Gooooooood morning, Persons!!! Hey, this is not a test, this is a tech roundup. Time to rock it from the Delta to the DMZ.
AI, bots and robots
- 4D Toys: Klein Bottles
- A system in which soft robots “evolve” to walk or climb
- U.N. talks adjourn without deal to regulate ‘killer robots’
- MIT Researchers Just Discovered an AI Mimicking the Brain on Its Own
- Catching Lightning in a Bottle
- The potential of transformers in reinforcement learning
- France latest to slap Clearview AI with order to delete data
- DARPA open sources resources to aid evaluation of adversarial AI defenses
- DeepMind’s New AI with a Memory Outperforms Algorithms 25 Times Its Size
DeepMind’s model, with just 7 billion parameters, outperformed the 178 billion-parameter Jurassic-1 transformer on various language tasks.
- Watching Video Twice at 2x Can Benefit Learning Better Than Once at Normal Speed
By Emma Young. But timing matters: students only benefited if the second viewing was immediately before a test.
- Promise of Analog AI Feeds Neural Net Hardware Pipeline
- AI Research Trends:Sort ArXiv papers by its popularity on social media sites
- Alexa owners not using it after only two weeks
Blockchain and decentralization
- An NFT without a Blockchain. No gas fees. No ETH. No gatekeepers
This is a small proof-of-concept. It relies on PGP – but you could use Keybase, GPG, or any other hard-to-use encryption program. Background Suppose you want to support an artist and give the…
- In some parts of the developing world, cryptocurrency is changing lives
- A mental model for decentralization
- DeFi Risks and the Decentralisation Illusion
- All Bitcoin private keys are on this website
- What is Web3? Interview with Gavin Wood, who coined the term in 2014
- What Problem Blockchains Solve
- US returns $154M in bitcoins stolen by Sony employee
The United States has taken legal action to seize and return over $154 million purportedly stolen from Sony Life Insurance Company Ltd, a SONY subsidiary, by an employee in a textbook business email compromise (BEC) attack.
- Reflections of knowledge – Apps and APIs on the decentralized Web
- That’s My Ape – A blockchain-free chain of custody tool
A delightfully blockchain-free tool for licensing your art.
- U.S. SEC rejects Valkyrie, Kryptoin Bitcoin trusts
The U.S. Securities and Exchange Commission vetoed two proposals to offer bitcoin exchange-traded funds, dealing a blow to market participants who had hoped the agency would green light the effort after approving futures-backed bitcoin funds in October.
Woman computer scientist of the week
Kimber Lockhart is the Chief Technology Officer at One Medical Group. Previously, she was the Senior Director of Web Application Engineering at Box. Prior to joining Box, she co-founded Increo, a secure web-based document sharing and review service. Increo was acquired by Box in October, 2009. She holds a B.S. in Computer Science from Stanford University.
Cloud and architecture
- Hidden Pentagon Records Reveal Patterns of Failure in Deadly Airstrikes
- Design Patterns in Googles Prediction Market on Google Cloud
- AWS Account Takeover via Log4Shell
- CCP pulls support from Alibaba Cloud for not reporting Log4j flaw to gov first
The Ministry of Industry and Information Technology said it will suspend work with Alibaba Cloud as a cybersecurity threat intelligence partner after the firm reported a critical security flaw to Apache.
- AWS Support able to access any S3 object due to permission change
- AWS power failure in US-EAST-1 region killed some hardware and instances
- Custom Laser Patterns Using Holograms: 6 Steps (With Pictures)
- Apple’s App Store broke competition laws, Dutch watchdog says
The Netherlands’ top competition regulator on Friday said Apple Inc broke the country’s competition laws and ordered changes to the iPhone maker’s App Store payment policies.
- Goddamn AWS seems to be down again 4th time this month alone
- Crisp: Critical Path Analysis for Microservice Architectures
Development and languages
- Which programming language or compiler is faster
- C Programming on System 6 – Implementing Multi-User Chat
- Unix Shell Programming: The Next 50 Years
- 6 digit OTP for Two Factor Auth (2FA) is brute-forceable in 3 days
- Implementing RSA in Python from Scratch
I’m sure many programmers, particularly web developers have heard of the RSA cryptography system. RSA is an asymmetric cryptography system, meaning that one key is used for encryption and the other for decryption. I’ve seen a lot of articles explaining the general principles of asymmetric cryptography, but I have not
- Fixing Memory Leaks in Popular Python Libraries
- European Alternatives for Digital Products
Helping you find european alternatives for digital service and products, like cloud services and SASS products.
