Gooooooood morning, Herd!!! Hey, this is not a test, this is a tech roundup. Time to rock it from the Delta to the DMZ.
AI, bots and robots
- A new obstacle to landing a job after college: getting approved by AI
- A Sober Look at Bayesian Neural Networks
by Carles Gelada and Jacob Buckman WARNING: This is an old version of this blogpost, and if you are a Bayesian, it might make you angry. Click here for an updated post with the same content. Context: About a month ago Carles asserted on Twitter that Bayesian Neural Networks make…
- Clearview AI helps law enforcement match photos of people to their online images
- Xenobot, a new kind of programmable organism
- AlphaFold: Using AI for Scientific Discovery
- Tracking the Trackers: using machine learning to aid ethical decisions
- My story as a self-taught AI researcher
This Humans of Machine Learning interview covers Emil Wallner and his hero’s journey, self-taught approach to education, experience with AI, and path to Google.
- Big tech’s quest for human-level A.I
- Sundar Pichai Calls for AI Regulation
- Robot tanks: On patrol but not allowed to shoot
- Cursedfs – Make a disk image formatted with both ext2 and FAT at once
- Table Detection and Extraction Using Deep Learning
Be it in research papers, legal documents or invoices and receipts, deep learning can be applied to automatically detect and extract information from tables. In this article, we will see how to do it and what to be cautious about.
- The Yang Gang and Its Bots
- A Kaggle Grandmaster cheated in $25k AI contest with hidden code
Pet adoption ML coder apologizes and says desire to be ranked #1 ‘compromised my judgement’
- Blog: Gradient descent in spiking neural networks for low-power inference
- Robotic gripper uses acoustic levitation for contact-free manipulation
- The Economics of AI Today
- Man diagnosed with coronavirus near Seattle is being treated largely by a robot
- PandaPy has the speed of NumPy and the usability of Pandas
- JetBrains to reimagine IntelliJ as text editor, add machine learning
Blockchain and decentralization
- Why build this blog, or anything, on IPFS?
What’s wrong with the goold old internet technologies we’re used to? And how does IPFS address their shortcomings?
Woman computer scientist of the week
Susan H. Rodger is an American Computer Scientist known for work in computer science education including developing the software JFLAP for over twenty years. JFLAP is educational software for visualizing and interacting with formal languages and automata. Rodger is also known for peer-led team learning in computer science and integrating computing into middle schools and high schools with Alice . She is also currently serving on the board of CRA-W and as chair of ACM SIGCSE.
Cloud and architecture
- SaaS Marketing Strategies and Case Studies
- RISE: A functional pattern-based data-parallel language in MLIR
- Epic Tells Customers It Will Stop Google Cloud Integrations
The company is focused on «infrastructure the Epic community uses today and is likely to use in the future,» according to a statement received by CNBC.
- Apple lawsuit tests if an employee can plan rival startup while on payroll
Attorneys for a former Apple Inc executive on Tuesday will try to convince a ske…
- Cloudflare is turning off the internet for me
- U.S. surveillance laws failed to counter terrorism, turn citizens into suspects
The patchwork of U.S. surveillance laws has proven ineffective at countering terrorism, instead turning citizens into suspects.
- Amazon asks court to halt Microsoft’s work on Pentagon ‘war cloud’
Amazon on Wednesday asked a U.S.
- Mitigating Cloud Vulnerabilities
- Google Cloud’s Secret Manager
Secret Manager is a new GCP product that securely and conveniently stores API keys, passwords, certificates, and other sensitive data.
Development and languages
- Standalone WebAssembly games using I/O devices
We are excited to give a sneak preview into an experimental feature we are working on, called I/O Devices!
- Python: Accurately Measure Small Code Execution Times
Learn how to measure code execution time in Python reliably using a line fitting method that eliminates errors as suggested by Moreno and Fischmeister.
- Digital Sharecropping
- What the death of iTunes says about digital habits
- SoftICE – Ancient x86 Kernel Mode Debugger
- WebRTC based encrypted data transfer between peers
- .NET everywhere apparently also means Windows 3.11 and DOS
I often talk about how .NET Core is open source and runs ‘everywhere.’ MonoGame, Unity, Apple Watches, Raspberry Pi, …
- UK Invoice and Vat Making Tax Digital Compliant iPhone App
- Five methods for Filtering data with multiple conditions in Python
- WordPad Is Gettings Ads in Windows 10
- Mach2 – Windows Feature Control Multi-Tool
- Monty Python’s Terry Jones Has Died
Members of the iconic comedy group lead tributes to their «outrageously funny» co-star, who has died aged 77.
