Stop Patent Trolls: Support the Innovation Act of 2015 Summary: 9), introduced by House Judiciary Committee Chairman Rep. Bob Goodlatte (R-VA) and co-sponsored by a bipartisan coalition, offers a host of critical fixes to the problem of patent trolls. Keywords: patent, innovation, trolls, act, year Full article on act.eff.org | 501 Points and 96 Comments 32C3 – Chaos Communication Congress – Streams Online Summary: Westfeld (http://www.kulturherberge.de/) 2018-08-16 – 2018-08-19
AWS mistakes to avoid Summary: Auto scaling is achieved by setting alarms on metrics like CPU usage (of the logical group) or number of requests the load balancer received. Keywords: auto, scaling, aws, web, machines Full article on cloudonaut.io | 538 Points and 261 Comments Perl 6 Released Summary: In the past few months, YouTube has suggested a few cube videos to me based on my interest in the standupmaths channel ; seeing the world record come in under 5 seconds makes my old time of a minute seem ridiculously slow.
Facebook is misleading Indians with its full-page ads about Free Basics Summary: What Facebook wants is our less fortunate brothers and sisters should be able to poke each other and play Candy Crush, but not be able to look up a fact on Google, or learn something on Khan Academy or sell their produce on a commodity market or even search for a job on Naukri. Keywords: facebook, free, india, internet, basics
Open Letter to Mozilla: Bring Back Persona Summary: … We thought we had more time to experiment with the core protocol and product design, but with Mozilla Labs’ somewhat sudden dissolution, we were unexpectedly asked to demonstrate traction and commercial adoption that simply wasn’t there. Keywords: persona, email, mozilla, address, site Full article on stavros.io | 905 Points and 237 Comments Ruby 2.3.0 Released Summary: Ruby 2.3 introduces a new magic comment and command line option to freeze all string literals in the source files.
‘New’ Python modules of 2015 Summary: Once you’ve downloaded and installed it you get a full scientific Python stack including all of the standard libraries (numpy, scipy, pandas, matplotlib, sklearn, skimage…and many more). Keywords: python, pickle, functions, ve, module Full article on blog.rtwilson.com | 591 Points and 131 Comments When a Unicorn Startup Stumbles, Its Employees Get Hurt Summary: Employees had little idea that an outside appraisal firm had valued Good at $434 million and the common stock at about 88 cents a share as of June 30, according to investor documents and legal filings.
BetterExplained: Math Lessons That Explain Concepts Full article on betterexplained.com | 666 Points and 126 Comments LÖVE 0.10 released with iOS and Android support Summary: Removed the “canvas”, “shader”, “npot”, “subtractive”, and “mipmap” GraphicsFeature constants (the features always have guaranteed support now.) Keywords: added, removed, support, mesh, optional Full article on love2d.org | 323 Points and 91 Comments On the Juniper backdoor Summary: Or rather, that the sky will fall if they act on some of the very bad, terrible ideas that are currently bouncing around Washington — namely, that our encryption systems should come equipped with “backdoors” intended to allow law enforcement and national security agencies to access our communications.
SpaceX launch webcast: Orbcomm-2 Mission [video] Summary: On Friday, December 22nd at 5:27 p.m. PST, SpaceX’s Falcon 9 successfully lifted off from Space Launch Complex 4E (SLC-4E) at Vandenberg Air Force Base in California, carrying the Iridium-4 mission to orbit. Keywords: mission, launch, spacex, falcon, satellites Full article on spacex.com | 1284 Points and 370 Comments Rails 5.0.0.beta1: Action Cable, API Mode, Rails Command Summary: What’s really lovely about Action Cable is that you get access to your entire Active Record and PORO domain model in your WebSockets work.
Juniper screenOS authentication backdoor - master ssh password posted Summary: On December 18th, 2015 Juniper issued an advisory indicating that they had discovered unauthorized code in the ScreenOS software that powers their Netscreen firewalls. Keywords: backdoor, juniper, authentication, ssh, telnet Full article on community.rapid7.com | 407 Points and 170 Comments About those lava lamps Full article on gist.github.com | 360 Points and 66 Comments Deep Learning: An MIT Press Book in Preparation Summary: The Deep Learning book has moved.
