Non-profit’s $300 hepatitis C cure as effective as $84k alternative
Summary: An affordable hepatitis C treatment has been shown to be safe and effective, with very high cure rates for patients including hard-to-treat cases, in interim clinical trial results that offer hope to the 71 million people living with the disease worldwide.
Keywords: hepatitis, treatment, dndi, high, people
Building a Text Editor for a Digital-First Newsroom
Summary: Whether it’s your basic Apple Notes, or something more advanced like Google Docs, Microsoft Word or Medium, our text editors allow us to record and render our important thoughts and information, enabling us to tell stories in the most engaging ways.
Keywords: text, editor, prosemirror, nodes, node
The Moon in 4k resolution [video]
Summary: Constantly shadowed areas near the poles are hard to photograph but easier to measure with altimetry, while several of the Apollo landing sites, all relatively near the equator, have been imaged at resolutions as high as 25 centimeters (10 inches) per pixel.
Keywords: tour, lunar, south, orientale, lro
Duolingo Suddenly Has Over Twice as Much Language Learning Material
Summary: The app follows the common structure of teaching ever more advanced skills, starting with basic words and phrases like “ Je suis un garçon ,” and working up to complex topics like business and religion.
Keywords: exercises, duolingo, users, skill, levels
Tesla Was Kicked Off Fatal Crash Probe by NTSB
Summary: The National Transportation Safety Board told Tesla Inc. on Wednesday that the carmaker was being removed from the investigation of a fatal accident, prior to the company announcing it had withdrawn from it, according to a person familiar with the discussion.
Keywords: ntsb, investigation, tesla, company, agency
How to Decide What to Build
Summary: Even Elon Musk started SpaceX with the goal of merely increasing NASA’s budget by pulling a PR stunt .
Keywords: ll, make, people, ideas, don
Birds can see Earth’s magnetic fields because of cryptochromes in their eyes
Summary: There’s also been evidence in recent years that, in birds, the cryptochromes in their eyes are responsible for their ability to orient themselves by detecting magnetic fields, a sense called magnetoreception.
Keywords: cryptochromes, magnetoreception, circadian, eyes, magnetic
The NES Homebrew Scene
Summary: Throughout the system’s life, numerous classic games helped shape the minds and hearts of an entire generation, in addition to cementing the legacy of certain character and franchises like Mario, Zelda, Kirby and Metroid—all of which have recently received new entries into their respective series.
Keywords: nes, games, game, homebrew, programming
Publisher Gets Carte Blanche to Seize New Sci-Hub Domains
Summary: After obtaining an injunction against the site last year, the American Chemical Society went back to court for an update, which now gives it the authority to seize newly registered domain names as well.
Keywords: domain, names, injunction, court, amended
Firefox updates its iOS web browser to turn Tracking Protection on by default
Summary: And its rules about trackers are based on the Disconnect blocklist, which has a specific definition of tracking that’s aimed at protecting individual users’ data from being collection across multiple websites and then retained.
Keywords: tracking, firefox, mozilla, users, protection
Could a Neuroscientist Understand a Microprocessor? (2017)
Summary: Lazebnik [ 9 ] made similar observations about this approach in molecular biology, suggesting biologists would obtain a large number of identical radios and shoot them with metal particles at short range, attempting to identify which damaged components gave rise to which broken phenotype.
Keywords: processor, brain, neuroscience, transistors, transistor
Reddit’s redesign could kill discussion subreddits
Summary: In contrast, architecture is also the means by which people bypass prohibitions on housing discrimination; city planners and engineers build physical inconveniences (highways, railways, etc) between predominantly white and black neighborhoods, creating de facto segregation.
Keywords: reddit, users, design, time, cmv
PowerHammer: Exfiltrating Data from Air-Gapped Computers Through Power Lines
Summary: In this case, a malicious code running on a compromised computer can control the power consumption of the system by intentionally regulating the CPU utilization.
Keywords: attack, power, level, data, lines
Hello: A new social network founded by Orkut’s creator
Summary: It’s also why I created the world’s first social network when I was a grad student at Stanford, and it’s why I have dedicated my life to helping people connect with each other.
Keywords: people, world, orkut, network, social
Hubble Telescope Discovers a Light-Bending ‘Einstein Ring’ in Space
Summary: The scientific team added that they plan to use this particular Einstein ring in Sculptor to probe the nature of dark matter .
Keywords: ring, galaxy, einstein, space, cluster
Abusing Linux’s firewall: the hack that allowed us to build Spectrum
Summary: Today we are introducing Spectrum : a new Cloudflare feature that brings DDoS protection, load balancing, and content acceleration to any TCP-based protocol.
