Ender sees the great potential in his team, even in the misfits and castaways, but he also has high expectations for them to reach that potential. That is what I try to do as a leader.
The possibility that I might have flamed and insulted Bill Gates without knowing it really brightens my day. It makes my diminutive heart grow 3 sizes larger all at once. It's like Christmas for me.
Richard Stallman must be turning in his grave.
Curious, because you seem like a native English speaker, what exactly do you think the word 'grave' means?
(I have two kids in elementary school dealing with the whole Common Core/EngageNY/high stakes testing nonsense so I know first-hand what this is doing to our kids and teachers.
I don't know NY specifically, but every 'common core' exam I've looked at so far has questions so simple that kids should be learning them without too much trouble....
I met some kids from Japan who swore they were bad at math. Then I found out they'd gone through calculus in High School. We're not exactly pushing the envelope with what we're requiring kids to learn.....
Any commercial product for which you don't have access to source code is an integration and performance risk.
So true, I've run into the same problem. It doesn't mean you need to only use GPL, but you should try to get the source code when you sign the contract to use the product (you're probably paying enough, anyway).
....an end to bulk retention of telephone "metadata" by the spy agency, by keeping those records in private hands subject to specific queries from the NSA or law enforcement.
It's possibly worth noting here that the United States is a republic, not a democracy.
It's both, get over it. Specifically it's a representative democracy, as opposed to a direct democracy.
In a nutshell, the key extraction attack relies on crafting chosen ciphertexts that cause numerical cancellations deep inside GnuPG’s modular exponentiation algorithm. This causes the special value zero to appear frequently in the innermost loop of the algorithm, where it affects control flow. A single iteration of that loop is much too fast for direct acoustic observation, but the effect is repeated and amplified over many thousands of iterations, resulting in a gross leakage effect that is discernible in the acoustic spectrum over hundreds of milliseconds
Since microphones can't grab frequencies in the Ghz range (where CPUs operate), they can't directly observe individual instructions. But with multiple passes over the same operation, they can use statistics to determine what the instructions were.
Anyone who believes "developed by experts" is a stamp of quality, is in no position to judge others.
Wow, that is a great quote.
1) Does the code work/fill the requirements? (high efficiency might be a requirement, or it might not. Same with cross-platform compatibility).
2) Is the code readable? If not, it doesn't matter how great your design is, people who come after you will rewrite it.
3) Is the code flexible? If not, your design is more a hindrance than a help.
Code that fills all three of those is rare and beautiful.
A good programmer is busy writing / testing code and doesn't have the time or the need to read and remember books
A good programmer is always looking to improve his skill in any way available, including reading.
Now, get off my lawn, if it's not vacuum tubes in accumulators, it's useless! We don't need these newfangled 'registers' and 'assembly languages,' we have patch wires!