|
|
|
|
Maybe I should make some youtube videos. I would make one about the real concerns of AI, one about basic data science and data analysis, and one that is an introduction to neural networks. |
|
|
|
There are no conversations. |
|
|
|
|
Lord Hailsham |
The introduction of religious passion into politics is the end of honest politics, and the introduction of politics into religion is the prostitution of true religion. |
Steve Martin |
I would get records by Earl Scruggs... I would tune my banjo down and I'd pick out the songs note by note. Learned how to play that way. I persevered. There was a book written by Pete Seeger, who showed you some basic strumming and some basic picking... And I kind of worked out my own style of playing. |
Robert Anton Wilson |
All phenomena are real in some sense, unreal in some sense, meaningless in some sense, real and meaningless in some sense, unreal and meaningless in some sense, and real and unreal and meaningless in some sense. |
Barkhad Abdi |
I was never interested in becoming an actor. I was directing videos. I was never into acting. I was into shooting music videos. I've only ever been behind the camera. Never in front of it. |
Frank Lloyd Wright |
Get the habit of analysis - analysis will in time enable synthesis to become your habit of mind. |
Billy Gardell |
Everybody wants to be a better version of themselves - everybody. And I hope one day I can lose some weight. Maybe, who knows, I'll hire myself a trainer and a fancy cook. In five years, maybe I'll be an action hero. Then again, maybe I'll just be this guy. Who knows? But the fun part is embracing the human side of that. |
Frank Zappa |
Some scientists claim that hydrogen, because it is so plentiful, is the basic building block of the universe. I dispute that. I say there is more stupidity than hydrogen, and that is the basic building block of the universe. |
Stephen King |
I think there ought to be some serious discussion by smart people, really smart people, about whether or not proliferation of things like The Smoking Gun and TMZ and YouTube and the whole celebrity culture is healthy. |
Stephen Cambone |
There is a reasonable concern that posting raw data can be misleading for those who are not trained in its use and who do not have the broader perspective within which to place a particular piece of data that is raw. |
Charles Babbage |
Errors using inadequate data are much less than those using no data at all. |
|
|
now that my list of product ids is in the millions and ive used about 40gb of proxy bandwidth scraping maybe 50k pages from that data, i have to carefully weigh out how much i want to spend on proxies (spent about $30) on this experiment that could result in just a simple takedown notice to stop the method. granted i can always reuse and modify this data. but i guarantee if you had a million page site based directly around real ecommerce products you would make good money if it stays up
|
|
|
|
have more than a half million product urls (which is really the hard part with amazon, they make it extremely difficult for scrapers to crawl their entire site). after cleaning up this list and potentially trying to get even more products, i will continue to modify my php scraper, this time with use for amazon. it rotates through proxies and user agents so it has worked well in google maps, yelp,. and your university's student directories, so it should bypass amazons no problem. my scraper nowadays saves all the data into xml so i can import through certain plugins, but also have a super easy way to convert to any form i need. originally my scraper rotated through tor proxies and saved all data directly into mysql, over time i created sql files for importing and now that wordpress is used so extensively and doesnt recieve penalties in the search engine like it used to, i can just throw all the data in there and make as many copies and variations of the sites as i want. and make it loo...
This post is a comment.
|
|
|
|
I had this idea one night for creating a decentralized search engine. It would pull data from other search engines (through proxies or from a single server, so no personal user data is involved) and then re-display it to the user.
The next additional thought I had was to make it into a 'roll your own' search engine, so users could then deploy their search engine on their own server to have further control of the traffic as you obviously cant trust shit like duckduckgo (fishy)
Then you could m...
|
|
|
|
Netflix Has Saved Every Choice You've Ever Made In 'Black Mirror: Bandersnatch'
According to a technology policy researcher, Netflix records all the choices you make in Black Mirror's Bandersnatch episode. "Michael Veale, a technology policy researcher at University College London, wanted to know what data Netflix was collecting from Bandersnatch," reports Motherboard. "People had been speculating a lot on Twitter about Netflix's motivations," Veale told Motherboard in an email. "I thought it would be a fun test to show people how you can use data protection law to ask real questions you have." From the report: The law Veale used is Europe's General Data Protection Regulation (GDPR). The ...
|
|
|
|
WikiLeaks Dump Reveals CIA Malware For Tracking Windows Devices Via WiFi Networks
WikiLeaks has published the documentation manual for an alleged CIA tool that can track users of Wi-Fi-capable Windows devices based on the Extended Service Set (ESS) data of nearby Wi-Fi networks. According to the tool's 42-page manual, the tool's name is ELSA. Bleeping Computer has an image embedded in its report that explains how the tool works. There are six steps that summarize the ELSA operation. Bleeping Computer reports: Step 1: CIA operative configures ELSA implant (malware) based on a target's environment. This is done using a tool called the "PATCHER wizard," which generates the ELSA payload, a si...
|
|
|
|
Scientists Create DNA-Based Exploit of a Computer System Archeron an hour ago 18 Archeron writes: It seems that scientists at University of Washington in Seattle have managed to encode malware into genomic data, allowing them to gain full access to a computer being used to analyze the data. While this may be a highly contrived attack scenario, it does ask the question whether we pay sufficient attention to data-driven exploits, especially where the data is instrument-derived. What other systems could be vulnerable to a tampered raw data source? Perhaps audio and RF analysis systems? MIT Technology Review reports: "To carry out the hack, researchers led by Tadayoshi Kohno and Luis Ceze encoded malicious software in a short stretch of DNA they purchased online. They then used it to gain 'fu...
|
|
|
|
Vietnam Deploys 10,000 Cyber Warriors to Fight 'Wrongful Views' from the assuming-control dept. Vietnam is deploying a 10,000-member military cyber warfare unit to combat what the government sees as a growing threat of "wrongful views" proliferating on the internet, Bloomberg reported on Wednesday, citing local media reports. From the report: Force 47 has worked pro-actively against distorted information, Tuoi Tre newspaper reported, citing Nguyen Trong Nghia, deputy head of the general politics department under the Vietnam People's Military. The disclosure of the unit comes as the Communist government pressures YouTube and Facebook to remove videos and accounts seen damaging the reputation...
|
|
|
|
constant recording our speech data, doin some analysis like detecting our jokes, having an led board that lights up certain days you said something was semantically similar
|
|
|
|
To perform a man-on-the-side attack, the NSA observes a target?s Internet traffic using its global network of covert ?accesses? to data as it flows over fiber optic cables or satellites. When the target visits a website that the NSA is able to exploit, the agency?s surveillance sensors alert the TURBINE system, which then ?shoots? data packets at the targeted computer?s IP address within a fraction of a second.
In one man-on-the-side technique, codenamed QUANTUMHAND, the agency disguises itself as a fake Facebook server. When a target attempts to log in to the social media site, the NSA transmits malicious data packets that trick the target?s computer into thinking they are being sent from the real Facebook. By concealing its malware within what looks like an ordinary Facebook page, the ...
This post is a comment.
|
|
|
|
This clever AI hid data from its creators to cheat at its appointed task https://techcrunch.com/2018/12/31/this-clever-ai-hid-data-from-its-creators-to-cheat-at-its-appointed-task/
Depending on how paranoid you are, this research from Stanford and Google will be either terrifying or fascinating. A machine learning agent intended to transform aerial images into street maps and back was found to be cheating by hiding information it would need later in “a nearly imperceptible, high-frequency signal.” Clever girl!
...
|
|