|
|
|
|
|
|
|
|
|
Colin Powell |
Avoid having your ego so close to your position that when your position falls, your ego goes with it. |
Colin Powell |
Don't let your ego get too close to your position, so that if your position gets shot down, your ego doesn't go with it. |
Colin Powell |
Never let your ego get so close to your position that when your position goes, your ego goes with it. |
Kobe Bryant |
The Black Mamba collection of watches is me: It is my alter ego, so to speak. As I mentioned before, it is sharp, cutting edge and sleek which are characteristics I try to apply when I'm out there on the basketball court. |
Richard Dawkins |
It's a horrible idea that God, this paragon of wisdom and knowledge, power, couldn't think of a better way to forgive us our sins than to come down to Earth in his alter ego as his son and have himself hideously tortured and executed so that he could forgive himself. |
Marina Abramovic |
Your ego can become an obstacle to your work. If you start believing in your greatness, it is the death of your creativity. |
Julia Cameron |
I think writing is by its very nature transformational. I believe that the minute you put pen to page you start to alter your consciousness, and the more writing you do, the more closely connected you are to a higher power. Some people can call it the muse. Other people say it's God. Whatever you care to call it, when you write, you connect to it. |
Arne Jacobsen |
With a painter or a sculptor, one cannot begin to alter his works, but an architect has to put up with anything, because he makes utility objects - the building is there to be used, and times change. |
Bjarke Ingels |
You can say, like, planet Earth has an existing geology, and what we do as human beings and as architects is that we try to sort of alter and modify and expand the geology. |
George Washington |
The basis of our political system is the right of the people to make and to alter their constitutions of government. |
|
|
oogle's Voice-Generating AI Is Now Indistinguishable From Humans Anonymous Coward 6 hours ago 75 An anonymous reader quotes a report from Quartz: A research paper published by Google this month -- which has not been peer reviewed -- details a text-to-speech system called Tacotron 2, which claims near-human accuracy at imitating audio of a person speaking from text. The system is Google's second official generation of the technology, which consists of two deep neural networks. The first network translates the text into a spectrogram (pdf), a visual way to represent audio frequencies over time. That spectrogram is then fed into WaveNet, a system from Alphabet's AI research lab DeepMind, which reads the chart and generates the corresponding audio elements accordingly. The Google researchers ...
|
|
|
|
Company Gets 45,000 Bad Facebook Reviews After Teenaged Hacker's Unjust Arrest
Over 45,000 users have left one-star reviews on a company's Facebook page after the business reported a security researcher to police and had him arrested in the middle of the night instead of fixing a reported bug. The arrest took place this week in Hungary after an 18-year-old found a flaw in the online ticket-selling system of Budapesti Közlekedési Központ, Budapest's public transportation authority. The young man discovered that he could access BKK's website, press F12 to enter the browser's developer tools mode, and modify the page's source code to alter a ticket's price. Because there was no client or server-side validation put in place, the BKK system accepted the operation and issued a ticket at a smal...
|
|
|
|
In the previous post on sqlmap basics we learnt how to use sqlmap to hack a vulnerable web application and fetch the list of databases, tables, columns and data rows. In this post we shall see how to do some simple fingerprinting on the remote database to find valuable information that can be used to assist in further exploitation of a system.
So lets say we have a vulnerable url
http://loca...
This post is a comment.
|
|
|
|
Successful Correction of Genetic Problems In Mice Before Birth Raises Hopes of Similar Treatments For Humans
Gene editing to correct faulty DNA in human embryos has taken a step closer to becoming a reality, with scientists showing it is possible to correct genetic problems in mice before they are born. Researchers used a form of the gene-editing tool Crispr-Cas9 to introduce a mutation into a gene that would otherwise cause lethal liver failure in mice. While the approach has previously been shown to work in mice after birth, the latest study showed it was also possible to make the all-important tweak before they were born. Writing in the journal Nature Medicine, a team of researchers in the US report how they conducted a series of experiments to explore the use of gene editing in mouse...
|
|
|
|
I have been turning this over in my mind since I first heard of it. Here is how I think this works.
Imaginary numbers are very familiar to the physicist, who uses them constantly in everything. They probably aren't as familiar to non-physicists, who maybe learned them in high school, but then only as some abstract mathematical formality that was kind of neat but didn't really mean anything. So as a graduate student of physics, let me assure you that imaginary numbers aren't just abstract, but have a solid physical meaning, and are crucially important in describing the physical behavior of a number of systems, most importantly quantum mechanics.
...
This post is a comment.
|
|
|
|
An AI box, sometimes called an oracle AI, is a hypothetical isolated computer hardware system where a possibly dangerous artificial intelligence, or AI, is kept constrained in a "virtual prison" and not allowed to manipulate events in the external world. Such a box would be restricted to minimalist communication channels. Unfortunately, even if the box is well-designed, a sufficiently intelligent AI may nevertheless be able to persuade or trick its human keepers into releasing it, or otherwise be able to "hack" its way out of the box.
Motivation Main article: Existential risk from artificial general intelligence ...
|
|
|
|
This analysis suggests a reason for sensory enhancement under marijuana, a movement of attention from consciousness processes to awareness processes. We usually think of attention as synonymous with consciousness, but it is an uneasy synonymy. Consciousness seems to be more than attention, but we cannot describe a consciousness without attention. Perhaps it is possible for attention energy to move into sensory processes and operate less in the decisional, deliberative processes of consciousness. If this happens it would provide much more energy for attending to sense data, and we could expect the sensory experience to be more vivid and more detailed.
Intensity of sensory experience seems related to the total proportion or amount of attention which is involved in the process. If attention...
This post is a comment.
|
|
|
|
The Big Hack: How China Used a Tiny Chip to Infiltrate U.S. Companies https://www.bloomberg.com/news/features/2018-10-04/the-big-hack-how-china-used-a-tiny-chip-to-infiltrate-america-s-top-companies
The attack by Chinese spies reached almost 30 U.S. companies, including Amazon and Apple, by compromising America’s technology supply chain, according to extensive interviews with government and corporate sources.
...
|
|