Four short links: 27 January 2020
Developer Productivity, Compilers Course, Terminal Shooter, and Future of Coding
Developer Productivity, Compilers Course, Terminal Shooter, and Future of Coding
Virus Genomes, Kubernetes Security, Copyright Crisis, and Startup Validation
Formal Methods, Backends, Binary Representation, and Chat Bridging
Unending Projects, Work/Life Game, Software Characterization, Team Dynamics
Network Visualization, Computational Notebooks, Computing History, and Preserving Privacy
AR Lenses, Faux Keyboard Noises, Tech Villainy, and Data Tests
Cursed Filesystem, Many Cats, Speech Processing, and Standard Operating Procedure
Zero Trust, Safeguarding Elections, Design Heuristics, and Image/Container Analysis
Sleep Deprivation, Lip Reading, Data Processing, and Rapid Product Development
Privacy Legislation, Bystander Effect, Computing Education, and Tech Adversaries
Simulated Customer, Symbolic Meets Statistical, Deep Fakes, and Online Radicalization
Automation UX, Awful AI, Neural Net Guitar Pedal, and Closed Web
Structuring Papers, State of the World 2020, Reading Big Difficult Books, and Storing Forever
Running Unconferences, Media Server, Lyfte's Workflow Tool, and Bandwidth Utilization
Coding Interview Problems, Coder Stratification, Writing a Compiler, and Distributed Execution Framework
OS Forks, WASM OS, Mediating Consent, and Computational Cinematography
Portable Scripts, Training Actors, Cyber Law, and Government Data
Voice Assistant, Public Domain, Bing Disinformation, and Knowledge Bases
Think Like a Programmer, Do Good Deeds, Command-line Trello-like Tool, and Advice for a New Executive
Learn Assembly, Quantum Puzzles, Ghost Characters, and Computer Networks
Dynamic Graphs, Gamification, hipsterDB, and JavaScript Testing
Algorithmic Puzzles, Publishing, Microtask Programming, AI Introduction
Paper Recommendations, SDR, JavaScript OCR, and Changing Minds
Multiple Regexps, NLP Beyond English, MSR Roundup, and Embedded Linux
Cybersecurity Book, Real-time Code Collaboration, Content Moderation, and Dangerous Rust
Choose Your Own Adventure, Crystal OS, Chinese Tone Language, and RIP Chuck Peddle
Homomorphic Encryption, Supply Chain Security, Location Tracking, Cognitive Uncertainty
Organizational Complexity, YAGNI, Social Robotics, and Formal Reasoning
Tech Leads, Securing Research, Factoids, and Prioritizing Technical Debt
Shenzhen Guide, Content Moderation Damages, WebAssembly Recommended, and Best Business Books
Screen Time and Depression, Crowdsourcing Bad Ideas, Parallel Programming, and Rust Idioms
Cross-Platform UI, Marketing Games, 32 Into 64, Unhealthy Facebook
Social Science One, Structuring Work, Power of Links, and JavaScript Flowcharts
Resilient Communications, Powered Exoskeleton, Software Making Software, and Disinformation Resources
Learning from Incidents, ISBN Changes, Prisoner's Dilemma, and Load-bearing Skeletons
Zero Code, Programmers and Experience, Commuting Sucks, and Amazon's Docs
New Old Infocom, TikTok Privacy, COBOL Conference, and Difficult Conversations
Complexity Explorer, Information Awareness, Old School Colors, and Automatic Code Reviews
On-Prem, Groupthink, Probability and Statistics, and Distributed Meetings
Experience, Webhooks, Learning Causal Theories, and Learning Vim With Fewer Tears
BERT, Linux in the Browser, Ethical Gifts, and Resilience
Prepper Pi, Homomorphic Encryption, Reverse Engineering, and Synthesizing Data Structures
Rewriting Code, Anomaly Detection, Program Synthesis, and Travel Tricks
Extending HTTP, Headless Chrome, Election Security, and a Rewrite Horror Story
