HTML5 Games Workshop: Make a Platformer Game with JavaScript
I have always wanted to run a game development workshop, and some weeks ago, thanks to AdaJS in Barcelona, I finally got my chance.Best news? The materials that I created are available online! And you...
View ArticleBetter Git configuration
I like Git. I use it all the time. As I sometimes do, I recently took some time to really dig in, read through documentation, and review my global Git configuration. Welcome to my fourth stack...
View ArticleA very long way from home: early Byzantine finds at the far ends of the world
The following brief post is once again offered largely for the sake of interest, being concerned with the furthest limits of the distribution of early Byzantine material in Eurasia and Africa. What...
View ArticleStartup School 2017 First Lecture
We believe the barrier to entry for people to start a startup is still too high. We want to make it easier for people to start a company, regardless of who or where you are, so we're starting by...
View ArticleAn In-Depth Look at Google's Tensor Processing Unit Architecture
April 5, 2017Nicole HemsothFour years ago, Google started to see the real potential for deploying neural networks to support a large number of new services. During that time it was also clear that,...
View ArticleGrowing Ubuntu for Cloud and IoT, Rather Than Phone and Convergence
This is a post by Mark Shuttleworth, Founder of Ubuntu and Canonical We are wrapping up an excellent quarter and an excellent year for the company, with performance in many teams and products that we...
View ArticleThe Power of Prolog
© 2005-2017 Markus TriskaIntroductionFacets of PrologBasic ConceptsData StructuresReading Prolog ProgramsWriting Prolog ProgramsTerminationNonterminationInteger ArithmeticHigher-order PredicatesLogical...
View ArticleUber finds one allegedly stolen Waymo file on an employee’s personal device
Uber admitted today that it had found one of the documents Waymo alleges was stolen by a former employee — who left its self-driving car effort to join Uber’s — on the employee’s personal computer.The...
View ArticleBuild Your Own Text Editor
Table of contents | Build Your Own Text Editoropen the bookletWelcome! This is an instruction booklet that shows you how to build a text editor in C.The text editor is antirez’s kilo, with some...
View ArticleHow I Hacked My Smart TV from My Bed via a Command Injection
It was one of those lazy evenings, just watching TV after a long day. I was tired but kept on thinking about a vulnerability I found earlier on in a router someone gave me. Finding a flaw in such a...
View ArticleXSA-212: x86: broken check in memory_exchange() permits PV guest breakout
XSA-212 - Xen Security AdvisoriesAdvisoryXSA-212Public release2017-04-04 12:00Updated2017-04-04 12:37Version3CVE(s)CVE-2017-7228Titlex86: broken check in memory_exchange() permits PV guest...
View ArticleDistributed count(distinct) with HyperLogLog on Postgres
Running SELECT COUNT(DISTINCT) on your database is all too common. In applications it’s typical to have some analytics dashboard highlighting the number of unique items such as unique users, unique...
View ArticleSpanner vs. Calvin: distributed consistency at scale
Daniel J. AbadiApril 06, 2017Daniel J. Abadi is an Associate Professor at Yale University. He does research primarily in database system architecture and implementation. He received a Ph.D. from MIT...
View ArticleNvidia Announces Titan Xp Graphics Card
Nvidia updates its top-of-the-line Titan graphics card yearly, so it’s only natural the Titan Xp got announced Thursday. The Titan Xp’s new specs include 12GB of GDDR5X memory running at 11.4 Gbps (!),...
View ArticlePlanck.js – JavaScript rewrite of Box2D physics library
README.mdThis project is under active development and is not stable yet.Planck.js is JavaScript rewrite of Box2D physics engine for cross-platform HTML5 game development. Check out...
View ArticleAndroid devices can be fatally hacked by malicious Wi-Fi networks
A broad array of Android phones are vulnerable to attacks that use booby-trapped Wi-Fi signals to achieve full device takeover, a researcher has demonstrated.The vulnerability resides in a widely used...
View ArticleThe Minimally-Nice Open Source Software Maintainer
Being involved in open source software is rewarding, yeah? You start off contributing to your favorite project, and it feels so heartwarming when that project's maintainers recognize your effort. Then...
View ArticleStripe opens its Atlas program to US-based startups
Just over a year ago, we launched Stripe Atlas, a new way to start an internet business. It was something of an experiment to begin with, but the response has been hugely encouraging. Since we...
View ArticleAnnouncing HTTP/2 support for all Azure CDN customers
In August 2016, we announced the HTTP/2 support for Azure CDN from Akamai. Today, we are pleased to announce that HTTP/2 is also available for all customers using Azure CDN from Verizon. No further...
View ArticleThe Glimmer VM: Boots Fast and Stays Fast
Great web applications boot up fast and stay silky smooth once they've started.In other contexts, applications can choose quick loading or responsiveness once they've loaded. Great games can get away...
View Article