adv

各位朋友大家好,欢迎您进入solidot新版网站,在使用过程中有任何问题或建议,请与很忙的管理员联系。

信息流

  • Uganda Bans VPNs to Prevent Users from Dodging Its New Social Media Tax

    发表评论 查看更多 翻译此文

    收起

  • Using Machine Learning to Understand Page Templates

    发表评论 查看更多 翻译此文

    收起

  • GraalSqueak: A Fast Smalltalk Bytecode Interpreter [pdf]

    发表评论 查看更多 翻译此文

    收起

  • The Rogue World of New York’s Major Trash Haulers

    发表评论 查看更多 翻译此文

    收起

  • Copyright cases in the United States are dominated by two companies -- Malibu Media and Strike 3 Holdings -- that are generally unknown to the public at large. This year alone, they have filed more than 1,700 lawsuits, which as TorrentFreak reports, sets a new file-sharing lawsuit record in the most recent quarter.

    发表评论 查看更多 翻译此文

    收起

  • Youtube-dl: Command-line program to download videos

    发表评论 查看更多 翻译此文

    收起

  • The venerable Linux boot menu has made its appearance at boot time since the days when LILO was the standard boot loader, through the days of GRUB, and onward to today's GRUB 2 and others. It is sometimes configured out by distributions as something that will potentially confuse less-technical users, but it has been a mainstay of Fedora for many releases. A recent proposal to hide the menu, starting in Fedora 29, has met a mixed reaction, but those who are not in favor are also those most able to revert to the existing behavior.

    发表评论 查看更多 翻译此文

    收起

  • The LWN.net Weekly Edition for July 5, 2018 is available.

    发表评论 查看更多 翻译此文

    收起

  •  

    Where Are You?

    07-05 THE NEW YORKER 33

    Joyce Carol Oates’s flash-fiction story “Where Are You?”

    发表评论 查看更多 翻译此文

    收起

  •  

    Why I Don't Love Gödel, Escher, Bach

    07-05 Hacker News 36

    Why I Don't Love Gödel, Escher, Bach

    发表评论 查看更多 翻译此文

    收起

  • Many Pfizer rivals vowed to limit such price hikes and Trump recently suggested cuts.

    发表评论 查看更多 翻译此文

    收起

  • Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.

    发表评论 查看更多 翻译此文

    收起

  • A command spread through Slack and Discord channels to cryptocurrency users is a trap.

    发表评论 查看更多 翻译此文

    收起

  •  

    Running JRuby on the Graal JIT

    07-04 Hacker News 56

    Running JRuby on the Graal JIT

    发表评论 查看更多 翻译此文

    收起

  • SUSE, the open source software company, has been sold to a Swedish private equity firm. EQT Partners will acquire SUSE from current owners Micro Focus in a deal worth $2.5 billion USD and is expected to close in early 2019. EQT is described as "a development-focused investor with extensive experience in the software industry".

    发表评论 查看更多 翻译此文

    收起

  • Microsoft's Edge browser is the default browser in Windows 10. It's updated twice a year alongside new Windows 10 feature updates, but some people think that cadence of updating is too slow. Google Chrome and Firefox are updated very often with new features and changes, but Edge is stuck being updated alongside Windows 10. Of course it should. A browser should be updated way more often than twice a year. Especially earlier in its existence, Edge had several annoying bugs that were probably fixed rather quickly, but then took months and months to actually reach me, at which point I had already moved back to Chrome. Edge is a lot less buggy these days, and I'm back to using it full time, but I still want it updated more often.

    发表评论 查看更多 翻译此文

    收起

  • Instead of uploading a trailer of "Khali the Killer," an upcoming move from Sony Pictures Entertainment, the conglomerate accidentally uploaded the entire movie on Google's video platform, according to users. TorrentFreak: When we started writing this article the movie had around 8,000 views. Just a few paragraphs later that had swelled to almost 11,000. However, while news may be traveling quickly, those numbers probably won't reach epic levels anytime soon. As usual, the comments on YouTube are absolutely brutal. The section includes gems such as "Trailer gave the whole plot away. Pass," "It's just the trailer the whole movie will be 4 hours," and the rather blunt "Someone's getting the sackï."

