There are 12 black dots at intersections on this image but your brain won't let you see them all at once.
This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.
Git is hard: screwing up is easy, and figuring out how to fix your mistakes is fucking impossible. Git documentation has this chicken and egg problem where you can't search for how to get yourself out of a mess, unless you already know the name of the thing you need to know about in order to fix your problem.
So here are some bad situations I've gotten myself into, and how I eventually got myself out of them in plain english.
GpuCapsViewer.exe /exp_txt_report /exp_full_filename="C:/tmp/gpucapsviewer_report.txt"
GpuCapsViewer.exe /exp_xml_report /exp_full_filename="C:/tmp/gpucapsviewer_report.xml"
The new DOOM is a perfect addition to the franchise, using the new id Tech 6 engine where ex-Crytek Tiago Sousa now assumes the role of lead renderer programmer after John Carmack’s departure.
Historically id Software is known for open-sourcing their engines after a few years, which often leads to nice remakes and breakdowns. Whether this will stand true with id Tech 6 remains to be seen but we don’t necessarily need the source code to appreciate the nice graphics techniques implemented in the engine.
Unlike most Windows games released these days, DOOM doesn’t use Direct3D but offers an OpenGL and Vulkan backend.
Vulkan being the new hot thing and Baldur Karlsson having recently added support for it in RenderDoc, it was hard resisting picking into DOOM internals. The following observations are based on the game running with Vulkan on a GTX 980 with all the settings on Ultra, some are guesses others are taken from the Siggraph presentation by Tiago Sousa and Jean Geffroy.
Zepto ransomware is a relatively new player in the ransomware scene, and it’s closely related to the infamous Locky ransomware. Taking a closer look at Zepto’s code, we found that the code is pretty much the same as Locky’s code, but it has been slightly modified. The malware authors behind Zepto use the same methods used to spread Locky, and even the infection vector and the TOR payment page are the same, which makes us think that the people behind Locky are now spreading Zepto. The only difference between Locky and Zepto is the ransom demand. Zepto’s demand is much higher than Locky’s, 3 Bicoins (approximately $1,850).
Security researchers have discovered a sophisticated strain of malware which has shifted across platforms in order to target Mac OS X users.
This week, Kaspersky Lab security experts revealed the existence of Backdoor.OSX.Mokes, an OS X-based variation of the Mokes malware family which was discovered back in January.
According to the team, the malicious code is now able to operate on all major operating systems including Windows, Linux and Mac.
Stefan Ortloff, a researcher with Kaspersky Lab's Global Research and Analysis Team, says the sample which was investigated by the team came unpacked, but he suspects that versions in the wild are packed, just like other OS variants of the malware.
The new strain of malware is written in C++ using the cross-platform application framework Qt, and is linked to OpenSSL.
When executed for the first time, the malicious code copies itself to a variety of system library locations, hiding away in folders belonging to apps and services including Skype, Google, Firefox and the App Store. Mokes then tampers with the PC to achieve persistence and connects to the C&C server using HTTP on TCP port 80.
Data center workloads are changing. Not long ago these systems were primarily used to handle storage and serve up web pages, but now they’re increasingly tasked with AI workloads like understanding speech, text, images and video or analyzing big data for insights.
Billions of consumers want instant answers to a multitude of questions, while enterprise companies want to analyze mountains of data to better serve their customers’ needs. Where do those answers come from? Data centers.
As a leader in server systems, IBM saw this trend coming several years ago, and partnered with us to accelerate new data center workloads. After four years of development, IBM today introduced its Power System S822LC for High Performance Computing powered by NVIDIA Tesla P100 GPUs and NVLink to facilitate high-performance analytics and enable deep learning on ever increasing mountains of data.
What is USD?
Pipelines capable of producing computer graphics films and games typically generate, store, and transmit great quantities of 3D data, which we call "scene description". Each of many cooperating applications in the pipeline (modeling, shading, animation, lighting, fx, rendering) typically has its own special form of scene description tailored to the specific needs and workflows of the application, and neither readable nor editable by any other application. Universal Scene Description (USD) is the first publicly available software that addresses the need to robustly and scalably interchange and augment arbitrary 3D scenes that may be composed from many elemental assets.
USD provides for interchange of elemental assets (e.g. models) or animations. But unlike other interchange packages, USD also enables assembly and organization of any number of assets into virtual sets, scenes, and shots, transmit them from application to application, and non-destructively edit them (as overrides), with a single, consistent API, in a single scenegraph. USD provides a rich toolset for reading, writing, editing, and rapidly previewing 3D geometry and shading. In addition, because USD's core scenegraph and "composition engine" are agnostic of 3D, USD can be extended in a maintainable way to encode and compose data in other domains.
command_line = gh_utils.get_command_line()
gh_texture.update_gpu_memory_from_file(texture_id, image_filename, is_abs_path)