Yep, saying Apple is biggest manufacturer is misleading since they have a class of their own. It’s like saying they’re the biggest manufacturer for iOS, which is not useful information.
Yep, saying Apple is biggest manufacturer is misleading since they have a class of their own. It’s like saying they’re the biggest manufacturer for iOS, which is not useful information.
I had to learn assembly but was one topic of many we handled in architecture. Like one question of one exam. That was one of the toughest professors we had, class was about 2001
I learned mips as graduate. In undergrad had to build with logic gates for things like 2 digit decimal counter and my architecture classes were diagram blocks for a simple CPU. But by that time we knew how to do moderate complexity circuits in VHDL simulation, and we had to make a simple VHDL circuit run for real in FPGA.
Greatest recipe ever to close my account.
I can do that but I’m guilty of occasionally calling it twatter
Haha you got click baited.
Let me find you a link that is not related to Rick Astleigh
Ask the c suite, they’ll say no clue. Ask the engineers, they’ll say give me x time and I’ll tell you why.
And I thought that was a measuring unit for ducks
😂 that’s a great prompt for AI
Tell me you’re a bully without saying you’re a bully
Cry me a river, let me know when they’re finished racing towards the bottom
Oh yeah I’ll do a full research next time I enter a web page to see who hosts it. If it’s by Amazon or Microsoft I’ll give green light.
That’s why le mans exist, to show that 100m races with muscle cars are a farce
But to write such a file you need a few quantum computers map reducing the data in alternative universes
Buahahahah I know what to do next commit
Ah yeah, the only ones that like to show off
Ftfy
Yk how these communistic countries love to show off
Also you can do riscv and backdoors.
Another speculation from the suse team was a private company with intent to sell the exploit to state across actors
I think there’s lots of known backdoors that are not publicly disclosed and privately sold.
But given the history of cves in inclined to believe most come from well intentioned developers. When you read the blogs from the Google security team for example, it’s interesting to see how you need to chain a couple exploits at least, to get a proper attack going. Not in this case, it would make it very straightforward to accomplish very intrusive actions.
Edge cases are for teams that have internal testing AND care about quality.
A quick easy way to know if your new job is or isn’t one of those, is when you open a 3 year project and find no unit tests.