Top Posts for April 12, 2018

Non-profit’s $300 hepatitis C cure as effective as $84k alternative

Summary: An affordable hepatitis C treatment has been shown to be safe and effective, with very high cure rates for patients including hard-to-treat cases, in interim clinical trial results that offer hope to the 71 million people living with the disease worldwide.

Keywords: hepatitis, treatment, dndi, high, people

Full article on | 736 Points and 272 Comments

Building a Text Editor for a Digital-First Newsroom

Summary: Whether it’s your basic Apple Notes, or something more advanced like Google Docs, Microsoft Word or Medium, our text editors allow us to record and render our important thoughts and information, enabling us to tell stories in the most engaging ways.

Keywords: text, editor, prosemirror, nodes, node

Full article on | 404 Points and 126 Comments

The Moon in 4k resolution [video]

Summary: Constantly shadowed areas near the poles are hard to photograph but easier to measure with altimetry, while several of the Apollo landing sites, all relatively near the equator, have been imaged at resolutions as high as 25 centimeters (10 inches) per pixel.

Keywords: tour, lunar, south, orientale, lro

Full article on | 334 Points and 64 Comments

Duolingo Suddenly Has Over Twice as Much Language Learning Material

Summary: The app follows the common structure of teaching ever more advanced skills, starting with basic words and phrases like “ Je suis un garçon ,” and working up to complex topics like business and religion.

Keywords: exercises, duolingo, users, skill, levels

Full article on | 332 Points and 238 Comments

Tesla Was Kicked Off Fatal Crash Probe by NTSB

Summary: The National Transportation Safety Board told Tesla Inc. on Wednesday that the carmaker was being removed from the investigation of a fatal accident, prior to the company announcing it had withdrawn from it, according to a person familiar with the discussion.

Keywords: ntsb, investigation, tesla, company, agency

Full article on | 330 Points and 319 Comments

How to Decide What to Build

Summary: Even Elon Musk started SpaceX with the goal of merely increasing NASA’s budget by pulling a PR stunt .

Keywords: ll, make, people, ideas, don

Full article on | 328 Points and 112 Comments

Birds can see Earth’s magnetic fields because of cryptochromes in their eyes

Summary: There’s also been evidence in recent years that, in birds, the cryptochromes in their eyes are responsible for their ability to orient themselves by detecting magnetic fields, a sense called magnetoreception.

Keywords: cryptochromes, magnetoreception, circadian, eyes, magnetic

Full article on | 305 Points and 104 Comments

The NES Homebrew Scene

Summary: Throughout the system’s life, numerous classic games helped shape the minds and hearts of an entire generation, in addition to cementing the legacy of certain character and franchises like Mario, Zelda, Kirby and Metroid—all of which have recently received new entries into their respective series.

Keywords: nes, games, game, homebrew, programming

Full article on | 299 Points and 122 Comments

Publisher Gets Carte Blanche to Seize New Sci-Hub Domains

Summary: After obtaining an injunction against the site last year, the American Chemical Society went back to court for an update, which now gives it the authority to seize newly registered domain names as well.

Keywords: domain, names, injunction, court, amended

Full article on | 245 Points and 144 Comments

Firefox updates its iOS web browser to turn Tracking Protection on by default

Summary: And its rules about trackers are based on the Disconnect blocklist, which has a specific definition of tracking that’s aimed at protecting individual users’ data from being collection across multiple websites and then retained.

Keywords: tracking, firefox, mozilla, users, protection

Full article on | 245 Points and 61 Comments

Could a Neuroscientist Understand a Microprocessor? (2017)

Summary: Lazebnik [ 9 ] made similar observations about this approach in molecular biology, suggesting biologists would obtain a large number of identical radios and shoot them with metal particles at short range, attempting to identify which damaged components gave rise to which broken phenotype.

Keywords: processor, brain, neuroscience, transistors, transistor

Full article on | 241 Points and 88 Comments

Reddit’s redesign could kill discussion subreddits

Summary: In contrast, architecture is also the means by which people bypass prohibitions on housing discrimination; city planners and engineers build physical inconveniences (highways, railways, etc) between predominantly white and black neighborhoods, creating de facto segregation.