Dates, Computational Propaganda, Ethics Review, and Massively Multiplayer Hackathon
FAQs, Privacy, APIs, and Deep Learning Hardware
Program Synthesis, Narrow Paragraphs, Tech Radar, and AI Snakeoil
Local First, Worker-Owned Apps, Differently Correct, and Recommender Simulations
GPS Spoofing, Multi-Arch Docker Images, People Problems, and Document Dumps
High Modernists, GitLab Runbooks, Wrist Exercises, and a Tiny Dynamicland
Adversarial Interoperability, Open Virtual Assistants, Code Verification, Distributed Graph Computation
Predicting Smells, Diversified Sampling, Card Games, and Universal SQL Interface
Evil Tech, Deep Tech, Visualization, and Machine Language Rules
WebAssembly Shell, Network Security, FPGA Bugs, and Inoculating Against Online Misinformation
Probabilistic Scripting, Static Analysis, Visual Forensics, and Uninformed Consent
DNS Wars, Company Culture, Separating Musical Stems, and Program Synthesis
Functional Programming, Fake News in Elections, De-Identification in Video, and Sendmail Lessons Learned
Money Laundering, Privacy Unix, Technical Decisions, and Automated Security Playbooks
Disinformation, Ticketing, Run a City Like a Company, and In-Browser Ultrasonic Data Transfer
Research Tool, Conversational AI, Nothing to Hide, and Battery Ingredients
Property Graphs, Election Tech, Technical Debt, Tunnelling SSH over HTTP Proxies
Teaching Unix, Computational Memory, unfork(), and Modern Javascript Features
Remastering Games, Rethinking Encryption, Text Editors, and Digital Wellbeing
Viz Widget, 6502 History, Hire Juniors, and Postgres Queries as Flame Graphs
A Human Tale, Algorithm Regulation, ASCII Game, Security Research
Quantum Supremacy, Instrumenting JavaScript, Social Credit Scoring, and Crappy Fonts
Safe Interfaces, WebAssembly Numbers, Userland Dataflow, and Serverless Data Processing in Go
Book Sponsorship, Policy Impact, Stream Processing Platform, and Fixing Hardware in Software
Browser History, Competition Programming, Wi-Fi Secrets, and Pascal Returns
Automated Reasoning, Streamsheets Open Source, Build Management, and Assembler Robots
Compositing Software, Website Vulnerabilities, Logic Puzzles, and FPGA-in-USB
Scriptural Inference, Being Sherlocked, Hand-styled Charts, and Early-stage Startup Programming Principles
NSA Cybersec, Collaborative Natural Language Understanding, Ugly Language, and Lament for Computer Files
Detecting Manipulated Face Images, Deep Learning Cheat Sheets, Chinese Cybersecurity, and Streaming Dataflow
Resilience Engineering, Ancient Emulators, Long Timespan Design, and Exporting Section 230
Unix Passwords, Remote Foo, Text Graphics, and AI in AppInventor
Data Playbook, Global Politics Meets Tech, ML Models, and Lock-free Programming
Visual AI Tools, Software Design, Image Processing Chains, and Music Player Firmware
Screen Addiction, Data Viz, Algorithmic Bias, and Tools for Thought
Understanding SQL, Pricing, App Configuration, and Internet Jurisdiction
Content Moderation, Go ORM, Adversarial Interoperability, and Random Sample Elections
Data Fallacies, Transparency Reports, Encryption, and Experimental Declarative Programming Language
Research, Observability, Self-Enumeration, and Probabilistic Programming
CLOUD Act, Ethical Consumption of Bits, TV Tracking, and Long Projects
Creative Coding, Collective Social Behavior, Programming Language Research, and Social Media Manipulation
Censorship, Tiktok, Machine Learning Workspace, and Deepfake Library
Cleaning ImageNet, Thumbnails, Tracking Users, and AR Tabletop Gaming
ICE Companies, Matrix Methods, Malfunctioning Sounds, and Terrorist Definitions
Good at Operations, Neural Speech Recognition, Cryptocurrency Abuses, and Compiler Tools for ML
