Four short links: 28 March 2018
Business Logic, Digital Forgery, Twitter Demetricator, and ML for Kids
Business Logic, Digital Forgery, Twitter Demetricator, and ML for Kids
Database Attack, Death of Android Predicted, Predicting Recidivism, and Cybersecurity Law and Policy
Honey Tokens, Digital Protection Agency, Intent, and Go on Pi
Tech Facts, History Lesson, Chrome DevTools, and Online Communities
Security Policy, Censored 3D Printers, Standup Tips, and Auto-Banning
In the software world, we’re often ignorant of the harms we do because we don’t understand what we’re working with.
Incident Response, Google VPN, Deep Learning, and Neural Network Quine
Systems and site reliability engineers, architects, and application developers must create new strategies to meet industry shifts and their constraints.
Magic Leap, Autonomous Death, Computational Cognitive Neuroscience, and Analysis of Competing Hypotheses
ML Reproducibility, Data Research, Blockchain IP Crimes, and PLATO Flashback
Longevity, Partner Violence, Leaking Secrets, and Fallacy of Objective Measurement
Traffic Attacks, VR/AR Audio, Travel Bot, and Location Codes
Flow Diagrams, Multiplayer Editing, Inductive Programming, and Manipulating Data
El Paquete, Ingenious Malware, Region Evacuation, and Deck Template
Health Care, Learning Coding, Reverse-Engineering Sandbox, and Secret Management
Truth vs. Falsehoods, Shitizen Science, Open Source Guides, and The Great Slate
Eric Colson explains why companies must now think very differently about the role and placement of data science in organizations.
Ajey Gore explains why GO-JEK is focusing its attention beyond urban Indonesia to help people across the country’s rural areas.