Does anyone know what phone this is?
>only oldfags will remember this
>mfw I spent fucking months learning to play that song and its variants
Are these any good or just placebo shit?
Gear VR may be limited in content but it is still fucking amazing, and it just makes me more excited for all the other VR products coming out in the future. Which VR mask is /g/ waiting for???
Anything that is well reviewed when it comes out. Other than that, I am expecting the Gear VR 3 non-innovator edition to be quite good, in addition to CV1 and Vive. I'm also interested in seeing where OSVR goes, especially now that Wearality might partner with them to provide high FoV lenses.
I'm not worrying too much about resolution to be honest. We've already seen that the Gear VR 2 has a near perfect resolution that can satisfy nearly everyone. The consumer products, probably from any company that comes out in winter, or 2016, will have better displays anyway.
I am a computer engineering major working on embedded systems (C++ on ARM) and involved in the hiring process in my company.
If there is anything indicating that you have been trying to get more people to our field by teaching programming at high schools, coding bootcamps or you went around to middle/high schools to tell how nice you work is I WILL NOT HIRE YOU.
Our field is over saturated. We don't need more people and lower wages.
Continuation of legacy computer hardware.
Bonus points for something you were jizzing over as a kid they no longer make!
Discuss cool technology trends of the past. Things that caught on, things that never did.
Pic: What I was using, what I am now using.
>old computer hardware
I wanted this card so much back then.
>Assembled in Canada
Dont see that often.
Yeah I unfortunately didn't keep around my really old stuff like my geforce 4 ti 4600. It was same type as pictured.
Someone had an amazing collection the other day in here with boxes and all of all these awesome old processors and videocards.
>People who can drink now don't remember being charged rewind fees
How does this picture make you feel?
dude that ken doll on the monitor pretty rare
>getting scared that a black man and woman can code better than you
while you were practicing fizzbuzz in 8 hipster languages these guys were working on an app that will sell for millions
Hey /g/. Post your ham stuffs here. Post your ham questions here. You know how these general threads work.
I just got a Kenwood TS-820S. Just got to get the thing grounded and hang up a dipole.
Whats the best modern mobile OS and why?
imo BB10, lack of apps aside,
>Gesture base UI perfected
>Not a resource hog
>Battery efficient (Even on small battery devices like the Z10 I got 18hrs of medium use with a 1800Mah battery)
>The Hub is fucking amazing.
Comment too long. Click here to view the full text.
What chair does /g/ use?
Bayside Metro Mesh Office Chair. One of the best $99.99 I've spent on a chair.
Replaced a $350 high-back Ergonomic task chair from a local office supply boutique store. I was hesitant when I saw this one but decided to take the chance. I've had it for 2 years now and it's been great. I'm 190 lbs. It's comfortable and doesn't heat up especially in the summer.
It doesn't conceal farts though.
Can someone explain to me why anyone would give a fuck how much a laptop weighs, why it's such a big selling point, and why people with throw literally hundreds of dollars after it?
I don't understand this obsession with lightness and slimness at all. Are people really so frail, and their bags so small that they cannot possible carry something 200g heavier or 1/4 of an inch thicker?
I don't get it.
>Stuff you carry
>Why does weight matter
Of course, as long as it weights less than 1kg pretty much any weight is good. Consumers mostly care about numbers. Just look at how many people have quad core cpus without ever running a single application that needs them.
>Can someone explain to me why anyone would give a fuck how much a laptop weighs,
You're supposed to be able to carry your laptop around with you, it is the entire point of them. A mobile computer.
The easier it is to carry around, the more valuable it is as a mobile computer.
Couldn't see one.
I just acquired a free Dell Optiplex 745 which is made of dust. Waiting on a WiFi adapter, compressed air and thermal paste.
No new picture because it's basically the same.
A bit outdated but still pretty much the same. I removed left monitor and replaced middle one with UHD one
Comment too long. Click here to view the full text.
If I wasn't so tired I'd post something of actual worth. It's a shame this thread is empty since the topic is interesting as fuck.
Modern Binary Exploitation
>Cybersecurity is one of the fastest growing fields in computer science, though its study is rarely covered in academia due to its rapid pace of development and its technical specificity. Modern Binary Exploitation will focus on teaching practical offensive security skills in binary exploitation and reverse engineering. Through a combination of interactive lectures, hands on labs, and guest speakers from industry, the course will offer students a rare opportunity to explore some of the most technically involved and fascinating subjects in the rapidly evolving field of security.
>The course will start off by covering basic x86 reverse engineering, vulnerability analysis, and classical forms of Linuxbased userland binary exploitation. It will then transition into protections found on modern systems (Canaries, DEP, ASLR, RELRO, Fortify Source, etc) and the techniques used to defeat them. Time permitting, the course will also cover other subjects in exploitation including kernelland and Windows based exploitation.
Student Learning Outcomes
Upon successful completion of this course, students will:
>1. Possess the skills necessary to carry out independent vulnerability research against binary applications.
>2. Have an intimate understanding of executable formats, program control flow at the assembly level, and other low level concepts.
>3. Understand classic and contemporary vulnerabilities and exploitation techniques.
>4. Apply both source code auditing and binary reverse engineering to the vulnerability discovery process.
>5. Be capable of exploiting vulnerabilities found in real world software as defined by MITRE’s Critical Vulnerabilities and Exposures (CVE) system.
PS.: WARZONES WILL BE AVAILABLE AFTER THE END OF THE COURSE.
THERE ARE NO VIDEOS, ONLY LECTURES, CHALLENGES, LABS AND LATER, WARZONES.
Let's do this.
a pissing contest about how slow someone's modem was?
>yea well I was using 300 BAUD before you were borned!
Ask a Sprint shill anything.