The De-Electrification of the U.S. Economy
For more than a century after the advent of commercial electrical power in the late 1800s, electricity use in the U.S. rose and rose and rose. Sure, there were pauses during recessions, but the general...
View ArticleWalking in L.A.
Recent walks:April 5, 2017 Gage Ave.April 1, 2017 La Cienega Blvd.March 29, 2017 Griffith ParkMarch 18, 2017 Hollywood WayMarch 15, 2017 Franklin Ave, Riverside Dr, San Fernando Rd.March 10, 2017 Del...
View ArticleTaking a Look at CLR Thread Pool 'Thread Injection' Algorithm
13 Apr 2017 - 2024 wordsIf you’re near London at the end of April, I’ll be speaking at ProgSCon 2017 on Microsoft and Open-Source – A ‘Brave New World’. ProgSCon is 1-day conference, with talks...
View ArticleIntroducing Increment
As software becomes more important in the world, the practice and art of software is becoming more important too. A lot has been written about how individual engineers can be more effective. We've...
View ArticleSaturn moon 'able to support life'
Image copyrightNASA/JPL-Caltech/SSIImage caption Easy to sample: Jets of water spew from the south pole of Enceladus.Saturn's ice-crusted moon Enceladus may now be the single best place to go to look...
View ArticleWhat made Xerox PARC special? Who else today is like them?
A good book (pretty much the only good book) to read about the research community that Parc was a part of is “The Dream Machine” by Mitchell Waldrop. There you will find out about the ARPA (before the...
View ArticleTanium’s Family Empire Is in Crisis
A predominant theme in Silicon Valley over the past year involves powerful founders behaving badly. Uber Technologies Inc. and Zenefits, a maker of human resources software, are two companies whose...
View ArticleHow We Built r/Place
Brian Simpson, Matt Lee, & Daniel Ellis(u/bsimpson, u/madlee, & u/daniel)Each year for April Fools’, rather than a prank, we like to create a project that explores the way that humans interact...
View ArticleShadowBrokers: The NSA Compromised the SWIFT Network
This is by far, the most interesting release from Shadow Brokers as it does not only contain tools.The last time a nation-state used multiple 0days to target another country’s critical infrastructure...
View ArticleA walk down memory lane
Admit it. Every now and then someone does something, and you think: “I also had that idea!” You feel validated — a kindred spirit has had the same intuitions, the same insights, and even drawn the same...
View ArticleLeaked NSA Malware Threatens Windows Users Around the World
The ShadowBrokers, an entity previously confirmed by The Intercept to have leaked authentic malware used by the NSA to attack computers around the world, today released another cache of what appears to...
View ArticleBeating original forecast, Nintendo sells 2.4m Switch consoles in First month
The Switch is beating expectations.Research firm SuperData revealed today that its analysis shows that Nintendo has sold 2.4 million Switches during its first month of release. The home...
View ArticleA quick start guide to Commodore 64 assembly programming on Windows (2011)
Update: All needed files for this tutorial can be found in the GitHub repo linked in the bottom of this page.I noticed that a lot of people are creating graphical programs to the Commodore 64 again, so...
View ArticleDeepBreath: Preventing angry emails with machine learning
By Bill Prin, Developer Programs EngineerThis Chrome plugin could inspire you to use Cloud Natural Language API for your own practical projects. We all have bad days. Maybe deadlines are slipping, your...
View ArticleEFF is countersuing a patent troll that wants its name removed from a blog post
The Electronic Frontier Foundation is countersuing a patent troll that wants its name removed from a "stupid patent of the month" blog post.Global Equity Management (SA) Pty Ltd (GEMSA) is incorporated...
View ArticleTaming Undefined Behavior in LLVM
Earlier I wrote that Undefined Behavior != Unsafe Programming, a piece intended to convince you that there’s nothing inherently wrong with undefined behavior as long as it isn’t in developer-facing...
View ArticleThe 640 K Barrier
There was a demon in memory. They said whoever challenged him would lose. Their programs would lock up, their machines would crash, and all their data would disintegrate.The demon lived at the...
View ArticleA Benchmark for Streaming Anomaly Detection
Written by Subutai Ahmad, VP Research at Numenta.With sensors invading our everyday lives, we are seeing an exponential increase in the availability of streaming, time-series data. Finding anomalies or...
View ArticleTeaching Machines to Draw
When we feed in a sketch of a three-eyed cat, the model generates a similar looking cat that has two eyes instead, suggesting that our model has learned that cats usually only have two eyes. To show...
View ArticlePrinceton’s Ad-Blocker May Put an End to the Ad-Blocking Arms Race
A team of Princeton and Stanford University researchers has fundamentally reinvented how ad-blocking works, in an attempt to put an end to the advertising versus ad-blocking arms race. The ad blocker...
View Article