What you see here are Hacker News front page posts with a list of URLs found in the comments of each post. Down below is a categorized list of URLs.

The list was last updated on 12/07/19 16:04:40 UTC. Improvement ideas welcome.
The Lesson to Unlearn (paulgraham.com)
Do Things that Don't Scale (paulgraham.com)
BPF: A New Type of Software (www.brendangregg.com)
BPF: A New Type of Software
Bloom’s Taxonomy or the Art of Asking the Right Questions – TestDome Blog (blog.testdome.com)
Posted on November 3, 2018 by zeljkos
Inspector | HTML/CSS | TestDome (www.testdome.com)
Inspector programming interview question screens programmers for knowledge of: HTML/CSS.
Entrepreneurs Come From Families With Money (fortune.com)
It's one of the most important factors.
Gordian Knot | Wikiwand (www.wikiwand.com)
The Gordian Knot is a legend of Phrygian Gordium associated with Alexander the Great. It is often used as a metaphor for an intractable problem solved easily by finding an approach to the problem that renders the perceived constraints of the problem moot :
Great White Sharks Are Terrified of Orcas (www.smithsonianmag.com)
Killer whales redistribute white shark foraging pressure on seals (www.nature.com)
Tonic Immobility (www.sharktrust.org)
Tonic immobility is a reflex that causes a temporary state of inactivity in an animal. Similar to hypnosis. It occurs in a variety of different species, including many sharks and rays...
Killer Whales Working Together to Hunt Seals on Ice | BBC Earth (www.youtube.com)
Orcas knocking seals off waves was thought to be a myth when Producer/Director Kathryn Jeffs set out to film them in Antartica for BBC series Frozen Planet. ...
Killer whales of Eden, New South Wales - Wikipedia (en.m.wikipedia.org)
Breaking Waves - Near Shore Effects - Surf Forecasting Help - Magicseaweed.com (magicseaweed.com)
Killer Whale vs. Sea Lions | National Geographic (www.youtube.com)
Off the coast of Argentina, seasoned killer whales hunt sea lion pups. See all National Geographic videos: http://video.nationalgeographic.com/?source=4001 ➡...
Zoologger: The only raptor known to hunt in cooperative packs (www.newscientist.com)
Harris's hawks are unique in the raptor world in that they cooperate in groups when hunting, like wolves or humans. But why they do so is still a mystery
Deploy-your-own-SaaS: “only yours” cloud services for everyday needs (github.com)
Framasoft ~ Change the world one byte at a time (framasoft.org)
Framasoft is a non-profit popular educational organization, a group of friends convinced that an emancipatory digital world is possible, convinced that it will arise through actual actions on real world and online with and for you!
amark/gun (github.com)
A realtime, decentralized, offline-first, graph protocol to sync the web. - amark/gun
sumdog/bee2 (github.com)
Provisioning System for Hosting Providers. Contribute to sumdog/bee2 development by creating an account on GitHub.
awesome-selfhosted/awesome-selfhosted (github.com)
A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and managing applications instead of renting from Software-as-a-Serv...
Software Licensing for WordPress and Easy Digital Downloads (easydigitaldownloads.com)
WordPress Software Licensing for Easy Digital Downloads let you sell license keys that provide automatic plugin and theme upgrades to your customers.
n1trux/awesome-sysadmin (github.com)
A curated list of amazingly awesome open source sysadmin resources. - n1trux/awesome-sysadmin
Topics tagged hassio-repository (community.home-assistant.io)
Topics tagged hassio-repository
tinspin/rupy (github.com)
Joint Parallel HTTP & Distributed Java/JSON. Contribute to tinspin/rupy development by creating an account on GitHub.
Google seen as retreating from the Alphabet experiment (www.wsj.com)
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Imgur (imgur.com)
Yea AMP.
The Distribution of Users’ Computer Skills: Worse Than You Think (www.nngroup.com)
Across 33 rich countries, only 5% of the population has high computer-related abilities, and only a third of people can complete medium-complexity tasks.
Opinion | Innovation and the Bell Labs Miracle (www.nytimes.com)
A study of Bell Labs offers a number of lessons about how our country’s technology companies — and our country’s longstanding innovative edge — actually came about.
John Cleese on Creativity In Management (www.youtube.com)
Browse more videos from the famous John Cleese training company: www.videoarts.com In this lecture-style presentation, John Cleese claims that creativity is ...
Steve Jobs Interview Product People should get promoted Over Sales Marketing People (www.youtube.com)
Steve Jobs Interview Product People should get promoted Over Sales & Marketing People Jobs on success: https://www.youtube.com/watch?v=yL7X3DTyS2Q
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Google's Waymo unseats Toyota as automated-driving patent king (asia.nikkei.com)
US company rides AI to cutting edge as data becomes center of auto competition
Patents Assigned to Waymo LLC - Justia Patents Search (patents.justia.com)
Justia - Patents - Patents and Patent Application Resources
Waymo is mapping L.A. in hopes of someday introducing driverless taxis (www.latimes.com)
The Google offshoot wants to be ready for California when the state is ready for driverless taxis.
Breakup of the Bell System - Wikipedia (en.m.wikipedia.org)
Outline - Read & annotate without distractions (outline.com)
Outline is a free service for reading and annotating news articles. We remove the clutter so you can analyze and comment on the content.
The Old Reader (theoldreader.com)
Read all your favorite online content in one place. Import your subscriptions in one click, find your friends, and start sharing.
Understanding “Deep Double Descent” (www.alignmentforum.org)
If the universe is 13.8B years old, how can we see 46B light years away? (2018) (medium.com)
Can The Universe Expand Faster Than The Speed Of Light? (www.forbes.com)
Special relativity limits all particles to the speed of light. But space itself, thanks to general relativity, can do better.
PracticalAI 2.0: A New Platform to Learn ML Using Python, Keras and Tensorflow (practicalai.me)
Brain tunes itself to criticality, maximizing information processing (source.wustl.edu)
Cortical Circuit Dynamics Are Homeostatically Tuned to Criticality In Vivo (www.cell.com)
Ma et al. evaluate long-term computational dynamics in the visual cortex. Cortical circuits exhibit criticality, a regime that maximizes information processing. Using monocular deprivation, the authors demonstrate that criticality is consistent with a homeostatic set point of emergent dynamics.
The Hard Problem of Consciousness and the Free Energy Principle (www.ncbi.nlm.nih.gov)
This article applies the free energy principle to the hard problem of consciousness. After clarifying some philosophical issues concerning functionalism, it identifies the elemental form of consciousness as affect and locates its physiological mechanism ...
The Hard Problem of Consciousness and the Free Energy Principle (www.frontiersin.org)
This article applies the free energy principle to the hard problem of consciousness. After clarifying some philosophical issues concerning functionalism, it identifies the elemental form of consciousness as affect and locates its physiological mechanism (an extended form of homeostasis) in the upper brainstem. This mechanism is then formalized in terms of free energy minimization (in unpredicted contexts) where decreases and increases in expected...
The Bayesian Brain Hypothesis (towardsdatascience.com)
How our brain evolved to look into the future
Systemd Opened Security Hole in Linux, VPNs Could Be Compromised (linuxreviews.org)
CVE - Search Results (cve.mitre.org)
Common Vulnerabilities and Exposures (CVE®) is a list of entries — each containing an identification number, a description, and at least one public reference — for publicly known cybersecurity vulnerabilities. Assigned by CVE Numbering Authorities (CNAs) from around the world, use of CVE Entries ensures confidence among parties when used to discuss or share information about a unique software vulnerability, provides a baseline for tool evaluation...
oss-sec: Re: [CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections. (seclists.org)
oss-sec: [CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections. (seclists.org)
Robots in Finance Could Wipe Out Some of Its Highest-Paying Jobs (www.bloomberg.com)
New Features in ES2019 (javascript.christmas)
RFC 7159 - The JavaScript Object Notation (JSON) Data Interchange Format (tools.ietf.org)
RFC 7493 - The I-JSON Message Format (tools.ietf.org)
tc39/proposal-well-formed-stringify (github.com)
Proposal to prevent JSON.stringify from returning ill-formed strings - tc39/proposal-well-formed-stringify
BigInt (developer.mozilla.org)
BigInt is a built-in object that provides a way to represent whole numbers larger than 253 - 1, which is the largest number JavaScript can reliably represent with the Number primitive. BigInt can be used for arbitrarily large integers.
[Normative] Make Array.prototype.sort stable by mathiasbynens · Pull Request #1340 · tc39/ecma262 (github.com)
All major JavaScript engines now have a stable Array.prototype.sort implementation. Let’s update the spec accordingly. References: https://v8.dev/blog/array-sort microsoft/ChakraCore@c565b12 Modda...
Stable Array.prototype.sort · V8 (v8.dev)
Array.prototype.sort is now guaranteed to be stable.
90 - v8 - V8 JavaScript Engine - Monorail (bugs.chromium.org)
224128 - Array.sort isn't a stable sort (switch to MergeSort) (bugzilla.mozilla.org)
RESOLVED (nallen) in Core - JavaScript Engine. Last updated 2014-04-26.
arrizalamin/js-function-reflector (github.com)
Function Reflection in Javascript With Support for ES2015+ Syntax - arrizalamin/js-function-reflector
AsyncFunction (developer.mozilla.org)
The AsyncFunction constructor creates a new async function object. In JavaScript, every asynchronous function is actually an AsyncFunction object.
File Systems Unfit as Distributed Storage Back Ends: 10 Years of Ceph (muratbuffalo.blogspot.com)
Tensorflow User Experience (nostalgebraist.tumblr.com)
Andrej Karpathy on Twitter (twitter.com)
“I've been using PyTorch a few months now and I've never felt better. I have more energy. My skin is clearer. My eye sight has improved.”
FDA Approving Drugs at Breakneck Speed, Raising Alarm (www.msn.com)
ArXiv Machine Learning Classification Guide (blogs.cornell.edu)
Rolls-Royce Touts Nuclear Reactors as Key to Clean Jet Fuel (www.bloomberg.com)
How much does it cost to build the reactor in a nuclear submarine, aircraft carrier, or ice cutter? - Quora (www.quora.com)
To clarify on Quora User's answer, that is post-development costs. Once all the work has been done to fully design a reactor, that is the pure manufacturing and fuelling cost of one. The initial design, testing and development of a reactor to rea...
Small nuclear power reactors - World Nuclear Association (www.world-nuclear.org)
There is revival of interest in small and simpler units for generating electricity from nuclear power, and for process heat. This interest in small nuclear power reactors is driven both by a desire to reduce capital costs and to provide power away from large grid systems.
Bill Gates's Experimental Nuclear Power Plant Halts Construction in China (www.popularmechanics.com)
Gates cites the Trump Administration's aggressive stance for having to pull out.
SS Edmund Fitzgerald - Wikipedia (en.wikipedia.org)
USS Thresher (SSN-593) - Wikipedia (en.wikipedia.org)
USS Scorpion (SSN-589) - Wikipedia (en.wikipedia.org)
Years of Warnings, Then Death and Disaster: How the Navy Failed Its Sailors (features.propublica.org)
The Pentagon ignored years of warnings before the Navy’s deadliest crashes in decades.