Free Faces, Cultural Distance, Connected Pacific, and Number Munger
Boring Technology, YouTube's Procella, Hong Kong Protest Tech, and Personas
Topology, VC Buds, ImageNet Roulette, and Social Science One
Trust in Assistants, Cache your CI's Dependencies, Reproducibility Checklist, and False Positives
Decentralized Challenges, D3 Deconstructor, Text Extraction, and The Great Reckoning
Attacking NLPs, Data Kit, Quantum Computing and Computation, and What-If Question Archive
Bayesian Philosophy, Combining Features, Quantum INTERCAL, and Universal Decay of Memory
Distributed Consistency, Face Anonymization, Game Mechanic Discovery, and Images of Images
Mapping Values, Crawlers are Legal, Laser Tripwire, and Coercion-Resistant Design
Secure Android, Group Chats, Ethical Location Data, and Philosophy of Computer Science
Code Reviews, Dogfooding, Deobfuscation, and Differential Privacy
Cultural Competency, Computer-Generated Sound, Bottom-Up CS, and Continuous Compliance
iOS Security, IOT Wifi Attacks, Interactive SSH Programs, and Replacing Faces in Video
Crummy Translations, Synthetic Datasets, Building Communities, and Deleting Accounts
Enigma Simulator, Robot Startups, Code as Type, and Conversational Modeling
Multi-Language Teams, AI Release Models, Security Myth, and The Internet is for End Users
Debugging a Scale Problem, Verifying Cryptographic Protocols, Remote Team Stress, and PAC-MAN Source
Tech and Politics, Crypto-Mining Malware, Cost of Securing DNS, and Anti-Fuzzing Techniques
Personal Information, Research Data, Massive Lamba Scale, and The Moral Character of Cryptographic Work
Avoiding Sexual Predators, YouTube Radicalization, Brian Behlendorf Interview, and Cyberpunk Present
Open Source Economics, Program Synthesis, YouTube Influence, and ChatBot Papers
I Don't Know, Map Quirks, UI Toolkit, and Open Power Chip Architecture
Competition vs Convenience, Super-Contributors and Power Users, Forecasting Time-Series, and Appreciating Non-Scalability
Content Moderation, Robust Learning, Archiving Floppies, and xkcd Charting
Developer Tool, Deep Fakes, DNA Tests, and Retro Coding Hacks
Data Businesses, Data Science Class, Tiny Mouse, and Training Bias
Hardware Deplatforming, Hiring Groupthink, Loot Boxes and Problem Gambling, and Interoperability and Privacy
Recognizing Fact, YouTube & Brazil, Programming Zine, and Credit Blacklists
Retro Hacking, Explaining AI, Teacher Ratings, and Algorithmic Bias
Shadowban Patent, Abusing Unix Tools, Deblurring Photos, and Postal Vectors
Counterfeit Security, Poses in Art, Content Moderation, and iPhone Remote Attack Surface
Checklists, Farewells, De-Risking, and Statistical Complexity of Brain Activity
Path Tracing, Games Experiences, Cinematic Visualisation, and IoT Security
Innovation Policy Toolkit, Differential Privacy, Ethically-Aligned Design, Low-n Learning
Cognitive Biases, Conflict, Language Models, and Programmable Memristor Computer
Software-Defined Analog Circuits, Public Domain, Talk Radio Corpus, and Bad Science
Provably Correct AI, Porn & Privacy, Math for CS and ML, and Xenophobia Classifier
Game Translation, Modern Hypercard, Cryptographic Attacks, and Digital Hardware Debugger
Email, End-to-End Encryption, AI Ethics, Reliable Distributed Systems
Disinformation, Election Meddling, Quantum Supremacy, and International Pineapple Day
Mutable Web, Re-Identification, Rule-Based Programming, and Risks of Government Hacking
Computer Life, Quantum Hype, Python Antipatterns, and Algorithm Series
Deciphering Linear B, Data Journalism, Innovation Contradictions, Rebuilding Slack
