xkcd.com is best viewed with Netscape Navigator 4.0 or below on a Pentium 3±1 emulated in Javascript on an Apple IIGSat a screen resolution of 1024x1. Please enable your ad blockers, disable high-heat drying, and remove your devicefrom Airplane Mode and set it to Boat Mode. For securi...
https://xkcd.com/257/: xkcd: Code Talkers https://xkcd.com/258/: xkcd: Conspiracy Theories https://xkcd.com/259/: xkcd: Clichd Exchanges https://xkcd.com/260/: xkcd: The Glass Necklace https://xkcd.com/261/: xkcd: Regarding Mussolini https://xkcd.com/262/: xkcd: IN UR REALITY...
Thus, when Cueball is caught wasting time at work, he argues that such activities are not worse than any other possible ones, at this moment. If his job is writing code and compiling it, then there may be nothing else that he can do right now. He cannot usefully tweak the code before...
Room CodeExponential GrowthOcean LoopBloom FilterElementary Physics PathsDriving PSAChasingGoogle Solar CycleGood and Bad IdeasSoftware Testing DayAlphabetical CartogramDoppler EffectEarth Formation SitePendulum TypesScary TrianglesPub TriviaEclipse Path Maps...
Category:Programming search Computer programmingis a recurring xkcd theme unsurprisingly, asRandallonce worked as a programmer. Subcategories This category has the following 5 subcategories, out of 5 total. A Artificial Intelligence C Cryptography
In general, greedy search is used when you are trying to find a solution that consists of components. On each iteration you choose a component that looks good, and you never reconsider that choice; you just keep on adding components until you get a complete solution. The pseudo-code for ...
Qualifiers Diploma Legal Notes Ufo Swimming Motivation Effects of High Altitude Westerns A/B XKeyboarCD Alternate Histories Cubesat Launch Appendicitis Waiting for the But Heists And Escapes Adjusting a Chair Disk Usage Dangerous Fields UI vs UX Reinvent the Wheel Email Settings Wanna See the Code?
Qualifiers Diploma Legal Notes Ufo Swimming Motivation Effects of High Altitude Westerns A/B XKeyboarCD Alternate Histories Cubesat Launch Appendicitis Waiting for the But Heists And Escapes Adjusting a Chair Disk Usage Dangerous Fields UI vs UX Reinvent the Wheel Email Settings Wanna See the Code?
Additionally, it reproduces itself when compiling the C compiler from un-tampered-with source code, so that anyone using the binary (compiled) compiler would be unable to avoid reproducing the backdoor in all its forms. This is the sort of thing that gives security programmers nightmares. ...