Gooooooood morning, Society!!! Hey, this is not a test, this is a tech roundup. Time to rock it from the Delta to the DMZ.
AI, bots and robots
- Introductory Tutorials for Machine Learning
- Humanity and Machine Learning
- Amazon acquired robotics company Dispatch to build Scout
- Why Deliberate Practice Matters for Entrepreneurs
- Ludwig – A toolbox to train and test deep learning models without code
- Deep learning on graphs with Keras
- A.I. Shows Promise as a Physician Assistant
- Ludwig, a code-free deep learning toolbox
- Google and Facebook warn AI may do dumb things
- Candy Heart messages written by a neural network
- Why can’t a bot tick the ‘I’m not a robot’ box?
- Robot Melts Its Bones to Change How It Walks
- Modern Robotics
- Cortex – machine learning infrastructure for developers
- The best resources to start learning GraphQL
- AIDomainSearch – Find the Perfect Domain with AI
- Controlling a 2D Robotic Arm with Deep Reinforcement Learning
- AI text generator not released for concerns about implications
- Are robots better baristas? Berkeley’s Bbox café thinks so
Blockchain and decentralization
- Cryptocurrency Was Their Way Out of South Korea’s Lowest Rungs
- Blockchain and Trust
- Distributed web not ready for Runet cutoff from the Internet
- JP Morgan rolls out first US bank-backed cryptocurrency to transform paymentsd
- “Takedown notice” sent to Defense Distributed was fraudulent, from Slovakia
Woman computer scientist of the week
Reihaneh (Rei) Safavi-Naini is the AITF Strategic Chair in Information Security at the University of Calgary, Canada. Before joining University of Calgary in 2007, she was a Professor of Computer Science, Faculty of Informatics and the Director of Telecommunication and Information Technology Research Institute (TITR) and Centre for Information Security at the University of Wollongong, Australia. She has served on the program committees of major conferences in cryptology and information security including CRYPTO, EUROCRYPT, ASIACRYPT, and ACM CCS and has worked on numerous industry collaborative research projects. Currently, she is director of iCORE Information Security Lab, AITF Strategic Chair in Information Security, and co-Director of the Institute for Security, Privacy and Information Assurance.
Cloud and architecture
- Strangler pattern, a powerful simple concept to do refactoring
- Python exceptions considered an anti-pattern
- Cloud Programming Simplified: A Berkeley View on Serverless Computing
- Google and IBM still trying desperately to move cloud market share needle
- Architecture for a JavaScript to C compiler
- Terrapattern – A visual search tool for satellite imagery
- Benchmarking AWS, DigitalOcean, Linode, Packet, and Vultr
- Uber Revenue Growth Slows, Losses Persist as 2019 IPO Draws Near
Development and languages
- Programming as Translation
- Visual Noises – Noise Algorithms Visualised in 1D and 2D with Pure JavaScript
- Swc – A super-fast JavaScript to JavaScript compiler
- What Is Differentiable Programming?
- Microsoft Ironically Proves Forced Windows Updates Don’t Make Any Sense
- Dialogical logic programming
- Converting objects to hash signatures in JavaScript
- An Update on Android Things
- GitHub Classroom and Travis CI Improved Students’ Grades
- The State of Python Packaging
- Building a zero-latency WordPress front-end
- Social media rituals: The uses of celebrity death in digital culture
- You Can Now Run Windows 10 on the Raspberry Pi 3
- Experimenting with Bluetooth in JavaScript in web, hybrid and React Native apps
- Fully managed PostgreSQL databases
- DigitalOcean launched managed PostgreSQL
- GitHub: Unlimited free private repos
- ECS back and forth: a journey from OOP programming to component-based models
- The D Programming Language Conference 2019
Quote of the week
When in doubt, use brute force.
— Ken Thompson
Enterprises
- A heatmap of your Google Pay payments
- Artificial Intelligence Study of Human Genome Finds Unknown Human Ancestor
- Twitter Denies Having an Anti-Conservative Bias – This Time in India
- DoorDash and Amazon Won’t Change Tipping Policy After Instacart Controversy
- Google wrongly terminated our new business via our Google Play Developer Account
- Why Stripe is the worst choice for your new startup business
- Writing Documents at Amazon
- Artificial Intelligence and the Art of Mario Klingemann
- NHTSA’s Implausible Safety Claim for Tesla’s Autosteer Driver Assistance System
- Brave Privacy Browser Is Whitelisting Trackers of Facebook and Twitter
- Google Edge TPU Devices
- The AMD Ryzen 5 2500X and Ryzen 3 2300X CPU Review
- I tried to keep my unborn child secret from Facebook and Google
- Microsoft: 70 percent of all security bugs are memory safety issues
- One analyst’s attempts to demystify the types of traffic Google sends publishers
- Google and Facebook should be regulated for news content, UK government report
- Microsoft security chief: IE is not a browser, so stop using it as your default
- 3 years later, IntelliJ is still unusably slow on macOS with a 4K display
- Google warns about two iOS zero-days ‘exploited in the wild’
- Google paid Apple $9.4B in 2018 to be the default search engine
- Researchers use Intel SGX to put malware beyond the reach of antivirus software
- Twitter keeps losing monthly users, so it’s going to stop sharing how many
- Not Your Imagination: Twitter Treats Conservatives More Harshly Than Liberals
- Google will spend $13B on U.S. real estate in 2019
- Amazon projected to pay 0 federal income tax, second year in a row
- Regulate Facebook and Twitter? The Case Is Getting Stronger
- Google needed to build a graph serving system
- Chromecast Ultra force use of Google DNS
- Even years later, Twitter doesn’t delete your direct messages
Other news
- Effectiveness of Photodynamic Therapy in Elimination of HPV in Mexican Women
- Learn Multi Platform 6502 Assembly Programming for Monsters
- Robot Academy – Open online robotics education resource
- Public hacker test on Swiss Post’s e-voting system
- Japanese women push back against Valentine’s tradition of ‘obligation chocolate’
- Leaks Reveal US Military Use of IMF, World Bank as “Unconventional” Weapons
- Apple and Google accused of hosting Saudi gov’t app that tracks women
- Android Phones Can Be Hacked Remotely by Viewing Malicious PNG Image
- On higher education, programmers and blue-collar jobs
- Women Who Contributed to Science but Were Buried in Footnotes
- Cultural Course Correcting: Black Rock City 2019
- Two Large Chinese Borrowers Miss Bond Payments, Sources Say
- “Catastrophic” hack wipes out email provider’s entire infrastructure
- BuzzFeed Journalists Vote to Unionize in Wake of Layoffs
- NIST Reveals 26 Algorithms Advancing to the Post-Quantum Crypto ‘Semifinals’
- Quantum Computing, Capabilities and Limits: An Interview with Scott Aaronson
- Toyotas and Chevys Are Holding Up Better Than Most Luxury Brands
- Hacker Surfing: Free Housing for Engineers and Designers Visiting SF
- Learn UX Design A$AP
- Software pirates use Apple tech to put hacked apps on iPhones
- Secret History of Women in Coding
- Talos – A modern Linux distribution for Kubernetes
[jetpack_subscription_form]