Project 22220 icebreaker - Wikipedia (en.wikipedia.org)
50 Years of Victory - P -- Arctic Icebreaker Ship (www.polarcruises.com)
50 Years of Victory North Pole Cruises, Tours, Trip Reviews, Information and Vacation Prices from the Leader in Arctic Travel - Polar Cruises, your Polar Travel Specialists.
Peaking power plant - Wikipedia (en.wikipedia.org)
Peaking power plants, also known as peaker plants, and occasionally just "peakers", are power plants that generally run only when there is a high demand, known as peak demand, for electricity.[1][2][3] Because they supply power only occasionally, the power supplied commands a much higher price per kilowatt hour than base load power. Peak load power plants are dispatched in combination with base load power plants, which supply a dependable and con...
Base load - Wikipedia (en.wikipedia.org)
The baseload[1] (also base load) on a grid is the minimum level of demand on an electrical grid over a span of time, for example, one week. This demand can be met by unvarying power plants,[2] dispatchable generation,[3] or by a collection of smaller intermittent energy sources,[4] depending on which approach has the best mix of low cost, availability and high reliability in any particular market. The remainder of demand, varying throughout a da...
Energy density - Wikipedia (en.wikipedia.org)
Energy density is the amount of energy stored in a given system or region of space per unit volume. Colloquially it may also be used for energy per unit mass, though the accurate term for this is specific energy. Often only the useful or extractable energy is measured, which is to say that inaccessible energy (such as rest mass energy) is ignored.[1] In cosmological and other general relativistic contexts, however, the energy densities considere...
Jet fuel - Wikipedia (en.wikipedia.org)
Jet fuel, aviation turbine fuel (ATF), or avtur, is a type of aviation fuel designed for use in aircraft powered by gas-turbine engines. It is colorless to straw-colored in appearance. The most commonly used fuels for commercial aviation are Jet A and Jet A-1, which are produced to a standardized international specification. The only other jet fuel commonly used in civilian turbine-engine powered aviation is Jet B, which is used for its enhanced...
Barakah nuclear power plant - Wikipedia (en.wikipedia.org)
The Barakah nuclear power plant (Arabic: محطة براكة للطاقة النووية) is the United Arab Emirates's first nuclear power station, the first nuclear power station in the Arabian Peninsula, and the first commercial nuclear power station in the Arab World. It is still under construction. It consists of four APR-1400 nuclear reactors with a total capacity of 5,600MW. [1] The site is in the Gharbiya region of Abu Dhabi, on the coastline between the Pers...
Aircraft Nuclear Propulsion - Wikipedia (en.wikipedia.org)
The Aircraft Nuclear Propulsion (ANP) program and the preceding Nuclear Energy for the Propulsion of Aircraft (NEPA) project worked to develop a nuclear propulsion system for aircraft. The United States Army Air Forces initiated Project NEPA on May 28, 1946.[1] After funding of $10 million in 1947,[2] NEPA operated until May 1951, when the project was transferred to the joint Atomic Energy Commission (AEC)/USAF ANP.[3] The USAF pursued two differ...
Base load - Wikipedia (en.m.wikipedia.org)
The baseload[1] (also base load) on a grid is the minimum level of demand on an electrical grid over a span of time, for example, one week. This demand can be met by unvarying power plants,[2] dispatchable generation,[3] or by a collection of smaller intermittent energy sources,[4] depending on which approach has the best mix of low cost, availability and high reliability in any particular market. The remainder of demand, varying throughout a da...
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
dredmorbius: search results - fischer-tropsch (old.reddit.com)
Progress, models, institutions, technology, limits -- Interactions thereof.
Electrical Fuel Synthesis from Seawater: older than I'd thought (old.reddit.com)
With the help of [James Salsman](https://plus.google.com/u/0/113215976889659570939) at The Other Place I've been digging into the history of fuel...
The intractable problem of biomass for fuels is HANNP / photosynthetic ceiling (old.reddit.com)
The US Department of Energy is promoting its biofuels research [at the Other...
Boeing's Biofuel "Breakthrough" -- Less than overwhelming (old.reddit.com)
Boeing has been making the rounds with what its director of sustainable aviation fuels, Darrin Morgan, is calling "the biggest breakthrough that...
Explainer: The challenge of tackling aviation's non-CO2 emissions | Carbon Brief (www.carbonbrief.org)
Last October, the 191 member states of the ICAO agreed to a new deal to cap international aviation emissions using a carbon offset approach.
Feeling Overwhelmed by The News? Here Are Some Easy Things You Can Do Right Now to Help The Planet (www.sciencealert.com)
It's easy to feel hopeless about the future of our world, especially when the latest IPCC report has just come out, warning that we have barely a decade left to prevent the most catastrophic climate change scenario.
Environmental impact of shipping - Wikipedia (en.wikipedia.org)
The environmental impact of shipping includes air pollution, water pollution, acoustic, and oil pollution.[1] Ships are responsible for more than 18 percent of some air pollutants.[2]
World Nuclear Waste Report (worldnuclearwastereport.org)
World Nuclear Waste Report
Data and Tools | NREL (www.nrel.gov)
NREL develops data sets, maps, models, and tools for the analysis of energy and energy-efficiency technologies.
Thermal energy storage - Wikipedia (en.wikipedia.org)
Results for 'au:smil, vaclav' [WorldCat.org] (www.worldcat.org)
Search for 'au:smil, vaclav' at a library near you
Global Greenhouse Gas Emissions Data | US EPA (www.epa.gov)
Includes information on global greenhouse gas emissions trends, and by type of gas, by source, and by country.
The realist (web.archive.org)
Throughout his career from his home office near the University of Manitoba in Winnipeg, Canada, Vaclav Smil has profoundly influenced how a generation of scientists, policymakers, executives, and philanthropists think about energy in all forms. In particular, his focus has been on how societies have transitioned from relying on one source of energy, such as wood, to another, such as coal. Now, as the world faces the daunting challenge of trying t...
Everything You Need to Know About Agricultural Emissions (www.wri.org)
The [Greenhouse Gas Protocol](http://www.ghgprotocol.org/) launched [a new guidance](http://www.ghgprotocol.org/agriculture-guidance) this week to help agricultural companies measure and manage their greenhouse gas (GHG) emissions from crop and livestock production. But what exactly are agricultural emissions, and why is it important to manage them? Drawing on the latest research and data, here is everything you need to know about agriculture’s c...
Land Mammals (xkcd.com)
It goes completely against what most believe, but out of all major energy sources, nuclear is the safest (ourworldindata.org)
This blog post draws on data and research discussed in our entry on Energy Production and Changing Energy Sources.
Sixteen APL Amuse-Bouches (2016) (vector.org.uk)
Korean mixed script - Wikipedia (en.wikipedia.org)
Korean mixed script, known in Korean as hanja honyong (Korean: 한자혼용; Hanja: 漢字混用), Hanja-seokkeosseugi (漢字섞어쓰기, 한자섞어쓰기), 'Chinese character mixed usage,' or gukhanmun honyong (국한문혼용; 國漢文混用), 'national Sino-Korean mixed usage,' is a form of writing the Korean language that uses a mixture of the Korean alphabet or hangul (.mw-parser-output .script-Cprt{font-size:1.25em;font-family:"Segoe UI Historic","Noto Sans Cypriot",Code2001}.mw-parser-output ...
Books/Beginners - J Wiki (code.jsoftware.com)
A 44-page introduction to J for newcomers to the language. The authors provide this without copyright and it is available for free distribution and it can be edited or altered without acknowledgement.
Notation as a Tool of Thought (www.jsoftware.com)
-🎄- 2019 Day 2 Solutions -🎄- (old.reddit.com)
#--- Day 2: 1202 Program Alarm --- *** Post your solution using /u/topaz2078's [`paste`](https://topaz.github.io/paste/) or other external...
Dyalog19/SA3 (github.com)
Dyalog19 SA3 Workshop (Introduction to HTMLRenderer) Materials - Dyalog19/SA3
A Letter from Dijkstra on APL (www.jsoftware.com)
HackerOne breach lets outside hacker read customers’ private bug reports (arstechnica.com)
HackerOne disclosed on HackerOne: Account takeover via leaked... (hackerone.com)
The Social Subsidy of Angel Investing (danco.substack.com)
Privacy analysis of Tiktok’s app and website (rufposten.de)
How can I block HTML Canvas fingerprinting in Firefox via permissions? (superuser.com)
I ran a Canvas fingerprinting browser test and noticed that I am susceptible to Canvas fingerprinting in Firefox 66. This was a surprise to me, as I had read several announcements declaring that Fi...
Zoom Page WE – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download Zoom Page WE for Firefox. Zoom web pages (either per-site or per-tab) using full-page zoom, text-only zoom and minimum font size. Fit-to-width zooming can be applied to pages automatically. Fit-to-window scaling can be applied to small images.
Canvas Fingerprint Defender – Get this Extension for 🦊 Firefox Android (en-US) (addons.mozilla.org)
Download Canvas Fingerprint Defender for Firefox. Defending against canvas fingerprinting by reporting a fake value.
AudioContext Fingerprint Defender – Get this Extension for 🦊 Firefox Android (en-US) (addons.mozilla.org)
Download AudioContext Fingerprint Defender for Firefox. Defending against AudioContext fingerprinting by reporting a fake value.
WebGL Fingerprint Defender – Get this Extension for 🦊 Firefox Android (en-US) (addons.mozilla.org)
Download WebGL Fingerprint Defender for Firefox. Defending against WebGL fingerprinting by reporting a fake value.
Font Fingerprint Defender – Get this Extension for 🦊 Firefox Android (en-US) (addons.mozilla.org)
Download Font Fingerprint Defender for Firefox. Defending against Font fingerprinting by reporting a fake value.
M66B/XPrivacyLua (github.com)
Really simple to use privacy manager for Android 6.0 Marshmallow and later - M66B/XPrivacyLua
M66B/NetGuard (github.com)
A simple way to block access to the internet per app - M66B/NetGuard
Audio Fingerprinting using the AudioContext API (iq.opengenus.org)
Audio fingerprinting takes advantage of device performance specs to build up an identifying fingerprint of a user. It uses the AudioContext API for this
puppeteer-extra-plugin-stealth (www.npmjs.com)
Stealth mode: Applies various techniques to make detection of headless puppeteer harder.
Valve/fingerprintjs2 (github.com)
Modern & flexible browser fingerprinting library. Contribute to Valve/fingerprintjs2 development by creating an account on GitHub.
AmIUnique (amiunique.org)
Fingerprint collecting platform
Lucb1e.com :: Cookieless Cookies (lucb1e.com)
Canvas Fingerprinting (browserleaks.com)
Browser Fingerprinting with no user agent identifiers, only through the HTML5 Canvas element. The method is based on the fact that the same canvas-code can produce different pixels on a different web browser, depending on the system on which it was executed.
Web Audio API (developer.mozilla.org)
The Web Audio API provides a powerful and versatile system for controlling audio on the Web, allowing developers to choose audio sources, add effects to audio, create audio visualizations, apply spatial effects (such as panning) and much more.