Keywords: reddit, users, design, time, cmv

Full article on | 236 Points and 266 Comments

PowerHammer: Exfiltrating Data from Air-Gapped Computers Through Power Lines

Summary: In this case, a malicious code running on a compromised computer can control the power consumption of the system by intentionally regulating the CPU utilization.

Keywords: attack, power, level, data, lines

Full article on | 229 Points and 73 Comments

Hello: A new social network founded by Orkut’s creator

Summary: It’s also why I created the world’s first social network when I was a grad student at Stanford, and it’s why I have dedicated my life to helping people connect with each other.

Keywords: people, world, orkut, network, social

Full article on | 226 Points and 202 Comments

Hubble Telescope Discovers a Light-Bending ‘Einstein Ring’ in Space

Summary: The scientific team added that they plan to use this particular Einstein ring in Sculptor to probe the nature of dark matter .

Keywords: ring, galaxy, einstein, space, cluster

Full article on | 220 Points and 50 Comments

Abusing Linux’s firewall: the hack that allowed us to build Spectrum

Summary: Today we are introducing Spectrum : a new Cloudflare feature that brings DDoS protection, load balancing, and content acceleration to any TCP-based protocol.

Keywords: ip, port, addresses, network, socket

Full article on | 217 Points and 17 Comments

The high modernism of social media companies

Summary: Scott blames the technocratic hubris of High Modernism for some of the great social engineering disasters of the 20th century, from Stalin’s famine-inducing farm collectivization, to our own country’s failed mid-century urban renewal projects, which, to quote Pinker, too often “replaced vibrant neighborhoods with freeways, high-rises, windswept plazas, and brutalist architecture.”

Keywords: social, high, boz, facebook, people

Full article on | 202 Points and 95 Comments

Lisp Game Jam 2018

Summary: There are plenty of friendly people in the #lispgames Freenode IRC channel or the Lisp Discord server (see the Discussion section below) that would enjoy helping you if you’re stuck.

Keywords: game, jam, lisp, people, give

Full article on | 193 Points and 68 Comments

Apple starting to alert users that it will end 32-bit app support on the Mac

Summary: The company started making it 10 or so years ago with the Power Mac G5 desktop, so it hasn’t exactly been an overnight ask for developers.Of course, if you’ve got older, non-supported software in your arsenal, the eventual end-of-lifing could put a severe damper on your workflow.

Keywords: company, transition, desktop, apps, mac

Full article on | 185 Points and 229 Comments

Quantum Algorithm Implementations for Beginners

Summary: Authors: Patrick J. Coles , Stephan Eidenbenz , Scott Pakin , Adetokunbo Adedoyin , John Ambrosiano , Petr Anisimov , William Casper , Gopinath Chennupati , Carleton Coffrin , Hristo Djidjev , David Gunter , Satish Karra , Nathan Lemons , Shizeng Lin , Andrey Lokhov , Alexander Malyzhenkov , David Mascarenas , Susan Mniszewski , Balu Nadiga , Dan O’Malley , Diane Oyen , Lakshman Prasad , Randy Roberts , Phil Romero , Nandakishore Santhi , Nikolai Sinitsyn , Pieter Swart , Marc Vuffray , Jim Wendelberger , Boram Yoon , Richard Zamora , Wei Zhu

Keywords: quantum, computer, algorithms, hardware, article

Full article on | 184 Points and 17 Comments

Atlantic Ocean’s Circulation Is Weakest in 1,600 Years

Summary: There are some indications the cold spot below Greenland can alter atmospheric patterns in a way that channels warm air over Europe, increasing the likelihood of sustained summer heat waves, says Levke Caesar, a PhD student at the Potsdam Institute for Climate Impact Research (PIK) and co-author of the other new study.

Keywords: amoc, ocean, climate, temperatures, atlantic

Full article on | 181 Points and 114 Comments

CSS Sans – A font created in CSS

Summary: transform:skew(-19deg,0);

Keywords: skew, transform, solid

Full article on | 177 Points and 47 Comments

When the business model is the privacy violation

Summary: [3] There are research proposals for targeted advertising, such as Adnostic , that would improve privacy by drastically changing the business model, largely cutting out the tracking companies.