Obama Signs CISA Bill into Law Summary: Speaking just before the Senate’s final vote on the bill, Appropriations Committee Vice Chairwoman Barbara Mikulski, D-Md., invoked Star Wars. Keywords: bill, president, obama, friday, carolyn Full article on npr.org | 379 Points and 221 Comments Juniper: Recording Some Twitter Conversations Summary: On Thursday, Juniper announced that some of their products were affected by “unauthorized code in ScreenOS that could allow a knowledgeable attacker to gain administrative access to NetScreen® devices and to decrypt VPN connections”.
Big Company vs. Startup Work and Compensation Summary: Thanks to Kelly Eskridge, Leah Hanson, Julia Evans, Alex Clemmer, Ben Kuhn, Malcolm Matalka, Nick Bergson-Shilcock, Joe Wilder, Nat Welch, Darius Bacon, Lindsey Kuper, Prabhakar Ragde, Pierre-Yves Baccou, David Turner, Oskar Thoren, Katerina Barone-Adesi, Scott Feeney, Ralph Corderoy, Ezekiel Benjamin Smithburg, and Kyle Littler for comments/corrections/discussion. Keywords: companies, work, company, big, startup Full article on danluu.com | 730 Points and 401 Comments
Instagram’s Million Dollar Bug Summary: As it turns out, I did find a “million-dollar bug” in Instagram (specifically I gained access to a lot of data including SSL certs, source code, photos, etc), but that’s really only the start to the story. Keywords: facebook, access, vulnerability, instagram, server Full article on exfiltrated.com | 1562 Points and 514 Comments My positive experience as a woman in tech Full article on lea.
The first person to hack the iPhone is building a self-driving car Full article on bloomberg.com | 949 Points and 447 Comments Congress has added CISA to the federal budget bill Summary: In many ways, the bill currently facing the House is even more invasive than previous versions, stripping out crucial provisions that prevented direct information-sharing with the NSA and mandated that data be anonymized before being widely distributed.
How Product Hunt really works Summary: Unlike Swifty, however, the Lrn team — having read Bram Kanstein’s post— found an advisor in advance with front page-promotion privileges and coordinated the launch with him, even going so far as to have him wake up at 4:30 in the morning so as to capture more European upvotes. Keywords: product, hunt, page, products, front Full article on medium.com | 695 Points and 222 Comments
Philips Hue blocks 3rd party lights Summary: Their Zigbee-based hub is rock solid, never crashes, great API and worked with other Zigbee light bulbs too. Keywords: hue, philips, bulbs, party, light Full article on home-assistant.io | 561 Points and 293 Comments Bullshit Startup Experiences Summary: founder: I’m sure you’re very well compensated by your ongoing development projects, and you know running this non-profit is really eating up my bank account, and since this is a Non-Profit Startup I really have nothing to offer
Show HN: Cloudcraft – Create AWS diagrams Summary: Capture your key services with smart components for EC2, ELB, Lambda, RDS, DynamoDB, Kinesis, Redshift, CloudFront, Route 53 etc. Keywords: aws, cloudcraft, components, optimized, smart Full article on cloudcraft.co | 281 Points and 72 Comments UK citizens may soon need licenses to photograph some stuff they already own Summary: Similar to the recent announcement that it is once again illegal to make private copies of music you own , it is unlikely the public will pay much attention to this latest example of copyright being completely out of touch with how people actually use digital technology.
Introducing OpenAI Summary: Click here if you are not redirected. Keywords: click, redirected Full article on openai.com | 1107 Points and 376 Comments Stop using gzip Summary: Well, they place the tagline of “Build apps that are a delight to use, faster than you ever thought possible” right on their homepage. Keywords: xz, time, gzip, user, system Full article on imoverclocked.blogspot.com | 432 Points and 254 Comments How Elon Musk and Y Combinator Plan to Stop Computers from Taking Over Summary: That’s the tech accelerator that started 10 years ago as a summer project that funded six startup companies by paying founders “ramen wages” and giving them gourmet advice so they could quickly ramp up their businesses.
