近日,「王海大队」多架歼-20 升空起飞迎击。经过激烈攻防,歼-20 最终逼退了外军机。这说明了什么? – 知乎
现实中美两国除了真正开火,所有前戏都已经做了,而且还在做,这个报道只是再次从侧面证实了这点。 Source: 近日,「王海大队」多架歼-20 升空起飞迎击。经过激烈攻防,歼-20 最终逼退了外军机。这说明了什么? – 知乎
印称在中印边境新部署 1 万士兵,国防部回应「中国军队始终保持高度戒备」,哪些信息值得关注? – 知乎
前两天马尔代夫在中国的支持下,把印度驻军赶走了。 Source: 印称在中印边境新部署 1 万士兵,国防部回应「中国军队始终保持高度戒备」,哪些信息值得关注? – 知乎
Leaving LinkedIn | Hacker News
My career lesson is that being right isn’t the hard part of being a senior staff engineer. Being right isn’t enough. It’s building alignment across the entire org towards the right solution. That’s the hard valuable problem that I’m paid to solve. Source: Leaving LinkedIn | Hacker News
The SwiftUI Field Guide
We built this website to visually explain how the SwiftUI layout system works Source: The SwiftUI Field Guide
有没有人解释下Sora原理? – 知乎
从披露的信息来看, OpenAI并未使用新的模型架构,类似GPT一样, 这个Sora模型基于 Diffusion和Transformer 结构, 扩大模型规模,并提供更加丰富的训练数据,像另一个GPT3一样,大力出奇迹的搞出了Sora这个大杀器,下面根据披露的信息尝试解读下 Sora背后的原理 Source: 有没有人解释下Sora原理? – 知乎
WOOD
Old vs. New Growth Trees and the Wood Products they Make Source: WOOD
Company forgets why they exist after 11-week migration to Kubernetes (2020) | Hacker News
“Company accidentally increased dev productivity 3x by laying off 20% of middle management” Source: Company forgets why they exist after 11-week migration to Kubernetes (2020) | Hacker News
How The Pentagon learned to use targeted ads to find its targets | Hacker News
Reminds me of the guy who pranked his roommate with Facebook ads targeted to an audience of one: Source: How The Pentagon learned to use targeted ads to find its targets | Hacker News
How video games use LUTs and how you can too
Look-up-tables, more commonly referred to as LUTs, are as old as Mathematics itself. The act of precalculating things into a row or table is nothing new. But in the realm of graphics programming, this simple act unlocks some incredibly creative techniques, which both artists and programmers found when faced with tough technical hurdles. Source: How […]
Michael Tsai – Blog – iMessage With PQ3
Apple’s encryption may be quantum-computer-proof, but it’s not lawmaker-proof. And that’s a weak link that absolutely will be exploited, someday. E2EE is a luxury that can be snatched away in an instant, a false sense of security in an increasingly dangerous world. Source: Michael Tsai – Blog – iMessage With PQ3