Keywords: privacy, data, business, model, companies

Full article on | 170 Points and 83 Comments

Facebook is in the privacy spotlight but should Google be next

Summary: Google has so far not been tied to the major Facebook scandal of the hour: how the political consulting firm Cambridge Analytica exploited the social network’s long-lax privacy policies to improperly gather the personal data of up to 87 million users worldwide.

Keywords: data, google, facebook, users, privacy

Full article on | 170 Points and 63 Comments

Encoding data into dubstep drops

Summary: But that had me thinking, how much effort would it be to actually embed machine readable data inside a dubstep track, while ensuring that the sound could be enjoyed by humans as well…

Keywords: sound, bands, data, song, sounds

Full article on | 161 Points and 29 Comments

How to Find Consulting Clients

Summary: The main problem is that most of those sites encourage a race to the bottom - by making you put in a per hour or a per project bid, and compete against dozens of other freelancers.

Keywords: clients, term, long, things, people

Full article on | 158 Points and 47 Comments

Mark Zuckerberg Is Either Ignorant or Deliberately Misleading Congress

Summary: The answer is categorically, unequivocally yes , according to “If you’re logged out or don’t have a Facebook account and visit a website with the Like button or another social plugin, your browser sends us a more limited set of info.”

Keywords: facebook, zuckerberg, company, ceo, asked

Full article on | 158 Points and 77 Comments

World’s first electrified road for charging vehicles opens in Sweden

Summary: The technology behind the electrification of the road linking Stockholm Arlanda airport to a logistics site outside the capital city aims to solve the thorny problems of keeping electric vehicles charged, and the manufacture of their batteries affordable.

Keywords: road, vehicle, electricity, electric, sweden

Full article on | 151 Points and 95 Comments

Rolls-Royce and Boeing invest in UK space engine

Summary: “As Reaction Engines unlocks advanced propulsion that could change the future of air and space travel, we expect to leverage their revolutionary technology to support Boeing’s pursuit of hypersonic flight,” said HorizonX vice president, Steve Nordlund.

Keywords: rel, technology, company, sabre, engine

Full article on | 151 Points and 62 Comments

Tech Startup Slice Helps Local Pizzerias Get Online

Summary: CLOSE More Options

Keywords: options, close

Full article on | 142 Points and 168 Comments

Show HN: InKino – An open-source movie app made with Flutter

Summary: While I built inKino for my own needs, it is also intented to showcase good app structure and a clean, well-organized Flutter codebase.

Keywords: apr, project, version, latest, commit

Full article on | 140 Points and 42 Comments

Mark Zuckerberg Refuses to Admit How Facebook Works

Summary: If Facebook were a true bargain with users – they get a useful, free service in exchange for seeing advertising based on their interests and activity – then Zuckerberg should be comfortable explaining how it all works.

Keywords: facebook, zuckerberg, information, users, people

Full article on | 134 Points and 121 Comments

Kafka, GDPR and Event Sourcing

Summary: To comply with GDPR, this topic will have some reasonably short time-based retention policy, so that Kafka deletes the data after that time, but remember that the retention period should be longer than your expected downtime of the Encryptor service, as if the Encryptor service is down for longer, Kafka may delete the data before it is encrypted and safely stored in the Encrypted-Data topic.

Keywords: encryption, event, data, topic, key

Full article on | 128 Points and 68 Comments

Writing a Managed JIT in C# with CoreCLR

Summary: A few years ago, when I prototyped the idea of implementing gcix the GC Immix in C++ (and also in C#) from the paper “Immix: A Mark-Region Garbage Collector with Space Efficiency, Fast Collection, and Mutator Performance ∗” I was amazed to discover that they were using the JVM Jikes RVM (I heard about it back in the days when I was working in Java, but it was not yet developed and alive), to implement the full VM, including the JIT and the GC in Java!

Keywords: jit, method, code, delegate, native

Full article on | 125 Points and 22 Comments

Goodbye ICOs, hello ILPs?

Summary: To avoid an innovative and disruptive space being stifled, whilst offering protections to investors, regulators must act swiftly or risk losing opportunities to newly envisaged ‘Crypto Nations’.

Keywords: icos, tokens, ico, investors, company

Full article on | 122 Points and 66 Comments

Summary: At a conference of beer wholesalers in 1996 , the Miller Brewing Co.’s vice president of corporate relations touted the success of the 60 Minutes episode and the subsequent changes in government health messages as progress in the industry’s effort to brand its products as healthy.

