Skip to main content

标 题: 日本人做科研的style


标  题: 日本人做科研的style
发信站: BBS 未名空间站 (Mon May  5 19:55:31 2014, 美东)

摘要:

这个日本人叫後藤和茂,日本早稻田大学本科电力工程硕士毕业,来美国前在日本一个
专利
局工作。每天利用上下班坐地铁和业余在家休息时间自学计算机算法。 通过不停试错
的蛮力方式,一己之力完全通过算法将计算机的科学计算速度提高了将近50%,目前世
界上最快的计算机很多都是用的他的算法。美国搞算法的最活跃的人物jack Dongarra
尽管很是不爽,但是还表示速度超过他们团队的的算法。这个我觉得在日本的科研方式
中很据有代表性。当然纽约时报的这片文章,也能反映一点白人的科研套路。菌版小将
有评论不。

http://www.nytimes.com/2005/11/28/technology/28super.html?scp=1

linked in :
http://www.linkedin.com/pub/kazushige-goto/40/230/b61

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into /opt/course/1/context_default_no_kubectl.sh , but without the use of k

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checking a shared sec