Newest Stories by tf
Home
Recent
Comments
Search
Login
21
How the judge on Oracle v. Google taught himself to code
android
java
law
person
theverge.com
via
tf
10 months ago
|
cached
|
9 comments
9
5
OpenAI: Competitive Self-Play
ai
blog.openai.com
via
tf
10 months ago
|
cached
|
no comments
0
1
Visionary Mathematician Vladimir Voevodsky Dies at 51
math
person
quantamagazine.org
via
tf
10 months ago
|
cached
|
no comments
0
4
Python Release Python 3.6.3
python
release
python.org
via
tf
10 months ago
|
cached
|
no comments
0
3
Response to some comments on "Abandon Statistical Significance"
math
science
andrewgelman.com
via
tf
10 months ago
|
cached
|
no comments
0
3
Abandon Statistical Significance
math
science
andrewgelman.com
via
tf
11 months ago
|
cached
|
no comments
0
2
Unity Machine Learning Agents
☶
ai
games
blogs.unity3d.com
via
tf
11 months ago
|
cached
|
no comments
0
4
Deep Learning and Reinforcement Learning Summer School, Montreal 2017
video
ai
videolectures.net
via
tf
12 months ago
|
cached
|
no comments
0
3
HyperTools: A python toolbox for visualizing and manipulating high-dimensional data
python
visualization
hypertools.readthedocs.io
via
tf
1 year ago
|
cached
|
no comments
0
1
Does Computational Complexity Restrict Artificial Intelligence (AI) and Machine Learning?
video
compsci
youtube.com
via
tf
1 year ago
|
cached
|
1 comment
1
1
N.S.A. Halts Collection of Americans’ Emails About Foreign Targets
law
privacy
nytimes.com
via
tf
1 year ago
|
cached
|
no comments
0
1
Introduction to programming with dependent types in Scala
compsci
math
scala
stepik.org
via
tf
1 year ago
|
cached
|
no comments
0
2
Bayesian Statistics without Frequentist Language
video
math
programming
science
youtube.com
via
tf
1 year ago
|
cached
|
no comments
0
11
How to Quantify (and Fight) Gerrymandering
compsci
law
math
quantamagazine.org
via
tf
1 year ago
|
cached
|
3 comments
3
2
Chrome and Firefox Phishing Attack Uses Domains Identical to Known Safe Sites
browsers
security
wordfence.com
via
tf
1 year ago
|
cached
|
1 comment
1
6
Your Government's Hacking Tools Are Not Safe
law
privacy
security
motherboard.vice.com
via
tf
1 year ago
|
cached
|
1 comment
1
1
Typical Sets and the Curse of Dimensionality
math
programming
mc-stan.org
via
tf
1 year ago
|
cached
|
no comments
0
2
Michael Kearns, Machine Learning and Social Norms
video
compsci
privacy
youtube.com
via
tf
1 year ago
|
cached
|
no comments
0
3
Building Scala Projects: Maven vs. SBT
java
scala
hammerlab.org
via
tf
1 year ago
|
cached
|
no comments
0
4
How Uber Uses Behavioral Science Tricks to Push Its Drivers’ Buttons
science
visualization
nytimes.com
via
tf
1 year ago
|
cached
|
2 comments
2
2
Clojure/West 2017
video
java
lisp
youtube.com
via
tf
1 year ago
|
cached
|
no comments
0
2
Five Ways Cybersecurity Will Suffer If Congress Repeals the FCC Privacy Rules
law
privacy
security
eff.org
via
tf
1 year ago
|
cached
|
no comments
0
3
VPNs are not the solution to a policy problem
law
privacy
asininetech.com
via
tf
1 year ago
|
cached
|
1 comment
1
7
Call for encryption ban pits UK politician against industry and colleagues
law
privacy
theguardian.com
via
tf
1 year ago
|
cached
|
no comments
0
1
Software used to predict crime can now be scoured for bias
☶
law
programming
qz.com
via
tf
1 year ago
|
cached
|
no comments
0
Page 2 >>