We need another computer(= a new one) . 我们还需要一台电脑。 We can try that─but whether it'll work is another matter . 我们可以试试看,但行不行则是另一回事。 The room's too small. Let's see if they've got another one . 这房间太小。咱们看看他们有没有另一间。 I don't like...
I recently had the honour of introducing some very talented students to world of ethical web hacking. (see saskhackers.com). Thank you to Justin and Austin, the sponsors, and a special thank you to the students that gave up a Saturday to hack. Here are the lab notes that we used: Wha...
Then I started working heavily on glass. Getting efficient raytracing working was only a small part of the battle; making a good looking glass shader even with the ray tracing working was a feat in itself. It took a whole lot of hacking, approximations and reading of maths to get a resul...
THE SENTIENT WORLD SIMULATION: UPLOADING YOUR MIND TO A DIGITAL WORLD INSIDE A QUANTUM COMPUTER It was with the development of the first supercomputers, system for controlling the mind; brain and behavior was established. This was a part of the new science of cybernetics, which became public 194...
Any computer that can run a virtual machine Curiosity Copying the Virtual Machine to the Hard Drive(if following along at home, see NOTE at the end of this post) 1. Copy the “Dojo_2.1” folder from the virtual machine to a folder on the VMs drive. ...
Mostly white-hat hacker stuff. Although posts are directed toward the advanced computer savvy enthusiasts, wannabes are also welcomed! :)
Adobe’s playing this one very close to the chest — I’ve seen no details about the hole on any of the usual hacking sites. The security bulletin says, “Adobe actively shares information about this and other vulnerabilities with partners in the security community to enable them to quickly ...
The word can also refer to a period of time within a schedule or sequence. “I’ve booked your haircut for the 2 p.m. slot.” A computer’s memory slots are referred to as slots, and each has a different function. Some slots are used for expansion cards, while others store system...
Memory leaks: Using smart pointers reduces work of managing pointers for memory leaks. Now you could create a pointer and forget about deleting it, the smart pointer will do that for you. This is the simplest garbage collector we could think off. ...
The girls also spend time in the computer room, and many are now on facebook with a group set up for their friends and supporters. The girls get up at 5.30 each morning, do exercises, chores to clean the house, wash their own clothes (the older ones helping the younger), have breakfa...