Tag: 上海千花网discuz

lupjxwmt

John Oliver robocalls FCC to protest inaction on robocalls

first_img FCC This isn’t Oliver’s first time calling out the FCC. In May 2017, he aired a segment on net neutrality and asked the audience to flood the FCC with comments supporting net neutrality. Hours later, the agency’s comment system crashed. “Yes, FCC, we meet again, old friends,” said Oliver toward the end of the segment. The comedian stood on stage next to a sculpture of a giant finger about to press a huge button, saying he’d robocall the FCC commissioners every 90 minutes. “This time, unlike our past encounters, I don’t actually need to ask hordes of real people to bombard you with messages because, with the miracle of robocalling, I can now do it all by myself!”The FCC didn’t respond to a request for comment. Last Week Tonight declined to comment beyond the segment.  Share your voice John Oliver joked Sunday that he’d call the FCC every 90 minutes. Screenshot by Marrian Zhou/CNET John Oliver is taking on his “old friends” at the FCC once again. On HBO’s Last Week Tonight on Sunday, the comedian zoomed in on the robocalls problem, citing research that says half of mobile phone calls in the US will soon be scam calls. The Federal Communications Commission has criticized robocalling and said it’d take action on the issue. In November, the agency said it planned to create a database that businesses can check to make sure the numbers they’ve been given permission to call haven’t been reassigned to other people. The FCC is also undertaking “light touch” regulatory actions to give wireless carriers more flexibility to block spam text messages.FCC Chairman Ajit Pai in February also called on carriers to implement robust caller ID authentication systems to combat illegal robocalls and spoofing. He said companies need to get their programs in place by the end of the year, or the FCC will consider “regulatory intervention.”However, Oliver said that’s not enough. He argued that although Pai “urged” telecom companies to implement call authentication programs, if he’d “required” them to do it, the problem might have already been fixed. Mobile Tech Industry Digital Media Politics TV and Moviescenter_img Tags 2 Commentslast_img read more

CONTINUE READING
yupvsjco

JJ Abrams may inject a little Stephen King horror into Apple TV

first_img Aug 31 • iPhone 11, Apple Watch 5 and more: The final rumors J.J. Abrams (seen with musician Sara Bareilles) is reportedly producing a Stephen King-adaptation for Apple’s upcoming video streaming service. Michael Short / Getty Images Apple TV Plus is reportedly getting a third J.J. Abrams-produced show, with the latest jumping into Stephen King horror.The Cupertino, California, company ordered an eight-episode adaptation of Lisey’s Story, King’s 2006 horror-romance novel for its upcoming TV streaming service, according to The Hollywood Reporter. Apple likely paid a tidy sum for the show, since it reportedly sparked a bidding war involving several companies.Oscar winner Julianne Moore will reportedly star as Lisey Landon, who’s trying to move on two years after her novelist husband’s death. As you’d expect from horror master King, she ends up facing some dark, repressed realities about her husband and has to deal with one of his fans stalking her. 26 Photos • King will apparently write all the episodes, which are being produced by Abrams and his production company Bad Robot. It’ll be executive produced by Moore, King, Abrams and Bad Robot TV boss Ben Stephenson, Hollywood Reporter noted.Neither Apple, Abrams, Moore nor King immediately responded to requests for comment.Star Wars: Episode 9 director Abrams is already involved in two shows that’ll appear on Apple’s streaming service — the Sara Bareilles romantic comedy Little Voice and Jennifer Garner-starring drama My Glory Was I Had Such Friends.First published at 3:26 a.m. PT.Updated at 4:06 a.m. PT: Adds more details. Tags Aug 31 • Your phone screen is gross. Here’s how to clean it Share your voice Apple 0 See All reading • J.J. Abrams may inject a little Stephen King horror into Apple TV Plus Aug 31 • Best places to sell your used electronics in 2019 CNET editors break down Apple’s TV Plus event Apple Celebrities show off their new series on Apple TV Plus Now playing: Watch this: 6:58 Aug 31 • iPhone XR vs. iPhone 8 Plus: Which iPhone should you buy? TV and Movies Digital Media Internet Services Post a commentlast_img read more