    发表评论 查看更多 翻译此文

    收起

  • The video has since been taken down, though it stayed up for hours.

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader shares a report: South Korea has lowered its maximum working hours from 68 hours a week to 52 hours. The legislation, which went into effect Sunday, received overwhelming support in the National Assembly in an effort to limit the time employees spend on the job. South Korea has the third highest number of hours worked of 37 countries tracked by the Organisation for Economic Co-operation and Development, with the average person in South Korea working about 2,024 hours in 2017, or approximately 38.9 hours a week.

    发表评论 查看更多 翻译此文

    收起

  • Kasmir Hill, reporting for Gizmodo: It's the smartphone conspiracy theory that just won't go away: Many, many people are convinced that their phones are listening to their conversations to target them with ads. [...] Some computer science academics at Northeastern University had heard enough people talking about this technological myth that they decided to do a rigorous study to tackle it. For the last year, Elleen Pan, Jingjing Ren, Martina Lindorfer, Christo Wilson, and David Choffnes ran an experiment involving more than 17,000 of the most popular apps on Android to find out whether any of them were secretly using the phone's mic to capture audio. The apps included those belonging to Facebook, as well as over 8,000 apps that send information to Facebook. Sorry, conspiracy theorists: They found no evidence of an app unexpectedly activating the microphone or sending audio out when not prompted to do so. Like good scientists, they refuse to say that their study definitively proves that

    发表评论 查看更多 翻译此文

    收起

  • Researchers from Ghent University were able to detect climate change impacts on trees in Belgium by analyzing nearly four decades of archive footage from the Tour of Flanders. The findings were published in the journal Methods in Ecology and Evolution. Phys.Org reports: Focusing on trees and shrubs growing around recognizable climbs and other 'landmarks' along the route of this major annual road cycling race in Belgium, the team looked at video footage from 1981 to 2016 obtained by Flemish broadcaster VRT. They visually estimated how many leaves and flowers were present on the day of the course (usually in early April) and linked their scores to climate data. The ecologists found that the trees had advanced the timing of leafing and flowering in response to recent temperature changes. Before 1990, almost no trees had grown leaves at the time of the spring race. After that year, more and more trees visible in the television footage -- in particular magnolia, hawthorn, hornbeam and birch

    发表评论 查看更多 翻译此文

    收起

  • The Lobby (YC W18) Is Looking for a Founding VP of Engineering in NYC

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader shares a report: Over the last year, gadget and software makers have developed ways for users to better manage their relationship with technology. They make it easier to ignore notifications or quiet all but the most important stuff. But even the latest mobile OS updates don't address the entire problem. In this always-on era, we are assumed to be near our phones all the time, and there is no good way to signal to the world when we are not. There is no way to proclaim, "I'm not available, I won't see your notification, and I won't care until next Sunday." The solution isn't complicated. In fact, it has been around since the '90s. It is called an "away" message, and we need it now more than ever. Most people's first experience with an away message came on AOL Instant Messenger. Those were the days before mobile, when you could only be online while sitting at the computer -- probably a wheezing beige colossus running Windows 95. Rather than log off every time you had

    发表评论 查看更多 翻译此文

    收起

  •  

    The Surprising Power of Virtue Labeling

    07-04 Hacker News 56

    The Surprising Power of Virtue Labeling

    发表评论 查看更多 翻译此文

    收起

  • Repair of multiple partially failed cache nodes is studied in a distributed wireless content caching system, where $r$ out of a total of $n$ cache nodes lose part of their cached data. Broadcast repair of failed cache contents at the network edge is studied; that is, the surviving cache nodes transmit broadcast messages to the failed ones, which are then used, together with the surviving data in their local cache memories, to recover the lost content. The trade-off between the storage capacity and the repair bandwidth is derived. It is shown that utilizing the broadcast nature of the wireless medium and the surviving cache contents at partially failed nodes significantly reduces the required repair bandwidth per node.