Keywords: alcohol, cancer, breast, health, drinking

Full article on | 119 Points and 17 Comments

I Downloaded the Information That Facebook Has on Me

Summary: This felt unnecessary, though Facebook holds on to your phone book partly to keep it synchronized with your contacts list on Messenger and to help find people who newly sign up for the messaging service.

Keywords: facebook, data, information, ads, list

Full article on | 119 Points and 102 Comments Pleads Guilty to Human Trafficking in Texas

Summary: “Taking down Backpage and obtaining a criminal conviction for the company and its CEO represents a significant victory in the fight against human trafficking in Texas and around the world,” Attorney General Paxton said.

Keywords: trafficking, attorney, human, general, paxton

Full article on | 115 Points and 135 Comments

The Crazy Coverage of Facebook’s Unremarkable ‘AI Invented Language’

Summary: July 15th: The Register also caught wind of this research, but refreshingly covered it from a more interesting angle with “Facebook tried teaching bots art of negotiation – so the AI learned to lie” .

Keywords: ai, language, facebook, coverage, bob

Full article on | 113 Points and 33 Comments

Background checks pay for Checkr, which just raised $100M

Summary: The company was born when software engineers Daniel Yanisse and Jonathan Perichon worked together at same-day delivery service startup Deliv and together eyed the chance to build a faster, more efficient background check.

Keywords: checkr, yanisse, company, background, customers

Full article on | 112 Points and 76 Comments

EdgeDB: A New Beginning

Summary: The problem with these solutions is that they attempt to bridge the gap from the application side, and either sacrifice the expressive power of the underlying database, or implement an overly complex mapping which largely defeats the purpose.

Keywords: edgedb, database, query, data, model

Full article on | 108 Points and 60 Comments

The Lava Layer Anti-Pattern (2014)

Summary: She’d listened to Ina’s description of how the application was architected around DDD with the data access handled by NHibernate, so she was surprised and confused to come across some code using DataSets.

Keywords: code, application, widgetfinder, software, version

Full article on | 101 Points and 63 Comments

The Alice and Bob After Dinner Speech (1984)

Summary: Then there are those based on names of countries:- Africa, Brazil, Chile, Denmark, England, France, Greenland, Holland, India, Japan, Khazakistan, Lithuania, Morocco, Niger, Oman, Papua, Qatar, Russia, Spain, Tanzania, Uruguay, Venezuela, Westphalia, Yemen, Xanadu, Zambia.

Keywords: alice, coding, bob, called, time

Full article on | 95 Points and 22 Comments

Show HN: Munt – The simplest way to accept cryptocurrencies

Summary: The checkout time of the customer is drastically improved and takes only 3 minutes depending on connectivity.

Keywords: payment, automatically, munt, library, email

Full article on | 95 Points and 72 Comments

Effects of CPU Caches

Summary: Now that I had played with two extreme cases — having the elements of a linked list densely packed or arranged on different pages — I had to experiment linked-list in more realistic situations.

Keywords: elements, size, list, tlb, pages

Full article on | 94 Points and 23 Comments

Blockchain and the Law: The Rule of Code

Summary: Monday, April 23, 2018 at 4:00 pmHarvard Law School campus Wasserstein Hall, Milstein West B Room 2019, Second Floor Reception immediately following at HLS Pub RSVP required to attend in person Event will be webcast live

Keywords: university, technology, primavera, law, systems

Full article on | 90 Points and 4 Comments

How Will Automation Affect Different U.S. Cities?

Summary: To quantify the total impact of automation on a given city, Youn teamed up with Massachusetts Institute of Technology researchers Morgan Frank, Lijun Sun, Manuel Cebrian , and Iyad Rahwan .

Keywords: youn, jobs, cities, automation, city

Full article on | 89 Points and 144 Comments

Trouble Detected in Infamous Dark Matter Signal

Summary: For 20 years, an experiment in Italy known as DAMA has detected an oscillating signal that could be coming from dark matter — the fog of invisible particles that ostensibly fill the cosmos , sculpting everything else with their gravity.

