Apple 1 ROM disassembly
;; the "monitor ROM" of an apple 1 fit in one page (256 bytes).;; this is my attempt to take the disassembled code, give names to the; variables and routines, and try to document how it worked.;;; an...
View ArticleWhat other countries can learn from Singapore’s schools
WHEN the island of Singapore became an independent country in 1965, it had few friends and even fewer natural resources. How did it become one of the world’s great trading and financial centres? The...
View ArticleShow HN: Build presentations with reveal.js and Scala
This is a basic project setup to create beautiful reveal.js presentations with ScalaJS. To use it just clone or fork this repository and simply start to write down your own slide-deck.How to use...
View ArticlePinterest Is a Unicorn, It Just Doesn’t Act Like One
The company’s growth exploded by 2011, just a year after its service went live, spawning countless copycats — for families, for music, for pornography, for Lady Gaga fans — and clones in every major...
View ArticleSpoofing DNS with fragments
With some care, it turns out to be possible to spoof fake DNS responses using fragmented datagrams. While preparing a presentation for XS4ALL back in 2009, I found out how this could be done, but I...
View ArticleBright green comet 21P will light up the skies of September
September brings a chance to see a comet. It will be bright enough that you can readily glimpse it using binoculars, though it will be much easier to see using just a small telescope. Comet...
View ArticleSaving Birds During the Tribute in Light
Migrating birds can become disoriented as they fly at night. But the 9/11 Tribute in Light has come up with a solution. ByAndrew Farnsworth and Kyle G. HortonDrs. Farnsworth and Horton are scientists...
View ArticleData Wrangling with Apache Kafka and KSQL
The great thing about Kafka is its ability to build systems in which functionality is compartmentalized. Ingest is handled by one process (in this case, Kafka Connect), and transformation is handled by...
View ArticleActuarial science ranked as most valuable college major
Terms of Service ViolationYour usage has been flagged as a violation of our terms of service. For inquiries related to this message please contact support. For sales inquiries, please visit...
View ArticleDulles Airport Surprises Passengers with Facial-Recognition Boarding
Some international travelers can leave their boarding passes and passports in their pockets when flying out of Dulles International Airport thanks to a new facial recognition boarding technology that...
View ArticleBrazil: A look into Latin America’s largest startup ecosystem (2017)
More posts by this contributor David Carter is a senior account manager at Publicize. In September 2012, Forbes published a lengthy feature heralding Brazil’s arrival as “one of the most...
View ArticleLumi (YC W15) Hiring VP Engineering to Build AWS for Manufacturing (Remote/LA)
Los Angeles, CA / remote acceptedScale a world-class engineering organization.About LumiLumi helps ecommerce brands produce memorable and sustainable packaging through our online platform and worldwide...
View ArticleAsk HN: Solutions for collaborative code review / pair programming
Ask HN: Solutions for collaborative code review / pair programming24 points by deepakkarki3 hours ago | hide | past | web | favorite | 16 commentsHey HN, Me and a friend of mine want to do a series of...
View ArticleAdobe supercharges Photoshop’s content-aware AI fill
Everyone went nuts for Adobe’s “content-aware fill” in when it came out. The boring-sounding feature is in fact an incredibly useful tool, essentially an AI-powered clone stamp that intelligently...
View ArticleProtonVPN and NordVPN Bugs Left Windows Vulnerable to Hackers
News & Analysis Hackers could have used the bugs to execute code via an OpenVPN exploit, threatening the security of Windows users and allowing access to private information. Thankfully both VPNs...
View ArticleTensorFlow Data Validation
Tensorflow Data Validation (TFDV) can analyze training and serving data to:The core API supports each piece of functionality, with convenience methods that build on top and can be called in the context...
View ArticleFixing an old hack – why we are bumping the IPv6 MTU
Back in 2015 we deployed ECMP routing - Equal Cost Multi Path - within our datacenters. This technology allowed us to spread traffic heading to a single IP address across multiple physical servers.You...
View ArticleOpen Match: Open source game matchmaker
Open Match is an open source game matchmaker designed to allow game creators to re-use a common matchmaker framework. It’s designed to be flexible (run it anywhere Kubernetes runs), extensible (match...
View ArticleGoogle Photos API
We give users control over what and when they shareWhen users connect one of your products or services with Google Photos we always ask their permission. They can disconnect your integration at any...
View Article