Skip to main content

Posts

Showing posts from September, 2020

D5 Render

  https://www.d5render.com/pricing     Full Product Features OVERVIEW Effect color adjustment Tone Mapping Volumetric Lighting White Mode LUT ​ Scene editor 3D & Walk View Model Placement PBR-based Material Editing Scene Management Model File Syncing Camera Two-point Perspective Field of View Camera Clipping Plane Auto Exposure Depth of Field ​ Animation Keyframe Animation (move/rotate/scale) IMPORT & OUTPUT 3D Model SketchUp® (.SKP) Autodesk® (.FBX) D5 Render model® (.D5A) ​ Image Image Resolution Up-to 8K ​ Video (PRO/EDU ONLY) Video Resolution Up-to 2K Output Channel Ambient Occlusion Material ID Reflection ​ Other .IES .HDR .CUBE CONTENT LIBRARY Material Library Ceramic, Fabric, Glass, Plastic, Marble, Paint, Metal, Leather, Tiles, Wood, Wallpaper, Water, Grass, Rock and Other Scanned Materials ​ LUT Library Desert, Modern, DayNight, Vibrance, Desaturate ​ Model Library  (PRO ONLY) Pl

Acoustic Diffusor Calculator

  http://www.mh-audio.nl/Acoustics/DiffusorCalculator.asp      

Summary of all the MIT Introduction to Algorithms lectures

  https://catonmat.net/summary-of-mit-introduction-to-algorithms   As you all may know, I watched and posted my lecture notes of the whole MIT Introduction to Algorithms course. In this post I want to summarize all the topics that were covered in the lectures and point out some of the most interesting things in them. Actually, before I wrote this article, I had started writing an article called " The coolest things that I learned from MIT's Introduction to Algorithms " but quickly did I realize that what I was doing was listing the topics in each article and not really pointing out the coolest things . Therefore I decided to write a summary article first ( I had promised to do so ), and only then write an article on really the most exciting topics. Talking about the summary, I watched a total of 23 lectures and it resulted in 14 blog posts. It took me nearly a year to publish them here. Here is a list of all the posts: Lectures 1 and 2: Analysis of Algorithms Lect

What School Doesn't Teach Us About the Workforce

  https://www.entrepreneur.com/article/356318   September 21, 2020 7 min read Opinions expressed by Entrepreneur contributors are their own. This article was written by Alex Sixt, a member of the Entrepreneur NEXT powered by Assemble content team. Entrepreneur NEXT is our Expert solutions division leading the future of work and skills-based economy. If you’re struggling to find, vet, and hire the right Experts for your business, Entrepreneur NEXT is a platform to help you hire the experts you need, exactly when you need them. From business to marketing, sales, design, finance, and technology, we have the top 3 percent of Experts ready to work for you. The average American college graduate spends approximately 29 percent of his or her life in an educational environment. From kindergarten to senior year of high school, we are trained in multiple impor

Introduction to Computer Graphics

  http://math.hws.edu/graphicsbook/index.html   W ELCOME TO Introduction to Computer Graphics , a free, on-line textbook covering the fundamentals of computer graphics and computer graphics programming. This book is meant for use as a textbook in a one-semester course that would typically be taken by undergraduate computer science majors in their third or fourth year of college. Version 1.2 contains minor corrections and updates from Version 1.1 of January 2016, including an update of the three.js material to release number 89. See the preface for more information. The web pages for this book include live, interactive demos that require a modern web browser such as recent versions of Chrome, Firefox, Safari, Internet Explorer, or Edge. (For Internet Explorer, you need Version 11 or later for most of the demos.) You might have to experiment to find a browser in which the demos will work well. Wh

Why is unauthenticated encryption insecure?

  https://cybergibbons.com/reverse-engineering-2/why-is-unauthenticated-encryption-insecure/ Cryptography is a complex subject. There are many subtle issues that can be introduced if you don’t know what you are doing. There is a common mantra: “don’t roll your own crypto”. This is because both inexperienced and experienced developers frequently build cryptographic systems that are insecure. However, there has to be a line – when does it start becoming “rolling your own”? Particularly in embedded systems, there are times when custom protocols need to be used, and developers stray into the dangerous area of cryptography. One of the most common mistakes we have seen is the use of unauthenticated encryption. What is encryption? Encryption is encoding a plaintext into a ciphertext using a key, with the goal of keeping the plaintext confidential. Only someone with the correct key should be able to decrypt the ciphertext and turn it back into plaintext. Encryp

The Cryptographic Doom Principle

  https://moxie.org/2011/12/13/the-cryptographic-doom-principle.html When it comes to designing secure protocols, I have a principle that goes like this: if you have to perform any cryptographic operation before verifying the MAC on a message you’ve received, it will somehow inevitably lead to doom. Let me give you two popular examples. 1. Vaudenay Attack This is probably the best-known example of how performing a cryptographic operation before verifying the MAC on a message can go wrong. In general, there are three different ways to combine a message authentication code with an encrypted message: Authenticate And Encrypt : The sender computes a MAC of the plaintext, encrypts the plaintext, and then appends the MAC to the ciphertext. E k1 (P) || MAC k2 (P) Authenticate Then Encrypt : The sender computes a MAC of the plaintext, then encrypts both the plaintext and the MAC. E k1 (P || MAC k2 (P)) Encrypt Then Authenticate : The sender encrypts the plaintext, then

Sistem Cerdas Untuk Pemulihan Ekonomi

Sistem Cerdas Untuk Pemulihan Ekonomi https://apic.id/jurnal/index.php/jsc  Sistem Cerdas Untuk Pemulihan Ekonomi  

A Software Engineer’s Guide to Cybernetics

 https://medium.com/@bellmar/a-software-engineers-guide-to-cybernetics-d57c7def1453   I first encountered the word cybernetics while reading Benjamin Peters’s account of the Soviet Union’s attempts to invent the internet, How Not to Network a Nation (still a little disappointed that MIT didn’t spell it Nyetwork, come on! ) At the time my reaction to it was “Ew gross” — anything with the prefix cyber- feels cheesy and passé — followed by confusion. The dates seemed impossible. Cybernetics actually predated both the internet and the rise of the computing industry by decades? Could that be right? Could the word cyber have had another meaning not related to virtual experiences that had been entirely lost? Prior to WWII the word cybernetics was used occasionally by mathematicians to mean the dynamics of government in society. The idea that society had a set of mathematical rules that governed it the same way physical objects had laws of physics was not much appreciated. But WWI

They Know How to Prevent Megafires. Why Won’t Anybody Listen?

  https://www.propublica.org/article/they-know-how-to-prevent-megafires-why-wont-anybody-listen   This is a story about frustration, about watching the West burn when you fully understand why it’s burning — and understand why it did not need to be this bad. by Elizabeth Weil Aug. 28, 1:30 p.m. EDT ProPublica is a nonprofit newsroom that investigates abuses of power. Sign up to receive our biggest stories as soon as they’re published. What a week. Rough for all Californians. Exhausting for the firefighters on the front lines. Heart-shattering for those who lost homes and loved ones. But a special “Truman