Four short links: 17 November 2017
Interactive Marginalia, In-Person Interactions, Welcoming Groups, and Systems Challenges
Interactive Marginalia, In-Person Interactions, Welcoming Groups, and Systems Challenges
Regulate IoT, Visualize CRISPR, Distract Strategically, and Code Together
Paywalled Research, Reproducing AI Research, Spy Teardown, and Peer-to-Peer Misinformation
AI Microscope, Android Geriatrics, Doxing Research, and Anti-Goals
Software 2.0, Watson Walkback, Robot Fish, and Smartphone Data
Syntactic Sugar, Surprise Camera, AI Models, and Git Recovery
Culture, Identifying Bots, Attention Economy, and Machine Bias
Shadow Profiles, Theories of Learning, Feature Visualization, and Time to Reflect Reality
Disturbing YouTube, Sketchy Presentation Tool, Yammer UI, and Dance Your Ph.D. Winners
IoT Standard, Probabilistic Programming, Go Scripting, and Front-End Checklist
End of Startups, Company Strategy, Complex Futures, and Bitcoin Energy
How software architects can balance technical proficiencies with an appropriate mastery of communication.
Capsule Neural Networks, Adversarial Objects, Deep Learning Language, and Crowdsourced Pop Star
Runa Sandvik shares practical lessons on how to build and foster a culture of security across an organization.
Window Snyder says security basics are hard to implement consistently, but they're worth the effort.
Multi-model database architectures provide a flexible data governance platform
Crypto Docs, Ultrasound, Anti-Innovation Investors, and IoT Security
Watch highlights covering security, defense, culture, and more. From the O'Reilly Security Conference in New York 2017.