Flaws in deterministic password managers
November 22, 2016Wouldn’t it be nice if your password manager didn’t need a database? Instead of synchronizing a password vault between your devices, you could use the magic of cryptography to...
View ArticleShow HN: Java Bullshifier
$...:runStart generating 1 projects> Generating 50 classes> Generating dynamic code> Writing 50 classes> Writing switcher> Writing entrypointsWriting gradle configurationsDone!$$
View ArticleNIST’s new password rules – what you need to know
It’s no secret. We’re really bad at passwords. Nevertheless, they aren’t going away any time soon. With so many websites and online applications requiring us to create accounts and think up passwords...
View ArticleKeyframes: Delivering scalable, high-quality animations to mobile clients
Reactions are a way for people to more easily express themselves on Facebook. As we began building the feature, we wanted to provide a high-quality experience that felt fun at every step, including how...
View ArticleMachine Learning for Everyday Tasks
Machine learning is often thought to be too complicated for everyday development tasks. We often associate it with things like big data, data mining, data science, and artificial intelligence....
View ArticleBefore You Grow
Startups are defined by growth, but growth isn’t step one in building a great company. If you focus on trying to grow before you make a product people love, you are unlikely to succeed.We’ve said this...
View ArticleTalking to users
The idea that startups should talk to users is conventional wisdom. Great founders talk to users, so most founders signal their greatness by making a point that they do it too. But empirically talking...
View ArticleShopify’s Frenzy – Sell to the most loyal customers in a new way
Handle thousands of orders per minute with easeFrenzy is built on Shopify’s highly scalable platform so you can sleep easy knowing your customers will always have a fast, enjoyable experience. Whether...
View ArticleSupercapacitors Batteries charges in seconds without degrading
A team of UCF scientists has developed a new process for creating flexible supercapacitors that can store more energy and be recharged more than 30,000 times without degrading.The novel method from the...
View ArticlePython at StackOverflow (an Interview with Martijn Pieters)
If you run into a problem with some API or Python code what do you do to solve it? I personally through a few keywords into google, sometimes even before checking the full docs. Why does this work?...
View ArticleEngineer? TechOps? Swiftype is hiring
Work at Swiftype Swiftype is a growing team of talented search engineers and experts with a range of experiences and backgrounds. We’re looking for self-motivated and resourceful individuals who will...
View ArticleThe XSS Game by Google
Cross-site scripting (XSS) bugs are one of the most common and dangerous types of vulnerabilities in Web applications. These nasty buggers can allow your enemies to steal or modify user data in your...
View ArticleElm for the Front End, Right Now
The following article was originally written in July 2015 for the 0.16 release of the Elm programming language. It has been rewritten here in November 2016 to comply with the syntactic and semantic...
View ArticleIsraeli firm can steal phone data in seconds
A Cellebrite engineer explains the technology used to unlock smartphones and pull dataIt only takes a few seconds for an employee of one of the world's leading hacking companies to take a locked...
View ArticleThe Challenge of Consciousness
Washington State Historical Society/Art ResourceVirna Haffer: Inside the Mind of Man, circa 1935-1942Is it possible to put some order into our thoughts about consciousness, memory, perception, and the...
View ArticleShow HN: Functional programming for modern Fortran
README.mdfunctional-fortranFunctional programming for modern Fortran.Getting startedgit clone https://github.com/wavebitscientific/functional-fortran cd functional-fortran mkdir build cd build cmake...
View ArticleThe Lua VM, on the Web
FAQAre you really porting the entire Lua VM?Yes: The entire Lua 5.2.4 codebase written in C is compiled to JavaScript here, including a full incremental GC and everything else. It fits in 170K of...
View ArticleStatistical Mistakes and How to Avoid Them
Computer scientists in systemsy fields, myself included, aren’t great at using statistics. Maybe it’s because there are so many other potential problems with empirical evaluations that solid...
View ArticleThe Manhattan Project Fallacy
Google's DeepMind research outfit recently announced that it had defeated a world champion Go player with a new artificial intelligence system. This is an important technical development that should...
View ArticleSubgraph OS: Adversary resistant computing platform
Subgraph OS is a desktop computing and communications platform that is designed to be resistant to network-borne exploit and malware attacks. It is also meant to be familiar and easy to use. Even in...
View Article