The rules are simple: being merely eccentric while swathed in outlandish clothing fails to qualify. Having done an epic amount of street powder while getting handjobs in the groupie van is not enough. Hell, Steven Tyler claims to have spent $3 million on cocaine over the years, but would Aerosmith have sounded one iota different if they’d been straight edge? It’s the same reason Mötley Crüe doesn’t warrant space on this list. Sure, they snorted live ants (actually, that was Ozzy) and mainlined Jack Daniel’s to stave off epic boredom, but their music would have been exactly the same steaming pile of hair regardless.
From 1983 to 1993 DARPA spent over $1 billion on a program called the Strategic Computing Initiative. The agency’s goal was to push the boundaries of computers, artificial intelligence, and robotics to build something that, in hindsight, looks strikingly similar to the dystopian future of the Terminator movies. They wanted to build Skynet.
Indeed, the very phrase “citizen journalist” strikes my ear as Orwellian. A neighbor who is a good listener and cares about people is a good neighbor; he is not in any sense a citizen social worker, just as a neighbor with a garden hose and good intentions is not a citizen firefighter. To say so is a heedless insult to trained social workers and firefighters.
I am not so blind that I cannot see the shadow of the axe when it is hanging over my own neck. – Robert Baratheon to Ned Stark (Game of Thrones Chapter 33) Ned Stark baulked at the idea of assassinating a pregnant young girl. But then it was Ned’s political naivete coupled with his sense of honour that brought about his downfall.
Speculative fiction is the literature of change and discovery. But every now and then, a book comes along that changes the rules of science fiction and fantasy for everybody. Certain great books inspire scores of authors to create something new. Here are 21 of the most influential science fiction and fantasy books.
He used to tell me with perfect gravity that politically he was “a left conservative,” and this quixotic description has a patina of truth to it. Probably more than anything, Mailer was a libertarian and a foe of any system or mind-set that involved the censorious (feminism) or the overweening and the grandiose (imperialism/communism)
Most computers today are fitted with Trusted Platform Module. This is a secure co-processor mounted on the motherboard. The specification of TPMs are published, and an industry body certifies compliance with those specifications. To the extent that the spec is good (and the industry body is diligent), it’s possible to be reasonably certain that you’ve got a real, functional, TPM in your computer that faithfully implements the spec.
Don’t think, by the way, that a thing like Bitcoin can’t be co-opted by governments. A global public ledger is a very good system for everyone seeing if taxes are being paid or not. The network could literally reject transactions that don’t include a tax declaration, and directly pay to a bitcoin account controlled by taxation services. Everything can be subverted.
"There seems to be strong consensus to increase the use of encryption on the Web, but there is less agreement about how to go about this," Mark Nottingham, chair of the HTTPbis working group, wrote in Wednesday’s letter. (HTTPbis roughly translates to "HTTP again.")
In this article I’d like to illustrate some of the implications of this change with respect to the IPv6 treatment of packet fragmentation by taking an in-depth look at the IPv6 packet flows and why and how this change to packet fragmentation management can cause service-level disruption
I once happened to visit Google’s offices in Victoria, where there’s a live stream of people’s queries on a huge flat screen. Most of them were in Japanese. My host, who speaks Japanese, glanced at them and looked at her watch. “Recipes,” she said. “It’s 7pm in Japan, people have just got in from work and are thinking about what to cook.”
On the morning of Thursday, July 12, 2012, Yahoo’s interim CEO, Ross Levinsohn, still believed he was going to be named permanent CEO of the company. He had just one meeting to go. That…
To put that in context, the iPhone 5S beats my 2008 15-inch MacBook Pro by a small measure in the Sunspider benchmark (with the MacBook Pro running the latest Safari 6.1 beta). The iPhone 5S is, in some measures, computationally superior to the top-of-the-line MacBook Pro from just five years ago. In your fucking pocket.
Through the foundation, Bill, Melinda and Microsoft maintain pharmaceutical patent investments, tobacco investments, investments in alcoholic beverages, petroleum investments, investments in experimental and controversial crops, and even investments in news/media. Gates need not even pay tax, though he keeps control of the assets and uses that control to influence private and public policy.
As security practitioners, we care about which vulnerabilities matter. Much like looking at a dictionary doesn’t tell you anything about how often people use a common word such as “the,” a vulnerability database tells one nothing about which vulnerability trends matter.
Many networking engineers and researchers express the opinion that 100 milliseconds latency is “good enough”. If the Internet’s worst latency (under load) was 100ms today, indeed, we’d be much better off than we are today (and would have space warp technology as well!). But the speed of light and human factors research easily demonstrate this opinion is badly flawed.
Some critics see high rise living in the CBD as ‘vertical sprawl’, but its sustainability credentials are exemplary, it’s eminently walkable and it helps make housing affordable elsewhere in the metro area…
Not all stateful inspection firewalls are equal. Some handle packets slightly differently than others. For example some (like Checkpoint, Netscreen and others) let non-SYN packets to permit rules generate new state table entries. Some (Cisco, Netfilter and others) will only generate a state table with proper session establishment (must see TCP three packet handshake).
When questioned at a press conference as to whether she saw any meaning in this slump, Ms Gillard responded: “Fuck them. Fuck the lot of them. They deserve Abbott, those fucking hyper-critical sheep. I mean seriously, he hasn’t even got a platform to run on; all he’s done is criticise every single fucking move we make and then failed to meet us halfway when we try to actually govern the country for you fuckwits. I give up. Enjoy your dial-up internet and corporate overlords. I’m moving to New Zealand.” Gillard’s press team later issued a correction to this statement, clarifying Ms Gillard had actually mean to say, “No”.
Due to the limited CPU capabilities of mobile devices, the high round-trip times of mobile networks, and the rapid growth of mobile usage, it is even more critical to understand and optimize for mobile performance than for the desktop.
Disclaimer: This is not your regular morning coffee. This is not your store bought coffee. You will not find this coffee at your local diner or at your sissy Starbucks. Death Wish Coffee is the most highly caffeinated premium dark roast organic coffee in the world. This is Extreme Coffee, not for the weak.
WAFs themselves are an application, and as such they provide additional attack surface for your adversaries. Their goal isn’t necessarily to compromise the WAF itself (though that’s sometimes a bonus) – the short-term need is evasion.
man vs seriously hot chilli - the return (this man never learns)
this time the footage was taken at work during lunch... entertainment for the colleagues no doubt... video courtesy of milkman chilli courtesy of milkman (7 ...
if i didn't love the stuff so much i wouldn't think about making this a regular thing....
thanks to the lovely folks at www.slowbeer.com.au for providing the backdrop... this is hopefully the first of many vignettes into nature's most potent/delic...
sslh accepts connections on specified ports, and forwards them further based on tests performed on the first data packet sent by the remote client. Probes for HTTP, SSL, SSH, OpenVPN, tinc, XMPP are i...
Kanye Wes Anderson is a Tumblr posting screencaps of Wes Anderson moves mashed with Kanye West lyrics resulting in a good time for all. Plus, Kanye and Wes totally hang out.
(via @ryansholin) Tags: Kanye West remix Wes Anderson