When a person dies, it used to be that a family member would call up Facebook to tell them, at which point his/her Facebook account becomes memorialized and non-functional but remains ‘up’. Now things have changed with ‘legacy contact’.
0 Comments
It seems that even space exploration giant and automobile pioneer Elon Musk has a pet peeve or two of his own. One of them happens to be Artificial Intelligence(AI). The entrepreneur exclaimed at MIT’s Centennial Symposium that “I think we should be very careful about artificial intelligence. If I had to guess at what our biggest existential threat is, it’s probably that. So we need to be very careful.” Musk mentioned that at the very least there should be some regulatory oversight so that humanity does not get itself killed.
Lets today learn one concept and straight away implement it some real problem. The concept to learn is Backtracking.
This is not a new concept to us. We use this, follow this in our day to day life. This only proves that Computer Science and its concepts are very well related to real world only. Don't believe me? Have an example: Suppose, You are at point A and want to reach at B. There are 3 roads say X, Y and Z to follow from A and you have no idea about which is the right path. What you will do? You will choose any one path out of three say X. But you eventually found that X does not lead to B. What will you do now? You will come back to A and follow path Y. Is it not right? Is it not what you do? And, for your information, you just followed the principle of Backtracking. It has emerged that Google has been tracking Smartphone users everywhere they go, indicating it with a red dot on a map to mark and make their location much clearer for identification.
If you do not believe this, you remember what appeared in the scene of the Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes, there are constant retina scans feeding his location back to a central database? That is exactly what we are talking about here. This post is a simple example of deception. It shows how a programmer can defy the very important rule of having a main() in c program and still make the program run. This illustrates the concept on a simple program though it can be scaled to much bigger and more complex programs.
#include<stdio.h> #define decode(s,t,u,m,p,e,d) m##s##u##t #define begin decode(a,n,i,m,a,t,e) int begin() { printf(” hello “); } This program runs without main(). how?? Intro : PortableApps.com is the world's most popular portable software solution allowing you to take your favorite software with you. A fully open source and free platform, it works on any portable storage device (USB flash drive, memory card, portable hard drive, etc), cloud drive (DropBox, Google Drive, etc), or installed locally. With millions of users all over the world and a full collection of open source software as well as compatible freeware and commercial software and partners in the software and hardware industry, PortableApps.com is the most complete solution for life on the go. PortableApps.com was founded by John T. Haller, the developer behind numerous portable applications including "Portable Firefox" which started the portable software trend. We've been making software portable since March 2004. Today, our team stands at nearly 100 developers, translators, application packagers, designers and release testers. Our goal is to centralize the knowledge and development of portable software efforts and build a single, open platform which any software or hardware developer can use.
We used to write code for websites or web apps on daily basis but the code we develop need to be backed up or uploaded to some backup server. Which wastes a lot of time. We can save this time by using dropbox.
No doubt PHP is the best tool a web developer can have and if you develop applications on Windows you must have heard of Wamp Server. (Those who don't know Wamp let me tell you it can setup your local environment in minutes to start developing your applications). There are many tasks we used to repeat daily or many times a day. In August 2013, 4 million infected computers woke up and waited instructions from their master. The pathogen was Sefnit, a nasty bit of malware that makes infected computers mine bitcoins. Once the computers woke up, they worked under the command of Ukranian and Israeli hackers named Scorpion and Dekadent. The malware communicated with the two by downloading Tor, the powerful anonymizing software, and talking over encrypted channels. It was the first time a botnet, as a collection of slave computers is called, used Tor in such a potentially powerful way. The Outernet is a global networking project currently under development by the Media Development Investment Fund (MDIF), a United States-based non-profit organization. The Outernet’s goal is to provide free access to internet data through wifi, made available effectively to all parts of the world.
|
Saumen Das
B.Tech. (Software Engineer), Archives
February 2015
Categories
All
Help Us To Grow |