CONTINUE READING
obcteega

In quantum theory of cognition memories are created by the act of

first_img © 2014 Phys.org. All rights reserved. Venn diagram showing the relationship between the assumptions of cognitive realism and cognitive completeness, and their overlap, which defines classical cognitive models. Quantum models satisfy cognitive completeness but not cognitive realism, and a model in the class ‘X’ would satisfy cognitive realism but not cognitive completeness. Credit: Yearsley and Pothos. ©2014 The Royal Society More information: James M. Yearsley and Emmanuel M. Pothos. “Challenging the classical notion of time in cognition: a quantum perspective.” Proceedings of The Royal Society B. DOI: 10.1098/rspb.2013.3056 Journal information: Proceedings of the Royal Society B This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no part may be reproduced without the written permission. The content is provided for information purposes only. “There are two lines of thought when it comes to using quantum theory to describe cognitive processes,” James M. Yearsley, a researcher in the Department of Psychology at City University London, told Phys.org. “The first is that some decision-making processes appear quantum because there are physical processes in the brain (at the level of neurons, etc.) that are quantum. This is very controversial and is a position held by only a minority. The second line of thought is that basic physical processes in the brain at the level of neurons are classical, and the (apparent) non-classical features of some human decision-making arises because of the complex way in which thoughts and feelings are related to basic brain processes. This is by far the more common viewpoint, and is the one we personally subscribe to.” Memory constructionIn their study, Yearsley and Emmanuel M. Pothos, also at City University London, have proposed that quantum probability theory may be used to assign probabilities to how precisely our thoughts, decisions, feelings, memories, and other cognitive variables can be recalled and defined over time. In this view, recalling a memory at one point in time interferes with how we remember perceiving that same memory in the past or how we will perceive it in the future, much in the way a measurement may change the outcome of something being measured. This act of recall is sometimes called “constructive” because it can change (or construct) the recalled thoughts. In this view, the memory itself is essentially created by the act of remembering.As Yearsley explains, the idea that measurements might be constructive in cognition can be understood with an example of chocolate cravings.”It’s a little bit like how you can be sitting at your desk happily working away until one colleague announces that they are popping out to the shop and would you like anything, at which point you are overcome with a desire for a Twix!” he said. “That desire wasn’t there before your colleague asked, it was created by that process of measurement. In quantum approaches to cognition, cognitive variables are represented in such a way that they don’t really have values (only potentialities) until you measure them. That’s a bit like saying as it gets towards lunchtime there is an increased potentiality for you to say you’d like a Twix if someone asks you, but if you’re hard at work you might still not be thinking consciously about food. Of course, this analogy isn’t perfect.” Explore further (Phys.org) —The way that thoughts and memories arise from the physical material in our brains is one of the most complex questions in modern science. One important question in this area is how individual thoughts and memories change over time. The classical, intuitive view is that every thought, or “cognitive variable,” that we’ve ever had can be assigned a specific, well-defined value at all times of our lives. But now psychologists are challenging that view by applying quantum probability theory to how memories change over time in our brains. Citation: In quantum theory of cognition, memories are created by the act of remembering (2014, March 17) retrieved 18 August 2019 from https://phys.org/news/2014-03-quantum-theory-cognition-memories.html Quantum communication scheme provides guaranteed security without quantum memories This quantum view of memory is related to the uncertainty principle in quantum mechanics, which places fundamental limits on how much knowledge we can gain about the world. When measuring certain kinds of unknown variables in physics, such as a particle’s position and momentum, the more precisely one variable can be determined, the less precisely the other can be determined. The same is true in the proposed quantum view of cognitive processes. In this case, thoughts are linked in our cognitive system over time, in much the same way that position and momentum are linked in physics. The cognitive version can be considered as a kind of entanglement in time. As a result, perfect knowledge of a cognitive variable at one point in time requires there to be some uncertainty about it at other times. Overturning classical assumptionsThe scientists explain that this proposal can be tested by performing experiments that try to violate the so-called temporal versions of the Bell inequalities. In physics, violation of the temporal Bell inequalities signifies the failure of classical physics to describe the physical world. In cognitive science, the violations would signify the failure of classical models of cognition that make two seemingly intuitive assumptions: cognitive realism and cognitive completeness.As the scientists explain, cognitive realism is the assumption that all of the decisions a person makes can be entirely determined by processes at the neurophysiological level (although identifying all of these processes would be extremely complicated). Cognitive completeness is the assumption that the cognitive state of a person making a decision can be entirely determined by the probabilities of the outcomes of the decision. In other words, observing a person’s behavior can allow an observer to fully determine that person’s underlying cognitive state, without the need to invoke neurophysiological variables.Neither of these assumptions is controversial; in fact, both are central to many kinds of cognitive models. A quantum model, however, does not rely on these assumptions.”I think the greatest significance of this work is that it succeeds in taking the widely held belief that cognitive variables such as judgments or beliefs always have well-defined values and gives us a way to put that intuition to experimental test,” Yearsley said. “Also, assuming we do find a violation of the temporal Bell inequalities experimentally, we would be ruling out not just a single model of cognition, but actually a very large class of models, so it’s potentially a very powerful result.”Interpreting a possible violation of a temporal Bell inequality is not straightforward, since one would have to decide which of the two assumptions—realism or completeness—should be abandoned. The researchers argue that for the purposes of creating models of cognition it makes more sense to assume that cognitive realism is not valid, thus rejecting the idea that decisions can thought of as being be fully determined by underlying neurophysiological processes. A key implication would be that an individual may not have a well-defined judgment at all points in time, which may offer insight into aspects of cognition which have so far resisted formal explanation. One such example is the creation of false memories. The scientists hope that future research will help clarify the role of quantum probability in cognitive modeling, and shed light on the complicated process that make up all of our memories, thoughts, and identities.last_img read more