India's two-week ban cost TikTok 15 million users (www.cnn.com)
One of China's top social media platforms saw its rapid growth braked by being temporarily shut out of India's market of 600 million internet users.
Canvas Fingerprint Defender – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download Canvas Fingerprint Defender for Firefox. Defending against canvas fingerprinting by reporting a fake value.
WebGL Fingerprint Defender – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download WebGL Fingerprint Defender for Firefox. Defending against WebGL fingerprinting by reporting a fake value.
AudioContext Fingerprint Defender – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download AudioContext Fingerprint Defender for Firefox. Defending against AudioContext fingerprinting by reporting a fake value.
Font Fingerprint Defender – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download Font Fingerprint Defender for Firefox. Defending against Font fingerprinting by reporting a fake value.
Firefox Multi-Account Containers – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download Firefox Multi-Account Containers for Firefox. Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs that preserve your privacy. Cookies are separated by container, allowing you to use the web with multiple identities or accounts simultaneously.
Whonix - Wikipedia (en.m.wikipedia.org)
Whonix[2] (formerly TorBOX[3]) is a Debian GNU/Linux–based security-focused[4] Linux distribution.[5] It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network to accomplish this.[6][7][8][9][10]
CanvasBlocker – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download CanvasBlocker for Firefox. Alters some JS APIs to prevent fingerprinting.
kkapsner/CanvasBlocker (github.com)
A Firefox extension to protect from being fingerprinted - kkapsner/CanvasBlocker
W3C DOM Compatibility - CSS Object Model View (www.quirksmode.org)
jbtronics/CrookedStyleSheets (github.com)
Webpage tracking only using CSS (and no JS). Contribute to jbtronics/CrookedStyleSheets development by creating an account on GitHub.
maxchehab/CSS-Keylogging (github.com)
Chrome extension and Express server that exploits keylogging abilities of CSS. - maxchehab/CSS-Keylogging
How Apps on Android Share Data with Facebook - Report (privacyinternational.org)
Facebook routinely tracks users, non-users and logged-out users outside its platform through Facebook Business Tools. App developers share data with Facebook through the Facebook Software Development Kit (SDK), a set of software development tools that help developers build apps for a specific operating system. Using the free and open source software tool called "mitmproxy", an interactive HTTPS proxy, Privacy International has analyzed the data t...
HN Search powered by Algolia (hn.algolia.com)
Hacker News Search, millions articles and comments at your fingertips.
Army examines TikTok security concerns after Schumer's data warning (www.reuters.com)
The U.S. Army is undertaking a security assessment of China-owned social media p...
Privacy Shield (www.privacyshield.gov)
Bellevue, Washington
Open Source | TikTok (www.tiktok.com)
10 TikTok Statistics That You Need to Know in 2019 [Infographic] (www.oberlo.com)
TikTok is the fastest growing social media app on the market. But what is this app that youngsters just can’t get enough of? Learn all that here, as well as the top 10 statistics for TikTok in 2019. Read more.
TikTok tracks users with facial recognition (futurism.com)
A new search feature scans for people based on their face.
Attackers Used Look-Alike Domains to Steal $1M from a Chinese VC (www.darkreading.com)
The Great Cannon has been deployed again (cybersecurity.att.com)
页é¢ä¸åå¨_ç¾åº¦æç´¢ (www.baidu.com)
温馨æ示ï¼
Black hole (networking) - Wikipedia (en.wikipedia.org)
In networking, black holes refer to places in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipient.
Censorship - Wikipedia (en.wikipedia.org)
Censorship is the suppression of speech, public communication, or other information, on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient."[2][3][4] Censorship can be conducted by governments,[5] private institutions, and corporations.
Add ability to uncloak CNAME records · gorhill/uBlock@3a564c1 (github.com)
Related issue: - https://github.com/uBlockOrigin/uBlock-issues/issues/780 New webext permission added: `dns`, which purpose is to allow an extension to fetch the DNS record of specific hostnames, ...
3rd Party Tools (plaintextoffenders.com)
We love our community. Not only do they supply us with submissions, but also approach offenders, spread the word and create tools. This page is dedicated to the tools our community has created around...
The Top 3 Web Browsers In China Leave Users Vulnerable, Report Says (www.fastcompany.com)
Browsers from Baidu, Alibaba, and Tencent found to transmit user data with low or no encryption.
Forward secrecy - Wikipedia (en.wikipedia.org)
In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if the private key of the server is compromised.[1] Forward secrecy protects past sessions against future compromises of secret keys.[2][3][3] By generating a unique session key for every session a user initiates, the compromise of a single session...
Don’t Be Fodder for China’s ‘Great Cannon’ — Krebs on Security (krebsonsecurity.com)
China has been actively diverting unencrypted Web traffic destined for its top online search service — Baidu.com — so that some visitors from outside of the country were unwittingly enlisted in a novel and unsettling series of denial-of-service attacks aimed at sidelining sites that distribute anti-censorship tools, according to research released this week.
Same-origin policy (developer.mozilla.org)
The same-origin policy is a critical security mechanism that restricts how a document or script loaded from one origin can interact with a resource from another origin.
Use of lasers from Chinese fishing vessels on the rise (www.abc.net.au)
Hand-held lasers are increasingly being used against Australian Defence Force assets, with military insiders blaming small Chinese maritime militia vessels for the dangerous tactic.
The Great Illusion - Wikipedia (en.wikipedia.org)
The Great Illusion is a book by Norman Angell, first published in the United Kingdom in 1909 under the title Europe's Optical Illusion[1] and republished in 1910 and subsequently in various enlarged and revised editions under the title The Great Illusion.[2]
If Goods Don't Cross Borders... | Nicholas Snow (fee.org)
Hitler's Willing Business Partners (www.theatlantic.com)
A shocking account of IBM's complicity with the Nazis is a reminder that people bear moral responsibility for the actions of the corporation&mdasha; point that critics have failed to grasp.
8 American Companies That Worked with the Nazis During World War II | Phactual.com (www.phactual.com)
Although there were sanctions and restrictions against working with Germany during World War II, especially when America entered the war in 1941, there were some American companies that profited off both sides of World War II. Here are 8 examples.
Top 10 American Companies that Aided the Nazis (www.toptenz.net)
War profiteers are such a loathsome notion. The idea that while people are struggling for causes while others use the confused nature of military logistics to make dishonest money is appalling. The thought that these companies supported the most deadly regime in the world and went on to become fixtures in our daily lives is loathsome, even well over half a century later, yet it remains a bitter reality. 10. Coca-Cola Coca-Cola was a major presenc...
We mustn't fall for The Great Illusion again (www.telegraph.co.uk)
With China sabre-rattling over the disputed Senkaku islands, the lessons of history are going unheeded as free trade comes under threat around the world
Amazon.com: The New Confessions of an Economic Hit Man (9781785033858): John Perkins: Books (www.amazon.com)
Amazon.com: The New Confessions of an Economic Hit Man (9781785033858): John Perkins: Books
Opinion | Jews Are Speaking Out Against China’s Ethnic Cleansing Of Muslims. Will It Help? (forward.com)
Writer-at-Large Jane Eisner argues that when large, powerful countries intern minority groups, its our responsibility as Jews to do something.
The Holocaust - Wikipedia (en.wikipedia.org)
Évian Conference - Wikipedia (en.wikipedia.org)
The Évian Conference was convened 6–15 July 1938, at Évian-les-Bains, France, to discuss the Jewish refugee problem and the plight of the increasing numbers of Jewish refugees fleeing persecution by Nazi Germany. It was convened at the initiative of United States President Franklin D. Roosevelt who perhaps hoped to obtain commitments from some of the invited nations to accept more refugees, although he took pains to avoid stating that objective e...
Kristallnacht - Wikipedia (en.wikipedia.org)
Nazi ghettos - Wikipedia (en.wikipedia.org)
Beginning with the invasion of Poland during World War II, the regime of Nazi Germany set up ghettos across occupied Europe in order to segregate and confine Jews, and sometimes Romani people, into small sections of towns and cities furthering their exploitation. In German documents, and signage at ghetto entrances, the Nazis usually referred to them as Jüdischer Wohnbezirk or Wohngebiet der Juden, both of which translate as the Jewish Quarter. T...
Final Solution - Wikipedia (en.wikipedia.org)
Definition of en masse | Dictionary.com (www.dictionary.com)
Definition of en masse from Dictionary.com, the world’s leading online source for English definitions, pronunciations, word origins, idioms, Word of the Day, and more.
American Indian boarding schools - Wikipedia (en.wikipedia.org)
Whataboutism - Wikipedia (en.wikipedia.org)
China's Great Cannon (citizenlab.ca)
This post describes our analysis of an attack tool that we identify as separate from, but co-located with, the Great Firewall of China.
ContextCue - ContextCue is a privacy-focused advertising network that allows advertisers and publishers to grow their business, without tracking, collecting, or storing user data (contextcue.com)
ContextCue is a privacy-focused advertising network that allows advertisers and publishers to grow their business, without tracking, collecting, or storing user data.
Adblock Plus - Wikipedia (en.wikipedia.org)
Internet Sharing License (stallman.org)
For current political commentary, see the daily political notes.
A Modest Proposal: Universal Online Media Payment Syndication (old.reddit.com)
A constant challenge for any creative type is making a living. And it's hardly a new problem. In the case of broadcast media, [commercial...
Outline - Read & annotate without distractions (outline.com)
Outline is a free service for reading and annotating news articles. We remove the clutter so you can analyze and comment on the content.
Attention Required! (archive.is)
Drugs that tamp down inflammation in the brain could slow cognitive decline (news.berkeley.edu)
Chronic Inflammation - StatPearls - NCBI Bookshelf (www.ncbi.nlm.nih.gov)
Inflammation is part of the body's defense mechanism. It is the process by which the immune system recognizes and removes harmful stimuli and begins the healing process. There are generally two types of inflammation: acute and chronic inflammation.[1][2][3]
Chronic inflammation: a failure of resolution? (onlinelibrary.wiley.com)
Inflammation has evolved as a protective response to insult or injury, it's a primordial response that eliminates or neutralises foreign organisms or material, the resolution of inflammation encompas...
Natural resolution of inflammation (onlinelibrary.wiley.com)
Inflammation is a protective response essential for maintaining human health and for fighting disease. As an active innate immune reaction to challenge, inflammation gives rise to clinical cardinal s...
The inflammation theory of disease: The growing realization that chronic inflammation is crucial in many diseases opens new avenues for treatment: EMBO reports: Vol 13, No 11 (www.embopress.org)
EMBO Press is an editorially independent publishing platform for the development of EMBO scientific publications.
The molecular mechanisms of chronic inflammation development (www.frontiersin.org)
Inflammation is critical for the development of many complex diseases and disorders including autoimmune diseases, metabolic syndrome, neurodegenative diseases, cancers, and cardiovascular diseases. Inflammation comes in two types: chronic inflammation, which can be defined as a dysregulated form of inflammation, and acute inflammation, which can defined as a regulated form. Because of its special role in the aforementioned diseases, establishing...
