Comment Better algorithm (Score 0) 177
I have a better algorithm... written in one line of perl:
print "Reverse";
Accuracy: 73%
I have a better algorithm... written in one line of perl:
print "Reverse";
Accuracy: 73%
Now that server time has reduced in cost, you can add continuous integration to a project and make full documentation a requirement.
For example, here is a CI tool for KDE which tracks missing documentation at English Breakfast Network http://ebn.kde.org/
Percentage of US consumers using broadband 74%
http://www.forbes.com/sites/gr...
Percentage of US marketshare served by Comcast 25%
http://www.dailytech.com/Marke...
Percentage of Comcast customers on IPV6 30%
RTFS
Percentage of people that use Google 100%
http://google.com/
ASSUMING NOBODY ELSE HAS IPV6 EXCEPT COMCAST 5.5% PRODUCT
Google says 4%
The correct solution(1):
Recover costs from wars in the middle east this millennium from taxes added to gas consumption, domestic or foreign, until repaid.
This would be a ~80 per gallon if spread over 10 years.
This is assuming we fought the war "for oil", whatever the hell that means.
The correct hard ball approach is: I am recording this call and forwarding to my local cable franchise authority.
This is the entity that your local franchise must go through to offer service in your area and they are the ones that set rules like the number of seconds you may be placed on hold until you get a human without them having to pay a fine.
Fast forward... election results: a democrat or republican will win
But just imagine a current attack vector today:
* Remotely infecting a personal computer -- Demonstrated, publicly available
* Tethered infection of PC to mobile phone -- Demonstrated, publicly available
* Bluetooth infection of common SOCs on pacemakers -- Not published
* Pacemaker delivery of ill effects to user -- Demonstrated, details not public
As more consumer-friendly devices are produced that have a close connection to humans and are marketable, the number of attack vectors increases.
Does anyone remember the days when you might expect one of the comments here to provide an analysis of MA laws and find the line that makes their "corporations are exempt" argument void?
I know, right, and it was like: hey what are all you new people here doing with these 4-digit user IDs?
After joining Mensa, you get invited to plenty of card games, speeches and nerd discussions. But you're still dealing with the general public.
Now, if there was a second test... where then only let in people that care about their appearance, maintain good eye contact, have a modicum of physical fitness, then I would definitely like to join that inner circle.
How is this different than SlingBox?
And yes, this is the correct way to deter behavior. Rather than another cease and desist which is probably based on no more legal authority than "I'm wearing a badge"
That sounds like a great response from the police...
And what exact public law is being broken now?
This is correct. MD5(salt + data). Salt is same for EVERY MD5 operation. Create the file and then delete the salt, done. This is called keying.
Hey that's cute, does anyone remember XUL from last decade?
I think that one is easy... just ask him "Have you ever received an National Security Letters?". There are only two responses to that question: "No" or NULL.
Do you suffer painful elimination? -- Don Knuth, "Structured Programming with Gotos"