    发表评论 查看更多 翻译此文

    收起

  • The government of Uganda is taxing social media users at a rate of 5 cents per day, which does not include the usual data fees. "The tax on users of sites such as Facebook was first proposed by long-time leader Yoweri Museveni, who complained of online gossip in a March letter that urged finance minister to raise money 'to cope with the consequences,'" reports Time. From the report: Service providers, including regional telecommunications giant MTN, said in a joint statement Sunday that starting July 1 the levy would be charged on "Over The Top services," including access to websites such as Instagram, Twitter and LinkedIn. The tax will be deducted by service providers that will then pay to the government revenue service. Amnesty International urged Ugandan authorities to scrap the tax, calling it "a clear attempt to undermine the right to freedom of expression" in the East African country. From the social media levy the government hopes to collect about Shs400 billion (about $100 mill

    发表评论 查看更多 翻译此文

    收起

  • Alan Burdick on the Round of 16 match between Sweden and Switzerland in the 2018 World Cup and on the history of shorts-pulling in soccer.

    发表评论 查看更多 翻译此文

    收起

  •  

    Zuck’s Empire of Oily Rags

    07-04 Hacker News 51

    Zuck’s Empire of Oily Rags

    发表评论 查看更多 翻译此文

    收起

  • Richard Brody writes on the director Boots Riley’s d´ébut feature film, “Sorry to Bother You,” which stars Lakeith Stanfield, Tessa Thompson, Danny Glover, and Armie Hammer.

    发表评论 查看更多 翻译此文

    收起

  • Annual "speedrunning" drive for charity includes Mario races, hacked GameCubes.

    发表评论 查看更多 翻译此文

    收起

  • The relativistic discriminator: a key element missing from standard GAN

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a report from CNET: Drivers in England and Wales now have a direct line to police for ratting on their fellow motorists, thanks to a new national dash cam database. The National Dash Cam Safety Portal, run by UK dashcam manufacturer Nextbase, lets drivers upload footage from their dashcam to a single database and send it directly to police, the BBC reports. Drivers can choose their region of England or Wales and send footage of accidents or illegal behavior on the road directly to local police, as well as sending a witness statement that can then be used in court.

    发表评论 查看更多 翻译此文

    收起

  • A. T. McWilliams writes on Antwon Rose, a seventeen-year-old black high-school senior who was shot dead by a police officer last month, and whose poetry was read at his memorial.

    发表评论 查看更多 翻译此文

    收起

  • Why standard Indonesian is not spoken throughout Indonesia

    发表评论 查看更多 翻译此文

    收起

  •  

    [$] Python and the web

    07-04 LWN 46

    Dan Callahan is a developer advocate at Mozilla and no stranger to PyCon (we covered a talk of his at PyCon 2013). He was also the champion at Mozilla for the grant that helped revamp the Python Package Index (PyPI). At PyCon 2018, he gave a keynote talk [YouTube video] that focused on platforms of various sorts—and where Python fits into the platforms of the future.

    发表评论 查看更多 翻译此文

    收起

  • Approximate message passing algorithm enjoyed considerable attention in the last decade. In this paper we introduce a variant of the AMP algorithm that takes into account glassy nature of the system under consideration. We coin this algorithm as the approximate survey propagation (ASP) and derive it for a class of low-rank matrix estimation problems. We derive the state evolution for the ASP algorithm and prove that it reproduces the one-step replica symmetry breaking (1RSB) fixed-point equations, well-known in physics of disordered systems. Our derivation thus gives a concrete algorithmic meaning to the 1RSB equations that is of independent interest. We characterize the performance of ASP in terms of convergence and mean-squared error as a function of the free Parisi parameter s. We conclude that when there is a model mismatch between the true generative model and the inference model, the performance of AMP rapidly degrades both in terms of MSE and of convergence, while ASP converges

    发表评论 查看更多 翻译此文

    收起

  • It is known that a group shift on a polycyclic group is necessarily of finite type. We show that, for trivial reasons, if a group does not satisfy the maximal condition on subgroups, then it admits non-SFT abelian group shifts. In particular, we show that if group is elementarily amenable or satisfies the Tits alternative, then it is virtually polycyclic if and only if all its group shifts are of finite type. Our theorems are minor elaborations of results of Schmidt and Osin.

    发表评论 查看更多 翻译此文

    收起

  • A team of former FBI investigators claims to have identified D.B. Cooper

    发表评论 查看更多 翻译此文

    收起

  • AdamW and Super-convergence is now the fastest way to train neural nets

    发表评论 查看更多 翻译此文

    收起

  • A new back button, recent apps changes, system icons, and more.