Low-grade inflammation, diet composition and health: current research evidence and its translation | British Journal of Nutrition | Cambridge Core (www.cambridge.org)
Low-grade inflammation, diet composition and health: current research evidence and its translation - Volume 114 Issue 7 - Anne M. Minihane, Sophie Vinoy, Wendy R. Russell, Athanasia Baka, Helen M. Roche, Kieran M. Tuohy, Jessica L. Teeling, Ellen E. Blaak, Michael Fenech, David Vauzour, Harry J. McArdle, Bas H. A. Kremer, Luc Sterkman, Katerina Vafeiadou, Massimo Massi Benedetti, Christine M. Williams, Philip C. Calder
Matthew Walker's "Why We Sleep" Is Riddled with Scientific and Factual Errors - Alexey Guzey (guzey.com)
See discussion of this essay on the Forum, Hacker News, Marginal Revolution, Andrew Gelman’s Blog, /r/slatestarcodex. Update 2019-12-02: added Appendix: where did Walker get his PhD? Note: I link to a bunch of paywalled studies in this essay. Please do not use sci-hub to access them for free and do not use this trick (a) to easily redirect papers to sci-hub. Introduction Matthew Walker (a) is a professor of neuroscience and psychology at the Uni...
Stop Obsessing Over Sleep—Your Brain Will Thank You (www.wired.com)
Worrying about sleep is perhaps the most counterproductive thing you can do, no matter how many gadgets try to tell you otherwise.
r/slatestarcodex - Matthew Walker's "Why We Sleep" Is Riddled with Scientific and Factual Errors (www.reddit.com)
134 votes and 124 comments so far on Reddit
Intermittent metabolic switching, neuroplasticity and brain health (www.nature.com)
Eating patterns in modern societies often preclude the metabolic switch from utilization of glucose to ketones as a cellular energy source. In this Review, Mattson and colleagues discuss how intermittent metabolic switching impacts brain function and vulnerability to injury and disease.
Anti-Oxidant and Anti-Inflammatory Activity of Ketogenic Diet: New Perspectives for Neuroprotection in Alzheimer’s Disease (www.mdpi.com)
The ketogenic diet, originally developed for the treatment of epilepsy in non-responder children, is spreading to be used in the treatment of many diseases, including Alzheimer’s disease. The main activity of the ketogenic diet has been related to improved mitochondrial function and decreased oxidative stress. B-Hydroxybutyrate, the most studied ketone body, has been shown to reduce the production of reactive oxygen species (ROS), improving...
Redirecting (linkinghub.elsevier.com)
Systematic Review of the Use of Ketones in the Management of Acute and Chronic Neurological Disorders | Insight Medical Publishing (www.jneuro.com)
Systematic Review of the Use of Ketones in the Management of Acute and Chronic Neurological Disorders, <p>Hayden White, Karthik Venkatesh and Bala Venkates
Short-term fasting induces profound neuronal autophagy (www.tandfonline.com)
(2010). Short-term fasting induces profound neuronal autophagy. Autophagy: Vol. 6, No. 6, pp. 702-710.
Beclin1‐driven autophagy modulates the inflammatory response of microglia via NLRP3 | The EMBO Journal (www.embopress.org)
EMBO Press is an editorially independent publishing platform for the development of EMBO scientific publications.
Redirecting (linkinghub.elsevier.com)
Beta-hydroxybutyrate, an endogenic NLRP3 inflammasome inhibitor, attenuates stress-induced behavioral and inflammatory responses (www.nature.com)
The ketone metabolite β-hydroxybutyrate blocks NLRP3 inflammasome–mediated inflammatory disease (www.nature.com)
Ketone bodies are elevated in response to fasting, a low-carbohydrate ketogenic diet or high-intensity exercise. Vishwa Deep Dixit and colleagues report that one metabolite, β-hydroxybutyrate, inhibits the NLRP3 inflammasome. In vivo, β-hydroxybutyrate is anti-inflammatory and suppresses NLRP3-mediated inflammatory disease.
NLRP3 inflammasome suppression improves longevity and prevents cardiac aging in male mice (onlinelibrary.wiley.com)
In this study, we have shown the potential role of the NLRP3 inhibition to modulate several anti‐aging mechanisms during cardiac aging. This work highlights the importance of examining the therapeuti...
NLRP3 inflammasome: A likely target for the treatment of allergic diseases (onlinelibrary.wiley.com)
Allergic diseases, such as asthma, rhinitis, dermatitis, conjunctivitis, and anaphylaxis, have recently become a global public health concern. According to previous studies, the NLRP3 inflammasome is...
Suppression of NLRP3 Inflammasome Activation Ameliorates Chronic Kidney Disease-Induced Cardiac Fibrosis and Diastolic Dysfunction (www.nature.com)
Redirecting (linkinghub.elsevier.com)
David Deutsch on Twitter (twitter.com)
“I don't think 'subjective' is a useful concept. At any rate, subjective and objective are not the same species of concept. Certainly not opposites. If you say someone's hallucination of a demon is 'subjective', you still mean their brain is objectively in a hallucinating state. https://t.co/FTOKnKMOVv”
PyTorch elastic training (github.com)
What’s new in Spark 2.4! (medium.com)
Spark 2.4 was released recently and there are couple of new interesting and promising features in it. In this release, there were some new…
Using dask with PyTorch (train a model) · Issue #2581 · dask/distributed (github.com)
I find Dask very useful, and would like to use it to accelerate some pytorch models I am working on. A function to be accelerated would be the forward() function. I started doing some tests, but I ...
Cloud Deployments — Dask 2.8.1 documentation (docs.dask.org)
There are a variety of ways to deploy Dask on cloud providers. Cloud providers provide managed services, like Kubernetes, Yarn, or custom APIs with which Dask can connect easily. You may want to consider the following options:
Speed Breeding to Fast-Track Crop Improvement in Africa (blog.aasopenresearch.org)
Making an Endpoint 50x Faster (bilbof.com)
PostgreSQL: Documentation: 9.3: CREATE MATERIALIZED VIEW (www.postgresql.org)
CREATE MATERIALIZED VIEW defines a materialized view of a query. The query is executed and used to populate the view at the time the command is issued (unless WITH NO DATA is used) and may be refreshed later using REFRESH MATERIALIZED VIEW.
Show HN: Space Invaders in C (blog.loadzero.com)
Space Invaders Code (computerarcheology.com)
Hardware Info
Apple II Screen Typeface (www.fontzip.com)
download Apple II Screen Typeface Font with Creative Commons (by) Attribution by Edric Studio
Space Invaders (computerarcheology.com)
Mikael Agren patched the original ROMs to add a high-score table. Check out his project blog and demo movie.
fesh0r/newkind (github.com)
Elite: TNK repo mirror from mdw. Contribute to fesh0r/newkind development by creating an account on GitHub.
mamedev/mame (github.com)
MAME. Contribute to mamedev/mame development by creating an account on GitHub.
djyt/cannonball (github.com)
Cannonball: An Enhanced OutRun Engine. Contribute to djyt/cannonball development by creating an account on GitHub.
neiderm/arcade (github.com)
Complete dis-assembly and precise translation of ... - neiderm/arcade
An Emulator Writer's HOWTO for Static Binary Translation (www.gtoal.com)
Attention Required! (archive.is)
PICO-8 Fantasy Console (www.lexaloffle.com)
PICO-8 is a fantasy console for making, sharing and playing tiny games and other computer programs. New carts available every day!
Can I use... Support tables for HTML5, CSS3, etc (caniuse.com)
Welcome to Anotherguest! (anotherguest.se)
Welcome to Anotherguest!
Math Whiz Trades Without Humans (www.bloomberg.com)
The meaning behind $(X^TX)^{-1}$ (math.stackexchange.com)
In linear algebra, we learn that the inverse of a matrix "undoes" the linear transformation. What exactly is the meaning of the inverse of $(X^TX)^{-1}$? $X^TX$ we know as being a square matrix ...
KCG Holdings, Inc. Class A (KCG) Stock Price, Quote, History & News - Yahoo Finance (finance.yahoo.com)
Find the latest KCG Holdings, Inc. Class A (KCG) stock quote, history, news and other vital information to help you with your stock trading and investing.
NSE co-location scam - Wikipedia (en.wikipedia.org)
The NSE co-location scam relates to the market manipulation at the National Stock Exchange of India, India's leading stock exchange. Allegedly select players obtained market price information ahead of the rest of the market, enabling them to front run the rest of the market,[1][2] possibly breaching the NSE's purpose of demutualisation exchange governance and its robust transparency-based mechanism.[3] The alleged connivance of insiders by riggin...
Any Monkey Can Beat The Market (www.forbes.com)
Give a monkey enough darts and they’ll beat the market. So says a draft article by Research Affiliates highlighting the simulated results of 100 monkeys throwing darts at the stock pages in a newspaper. The average monkey outperformed the index by an average of 1.7 percent per year since 1964. [...]

Here are categorized URLs found in the comments of the Hacker News front page posts.
Sites
The Old Reader
Read all your favorite online content in one place. Import your subscriptions in one click, find your friends, and start sharing.
practicalAI
ð A practical approach to machine learning.
Client Tree | How to get more clients as a freelance professional
Understanding how to get more clients begins with being clear about what you want to offer as a professional. Our onboarding process helps you package your offering into a clear set of services. If you don't already have a website, the app will set you up with a one-page website that acts as a menu of your services.
World Nuclear Waste Report
World Nuclear Waste Report
AmIUnique
Fingerprint collecting platform
ContextCue - ContextCue is a privacy-focused advertising network that allows advertisers and publishers to grow their business, without tracking, collecting, or storing user data
ContextCue is a privacy-focused advertising network that allows advertisers and publishers to grow their business, without tracking, collecting, or storing user data.
Welcome to Anotherguest!
Welcome to Anotherguest!
Repositories
Atarity/deploy-your-own-saas
List of "only yours" cloud services for everyday needs :black_flag: - Atarity/deploy-your-own-saas
amark/gun
A realtime, decentralized, offline-first, graph protocol to sync the web. - amark/gun
sumdog/bee2
Provisioning System for Hosting Providers. Contribute to sumdog/bee2 development by creating an account on GitHub.
awesome-selfhosted/awesome-selfhosted
A list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of hosting and managing applications instead of renting from Software-as-a-Serv...
n1trux/awesome-sysadmin
A curated list of amazingly awesome open source sysadmin resources. - n1trux/awesome-sysadmin
tinspin/rupy
Joint Parallel HTTP & Distributed Java/JSON. Contribute to tinspin/rupy development by creating an account on GitHub.
tc39/proposal-well-formed-stringify
Proposal to prevent JSON.stringify from returning ill-formed strings - tc39/proposal-well-formed-stringify
arrizalamin/js-function-reflector
Function Reflection in Javascript With Support for ES2015+ Syntax - arrizalamin/js-function-reflector
M66B/XPrivacyLua
Really simple to use privacy manager for Android 6.0 Marshmallow and later - M66B/XPrivacyLua
M66B/NetGuard
A simple way to block access to the internet per app - M66B/NetGuard
Valve/fingerprintjs2
Modern & flexible browser fingerprinting library. Contribute to Valve/fingerprintjs2 development by creating an account on GitHub.
kkapsner/CanvasBlocker
A Firefox extension to protect from being fingerprinted - kkapsner/CanvasBlocker
jbtronics/CrookedStyleSheets
Webpage tracking only using CSS (and no JS). Contribute to jbtronics/CrookedStyleSheets development by creating an account on GitHub.
maxchehab/CSS-Keylogging
Chrome extension and Express server that exploits keylogging abilities of CSS. - maxchehab/CSS-Keylogging
pytorch/elastic
PyTorch elastic training. Contribute to pytorch/elastic development by creating an account on GitHub.
fesh0r/newkind
Elite: TNK repo mirror from mdw. Contribute to fesh0r/newkind development by creating an account on GitHub.
djyt/cannonball
Cannonball: An Enhanced OutRun Engine. Contribute to djyt/cannonball development by creating an account on GitHub.
neiderm/arcade
Complete dis-assembly and precise translation of ... - neiderm/arcade
Wiki Articles
Killer whales of Eden, New South Wales - Wikipedia
Breakup of the Bell System - Wikipedia
Planning fallacy - Wikipedia
The planning fallacy, first proposed by Daniel Kahneman and Amos Tversky in 1979,[1][2] is a phenomenon in which predictions about how much time will be needed to complete a future task display an optimism bias and underestimate the time needed.
