Join devRant
Do all the things like
++ or -- rants, post your own rants, comment on others' rants and build your customized dev avatar
Sign Up
Pipeless API

From the creators of devRant, Pipeless lets you power real-time personalized recommendations and activity feeds using a simple API
Learn More
Search - "recommendation systems"
-
I'm performing a pentest for my client.
So after scanning my client's network I understood they're using IIS 4.5 and windows server 2012 (or 2012 R2)
I know the systems are real old.
And there are known exploits for them.
The tricky part is I have to stay hidden and I only have my own credentials for logging in to the asp page. (Uploading a script is almost crossed cuz it will reveal my identity)
Also I have access to the local network with some of the other employees user/pass.
Any recommendation for exploiting and staying hidden at the same time ?
One more question : will exploits for newer versions work for the older ones necessarily?8 -
Dealing with YouTube's shitty recommendation algo for several years now makes me lose faith in recommender systems in general.6
-
!Long Rant!!
Got inspired by Ewin Tang's paper on figuring out a classical computer algorithm for recommendation systems inspired by quantum computers and started to write up an email to a professor in some Quantum research I'm interested in doing. As a high school student, it's VERY daunting to start. Been researching the prof and I'm super excited but it's nerve racking! Like what if she doesn't even open her research projects to high school students and I'm wasting my time? In case, I am planning on asking if there is anyone else I should contact. I'm focused on doing this research with McMaster since it's nearby but I'm really doubting myself. People my age who do this stuff are phenomenal and I feel like I wouldn't live up to that. You guys are probably a lot more experienced in this so if you've got any advice or tips, let me know.
>.<8 -
Ability to understand all machine learning models to modify code and those models directly and create better ones every time.
I would take existing ml model, modify it by hand to create better one, win some multimillion dollars competitions and make them open source.
Eventually all recommendation systems, text to speech, speech to text, music generation, movies generation etc would be opensource.
This would either destroy or boost all modern economy but for sure it would make harm to corporations and make them cry.
That would be fun to see.6 -
Anyone ever tried using user-to-user collaborative filtering to classify the mnist digits dataset?
This is about as far as I got:
https://hastebin.com/obinoyutuw.py
It's literal copy-and-paste frankencode because this is only the second time I've ever done something like this, so pardon the hatchjob.1 -
I need recommendation for site/community to improve my (clean) code style?
And, in more general, what are your ways to improve code style and programming way of thinking - more oriented towards bigger picture of application/systems (patterns, architecture, etc.)?3 -
HIRE A HACKER TO RECOVER STOLEN BITCOIN HIRE ADWARE RECOVERY SPECIALIST
Email info: Adwarerecoveryspecialist@auctioneer. net
WhatsApp info:+12 723 328 343
As a journalist committed to uncovering the truth, I often emphasize the importance of vigilance in the digital age. Unfortunately, I found myself on the wrong side of a cryptocurrency scam that resulted in a staggering loss of €60,000. This experience not only tested my financial resilience but also my faith in the systems designed to protect individuals from fraud. After discovering the scam, I promptly filed a report with the police. Initially, I felt a sense of relief, believing that justice would be served. However, as days turned into weeks, I grew increasingly discouraged. The lack of progress from law enforcement was disheartening, leaving me to grapple with feelings of helplessness. It became clear that the complex and often elusive nature of cryptocurrency scams made them challenging to investigate, even for experienced authorities. During this tumultuous time, a fellow journalist reached out with a recommendation for ADWARE RECOVERY SPECIALIST. Skeptical yet desperate to recover my lost funds, I decided to contact them. From the moment I reached out, I was struck by their professionalism and understanding. The team at ADWARE RECOVERY SPECIALIST took the time to listen to my story, validating my feelings of frustration and loss. They explained their process clearly, setting realistic expectations while ensuring I felt supported throughout. What stood out most was their commitment to transparency. I received regular updates on the recovery process, which helped alleviate some of my anxiety. The team was proactive in their approach, employing various strategies to trace and recover my lost funds. It was refreshing to work with individuals who were not only knowledgeable but also genuinely empathetic to my situation. To my astonishment, ADWARE RECOVERY SPECIALIST successfully recovered a significant portion of my funds. The relief and gratitude I felt were overwhelming; I had not only regained part of my financial stability but also my trust in the recovery process. This experience underscored the importance of seeking help from specialized professionals when faced with the complexities of fraud my journey through this ordeal has been both a cautionary tale and a lesson in resilience. It highlighted the vulnerabilities that many face in the evolving landscape of digital finance. For anyone who finds themselves in a similar predicament, I cannot recommend ADWARE RECOVERY SPECIALIST highly enough. Their dedication and expertise made a daunting situation manageable and ultimately successful. In a world where scams are all too common, it’s crucial to remain vigilant and informed. I’ve learned that seeking help from the right resources can make all the difference, and I’m grateful to have found ADWARE RECOVERY SPECIALIST in my time of need.