Hiring Processes Are Also Engineering Processes
I bet you suck at hiring. I don’t even know you and I’m pretty confident that you suck at hiring. If you’re an engineer, you probably suck at hiring. If you’re a technical recruiter, you probably suck...
View ArticleSpurious Splines
IntroductionIn this text I will expand directly upon the generative art methods introduced in Shepherding Random Numbers and Shepherding Random Grids. Most notably I will be using random...
View ArticleTransport employees in America were secretly paid to search travellers’ bags
THERE are many reasons why you might have been stopped at an American transport hub and your bag searched by officials. You might have be chosen at random. Perhaps you matched a profile. Or you could...
View ArticleYou might not need that $15K coding bootcamp
Coding bootcamps have exploded in popularity the past few years. I’m not against them. If they help you get started on a well-paid career in tech, $15,000 USD might be worth it.But one thing is for...
View ArticleSecure ROM extraction on iPhone 6S
abcRamtin AminHomeAboutContactFollow @key2frFemtoCellUbiquisys v2Ubiquisys v1VodaphoneNand DumpingBGA UnsolderingIn SitusSIM CardMan in the middleEmulationMiscFairplaySamsung LTE USB DongleApple...
View ArticleFall snow, rains have 'satisfied the drought debt' in Northern Sierra Nevada
At Heavenly Ski Resort, thousands of feet up in the northern Sierra Nevada, the heavy snowfall around Lake Tahoe forced the lodge to close its small roller coaster due to poor visibility this week.In...
View ArticleShow HN: Staticland – Open source static site hosting with SSL via Let's Encrypt
Learn more about staticland & the craft of building static sitesWe'll send occassional emails about changes to the static.land service, improvements to the underlying open source software, and...
View ArticleWhy does calloc exist?
When programming in C, there are two standard ways to allocate some new memory on the heap:void*buffer1=malloc(size);void*buffer2=calloc(count,size);malloc allocates an uninitialized array with the...
View ArticleTell HN: Political Detox Week – No politics on HN for one week
Like everyone else, HN has been on a political binge lately. As an experiment, we're going to try something new and have a cleanse. Starting today, it's Political Detox Week on HN.For one week,...
View ArticleThe Best Online Communities for SaaS Founders
Building, launching, and growing your SaaS can be a lonely journey. Especially if you don't live in a tech hub like San Francisco. So what are some online communities that SaaS founders and...
View ArticleDefeating PoisonTaps and Other Rogue Network Adapters with Beamgun
New and improved Beamgun now defends against USB network adapters and mass storage!Over the past few months, security researchers like Rob Fuller andSamy Kamkar have been exploring vulnerabilities...
View ArticleParallelizing Word2Vec in Multi-Core and Many-Core Architectures
(Submitted on 18 Nov 2016)Abstract: Word2vec is a widely used algorithm for extracting low-dimensional vector representations of words. State-of-the-art algorithms including those by Mikolov et al....
View ArticleWWCode (YC S16) Is Hiring an Account Manager – Remote, Part-Time (Contract)
Women Who Code ("<a href="https://www.womenwhocode.com" rel="nofollow">https://www.womenwhocode.com</a>") is a global non-profit with 80,000 members and growing. We focus on ensuring this...
View ArticleShow HN: QueryStorm – A query IDE inside Excel
Step 1: Mark your data as a table QueryStorm works with excel tables. To turn a block of cells into a table, select any cell in the block and click Insert->Table. Adjust the borders and headers if...
View ArticleIn search of the world’s hardest language
A certain genre of books about English extols the language’s supposed difficulty and idiosyncrasy. “Crazy English”, by an American folk-linguist, Richard Lederer, asks “how is it that your nose can run...
View ArticleAndrew Wiles: what does it feel like to do maths?
Andrew Wiles is a mathematical legend. He is particularly famous for proving Fermat's last theorem, a problem that had been taunting mathematicians for centuries. In this interview, Wiles tells us what...
View ArticleThe Orphaned Internet – Taking Over 120K Domains via a DNS Vulnerability
Recently, I found that Digital Ocean suffered from a security vulnerability in their domain import system which allowed for the takeover of 20K domain names. If you haven’t given that post a read I...
View ArticleThe FLIF spec has been finalized
Meta-Adaptive Near-zero Integer Arithmetic Coding (MANIAC) is a variant of Context-adaptive binary arithmetic coding (CABAC) in which not just the probability model is adaptive (based on local...
View ArticleShow HN: Victory – ReactJS library for building interactive data visualizations
README.md an ecosystem of composable React components for building interactive data visualizations.Getting startedAdd Victory to your project:$ npm install victory --saveAdd your first Victory...
View ArticleMilking the iPhone
It feels like cracks are forming at Apple's edges. The company is straining to push out hardware updates. Supply issues are getting worse. Apple is reportedly moving away from selling beloved products...
View Article