SS Edmund Fitzgerald - Wikipedia
USS Thresher (SSN-593) - Wikipedia
USS Scorpion (SSN-589) - Wikipedia
Project 22220 icebreaker - Wikipedia
Peaking power plant - Wikipedia
Peaking power plants, also known as peaker plants, and occasionally just "peakers", are power plants that generally run only when there is a high demand, known as peak demand, for electricity.[1][2][3] Because they supply power only occasionally, the power supplied commands a much higher price per kilowatt hour than base load power. Peak load power plants are dispatched in combination with base load power plants, which supply a dependable and con...
Base load - Wikipedia
The baseload[1] (also base load) on a grid is the minimum level of demand on an electrical grid over a span of time, for example, one week. This demand can be met by unvarying power plants,[2] dispatchable generation,[3] or by a collection of smaller intermittent energy sources,[4] depending on which approach has the best mix of low cost, availability and high reliability in any particular market. The remainder of demand, varying throughout a da...
Energy density - Wikipedia
Energy density is the amount of energy stored in a given system or region of space per unit volume. Colloquially it may also be used for energy per unit mass, though the accurate term for this is specific energy. Often only the useful or extractable energy is measured, which is to say that inaccessible energy (such as rest mass energy) is ignored.[1] In cosmological and other general relativistic contexts, however, the energy densities considere...
Jet fuel - Wikipedia
Jet fuel, aviation turbine fuel (ATF), or avtur, is a type of aviation fuel designed for use in aircraft powered by gas-turbine engines. It is colorless to straw-colored in appearance. The most commonly used fuels for commercial aviation are Jet A and Jet A-1, which are produced to a standardized international specification. The only other jet fuel commonly used in civilian turbine-engine powered aviation is Jet B, which is used for its enhanced...
Barakah nuclear power plant - Wikipedia
The Barakah nuclear power plant (Arabic: محطة براكة للطاقة النووية) is the United Arab Emirates's first nuclear power station, the first nuclear power station in the Arabian Peninsula, and the first commercial nuclear power station in the Arab World. It is still under construction. It consists of four APR-1400 nuclear reactors with a total capacity of 5,600MW. [1] The site is in the Gharbiya region of Abu Dhabi, on the coastline between the Pers...
Aircraft Nuclear Propulsion - Wikipedia
The Aircraft Nuclear Propulsion (ANP) program and the preceding Nuclear Energy for the Propulsion of Aircraft (NEPA) project worked to develop a nuclear propulsion system for aircraft. The United States Army Air Forces initiated Project NEPA on May 28, 1946.[1] After funding of $10 million in 1947,[2] NEPA operated until May 1951, when the project was transferred to the joint Atomic Energy Commission (AEC)/USAF ANP.[3] The USAF pursued two differ...
Base load - Wikipedia
The baseload[1] (also base load) on a grid is the minimum level of demand on an electrical grid over a span of time, for example, one week. This demand can be met by unvarying power plants,[2] dispatchable generation,[3] or by a collection of smaller intermittent energy sources,[4] depending on which approach has the best mix of low cost, availability and high reliability in any particular market. The remainder of demand, varying throughout a da...
Environmental impact of shipping - Wikipedia
The environmental impact of shipping includes air pollution, water pollution, acoustic, and oil pollution.[1] Ships are responsible for more than 18 percent of some air pollutants.[2]
Thermal energy storage - Wikipedia
Korean mixed script - Wikipedia
Korean mixed script, known in Korean as hanja honyong (Korean: 한자혼용; Hanja: 漢字混用), Hanja-seokkeosseugi (漢字섞어쓰기, 한자섞어쓰기), 'Chinese character mixed usage,' or gukhanmun honyong (국한문혼용; 國漢文混用), 'national Sino-Korean mixed usage,' is a form of writing the Korean language that uses a mixture of the Korean alphabet or hangul (.mw-parser-output .script-Cprt{font-size:1.25em;font-family:"Segoe UI Historic","Noto Sans Cypriot",Code2001}.mw-parser-output ...
Whonix - Wikipedia
Whonix[2] (formerly TorBOX[3]) is a Debian GNU/Linux–based security-focused[4] Linux distribution.[5] It aims to provide privacy, security and anonymity on the internet. The operating system consists of two virtual machines, a "Workstation" and a Tor "Gateway", running Debian GNU/Linux. All communications are forced through the Tor network to accomplish this.[6][7][8][9][10]
Black hole (networking) - Wikipedia
In networking, black holes refer to places in the network where incoming or outgoing traffic is silently discarded (or "dropped"), without informing the source that the data did not reach its intended recipient.
Censorship - Wikipedia
Censorship is the suppression of speech, public communication, or other information, on the basis that such material is considered objectionable, harmful, sensitive, or "inconvenient."[2][3][4] Censorship can be conducted by governments,[5] private institutions, and corporations.
Forward secrecy - Wikipedia
In cryptography, forward secrecy (FS), also known as perfect forward secrecy (PFS), is a feature of specific key agreement protocols that gives assurances that session keys will not be compromised even if the private key of the server is compromised.[1] Forward secrecy protects past sessions against future compromises of secret keys.[2][3][3] By generating a unique session key for every session a user initiates, the compromise of a single session...
The Great Illusion - Wikipedia
The Great Illusion is a book by Norman Angell, first published in the United Kingdom in 1909 under the title Europe's Optical Illusion[1] and republished in 1910 and subsequently in various enlarged and revised editions under the title The Great Illusion.[2]
The Holocaust - Wikipedia
Évian Conference - Wikipedia
The Évian Conference was convened 6–15 July 1938, at Évian-les-Bains, France, to discuss the Jewish refugee problem and the plight of the increasing numbers of Jewish refugees fleeing persecution by Nazi Germany. It was convened at the initiative of United States President Franklin D. Roosevelt who perhaps hoped to obtain commitments from some of the invited nations to accept more refugees, although he took pains to avoid stating that objective e...
Kristallnacht - Wikipedia
Nazi ghettos - Wikipedia
Beginning with the invasion of Poland during World War II, the regime of Nazi Germany set up ghettos across occupied Europe in order to segregate and confine Jews, and sometimes Romani people, into small sections of towns and cities furthering their exploitation. In German documents, and signage at ghetto entrances, the Nazis usually referred to them as Jüdischer Wohnbezirk or Wohngebiet der Juden, both of which translate as the Jewish Quarter. T...
Final Solution - Wikipedia
American Indian boarding schools - Wikipedia
Whataboutism - Wikipedia
Adblock Plus - Wikipedia
NSE co-location scam - Wikipedia
The NSE co-location scam relates to the market manipulation at the National Stock Exchange of India, India's leading stock exchange. Allegedly select players obtained market price information ahead of the rest of the market, enabling them to front run the rest of the market,[1][2] possibly breaching the NSE's purpose of demutualisation exchange governance and its robust transparency-based mechanism.[3] The alleged connivance of insiders by riggin...
Videos
Killer Whales Working Together to Hunt Seals on Ice | BBC Earth (www.youtube.com)
Orcas knocking seals off waves was thought to be a myth when Producer/Director Kathryn Jeffs set out to film them in Antartica for BBC series Frozen Planet. ...
Killer Whale vs. Sea Lions | National Geographic (www.youtube.com)
Off the coast of Argentina, seasoned killer whales hunt sea lion pups. See all National Geographic videos: http://video.nationalgeographic.com/?source=4001 ➡...
John Cleese on Creativity In Management (www.youtube.com)
Browse more videos from the famous John Cleese training company: www.videoarts.com In this lecture-style presentation, John Cleese claims that creativity is ...
Steve Jobs Interview Product People should get promoted Over Sales Marketing People (www.youtube.com)
Steve Jobs Interview Product People should get promoted Over Sales & Marketing People Jobs on success: https://www.youtube.com/watch?v=yL7X3DTyS2Q
Mike Monteiro: F*ck You, Pay Me (www.youtube.com)
The most popular CreativeMornings talk of all time, Mike Monteiro gives us some valuable advice on how to get paid for the work that you do. Mike Monteiro at...
Mike Monteiro: F*ck You, Pay Me (www.youtube.com)
The most popular CreativeMornings talk of all time, Mike Monteiro gives us some valuable advice on how to get paid for the work that you do. Mike Monteiro at...
Amazon
Amazon.com: The New Confessions of an Economic Hit Man (9781785033858): John Perkins: Books
Amazon.com: The New Confessions of an Economic Hit Man (9781785033858): John Perkins: Books
News
Google Management Shuffle Points to Retreat From Alphabet Experiment (www.wsj.com)
Sundar Pichai’s appointment as CEO of Google parent Alphabet effectively shifts the focus back on the company’s advertising profit machine and away from its “moonshots” and other potential new businesses.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Opinion | Innovation and the Bell Labs Miracle (www.nytimes.com)
A study of Bell Labs offers a number of lessons about how our country’s technology companies — and our country’s longstanding innovative edge — actually came about.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Waymo is mapping L.A. in hopes of someday introducing driverless taxis (www.latimes.com)
The Google offshoot wants to be ready for California when the state is ready for driverless taxis.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
India's two-week ban cost TikTok 15 million users (www.cnn.com)
One of China's top social media platforms saw its rapid growth braked by being temporarily shut out of India's market of 600 million internet users.
Stop Obsessing Over Sleep—Your Brain Will Thank You (www.wired.com)
Worrying about sleep is perhaps the most counterproductive thing you can do, no matter how many gadgets try to tell you otherwise.
Bloomberg - Are you a robot? (www.bloomberg.com)
To continue, please click the box below to let us know you're not a robot.
Subreddits
Reddit Posts
Electrical Fuel Synthesis from Seawater: older than I'd thought
The intractable problem of biomass for fuels is HANNP / photosynthetic ceiling
Boeing's Biofuel "Breakthrough" -- Less than overwhelming
-🎄- 2019 Day 2 Solutions -🎄-
A Modest Proposal: Universal Online Media Payment Syndication
Uncategorized
The Lesson to Unlearn (paulgraham.com)
Do Things that Don't Scale (paulgraham.com)
BPF: A New Type of Software (www.brendangregg.com)
BPF: A New Type of Software
Bloom’s Taxonomy or the Art of Asking the Right Questions – TestDome Blog (blog.testdome.com)
Posted on November 3, 2018 by zeljkos
Inspector | HTML/CSS | TestDome (www.testdome.com)
Inspector programming interview question screens programmers for knowledge of: HTML/CSS.
