HT, Gregory Piatetsky on Twitter
This is one of those examples of how machine learning can be really useful; at any given instant, its decisions may be roughly as good as a human's would be, but it can make those decisions every few milliseconds and continually adjust things in a way a person couldn't. I expect to see technologies like these greatly increasing the efficiency of all sorts of infrastructure, from power to transport, over the next few years - with corresponding savings in both money and resource usage.
Being good at programming competitions correlates negatively with being ...
Peter Norvig says that applying machine learning to hiring shows that winning at programming contests is a negative factor for performing we
Coursera - Free Online Courses From Top Universities
Take free online classes from 140+ top universities and educational organizations. We partner with schools like Stanford, Yale, Princeton, a
Futuristic Cyberattack Scenario - Schneier on Security
Futuristic Cyberattack Scenario. This is a piece of near-future fiction about a cyberattack on New York, including hacking of cars, the wate
Visiting a Website against the Owner's Wishes Is Now a Federal Crime - S...
The U.S. Court of Appeals for the 9th Circuit has handed down a very important decision on the Computer Fraud and Abuse Act.... Its reasonin
Dallas Police Use a Robot to Kill a Person - Schneier on Security
z • July 9, 2016 10:19 AM. Better than when the Philadelphia police dropped a bomb on a house from a helicopter and managed to set 50-60 oth
Good Article on Airport Security - Schneier on Security
Good Article on Airport Security. The New York Times wrote a good piece comparing airport security around the world, and pointing out that m
Researchers Discover Tor Nodes Designed to Spy on Hidden Services - Schn...
These nodes -- ordinary nodes, not exit nodes -- sorted through all the traffic that passed through them, looking for anything bound for a h
Facebook Using Physical Location to Suggest Friends - Schneier on Security
"People You May Know are people on Facebook that you might know," a Facebook spokesperson said. "We show you people based on mutual friends,
Why Google Stores Billions of Lines of Code in a Single Repository
Google's monolithic repository provides a common source of truth for tens of thousands of developers around the world.
Using Social Media to Discover Hidden Wealth - Schneier on Security
Using Social Media to Discover Hidden Wealth. Stories of burglars using social media to figure out who's on vacation are old hat. Now financ
Infecting Systems by Typosquatting Programming Language Libraries - Schn...
Infecting Systems by Typosquatting Programming Language Libraries. Typosquatting is an old trick of registering a domain name a typo away fr
Hijacking the PC Update Process - Schneier on Security
One of the major things we found was the presence of third-party update tools. Every OEM we looked at included one (or more) with their defa
Physical Key Extraction Attacks on PCs | June 2016 | Communications of t...
Computers broadcast their secrets via inadvertent physical emanations that are easily measured and exploited.
Another Side-Channel Attack on PC Encryption - Schneier on Security
Another Side-Channel Attack on PC Encryption. New paper: "Physical Key Extraction Attacks on PCs," by Daniel Genkin, Lev Pachmanov, Itamar P