Anyone who falls for the scam of thinking that you can determine IQ from the genome of an embryo is probably below average themselves.
Anyone who falls for the scam of thinking that you can determine IQ from the genome of an embryo is probably below average themselves.
You’re just unabashedly supporting eugenics? Is that because you’re too young, or too uneducated to know any better?
Reuters just regurgitating investor-bait because they have no domain expertise. Maybe Reuters journalists should be getting some training from experts too.
The amount of advertising for this tool in recent times is starting to look a lot like astroturfing.
I know my real age, I have a birth certificate.
I can see that you’ve taken on a lot of the feedback from previous comments threads. This is great! Thank you.
And thank you for open sourcing it.
Question: I was using Quiblr before without logging in. If I sign up an account now and log in, will it transfer my locally stored data into the account to keep the recommendation (see more/see less) settings?
about:config
general.useragent.override
String
option and click +
buttonMozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/127.0.0.0 Safari/537.36
for Chrome/WindowsIsn’t AdBlock Plus the one that takes money from advertisers to have their ads whitelisted by the ad-blocker?
Fuck this guy.
I’ve been using Firefox since the beginning, before that Mozilla, and before that Netscape Navigator.
But I think it’s finally time to switch to Librewolf.
I don’t want digital advertising of any kind, even if my privacy is “preserved” through fancy data-laundering.
This was a joke, 14 years ago:
Any novel idea that gets a modicum of success is immediately and repeatedly flogged to death by copy-cats, both indie and corporate, for the next several years until the gaming public is sick of seeing it. See any recent successful gaming trend for an example.
You could introduce your child to emulation :)
a really odd way of using Git
Git was literally designed for kernel development.
The author’s own solution is not even sufficient to meet their own criteria:
2. Hand assemble the GNU stage0 hex0 monitor (280 bytes) (or a spiritual equivalent for the SBC’s ISA) from printed source assembly using pen and paper and an ISA manual.
…
6. By using the terminal to communicate with the hex0 monitor, type in more sophisticated monitors as hexdecimal after hand-assembling them on pen and paper.
The source code to these programs was obtained through requirement (2):
(2) … You may request any of the following resources:
Source code to any open source code, printed on paper
This code does not specify that it has been signed or has had its authenticity verified. Only code received digitally through requirement (3) is cryptographically verified:
(3) … You may request further open source code (e.g. the Linux kernel) to be delivered in some digital form … however data delivered in this manner may only be used where:
the user can verify the cryptographic identity of that data, where that verification process itself does not rely on any data obtained using this clause, and …
So already at the start of the process, the author is using tools to bootstrap the system which could contain backdoors.
I would change the requirements so that source code printouts are already verified by the person supplying them, or that the solver has to write their own bootstrap tools to get to the point of being able to verify cryptographic hashes/signatures before they can even use any third party source code.
The article doesn’t contain the list, but I believe this is what they are referring to: https://carbonmajors.org/Entities
Gentoo users in shambles