Research has shown the deep harm excessive social media use can do to young brains and bodies. The EU Commission must tackle the root cause The post Briefing: protecting children and young people from addictive design appeared first on People vs. Big Tech.| People vs. Big Tech
Security experts have identified a new kind of cyber attack that hides instructions inside ordinary pictures. These commands do not appear in the full image but become visible only when the photo is automatically resized by artificial intelligence (AI) systems.| CySecurity News - Latest Information Security and Hacking Incidents
Artist Jingna Zhang predicts that “60-80% of the artist workforce will lose their jobs in the next 2-5 years. Not to prompters—just to company bottom lines.” As with businesses and workplaces, the visual arts are going through a major shake-up from generative AI. It seems like a safe bet that artists will lose work to AI – a recurring consequence of new technologies – but job security is not all that is at stake. The introduction of AI into the visual arts cheapens the unique human...| Converge Media
More workplaces are beginning to build AI into their organizational structures. This will make people spend less time working with other people, and more time with an AI assistant. This way of working will not make people thrive. What kind of work are people meant to do? The post Generative AI Will Make Work More Efficient But Less Human. What Kind of Work Will Be Worth Doing? appeared first on Converge Media.| Converge Media
Having "solved" a bunch of these divide & conquer problems, I'm the first to admit to having being lulled into a false sense of security. At first glance, the problem of this post seemed deceptively simple and consequently I struggled with it, sort of "hand-waving", not really engaging my brain and getting more and more frustrated how the dang thing wouldn't yield to my experience! I think the moral of the story is math doesn't care about your previous successes and so don't let your past pr...| Shayne Fletcher
Bucket sort assumes input generated by a random process that distributes elements uniformly over the interval [0, 1).| Shayne Fletcher
This article assumes familiarity with Dijkstra's shortest path algorithm. For a refresher, see [1]. The code assumes open Core is in effect and is online here.| Shayne Fletcher
Transpose If we are to represent a row of a matrix as a list of numbers, then a matrix can naturally be re...| blog.shaynefletcher.org
Learn how to turn employees into confident LinkedIn advocates with Sarah Clay’s proven strategies for training, engagement, and advocacy success.| DSMN8
When “Robert Johnson” on an invoice doesn’t match “Bob Johnson” on the payment, your reconciliation process breaks down. These simple name mismatches force costly manu…| Take It Personel-ly
Meet the data structure that refuses trade-offs: identical footprint to Bloom, fewer false positives, and deletion that works without overhead. Grab all three!| MALTSEV.SPACE
The Gaza war is also a testing ground for increasingly automated systems. A German-Israeli ‘Cyber and Security Pact’ could ensure the transfer of technologies. Gaza has long served Israel as a testing ground for disruptive military technologies. At the turn of the millennium, the army tested its first armed drones there. Following this came land […]| Matthias Monroy
Recently, I wrote an article about my journey in learning about robots.txt and its implications on the data rights in regards to what I write in my blog. I was confident that I wanted to ban all the crawlers from my website. Turned out there was an unintended consequence that I did not account for. My LinkedIn posts became broken Ever since I changed my robots.txt file, I started seeing that my LinkedIn posts no longer had the preview of the article available. I was not sure what the issue wa...| Evgenii Pendragon
Linear Search, also known as Sequential Search, operates by traversing through the dataset, element by element until the desired item is found or the algorithm...| Stack Abuse
Comparing circular buffer vs cascading bucket approaches for time-windowed data averages in Elixir for embedded systems| Lucas Sifoni
In school this week, the idea of finding palindromes in Python came up, as a homework assignment in a class I took last semester. A friend asked me for some guidance in how to do this in Python, so I showed him my "simple" solution: #!/usr/bin/env python3 from …| Brendan Long
Getting to the right conversation in Slack should be easy. And it should be fast. Like, really fast. When we first released the Quick Switcher in early 2014, we aimed to provide a way to quickly and easily switch to any channel or direct message you wanted. It was keyboard accessible (just press ⌘+k on…| Engineering at Slack
ICCL has made a submission to the UN Committee on the Elimination of Discrimination against Women (CEDAW).| Irish Council for Civil Liberties
