Comment Re:Space Snot (Score 1) 39
Sounds like you're describing The Great Green Arkleseizure, which in turn awaits the coming of the Great White Handkerchief.
Sounds like you're describing The Great Green Arkleseizure, which in turn awaits the coming of the Great White Handkerchief.
In more recent years, others have dissected the Story of Mel in painstaking detail, which surprisingly enough does not detract from the story, but makes it richer, warts and all.
https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fmelsloop.com%2Fdocs%2Fthe-story-of-mel%2Fpages%2Fmels-hack-the-missing-bits
https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fwww.e-basteln.de%2Fcomputing%2Frpc4000%2Fstoryofmel%2F
Seems to me that the more similar these models come to certain aspects of human intelligence, the more similar the hacking methods become as well. A lot of the attacks against AI wind up sounding a lot like the methods people use to manipulate humans' memories and processes.
It was a mix of Apple II and IIe computers, some with a Winchester drive; some various Commodores of early 80s vintage; some TRS-80 model 3 and 4; and 2 Osbornes. The room seemed to naturally separate into distinct TRS-80 and Apple tribes, with the rest of us floating to whatever computer was open. The real crown jewel to me though was the the teletype in the library, upon which you could play Star Trek by signing up for a time slot.
Does he now to go the celestial realms or the infernal realms? Only the Lords of COBOL know.
For a few years there, Windows 8.1 + Classic Shell was everything I wanted in a Windows OS. Under the hood, it felt like Windows 7 + some nice extras, like the ability to natively mount ISO files (and VHD maybe?).
I usually don't answer my own posts, but there it is at the bottom of the wikipedia page. This story was adapted for X Minus 1 in 1955 (episode 32).
Not sure, but I was riffing on "A Logic Named Joe", by Murray Leinster (1946). Eerily prophetic in so many ways.
https://ancillary-proxy.atarimworker.io?url=https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FA_Logic_Named_Joe
Joe is what I will call my personal ChatGPT, though I may need to deactivate it for the good of humankind.
According to the Crossbow project, "there's no defense like a good offense." I hear it's just like shooting ducks in a barrel.
Shouldn't it be:
Star Wars (1977)
Episode V: The Empire Strikes Back (1980)
Episode IV: A New Hope (1981) - first of a long list of edits, I suppose
Episode VI: Return of the Jedi (1983)
Episode I: The Phantom Menace (1999)
Episode II: Attack of the Clones (2002)
Episode III: Revenge of the Sith (2005)
Episode VII: The Force Awakens (2015)
Rogue One: A Star Wars Story (2016)
Episode VIII: The Last Jedi (2017)
Solo: A Star Wars Story (2018)
Episode IX: The Rise of Skywalker (2019)
IMHO, the wording of this article is bound to cause misunderstanding. Fortiguard is a threat intelligence service and security research arm of Fortinet. Fortinet devices pull info FROM Fortiguard and use them in policies, but I'm not sure why they call Fortiguard a "popular cybersecurity suite". Everything I've read so far suggests that Volt Typhoon is targeting misconfigured internet-facing SOHO devices, including Fortigates, but maybe there is more info to come.
Seems to me that maybe part of the software creation process would now need to include a high level "correct-operation" description, one against which the code repair process could refer when repairing the code. I guess that means the code breakers would then focus their attention on the "correct-operation" portion and try to corrupt it and then try to provoke a code repair operation.
Take your pick - either the Peter Principle or the Dilbert Principle. Or a mix of both! One way or the other, they bubble to their level of incompetency and stay there.
Elliptic paraboloids for sale.