131 private links
Collections: double linked list, deque, RBtree, channels.
Now to perform a circular crop.
The idea of RosettaGit is to present solutions to the same task in as many different programming languages as possible. It demonstrates how languages are similar and different and can help you learn new approaches to solving problems.
Normally, the arrangement of mines is decided at the start of the game (except for some trickery so that you cannot lose on the first click). But what if there was no pre-determined arrangement, and the game was allowed to choose after you play?
An interesting article describing the logic of this original minesweeper game.
This article is designed to serve as a directory of software projects built on NLP (natural language processing), that anyone — even someone without ML experience — can build.
This year I sent out quite a few proposals to the majority of mobile conferences in Europe. Some ignored me, the others replied with automated rejections. However, some accepted and it was fun. Here is what I've learned on the way.
There is a a lot of misinformation being spread about Brave. Many people claim that it is spyware or harmful to your privacy. This is not true and I will debunk every claim I have found.
Particle filter is a Monte Carlo algorithm used to solve statistical inference problems. In this project, the turtle location and heading direction in maze was infered using particle filter. The green turtle is the actual location while the orange turtule is the estimated location. The arrows are particles. Blue arrows stand for low probability particles while red arrows stand for high probability particles. There are four sensors installed on the front, back, left and right of the turtle. The sensors measure its perpendicular distances to the closest walls in four directions, possibly bounded by some sensor limit.
linkding is a simple bookmark service that you can host yourself. It supports managing bookmarks, categorizing them with tags and has a search function. It provides a bookmarklet for quickly adding new bookmarks while browsing the web. It also supports import / export of bookmarks in the Netscape HTML format.
Exploring and understanding Python through surprising snippets.
Here's a fun project attempting to explain what exactly is happening under the hood for some counter-intuitive snippets and lesser-known features in Python.
A distanza di cinquant’anni dalla strage di Piazza Fontana, l’Italia è ancora sovrastata dalla stessa cappa di disinformazione: “la strategia della tensione” che, portata avanti dallo Stato o perlomeno da ampi settori dello Stato, avrebbe dovuto facilitare una “svolta a destra” della politica, fermando l’avanzata del PCI nel mondo bipolare della Guerra Fredda. La strage di Piazza Fontana fu invece l’inizio di una campagna destabilizzante contro l’Italia che, dalla Libia alla Somalia, stava guadagnando molte posizioni internazionali cavalcando il “terzomondismo”. Le bombe cessarono nei primi anni ‘90 perché, distrutti la Prima Repubblica e lo Stato imprenditore, non servivano più.
A series of how to examples on using jq, a command-line JSON processor.
Ryohei Hisano and Didier Sornette wrote in 2012 a paper titled, “On the distribution of time-to-proof of mathematical conjectures.”
Today Ken and I discuss predicting the end to mathematical conjectures. This is apart from considering odds on which way they will go, which we also talk about.
Nine years ago the Christmas issue of the New Scientist magazine analyzed a small set of solved mathematical conjectures and used it to forecast when the P vs. NP conjecture would be solved. The article estimated that the “probability for the P vs. NP problem to be solved by the year 2024 is roughly 50%”.
If you track your users better, now you can deliver tailored ads and your conversion rates are higher. If you restrict users from leaving your walled garden ecosystem, now you get all the juice from whatever attention they have.
The question is: At which point do we reach the breaking point?
Federal public comment websites currently are unable to detect Deepfake Text once submitted. I created a computer program (a bot) that generated and submitted 1,001 deepfake comments regarding a Medicaid reform waiver to a federal public comment website, stopping submission when these comments comprised more than half of all submitted comments. I then formally withdrew the bot comments.
Services and features replacement investigations at CERN.
List of the most appealing software packages for different common tasks.
Thirty years ago, Cliff Stoll published The Cuckoo's Egg, a book about his cat-and-mouse game with a KGB-sponsored hacker. Today, the internet is a far darker place—and Stoll has become a cybersecurity icon.
I read this book when I was young. Still remember the atmosphere :-)
What we learned from the spy in your pocket.