The first plasma: the Wendelstein 7-X fusion device is now in operation Summary: Their special shapes are the result of refined optimisation calculations carried out by the “Stellarator Theory Department”, which spent more than ten years searching for a magnetic cage that is particularly heat insulating. Keywords: plasma, wendelstein, helium, vessel, fusion Full article on ipp.mpg.de | 383 Points and 94 Comments Rust 1.5 Summary: Rivas Z. J. Ryan Stinnett Jack Wilson James Bell James McGlashan Jan Likar Jan-Erik Rediger Jed Davis Jethro Beekman John Hodge Jonas Schievink Jonathan Hansford Jorge Aparicio Jose Narvaez Joseph Caudle Keshav Kini Kevin Butler Kevin Yap Kyle Robinson Young Lee Jeffery Lee Jenkins Lennart Kudling Liigo Zhuang Luqman Aden Manish Goregaokar Marcello Seri Marcus Klaas Martin Pool Matt Brubeck Michael Howell Michael Layzell Michael Pankov Ms2ger Nick Cameron Nick Hamann Nick Howell Niko Matsakis Oliver Schneider Peter Atashian Peter Marheine Philipp Oppermann Remi Rampin Reza Akhavan Ricardo Signes Richard Diamond Robert Gardner Robin Kruppe Ruud van Asseldonk Ryan Scheel Scott Olson Sean Bowe Sebastian Wicki Seeker14491 Seo Sanghyeon Simon Mazur Simon Sapin Simonas Kazlauskas Stefan O’Rear Steve Klabnik Steven Allen Steven Fackler Sébastien Marie Ted Mielczarek Tobias Bucher Tshepang Lekhonkhobe Ulrik Sverdrup Utkarsh Kukreti Vadim Chugunov Vadim Petrochenkov Vitali Haravy Vladimir Rutsky Wesley Wiser Will Speak William Throwe Willy Aguirre Xavier Shay Yoshito Komatsu arcnmx arthurprs billpmurphy bors christopherdumas critiqjo glendc kickinbahk llogiq mdinger nwin nxnfufunezn panicbit skeleten whitequark
Why Go Is Not Good (2014) Summary: For example, if your microcontroller is controlling a rocket engine, it would suck if you tried to allocate some space on the heap and it happened to take a few hundred milliseconds longer than usual, leading to incorrect valve timing and a massive explosion. Keywords: type, data, programming, function, good Full article on yager.io | 413 Points and 453 Comments Show HN: Jukedeck – create unique, royalty-free music for your videos using A.
Who Y Combinator Companies Want Summary: To map the preferences of the top YC companies, we wrote paragraphs describing 9 hypothetical programmers , embodying patterns we’d seen from running 1000+ interviews over the last 6 months. Keywords: companies, programmers, company, programmer, interviews Full article on data.triplebyte.com | 667 Points and 526 Comments Mozilla Will Stop Developing and Selling Firefox OS Smartphones Summary: Sales, however, were always poor and the devices themselves failed to ignite a lot of consumer interest, and a number of OEMs cornered the market with a flood of cheap handsets.
Dropbox closing Carousel and Mailbox Summary: Les équipes Carousel et Mailbox ont développé des produits que bon nombre d’utilisateurs apprécient et leur travail ne cessera d’avoir un impact positif sur nos vies. Keywords: mailbox, carousel, de, nous, wir Full article on blogs.dropbox.com | 624 Points and 372 Comments The Best Books I Read in 2015 Summary: Through clever research studies and engaging writing, Dweck illuminates how our beliefs about our capabilities exert tremendous influence on how we learn and which paths we take in life.
Survey of popular Node.js packages reveals credential leaks Summary: Request , Browserify , grunt , grunt-cli , cordova , forever , less , pm2 , node-gyp , karma , yo , strongloop , glob , mocha , sails , and a lot of other packages were all also indirectly affected (via deps). Keywords: npm, github, packages, password, credentials Full article on github.com | 355 Points and 76 Comments The Starfighter Low-Level Tech Tree Summary: It’s long enough that I won’t include it all here, but I’ll give you a brief summary of its contours: You’ve got your math instructions: ADC, ADD, ADIW, AND, ANDI, ASR, EOR, INC, LAS, LAT, LSL, LSR, ROL, ROR, DEC, OR, NEG, SUB, SUBI Each of those will take a pair of registers, perform an operation on both, and store the result back to the first argument.
