Tesla Software Update 8.0
In an industry-first safety measure, we are introducing Cabin Overheat Protection, focused on child (and pet) safety. This feature keeps the car at a safe temperature for hours, even when the car is...
View ArticlePlaypen: The Story of the FBI’s Unprecedented and Illegal Hacking Operation
In December 2014, the FBI received a tip from a foreign law enforcement agency that a Tor Hidden Service site called “Playpen” was hosting child pornography. That tip would ultimately lead to the...
View ArticleSuper Mario 64 – 1996 Developer Interviews
originally featured in the official strategy guidesShigeru Miyamoto – Producer/Director—When someone is playing Mario 64, everyone sitting around the TV gets really excited. It feels different from...
View ArticleHow to Get a Job in Deep Learning
If you’re a software engineer (or someone who’s learning the craft), chances are that you’ve heard about deep learning (which we’ll sometimes abbreviate as “DL”). It’s an interesting and rapidly...
View ArticleGnuplotting – Create scientific plots using gnuplot
March 2nd, 2015 | 2 CommentsIf you are a regular gnuplot user you most probably want to reuse some common settings. I normally avoid it on this blog to have easy scripts that run as standalone files,...
View ArticleA Digital Rumor Should Never Lead to a Police Raid
Law Enforcement, Courts Need to Better Understand IP Addresses, Stop MisuseIf police raided a home based only on an anonymous phone call claiming residents broke the law, it would be clearly...
View ArticleThe GitHub Load Balancer
At GitHub we serve billions of HTTP, Git and SSH connections each day. To get the best performance we run on bare metal hardware. Historically one of the more complex components has been our load...
View ArticleThe MIT License, Line by Line
The MIT License is the most popular open-source software license. Here’s one read of it, line by line.Read the LicenseIf you’re involved in open-source software and haven’t taken the time to read the...
View ArticleFacebook Overestimated Key Video Metric for Two Years
Sept. 22, 2016 7:29 p.m. ETBig ad buyers and marketers are upset with Facebook Inc.FB0.11% after learning the tech giant vastly overestimated average viewing time for video ads on its platform for two...
View ArticleAn Important Message About Yahoo User Security
By Bob Lord, CISOA recent investigation by Yahoo has confirmed that a copy of certain user account information was stolen from the company’s network in late 2014 by what it believes is a...
View ArticleAkamai takes Brian Krebs’ site off its servers after ‘record’ cyberattack
Brian KrebsBrian Krebs/@briankrebs Cloud hosting giant Akamai Technologies has dumped journalist Brian Krebs from its servers after his website came under a "record" cyberattack. "It's looking likely...
View ArticleCruise Automation, GM’s Self-Driving Cars, and the Founders Behind It
PHOTOGRAPH BY ART STREIBER September 22, 2016, 6:30 AM EDT Statistically speaking, most of us will never build a billion-dollar company. We definitely won’t build two of them. If any of us did pull...
View ArticleAnomaly Updates
Below are updates regarding the anomaly that occurred in preparation for the AMOS-6 mission:September 23, 1:00pm EDTThree weeks ago, SpaceX experienced an anomaly at our Launch Complex 40 (LC-40) at...
View ArticleHow an Imaginary Island Stayed on Maps for Five Centuries
Thomas Jefferys, “Chart of the Atlantic Ocean, with the British, French, & Spanish settlements in North America, and the West Indies” (London, 1768) (courtesy Norman B. Leventhal Map Center at the...
View ArticleRare Beasts, Birds, and the Calaboose: A Brief History of London’s Tower...
A brief history of London’s Tower Menagerie.Royal Menagerie, 1812.It was New Year’s Eve 1764, and John Wesley—founding father of Methodism, horseback proselytizer, teetotaler—stood before the structure...
View ArticleCryptpad: Zero Knowledge, Collaborative Real Time Editing
CryptPad is the zero knowledge realtime collaborative editor. Encryption carried out in your web browser protects the data from the server, the cloud, and the NSA. The secret encryption key is stored...
View ArticleTTIP trade deal is 'dead', say EU ministers
European Union ministers today admitted that a giant EU-US trade deal is dead in its current form, with drastic change needed to salvage any hope of a deal going ahead. The Transatlantic Trade and...
View ArticleLinux RAID is different from Windows for sound technical and historical reasons
"Unsupported models will rely on Linux operating system vendors releasing new kernel and drivers to support features such as RAID on SSD"Good to see that the tech press fact check comments from...
View ArticleLatacora: Security Programs For Startups
Latacora isJeremy Rauch, Erin Ptacek, andThomas Ptacek (also turn JS back on). We ran a company called Matasano Security together. This is our new thing.The name doesn't mean anything.We work...
View Article