October 2019 Archive
6661.
Show HN: Free JavaScript Piano Chord Generator/Finder (theorymusic.org)
6662.
World’s First Deepfake Audit Counts Videos and Tools on the Open Web (spectrum.ieee.org)
6663.
Supreme Court Won’t Hear Domino’s Pizza Website Access Dispute (news.bloomberglaw.com)
6664.
How to Work with Big Geospatial Data (towardsdatascience.com)
6665.
Replicated reengaged remote team members in building company culture (range.co)
6666.
The Ties That Bind Facebook's Libra (wired.com)
6667.
AI in Practice: Securing Your Code with Natural Language Processing (insights.sei.cmu.edu)
6668.
Alfred Nobel and His Prizes (bostonreview.net)
6669.
Most Deepfakes Are Porn, and They're Multiplying Fast (wired.com)
6670.
Ask HN: Do you track any metrics or indicators in life?
6671.
Design patterns for hacking together prototypes: Catch All (web.eecs.utk.edu)
6672.
Startup Lingo Bingo (startuplingobingo.com)
6673.
The Emergence of Revenue-Based Venture Capital (entrepreneur.com)
6674.
Code Star, Programmer Horoscopes (getcodestar.com)
6675.
Improve your CSS with these 5 principles (dev.to)
6676.
Rust on the Sipeed Longan Nano, an Inexpensive RISC-V Development Board (pramode.in)
6677.
Prepare for the Deepfake Era of Web Video (wired.com)
6678.
Zero-Trust Network with Consul Connect and Docker (matthieujacquot.com)
6679.
Malfunctioning Sex Robot: On John Updike (lrb.co.uk)
6680.
Two centuries ago, University of Virginia students abused enslaved servants (washingtonpost.com)
6681.
Age – A simple file encryption tool and format (by FiloSottile and Benjojo12) (age-tool.com)
6682.
Mathematical Universe Hypothesis (en.wikipedia.org)
6683.
America’s Risky Approach to Artificial Intelligence (nytimes.com)
6684.
FBI warns of major ransomware attacks as criminals go “big-game hunting” (arstechnica.com)
6685.
Pedestrian detection systems don’t work well, AAA finds (arstechnica.com)
6686.
Stripe Built One of Silicon Valley’s Best Engineering Teams (2015) (firstround.com)
6687.
Australia inches closer to compelling access to US data under CLOUD Act (zdnet.com)
6688.
How to 51% Attack Bitcoin (lacker.io)
6689.
Hong Kong’s female protesters are reclaiming the “basic bitch” stereotype (qz.com)
6690.
The Washington Post’s Most Valuable Asset Is Now Its Software, Thanks to Bezos (observer.com)