Using Deep Learning to model personal visual aesthetics
Visual aesthetics are very personal, often subconscious, and hard to express. In a world with an overload of photographic content, a lot of time and effort is spent manually curating photographs, and...
View ArticleIs GraphQL the Next Frontier for Web APIs?
Musings the next API technology, and whether REST-ish JSON over HTTP is just "good enough" to never be displaced in a significant way.For a long time the API community spent a lot of effort...
View ArticleFBI Arrests Hacker Who Hacked No One
He built a piece of software. That tool was pirated and abused by hackers. Now the feds want him to pay for the computer crooks’ crimes.Taylor Huddleston woke early on December 6th, hours before the...
View ArticleWe’re losing the information war
It started with the Boston marathon bombing, four years ago. University of Washington professor Kate Starbird was sifting through thousands of tweets sent in the aftermath and noticed something...
View ArticleOther Than That, the (NYTimes) Story Was Accurate
“I don’t usually ‘go after’ news stories and headlines but this one is such a bad mistake, and it so affected my Twitter feed (I was swindled too), that it deserves comment,” Tyler Cowen wrote Monday...
View ArticleThe American M-209 cipher machine (2012)
At the start of WWII the US armed forces used various means for enciphering their confidential traffic. At the lowest level were hand ciphers. Above that were the M-94 and M-138 strip ciphersand at the...
View ArticleStreak (YC S11) Is Hiring a Mobile Tech Lead
We're hiring a curious mind to own development of our Android and(or) iOS Apps. This role will be responsible for building our Android app from the ground up while also pushing the envelope on our iOS...
View ArticleMBAs as CEOs: Some troubling evidence
22 February 2017Business schools like to boast about how many of their graduates have become CEOs—Harvard especially, since it has the most. But how do these people do as CEOs: are the skills needed to...
View ArticleHow to Write Portable C Without Complicating Your Build
March 30, 2017 nullprogram.com/blog/2017/03/30/Suppose you’re writing a non-GUI C application intended to run on a number of operating systems: Linux, the various BSDs, macOS, classical unix, and...
View ArticleThirteen Years of Bad Game Code
29 Mar 2017 Alone on a Friday night, in need of some inspiration, you decide to relive some of your past programming conquests. The old archive hard drive slowly spins up, and the source code of the...
View ArticleNoiszy – A browser plugin that creates meaningless web tracking data
Whatever you do online, you leave digital tracks behind.These digital footprints are used to market to you - and to influence your thinking and behavior.On March 28, Congress voted to allow ISPs to...
View ArticleAsk HN: What do you want to see in Ubuntu 17.10?
Howdy HackerNews!Dustin Kirkland here, Product Manager for Ubuntu as an OS platform (long time listener, first time caller).I'm interested in HackerNews feedback and feature requests for the Ubuntu...
View Article“Anarchist Cookbook” author William Powell has died
The author of one of the most notorious books of the last century died of a heart attack – six months ago. William Powell’s The Anarchist Cookbook was used by Oklahoma bomber Timothy McVeigh in 1995...
View ArticleMost of Mars' air was 'lost to space'
By Jonathan AmosBBC Science Correspondent31 March 2017From the section Science & EnvironmentThese are external links and will open in a new windowShare this with FacebookShare this with...
View ArticleLiverpool energy storage project delayed
2017-03-15 by Brittany WentzellIt's been nearly three years since a joint venture between Watts Wind and LightSail Energy was announced for Port Mersey Commercial Park, but while wind turbines are now...
View ArticleOne Line of Code That Compromises Your Server
A session secret is key used for encrypting cookies. Application developers often set it to a weak key during development, and don't fix it during production. This article explains how such a weak key...
View ArticleMovie Business Scrambles to Adapt to Changing Consumer Demand
Anyone in the movie business who tells you they’re not scared stiff about the future is probably lying.This story first appeared in the March 28, 2017 issue of Variety. There’s ample reason to be...
View Article16-bit math look-up tables – the unexpected power of scaled-integer math
16-bit math look-up tableshome | the links mine | 6502 primer | large math look-up tables | 65c02 assembly structure macros | simple multitask | 6502 interrupts |...
View ArticleAthena regional stability simulator: model political, economic, military actors
README.mdAthena Regional Stability Simulation. Athena is a decision support model of political, economic, and military actors and the effects of their operations on the civilian population of a...
View Article