CONTINUE READING
kgqczfoh

DragonFly BSD 541 released with new system compiler in GCC 8 and

first_imgThis Christmas eve, team DragonFly released the 54th version, DragonFly BSD 5.4.1, a free and open-source Unix-like operating system. This version comes with a new system compiler in GCC 8, improved NUMA support, a large number of network and virtual machine driver updates. This release also has significant HAMMER2 improvements and better WLAN interface handling. What’s new in DragonFly BSD 5.4.1 Big-ticket items This release comes with much better support for asymmetric NUMA (Non-Uniform Memory Access) configurations. Both the memory subsystem and the scheduler now understand the functionality of Threadripper 2990WX’s architecture. The team at DragonFly has been working on improving fairness for shared-vs-exclusive lock clashes, reducing cache ping-ponging due to non-contending SMP locks. This release comes with major updates to dports. Concurrency across multiple ttys and ptys have been improved. GCC 8 DragonFly 5.4.1 comes with GCC 8.0, and runs as the default compiler. It is also used for building dports. HAMMER2 This release comes with HAMMER2 which is the default root filesystem in non-clustered mode. It increases bulkfree cache to reduce the number of iterations required. It also fixed numerous bugs. This release comes with improved support on low-memory machines. This release comes with significant pre-work on the XOP API to help support future networked operations. Major changes Security Issues The machdep.spectre_supportsysctl can be now used to probe the spectre support, and machdep.spectre_mitigation sysctl to enable/disable support. The default /root perms has been changed from 755 to 700 in the build template. Delayed FP state has been removed to avoid the known side-channel attack. This release comes with clean FP state on switch to avoid known side-channel attack. There zero user registers on entry into kernel (syscall, interrupt, or exception) to avoid speculative side-channel attacks. Kernel This release comes with updated drm to match Linux kernel 4.7.10 in a number of locations. The radeon driver has been updated; currently matches Linux 3.18. CVE-2018-8897 has been mitigated. This release comes with an added timer support x2apic A private_data field thas been added to struct file for improving application support. SPINLOCK and acpi_timer performance has been improved. A dirty vnode management facility has been added Bottlenecks from the rlimit handling code has been removed. The size of the vm_object hash table has been increased by 4x to reduce collisions. Concurrent tmpfs and allocvnode() has been improved. The namecache performance has been improved. The syscall path has been optimized to improve performance. Driver updates With this release, serial-output-only installs are now possible. This version of DragonFly comes with  virtio_balloon memory driver. With this release, /dev/sndstat can now be opened multiple times by the same device. MosChip PCIe serial communications are now supported. Missing descriptions for usb4bsd C610/X99 controllers have been added. This release comes with an added support for PCIe serial com and console support. Old PCI and ISA serial drivers have been removed. Userland This release comes with an added rc support for ipfw3. Vis(3) and unvis(3) have been updated. With this release, pciconf database has been updated. tcsetsid() has been added to libc. The buildworld concurrency has been improved. Networking With this release, the network tunnel driver, tun(4), has been cleaned up and updated. It’s now clonable for anyone building VPN links. The arp issue in the bridge code has now been fixed. Interface groups are now supported in the kernel and pf(4). The ENA(Elastic Network Adapter) network driver has been added to DragonFly 5.4.1. Package updates With this release, there are a number of options for running a web browser on DragonFly which includes, Chromium, Firefox, Opera, Midori, Palemoon, etc. Users are appreciating the efforts taken for this project and especially, the hammer storage is being appreciated. Though few users are complaining about the speed of the process which is very slow. The HAMMER2 used in this release is BSD licensed so it might have better potential as a Linux kernel module. Read more about this release on DragonFly BSD. Read Next Google employees join hands with Amnesty International urging Google to drop Project Dragonfly Key Takeaways from Sundar Pichai’s Congress hearing over user data, political bias, and Project Dragonfly As Pichai defends Google’s “integrity” ahead of today’s Congress hearing, over 60 NGOs ask him to defend human rights by dropping DragonFlylast_img read more

CONTINUE READING