Open source software for developing world hospitals Summary: HospitalRun is built to provide the most modern hospital information system possible to the least resourced environments. Keywords: hospitalrun, read, people, built, provide Full article on hospitalrun.io | 458 Points and 112 Comments The Fall and Rise of SVG Summary: This promised to serve as a format for rendering interactive vector graphics in Web browsers, which at that time (the era of Netscape Navigator 4.
Swift is Open Source Summary: And because it is open, their Swift skills will be able to be applied to an even broader range of platforms, from mobile devices to the desktop to the cloud. Keywords: swift, programming, language, easy, things Full article on swift.org | 1824 Points and 432 Comments Entering Public Beta Summary: Automation is a cornerstone of our strategy, and we need to make sure that the client works smoothly and reliably on a wide range of platforms.
Kazakhstan to MitM all HTTPS traffic starting Jan 1 Summary: Сохраняйте видео для мобильных устройств, сделайте из любимой песни рингтон или улучшите свои фотографии. Keywords: tv, и, video, surveillance, id Full article on telecom.kz | 803 Points and 361 Comments How to be like Steve Ballmer Summary: You open the door to his enormous grinning face, and before you know it he’s in the hall handing over a bottle of something cheap (but with such confidence you don’t notice) and he’s giving you the handshake of your life.
A letter to our daughter Summary: If you fear you’ll go to prison rather than college because of the color of your skin, or that your family will be deported because of your legal status, or that you may be a victim of violence because of your religion, sexual orientation or gender identity, then it’s difficult to reach your full potential. Keywords: world, generation, people, children, today Full article on facebook.
A Decade-Old Gag Order, Lifted Summary: “The most brilliant propagandist technique will yield no success unless one fundamental principle is borne in mind constantly - it must confine itself to a few points and repeat them over and over” Keywords: law, time, people, government, constitution Full article on aclu.org | 737 Points and 146 Comments The secret message hidden in every HTTP/2 connection Summary: On June 14, 2013 the string was changed with the comment “ Exercising editorial discretion regarding magic .
Show HN: Something pointless I made Full article on dn.ht | 747 Points and 102 Comments Double paid traffic Summary: For this reason, we have observed with growing concerns that some DSL and cable operators with leading market positions in Germany, the USA and also in Asia, do not have open peering policies, but on the other hand also do not have not having sufficient capacity to other Tier 1 carriers to ensure a fast and smooth access to the global Internet for their customers.
English has been my pain for 15 years (2013) Summary: blog comments powered by Keywords: english, pain, years, blog, comments Full article on antirez.com | 261 Points and 238 Comments The New Atomic Age We Need Summary: But after years of cost overruns, technical challenges and the bizarre coincidence of an accident at Three Mile Island and the 1979 release of the Hollywood horror movie “The China Syndrome,” about a hundred proposed reactors were canceled.
Pirated Courses on Udemy Summary: The titles and descriptions are typically changed, as are the graphics identifying the course (the things you would search on)— so you basically have to stumble onto it, or someone needs to tip you off (as with Troy’s case). Keywords: udemy, video, money, troy, courses Full article on medium.com | 701 Points and 232 Comments The Triumph of Stupidity (1933) Summary: By murder, by torture, by imprisonment, by the terrorism of armed forces, they have subjected the intelligent and humane parts of the nation and seized power with the view of furthering the glory of the Fatherland.
Shrinking to Zero: The Raspberry Pi Gets Smaller Summary: By putting Eben Upton in charge of the commercial operation and appointing Philip Colligan as chief executive of the charitable foundation, the hope is that the whole project can be clear about its mission. Keywords: raspberry, pi, computing, people, project Full article on bbc.co.uk | 480 Points and 183 Comments The Secret Ingredient in Orange Juice Full article on foodrenegade.com | 471 Points and 262 Comments
Raspberry Pi Zero: the $5 computer Summary: Even in the developed world, a programmable computer is a luxury item for a lot of people, and every extra dollar that we ask someone to spend decreases the chance that they’ll choose to get involved. Keywords: pi, raspberry, computer, people, free Full article on raspberrypi.org | 1271 Points and 332 Comments Macbook charger teardown: surprising complexity inside Apple’s power adapter Summary: The imitation charger pays attention to safety, using insulating tape and keeping low and high voltages widely separated, except for one dangerous assembly error that can be seen below.
