Probably why I couldn't reach NeoGAF for most of yesterday, unless I went through tor. Which I did, because I'm a man and I have my needs.
Seeing a lot of pro-russian "psyops" on one local forum attached to a news outlet focused on economics, so much so that it's pretty obvious that it's organized. Massive amounts of downvotes on anything negative to the pro-russian side, and weak conspiracy theories written in broken english moderated up.
Not sure why they're wasting their time, but there you go. I guess the proud Cheka men have nothing better to do than troll forums.
The Titan-Z was and is a PR product. It was conceived simply to create buzz around nVidia. They had the misfortune that AMD put out a better card before they could get the darn thing to market though. First they delayed it, then as pressure mounted they finally sneaked it out without much of the ado they were hoping for. I doubt there exists or will ever exist more than a couple of hundred Titan-Zs IN THE WORLD.
Anyone who tells you that this card "is for X" where X is something else than PR is wrong and/or lying. It doesn't make sense anywhere.
Here's a new sneaky approach, less destructive but so far effective: U.S. Marshals Seize Cops’ Spying Records to Keep Them From the ACLU
Very disappointing. So it's almost exactly the same price as the products that are already out but using 2x nm NAND. Oh well, I guess it's my fault for thinking Crucial would actually make a move here.
There seems to be a step missing from A (that's not how memory works) to B (therefore uncomputable). The premise that memory isn't lossy sounds like rubbish, even IF it's perhaps not so simply a question of 'read errors'
I recently watched this talk, Modeling Data Streams Using Sparse Distributed Representations, which seems to be able to represent memory in a layered and lossy way perfectly fine in a computer.
Windows Media Video 9 files without any identifying suffix in the downloadable archive. Good going.
The -Wunreachable-code has been removed, because it was unstable: it relied on the optimizer, and so different versions of gcc would warn about different code. The compiler still accepts and ignores the command line option so that existing Makefiles are not broken. In some future release the option will be removed entirely.
It's a bit like asking why we aren't all writing novels with a markov chain generator.
Ignoring the premise that Android is "impossible to navigate" (which is false), as for this specific quote:
That’s fun for them; but they’ve made the mistake of not understanding how their motivation differs from the rest of us
No, I understand perfectly well, it's just that I don't care about your needs. Why should I put your needs first? Are they more important than mine? What's the end game here? If Android copies iOS then it's called out for that by people like you ("no innovation!"). If it doesn't then it's "impossible to navigate because it's not exactly like iOS".
Is there a middle road where tinkerers and "normals" can coexist on one OS? Perhaps. But maybe it's okay that to have the existing distinction between the OSes. Or maybe iOS should be more open to tinkerers? Why don't you head over there and suggest that they simply don't understand that iOS is too hard to tinker with.
(Again, I don't think there's acutally anything major that'd make Android hard to use. In fact, I recommended an Android phone for my mother, knowing full well that I risk being the designated support (which I don't want to be).
"Our goal was to analyse Tor source code and determine any vulnerabilities in the system. We set up an internal Tor network to analyze..." http://apps.washingtonpost.com/g/page/world/nsa-research-report-on-the-tor-encryption-program/501/
One slide mentioned this. It said that the node exploitation route was improbable due to technical and legal difficulties.
The on-site computer (a CP 818) REDACTED and demodulated the signal, then scanned the plaintext transmissions for key words. The system would alarm on . recognition of high-interest text, and the operators would react with special processing and forwarding routines.
So it DECRYPTED and demodulated the signal you say?
(1st para, p.18 / 373).
I did that yesterday.
Then I yelled at the phone for not charging.