    发表评论 查看更多 翻译此文

    收起

  • Jon Lee Anderson on the leftist candidate Andrés Manuel López Obrador’s sweeping victory in Mexico’s Presidential election.

    发表评论 查看更多 翻译此文

    收起

  • Honda is teaching its robots to take longer and faster steps to recover from shoves by transitioning to a running gait, which is exactly what humans do if we need to

    发表评论 查看更多 翻译此文

    收起

  • An artificial intelligence system called BioMind has managed to defeated a team comprised of 15 of China's top doctors by a margin of two to one. The Next Web reports the details: When diagnosing brain tumors, BioMind was correct 87 percent of the time, compared to 66 percent by the medical professionals. The AI also only took 15 minutes to diagnose the 225 cases, while doctors took 30. In regards to predicting brain hematoma expansion, BioMind was victorious again, as it was correct in 83 percent of cases, with humans managing only 63 percent. Researchers trained the AI by feeding it thousands upon thousands of images from Beijing Tiantan Hospital's archives. This has made it as good at diagnosing neurological diseases as senior doctors, as it has a 90 percent accuracy rate. Further reading available via Xinhua.

    发表评论 查看更多 翻译此文

    收起

  • Greg LeRoy and Maryann Feldman from The Guardian discuss some alternative strategies for cities that want large tech companies like Amazon and Apple to invest locally but don't want to offer huge subsidies. They advise against using "old economy" incentives for "new economy" firms, which are more susceptible to disruption, because it can be costly and counterproductive. Unfortunately, many politicians continue to mismatch incentives "especially because some tech companies have become very aggressive about demanding big tax breaks," reports The Guardian. From the report: Here are two proven alternative strategies. The first could be called "back to basics." A regional government inventories existing small- and medium-sized firms, the backbone of many local communities. Typically family-owned and located in micropolitan and rural areas, these firms are often neglected by policymakers and shortchanged by incentive programs. A regional government asks: which industry sectors are we already

    发表评论 查看更多 翻译此文

    收起

  • Cities don't have to offer huge subsidies to companies like Apple and Amazon

    发表评论 查看更多 翻译此文

    收起

  • Michael Zhang, reporting for PetaPixel: A Virginia federal court has made a decision that photographers won't be happy to hear: the court ruled that finding a photo on the Internet and then using it without permission on a commercial website can be considered fair use. The copyright battle started when photographer Russell Brammer found one of his long-exposure photos of a Washington, D.C. neighborhood cropped and used by the website for the Northern Virginia Film Festival on a page of "things to do" in the D.C. area. Brammer then sent a cease and desist letter to Violent Hues Productions, the company behind the festival, and it responded by immediately taking the photo down. Brammer then sued the company for copyright infringement, and it responded by claiming fair use. In his ruling, the judge said, "Violent Hues' use of the photograph was transformative in function and purpose. While Brammer's purpose in capturing and publishing the photograph was promotional and expressive, Violent

    发表评论 查看更多 翻译此文

    收起

  • Court Rules Copying Photos Found on Internet Is Fair Use

    发表评论 查看更多 翻译此文

    收起

  • Including deals on laptops, computer speakers, Amazon services, games, and more.

    发表评论 查看更多 翻译此文

    收起

  • Repair of multiple partially failed cache nodes is studied in a distributed wireless content caching system, where $r$ out of a total of $n$ cache nodes lose part of their cached data. Broadcast repair of failed cache contents at the network edge is studied; that is, the surviving cache nodes transmit broadcast messages to the failed ones, which are then used, together with the surviving data in their local cache memories, to recover the lost content. The trade-off between the storage capacity and the repair bandwidth is derived. It is shown that utilizing the broadcast nature of the wireless medium and the surviving cache contents at partially failed nodes significantly reduces the required repair bandwidth per node.

    发表评论 查看更多 翻译此文

    收起

  • Repair of multiple partially failed cache nodes is studied in a distributed wireless content caching system, where $r$ out of a total of $n$ cache nodes lose part of their cached data. Broadcast repair of failed cache contents at the network edge is studied; that is, the surviving cache nodes transmit broadcast messages to the failed ones, which are then used, together with the surviving data in their local cache memories, to recover the lost content. The trade-off between the storage capacity and the repair bandwidth is derived. It is shown that utilizing the broadcast nature of the wireless medium and the surviving cache contents at partially failed nodes significantly reduces the required repair bandwidth per node.