MagSpoof – wireless credit card/magstripe spoofer Summary: MagSpoof does allow you to perform research in other areas of magstripes, microcontrollers, and electromagnetism, as well as learn about and create your own devices similar to other existing, commercial technologies such as Samsung MST and Coin . Keywords: card, credit, magspoof, magnetic, magstripe Full article on github.com | 541 Points and 109 Comments First Timers Only Summary: As open source project maintainers, we are empowered with the ability to help newcomers feel this for the first time and contribute back.
Google Launches Android Studio 2.0 Summary: With version 2.0, as Google’s group product manager for Android Studio Stephanie Cuthbertson told me, the team wanted to build on the foundation it laid over the last two years and focus on speed. Keywords: google, android, apps, studio, developers Full article on techcrunch.com | 532 Points and 168 Comments Dell shipping laptop with rogue self-signed root CA Full article on np.reddit.com | 400 Points and 87 Comments
Breaking the fourth wall with Minecraft Summary: OpenComputer works with redstone, so we can easily read the binary state of a Minecraft lever, either ON or OFF and toggle the WHITE byte to turn on or off the WiFi bulb. Keywords: minecraft, computer, redstone, program, byte Full article on hashbang.gr | 367 Points and 70 Comments The End of the Internet Dream Summary: And yet, to paraphrase Justice Sonya Sotomayor, this data can reveal your contacts with “the psychiatrist, the plastic surgeon, the abortion clinic, the AIDS treatment center, the strip club, the criminal defense attorney, the by-the-hour motel, the union meeting, the mosque, synagogue or church, or the gay bar.
What is a coder’s worst nightmare? (2014) Summary: It was a program that reads a data file, asks about 50 questions, does some calculations, and comes up with some score based on this PhD’s research. Keywords: code, source, compiler, files, program Full article on quora.com | 476 Points and 224 Comments Webtorrent – BitTorrent over WebRTC Summary: Supports advanced torrent client features Comprehensive test suite (runs completely offline, so it’s reliable and fast)
NASA Orders SpaceX Crew Mission to International Space Station Full article on nasa.gov | 593 Points and 136 Comments The Macro Summary: Oleg RogynskyyNov 3 Cadran CowansageOct 27 The MacroOct 25 Karen LienOct 21 The MacroOct 14 Meet the Batch (S16)Oct 14 Eli SchwartzOct 12 The MacroOct 11 Aaron EpsteinOct 10 Keywords: startup, school, video, macrooct, yc Full article on macro.ycombinator.com | 454 Points and 114 Comments Baseless Calls to Expand Surveillance Fit Familiar, Cynical Pattern Summary: One of the government’s most powerful surveillance tools is scheduled to sunset in less than three weeks, and, for months, EFF has fought multiple legislative attempts to either extend or expand the NSA’s spying powers—warning the public, Representatives, and Senators about circling bills that threaten Americans’ privacy.
ARRIS Cable Modem Has a Backdoor in the Backdoor Summary: Someone needs to update the Responsible Disclosure RFC and include a note describing that vendors shall lose disclosure points whenever they plant a backdoor on the device (ARRIS modems have a third backdoor too, check the ConsoleCowboys Blog ).I’m pretty sure bad guys had been exploiting flaws on these devices for some time (just search for ARRIS DNS on Twitter , for example).
VLC contributor living in Aleppo writing about the Paris attacks Summary: We in Aleppo, or more accurately in the western part of the city still under the control of the Syrian government, were at one point under siege by them, and they were on the verge of breaking in. Keywords: names, windows, family, style, attacks Full article on mailman.videolan.org | 1368 Points and 705 Comments Times Pulls Article Blaming Encryption in Paris Terror Attack Summary: Seemingly in reference to the forthcoming Oliver Stone film about Snowden starring Joseph Gordon-Levitt, Perino’s Fox News colleague Greg Gutfeld tweeted , “if the attack was aided through ‘whistleblowers’ leaking what the NSA cannot penetrate, will that be part of the movie?
Jessica Livingston Summary: But Jessica knew her example as a successful female founder would encourage more women to start companies, so last year she did something YC had never done before and hired a PR firm to get her some interviews. Keywords: yc, jessica, founders, people, good Full article on paulgraham.com | 1740 Points and 308 Comments Modern Java – A Guide to Java 8 Summary: The above code should be self-explaining: putIfAbsent prevents us from writing additional if null checks; forEach accepts a consumer to perform operations for each value of the map.