- Real-Time Object Detection with Phoenix and Python
- GitHub: Browse good first issues to start contributing to open source
- Logitech limits number of devices resets to prevent reselling
264 votes and 129 comments so far on Reddit
- Create GIFs Using Python
- Brooklyn Zelenka on functional programming
- 25-Hour Digital Myst Clock/Chronometer
My wall clock in my house recently died, and with there being a running joke that I’m a time traveller thanks to my DeLorean, I thought I might as well build a replacement clock myself so it could be extra unique. Here’s what I came up with: a self-setting, self-correcting, self-adjusting wall clock/chronometer that tells …
Quote of the week
Compatibility means deliberately repeating other people’s mistakes.
— David Wheeler
- “You’re stealing our water”: Germans protest against Tesla gigafactory
- Most Amazon-Owned Private Label Brands Have No Warranties
As well documented elsewhere, in the past few years Amazon has been developing a slew of its own private brands for a wide variety of products. Now there is nothing wrong with a private label ̵…
- Nvidia GeForce RTX 3080, RTX 3070 Leaked Specs: Up to 20GB GDDR6 RAM
- Amazon Sumerian: create and run browser-based 3D, AR, and VR applications
- Amazon to ramp up counterfeit reporting to law enforcement
Amazon.com Inc is planning to give more data on counterfeit goods to law enforce…
- Every Google result now looks like an ad
“There’s something strange about the recent design change to google search results, favicons and extra header text: they all look like ads, which is perhaps the point?”
- How to Kill a Startup Idea with Google Keyword Planner and AdWords: A Case Study
- Kill Google AMP before it kills the web
- Stop donating your customers’ data to Google Analytics
- Tesla races past $100B in market valuation
Tesla Inc shares surged on Wednesday, and the company became the first publicly …
- Information Leaks via Safari’s Intelligent Tracking Prevention
- Information Leaks via Safari’s Intelligent Tracking Prevention
- 250M Microsoft customer service and support records exposed on the web
250 million leaked conversations between Microsoft customer support agents and customers were left exposed on the web, putting users at risk of phishing.
- Microsoft to force Chrome default search to Bing via Office365 ProPlus installer
It’s a stealthy way to get more people to use Bing in businesses.
- Fixing Google Map Transit Feed Mistakes in Taiwan
- TripAdvisor cuts hundreds of jobs after Google competition bites
- We Wasted $50K on Google Ads So You Don’t Have To
Ever wondered if Google Ads are really worth it, but don’t have the cash for an experiment? One’s been done for you!
- IntelliJ IDEA 2020.1 EAP is open
- How much longer will we trust Google’s search results?
- What can you use instead of Google and Facebook?
More and more companies are promising privacy online and an alternative to the big internet firms.
- Amazon Prime Video Gives Amateur How-To’s, Conspiracy Theories a Stage
The streaming service has accepted nonprofessional and sometimes questionable content to build a video library that in Amazon’s style can dominate the competition through sheer volume.
- List of Twitter mute words for your timeline
Here are some terms to mute on Twitter to clean your timeline up a bit. – twittermute.txt
- Google backtracks on search results design
- What Happens to Google Maps When Tectonic Plates Move?
As a writer on physics, I’m always seeking new metaphors for understanding Einstein’s general theory of relativity, and while…
- Internet use reduces study skills in university students
Research has shown that students who use digital technology excessively are less motivated to engage with their studies, and are more anxious about tests. This effect was made worse by the increased feelings of loneliness that use of digital technology produced.
- Study, research and learn with thinking notebook – MindForger 1.50.0
- Hackett, a Haskell-Like Lisp in Racket
- How refactoring a macro reduced my Rust project build time from 4 hours to 40sec
- Isabel dos Santos: president’s daughter who became Africa’s richest woman
- A Tandy / RadioShack TRS-80 Model 1 Clone
- Kids do program – Experiences from the course
- What I Learned About SaaS at Buildium
- GitOps Using Helm3 and Flux for an Node.js and Express.js Microservice
- Jeff Bezos’s phone ‘hacked by Saudi crown prince’
- Control Flow Integrity (CFI) in the Linux Kernel
- Analysis Ties Hacking of Bezos’ Phone to Saudi Leader’s Account
- The technical report suggesting Saudi Arabia’s prince hacked Bezos’ phone
- UN Experts Say Hacking of Bezos Phone Suggests Effort to Influence News Coverage
Two United Nations officials called for further investigation into the alleged hacking of Washington Post owner Jeff Bezos’ phone, suggesting it was an attempt to influence news coverage of Saudi Arabia.
- Fix Two Linux Kernel Bugs While Testing TiDB Operator in K8s
- The Big Five in tech are paying like the Big Four in sports
- I built a community for women entrepreneurs and makers
A community where women are at the forefront.
- My Emacs Productivity Tricks/Hacks
- Ending Support for macOS and Linux
- I Fixed Gmail’s UX and Saved My Sanity
- Hacking the Job Search with Fifty Dollars of Free LinkedIn Credit
- I grew a product to $130,000,000. Here’s what I learned