House panel looking into Reddit post about Clinton's email server
The House Oversight Committee is reviewing a Reddit post that alleges an IT specialist who worked on Hillary ClintonHillary Rodham ClintonClinton reaches out to scammed Wells Fargo customersTrump,...
View ArticleEmployee #1: Dropbox
Employee #1 is a series of interviews focused on sharing the often untold stories of early employees at tech companies.Aston Motes was the first employee at Dropbox. He's now a startup advisor and...
View ArticleGhost Robotics' Minitaur Quadruped Conquers Stairs, Doors, Fences
Bipedal and quadrupedal locomotion has been an ongoing challenge for robots. There’s been a lot of progress over the last few years, though, especially when it comes to dynamic motions: not just...
View ArticleGuanxi
From Wikipedia, the free encyclopediaFor the autonomous region, see Guangxi. For the township in Hsinchu County, Taiwan, see Guanxi, Hsinchu.Guanxi or GuanshiTraditional Chinese關係Simplified...
View ArticleThe Free-Time Paradox in America
"Every time I see it, that number blows my mind.”Erik Hurst, an economist at the University of Chicago, was delivering a speech at the Booth School of Business this June about the rise in leisure among...
View ArticleMoMA Will Make Thousands of Exhibition Images Available Online
PhotoA view of the exhibition “Bauhaus: 1919-1928,” which was on view from Dec. 7, 1938, through Jan. 30, 1939.Credit Soichi Sunami, The Museum of Modern Art Archives, New York The Museum of Modern...
View ArticleAndroid Studio 2.2
By Jamal Eason, Product Manager, Android Android Studio 2.2 is available to download today. Previewed at Google I/O 2016, Android Studio 2.2 is the latest release of our IDE used by millions of Android...
View ArticleInteroceptive Ability Predicts Survival on a London Trading Floor
Traders have enhanced interoceptive ability compared to non-trading individualsAs a first step in assessing the importance of interoception in financial risk taking, we tested simply if traders scored...
View ArticleApi.ai is joining Google
We are excited to announce that API.AI is joining Google!It has been a long and fun journey. Since API.AI’s launch in 2014, we’ve been constantly impressed by the fast and energetic adoption of the...
View ArticleOpen Source Micro-Purchasing Forked in Singapore
Open Ending in 10 days Current winning bid: $554.00To whitelist licenses for license finder, users can use the command$ license_finder whitelist add "Apache 2.0"However, this becomes tedious and...
View ArticleWays to implement computer languages on 6502s
A-LANG: WAYS TO IMPLEMENT COMPUTER LANGUAGES ON 6502s David A. Wheeler Here are some of ideas on how to create efficient and easy-to-use programming languages for 6502-based computers (such as the...
View ArticleClosing in on high-temperature superconductivity
The quest to know the mysterious recipe for high-temperature superconductivity, which could enable revolutionary advances in technologies that make or use electricity, just took a big leap forward...
View ArticleAnalysis of ice screws in climbing
The contact surface between the ice and the ice screw was modeled as a frictionless interface and the hanger is bonded to the screw head. For all scenarios, a load of 1,800 lbs was applied to the end...
View ArticleHacker-Proof Code Confirmed
In the summer of 2015 a team of hackers attempted to take control of an unmanned military helicopter known as Little Bird. The helicopter, which is similar to the piloted version long-favored for U.S....
View ArticleThe 280-Year-Old Algorithm Inside Google Trips
Itineraries in Google TripsWith our first good approximate solution to the itineraries problem in hand, we started working with our colleagues from the Google Trips team, and we realized we’d barely...
View ArticleRoughtime: a protocol for secure, auditable time synchronisation
Security protocols often assume an accurate, local clock (e.g. TLS, Kerberos, DNSSEC and more). It's a widely accepted assumption when designing protocols but, for a lot of people, it just isn't true....
View ArticlePre-auth Remote Code Execution Vulnerability in Metasploit
The following two issues combine to constitute a pre-auth Remote Code Execution vulnerability in Metasploit Community, Express and Pro 4.12 where any of certain Weekly Release updates between...
View ArticleDokany - The windows OS FUSE Wrapper
README.md | |What is DokanWhen you want to create a new file system on Windows, other than FAT or NTFS, you need to develop a file system driver. Developing a device driver that works in kernel mode...
View ArticleThree by Kafka
A drawing from Kafka’s journal, 1916.Three what by Kafka? Truthfully, I don’t know how best to categorize the trio of prose nuggets below. I’m tempted to call them parables—each is succinct and appears...
View ArticleAsk HN: Which areas of math are practical to programming/algorithms and why?
Discrete math first comes to mind first: lists, trees, graphs, etc. Used in basic algorithms 101, but you need some more serious probability theory for probabilistic algorithms.Linear algebra is useful...
View Article