The Advertising Bubble Summary: The payment may be direct (a hardware store owner buys an ad in the paper) or convoluted (Sony pays a movie studio to show James Bond using their crappy cell phone ). Keywords: ad, money, companies, advertising, ads Full article on idlewords.com | 551 Points and 325 Comments Walmart’s $10 Smartphone Has Better Specs Than the Original iPhone Summary: It’s perhaps even more impressive when you consider that its modest specs—a 3.
Xv6 Summary: Unlike Linux or BSD , xv6 is simple enough to cover in a semester, yet still contains the important concepts and organization of Unix . Keywords: university, edit, original, operating, iit Full article on en.wikipedia.org | 350 Points and 47 Comments We need less powerful languages Summary: This is not a theoretical problem — I’ve found that doing setup.py sdist and other commands can take 10 minutes to run, due to a large number of files in the working directory if you use the tool tox for instance.
Paris Shootings and Explosions Kill Over 100, Police Say Summary: The casualties eclipsed by far the deaths in Paris during the massacre at the satirical newspaper Charlie Hebdo and related assaults around the French capital by Islamic militant extremists less than a year ago. Keywords: paris, french, france, police, attacks Full article on nytimes.com | 623 Points and 624 Comments Stop-And-Seize Turns Police into Self-Funding Gangs Full article on bloombergview.
Gene Amdahl has died Summary: “By sheer intellectual force, plus some argument and banging on the table, he maintained architectural consistency across six engineering teams,” said Frederick P. Brooks Jr., a computer scientist who was the project manager of the System/360 and is now at the University of North Carolina, Chapel Hill. Keywords: amdahl, ibm, computer, computers, mainframe Full article on nytimes.com | 740 Points and 111 Comments Don’t copy paste from a website to a terminal Summary: However, those commands are long as hell and you know you’re probably not gonna need them for a few years or so (so there’s no need to memorize them).
Show HN: Parinfer – a simpler way to write Lisp Summary: The hope is to make basic Lisp-editing easier for newcomers and experts alike, while still allowing existing plugins like Paredit to satisfy the need for more advanced operations. Keywords: parens, indentation, mode, line, parinfer Full article on shaunlebron.github.io | 674 Points and 134 Comments What happens when a culture is driven by the need for money to make more money Summary: Basecamp and the Hype Machine are independent software companies that put their products and life experience ahead of creating massive growth curves.
Six years of Go Summary: It features a completely redesigned garbage collector that makes the language more suitable for latency-sensitive applications; it marks the transition from a C-based compiler tool chain to one written entirely in Go ; and it includes ports to new architectures , with better support for ARM processors (the chips that power most smartphones). Keywords: support, improvements, years, today, language Full article on blog.golang.org | 405 Points and 317 Comments
TensorFlow: open-source library for machine intelligence Summary: In just its first year, TensorFlow has helped researchers, engineers, artists, students, and many others make progress with everything from language translation to early detection of skin cancer and preventing blindness in diabetics. Keywords: tensorflow, machine, translation, google, announcing Full article on tensorflow.org | 1559 Points and 196 Comments Atlassian files for IPO Summary: If at the time of a takeover offer the Takeover Panel determines that we have our place of central management and control in the United Kingdom, or if at that time we have our shares admitted to trading on a regulated market or multilateral trading facility in the United Kingdom (or a regulated market in one or more member states of the European Economic Area), we would be subject to a number of rules and restrictions, including but not limited to the following: (1) our ability to enter into deal protection arrangements with a bidder would be extremely limited; (2) we may not, without the approvals of our shareholders, be able to perform certain actions that could have the effect of frustrating an offer, such as issuing shares or carrying out acquisitions or disposals; and (3) we would be obliged to provide equality of information to all bona-fide competing bidders.
Why people keep trying to erase the Hollywood sign from Google Maps (2014) Summary: Thanks to the duplicitous nature of NIMBYs, now we have three levels of censorship happening here in Hollywood: Organizations erecting digital walls around our most famous landmarks, technology companies lying to tourists about our geography, and a faction of vigilante residents cracking down on bloggers who are trying to disseminate accurate information about our city.