Entrepreneurs Come From Families With Money (fortune.com)
It's one of the most important factors.
Gordian Knot | Wikiwand (www.wikiwand.com)
The Gordian Knot is a legend of Phrygian Gordium associated with Alexander the Great. It is often used as a metaphor for an intractable problem solved easily by finding an approach to the problem that renders the perceived constraints of the problem moot :
Great White Sharks Are Completely Terrified of Orcas (www.smithsonianmag.com)
A new study shows the apex predators will flee their hunting grounds and won't return for up to a year when killer whales pass by
Killer whales redistribute white shark foraging pressure on seals (www.nature.com)
Tonic Immobility (www.sharktrust.org)
Tonic immobility is a reflex that causes a temporary state of inactivity in an animal. Similar to hypnosis. It occurs in a variety of different species, including many sharks and rays...
Breaking Waves - Near Shore Effects - Surf Forecasting Help - Magicseaweed.com (magicseaweed.com)
Zoologger: The only raptor known to hunt in cooperative packs (www.newscientist.com)
Harris's hawks are unique in the raptor world in that they cooperate in groups when hunting, like wolves or humans. But why they do so is still a mystery
Framasoft ~ Change the world one byte at a time (framasoft.org)
Framasoft is a non-profit popular educational organization, a group of friends convinced that an emancipatory digital world is possible, convinced that it will arise through actual actions on real world and online with and for you!
Software Licensing for WordPress and Easy Digital Downloads (easydigitaldownloads.com)
WordPress Software Licensing for Easy Digital Downloads let you sell license keys that provide automatic plugin and theme upgrades to your customers.
Topics tagged hassio-repository (community.home-assistant.io)
Topics tagged hassio-repository
Imgur (imgur.com)
Yea AMP.
The Distribution of Users’ Computer Skills: Worse Than You Think (www.nngroup.com)
Across 33 rich countries, only 5% of the population has high computer-related abilities, and only a third of people can complete medium-complexity tasks.
Google's Waymo unseats Toyota as automated-driving patent king (asia.nikkei.com)
US company rides AI to cutting edge as data becomes center of auto competition
Patents Assigned to Waymo LLC - Justia Patents Search (patents.justia.com)
Justia - Patents - Patents and Patent Application Resources
Outline - Read & annotate without distractions (outline.com)
Outline is a free service for reading and annotating news articles. We remove the clutter so you can analyze and comment on the content.
Understanding “Deep Double Descent” - AI Alignment Forum (www.alignmentforum.org)
If you're not familiar with the double descent phenomenon, I think you should be. I consider double descent to be one of the most interesting and surprising recent results in analyzing and understanding modern machine learning. Today, Preetum et al. released a new paper, “Deep Double Descent [https://mltheory.org/deep.pdf],” which I think is a big further advancement in our understanding of this phenomenon. I'd highly recommend at least reading t...
If The Universe Is 13.8 Billion Years Old, How Can We See 46 Billion Light Years Away? (medium.com)
Distances in the expanding Universe don’t work like you’d expect. Unless, that is, you learn to think like a cosmologist.
Can The Universe Expand Faster Than The Speed Of Light? (www.forbes.com)
Special relativity limits all particles to the speed of light. But space itself, thanks to general relativity, can do better.
Brain tunes itself to criticality, maximizing information processing | The Source | Washington University in St. Louis (source.wustl.edu)
New research from Washington University in St. Louis confirms that the brain tunes itself to a point where it is as excitable as it can be without tipping into disorder, similar to a phase transition. The new research from Keith Hengen, assistant professor of biology in Arts & Sciences, is published Oct. 7 in the journal Neuron.
Cortical Circuit Dynamics Are Homeostatically Tuned to Criticality In Vivo (www.cell.com)
Ma et al. evaluate long-term computational dynamics in the visual cortex. Cortical circuits exhibit criticality, a regime that maximizes information processing. Using monocular deprivation, the authors demonstrate that criticality is consistent with a homeostatic set point of emergent dynamics.
The Hard Problem of Consciousness and the Free Energy Principle (www.ncbi.nlm.nih.gov)
This article applies the free energy principle to the hard problem of consciousness. After clarifying some philosophical issues concerning functionalism, it identifies the elemental form of consciousness as affect and locates its physiological mechanism ...
The Hard Problem of Consciousness and the Free Energy Principle (www.frontiersin.org)
This article applies the free energy principle to the hard problem of consciousness. After clarifying some philosophical issues concerning functionalism, it identifies the elemental form of consciousness as affect and locates its physiological mechanism (an extended form of homeostasis) in the upper brainstem. This mechanism is then formalized in terms of free energy minimization (in unpredicted contexts) where decreases and increases in expected...
The Bayesian Brain Hypothesis (towardsdatascience.com)
How our brain evolved to look into the future
Systemd Opened Security Hole In Linux, VPNs Could Be Compromised (linuxreviews.org)
CVE - Search Results (cve.mitre.org)
Common Vulnerabilities and Exposures (CVE®) is a list of entries — each containing an identification number, a description, and at least one public reference — for publicly known cybersecurity vulnerabilities. Assigned by CVE Numbering Authorities (CNAs) from around the world, use of CVE Entries ensures confidence among parties when used to discuss or share information about a unique software vulnerability, provides a baseline for tool evaluation...
oss-sec: Re: [CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections. (seclists.org)
oss-sec: [CVE-2019-14899] Inferring and hijacking VPN-tunneled TCP connections. (seclists.org)
9 new features in ES2019 (javascript.christmas)
This year the 10th version of the ECMAScript Language Specification was released, often referred to simply as ES2019. Let’s take a closer look at what new features we got and how we can put them to use.
RFC 7159 - The JavaScript Object Notation (JSON) Data Interchange Format (tools.ietf.org)
RFC 7493 - The I-JSON Message Format (tools.ietf.org)
BigInt (developer.mozilla.org)
BigInt is a built-in object that provides a way to represent whole numbers larger than 253 - 1, which is the largest number JavaScript can reliably represent with the Number primitive. BigInt can be used for arbitrarily large integers.
[Normative] Make Array.prototype.sort stable by mathiasbynens · Pull Request #1340 · tc39/ecma262 (github.com)
All major JavaScript engines now have a stable Array.prototype.sort implementation. Let’s update the spec accordingly. References: https://v8.dev/blog/array-sort microsoft/ChakraCore@c565b12 Modda...
Stable Array.prototype.sort · V8 (v8.dev)
Array.prototype.sort is now guaranteed to be stable.
90 - v8 - V8 JavaScript Engine - Monorail (bugs.chromium.org)
224128 - Array.sort isn't a stable sort (switch to MergeSort) (bugzilla.mozilla.org)
RESOLVED (nallen) in Core - JavaScript Engine. Last updated 2014-04-26.
AsyncFunction (developer.mozilla.org)
The AsyncFunction constructor creates a new async function object. In JavaScript, every asynchronous function is actually an AsyncFunction object.
SOSP19 File Systems Unfit as Distributed Storage Backends: Lessons from 10 Years of Ceph Evolution (muratbuffalo.blogspot.com)
This paper is by  Abutalib Aghayev (Carnegie Mellon University), Sage Weil (Red Hat Inc.), Michael Kuchnik (Carnegie Mellon University), Mar...
trees are harlequins, words are harlequins (nostalgebraist.tumblr.com)
[Attention conservation notice: machine learning framework shop talk / whining that will read like gibberish if you are lucky enough to have never used a thing called “tensorflow”] I’ve probably...
How to Find Consulting Clients (www.gkogan.co)
(Updated December 2017 to reflect how my strategy for finding new consulting clients has evolved in the past few years. Sorry if some parts feel disjointed.)
Doing Something Stupid (www.gkogan.co)
One of the many stupid things I did in my first year as a consultant was booking the cheapest everything and paying out-of-pocket when traveling for business.
Why software projects take longer than you think &ndash; a statistical model (erikbern.com)
Anyone who built software for a while knows that estimating how long something is going to take is hard. It’s hard to come up with an unbiased estimate of how long something will take, when fundamentally the work in itself is about solving something.
Here’s Why All Your Projects Are Always Late — and What to Do About It (Ep. 323 Rebroadcast) - Freakonomics (freakonomics.com)
Whether it’s a giant infrastructure plan or a humble kitchen renovation, it’ll inevitably take way too long and cost way too much. That’s because you suffer from “the planning fallacy.” (You also have an “optimism bias” and a bad case of overconfidence.) But don’t worry: we’ve got the solution.
Freelancember - 31 days of free gifts for freelancers | Product Hunt (www.producthunt.com)
Freelancember is a collection of 31 gifts for freelancers, one for each day. Templates, checklists, guides how to get better clients, raise your rates, etc. By Amy Hoy, creator of Noko Time Tracking, former freelancer and consultant to startups, Pepsi, Ford.
From Fledgling Founder to 7-Figure Deals with Stephanie Hurlburt of Binomial (www.indiehackers.com)
Stephanie Hurlburt (@sehurlburt) shares the story of how she went from being an employee to being half of a 2-person startup that sells software to gami...
Publication 17 (2018), Your Federal Income Tax | Internal Revenue Service (www.irs.gov)
Publication 17 - Introductory Material What's New Reminders Introduction
How to find clients ? (freelancefish.com)
Things we learnt about how to find clients online by speaking to 10 freelance professionals
FDA Approving Drugs at Breakneck Speed, Raising Alarm (www.msn.com)
The U.S. is approving new drugs so fast that companies are now preparing for a green light months in advance of the scheduled decision date, a pace that’s helping patients with rare or untreatable diseases but raising alarm among consumer advocates.
arXiv Machine Learning Classification Guide | arXiv.org blog (blogs.cornell.edu)
We are excited to see the adoption of arXiv in the rapidly growing field of machine learning. Given the interdisciplinary nature of machine learning, it is becoming a challenge for our volunteer moderators to keep up with verifying the appropriate categories for machine learning applications.
How much does it cost to build the reactor in a nuclear submarine, aircraft carrier, or ice cutter? - Quora (www.quora.com)
To clarify on Quora User&#039;s answer, that is post-development costs. Once all the work has been done to fully design a reactor, that is the pure manufacturing and fuelling cost of one. The initial design, testing and development of a reactor to rea...
Small nuclear power reactors - World Nuclear Association (www.world-nuclear.org)
There is revival of interest in small and simpler units for generating electricity from nuclear power, and for process heat. This interest in small nuclear power reactors is driven both by a desire to reduce capital costs and to provide power away from large grid systems.
Bill Gates's Experimental Nuclear Power Plant Halts Construction in China (www.popularmechanics.com)
Gates cites the Trump Administration's aggressive stance for having to pull out.
Years of Warnings, Then Death and Disaster: How the Navy Failed Its Sailors (features.propublica.org)
The Pentagon ignored years of warnings before the Navy’s deadliest crashes in decades.
