true is to wake up.
Paul Valery
|
|
|
|
|
This "rule" is federally unconstitutional, as well as state-unconstitutional, such as in Idaho.
Only Congress or state legislatures can write laws which are then invoked upon the people and/or businesses.
A contract between an internet service provider (ISP) and their customer, that being a private person, is what dictates what the ISP can and cannot do with the customer's personal information.
If of the contract the ISP requires the customer to allow the ISP to share the customer's personal information, the ISP has violated the customer's right to that of protecting property (property being whatever we the people so define it as).
You see, an ISP as business is considered a "foreign corporation" in any state, and within the U.S. When they apply for a "business license", they sign a contract to abide by the state and federal laws and constitutions, *just* as if they were the govt itself. What this means is, a business *cannot* inhibit free speech, the bearing of arms, peaceful assembly; basically, a business, just like the govt, cannot impair or deny the rights of the people.
However, public govt schools have brainwashed the masses into thinking otherwise.
Govt: We FORCE you to send your children to a school, or we will take your children away, at gun-point if necessary. This, reader, is not bullying at all (and, bullying is a wrong social culture word, anyway, the masses have been gag-fed). This is forced lethal coercion at its utmost.
So, the FCC, which is an unconstitutional entity, for it entirely impairs or denies free speech at its core, is 'enacting' a rule that is also unconstitutional.
Were the FCC constitutional, the only thing a "rule" can do when they create it is that the rule applies only to the FCC, and no one else.
When an executive branch creates a rule that is forced upon the private citizen, this is not "regulation" or even "over-regulation", this is tyranny at its utmost.
The executive branch is only to abide by and "execute" law, not create near-law-like "rules" and enforce it upon we the people.
This is why HJR5, a proposed amendment to Idaho's Constitution, is wrong. For, it "constitutionalizes" executive "rules".
So, if you are from Idaho, vote NO on HJR5.
|
|
|
|