127 private links
This brief guide explains how to configure Touchpad settings using gsettings commandline interface on Linux distributions with GNOME DE.
La storia dei rapporti di Napolitano col mondo americano è carica di domande ancora da sciogliere, ma evidenzia in maniera chiara il desiderio di Napolitano di accreditarsi quale interlocutore privilegiato degli Stati Uniti.
Il percorso di Napolitano per divenire punto di riferimento di un vasto mondo di potere internazionale è stato tuttavia accidentato: il Dipartimento di Stato e l’intelligence statunitense non si fidavano facilmente di un comunista italiano. Il primo tentativo di Napolitano si rivelò infruttuoso: nel 1975 gli fu negato il visto, come avveniva per tutti i dirigenti comunisti.
As developers, our jobs are very stressful, jumping from deadline to deadline, solving difficult problems on a daily basis, and handling…
Wondering what the Getting Things Done (GTD) method is and how to implement it? We explore GTD by David Allen and rank the 14 best GTD apps.
What should worry us most about artificial intelligence: losing our jobs to cheaper labor or losing our lives to killer robots? The real threat may lie in yet another danger: losing our minds.
Millions of Flickr images were sucked into a database called MegaFace. Now some of those faces may have the ability to sue.
Git Essentials Crash Course - Introduction This is not Java but several newbie developers ask the same question, how to use GIT and how does GIT works so here it goes...
If you already don’t want to talk to your kids about sex, then it’s probably a safe bet that you really don’t want to talk to them about pornography. But with how easily accessible porn is on the internet and the prevalence of computers, tablets and smartphones in the hands of our kids (or their friends), they will almost certainly stumble upon it at some point—and probably at a much younger age than you’d expect.
PCA is a linear dimensionality reduction technique. Many non-linear dimensionality reduction techniques exist, but linear methods are more mature, if more limited.
Introducing Streamlit, an app framework built for ML engineers.
Recently, I am learning how Elliptic Curve Cryptography works. I searched around the internet, found so many articles and videos explaining it. Most of them are covering only a portion of it, some of them skip many critical steps how you get from here to there. In the end, I didn’t find an article that really explains it from end-to-end in an intuitive way.
With that in mind, I would like to write a post explaining Elliptic Curve Cryptography, cover from the basics to key exchange, encryption, and decryption.
I often advocate people surrounding me to build their own side projects. I believe they can fulfill you in so many ways: for your career, your relationships, or your independence. Buffer, the company I currently work for, was itself a side project.
I’ve built myself multiple side projects. The major ones being PartyInBeijing (inactive), Nodablock (inactive), Citymayor (need to fix), and now TravelHustlers. I believe each of them contributed and lead me to my current situation: being satisfied in my career, financially, and socially.
The best designers employ specific habits, learned practices, and observed principles when they work. Here are a few of them.
- Experts involve the user
- Experts design elegant abstractions
- Experts focus on the essence
- Experts simulate continually
- Experts look around
- Experts reshape the problem space
- Experts see error as opportunity
- Experts think about what they are not designing
(read the article: nice pictures to visualize the different concepts :-))
AI research is making great strides toward its long-term goal of human-level or superhuman intelligent machines. If it succeeds in its current form, however, that could well be catastrophic for the human race. The reason is that the “standard model” of AI requires machines to pursue a fixed objective specified by humans.
We are unable to specify the objective completely and correctly, nor can we anticipate or prevent the harms that machines pursuing an incorrect objective will create when operating on a global scale with superhuman capabilities. Already, we see examples such as social-media algorithms that learn to optimize click-through by manipulating human preferences, with disastrous consequences for democratic systems.
Somewhere around 2014 I found an /etc/passwd file in some dumps of the BSD 3 source tree, containing passwords of all the old timers such as Dennis Ritchie, Ken Thompson, Brian W. Kernighan, Steve Bourne and Bill Joy.
Keyword extraction (also known as keyword detection or keyword analysis) is a text analysis technique that consists of automatically extracting the most important words and expressions in a text.
It helps summarize the content of a text and recognize the main topics which are being discussed.
Calculate digits of π. From scratch, that is, using only addition, subtraction, multiplication, and division.
Reinforcement learning refers to goal-oriented algorithms, which learn how to attain a complex objective (goal) or maximize along a particular dimension over many steps.
Bayes Theorem provides a principled way for calculating a conditional probability. It is a deceptively simple calculation, although it can be used to easily calculate the conditional probability of events where intuition often fails. Bayes Theorem also provides a way for thinking about the evaluation and selection of different models for a given dataset in …