For decades my colleague, Guy Blelloch, and I have promoted a grand synthesis of the two “theories” of computer science, combinatorial theory and logical theory. It is only a small exaggeration to say that these two schools of thought work in isolation. The combinatorial theorists concern themselves with efficiency, based on hypothetical translations of high-level algorithms […]| Existential Type
People vs Big Tech urges the EU to build a people-first digital future or risk falling further behind On June 3rd, the European Parliament’s industry The post European Parliament lays groundwork for a democratic and sovereign digital infrastructure appeared first on People vs. Big Tech.| People vs. Big Tech
Opening up the content curation marketplace will create opportunities for new entrants, spur innovation and increase consumer choice| People vs. Big Tech
An optimization for implementing Ringsteady Subsetting in linear time.| flowblok’s blog
HyperLogLog estimates unique counts efficiently with minimal memory, ideal for large datasets in web analytics and database management| Sagyam's Blog
At Datadog, we regularly hold hackathons, a dedicated time when we can explore new ideas and tinker with new technologies. During one of these hackathons, I found myself working side by side with a colleague who holds a Data Mining & Algorithms PhD. Driven by the desire to do something both cool and complex, we decided on building an online anomaly detection method for streaming logs. We both work in the Cloud SIEM team, a team that provides a security tool to analyse logs in a stateful manne...| Adri’s Blog
Media manipulation, deliberately shaping information to influence public perception, has profoundly transformed the digital age. No longer confined to traditional news broadcasts, it now permeates every corner of the online world. With social media, those who strategically maneuver their online activity now hold the power to shape public perception. While the democratization of information can uplift a more diverse platform of voices, it has also opened the floodgates to misinformation and ma...| Northeastern University Political Review
Update: The code was modified with further optimizations. In particular, instead of checking the trie per every DFS call, we update the trie pointer along the DFS call so that the trie does not have to be queried repeatedly.| Jake Tae
Bug motion planning algorithms implementation on Webots Simulation with Pioneer robot (Bug0, bug1 and bug2)| Can Güney Aksakalli
Complexity of an algorithm is determined as consumed resources like time and space. It depends not only on the number of input elements but also on their ord...| aksakalli.github.io
Discover how Custom SGE can transform your website’s search experience and user engagement.| CustomGPT
By memorizing a simple implementation of iterative tree traversal we simplify a large number of programming interview questions.| alexbowe.com
How I recovered a Bitcoin passphrase by performing a Breadth-First search on typos of increasing Damerau-Levenshtein distances from an initial guess.| alexbowe.com
What are the “values” of AI? How do they manifest in conversation? How consistent are they? Can they be manipulated? A study by the Societal Impacts group at Anthropic (maker of Claude) tried to find out. Claude and other models are trained to observe certain rules—human values and etiquette: At Anthropic, we’ve attempted to shape the values of our AI model, Claude, to help keep it aligned with human preferences, make it less likely to engage in dangerous behaviors, and generally make...| Big Medium - Full Feed
A study by MIT Media Lab finds that heavy use of chatbots travels with loneliness, emotional dependence, and other negative social impacts. Overall, higher daily usage–across all modalities and conversation types–correlated with higher loneliness, dependence, and problematic use, and lower socialization. Exploratory analyses revealed that those with stronger emotional attachment tendencies and higher trust in the AI chatbot tended to experience greater loneliness and emotional dependence,...| Big Medium - Full Feed
Josh Clark and Veronika Kindred explore Sentient Design—and the AI opportunities for designers to create new, radically adaptive experiences.| Big Medium
While working at Resonai, I wrote a piece of code that performs Hierarchical Clustering, in collaboration with David Lehavi. In addition to various optimizations I won't get into, we applied a nice heuristic that allowed a considerable improvement in the program's memory footprint, as well as the running time. The more formal name we gave it was Spatially Sensitive Hierarchical Clustering (SSHC), but ended up referring to it as Hierarchical Hierarchical Clustering which is funnier, and bett...| Garden Path Trajectory
Looking at bias and variance from another perspective..| Good Audience - Medium
Recently I was playing a little with prime numbers and I needed a prime number generator for which I wrote a sieve of Eratosthenes in Java. Since I wanted all primes up to 10^9, I became a little impatient about the time taken to generate those primes. So I started to optimize it incrementally. Also […]| UnlinkedList
Peek behind the curtain to see how we created the radically adaptive interface for Sentient Scenes. It’s a playful exploration of the serious possibilities of Sentient Design and AI-mediated experiences.| Big Medium
