Gooooooood morning, WWW!!! Hey, this is not a test, this is a tech roundup. Time to rock it from the Delta to the DMZ.
AI, bots and robots
- I have released 100+ stock trading strategies using machine learning (GoogColab)
- Segway-Ninebot unveils scooters that drive themselves to charging stations
- Python vs. Rust for Neural Networks
- Model-Based Reinforcement Learning for Atari
- Robust Learning from Untrusted Sources
Robust learning from untrusted sources Konstantinov & Lampert, ICML’19 Welcome back to a new term of The Morning Paper! Just before the break we were looking at selected papers from ICMLââ¦
- Code is law: China now has AI-powered robot judges
- Using deep learning to analyze the ultrasonic vocalizations of rats
- Cerebras Systems unveils a record 1.2T transistor chip for AI
Artificial intelligence company Cerebras Systems is unveiling the largest semiconductor chip ever built — with 1.2 trillion transistors.
- Machine Learning and Data Science Applications in Industry
- The Essential Tools of Scientific Machine Learning
- The State of Transfer Learning in NLP
This post expands on the NAACL 2019 tutorial on Transfer Learning in NLP. It highlights key insights and takeaways and provides updates based on recent work.
- LogicENN: A Neural Based Knowledge Graphs Embedding Model with Logical Rules
- A.I. Is Learning from Many Humans
- Google DeepMind Co-Founder Placed on Leave from AI Lab
- How to Start with Machine Learning
- Deep Learning Illustrated: Building Natural Language Processing Models
Many thanks to Addison-Wesley Professional for providing the permissions to excerpt “Natural Language Processing” from the book, Deep Learning Illustrated by Krohn, Beyleveld, and Bassens. The excerpt covers how to create word vectors and utilize them as an input into a deep learning model. A complementary Domino project is available. Introduction While the field of […]
Blockchain and decentralization
- The Serious Money Is Warming to Bitcoin
- Criminals are racing to cash out their Bitcoin
- Bitcoin’s race to outrun the quantum computer
The worldâs best cryptographers meet this week to compete in a U.S.-sponsored challenge to create a quantum-resistant standard.
- Terrorists Turn to Bitcoin for Funding, and They’re Learning Fast
The authorities have begun to raise alarms about a steady uptick in the number of militant groups using the hard-to-trace digital currency.
- Tupelo as it relates to IPLD and IPFS
- Building a distributed time-series database on PostgreSQL
Today we are announcing the distributed version of TimescaleDB, which is currently in private beta (public version slated for later this year).
- DNS-on-Blockchain is the next step after DNS-over-HTTPS
Woman computer scientist of the week
Janice Richmond «Jan» Lourie is a computer scientist and graphic artist. In the late 1960s she was a pioneer in CAD/CAM for the textile industry. She is best known for inventing a set of software tools that facilitate the textile production stream from artist to manufacturer. For the Graphical Design Of Textiles process she was granted IBM’s first software patent. Other projects, in differing disciplines, share the focus on graphic representation. She returns throughout an ongoing career to the stacked two-dimensional tabular arrays of textiles and computer graphics, and the topological structures of interrelated data.
Cloud and architecture
- Why Software Architects Must Be Involved
- Traits of Serverless Architecture
- Definitions of Software Architecture
- The Eleven Laws of Showrunning
- The Architecture of Open Source Applications
- Bringing Serverless to a Web Page Near You with Hugo and Kubernetes
Learn how you can migrate your Hugo static sites over to OpenFaaS including custom domains, TLS and CI/CD through OpenFaaS Cloud (or GitLab).
- IBM is open sourcing the Power instruction set architecture
It has been a long time coming, and it might have been better if this had been done a decade ago. But with a big injection of open source spirit from its
- Walmart Fire Sale: After 7 roof fires, Walmart sues Tesla over solar panel flaws
- Trails of Wind: Data Visualization of the Architecture of Airport Runways
Air travel has been in existence for over one hundred years. Since its inception, thousands of airports runways have been built â each one of them designed site specifically, and according to landscape and natural conditions.
