August 2019 Archive
2821.
Wolpertinger (en.wikipedia.org)
2822.
Why Do Chinese People Like Their Government? (supchina.com)
2823.
Dear Tech Workers, U.S. Service Members Need Your Help (nytimes.com)
2824.
Daily Mail Article Generator (daily-fail-generator.herokuapp.com)
2825.
Ask HN: What are the best bioinformatics books you've read?
2826.
Tridactyl has been delisted from AMO (github.com)
2827.
What Happens When Americans Don’t Pay a Hospital Bill (theatlantic.com)
2828.
Show HN: Soliloquy – Note-taking for power users (soliloquy.cc)
2829.
Generating and Visualizing Alpha with Vectorspace AI Datasets and Canvas (elastic.co)
2830.
Language Design Is Not Just Solving Puzzles (2006) (artima.com)
2831.
Tupelo as it relates to IPLD and IPFS (medium.com)
2832.
Facebook to put client-side backdoors into end-to-end encryption clients (forbes.com)
2833.
Amazon Is Coaching Cops on How to Obtain Surveillance Footage Without a Warrant (vice.com)
2834.
Squirrel migrations recorded in North America (2006) (farmprogress.com)
2835.
Strengthen Free Software by Telling Congress to Reject the Stronger Patents Act (fsf.org)
2836.
Facebook is ordered to delete any Facial Recognition Templates within 90 days (ghacks.net)
2837.
Police are trying to arrest their way out of a mass shooting epidemic (businessinsider.com)
2838.
CNCF Cortex Project (Clustered Prometheus) Releases v0.1 (grafana.com)
2839.
Time Series Databases Deep Dive [audio] (softwareengineeringdaily.com)
2840.
OpenSpiel: A Framework for Reinforcement Learning in Games (github.com)
2841.
Hong Kong’s Protestors Are Hindering (and Hijacking) Surveillance Tools (gizmodo.com)
2842.
NYT posts anti-google rant, doesn't mention the author is Facebook board member (gizmodo.com)
2843.
The El Paso Shooting and the Gamification of Terror (bellingcat.com)
2844.
Encrypted Training with PyTorch and PySyft on MNIST (blog.openmined.org)
2845.
Ask Andrew W.K.: My Dad Is a Right-Wing Asshole (villagevoice.com)
2846.
Invenia Blog: JuliaCon2019 (invenia.github.io)
2847.
Apple's iPhone FaceID Hacked in Less Than 120 Seconds (forbes.com)
2848.
Leaving Hopkins (danielpovey.com)
2849.
Why Atlassian uses an internal PaaS to regulate AWS access (blog.developer.atlassian.com)
2850.
Abusing WebViews to Steal Files via Email (carvesystems.com)