50 Years of Victory - P -- Arctic Icebreaker Ship (www.polarcruises.com)
50 Years of Victory North Pole Cruises, Tours, Trip Reviews, Information and Vacation Prices from the Leader in Arctic Travel - Polar Cruises, your Polar Travel Specialists.
dredmorbius: search results - fischer-tropsch (old.reddit.com)
Progress, models, institutions, technology, limits -- Interactions thereof.
Explainer: The challenge of tackling aviation's non-CO2 emissions | Carbon Brief (www.carbonbrief.org)
Last October, the 191 member states of the ICAO agreed to a new deal to cap international aviation emissions using a carbon offset approach.
Feeling Overwhelmed by The News? Here Are Some Easy Things You Can Do Right Now to Help The Planet (www.sciencealert.com)
It's easy to feel hopeless about the future of our world, especially when the latest IPCC report has just come out, warning that we have barely a decade left to prevent the most catastrophic climate change scenario.
Data and Tools | NREL (www.nrel.gov)
NREL develops data sets, maps, models, and tools for the analysis of energy and energy-efficiency technologies.
Results for 'au:smil, vaclav' [WorldCat.org] (www.worldcat.org)
Search for 'au:smil, vaclav' at a library near you
Global Greenhouse Gas Emissions Data | US EPA (www.epa.gov)
Includes information on global greenhouse gas emissions trends, and by type of gas, by source, and by country.
The realist (web.archive.org)
Throughout his career from his home office near the University of Manitoba in Winnipeg, Canada, Vaclav Smil has profoundly influenced how a generation of scientists, policymakers, executives, and philanthropists think about energy in all forms. In particular, his focus has been on how societies have transitioned from relying on one source of energy, such as wood, to another, such as coal. Now, as the world faces the daunting challenge of trying t...
Everything You Need to Know About Agricultural Emissions (www.wri.org)
The [Greenhouse Gas Protocol](http://www.ghgprotocol.org/) launched [a new guidance](http://www.ghgprotocol.org/agriculture-guidance) this week to help agricultural companies measure and manage their greenhouse gas (GHG) emissions from crop and livestock production. But what exactly are agricultural emissions, and why is it important to manage them? Drawing on the latest research and data, here is everything you need to know about agriculture’s c...
Land Mammals (xkcd.com)
It goes completely against what most believe, but out of all major energy sources, nuclear is the safest (ourworldindata.org)
This blog post draws on data and research discussed in our entry on Energy Production and Changing Energy Sources.
Sixteen APL Amuse-Bouches - Vector (vector.org.uk)
The amuse-bouche is the best way … to express big ideas in small bites. – Jean-Georges Vongerichten, 2002 Such were the vagaries of what may have been the most powerful computer language ever hatched by a Canadian. Yes, I know that James Gosling, an alumnus of the University of Calgary, was the “father of Java.” …
Books/Beginners - J Wiki (code.jsoftware.com)
A 44-page introduction to J for newcomers to the language. The authors provide this without copyright and it is available for free distribution and it can be edited or altered without acknowledgement.
Notation as a Tool of Thought (www.jsoftware.com)
Dyalog19/SA3 (github.com)
Dyalog19 SA3 Workshop (Introduction to HTMLRenderer) Materials - Dyalog19/SA3
A Letter from Dijkstra on APL (www.jsoftware.com)
HackerOne breach lets outside hacker read customers’ private bug reports (arstechnica.com)
Company security analyst sent session cookie allowing account take-over.
HackerOne disclosed on HackerOne: Account takeover via leaked... (hackerone.com)
The Social Subsidy of Angel Investing (danco.substack.com)
Michael Seibel of YC posted a short video the other day about a topic that’s near and dear to my heart: Why Fundraising is Different in Silicon Valley. This is an interesting and important question. If you’re a startup founder looking for your first investment, the difference between fundraising in the Bay Area versus fundraising somewhere else isn’t a difference of degree. It’s just qualitatively a completely different exercise. Advice to founde...
Privacy Analysis of Tiktok’s App and Website (rufposten.de)
I did a detailed privacy check of the Tiktok app and website. Tiktok commits multiple breaches of law, trust, transparency and data protection.Here are all technical and legal details. You can
How can I block HTML Canvas fingerprinting in Firefox via permissions? (superuser.com)
I ran a Canvas fingerprinting browser test and noticed that I am susceptible to Canvas fingerprinting in Firefox 66. This was a surprise to me, as I had read several announcements declaring that Fi...
Zoom Page WE – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download Zoom Page WE for Firefox. Zoom web pages (either per-site or per-tab) using full-page zoom, text-only zoom and minimum font size. Fit-to-width zooming can be applied to pages automatically. Fit-to-window scaling can be applied to small images.
Canvas Fingerprint Defender – Get this Extension for 🦊 Firefox Android (en-US) (addons.mozilla.org)
Download Canvas Fingerprint Defender for Firefox. Defending against canvas fingerprinting by reporting a fake value.
AudioContext Fingerprint Defender – Get this Extension for 🦊 Firefox Android (en-US) (addons.mozilla.org)
Download AudioContext Fingerprint Defender for Firefox. Defending against AudioContext fingerprinting by reporting a fake value.
WebGL Fingerprint Defender – Get this Extension for 🦊 Firefox Android (en-US) (addons.mozilla.org)
Download WebGL Fingerprint Defender for Firefox. Defending against WebGL fingerprinting by reporting a fake value.
Font Fingerprint Defender – Get this Extension for 🦊 Firefox Android (en-US) (addons.mozilla.org)
Download Font Fingerprint Defender for Firefox. Defending against Font fingerprinting by reporting a fake value.
Audio Fingerprinting using the AudioContext API (iq.opengenus.org)
Audio fingerprinting takes advantage of device performance specs to build up an identifying fingerprint of a user. It uses the AudioContext API for this
puppeteer-extra-plugin-stealth (www.npmjs.com)
Stealth mode: Applies various techniques to make detection of headless puppeteer harder.
Lucb1e.com :: Cookieless Cookies (lucb1e.com)
Canvas Fingerprinting (browserleaks.com)
Browser Fingerprinting with no user agent identifiers, only through the HTML5 Canvas element. The method is based on the fact that the same canvas-code can produce different pixels on a different web browser, depending on the system on which it was executed.
Web Audio API (developer.mozilla.org)
The Web Audio API provides a powerful and versatile system for controlling audio on the Web, allowing developers to choose audio sources, add effects to audio, create audio visualizations, apply spatial effects (such as panning) and much more.
Canvas Fingerprint Defender – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download Canvas Fingerprint Defender for Firefox. Defending against canvas fingerprinting by reporting a fake value.
WebGL Fingerprint Defender – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download WebGL Fingerprint Defender for Firefox. Defending against WebGL fingerprinting by reporting a fake value.
AudioContext Fingerprint Defender – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download AudioContext Fingerprint Defender for Firefox. Defending against AudioContext fingerprinting by reporting a fake value.
Font Fingerprint Defender – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download Font Fingerprint Defender for Firefox. Defending against Font fingerprinting by reporting a fake value.
Firefox Multi-Account Containers – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download Firefox Multi-Account Containers for Firefox. Firefox Multi-Account Containers lets you keep parts of your online life separated into color-coded tabs that preserve your privacy. Cookies are separated by container, allowing you to use the web with multiple identities or accounts simultaneously.
CanvasBlocker – Get this Extension for 🦊 Firefox (en-US) (addons.mozilla.org)
Download CanvasBlocker for Firefox. Alters some JS APIs to prevent fingerprinting.
W3C DOM Compatibility - CSS Object Model View (www.quirksmode.org)
How Apps on Android Share Data with Facebook - Report (privacyinternational.org)
Facebook routinely tracks users, non-users and logged-out users outside its platform through Facebook Business Tools. App developers share data with Facebook through the Facebook Software Development Kit (SDK), a set of software development tools that help developers build apps for a specific operating system. Using the free and open source software tool called "mitmproxy", an interactive HTTPS proxy, Privacy International has analyzed the data t...
HN Search powered by Algolia (hn.algolia.com)
Hacker News Search, millions articles and comments at your fingertips.
Army examines TikTok security concerns after Schumer's data warning (www.reuters.com)
The U.S. Army is undertaking a security assessment of China-owned social media p...
Privacy Shield (www.privacyshield.gov)
Bellevue, Washington
Open Source | TikTok (www.tiktok.com)
10 TikTok Statistics That You Need to Know in 2019 [Infographic] (www.oberlo.com)
TikTok is the fastest growing social media app on the market. But what is this app that youngsters just can’t get enough of? Learn all that here, as well as the top 10 statistics for TikTok in 2019. Read more.
TikTok tracks users with facial recognition (futurism.com)
A new search feature scans for people based on their face.
How Attackers Used Look-Alike Domains to Steal $1 Million From a Chinese VC (www.darkreading.com)
Money meant to fund an Israeli startup wound up directly deposited to the scammers.
The “Great Cannon” has been deployed again (cybersecurity.att.com)
Summary The Great Cannon is a distributed denial of service tool (“DDoS”) that operates by injecting malicious Javascript into pages served from behind the Great Firewall. These scripts, potentially served to millions of users across the internet, hijack the users’ connections to make multiple requests against the targeted site. These requests consume all the resources of the targeted site, making it unavailable: Figure 1: Simplified diagram ...
页é¢ä¸åå¨_ç¾åº¦æç´¢ (www.baidu.com)
温馨æ示ï¼
Add ability to uncloak CNAME records · gorhill/uBlock@3a564c1 (github.com)
Related issue: - https://github.com/uBlockOrigin/uBlock-issues/issues/780 New webext permission added: `dns`, which purpose is to allow an extension to fetch the DNS record of specific hostnames, ...
3rd Party Tools (plaintextoffenders.com)
We love our community. Not only do they supply us with submissions, but also approach offenders, spread the word and create tools. This page is dedicated to the tools our community has created around...
The Top 3 Web Browsers In China Leave Users Vulnerable, Report Says (www.fastcompany.com)
Browsers from Baidu, Alibaba, and Tencent found to transmit user data with low or no encryption.
Don’t Be Fodder for China’s ‘Great Cannon’ — Krebs on Security (krebsonsecurity.com)
China has been actively diverting unencrypted Web traffic destined for its top online search service — Baidu.com — so that some visitors from outside of the country were unwittingly enlisted in a novel and unsettling series of denial-of-service attacks aimed at sidelining sites that distribute anti-censorship tools, according to research released this week.
Same-origin policy (developer.mozilla.org)
The same-origin policy is a critical security mechanism that restricts how a document or script loaded from one origin can interact with a resource from another origin.
Use of lasers from Chinese fishing vessels on the rise (www.abc.net.au)
Hand-held lasers are increasingly being used against Australian Defence Force assets, with military insiders blaming small Chinese maritime militia vessels for the dangerous tactic.
If Goods Don't Cross Borders... | Nicholas Snow (fee.org)
Hitler's Willing Business Partners (www.theatlantic.com)
A shocking account of IBM's complicity with the Nazis is a reminder that people bear moral responsibility for the actions of the corporation&mdasha; point that critics have failed to grasp.