Turning imperative algorithms to tail-recursive functions isn’t necessarily obvious. In this article (and video) I’m showing you the trick you need, and in doing so, we’ll discover the Zen of Functional Programming.| Alexandru Nedelcu - Blog
The other day, while wasting time reading reddit, I stumbled upon a blogpost mentioning S3 FIFO, a method claiming to outperform LRU (Least Recently Used) in terms of cache miss ratio. Notable companies like RedPandas, Rising Wave, and Cloudflare have already implemented it in various capacities, so this piqued my interest. Caches are a pretty darn interesting and at Datadog, we rely heavily on them in several services, so I knew I had to put S3 FIFO to the test, or at least, make sure I unde...| Adri’s Blog
AI influences our decisions and beliefs—and we even don’t notice—by taking advantage of our innate responses to novelty, interactivity, and social validation.| DR. PAM | MEDIA PSYCHOLOGIST
Two decades ago when I first started working at Avid, one of the tasks I was assigned was porting our product (a consumer video editor - think iMovie before it was cool) from the PCI-card-based video capture we first shipped with to digital video vie 1394/Firewire.| The Hacks of Life
One thing that's been bothering me about ravioli memory is the possibility that it doesn't interact very well with threading. Trying to have multiple threads manipulating a single ravioli heap is a non-starter: whenever one thread needs to allocate or deallocate a raviolo (a very common operation) all other threads would need to be suspended and (in the deallocation case) have any pointers in their registers potentially adjusted.| Reenigne blog
Here’s the situation: a small, fully-remote software team works on a service (let’s say Grist), and to run it, they need a secret key...| The Mill
Karim Lakhani is a professor at Harvard Business School who specializes in workplace technology and particularly AI. He’s done pioneering work in identifying how digital transformation has remade the world of business, and he’s the co-author of the 2020 book Competing in the Age of AI . Customers will expect AI-enhanced experiences with companies, he says, so business leaders must experiment, create sandboxes, run internal bootcamps, and develop AI use cases not just for technology worker...| Harvard Business Review
Written statement on the Need to enforce the Digital Services Act to protect democracy on social media platforms including against foreign interference and biased algorithms Rampant disinformation, vitriolic hate speech and blatant foreign interference: that is the gloomy reality we encounter when scrolling through social media these days. And some in this The post Written statement: Need to enforce the Digital Services Act to protect democracy on social media platforms appeared first on Marc...| Marc Angel
Damon Beres in the Atlantic Intelligence newsletter: “Although it was not the first app to offer an endless feed, and it was certainly not the first to use algorithms to better understand and target its users, TikTok put these ingredients together like nothing else before it.” The app was so effective—so sticky—that every meaningful competitor tried to copy its formula. Now TikTok-like feeds have been integrated into Instagram, Facebook, Snapchat, YouTube, X, even LinkedIn. Today, AI ...| Big Medium - Full Feed
I've been subscribed to Interview Cake for years, and today they had a really interesting question: Given a list of n + 1 integers in the range 1...n, find one of the duplicates (there is guaranteed to be at least one) in O(n) time and O(1) additional space. The answer is really interesting, and I recommend trying it, but I don't think it makes sense to care about additional space rather than total space, and I still think using a set is the best solution in practice.| Brendan Long
There's a common programming interview question that asks you to find the single non-duplicated value in a list of duplicated integers. This can be done in O(n) time and O(1) space by XOR'ing the values, and doing so is almost always the wrong answer. A better solution when you can afford to do it is to use a hash table to count occurrences.| Brendan Long
To make your data faster to lookup, you can either store it in an order that makes it easier to search, or add one or more indexes. For practical work, you can let your file system do this for you, or use a pre-built database (either relational or not). I'll describe from the lowest-level to highest level so you can understand what I'm suggesting, but my real-world answer is that I would store most kinds of data in a relational database like PostgreSQL and put indexes on any column that I wan...| Brendan Long
What is a Stack? A Stack is an abstract data type in programming which has a variety of uses. The basic premise of a Stack is that you can add a new value to the end (pushing), and you can remove the last value off of the end. This is referred to…| Leigh Halliday's RSS Feed