- Python decorator that enables arbitrarily-deep tail/non-tail recursion
- Build retro games using WebAssembly for a fantasy console
- RCE in Visual Studio Code’s Remote WSL for Fun and Negative Profit
- Tuple: Pair Programming Tool for macOS
- New programming social media platform where your posts are NFT’s
- A Survey of Programmers’ Cannabis Usage, Perception, and Motivation
Cannabis is one of the most common mind-altering substances. It is used both
medicinally and recreationally and is enmeshed in a complex and changing legal
landscape. Anecdotal evidence suggests that some software developers may use
cannabis to aid some programming tasks. At the same time, anti-drug policies
and tests remain common in many software engineering environments, sometimes
leading to hiring shortages for certain jobs. Despite these connections, little
is actually known about the prevalence of, and motivation for, cannabis use
while programming. In this paper, we report the results of the first
large-scale survey of cannabis use by
- Jupyter kernel using Poetry for reproducible Python package management
Python Jupyter kernel using Poetry for reproducible notebooks – GitHub – pathbird/poetry-kernel: Python Jupyter kernel using Poetry for reproducible notebooks
- Greenspun’s Tenth Rule of Programming
- List of 4,248 open source programming languages
- Legal Drafting and Computer Programming
- Attrs – The One Python Library Everyone Needs
Quote of the week
Premature optimization, that’s like a sneeze. Premature abstraction is like ebola; it makes my eyes bleed.
&nbsnbsp;— Christer Ericson
- An iframe from googlesyndication.com tries to access the Camera and Microphone
- The Timing of Evolutionary Transitions Suggests Intelligent Life Is Rare
- Overview: Alternate open-source front-ends for (YouTube, Twitter, etc.)
- Tesla remotely unlocks Model 3 car, uses smart summon to help repo agent
- Stealth bomber in flight on Google Maps
2CC4+P5, Concordia, MO 64020, Ãtats-Unis
- Google to end support for OnHub routers in 2022
- Mantic Monday: Let Me Google That for You
- 2021-22 Tesla Model Y earns highest IIHS accolade
The midsize luxury SUV comes with a standard front crash prevention system that earns superior ratings in both the vehicle-to-vehicle and vehicle-to-pedestrian tests.
- Microsoft Teams: 1 feature, 4 vulnerabilities
Microsoft Team’s link preview feature is susceptible to spoofing and vulnerable to Server-Side Request Forgery. Team’s Android users can be DoS’ed and, in the past, their IP address could be leaked.
- Google Drive may restrict files identified as violating ToS
- Buying Influence: How China manipulates Facebook and Twitter
New documents detail how Chinese officials tap private businesses for online information campaigns, offering a rare glimpse into how China’s vast bureaucracy works to spread propaganda online.
- Shein beat Amazon and reinvented fast fashion
- Intel apologises for vowing to avoid Xinjiang labour
- Plot of the “no smell” complaints for the top three Yankee Candles on Amazon
- Twitter’s founder admits that shutting down the API was “Worst thing we did”
- Beware of a New Amazon Token Crypto Scam
- Google’s removed all mentions of an Intercept investigation from Search
- The Google home page is 500K
- Tesla bows to pressure, stops allowing drivers to play video games while driving
- Apple to Apple Comparison: M1 Max vs. Intel
This will be a story about many things: about computers, about their (memory) speed limits, about workloads that can push computers to those limits and the subtle differences in Hash-Tables (HT) designs. But before we get in, here is a glimpse of what we are about to see.
A friendly warning, the following article contains many technical terms and is intended for somewhat technical and hopefully curious readers.
A couple of months ago, I followed one of my oldest traditions, watching Apple present their new products at one of its regular conferences.
- Russian court fines Alphabet’s Google 7.2 bln roubles
- Tesla Light Show xLights Guide
- Running IntelliJ Idea with JDK 17 for Better Render Performance with Metal
- Microsoft forks MIT licensed repo, and changes the copyright to them
- UberEats took unauthorized amount (and not willing to pay it back)
- RadioShack – Bringing Cryptocurrency to the Mainstream
- Connecting the iDOTs
- Does Superdeterminism Save Quantum Mechanics?
- Bottles: GUI front end to run Windows software on Linux
- NYU Is Top-Ranked–In Loans That Alumni and Parents Struggle to Repay
- Children born in the pandemic have significantly reduced cognitive performance
- Clumps of human brain cells in a dish can learn to play Pong faster than an AI
- Teaching Machines: A History
- Deduction Mechanics in Games
- Learn Accounting for Free
Are you looking for a great accounting program? With the AccountingCoach large number of free online courses, you can start learning today and get an accounting certificate!
- Before ‘Dune,’ Frank Herbert learned from native Americans
- When Aldous Huxley Opened the Doors of Perception
- Burn the Universities and Salt the Earth
- For Third Year, Committee to Protect Journalists Excludes Assange
- Over 7k SOL ($1.2M) got lost on Solana NFT mint due to a hack
- Crash Course Category Theory – C3T
- Faster Linux 2.5G Networking with Realtek RTL8125B
- Quantum theory based on real numbers can be experimentally falsified
A Bell-like experiment that discriminates between real-number and complex-number multipartite quantum systems could disprove real quantum theory.
- Linux Has Grown into a Viable PC Gaming Platform and the Steam Stats Prove It
- Polish opposition duo hacked with NSO spyware
- When New Journalism Was New
- Alibaba researchers went rogue and disclosed Log4j now CCP is making Alibaba pay
- Japanese university finds Alzheimer’s drug effective in treating ALS
Japan’s Yamagata University says it has found a drug effective in treating amyotrophic lateral sclerosis, also known as Lou Gehrig’s disease.
- Dutch Consumer Watchdog forces Apple to allow alternate payments for dating apps
- Trisquel GNU/Linux
- Quanta of the Third Kind
- 12ft Ladder (Bypass any paywall)