Keywords: ip, port, addresses, network, socket
The high modernism of social media companies
Summary: Scott blames the technocratic hubris of High Modernism for some of the great social engineering disasters of the 20th century, from Stalin’s famine-inducing farm collectivization, to our own country’s failed mid-century urban renewal projects, which, to quote Pinker, too often “replaced vibrant neighborhoods with freeways, high-rises, windswept plazas, and brutalist architecture.”
Keywords: social, high, boz, facebook, people
Lisp Game Jam 2018
Summary: There are plenty of friendly people in the #lispgames Freenode IRC channel or the Lisp Discord server (see the Discussion section below) that would enjoy helping you if you’re stuck.
Keywords: game, jam, lisp, people, give
Apple starting to alert users that it will end 32-bit app support on the Mac
Summary: The company started making it 10 or so years ago with the Power Mac G5 desktop, so it hasn’t exactly been an overnight ask for developers.Of course, if you’ve got older, non-supported software in your arsenal, the eventual end-of-lifing could put a severe damper on your workflow.
Keywords: company, transition, desktop, apps, mac
Quantum Algorithm Implementations for Beginners
Summary: Authors: Patrick J. Coles , Stephan Eidenbenz , Scott Pakin , Adetokunbo Adedoyin , John Ambrosiano , Petr Anisimov , William Casper , Gopinath Chennupati , Carleton Coffrin , Hristo Djidjev , David Gunter , Satish Karra , Nathan Lemons , Shizeng Lin , Andrey Lokhov , Alexander Malyzhenkov , David Mascarenas , Susan Mniszewski , Balu Nadiga , Dan O’Malley , Diane Oyen , Lakshman Prasad , Randy Roberts , Phil Romero , Nandakishore Santhi , Nikolai Sinitsyn , Pieter Swart , Marc Vuffray , Jim Wendelberger , Boram Yoon , Richard Zamora , Wei Zhu
Keywords: quantum, computer, algorithms, hardware, article
Atlantic Ocean’s Circulation Is Weakest in 1,600 Years
Summary: There are some indications the cold spot below Greenland can alter atmospheric patterns in a way that channels warm air over Europe, increasing the likelihood of sustained summer heat waves, says Levke Caesar, a PhD student at the Potsdam Institute for Climate Impact Research (PIK) and co-author of the other new study.
Keywords: amoc, ocean, climate, temperatures, atlantic
CSS Sans – A font created in CSS
Keywords: skew, transform, solid
When the business model is the privacy violation
Summary:  There are research proposals for targeted advertising, such as Adnostic , that would improve privacy by drastically changing the business model, largely cutting out the tracking companies.
Keywords: privacy, data, business, model, companies
Facebook is in the privacy spotlight but should Google be next
Summary: Google has so far not been tied to the major Facebook scandal of the hour: how the political consulting firm Cambridge Analytica exploited the social network’s long-lax privacy policies to improperly gather the personal data of up to 87 million users worldwide.
Keywords: data, google, facebook, users, privacy
Encoding data into dubstep drops
Summary: But that had me thinking, how much effort would it be to actually embed machine readable data inside a dubstep track, while ensuring that the sound could be enjoyed by humans as well…
Keywords: sound, bands, data, song, sounds
How to Find Consulting Clients
Summary: The main problem is that most of those sites encourage a race to the bottom - by making you put in a per hour or a per project bid, and compete against dozens of other freelancers.
Keywords: clients, term, long, things, people
Mark Zuckerberg Is Either Ignorant or Deliberately Misleading Congress
Summary: The answer is categorically, unequivocally yes , according to Facebook.com: “If you’re logged out or don’t have a Facebook account and visit a website with the Like button or another social plugin, your browser sends us a more limited set of info.”
Keywords: facebook, zuckerberg, company, ceo, asked
World’s first electrified road for charging vehicles opens in Sweden
Summary: The technology behind the electrification of the road linking Stockholm Arlanda airport to a logistics site outside the capital city aims to solve the thorny problems of keeping electric vehicles charged, and the manufacture of their batteries affordable.
Keywords: road, vehicle, electricity, electric, sweden
Rolls-Royce and Boeing invest in UK space engine
Summary: “As Reaction Engines unlocks advanced propulsion that could change the future of air and space travel, we expect to leverage their revolutionary technology to support Boeing’s pursuit of hypersonic flight,” said HorizonX vice president, Steve Nordlund.