Today we're going to explore a Ruby implementation of the Weighted Quick Union & Quick Find algorithm. This is an algorithm used to find if there is a connection between two nodes. Imagine a complicated maze and ask the question of whether you can…| Leigh Halliday's RSS Feed
Intro I recently wrote an article on Recursion in Ruby , and this is meant to be its Elixir counterpart. It will provide a way to compare solving the same problems in both languages and a chance to talk about some of their differences. Heads & Tails…| Leigh Halliday's RSS Feed
This article is the counterpart to one I wrote on Recursion in Elixir . What is recursion? Recursion in computer science is a method where the solution to a problem depends on solutions to smaller instances of the same problem (as opposed to…| Leigh Halliday's RSS Feed
Intro... learning Elixir This is my first post in the new Elixir category I've set up on my site. I'm new to Elixir and functional programming in general, aside from a Scala course I've done on Coursera. Ruby is the language I'm currently most…| Leigh Halliday's RSS Feed
The challenge Write a program that outputs all possibilities to put + or - or nothing between the numbers 1, 2, ..., 9 (in this order) such that the result is always 100. For example: 1 + 2 + 34 – 5 + 67 – 8 + 9 = 100. Apparently every Software…| Leigh Halliday's RSS Feed
Ducera Partners' Tom Thurston describes how the firm is using AI to reinvent investment banking and VC.| Digital Finance
Australian researchers have developed an AI algorithm called SpermSearch that can accurately identify sperm in severely infertile men in a fraction of the time it takes scientists, providing hope to men who want to father biological children.| New Atlas
Discover how Java memoization can optimize your algorithms by caching expensive function call results. Learn this technique for interviews!| Java Challengers
Looking at bias and variance from another perspective..| Medium
Have you been struggling to get results from your social media channels? Look no further! Join us as we deep-dive into social media success.| Digital Agency Based In London & New York | Burst Digital
Mark Cuban criticizes Elon Musk's free speech rhetoric on X, calling it a "power play." Read this article to know more about this.| TechStory
This is a practical application of the algorithm design principles from the “How To Think About Algorithms” book. I introduced a bit of theory for the principles in the previous blog post: The book that made me stop worrying about algorithms.| Andrei’s Personal Blog
While reading through the Medium newsletters I receive, I noticed a theme about people describing books that influenced them, and realized I have such a book to share as well.| Andrei’s Personal Blog
You've probably heard music composed by a computer algorithm, though you may not realize it. Artificial intelligence researchers have made huge gains in computational – or algorithmic – creativity over the past decade or two, and in music especially these advances are now filtering through to the…| New Atlas
The median filter is a non-liner smoothing (blurring) filter where an output pixel is the median value of its neighborhood in the input image. It can be generalized to a percentile filter, where the median is the 50th percentile. Noisy “trui” image filtered with a percentile filter, from left …| Cris’ Image Analysis Blog
How I check if locations are connected in my hex-based puzzle game| Musing Mortoray
Note: this post contains spoilers for one of the days of Advent of Code 2021.| siraben’s musings
The famous Lenna image, of Playboy model Lena Forsén, can’t be used in any more research papers published on IEEE, the organization announced this week. They’re following on the tails of the Nature journal, which banned the Lena image back in 2018. Michel P. Frank revealed on X an email he received from IEEE’s Technical […]| TechTheLead
How to implement scrolling text using the RPLCD library for the Raspberry Pi.| blog.dbrgn.ch
In Python you can trade time-complexity for an increase in the memory usage of a Python script. For example, the factorial function is defined recursively f(5) = 5! = 5 * 4 * 3 * 2 * 1, where 1 is the base-case. But, what happens if we remember what 4! is equal to, by definition 5! is simply 5 * memo{4}| Lewis Codes
Parallel programming frameworks like C++ Threading Building Blocks (TBB) and C# Task Parallel Library (TPL) are good at handling large work items using multi-core processors. Both provide mechanism…| Algorithm Performance
Modified Equinoctial Elements| degenerateconic.com
Gooding Universal Elements| degenerateconic.com
Atmosphere Models| degenerateconic.com
Great Circle| degenerateconic.com
Discover techniques for efficient coding on how to rotate Java arrays. Perfect your skills with these easy-to-implement algorithms.| Examples Java Code Geeks
Some of the engineering challenges we encountered while developing our vector drawing tool| canva.dev
Recently, I have had the opportunity to work on some APIs that were implementing rate limiting for users. The idea we started with was to implement a limit algorithm that reset after a period of time, e.g., one hour. I researched rate limiting a bit more, and found another …| cat /dev/brain
