Re: Recursive programming
See replies to IdeaReforecasting.
2545 publicly visible posts • joined 7 May 2012
It is possible to upgrade without a Microsoft account, though they do their utmost to bury that option behind the I can't be stuffed I give up where is the darn thing barrier.
If you haven't found it yet, you need to go into the create Microsoft account button After upgrade and in there you will find the option to keep your regular account.
A diisrbed person wielding a knife will do less damage than the same person with access to a firearm. Safety is clearly a relative concept. Until you can adequately address the reasons people inflict violence upon each other (substance abuse, mental health, jealousy, rage, etc) then you can limit the damage they do by controlling access to weapons and ammunition.
Most would argue that the general public should not be permitted to carry biological weapons. It would be ridiculous for me to assert that because people kill each other with guns anyway that there would be no benefit to banning such weapons.
Stricter gun control does reduce murder and suicide rates. You can look at these rates in Australia are and post 1996 when certain classes of weapons were banned. It isn't the only factor (see USA cc Switzerland) but it is a bit mind numbingly crazy to think that there is no link at all against the available evidence.
> But on the whole they don't actually do it (and if they do, are they not likely to be quickly outed as malware?)
Possibly, but it would be easy enough to hide if you truly cared. Many applications have legitimate reasons to contact the internet and you can't tell what is in an encrypted packet. Just google search for how many of your favourite freeware applications bundle OpenCandy into their installer. Now it is not necessarily spyware but it does look at what is installed on your computer and phones home so the boundary gets pretty blurred. And it gets installed with everything from uTorrent, Daemon tools, Foxit Reader and PDFCreator. It is nearly impossible to install an application these days without some hidden checkbox in some screen on your installer that installed some ask toolbar.
And diagnosed by Malware by whom? Seriously most AV companies are just as bad. Adobe tries to install McAfee whenever you update something.
Applications running as pleb users in windows, Mac and *nix still have read access to your personal files in my documents or home. They can all in default configuration establish outgoing collections and do whatever they want. The only difference between wintel land and the mobile space here is that if you want access to the APIs that return that data or establish those connections then you are forced to disclose it.
The problem with Telstra is that they were vertically integrated providing back-haul, connections to the premise as well as the retail side. This is an inherent conflict of interest making it more difficult for retail competitors to negotiate access to the connections.
Electricity market is a better example, where you have a single company responsible for "wires and polls" that purchases energy from a set of "generator companies" which is retailed by a set of retailers. You get benefit of competition at the generation and retail ends without cost of duplication at the wires and polls side. That the grid overspends on wires and polls putting multiple times the impact of the carbon tax on prices over the past few years relates to a silly lack of foresight by the government who make it in the companies financial interest to "gold plate" (unnecessarily upgrade or replace) the polls and wires. By illustrating that they are investing in the infrastructure, they are permitted to charge more at wholesale which means the retailers pass this on; but that is a problem for another day.
The NBN is still much better value for money under this sort of model because you don't need to pay for TPG fibre running side by side with Telstra, Optus, iiNet and customers can move from provider to provider without being told there is no room at the exchange.
Maybe they need these guys?
>I don't want every hacker on the internet to be able to address every light bulb and every sensor in my house individually.
Oh don't worry about that. All comms will be completely secured using openSSL with session keys generated by Dual_EC_DRBG. Try to keep up.
It depends what you mean by source. Compiled executables are pretty much source code written in assembler. Then you have the JIT compiled stuff like Java or MSIL produced by .NET.
You actually have to go through reasonable effort to obfuscate your code during the build process if avoiding others copying the logic is important to you.
But in most applications the GUI is only a small (relatively speaking) component of the application. I am not sure that the suggested approach would do a great job at reversing out the business objects or DAL or the logic contained in any stored procedures.
Otherwise you are basically looking at a screen recorder.
One of the most popular in use versions of a IDE that is commonly used in business applications screws up anchored points for visual components when you use screen scaling. The newer versions don't but they require substantial rework to support.
I won't mention names but I did get a chuckle out of the irony of your handle.
>If a manufacturer wanted to really revolutionise the world of tablet and mobile phone screens, they'd make non-reflective ones.
To be fair, Samsung have finally copied a real work useful feature from Sony in the s5 with it apparently now able to survive a drop into a kitchen sink.
Such blatant copying hasn't been observed since they stole swipe to unlock from Sony's 1980s walkmans.
Whilst you are right that the penalty of any offence is by design more costly than doing something the right way to begin with, the punishment is the job of the court not the plaintiff. Apple are free to mention damages due to lost licencing revenue or alternatively due to lost profit if they did not intend to licence it out. They can even do some sums and claim the higher of the two figures. But if the court finds Samsung guilty then the court will take such damages into account as well as any disincentives (including any disincentive to frivolous lawsuits that seem increasingly necessary).
They are pretty harmless unless you pick them up or sit on the bog without checking. Nothing like this which infests the Vulture South offices or worse still one of these. At least some of the sheep are OK.
Put it another way then, if collisions were not possible then you would have a very effective compression algorithm.
The number of unique hash values is 2^size of hash. So for md5 that is 2^128 possible target values. So given a source set containing 2^128 + 1 unique pieces of data, at least 1 must clash.
The challenge posed by the OP requires you to not only find a collision but to do so in a way that preserves the image information and doesn't make your cat picture contain 500MB of nonsense in its EXIF detail. That is the unfeasible part.
>I still don't understand why they had enough time to turn the jet but not enough to radio a distress
There is a possibility that whatever incident also took out their radio or the pilots were overcome before they could take that sort of action.
Question for the cryptographers here. If I have two RNGs, one "good" and one compromised and I XOR them, does this result in another "good" RNG or is it slightly or wholly compromised by the input that is compromised? To me on the surface it would seem to still be "good" but I don't know why I think that.
Assuming for a minute that I am right here, surely the best available RNG would be basically an XOR across as many RNG streams as you can access?
Since when is an atom a unit of measurement of height? For a start, are you referring to the 32 pm helium atoms or the 200+ pm caesium atoms? Why stop at atoms? Protons are a lot smaller at 1.7 fm but I digress.
2D exists only as an abstract concept to help us to work with surface areas and planes. Just because something is abstract doesn't make it any less useful (see √-1 for example).
So small; yes
impressive; yes
Could be considered 2D for many purposes; of course but so can a piece of paper.
2D; nope