The Complete Machine Learning Bundle | Boing Boing Store
The Complete Machine Learning Bundle: Master AI & You'll Acheive the Impossible: Launch Into the Innovative Field of Machine Learning with 10 Courses & 63.5 Hours of Training
Powerful Video Shows Why Ghost In The Shell Whitewashing Has Real Consequences
It can be easy to dismiss issues of representation in the abstract. Casting Scarlett Johansson as the lead in Ghost In The Shell was portrayed as part of the business, and many who criticized it as whitewashing were told they were over-reacting. After all, “it’s just a movie.” But as one video shows, there’s nothing…
Wildfire Creates Automator-Like Workflows in Chrome
Automator is one of the easiest ways to automate tasks on your Mac, and the ability to record mouse actions makes it so just about anyone can create their own workflows within seconds. Wildfire is a Chrome extension that attempts to bring a similar feature to Chrome.
How Much Power the Raspberry Pi Zero W Uses Compared to Other Models
One of the major benefits of using one of the two models of Raspberry Pi Zero, including the new wireless model, is the lack of power consumption. This is handy for mobile projects where you’re running off a battery. The addition of Wi-Fi draws a little extra power. Raspi.TV breaks down the specifics.
What You Need to Know About Ryzen, AMD's Shot at an Intel-Killing Chip
Sometimes it feels like computers have reached peak speed. Often times, when trolling YouTube or playing a quick round of Overwatch the limitations on performance seem tied to something else. Your internet is too slow, or you need a new graphics card. Computer processors have gotten faster—every year Intel unveils a…
How to Control a Raspberry Pi Remotely From Anywhere In the World
Ever wished you could access your Raspberry Pi when you’re on the road? Perhaps you’ve set up a home security camera, you’re running a private Minecraft server, or you’re using your Pi for some crazy hacked together internet appliance of your own making. Whatever your reasons, it’s easy than you think to access that…
A friend of mine likes to say that “culture is destiny.” You can get everything else right but if you get your culture wrong, you are going to have problems. As I look across our portfolio, I see many different cultures, some very strong and obvious even to outsiders. Some cultures are more nuanced and […]
That's most of us. You can work really hard to get a little more talented. And you can also work to get a little less lazy. It turns out that getting less lazy, more brave—more clear about you…
The USG is a firewall for your USB ports. Your computer automatically trusts every device you plug into it. But every USB device is actually a small embedded computer that runs software you cannot control. USB driver exploits work by sending malformed or unexpected input to your computer's USB drivers. Your computer likely has hundreds of USB device drivers installed, and a programming error ...
I’ve written plenty about the software layer that adapts the Hypothesis annotator to the needs of someone who gathers, organizes, analyzes, and then writes about evidence found online. Studen…
Microsoft: Azure Breaks Kubernetes Free from Exclusivity, Lock-in - The New Stack
“I think that there’s a lot of value that people have that is out in the ecosystem, that we don’t necessarily want to, or even believe that is necessary to, tie to a particular operating system,” stated Brendan Burns, Microsoft’s partner architect and one of the original lead developers of Google’ Kubernetes, speaking with The…
CNCF to Host CoreDNS, Boosting its Cloud-Native Portfolio with Service Discovery - The New Stack
In the second signing just this week, the Cloud Native Computing Foundation officially announced Thursday morning it is assuming stewardship of CoreDNS, a project born just a year ago from an idea to gut the insides of a web server called Caddy and make it respond to complex requests for service discovery. “There are many different…
The Rise in SSL-based Threats - Cloud Security Alliance Blog : Cloud Security Alliance Blog
The majority of Internet traffic is now encrypted. With the advent of free SSL providers like Let’s Encrypt, the move to encryption has become easy and free.
Lessons Learned from Decommissioning a Legacy Service | LinkedIn Engineering
Last quarter, I worked on a project called “kill-inbox-war.” Inbox-war was a frontend service that served legacy LinkedIn messaging UI, RPC (Remote Procedure Call) endpoints before Rest.li, and some parts of notifications and invitations for LinkedIn. Even though most of the functionality related to messaging had already been moved out of inbox-war before the project started, the service still had greater than 1,400 QPS (queries per second) at peak. Finally, after almost four months of hard work, the QPS has dropped to almost 0. The graph below is inbox-war QPS for the past six months.
The Legal, Policy, and Technical Landscape Around Data Deletion | Center for Democracy & Technology
Delete is a word built into the vocabulary of users from the beginning of personal computing. When commanded to “del,” an operating system appeared to erase a file completely. However, right from the start, a user’s commonsense understanding of the command to “delete” differed from companies’ practices; rather than erasing a file, “delete” meant “put […]