|
|
|
|
yknow what. if i could upload pics and caption them to think lynx, the images can be connected to by the caption. going even farther, you could incorporate your image comparison tool. going even farther, imagine all the boobies |
|
|
|
There are no conversations. |
|
|
cauz |
Aug. 5, 2014, 10:28 a.m. |
|
|
|
James Irwin |
The Earth reminded us of a Christmas tree ornament hanging in the blackness of space. As we got farther and farther away it diminished in size. Finally it shrank to the size of a marble, the most beautiful marble you can imagine. |
Leos Carax |
My films start with images, a few images and a few feelings, and I try to edit them together to see the correspondence between these images and these feelings. |
Orson Welles |
If you've noticed that I don't use long takes, it's not because I don't like them, but because no one gives me the necessary means to treat myself to them. It's more economical to make one image, then this image and then that image, and try to control them later, in the editing studio. |
Janina Gavankar |
IMDb only lists specific projects. It doesn't list theater, commercial, and most non-union work. You also have to pay to upload your reel to most sites, and some places still make you walk your DVD into their physical location. |
Chico Hamilton |
We incorporate various electronic devices - the echo plugs and things like that. Actually, all we're trying to do is make that sound musical. As opposed to just making sounds, we do musical things with them. |
Darell Hammond |
A cultural shift is needed to incorporate exercise into our children's daily lives. |
Ernst Haas |
Without touching my subject I want to come to the moment when, through pure concentration of seeing, the composed picture becomes more made than taken. Without a descriptive caption to justify its existence, it will speak for itself - less descriptive, more creative; less informative, more suggestive - less prose, more poetry. |
Alison Jackson |
Because Bin Laden's culture doesn't permit the worship of images, they understand how powerful images are. We wouldn't have thought of creating a visual bomb. In a way, he's chopped down two iconic buildings, and used our very truth imagery, to express himself. It's fascinating... I mean, dreadful. |
Anais Nin |
I will not be just a tourist in the world of images, just watching images passing by which I cannot live in, make love to, possess as permanent sources of joy and ecstasy. |
Bruce Jackson |
First, those images help us understand the general and specific magnitude of disaster caused by the tsunami. The huge outpouring of aid would not have happened without those images. |
|
|
I basically meant that there are those who have not embraced a certain path and are testing the waters of many different teachings where as others have come to follow a single path already and a farther along it than beginners.
This post is a comment.
|
|
|
|
If think lynx was connected to my arm I would use it way more
|
|
|
|
pics or shens
This post is a comment.
|
|
|
|
yahoo contains no pics of me apparently. how rude.
This post is a comment.
|
|
|
|
17 Backdoored Images Downloaded 5 Million Times Removed From Docker Hub
"The Docker team has pulled 17 Docker container images that have been backdoored and used to install reverse shells and cryptocurrency miners on users' servers for the past year," reports Bleeping Computer. "The malicious Docker container images have been uploaded on Docker Hub, the official repository of ready-made Docker images that sysadmins can pull and use on their servers, work, or personal computers." The images, downloaded over 5 million times, helped crooks mine Monero worth over $90,000 at today's exchange rate. Docker Hub is now just the latest package repository to feature backdoored libraries, after npm and PyPl. Docker Hub is now facing criticism for taking months to intervene after user reports, and t...
|
|
|
|
yeah but science has developed way farther than you see. like self driving cars are now commercial and a robot is a saudi citizen, if the militarys technology is even double our modern tech then where could they be at. (it is said that military technology is significantly more than double advanced as what we have accesss to)/
its not like its something that is available to the public. if it exists it would be highly secret and classified. if we can clone a sheep, store info in dna, send probes to mars, utilize deep learning, and have quantum computing breakthroughs - im sure theres way crazier stuff we will never hear of already in play. ...
This post is a comment.
|
|
|
|
I'm thinking about how cool it would be to be able to draw graphs and stuff and put them in posts on here but I don't know how to do that effectively. I liked the idea of not hosting the images and just AJAX loading the images on pageload when there are links in the post but this apparently doesn't work because of the same-origin policy which exists to prevent some security issues.
|
|
|
|
The North Face Used Wikipedia To Climb To the Top of Google Search Results
When you first start planning a big trip, step one will likely happen at the Google search bar. Step two might be clicking onto the images of your target destination. The North Face, in a campaign with agency Leo Burnett Tailor Made, took advantage of this consumer behavior to keep its name top of mind with travelers considering an adventure sports excursion.
The brand and agency took pictures of athletes wearing the brand while trekking to famous locations around the world, including Brazil's Guarita State Park and...
|
|
|
|
MEMORY
One of the processes important in perception is the comparing of current input with similar past experience. When we see a friend, a memory image of his face is presented to our consciousness along with the sensation of his actual present appearance. This memory image (which can be called a schema) blends with the current sensation, so that the perception is a combination of the two. The relative strengths of each source of information probably vary from person to person. Some primarily perceive the memory image, with the sensory input serving as confirmation of the identification. For others, the memory image may be so weak that reorientation and identification is continually necessary. Though the construction and recall of this image is not clearly understood, it must be partial...
This post is a comment.
|
|
|
|
WikiLeaks Dump Reveals CIA Malware For Tracking Windows Devices Via WiFi Networks
WikiLeaks has published the documentation manual for an alleged CIA tool that can track users of Wi-Fi-capable Windows devices based on the Extended Service Set (ESS) data of nearby Wi-Fi networks. According to the tool's 42-page manual, the tool's name is ELSA. Bleeping Computer has an image embedded in its report that explains how the tool works. There are six steps that summarize the ELSA operation. Bleeping Computer reports: Step 1: CIA operative configures ELSA implant (malware) based on a target's environment. This is done using a tool called the "PATCHER wizard," which generates the ELSA payload, a si...
|
|