    发表评论 查看更多 翻译此文

    收起

  • Governments are using migrants' smartphones to deport them. From a report: Across the continent, migrants are being confronted by a booming mobile forensics industry that specialises in extracting a smartphone's messages, location history, and even WhatsApp data. That information can potentially be turned against the phone owners themselves. In 2017 both Germany and Denmark expanded laws that enabled immigration officials to extract data from asylum seekers' phones. Similar legislation has been proposed in Belgium and Austria, while the UK and Norway have been searching asylum seekers' devices for years. Following right-wing gains across the EU, beleaguered governments are scrambling to bring immigration numbers down. Tackling fraudulent asylum applications seems like an easy way to do that. As European leaders met in Brussels last week to thrash out a new, tougher framework to manage migration -- which nevertheless seems insufficient to placate Angela Merkel's critics in Germany -- im

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a report from TechCrunch: Anthony Levandowski, the former Google engineer and serial entrepreneur who was at the center of a trade secrets lawsuit between Uber and Waymo, is back. And he is connected to an autonomous trucking company that is still in stealth mode, TechCrunch has learned. The company, called Kache.ai (pronounced like cache), has kept a low profile since paperwork registering it as a corporation was first filed with the California Secretary of State nearly seven months ago. And at first glance, there's no indication that Levandowski is even tied to the company. Little is known about Kache.ai. The word "Kache" in Chinese means truck, which could signal a connection to China. Although TechCrunch was not able to independently verify if Kache.ai has any outside partners or backers yet. [T]he Kache.ai website said the company was working on "the next generation of autonomous vehicle technology for the commercial trucking industry." It appears the co

    发表评论 查看更多 翻译此文

    收起

  • Documents imply a low power Intel processor rather than an ARM chip.

    发表评论 查看更多 翻译此文

    收起

  • Fixing bufferbloat on your home network with OpenBSD 6.2 or newer

    发表评论 查看更多 翻译此文

    收起

  • India has asked Facebook-owned WhatsApp messenger to take steps to prevent the circulation of false texts and provocative content that have led to a series of lynchings and mob beatings across the country in the past few months. From a report: With more than 200 million users in India, WhatsApp's biggest market in the world, false news and videos circulating on the messaging app have become a new headache for social media giant Facebook, already grappling with a privacy scandal. So far this year, false messages about child abductors on WhatsApp have helped to trigger mass beatings of more than a dozen people in India -- at least three of whom have died. In addition, five people were beaten to death by a mob on Sunday in a fresh incident of lynching in India's western state of Maharashtra on suspicions that they were child abductors. "Deep disapproval of such developments has been conveyed to the senior management of WhatsApp and they have been advised that necessary remedial measures s

    发表评论 查看更多 翻译此文

    收起

  • JINQ – A minimalistic library for Java inspired from .NET LINQ

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader quotes a report from The Outline: As if they weren't already doing the absolute most, the die-hard fans of the rap group Insane Clown Posse have become accidental heroes for people concerned about facial recognition tech: According to Twitter user @tahkion, a computer science blogger for WonderHowTo, Juggalo makeup outmatches the machine learning algorithms that govern facial recognition technology. In a series of follow-up tweets, @tahkion explained that facial recognition works by pinpointing the areas of contrast on a human face -- for instance, where a nose is located, or where the chin becomes the neck. As it happens, juggalo makeup often involves applying black paint below the mouth, but above the chin. That makes facial recognition vulnerable to misidentifying the placement of the jaw. Face-painting styles like "corpse" makeup also obscure the face. However, they don't create enough contrast to effectively confuse most facial recognition systems. Dramatic sty

    发表评论 查看更多 翻译此文

    收起

  • Latest Text of EU Copyright Directive Shows It's Even Worse Than Expected

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader shares a report: Malware authors are frantically trying to weaponize a new infection vector that was revealed at the start of June. The trick relies on using Windows Settings (.SettingContent-ms) shortcut files in order to achieve code execution on Windows 10 PCs. Ever since SpecterOps security researcher Matt Nelson published his research on the matter three weeks ago, malware authors have been playing around with proof-of-concept code in attempts of crafting an exploit that can deploy weaponized malware on a victim's system. With each passing day, more and more exploits are being uploaded on VirusTotal.