Keywords: rel, technology, company, sabre, engine
Tech Startup Slice Helps Local Pizzerias Get Online
Summary: CLOSE More Options
Keywords: options, close
Show HN: InKino – An open-source movie app made with Flutter
Summary: While I built inKino for my own needs, it is also intented to showcase good app structure and a clean, well-organized Flutter codebase.
Keywords: apr, project, version, latest, commit
Mark Zuckerberg Refuses to Admit How Facebook Works
Summary: If Facebook were a true bargain with users – they get a useful, free service in exchange for seeing advertising based on their interests and activity – then Zuckerberg should be comfortable explaining how it all works.
Keywords: facebook, zuckerberg, information, users, people
Kafka, GDPR and Event Sourcing
Summary: To comply with GDPR, this topic will have some reasonably short time-based retention policy, so that Kafka deletes the data after that time, but remember that the retention period should be longer than your expected downtime of the Encryptor service, as if the Encryptor service is down for longer, Kafka may delete the data before it is encrypted and safely stored in the Encrypted-Data topic.
Keywords: encryption, event, data, topic, key
Writing a Managed JIT in C# with CoreCLR
Summary: A few years ago, when I prototyped the idea of implementing gcix the GC Immix in C++ (and also in C#) from the paper “Immix: A Mark-Region Garbage Collector with Space Efficiency, Fast Collection, and Mutator Performance ∗” I was amazed to discover that they were using the JVM Jikes RVM (I heard about it back in the days when I was working in Java, but it was not yet developed and alive), to implement the full VM, including the JIT and the GC in Java!
Keywords: jit, method, code, delegate, native
Goodbye ICOs, hello ILPs?
Summary: To avoid an innovative and disruptive space being stifled, whilst offering protections to investors, regulators must act swiftly or risk losing opportunities to newly envisaged ‘Crypto Nations’.
Keywords: icos, tokens, ico, investors, company
The link between alcohol and breast cancer
Summary: At a conference of beer wholesalers in 1996 , the Miller Brewing Co.’s vice president of corporate relations touted the success of the 60 Minutes episode and the subsequent changes in government health messages as progress in the industry’s effort to brand its products as healthy.
Keywords: alcohol, cancer, breast, health, drinking
I Downloaded the Information That Facebook Has on Me
Summary: This felt unnecessary, though Facebook holds on to your phone book partly to keep it synchronized with your contacts list on Messenger and to help find people who newly sign up for the messaging service.
Keywords: facebook, data, information, ads, list
Backpage.com Pleads Guilty to Human Trafficking in Texas
Summary: “Taking down Backpage and obtaining a criminal conviction for the company and its CEO represents a significant victory in the fight against human trafficking in Texas and around the world,” Attorney General Paxton said.
Keywords: trafficking, attorney, human, general, paxton
The Crazy Coverage of Facebook’s Unremarkable ‘AI Invented Language’
Summary: July 15th: The Register also caught wind of this research, but refreshingly covered it from a more interesting angle with “Facebook tried teaching bots art of negotiation – so the AI learned to lie” .
Keywords: ai, language, facebook, coverage, bob
Background checks pay for Checkr, which just raised $100M
Summary: The company was born when software engineers Daniel Yanisse and Jonathan Perichon worked together at same-day delivery service startup Deliv and together eyed the chance to build a faster, more efficient background check.
Keywords: checkr, yanisse, company, background, customers
EdgeDB: A New Beginning
Summary: The problem with these solutions is that they attempt to bridge the gap from the application side, and either sacrifice the expressive power of the underlying database, or implement an overly complex mapping which largely defeats the purpose.
Keywords: edgedb, database, query, data, model
The Lava Layer Anti-Pattern (2014)
Summary: She’d listened to Ina’s description of how the application was architected around DDD with the data access handled by NHibernate, so she was surprised and confused to come across some code using DataSets.
Keywords: code, application, widgetfinder, software, version
The Alice and Bob After Dinner Speech (1984)
Summary: Then there are those based on names of countries:- Africa, Brazil, Chile, Denmark, England, France, Greenland, Holland, India, Japan, Khazakistan, Lithuania, Morocco, Niger, Oman, Papua, Qatar, Russia, Spain, Tanzania, Uruguay, Venezuela, Westphalia, Yemen, Xanadu, Zambia.
Keywords: alice, coding, bob, called, time
Show HN: Munt – The simplest way to accept cryptocurrencies
Summary: The checkout time of the customer is drastically improved and takes only 3 minutes depending on connectivity.
Keywords: payment, automatically, munt, library, email
Effects of CPU Caches
Summary: Now that I had played with two extreme cases — having the elements of a linked list densely packed or arranged on different pages — I had to experiment linked-list in more realistic situations.
