May 2018 Archive
5371.
Numerical Methods for Deep Learning (github.com)
5372.
Mother's Day PNG Source (PlusPNG) (pluspng.com)
5373.
GraphQL, Just Get Out of My Way and Give Me What I Want (apievangelist.com)
5374.
CS 70: Discrete Mathematics and Probability Theory (eecs70.org)
5375.
“The pool’s run dry” – analyzing anonymity in Zcash (benthamsgaze.org)
5376.
Conference Buddy: a place to find companions for tech conferences (conferencebuddy.io)
5377.
Looking at the Lispy Side of Perl – Opensource.com (opensource.com)
5378.
Fibratus: Tool for exploration and tracing of the Windows kernel (github.com)
5379.
May 2018 RISC-V workshop proceedings (riscv.org)
5380.
Senator Wyden Demands Answers from Phone Service Caught Sharing Location Data (eff.org)
5381.
Web application from scratch, Part IV (defn.io)
5382.
Zeno tarpits (esr.ibiblio.org)
5383.
Show HN: Convert Mongo queries to postgresql using jsonb (github.com)
5384.
Apple knew its computers were “defective,” sold them anyway, suit alleges (theoutline.com)
5385.
Ask HN: What are some great papers a layman can comprehend?
5386.
String functions: Nim vs. Python comparison (2017) (scripter.co)
5387.
Show HN: Golang Client and Library for NewsAPI.org (github.com)
5388.
The State of Cryptocurrency Mining (medium.com)
5389.
The Thirty Million Line Problem [Casey Muratori] (youtube.com)
5390.
Show HN: Unix-style filesystem-based RSS/Atom fetcher/reader (github.com)
5391.
PyCon 2018 Videos (youtube.com)
5392.
Dafny – programming language for formal specifications (bor0.wordpress.com)
5393.
Anti-If: The missing patterns (code.joejag.com)
5394.
Upside-Down-Ternet (2009) (ex-parrot.com)
5395.
Australians’ human rights are being breached through the exploitation of data (blog.cryptoaustralia.org.au)
5396.
30 Years Later, I'm Still Trying to Make Sense of the MOVE Bombing (npr.org)
5397.
US has regressed to developing nation status, MIT economist warns (independent.co.uk)
5398.
Qubes Split GPG (qubes-os.org)
5399.
Disabling PGP in Outlook with Gpg4win (eff.org)
5400.
Critical vulnerabilities in PGP/GPG and S/MIME email encryption (twitter.com)