Undoubtedly you have all seen photographs of people on TV and online who have been blurred to hide faces.
Storing Your Data Securely: A PrimerEverybody agrees that it's important to keep our customers' data safe and secure from attackers. A breach would entail not only possible legal ramifications, but also a loss of reputation and of user trust.
What is memory safety?I am in the process of putting together a MOOC on software security, which goes live in October. At the moment I’m finishing up material on buffer overflows, format string attacks, and other sorts of vulnerabilities in C.
The Face Recognition Algorithm That Finally Outperforms Humans — The Physics arXiv Blog — MediumEverybody has had the experience of not recognising someone they know—changes in pose, illumination and expression all make the task tricky. So it’s not surprising that computer vision systems have similar problems.
Notification Styles Inspiration Simple ideas & effects for website notificationsClick on the button to show the notification:
JavaScript: The Good PartsGoogle Tech Talks Web Exponents presented by Doug Crockford February 27, 2009 blog post: http://google-code-updates.blogspot.com/2009/03/doug-crockford-javas...
CPU Cache Flushing FallacyEven from highly experienced technologists I often hear talk about how certain operations cause a CPU cache to "flush". This seems to be illustrating a very common fallacy about how CPU caches work, and how the cache sub-system interacts with the execution cores.
How do you explain an OS kernel to a layperson? + an old text about The Matrix as an Operating SystemEarlier this year I was a guest at a gathering of people who were mostly involved with social sciences and politics and a topic soon arised in which I had to explain some of the things I work with.
Writing High Performing CodeOver the years I’ve asked myself the question numerous times, “How do you produce code that performs well both from a business and IT perspective”. Unfortunately I keep stumbling across businesses who are in the process of re-writing their core business applications…. and I wonder why.
liuxinyu95/AlgoXY · GitHubYou can clone with HTTPS or Subversion.
This Read-It-Later-list is just that, bookmarks of stuff I intend to read or have read. I do not necessarily agree with opinions or statements in the bookmarked articles.
This list is compiled from my Pocket list.