Much less define what "general intelligence" means, beyond "solve problems I can solve, but not necessarily the ones that I can't."
It's a lovely device, really. But windows, eww. I'd get one for myself, but the keyboard doesn't work with Linux, and is too cramped for my ogre hands.
Or equivalently "Graduate students are being exploited."
If enough of them have young kids (and your 40+ years - 10 puts many of your peers in the mid-30s), then they'll be going through the same stuff, only have less experience. Come in as the voice of wisdom and experience. It's useful!
Just don't spend too much time talking about old systems. Some older programmers do that, and it just distances themselves unnecessarily. Having used an older system isn't a technical merit, it's just saying that you're old. Interesting anecdotes, special features, and spectacular failures of old systems, however, are fun to hear.
Here's how I ran my PhD simulations on EC2:
- The AMI downloads a manifest file at startup.
- The manifest has one record per line, two fields per record: the s3 URL of a
- The AMI then runs a shell script (/etc/run.sh) that's been put there by a manifest entry
Shell scripts upload new files to s3 (e.g.,
Other shell scripts stopped/started experiments on these VMs.
Other shell scripts shut down the VMs when I'm done.
The scripts did little more than scan the appropriate machine list from the ec2 tools and ssh into them with a specific command.
At the end, I had some of the experiment-specific scripts quickly have git clone/pull in files I was changing quickly per experiment.
All of it worked really well for me. Nothing fancier than the ec2 command-line tools, bash, ssh, & git necessary.
It's 2012, why does this search engine stuff come up all the time, when it's *so* easy to fix? If they want to publish the names, but not have them come up when people are searching for individual people, shove the list in robots.txt. Not complicated. A moron can figure out robots.txt
This is a known-cyphertext attack using the tile filesizes as identifiers. Build a database of map tiles' sizes and coordinates (x,y,z) from gmaps, then compare against the SSL response stream.
It doesn't say if it's only effective for satellite view.
As another hacked reader, yeah I'm unhappy about this too. Considering that I was donating to wikileaks before, this is just painful.
Stratfor's just come out with their email, 8pm, not great, but here we are. They've done the standard 1yr prepaid monitoring service for identity theft.
I looked around to verify that my CC was actually breached (who knows, maybe it was a card I've already canceled?), but all the primary copies of the CC list seem inaccessible. It'd be lovely if they were taken down before I become collateral damage in all this, but it hasn't exactly been a lucky week.
Canceling the card, and watching the account like a hawk. It's all we can do, and hopefully it's enough.
Pick up one of the pure-google phones. My Nexus S doesn't have it on there.
The backend for quite a few compilers, and a few shader compilers...
On your resume, it'll read like this:
I finished school, and interviewed. While every reasonable CS student on the planet, especially in 2011, can get an actual programming gig, I couldn't. So I took a glorified Geek-Squad gig instead*.
* It doesn't matter what the actual job was. It's in IT and not programming, it'll be read the same as geek squad.
The results of Discovery will be *awesome*.
Blu-Ray, as a disc format is doing well within its relative market. It's just that the disc market is collapsing.
Really, who's buying many discs these days? Who's
Well it does have a screen, hinge, keyboard, and trackpad.
Naughty Google! Very Naughty!