    发表评论 查看更多 翻译此文

    收起

  • A Chinese court temporarily banned Micron Technology chip sales, cutting the U.S. company off from the world's largest semiconductor market. The news comes from Taiwanese rival United Microelectronics Corporation (UMC). Bloomberg reports: In a patent ruling in favor of UMC, the Fuzhou Intermediate Peopleâ(TM)s Court of the Peopleâ(TM)s Republic of China issued a preliminary injunction stopping Micron from selling 26 products, including dynamic random access memory and Nand flash memory-related products, UMC said in a statement Tuesday. Micron said it hasnâ(TM)t been served with the injunction and wonâ(TM)t comment until it does. The case is part of a broader dispute between the two companies centering on accusations that UMC acted as a conduit for the theft of Micronâ(TM)s designs in an attempt to help China grow its domestic chip industry and replace imports that rival oil in total value. A Chinese antitrust regulator is already investigating Micron and its Ko

    发表评论 查看更多 翻译此文

    收起

  • Micron Chip Sales Banned in China on Patent Case

    发表评论 查看更多 翻译此文

    收起

  • After a lot of news recently about Microsoft's rumoured Andromeda device, Mary Jo Foley poured cold water on my hope by publishing a story based on her usually well-informed Microsoft sources that Andromeda's future is hanging by a thread, that the software is far, far from ready, and that Andromeda could very well be cancelled. In response, Neowin's Rich Woods published a passionate plea for Microsoft to make Andromeda a reality. Microsoft talks about innovating and exploring new device types and form factors a lot. It clearly doesn't want to miss out on the next big thing, in the same way that it missed out on phones and it's now missing out on smart speakers. But the only way to do that is to actually experiment with new things. It's also important to iterate on these things until they actually work, taking feedback from customers and implementing it into a better product. Few new products are an immediate success, but they can be with some work. Andromeda is one of th

    发表评论 查看更多 翻译此文

    收起

  •  

    Monks Who Play Punk (2007)

    07-04 Hacker News 55

    Monks Who Play Punk (2007)

    发表评论 查看更多 翻译此文

    收起

  • Dear-GitHub: Host Github by itself as an open source project

    发表评论 查看更多 翻译此文

    收起

  • Vindu Goel, writing for The New York Times: Perched high in the Himalayas, near India's border with China, the tiny town of Leh sometimes seems as if it has been left behind by modern technology. Internet and cellphone service is spotty, the two roads to the outside world are snowed in every winter, and Buddhist monasteries compete with military outposts for prime mountaintop locations. But early each morning, the convenience of the digital age arrives, by way of a plane carrying 15 to 20 bags of packages from Amazon the convenience of the digital age arrives, by way of a plane carrying 15 to 20 bags of packages from Amazon. At an elevation of 11,562 feet, Leh is the highest spot in the world where the company offers speedy delivery. When the plane arrives from New Delhi, it is met by employees from Amazon's local delivery partner, Incredible Himalaya, who then shuttle the packages by van to a modest warehouse nearby. Eshay Rangdol, 26, the nephew of the owner, helps oversee the sortin

    发表评论 查看更多 翻译此文

    收起

  • We've been on a bit of a history trip lately with old computer articles and books, and this one from 1985 certainly fits right in. In January 1981, a handful of semiconductor engineers at MOS Technology in West Chester, Pa., a subsidiary of Commodore International Ltd., began designing a graphics chip and sound chip to sell to whoever wanted to make "the world's best video game". In January 1982, a home computer incorporating those chips was introduced at the Winter Consumer Electronics Show in Las Vegas, Nev. By using in-house integrated-circuit-fabrication facilities for prototyping, the engineers had cut design time for each chip to less than nine months, and they had designed and built five prototype computers for the show in less than five weeks. What surprised the rest of the home-computer industry the most, however, was the introductory price of the Commodore 64: $595 for a unit incorporating a keyboard, a central processor, the graphics and sound chips, and 64 kilobytes

