Unsorted Bookmarks

49619 bookmarks
Custom sorting
Can your C compiler vectorize a scalar product? – Daniel Lemire's blog
Can your C compiler vectorize a scalar product? – Daniel Lemire's blog
If you have spent any time at all on college-level mathematics, you have probably heard of the scalar product: float scalarproduct(float * array1, float * array2, size_t length) { float sum = 0.0f; for (size_t i = 0; i < length; ++i) { sum += array1[i] * array2[i]; } return sum; } Most people who … Continue reading Can your C compiler vectorize a scalar product?
·lemire.me·
Can your C compiler vectorize a scalar product? – Daniel Lemire's blog
natus homo / joker · GitLab
natus homo / joker · GitLab
Justified Open Knowledge Evaluation and Ramification : A stateful mocking framework
·gitlab.com·
natus homo / joker · GitLab
Microchips in every American? - Marginal REVOLUTION
Microchips in every American? - Marginal REVOLUTION
What better way to move toward that goal than to start with the category labeled as “disabled”: Last Thursday, the House passed HR 4919, also known as Kevin and Avonte’s Law, which would allow the US attorney general to award grants to law enforcement for the creation and operation of “locative tracking technology programs.” Though […]
·marginalrevolution.com·
Microchips in every American? - Marginal REVOLUTION
Fifth Anniversary Of NDAA "Indefinite Detention"
Fifth Anniversary Of NDAA "Indefinite Detention"
The threat of potential incarceration under the National Defense Authorization Act - NDAA - without recourse to a lawyer, judge and trial is very serious.
·activistpost.com·
Fifth Anniversary Of NDAA "Indefinite Detention"
Hash Tables
Hash Tables
Lorem ipsum dolor amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt labore dolore.
·eternallyconfuzzled.com·
Hash Tables
7 Visualizations You Should Learn in R | R-bloggers
7 Visualizations You Should Learn in R | R-bloggers
7 Visualizations You Should Learn in R With ever increasing volume of data, it is impossible to tell stories without visualizations. Data visualization is an art of how to turn numbers into useful knowledge. R Programming lets you learn this art by offering a set of inbuilt functions and libraries to ...
·r-bloggers.com·
7 Visualizations You Should Learn in R | R-bloggers
Seth's Blog: When your phone uses you
Seth's Blog: When your phone uses you
Your smartphone has two jobs. On one hand, it was hired by you to accomplish certain tasks. In the scheme of things, it's a screaming bargain and a miracle. But most of the time, your phone wo…
·sethgodin.typepad.com·
Seth's Blog: When your phone uses you
The Least Convenient Truth | Bitch Media
The Least Convenient Truth | Bitch Media
While we must talk about the ways global warming triggers natural hazards, we must also confront what turns those hazards into full-scale disasters: racism.
·bitchmedia.org·
The Least Convenient Truth | Bitch Media
AI and Unreliable Electronics (*batteries not included) « Pete Warden's blog
AI and Unreliable Electronics (*batteries not included) « Pete Warden's blog
Picture by Torley A few months ago I returned to my home town of Cambridge to attend the first ARM Research Summit. What was special about this conference was that it focused on introducing externa…
·petewarden.com·
AI and Unreliable Electronics (*batteries not included) « Pete Warden's blog
These Violent Delights | Emily Short's Interactive Storytelling
These Violent Delights | Emily Short's Interactive Storytelling
Before I’d seen a single episode of Westworld, a journalist reached out to me for comment about it. The show touches on the question of AI consciousness, narrative design, the evocation of em…
·emshort.blog·
These Violent Delights | Emily Short's Interactive Storytelling
TLS Fingerprinting - a method for identifying a TLS client without decrypting
TLS Fingerprinting - a method for identifying a TLS client without decrypting
TLS fingerprinting is a methodology based on the attributes in an SSL handshake ClientHello message. This presents an interesting approach to identifying user agents without first decrypting the traffic and looking for an HTTP User-Agent header.
·devcentral.f5.com·
TLS Fingerprinting - a method for identifying a TLS client without decrypting
ffmpeg + gifsicle + giflossy + ImageMagick = GIFs From Videos in Linux « Adafruit Industries – Makers, hackers, artists, designers and engineers!
ffmpeg + gifsicle + giflossy + ImageMagick = GIFs From Videos in Linux « Adafruit Industries – Makers, hackers, artists, designers and engineers!
Here’s a simple setup and a readymade script for converting MP4s (or WEBMs) to animated GIFs, form Ubuntu 16.04 or Fedora 25: I started making some .gifs to embed in documentation and my note…
·blog.adafruit.com·
ffmpeg + gifsicle + giflossy + ImageMagick = GIFs From Videos in Linux « Adafruit Industries – Makers, hackers, artists, designers and engineers!
How to configure NTP has a TAI or GPS time reference? - Server Fault
How to configure NTP has a TAI or GPS time reference? - Server Fault
For our project, we would like to have all servers and systems synchronised to a linear time reference (without leap second). Therefore, we would discard UTC but are very interested in advertising...
·serverfault.com·
How to configure NTP has a TAI or GPS time reference? - Server Fault
Verizon Fields Mesosphere's DCOS to Deploy Nimbler Applications - The New Stack
Verizon Fields Mesosphere's DCOS to Deploy Nimbler Applications - The New Stack
Telecommunications giant Verizon is testing Mesosphere's Data Center Operating System as a potential new approach to managing scalable applications. DCOS "is the foundational software for how we orchestrate containers on internal clusters," said Lawrence Rau, director of architecture and infrastructure at Verizon Labs. According to Rau, DCOS is running in a number of U.S. Verizon…
·thenewstack.io·
Verizon Fields Mesosphere's DCOS to Deploy Nimbler Applications - The New Stack
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
One of the many pressing stories that remains to be told from the Snowden archive is how western intelligence agencies are attempting to manipulate and control online discourse with extreme tactics of deception and reputation-destruction.
·theintercept.com·
How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations
Stop Rolling back Deployments! – dotnet catch
Stop Rolling back Deployments! – dotnet catch
Lots of people have asked me how we handle rollbacks in our Continuous Delivery pipeline.  The short answer is we can redeploy an older MSDeploy package to revert to an older version of our website…
·dotnetcatch.com·
Stop Rolling back Deployments! – dotnet catch
Release 1.7.0 · tidwall/tile38 · GitHub
Release 1.7.0 · tidwall/tile38 · GitHub
Tile38 is an open source (MIT licensed), in-memory geolocation data store, spatial index, and realtime geofence. It supports a variety of object types including lat/lon points, bounding boxes, XYZ ...
·github.com·
Release 1.7.0 · tidwall/tile38 · GitHub