Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#Bytes
Eliezer Yudkowsky
ESYudkowsky
The *ideal* video compression algorithm, fed random bytes to decompress, will produce a normal movie with a coherent plot. Contemplating this may help make clear why “compression is intelligence”. It’s
Read more
Redd
reddberckley
you can't deref a void pointer because you can't tell the bounds of the memory address without knowing the size of the data type. you can return void pointers from
Read more
Oliver Hunt
ohunt
Just watched @randemtweets talking about fitting MYST on a CD, and having to worry about physical layout on a CD. It's an amazing thing to have to deal with, much
Read more
✨gwyn erso✨
gwynniepeg
We’re back! Thread of my favourite #bytes. #bytesback #bytesback by kevinsaxby #bytesback neefy (this is a complete and utter mood) #bytesback senorpequenos #bytesback milkshake_sniffles #bytesback The_Ginger #bytesback Waffingtons #bytesback beautit
Read more
Nevyn
ForkTwenty
I got to the office like 2 hours early so I wanna talk about why I used cards in GUN&SLINGER instead of dice, and also how it's ended up working
Read more
Shephali Bhatt
ShephaliBhatt
Wrote about how K-pop & Korean drama had their biggest breakthrough in India amid the pandemic as more people sought the perfect mental escape from the anxiety of the times
Read more
Dakshin Vrindavan
daksinvrindavan
Report from Dakshin Vrindavan meadowsIn a significant development, an auspicious Peacock couple has decided to make the Dakshin Vrindavan premises their home. They have nested in the meadow grounds and
Read more
Shreya Shankar
sh_reya
In good software practices, you version code. Use Git. Track changes. Code in master is ground truth.In ML, code alone isn't ground truth. I can run the same SQL query
Read more
Prashant Kalyani
PareshaantK
List of things that should come back asap. [ A THREAD ] The Instagram Following Section : IG has never been the same since this was removed. Literally the best
Read more
Madison Kanna
Madisonkanna
When you're learning to code, you might have people talk about computers and say, "It's all just ones and zeros."But what does that mean? Thread. Everything you interact with
Read more
Tetrane
tetrane
One of our users compared vulnerability research as trying to find a needle in the proverbial haystack and shared with us how REVEN makes a huge difference. This inspired us
Read more
foone
Foone
oh wow.so this DOS game (name hidden for Reasons) uses encryption, probably for anti-piracy reasons, right? But here's the thing: the encryption is the kind where applying it to an
Read more
Daniel Liu
daniel_c0deb0t
okay so hamming distance of 2 strings with 1000 (u8/byte) characters each takes 80 nanoseconds. yes, NANOsecondsthats 1 byte every 0.08 ns on my 2.7 GHz (0.4 ns/cycle) intel i7
Read more
Redd
reddberckley
How does malloc work? Wikipedia tells us that malloc is a function that, given a specified number of bytes will allocate that number of bytes in memory and will typically
Read more
L Break Into Program
BreakIntoProg
Fixed the bug in my fast filled and textured triangle drawing routine for the ZX Spectrum. I've released the code on GitHub in lib/vector_filled.z80, with an example file in Demo/demo_3D.
Read more
Ben Sigelman
el_bhs
0/ Now that organizations are building or buying observability, they are realizing that it can get really damned expensive. And not just “expensive,” but “expensive and out of control.”This is
Read more
‹
1
2
3
4
5
6
›