Why compromise? Use 1-bit IP addresses.
The last Windows that had any MS-DOS in it was Windows ME, a quarter of a century ago. Everything since then has run on the NT kernel.
My favorite Windows drag-and-drop feature is that if ever I drag a file over the left pane of Explorer on its way to another window, the whole thing freezes up for a minute or so. I think it’s polling all the network drives just in case I might decide to drop it there, and since my NAS is turned off (it broke) it just waits until the connection times out. Of course in traditional Microsoft style this locks up the UI thread. I have to remember to drag everything off to the right and then go around.
Naming different things identically is a thing Microsoft loves to do. I still keep opening Teams or Teams instead of Teams. And I think there are at least three things on my PC called Copilot, and they haven’t even released Copilot yet.
I guess they say it each time they’re caught not prioritizing security. Then back to management as usual, prioritizing bullshit new features and marketing over security and bug fixes.
Why does it have a picture of Google’s CEO?
The fans will lap it up and all those Apple YouTubers will gush about how Apple’s new invention is the best invention ever. Apple has the advantage of owning a cult.
You just don’t want to do it regularly. It was an issue for a brief time when SSDs were new, but modern operating systems are smart enough to exclude SSDs from scheduled defrags.
I’ve been programming for almost 25 years and I’d still rather see too many comments than too few. A dogmatic obsession with avoiding comments screams “noob” just as much as crummy “add 1 to x” comments. If something is complex or non-obvious I want a note explaining why it’s there and what it’s supposed to do. This can make all the difference when you’re reviewing code that doesn’t actually do what the comment says it should.
Why not put the “why” in a comment and save people the job of dredging through old commits and tickets to figure out what the code is for? I’d thank someone for saving me the hassle.
Because they’ll add it to the list of coercively and deceptively worded questions they force you to answer before you can use a WIndows account, phrase it so as to sound useful and harmless, and have a big friendly “Sounds great!” button and a tiny “No thanks, I prefer my life to be shit” link.
I hear Pluto’s nice at this time of year.
Neuronal firing is often understood as a fundamentally binary process, because a neuron either fires an action potential or it does not. This is often referred to as the “all-or-none” principle.
Isn’t this true of standard multi-bit neural networks too? This seems to be what a nonlinear activation function achieves: translating the input values into an all-or-nothing activation.
The characteristic of a 1-bit model is not that its activations are recorded in a single but but that its weights are. There are no gradations of connection weights: they are just on or off. As far as I know, that’s different from both standard neural nets and from how the brain works.
Huh, I’ve found The GitHub Copilot better. You still can’t trust it when it talks about APIs, though. Or anything else really - you have to keep your wits about you. I use it for suggestions on where to start with things, or for testing my assumptions, or for generating boilerplate code, but not for copying and pasting anything critical.
The answer received for the pizza glue query appears to be based on a comment from a user named “fucksmith” in a more than decade-old Reddit thread, and they’re clearly joking.
Lol. And this is Google, the company that has spent decades engineering ways to sift good information from bad on the internet.
It has popped up on a couple of my Windows 11 PCs, but so far it just seems to be a button that brings up the same chat/search hybrid you get on Bing.
“Recall screenshots are only linked to a specific user profile and Recall does not share them with other users, make them available for Microsoft to view, or use them for targeting advertisements. Screenshots are only available to the person whose profile was used to sign in to the device,” Microsoft says.
It’s conspicuous that this statement talks only about the raw screenshots, not any data derived from them (such as aggregated data, inferred data, or even just slightly reprocessed data). So Microsoft could do any minor reworking of the data and send it off to the cloud for their own purposes, while technically complying with the above.
It screams made-up internet story.
I wouldn’t expect it to benchmark well, but it’s good that they’re making this available so developers can explore RISC-V on a good quality platform.