8 American Companies That Worked with the Nazis During World War II | Phactual.com (www.phactual.com)
Although there were sanctions and restrictions against working with Germany during World War II, especially when America entered the war in 1941, there were some American companies that profited off both sides of World War II. Here are 8 examples.
Top 10 American Companies that Aided the Nazis (www.toptenz.net)
War profiteers are such a loathsome notion. The idea that while people are struggling for causes while others use the confused nature of military logistics to make dishonest money is appalling. The thought that these companies supported the most deadly regime in the world and went on to become fixtures in our daily lives is loathsome, even well over half a century later, yet it remains a bitter reality. 10. Coca-Cola Coca-Cola was a major presenc...
We mustn't fall for The Great Illusion again (www.telegraph.co.uk)
With China sabre-rattling over the disputed Senkaku islands, the lessons of history are going unheeded as free trade comes under threat around the world
Opinion | Jews Are Speaking Out Against China’s Ethnic Cleansing Of Muslims. Will It Help? (forward.com)
Writer-at-Large Jane Eisner argues that when large, powerful countries intern minority groups, its our responsibility as Jews to do something.
Definition of en masse | Dictionary.com (www.dictionary.com)
Definition of en masse from Dictionary.com, the world’s leading online source for English definitions, pronunciations, word origins, idioms, Word of the Day, and more.
China's Great Cannon (citizenlab.ca)
This post describes our analysis of an attack tool that we identify as separate from, but co-located with, the Great Firewall of China.
Internet Sharing License (stallman.org)
For current political commentary, see the daily political notes.
Outline - Read & annotate without distractions (outline.com)
Outline is a free service for reading and annotating news articles. We remove the clutter so you can analyze and comment on the content.
Attention Required! (archive.is)
Drugs that quell brain inflammation reverse dementia (news.berkeley.edu)
Leaky filtration system in brain contributes to cognitive dysfunction in aging as well as disease
Chronic Inflammation - StatPearls - NCBI Bookshelf (www.ncbi.nlm.nih.gov)
Inflammation is part of the body's defense mechanism. It is the process by which the immune system recognizes and removes harmful stimuli and begins the healing process. There are generally two types of inflammation: acute and chronic inflammation.[1][2][3]
Chronic inflammation: a failure of resolution? (onlinelibrary.wiley.com)
Inflammation has evolved as a protective response to insult or injury, it's a primordial response that eliminates or neutralises foreign organisms or material, the resolution of inflammation encompas...
Natural resolution of inflammation (onlinelibrary.wiley.com)
Inflammation is a protective response essential for maintaining human health and for fighting disease. As an active innate immune reaction to challenge, inflammation gives rise to clinical cardinal s...
The inflammation theory of disease: The growing realization that chronic inflammation is crucial in many diseases opens new avenues for treatment: EMBO reports: Vol 13, No 11 (www.embopress.org)
EMBO Press is an editorially independent publishing platform for the development of EMBO scientific publications.
The molecular mechanisms of chronic inflammation development (www.frontiersin.org)
Inflammation is critical for the development of many complex diseases and disorders including autoimmune diseases, metabolic syndrome, neurodegenative diseases, cancers, and cardiovascular diseases. Inflammation comes in two types: chronic inflammation, which can be defined as a dysregulated form of inflammation, and acute inflammation, which can defined as a regulated form. Because of its special role in the aforementioned diseases, establishing...
Low-grade inflammation, diet composition and health: current research evidence and its translation | British Journal of Nutrition | Cambridge Core (www.cambridge.org)
Low-grade inflammation, diet composition and health: current research evidence and its translation - Volume 114 Issue 7 - Anne M. Minihane, Sophie Vinoy, Wendy R. Russell, Athanasia Baka, Helen M. Roche, Kieran M. Tuohy, Jessica L. Teeling, Ellen E. Blaak, Michael Fenech, David Vauzour, Harry J. McArdle, Bas H. A. Kremer, Luc Sterkman, Katerina Vafeiadou, Massimo Massi Benedetti, Christine M. Williams, Philip C. Calder
Matthew Walker's "Why We Sleep" Is Riddled with Scientific and Factual Errors - Alexey Guzey (guzey.com)
See discussion of this essay on the Forum, Hacker News, Marginal Revolution, Andrew Gelman’s Blog, /r/slatestarcodex. Update 2019-12-02: added Appendix: where did Walker get his PhD? Note: I link to a bunch of paywalled studies in this essay. Please do not use sci-hub to access them for free and do not use this trick (a) to easily redirect papers to sci-hub. Introduction Matthew Walker (a) is a professor of neuroscience and psychology at the Uni...
r/slatestarcodex - Matthew Walker's "Why We Sleep" Is Riddled with Scientific and Factual Errors (www.reddit.com)
134 votes and 124 comments so far on Reddit
Intermittent metabolic switching, neuroplasticity and brain health (www.nature.com)
Eating patterns in modern societies often preclude the metabolic switch from utilization of glucose to ketones as a cellular energy source. In this Review, Mattson and colleagues discuss how intermittent metabolic switching impacts brain function and vulnerability to injury and disease.
Anti-Oxidant and Anti-Inflammatory Activity of Ketogenic Diet: New Perspectives for Neuroprotection in Alzheimer’s Disease (www.mdpi.com)
The ketogenic diet, originally developed for the treatment of epilepsy in non-responder children, is spreading to be used in the treatment of many diseases, including Alzheimer&rsquo;s disease. The main activity of the ketogenic diet has been related to improved mitochondrial function and decreased oxidative stress. B-Hydroxybutyrate, the most studied ketone body, has been shown to reduce the production of reactive oxygen species (ROS), improving...
Redirecting (linkinghub.elsevier.com)
Systematic Review of the Use of Ketones in the Management of Acute and Chronic Neurological Disorders | Insight Medical Publishing (www.jneuro.com)
Systematic Review of the Use of Ketones in the Management of Acute and Chronic Neurological Disorders, <p>Hayden White, Karthik Venkatesh and Bala Venkates
Short-term fasting induces profound neuronal autophagy (www.tandfonline.com)
(2010). Short-term fasting induces profound neuronal autophagy. Autophagy: Vol. 6, No. 6, pp. 702-710.
Beclin1‐driven autophagy modulates the inflammatory response of microglia via NLRP3 | The EMBO Journal (www.embopress.org)
EMBO Press is an editorially independent publishing platform for the development of EMBO scientific publications.
Redirecting (linkinghub.elsevier.com)
Beta-hydroxybutyrate, an endogenic NLRP3 inflammasome inhibitor, attenuates stress-induced behavioral and inflammatory responses (www.nature.com)
The ketone metabolite β-hydroxybutyrate blocks NLRP3 inflammasome–mediated inflammatory disease (www.nature.com)
Ketone bodies are elevated in response to fasting, a low-carbohydrate ketogenic diet or high-intensity exercise. Vishwa Deep Dixit and colleagues report that one metabolite, β-hydroxybutyrate, inhibits the NLRP3 inflammasome. In vivo, β-hydroxybutyrate is anti-inflammatory and suppresses NLRP3-mediated inflammatory disease.
NLRP3 inflammasome suppression improves longevity and prevents cardiac aging in male mice (onlinelibrary.wiley.com)
In this study, we have shown the potential role of the NLRP3 inhibition to modulate several anti‐aging mechanisms during cardiac aging. This work highlights the importance of examining the therapeuti...
NLRP3 inflammasome: A likely target for the treatment of allergic diseases (onlinelibrary.wiley.com)
Allergic diseases, such as asthma, rhinitis, dermatitis, conjunctivitis, and anaphylaxis, have recently become a global public health concern. According to previous studies, the NLRP3 inflammasome is...
Suppression of NLRP3 Inflammasome Activation Ameliorates Chronic Kidney Disease-Induced Cardiac Fibrosis and Diastolic Dysfunction (www.nature.com)
Redirecting (linkinghub.elsevier.com)
What’s new in Spark 2.4! (medium.com)
Spark 2.4 was released recently and there are couple of new interesting and promising features in it. In this release, there were some new…
Using dask with PyTorch (train a model) · Issue #2581 · dask/distributed (github.com)
I find Dask very useful, and would like to use it to accelerate some pytorch models I am working on. A function to be accelerated would be the forward() function. I started doing some tests, but I ...
Cloud Deployments — Dask 2.8.1 documentation (docs.dask.org)
There are a variety of ways to deploy Dask on cloud providers. Cloud providers provide managed services, like Kubernetes, Yarn, or custom APIs with which Dask can connect easily. You may want to consider the following options:
Speed Breeding to Fast-track Crop Improvement in Africa | AAS Open Research Blog (blog.aasopenresearch.org)
Accelerating crop growth could help improve concerns over global food security. Researchers have created a new tool that could improve the growth rate of crops, shortening the crop generation time and accelerating breeding. Dr Oluwaseyi discusses this new approach, called 'Speed Breeding', and explains how this could benefit a growing population.
Making an API endpoint 50x faster (bilbof.com)
This is an explanation of how I made an API endpoint respond to requests around 50 times faster. This is a story from a production system serving millions of users, some of whom want to receive email notifications.
PostgreSQL: Documentation: 9.3: CREATE MATERIALIZED VIEW (www.postgresql.org)
CREATE MATERIALIZED VIEW defines a materialized view of a query. The query is executed and used to populate the view at the time the command is issued (unless WITH NO DATA is used) and may be refreshed later using REFRESH MATERIALIZED VIEW.
Space Invaders in C (blog.loadzero.com)
Space Invaders in C
Space Invaders Code (computerarcheology.com)
Hardware Info
Apple II Screen Typeface (www.fontzip.com)
download Apple II Screen Typeface Font with Creative Commons (by) Attribution by Edric Studio
Space Invaders (computerarcheology.com)
Mikael Agren patched the original ROMs to add a high-score table. Check out his project blog and demo movie.
mamedev/mame (github.com)
MAME. Contribute to mamedev/mame development by creating an account on GitHub.
An Emulator Writer's HOWTO for Static Binary Translation (www.gtoal.com)
Attention Required! (archive.is)
PICO-8 Fantasy Console (www.lexaloffle.com)
PICO-8 is a fantasy console for making, sharing and playing tiny games and other computer programs. New carts available every day!
Can I use... Support tables for HTML5, CSS3, etc (caniuse.com)
The meaning behind $(X^TX)^{-1}$ (math.stackexchange.com)
In linear algebra, we learn that the inverse of a matrix "undoes" the linear transformation. What exactly is the meaning of the inverse of $(X^TX)^{-1}$? $X^TX$ we know as being a square matrix ...
KCG Holdings, Inc. Class A (KCG) Stock Price, Quote, History & News - Yahoo Finance (finance.yahoo.com)
Find the latest KCG Holdings, Inc. Class A (KCG) stock quote, history, news and other vital information to help you with your stock trading and investing.
Any Monkey Can Beat The Market (www.forbes.com)
Give a monkey enough darts and they’ll beat the market. So says a draft article by Research Affiliates highlighting the simulated results of 100 monkeys throwing darts at the stock pages in a newspaper. The average monkey outperformed the index by an average of 1.7 percent per year since 1964. [...]