November, I think.
I generally have low expectations of sequels, but one of the writers (Dan O’Bannon) is also credited on Alien and Aliens. The trailer doesn’t seem to leave much to the imagination, but given that xenomorphs aren’t exactly mysterious to viewers after eight preceding films, it seems possible that this one might aim to build tension in some other way. I’ll try to keep an open mind.
I followed the links to the upstream source, and found that no, Obama is not urging Biden to exit. (A third party claimed that he expressed some concerns in private, which is quite a bit different.)
This looks like tabloid trash to me. Is thedailybeast.com even allowed in this community?
They fed a neural network billions of sea-surface elevation measurements taken from 172 buoys located off the coasts of the United States as well as the Pacific islands.
Each of these buoys has been recording for a different period of time, says Breunung, but piecing them all together provides “880 years of data” on ocean waves, including thousands of rogue ones that were substantially higher than waves nearby.
Training their computer system on all this data eventually allowed it to recognise the waves that occurred before a rogue wave happened, and to distinguish them from waves that weren’t followed by this kind of event.
“With this approach, we could predict three out of four rogue waves,” says Breunung. “I was surprised.”
Eli Pariser’s TED talk from 2011:
https://www.ted.com/talks/eli_pariser_beware_online_filter_bubbles
because desktop Steam is technically browser with specific website opened.
The Steam client does use Chromium Embedded Framework for its interface, but there’s a lot more to it than just that. For example, Steam Input, Steam Overlay, Steamworks, and Steam Play (aka Proton) which itself is a collection of of nontrivial components.
If you just want an alternative launcher, there is Lutris, but there is no stand-alone Steam client alternative as far as I know.
It might be interesting to see how much functionality could be replicated in an open-source client. Some components, like DXVK and a web engine, are readily available. Others, like Steamworks, are not. SteamDB shows that it’s possible to inspect Steam’s game repositories, but actually downloading from them without Steam (or steamcmd) might be challenging. Goldberg Emulator shows that it’s possible to fool some games into thinking Steam is running, but that’s not enough to run games that include DRM.
Anyone attempting this would have to weigh the time they spend reverse engineering and re-implementing against the fact that Steam can always change its internal services, rendering all that time and effort wasted. And, of course, there would always be a risk that anyone using it (without explicit permission from Valve) might have their account banned.
The interoperability rule for gatekeepers would seem to apply here, meaning that TikTok would have to open up their messaging service to interoperate with other (non-TikTok) platforms. It’s a great idea in principle, but not easy to get right when end-to-end encryption is also important, at least on some messaging platforms. Should be interesting to see how this plays out.
That’s not a blind spot in my comment. See my final paragraph.
It’s only one sentence. Maybe it was easy to miss. :)
Using a tool like this to hide sections of code presented for review places a lot of trust in the automation. If Mallory were to discover a blind spot in the semantic diff logic, she could slip in a small change for eventual use in an exploit, and it would never be seen by another human.
For example, consider this part of the exploit used in the recent xz backdoor. In case you don’t see the problem, here’s the fix.
Rather than hiding code from review, if a tool figured out a way to use semantic understanding to highlight code that might be overlooked by a human (and should therefore be reviewed more carefully), it could conceivably help find such things.
That risk is not just theoretical. I made a test account (on another service; not Signal) using a free anonymous SMS number. A few months later, the account had been hijacked.
Of course, if it’s a disposable account, then having it hijacked after you’re done with it might be a good thing.
Also, when building services that are expected to send HTML email, make sure to generate a plain text version of the content and put it in the appropriate multipart section of the message. Otherwise, people reading in plain text won’t see it unless they’re willing to jump through hoops to do so (and there’s a good chance they’ll toss it in the trash instead).
Bonus points if the plain text part is formatted well.
I block off-site images. It gives a kind of interesting view into how my instance is handling things: Many comment/post images show up as blank placeholders, but some do render, letting me know that my local admins are either caching or proxying them. It’s mostly recent ones that show up, so I assume it’s a cache.
These sites were collecting hand-transcribed data from congress trading disclosures. Unfortunately, the disclosures were almost always made long after the trades. Perhaps that’s why no volunteers have been transcribing data recently.
There is no definitive consensus on the driver of the decline in happiness and rise in unhappiness among young adults, though Blanchflower believes the trend is driven by cell phone and social media usage. “What you need here is something that starts around 2014 or so, is global and disproportionately impacts the young—especially young women,” he says. “Anybody that comes up with an explanation has got to have something that fits that. Other than cell phones, I don’t have anything.”
Regardless of the cause, however, “this is a global problem,” Blanchflower says. “We’re past the point of measuring. We should be out doing pilots, trying to figure out what might work. We should be trying to come up with solutions… Tell me what we can do to help these young people who are in trouble.”
70/30% of the logs, not of the errors. It’s equivalent to what you’re thinking of as market share. (I can’t really blame you for misunderstanding, though; this article is poorly written.)
The proportion of errors is better explained in another article:
In fact, for one particular type of error (decompression, a commonly performed operation in games), there was a total of 1,584 that occurred in the databases Level1Techs sifted through, and an alarming 1,431 of those happened with a 13900K or 14900K. Yes – that’s 90% of those decompression errors hitting just two specific CPUs.
As for other processors, the third most prevalent was an old Intel Core i7 9750H (Coffee Lake laptop CPU) – which had a grand total of 11 instances. All AMD processors in total had just 4 occurrences of decompression errors in these game databases.
In case you were thinking that AMD chips might be really underrepresented here, hence that very low figure, well, they’re not – 30% of the CPUs in the database were from Team Red.
Is Sudachi a Yuzu fork?
Them: GMT, of course.
Me: So that’s 7PM London right now, and changes to 6PM in November?
Them: What no are you stupid. Always 6PM GMT.
Me:* jumps off a cliff*
Sorry, but are you under the impression that GMT means London time, or that it observes British Summer Time?
Suggestion to the dev: Add a (perhaps optional) review step between pushing a patch via ssh and having it show up for consideration by the project maintainers. This would give the submitter a chance to look over what was sent via ssh, allowing for mistakes to be noticed and corrected, and perhaps reducing noise and embarrassment.