- Security flaws caused by compiler optimizations
- Cloud Run Button: Click-to-deploy your Git repos to GCP
- Splunk acquires cloud monitoring service SignalFx for $1.05B
Splunk, the publicly traded data processing and analytics company, today announced that it has acquired SignalFx for a total price of about $1.05 billion. Approximately 60% of this will be in cash and 40% in Splunk common stock. The companies expect the acquisition to close in the second half of 20â¦
- Lyft Has Been Flooded with Sexual Assault Lawsuits
- Flaws in Cellphone Evidence Prompt Review of 10k Verdicts in Denmark
Data offered in court was flawed when technical errors linked some phones to the wrong towers or created a less-detailed picture of their locations, officials said.
- Oracle directors give blessing to shareholder lawsuit against Larry Ellison
Three years after closing a $9.3 billion deal to acquire NetSuite, several Oracle board members have written an extraordinary letter to the Delaware Court, approving a shareholder lawsuit against company executives Larry Ellison and Safra Catz over the 2016 deal. Reuters broke this story. Accordingâ¦
- Japanese architects who treated buildings like living organisms
Development and languages
- Portland Police digitally remove face tattoos from mugshot, to help their case
- Ruffle – An Adobe Flash Player Written in Rust Compiled to WebAssembly
- Large-Scale-Exploit of GitHub Repository Metadata and Preventive Measures
When working with Git, a popular version-control system, email addresses are
part of the metadata for each individual commit. When those commits are pushed
to remote hosting services like GitHub, those email addresses become visible
not only to fellow developers, but also to malicious actors aiming to exploit
As a part of our research we created a tool that leverages the publicly
available GitHub API to collect user data. Analysis of this data not only gives
access to millions of email addresses in very little time, but is also powerful
and dense enough to create targeted phishing attacks posing a great threat to
all GitHub users and their private, potentially sensitive data. Even worse,
existing countermeasures fail to effectively protect against such exploits.
As a consequence and main conclusion of this paper, we suggest multiple
preventive measures that should be implemented as soon as possible. We also
consider it the duty of both companies like GitHub and well informed software
engineers to inform fellow developers about the risk of exposing private email
addresses in Git commits published publicly.
- Super Easy Python CLI with Click
- Open letter from an Android developer to the Google Play team
- Dirty tricks 6502 programmers use
- Sushi Roll: A CPU research kernel with minimal noise for microarch introspection
- Fearing data privacy issues, Google cuts some Android phone data for carriers
- Removing Image Artifacts in C# with OpenCV
- GitHub Open-Source Code for Hand Gesture Recognition – Sign Language Translation
- The GitHub registry public beta is live
- A Common Lisp library for solving linear programming problems
- Run .NET Core Apps Directly from a GitHub Gist
- The ‘microworkers’ making digital life possible
- One-lined Python
- WebAssembly Interface Types: Interoperate with All the Things
People are excited about running WebAssembly outside the browser. People are also excited about running WebAssembly from languages like Python, Ruby, and Rust. Lin Clark’s Code Cartoons are back, illustrating …
- GitHub Supports Web Authentication (WebAuthn) for Security Keys
The WebAuthn standard for security keys is making authentication as easy as possible. Now you can use security keys for second-factor authentication on GitHub with many more browsers and devices.
- Reader, Come Home: The Reading Brain in a Digital World
- GitHub Outage Currently Ongoing – Issues, PRs, Notifications
- A pop of color and more: updates to Android’s brand
- The Surprising Number of Programmers Who Can’t Program
Dear new developer, This came up in a Hacker News comment thread recently: I’ve been working since the 90s and I never attempted to do FizzBuzz. Is it really relevant? Maybe to screen junior â¦
- Functional Programming in Bash
- Windows 95 Web UI Kit
- Why Are So Many Developers Hating on Object-Oriented Programming?
Quote of the week
A data structure is just a stupid programming language.
— R. Wm. Gosper
- Two brothers invented an alphabet for their native language, Fulfulde
- Google has destroyed the lives of revenge porn victims
- Microsoft Has First Major Impact on Chrome
- Twitter is displaying China-made ads attacking Hong Kong protesters
- Jaguar and Audi SUVs Fail to Dent Tesla’s Electric-Car Dominance
- In Amazon’s Bookstore, Orwell Gets a Rewrite
- I Miss Microsoft Encarta
Microsoft Encarta came out in 1993 and was one of the first CD-ROMs I had. It stopped shipping in 2009 on DVD. I …
- Twitter is blocked in China, but its state news agency is buying promoted tweets
- Google OAuth Is Failing with 500 Error Code
- The WeWork IPO
The WeWork IPO is defined by audaciousness and excess, all of which is driven by unlimited access to capital.
