Продвижение состояния AI автоматизированного улучшения кода [PDF]
Advancing the state of AI automated code improvements [pdf] .
  
  
  
  
  
  Star Trek: Deep Space Nine Episode, который предсказывал кризис в США
Star Trek: The Deep Space Nine episode that predicted a US crisis .
  
  Bbc
  
  Star Trek: The Deep Space Nine episode that predicted a US crisis
  In the 1990s the Star Trek series Deep Space Nine predicted a dystopian vision of 2024 homelessness that has parallels with reality.
  GF: передний конец GDB для Linux с расширениями Python и C ++
Gf: A GDB front end for Linux with Python and C++ extensions .
  
  GitHub
  
  GitHub - nakst/gf: A GDB frontend for Linux.
  A GDB frontend for Linux. Contribute to nakst/gf development by creating an account on GitHub.
  Запрос по горизонту почтового отделения - Отчет Fujitsu о целевой группе Eposs Pinicl (1998)
Post Office Horizon Enquiry – Fujitsu Report on Eposs PinICL Task Force (1998) .
  
  Post Office Horizon IT Inquiry
  
  FUJ00080690 - Report on the EPOSS PinICL Task Force
  
  Уиллис Гибсон, 13-летний геймер, становится первым, кто победил Тетриса
Willis Gibson, 13-year-old gamer, becomes the first to beat Tetris .
  
  AP News
  
  13-year-old gamer becomes the first to beat the 'unbeatable' Tetris — by breaking it
  The falling-block video game Tetris has met its match in 13-year-old Willis Gibson. In late December, he became the first player to officially beat the original Nintendo version of the game — by breaking it.
  Новые наборы данных GMT (общие инструменты картирования)
New GMT (Generic Mapping Tools) remote datasets .
  
  GMT Community Forum
  
  New GMT remote datasets
  We are pleased to announce a major addition of remote datasets including:   Reliefs grids of other celestial bodies (Moon, Mercury, Venus, Mars and Pluto) Mean Sea Surface Mean Dynamic Topography Distance to nearest shoreline. Earth Free-Air Anomaly Errors…
  Хакеры могут заразить сеть, подключенные к сети, чтобы установить вымогатели
Hackers can infect network-connected wrenches to install ransomware .
  
  Ars Technica
  
  Hackers can infect network-connected wrenches to install ransomware
  Researchers identify 23 vulnerabilities, some of which can exploited with no authentication.
  Эффект бабочки и черные отверстия как быстрые схватки.Леонард Сусскинд (2023) [Видео]
Butterfly Effect and Black Holes as fast scramblers. Leonard Susskind (2023) [video] .
  
  YouTube
  
  Butterfly Effect and Black Holes as fast scramblers. Astonishing lecture Leonard Susskind
  Leonard Susskind on Butterfly Effect and Black Holes as fast scramblers.
  Использование аппаратного корня доверия для создания надежных SBOMS
Using a Hardware Root of Trust to Generate Trustworthy SBOMs .
  
  EdgeBit
  
  Generating SBOMs Remotely with a Hardware Root of Trust
  The first step in understanding the attack surface of an application is to understand its makeup. This is typically done with a Software Bill of Materials (SBOM), generated from a tool like Syft as part of a build pipeline. The resultant SBOM can then be…