Zinc (YC W14) Is Hiring a Head of Sales
About Zinc We’re a small team of ambitious people building the secret backbone of modern ecommerce. The Zinc API automates operations at the major online retailers–everything from getting product...
View ArticleRedis as a JSON store
Both JSON and Redis need no introduction; the former is the standard data interchange format between modern applications, whereas the latter is ubiquitous wherever performant data management is needed...
View ArticleOpening a new chapter of my work in AI
Dear Friends,I will be resigning from Baidu, where I have been leading the company’s AI Group. Baidu’s AI is incredibly strong, and the team is stacked up and down with talent; I am confident AI at...
View ArticleA plan to build a ship tunnel
Norway's most hazardous shipping route passes around the country's Stad peninsula and harsh local weather means delays and dangerous conditions for ship crews are a regular occurrence. An ambitious...
View ArticleAn advanced browser fingerprint calculator aimed mainly at Tor Browser users
Welcome to FP Central! This website aims at studying the diversity of browser fingerprints and providing developers with data to help them design good defenses. Contribute to the efforts by viewing...
View ArticleStartups that debuted at Y Combinator W17 Demo Day 2
Over 15,000 founders from 7,200 startups applied to this batch of Y Combinator. It chose just over 100 with founders from 22 countries to go through its accelerator program. Today, the second half of...
View ArticleStack Overflow Developer Survey Results 2017
Each month, about 40 million people visit Stack Overflow to learn, share, and level up. We estimate that 16.8 million of these people are professional developers and university-level students.Our...
View ArticleInside an AI 'brain' – What does machine learning look like?
One aspect all recent machine learning frameworks have in common - TensorFlow, MxNet, Caffe, Theano, Torch and others - is that they use the concept of a computational graph as a powerful abstraction....
View ArticleQEMU: user-to-root privesc inside VM via bad translation caching
This is a security issue in QEMU's system emulation for X86. The issue permits an attacker who can execute code in guest ring 3 with normal user privileges to inject code into other processes that are...
View ArticleMy Text Editor Journey: Vim, Spacemacs, Atom and Sublime Text
04 March 2017I currently use a highly customized Sublime Text 3 as my text editor for almost all programming. However, people are often surprised to learn that I’ve used Vim for 6 months,...
View ArticleYour yearly dose of is-the-universe-a-simulation
Yesterday Ryan Mandelbaum, at Gizmodo, posted a decidedly tongue-in-cheek piece about whether or not the universe is a computer simulation. (The piece was filed under the category “LOL.”)The immediate...
View ArticleThe thriving black market of John Deere tractor hacking
To avoid the draconian locks that John Deere puts on the tractors they buy, farmers throughout America's heartland have started hacking their equipment with firmware that's cracked in Eastern Europe...
View ArticleHow I Start: Go
Go is a lovely little programming language designed by smart people you can trust and continuously improved by a large and growing open-source community.Go is meant to be simple, but sometimes the...
View ArticlePam-ussh may be tricked into using another logged in user's ssh-agent
Browser not supported :( - HackerOne You are visiting this page because we detected an unsupported browser. Your browser does not support security features that we require. We highly recommend that you...
View ArticleSupersonic plasma jets discovered
Supersonic plasma jets discovered Birkeland currents23 March 2017 Information from ESA’s magnetic field Swarm mission has led to the discovery of supersonic plasma jets high up in our atmosphere that...
View ArticleSegment Open Fellowship
Today we’re proud to announce the Segment Open Fellowship. The Fellowship is a three month long program supporting three to five open-source developers with $8k per month to focus full-time on their...
View ArticleLastPass: Security done wrong
Disclaimer: I am the author of Easy Passwords which is also a password manager and could be considered LastPass competitor in the widest sense.Six month ago I wrote a detailed analysis of LastPass...
View ArticleCambridge Analytica Leaves Long Trail of Subterfuge, Dubious Dealing
Last fall, the political consulting firm Cambridge Analytica gained fame as the group of nerdy British data scientists that helped Donald Trump get elected. The firm says it’s able to use its...
View ArticleShow HN: Ctxt.io – share context of whatever you see with others in seconds
Context – simple rich-text ephemeral pastesExpire in🔒 Origin IP access onlyJust select paragraphs of text and images on any website and paste them into the text field above.Use our browser extension to...
View ArticleA Quick Look at Support Vector Machines
Support Vector Machines (SVMs) are a popular machine learning algorithm with lots of usages and I learned something quite amazing about them. But first let me tell you what SVMs do.Imagine we have data...
View Article