Trialling a simpler UI for Twitter, without like/retweet counts: https://www.buzzfeednews.com/article/nicolenguyen/behind-twitters-plan-to-get-people-to-stop-yelling-at-each
miniblog.
IPv4 addresses are now so valuable that people are committing fraud to obtain them! https://www.circleid.com/posts/20190514_735k_fraudulently_obtained_ip_addresses_have_been_revoked/
Powershell 7, and how the Linux userbase has overtaken Windows! https://devblogs.microsoft.com/powershell/the-next-release-of-powershell-powershell-7/
Reflections on Maxis, SimCity, and world views in computer games: https://www.theatlantic.com/technology/archive/2015/03/video-games-are-better-without-characters/387556/
Computer Utopias: notes from a course with some fabulous discussion of tech today, how we think about it, and what it could be: https://chrisnovello.com/teaching/risd/computer-utopias/
Rust 1.34.0 had a security vulnerability that allowed reading/writing memory out of bounds!
https://blog.rust-lang.org/2019/05/14/Rust-1.34.2.html
Markets are bigger, and companies are more valuable, because the internet has allowed them reach many more people: https://blog.eladgil.com/2019/05/markets-are-10x-bigger-than-ever.html
@cwebber@octodon.social How so? What conclusion did you draw?
Exploring creation-oriented UI design for tablets with a touch screen: https://medium.com/@hirodusk/the-ipad-as-a-fast-precise-tool-for-creativity-21384ea18659
Many services are built on open source services, but today's model is monetising *state*: https://denisnazarov.com/what-comes-after-open-source/
Online videos are often a great historical reference for obsolete computer games, because they show the game in context of an active community: https://www.rockpapershotgun.com/2019/05/06/how-youtube-lets-plays-are-preserving-video-game-history/
(I suppose this also applies to MUDs and online communities that aren't gaming related.)
Yet another side channel attack in CPUs: https://www.zdnet.com/article/intel-cpus-impacted-by-new-zombieload-side-channel-attack/
(Big incentive to upgrade when fixed chips are available!)
Deciding how many nodes and layers to use in a neutral network: many functions can be expressed in 1 or 2 hidden layers, more is often better and faster, and you usually have to experiment.
https://machinelearningmastery.com/how-to-configure-the-number-of-layers-and-nodes-in-a-neural-network/
Generating photos of fictional people using generative adversarial networks: https://thispersondoesnotexist.com/
Really interesting paper exploring adversarial inputs to ML models: https://arxiv.org/abs/1905.02175
They conclude:
* It's a property of the input data, not the training
* You can even train a model on non-robust features and obtain a model that works well on the original input data!
Exploring garbage collection accelerators in CPUs: https://spectrum.ieee.org/tech-talk/computing/hardware/this-little-device-relieves-a-cpu-from-its-garbage-collection-duties
A story of exploiting Android through releasing packages with the same name and ID on public repositories: https://blog.autsoft.hu/a-confusing-dependency/
The amount of TV people watch is determined more by genetics than environment: https://www.rationaloptimist.com/blog/the-genes-of-human-behaviour/
AV1 files are roughly 1/30th of the size of equivalent GIFs! https://www.singhkays.com/blog/its-time-replace-gifs-with-av1-video/
IFTTT is very limited compared to programming, but it's super convenient for adding functionality to a smartphone.
For example, I have a task that unmutes my phone if I miss a call. This is really handy functionality for me, and doesn't exist in the phone app itself.
Showing 2,041-2,060 of 7,508 posts