|
|
|
|
yes i think it would be a hologram. or everyone would have to have the same data inputted to some device in their brain.
but i think it would be possible to push a hologram over everything maybe.
idk its a loaded question with no real answer lol |
|
|
|
|
|
|
James Joyce |
I asked him with my eyes to ask again yes and then he asked me would I yes to say yes my mountain flower and first I put my arms around him yes and drew him down to me so he could feel my breasts all perfume yes and his heart was going like mad and yes I said yes I will Yes. |
Jostein Gaarder |
Where did the world come from? The question has an answer, even though I cannot get to it. It is a good question. It is like a crime that has not been solved. There is an answer, even if police do not know it. |
Stephen Cambone |
There is a reasonable concern that posting raw data can be misleading for those who are not trained in its use and who do not have the broader perspective within which to place a particular piece of data that is raw. |
Robert Anton Wilson |
All phenomena are real in some sense, unreal in some sense, meaningless in some sense, real and meaningless in some sense, unreal and meaningless in some sense, and real and unreal and meaningless in some sense. |
John Hall |
The same music is playing on the radio in San Francisco, New York, Washington DC and Annapolis. Everywhere you go there's the same artists and same songs by them, over and over again. At some stations they play the same songs 50 to 60 times a week. |
Jose Canseco |
Because I tried to everything possible to become the best player in the world? Do I believe steroids and growth hormones helped me achieve that? Yes. Were there a lot of other players doing it that I had to compete against? Yes. |
Charles Babbage |
Errors using inadequate data are much less than those using no data at all. |
John F. Kennedy |
Let us not seek the Republican answer or the Democratic answer, but the right answer. Let us not seek to fix the blame for the past. Let us accept our own responsibility for the future. |
Valentino Garavani |
I have my favourite fashion decade, yes, yes, yes: '60s. It was a sort of little revolution; the clothes were amazing but not too exaggerated. |
Laurell K. Hamilton |
Readers respond to every genre intensely, if it's a genre that appeals to them. Again, who can say why anyone enjoys horror and dark fantasy? If I can't answer the question for myself, I wouldn't dream of trying to answer it for others. |
|
|
That is so cool. I don't know the answer to your question. If it exists independently of the person wouldn't it just be like a hologram or something? And if it exists relative to the person then everyone just has to have a device that messes with their perception.
This post is a comment.
|
|
|
|
It seems like the way to go is just to have a huge variety of different possible captchas, but I would think that once you have more than a couple bots working together to build models not even that would hold up forever. Abstractly, though, doesn't it boil down to this - Is there a set of problems that a human can answer easily and a computer cannot, but the computer can still recognize a correct answer easily? My instinct is that as soon as you define that set you can build a machine to generate solutions. But I guess the answer to the real question of whether it's worth it depends on if you can build a machine that builds machines that generate solutions. And I think for just the images alone the answer is probably yes - audio/video I'm less sure about.
This post is a comment.
|
|
|
|
what quirks does he have? "idk how to answer this question. i feel like quirks are supposed to be things that are weird. but I feel like weirdness is relative. so I feel like it's kinda meaningless to ask as an independent question. if you are asking me this question, then idk what are my quirks?"
This post is a comment.
|
|
|
|
The weirdest thing about this whole scenario is that you have to go to the internet to find an answer to this question
This post is a comment.
|
|
|
|
Maybe I should make some youtube videos. I would make one about the real concerns of AI, one about basic data science and data analysis, and one that is an introduction to neural networks.
|
|
|
|
The Immaculate Conception"
[Famke Janssen (Lord of Illusions):] "Flesh is a trap. That's what he used to say. Flesh is a trap. And magic sets us free."
[Ikon the Verbal Hologram] The War of Gods and Men ...
|
|
|
|
The real question is when is the mobile version going to be released.
This post is a comment.
|
|
|
|
California Bans Default Passwords on Any Internet-Connected Device (engadget.com)
In less than two years, anything that can connect to the internet will come with a unique password -- that is, if it's produced or sold in California. From a report: The "Information Privacy: Connected Devices" bill that comes into effect on January 1, 2020, effectively bans pre-installed and hard-coded default passwords. It only took the authorities about two weeks to approve the proposal made by the state senate. The new regulation mandates device manufacturers to either create a unique password for each device at the time of production or require the user to create one when they interact with the device f...
|
|
|
|
now that my list of product ids is in the millions and ive used about 40gb of proxy bandwidth scraping maybe 50k pages from that data, i have to carefully weigh out how much i want to spend on proxies (spent about $30) on this experiment that could result in just a simple takedown notice to stop the method. granted i can always reuse and modify this data. but i guarantee if you had a million page site based directly around real ecommerce products you would make good money if it stays up
|
|
|
|
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the ...
This post is a comment.
|
|