Vacuum tubes strike back!
https://spectrum.ieee.org/nanoclast/semiconductors/devices/new-metalair-transistor-replaces-semiconductors
https://spectrum.ieee.org/nanoclast/semiconductors/devices/new-metalair-transistor-replaces-semiconductors
IEEE Spectrum: Technology, Engineering, and Science News
New Metal-Air Transistor Replaces Semiconductors
A novel field emission transistor that uses air gaps could breathe life into Moore’s Law
when robots get sufficiently smart, they start to avoid work too 🙂
> CycleGAN learns to “hide” information about a source image into the images it generates in a nearly imperceptible, high frequency signal. This trick ensures that the generator can recover the original sample and thus satisfy the cyclic consistency requirement, while the generated image remains realistic
CycleGAN, a Master of Steganography via @vzezin
> CycleGAN learns to “hide” information about a source image into the images it generates in a nearly imperceptible, high frequency signal. This trick ensures that the generator can recover the original sample and thus satisfy the cyclic consistency requirement, while the generated image remains realistic
CycleGAN, a Master of Steganography via @vzezin
my head is fuzzy today, but the post is still entertaining (summarizes multiple papers)
https://rjlipton.wordpress.com/2012/04/14/tabulation-hashing-and-independence/
https://rjlipton.wordpress.com/2012/04/14/tabulation-hashing-and-independence/
Gödel's Lost Letter and P=NP
Tabulation Hashing and Independence
A technical tool of computer games thinks bigger Mihai Pătraşcu and Mikkel Thorup are part of the great research tradition at AT&T Labs in New Jersey, which branched out from Bell Lab…
that's how NSA attacked SSH and HTTPS (most likely). it's so simple, as always. ingenious.
note: not applicable to bitcoin, the vulnerable spot here is key generation, not the math itself :)
https://algorithmsoup.wordpress.com/2019/01/15/breaking-an-unbreakable-code-part-1-the-hack/
note: not applicable to bitcoin, the vulnerable spot here is key generation, not the math itself :)
https://algorithmsoup.wordpress.com/2019/01/15/breaking-an-unbreakable-code-part-1-the-hack/
Algorithm Soup
The (Almost) Secret Algorithm Researchers Used to Break Thousands of RSA Keys
RSA encryption allows for anyone to send me messages that only I can decode. To set this up, I select two large random primes $latex p$ and $latex q$ (each of which is hundreds of bits long), and r…
one more possible cause of Alzheimer, now bacterial (note: in mice)
http://advances.sciencemag.org/content/5/1/eaau3333
http://advances.sciencemag.org/content/5/1/eaau3333
Science
Porphyromonas gingivalis in Alzheimer’s disease brains: Evidence for disease causation and treatment with small-molecule inhibitors
Porphyromonas gingivalis , the keystone pathogen in chronic periodontitis, was identified in the brain of Alzheimer’s disease patients. Toxic proteases from the bacterium called gingipains were also identified in the brain of Alzheimer’s patients, and levels…
ML and NLP in the real world
https://www.oreilly.com/ideas/lessons-learned-building-natural-language-processing-systems-in-health-care
https://www.oreilly.com/ideas/lessons-learned-building-natural-language-processing-systems-in-health-care
O’Reilly Media
Lessons learned building natural language processing systems in health care
NLP systems in health care are hard—they require broad general and medical knowledge, must handle a large variety of inputs, and need to understand context.
knowledge vs meta-knowledge
http://www.incompleteideas.net/IncIdeas/BitterLesson.html
via @olya_stopudiv
http://www.incompleteideas.net/IncIdeas/BitterLesson.html
via @olya_stopudiv
projects, habits, processes, and playflows
https://mailchi.mp/ribbonfarm/the-playflow-challenge?e=fdfc6f6cb0
https://mailchi.mp/ribbonfarm/the-playflow-challenge?e=fdfc6f6cb0
and a single-player playflow (Geohotz / Monocular SLAM in a day)
https://www.youtube.com/watch?v=7Hlb8YX2-W8
https://www.youtube.com/watch?v=7Hlb8YX2-W8
YouTube
George Hotz | Programming | Livecoding SLAM | twitchslam | Part1
Date of stream 27 May 2018 and 28 May 2018.
Instead of scopie Sunday, George is livestreaming programming a toy SLAM implementation.
Stream noscript: Livecoding SLAM twitchslam
Source files:
- https://github.com/geohot/twitchslam
Follow for notifications:
…
Instead of scopie Sunday, George is livestreaming programming a toy SLAM implementation.
Stream noscript: Livecoding SLAM twitchslam
Source files:
- https://github.com/geohot/twitchslam
Follow for notifications:
…
one more Intel debug interface
https://i.blackhat.com/asia-19/Thu-March-28/bh-asia-Goryachy-Ermolov-Intel-Visa-Through-the-Rabbit-Hole.pdf
https://i.blackhat.com/asia-19/Thu-March-28/bh-asia-Goryachy-Ermolov-Intel-Visa-Through-the-Rabbit-Hole.pdf
unsupervised clustering-by-cause, on networks. hmm.
https://arxiv.org/abs/1802.09904
https://arxiv.org/abs/1802.09904
arXiv.org
Algorithmic Causal Deconvolution of Intertwined Programs and...
Complex data usually results from the interaction of objects produced by different generating mechanisms. Here we introduce a universal, unsupervised and parameter-free model-oriented approach,...
There are 2 kinds of consulting clients:
1. Confident people who want to pay for systematic doubt
2. Doubtful people who want to pay for systematic confidence.
https://twitter.com/vgr/status/1118212501089316864?s=20
1. Confident people who want to pay for systematic doubt
2. Doubtful people who want to pay for systematic confidence.
https://twitter.com/vgr/status/1118212501089316864?s=20
Twitter
Venkatesh Rao
Putting it all together, here is a 2x2 of who you should hire in what situation (and/or type of books you should read if your budget is limited). My market is the smallest and therefore obviously the most interesting and elite one. So elite, some months I…