In my previous post on shuffling, I glossed over something very important. The very first thing that came to mind for a shuffle algorithm is this: for (int i = 0; i < cards.Length; i++) { int n = rand.Next(cards.Length); Swap(ref cards[i], ref cards[n]); } It’s a| Coding Horror
I can almost hear Star Fox saying "All-Range Mode!" … More Unity 3D – Flight Controls, Just The Way I Like It!| Keith M. Programming
Greebles! It's not an off-brand muppet, it's actually detailing for big starships! Lemme show you how! … More Link: Procedural Greeble Tutorial – Linden Reid| Keith M. Programming
Vehicle-like mechanics for Unity’s NavMesh system.| Keith M. Programming
By Shen Huang Do you really understand Big O? If so, then this will refresh your understanding before an interview. If not, don’t worry — come and join us for some endeavors in computer science. If you have taken some algorithm related courses, you’v...| freeCodeCamp.org
Recently, I’d noticed a bunch of cases where MongoDB would be far, far slower to build indexes on secondaries than on the primary. An index build would finish in a few hours on a primary, but then take a day or more to build once the indexing operation replicated to a secondary. Eventually I got annoyed enough to decide to debug. I threw perf and PMP at a build that was running on a secondary, and they mostly just informed me that the build was spending most of its time comparing BSON objec...| nelhage debugs shit
When Stripe ran our CTF 3.0, I wrote most of level 3, which was a full-text search challenge inspired in part by my own livegrep. I wrote a naïve implementation, which just looped over the files, read them into memory, and used java.lang.String.contains to check if each file contained the “needle”, and we released that implementation as the baseline implementation that contestants needed to improve on. I also wrote a solution that used a simple trigram index, which was the solution you h...| nelhage debugs shit
An IIR filter deconvolving a blurred 2D image in four “recurrent” sequential passes. This post is a follow-up to my post on deconvolution/deblurring of the images. In my previous blog p…| Bart Wronski
Me being “progressively stippled.” :) Introduction I recently read the “Gaussian Blue Noise” paper by Ahmed et al. and was very impressed by the quality of their results and the rigor o…| Bart Wronski
I'm very pleased to post a draft of my forthcoming essay with Professor Woodrow Hartzog (BU Law), Kafka in the Age of AI and the Futility of Privacy as| TeachPrivacy
How to find whether a number is a power of 2 or not in Java?There can be many possible solutions to this problem, but probably the most efficient remains to be the one which uses bit-level manipulation wisely.We'll talk about only that solution here and since it involves bit-level manipulation of binary sequences, so should you require a refresh, first go through this article - 2's complement, 1'| Geek Explains: Java, J2EE, Oracle, Puzzles, and Problem Solving!
Here, I compile a set of videos that complement a course on computational complexity for cognitive scientists that I co-teach with Nils Donselaar. We use the textbook Cognition and Intractability, …| Iris van Rooij
Rediscovery of Indexable Skiplists in the solution of the Running Median problem.| Deep Thoughts by Raymond Hettinger
Undo and redo have been a staple operation of text editors probably since the first typo was ever made, yet there has not been a lot of innovation around refining the idea of what undo and redo could be. Let’s explore what I mean…| invoke::thought()
Text editors can be an interesting challenge to program. The types of problems that text editors need to solve can range from trivial to mind-bogglingly difficult. Recently, I have been on something of a spiritual journey to rework some internal data structures in an editor I have been building, specifically the most fundamental data structure to any text editor: the text.Table of Contents Resources Why? In The Beginning Investigation My Own Piece Tree fredbuf ConclusionResourcesBefore we div...| invoke::thought()
I wrote previously about my approach to technical interviews. I think there’s a lot of value in catering your interviews towards the needs of the job. I once interviewed a candidate who choke…| Jack Reichert
Algorithmic Complexity in Python| www.integralist.co.uk
This afternoon, Matt Locke tweeted the following problem from his nine-year-old daughter’s maths homework:| Bosker Blog
About two years ago I wrote about a category-theoretic treatment of collaborative text editing. That post is unique in the history of Bosker Blog in having been cited – twice so far that I kno…| Bosker Blog
Don’t lock your bicycle with a combination lock. Someone will steal it: I learnt this the hard way. It’s quite easy to open a combination lock by feel, without knowing the combination. Try it: with…| Bosker Blog
Binary search is one of the first algorithms that people learn. The idea is wonderfully simple: Yet it’s so easy to get the details wrong. In fact, nearly all binary searches are broken.| The Mindful Programmer