Keywords: elements, size, list, tlb, pages
Blockchain and the Law: The Rule of Code
Summary: Monday, April 23, 2018 at 4:00 pmHarvard Law School campus Wasserstein Hall, Milstein West B Room 2019, Second Floor Reception immediately following at HLS Pub RSVP required to attend in person Event will be webcast live
Keywords: university, technology, primavera, law, systems
How Will Automation Affect Different U.S. Cities?
Summary: To quantify the total impact of automation on a given city, Youn teamed up with Massachusetts Institute of Technology researchers Morgan Frank, Lijun Sun, Manuel Cebrian , and Iyad Rahwan .
Keywords: youn, jobs, cities, automation, city
Trouble Detected in Infamous Dark Matter Signal
Summary: For 20 years, an experiment in Italy known as DAMA has detected an oscillating signal that could be coming from dark matter — the fog of invisible particles that ostensibly fill the cosmos , sculpting everything else with their gravity.
Keywords: dark, matter, dama, signal, experiments
List of the top smart contract vulnerabilities
Summary: also known as nothing is secret The contract had insufficient validation of the block.number age, which resulted in 400 ETH being lost to an unknown player who waited for 256 blocks before revealing the predictable winning number.
Keywords: contract, function, smart, address, call
Choosing Elixir’s Phoenix to Power a Real-Time Web UI
Summary: Due to Phoenix being written in Elixir, it takes full advantage of the OTP framework, a set of modules and standards designed to help build concurrent applications.
Keywords: wallaroo, channels, messages, monitoring, phoenix
Late to Bed, Early to Die? Night Owls May Die Sooner
Summary: “‘Night owls’ trying to live in a ‘morning lark’ world may have health consequences for their bodies,” study co-author Kristen Knutson, an associate professor of neurology at Northwestern University Feinberg School of Medicine, said in a statement .
Keywords: people, study, morning, evening, health
IPFS Companion 2.2.0 brings window.ipfs to your Browser
Summary: The Browser Action menu provides a toggle for switching between external IPFS node accessed over HTTP API and embedded, in-memory instance of js-ipfs.
Keywords: node, ipfs, embedded, browser, extension
Why is Ember fading away?
Summary: After watching how Facebook attempted naughty moves to use React as a tool to extend its corporate power (Kripalani, August 2017) I feel much more comfortable in Ember.
Keywords: ember, framework, community, speakers, people
Google can be forced to pull results globally, Canada supreme court rules
Summary: “There is great risk that governments and commercial entities will see this ruling as justifying censorship requests that could result in perfectly legal and legitimate content disappearing off the web because of a court order in the opposite corner of the globe,” said an OpenMedia spokesman, David Christopher.
Keywords: court, google, supreme, order, datalink
How convict labour increased inequality
Summary: The introduction of convict labour in a county in 1870-1886 accounted for 16% slower growth in manufacturing wages in 1880-1900, 20% lower labour-force participation, and a smaller employment share in factories than there would otherwise have been.
Keywords: labour, workers, firms, convicts, prison
A massive, ‘semi-infinite’ trove of rare-earth metals has been found in Japan
Summary: Separately, China held back exports of certain types of rare earths starting 2010, which caused prices to jump by as much as 10 times — further pushing Japan to seek other sources, according to the Journal.
Keywords: metals, years, china, japan, seabed
A privacy flaw in Comcast’s automated telephone system
Some Android Phone Manufacturers Lying to Users About Security Updates
Summary: To help with that, SRL is releasing a tool called SnoopSnitch on the Play Store that can analyze your phone’s firmware for installed or missing Android security patches to see if you’re really safe, but it really shouldn’t have had to come to this in the first place.
Keywords: security, android, patches, google, phones
TypingDNA verifies your identity based on typing behavior
Summary: The startup, which is part of the current class at Techstars NYC , is pitching this as an alternative to two-factor authentication — namely, the security feature that sends unique codes to a separate device (usually your phone) to make sure someone else isn’t logging in with your password.
Keywords: typingdna, typing, popa, codes, key
“I don’t have a Facebook account and would like to request all personal data…”
Summary: If you’d like to request more information about personal data stored by Facebook, please fill out this form from a computer.
Keywords: facebook, request, data, account, personal
Why undertakers are worried
Summary: “It’s happening in restaurants, nightclubs, wedding venues, country clubs and it’s very dangerous,” Bill McReavy, an undertaker from Minneapolis, told his vigorously nodding peers at the annual gathering of the American National Funeral Director Association (NFDA) in Boston last autumn.
Keywords: undertakers, undertaker, funeral, people, cremation