    发表评论 查看更多 翻译此文

    收起

  • Are we focusing too much on analyzing exactly how many jobs could be destroyed by the coming wave of automation, and not enough on how to actually fix the problem? That's one conclusion in a new paper on the potential affects of robotics and AI on global labor markets from US think tank, the Center for Global Development (CGD). The paper's authors, Lukas Schlogl and Andy Sumner, say it's impossible to know exactly how many jobs will be destroyed or disrupted by new technology. But, they add, it's fairly certain there's going to be significant effects - especially in developing economies, where the labor market is skewed towards work that require the sort of routine, manual labor that's so susceptible to automation. Think unskilled jobs in factories or agriculture. As earlier studies have also suggested, Schlogl and Sumner think the affects of automation on these and other nations is not likely to be mass unemployment, but the stagnation of wages and polarization of the labor

    发表评论 查看更多 翻译此文

    收起

  • “Stylish” browser extension steals all your internet history

    发表评论 查看更多 翻译此文

    收起

  • Security updates have been issued by Fedora (drupal7-backup_migrate, firefox, and podman), Red Hat (python), Scientific Linux (glibc, kernel, libvirt, pcs, samba, samba4, sssd and ding-libs, and zsh), and Ubuntu (kernel, linux, linux-aws, linux-azure, linux-gcp, linux-kvm, linux-oem, linux-raspi2, linux, linux-aws, linux-kvm, linux-raspi2, linux-snapdragon, linux, linux-raspi2, linux-hwe, linux-azure, linux-lts-trusty, linux-lts-xenial, linux-aws, linux-oem, and zziplib).

    发表评论 查看更多 翻译此文

    收起

  • Levandowski railed against "risk aversion" at Google's self-driving car project.

    发表评论 查看更多 翻译此文

    收起

  • Show HN: Termtosvg – Record terminal sessions as SVG animations

    发表评论 查看更多 翻译此文

    收起

  • Show HN: The 100% GraphQL CMS – Relaunched

    发表评论 查看更多 翻译此文

    收起

  • Ginkgo Bioworks hopes to catch rogue DNA before and after it's made

    发表评论 查看更多 翻译此文

    收起

  • The Dangers of Train Yards, Through the Eyes of Railroad Employees

    发表评论 查看更多 翻译此文

    收起

  •  

    The secret world of disabled gamers

    07-03 MIT Technology 39

    Studies like this one could begin to make digital games more accessible to people with a wide range of disabilities.

    发表评论 查看更多 翻译此文

    收起

  •  

    This robot is not throwing away its shot

    07-03 MIT Technology 41

    For an integer $r$, the graph $P_6+rP_3$ has $r+1$ components, one of which is a path on $6$ vertices, and each of the others is a path on $3$ vertices. In this paper we provide a polynomial-time algorithm to test if a graph with no induced subgraph isomorphic to $P_6+rP_3$ is three-colorable. We also solve the list version of this problem, where each vertex is assigned a list of possible colors, which is a subset of $\{1,2,3\}$.

    发表评论 查看更多 翻译此文

    收起

  • Amazon really wants you to install a Twitch desktop client—but is it ready for Prime time?

    发表评论 查看更多 翻译此文

    收起

  • We're All Subsidizing People Who Use American Express

    发表评论 查看更多 翻译此文

    收起

  • An anonymous reader writes: On Tuesday, Wikipedia Italy set all of its pages to redirect to a statement raising awareness for the upcoming vote that (barring some legislative wrangling) would make the copyright directive law. The statement reads, in part (emphasis theirs): On July 5, 2018, The Plenary of the European Parliament will vote whether to proceed with a copyright directive proposal which, if approved, will significantly harm the openness of the Internet . The directive instead of updating the copyright laws in Europe and promoting the participation of all the citizens to the society of information, threatens online freedom and creates obstacles to accessing the Web, imposing new barriers, filters and restrictions. If the proposal would be approved in its current form, it could be impossible to share a news article on social networks, or find it through a search engine; Wikipedia itself would be at risk.

    发表评论 查看更多 翻译此文

    收起

  • Worldometers – real time world statistics

    发表评论 查看更多 翻译此文

    收起