Keywords: dark, matter, dama, signal, experiments

Full article on | 88 Points and 21 Comments

List of the top smart contract vulnerabilities

Summary: also known as nothing is secret The contract had insufficient validation of the block.number age, which resulted in 400 ETH being lost to an unknown player who waited for 256 blocks before revealing the predictable winning number.

Keywords: contract, function, smart, address, call

Full article on | 88 Points and 35 Comments

Choosing Elixir’s Phoenix to Power a Real-Time Web UI

Summary: Due to Phoenix being written in Elixir, it takes full advantage of the OTP framework, a set of modules and standards designed to help build concurrent applications.

Keywords: wallaroo, channels, messages, monitoring, phoenix

Full article on | 87 Points and 18 Comments

Late to Bed, Early to Die? Night Owls May Die Sooner

Summary: “‘Night owls’ trying to live in a ‘morning lark’ world may have health consequences for their bodies,” study co-author Kristen Knutson, an associate professor of neurology at Northwestern University Feinberg School of Medicine, said in a statement .

Keywords: people, study, morning, evening, health

Full article on | 83 Points and 52 Comments

IPFS Companion 2.2.0 brings window.ipfs to your Browser

Summary: The Browser Action menu provides a toggle for switching between external IPFS node accessed over HTTP API and embedded, in-memory instance of js-ipfs.

Keywords: node, ipfs, embedded, browser, extension

Full article on | 79 Points and 24 Comments

Why is Ember fading away?

Summary: After watching how Facebook attempted naughty moves to use React as a tool to extend its corporate power (Kripalani, August 2017) I feel much more comfortable in Ember.

Keywords: ember, framework, community, speakers, people

Full article on | 69 Points and 69 Comments

Google can be forced to pull results globally, Canada supreme court rules

Summary: “There is great risk that governments and commercial entities will see this ruling as justifying censorship requests that could result in perfectly legal and legitimate content disappearing off the web because of a court order in the opposite corner of the globe,” said an OpenMedia spokesman, David Christopher.

Keywords: court, google, supreme, order, datalink

Full article on | 68 Points and 71 Comments

How convict labour increased inequality

Summary: The introduction of convict labour in a county in 1870-1886 accounted for 16% slower growth in manufacturing wages in 1880-1900, 20% lower labour-force participation, and a smaller employment share in factories than there would otherwise have been.

Keywords: labour, workers, firms, convicts, prison

Full article on | 67 Points and 61 Comments

A massive, ‘semi-infinite’ trove of rare-earth metals has been found in Japan

Summary: Separately, China held back exports of certain types of rare earths starting 2010, which caused prices to jump by as much as 10 times — further pushing Japan to seek other sources, according to the Journal.

Keywords: metals, years, china, japan, seabed

Full article on | 66 Points and 34 Comments

A privacy flaw in Comcast’s automated telephone system

Full article on | 64 Points and 31 Comments

Some Android Phone Manufacturers Lying to Users About Security Updates

Summary: To help with that, SRL is releasing a tool called SnoopSnitch on the Play Store that can analyze your phone’s firmware for installed or missing Android security patches to see if you’re really safe, but it really shouldn’t have had to come to this in the first place.

Keywords: security, android, patches, google, phones

Full article on | 59 Points and 27 Comments

TypingDNA verifies your identity based on typing behavior

Summary: The startup, which is part of the current class at Techstars NYC , is pitching this as an alternative to two-factor authentication — namely, the security feature that sends unique codes to a separate device (usually your phone) to make sure someone else isn’t logging in with your password.

Keywords: typingdna, typing, popa, codes, key

Full article on | 56 Points and 21 Comments

“I don’t have a Facebook account and would like to request all personal data…”

Summary: If you’d like to request more information about personal data stored by Facebook, please fill out this form from a computer.

Keywords: facebook, request, data, account, personal

Full article on | 56 Points and 21 Comments

Why undertakers are worried

Summary: “It’s happening in restaurants, nightclubs, wedding venues, country clubs and it’s very dangerous,” Bill McReavy, an undertaker from Minneapolis, told his vigorously nodding peers at the annual gathering of the American National Funeral Director Association (NFDA) in Boston last autumn.

Keywords: undertakers, undertaker, funeral, people, cremation

Full article on | 51 Points and 51 Comments