Posted by Chuck Rosenberg, Image Search TeamLast month at Google I/O, we showed a major upgrade to the photos experience: you can now easily search your...
Improving Photo Search A Step Across the Semantic Gap
Posted by
gilogo
at
3:04 PM
Labels:
a,
across,
computer,
gap,
improving,
photo,
search,
semantic,
step,
the
Computer respond to this email

Posted by Greg Corrado*, Senior Research ScientistMachine Intelligence for YouWhat I love about working at Google is the opportunity to harness cutting-edge...
More Literacy Activities
ohttp://pbskids.org/games/literacy.html When you finish one game, use the back button to return to the games pa...
Computer sound card drivers Downloads
cvcvCompanyDriverspageAcerAcer sound card driversAd-ChipsAd-Chips sound card driversAddonicsAddonics sound card driversAnalogDevicesAnalog sound card...
Autonomously Estimating Attractiveness using Computer Vision
Posted by
gilogo
at
6:35 AM
Labels:
attractiveness,
autonomously,
computer,
estimating,
using,
vision

How do you go about teaching a computer what is attractive and what is not?This is a very difficult question I have been thinking about recently.Do you...
Announcing the Google MOOC Focused Research Awards
Posted by
gilogo
at
9:24 AM
Labels:
announcing,
awards,
computer,
focused,
google,
mooc,
research,
the
Posted by Maggie Johnson, Director of Education and University Relations, and Aimin Zhu, University Relations Manager, APACLast year, Google and Tsinghua...
You can change your Windows Password if forget the current password
Posted by
gilogo
at
12:04 PM
Labels:
can,
change,
computer,
current,
forget,
if,
password,
the,
windows,
you,
your

1st step: go to run then type this code lusrmgr.msc and then enter.2nd step: open a new window then click users folder 3rd step: The...
The worlds largest photo service just made its pictures free to use
Posted by
gilogo
at
4:39 AM
Labels:
computer,
free,
its,
just,
largest,
made,
photo,
pictures,
service,
the,
to,
use,
worlds
Getty Images is the worlds largest image database with millions of images, all watermarked. These represent over a hundred years of photography,...
Should My Kid Learn to Code

Posted by Maggie Johnson, Director of Education and University Relations, Google(Cross-posted on the Google for Education Blog)Over the last few years,...
How to determine how many cameras are connected to a computer and connect to and use ptz cameras
Posted by
gilogo
at
3:54 PM
Labels:
a,
and,
are,
cameras,
computer,
connect,
connected,
determine,
how,
many,
ptz,
to,
use

How to determine how many cameras are connected to a computer and connect to and use ptz cameras:I figure this is a nice easy first post. This is some...
How to Implement Buffer Overflow
Buffer overflow exploits are commonly found problems which can cause irrevocable damage to a system if taken advantage of. The only way to prevent them is to be careful about coding practices and bounds check to make sure no kind of input, stream, file, command, encryption key, or otherwise can be used to overwrite a buffer past bounds. The problem with this is that many libraries, programs, and operating systems used by programmers already have many of these exploits in them, making prevention difficult if not impossible.
That being said, here is kind of how it works (all examples run in Windows XP using gdb):
The files used for exploit are named vulnerable_code (courtesy of Dr. Richard Brooks from Clemson University) and they can be found here:
http://code.google.com/p/stevenhickson-code/source/browse/#svn%2Ftrunk%2FBufferOverflow
The link above also includes all the assembly files used to create shellcode, nasm to assemble it, and arwin to find the memory locations. It should have everything you need.
Note: Bear in mind that the memory locations will probably be different for you and you will have to find them yourself (probably by writing AAAA over and over again in memory).
IMPORTANT:
This tutorial is used for explanation and education only. Do not copy my examples and turn them in for a class. You will get caught and get in trouble and you wont learn anything and I will program a helicopter to hunt you down autonomously as revenge. NIPS 2015 and Machine Learning Research at Google
Posted by
gilogo
at
12:57 AM
Labels:
2015,
and,
at,
computer,
google,
learning,
machine,
nips,
research
Posted by Sanjiv Kumar, Research ScientistThis week, Montreal hosts the 29th Annual Conference on Neural Information Processing Systems (NIPS 2015), a...
Subscribe to:
Posts (Atom)