- Google’s software mistreats or harms the user
- Microsoft Edge preview builds are ready to try
- Walmart sues Tesla over fires at stores fitted with its solar panels
Walmart Inc on Tuesday sued Tesla Inc, accusing it of «widespread negligenc…
- The Amazon is burning at alarming rate, and smoke covered São Paulo
Fires in the Amazon have risen 84% amid growing deforestation, Brazil’s space research agency says.
- Can Chess Survive Artificial Intelligence?
- Baffled student tells Twitter: ‘I’m not a Chinese agent’
- The body is the missing link for truly intelligent machines
Cover image: Detail fromÂ PatroclusÂ by Jacques Louis David, 1780.Â Courtesy Wikipedia Itâs tempting to think of the mind as a layer that sits on top of more primitive cognitive structures. We experieâ¦
- Brazil’s President Blames NGOs for Amazon Fires
- Leaked documents show Brazil’s Bolsonaro has grave plans for Amazon rainforest
- VMware Acquires Carbon Black for $2.1B and Pivotal for $2.7B
VMware today announced that it is acquiring Carbon Black, a publicly traded security company that focuses on securing modern cloud-native workloads. The price of the acquisition is about $2.1 billion. In addition, VMware also confirmed the acquisition of Pivotal, which will have a value of about $2â¦
- Amazon has ceded control of it’s site to 3rd party sellers
Just like other tech companies that have struggled to tackle misinformation on their platforms, Amazon has proven unable or unwilling to effectively police third-party sellers on its site. A Wall Street Journal investigation found 4,152 items declared unsafe by federal agencies, deceptively labeled or banned by federal regulators.
- Amazon fires: Brazil threatened over EU trade deal
- Google Doesn’t Want Staff Debating Politics at Work Anymore
- Now Bigger Than eBay, Shopify Sets Its Sights on Amazon
- Deconstructing Google’s excuses on tracking protection
- Datadog files S-1 in advance of IPO
- Finland urges EU to consider banning Brazilian beef over Amazon fires
Finland, which holds the European Union’s rotating chairmanship, called on …
- Some People Pay $30 to Get a Referral for Google
- Hacking the Sonos IKEA Symfonisk into a High Quality Speaker Amp – Make
- A Novelist Teaches Herself Physics
- Using Wall Street secrets to reduce the cost of cloud infrastructure
- A Hacker Talks Security, Consent, and Why He Hacked a Buttplug
- a Linux distribution to research fast package management
- Google wants to reduce lifespan for HTTPS certificates to one year
- Rules for Intuitive UX
- Travel Hacking 101: Travel the World for Next to Nothing
- SoftBank plans to lend $20B to its CEO and employees amid volatile markets
- What I Learned Co-Founding Dribbble
- Portugal trials use of goats to clear vegetation for reduction of wild fire risk
- Could Removing Social Media Metrics Reduce Polarization?
Social media reflects and refracts a divided society, but eliminating the âlikeâ button could help bring us back together
- South African bank advises against the use of password managers
- Hacking Image Interpolation for Fun and Profit
- Woman wins 50K ultra outright and gets the ‘Male’ trophy too
When Ellie Pell took first overall, the surprised race organisers realised they had no trophy for the first place male.
- Surveillance cams in Pennsylvania use hackable Chinese tech that recognize faces
- A Case for Universal and Simplified Journal Systems
- Saudi Arabia implements end to travel restrictions for Saudi women
- At MIT, more fallout from the university’s ties to Jeffrey Epstein
- A radical new idea erases quantum theory’s weird uncertainties
- Lesson Learned from Queries over 1.3T Rows of Data Within Milliseconds
- Sexism in the Academy: Women’s narrowing path to tenure
- 16M Americans will vote on hackable paperless machines
Experts agree that paper ballots are needed, but eight American states will use completely paperless machines in the 2020 elections.
- Acute Effects of E-Cig on Vascular Function Detected at Quantitative MRI
- SoftBank Will Let People Invest in IPOs with Less Than $10
- Tesla gets stolen with keyfob hack on camera in seconds
- Complex quantum teleportation achieved for the first time
- Best books to learn about manufacturing