Game Source, Procurement Graph, Data Moats, and Antitrust Regulation
Journal Mining, API Use, Better Conversation, and Apollo 11 Source
Weird Algorithms, Open Syllabi, Conversational AI, and Quantum Computing
Margaret Hamilton, WeChat Censorship, Refactoring, and Ancient Games
Quantum TiqTaqToe, Social Media & Depression, Incidents, and Unity ML
Climbing Robot, Programming and Programming Languages, Media Player, and Burnout Shops
Hosting Hate, Releasing, Government Innovation, and Voice Cloning
Museum Copyright, Twitter Apprenticeship, AI Regulation, and Computational Biology
Optimisations and Security, 512 Byte Pacman, Cell Security, and Meme AI
Future of Work, GRAND Stack, Hilarious Law Review Article, and The Platform Excuse
Algorithmic Governance, DevOps Assessment, Retro Language, and Open Source Satellite
Online Not All Bad, Emotional Space, Ted Chiang, Thread Summaries
Debugging AI, Serverless Foundations, YouTube Bans, and Pathological UI
Models, More Models, robots.txt, and Event Sourcing
Lock Convoys, AI Hardware, Lambda Observability, and AI for Science
General-Purpose Probabilistic Programming, Microsoft's Linux, Decolonizing Data, Testing Statistical Software
Heartbeat Identity, Seam Carving, Q&A Facilitation, and Secure Data in Distributed Systems
Security Mnemonics, Evidence Might Work, Misinformation Inoculation, and Spoofing Presidential Alerts
Ethics and OKRs, Rewriting Binaries, Diversity of Implementation, and Uber's Metrics Systems
Analog Deep Learning, Low-Trust Internet, Media Literacy, and Psych Experiments
Wacky Timestamps, Computers and Spies, Surveillance Capitalism, and Twitter Adventures
Private Computation, Robot Framework, 3D Objects, and Self-Supervised Learning
Model Governance, Content Moderators, Interactive Fiction, and End-User Probabilistic Programming
Voice2Face, DIY Minivac, Cloud Metrics, and Envoy for Mobile
JavaScript Spreadsheets, Pessimism, Privacy Policies, and AI Ethics
Multiverse Databases, Detecting Photoshopping, Simulation Platform, and Tail-Call Optimization: The Musical
Information Operations, Game Creator, History Lessons, and Physical Pen Testing
Audio GIF, OneMetric, Percolator and Spanner, and Knitting Data
Serverless Microservice Patterns, Organizing Information, Internet Trends, and Fake Videos
Premium Firefox, FPGAs for Graph Processing, Decision Framework, and The Online Experience of South Asian Women
Remote Code Development, PWA Builder, Why Platforms Fail, and Designing Rituals
Energy of Deep Learning, Open Source Game Clones, Better Batteries, and Video Magic
Software Engineering for Machine Learning, Generalizations in Learning, Computer Dance, and Firefighting in Product Development
Open Source, 3D Printer Wear, Multicore TCP, and Super-Resolution Images
Paper vs. Implementation, Recommendations Run Amok, Copyright Law, and Engineering Management
Differential Privacy, Future Op-Ed, Spectroscopy, and Research Programming Environment
Google Blocking Ad Blocking, Security Checklist, Maturity Model, and Software Engineering
Open Insulin, Sonification of Data, Security UX, and Advanced Data Structures
Robustness Principle, End of Mobile, Beautiful Hack, and Autonomous Radios
Research Libraries, Disinformation Campaign, Unstructured Text Mining, and Building a PiDP-11
Better Figures, Neal Stephenson, Reputation Inflation, Interactive Code
Forms by Configuration, GitHub Sponsors, SpaceX's LEO Internet, and a Gallery of Programmer Interfaces
Deep Fakes, GPU-Friendly Codec, Retro OS, and Production Readiness
Software-Defined Memory, SQL Analyzer, Wolfram Engine, and Victims of Passion
Computational Socioeconomics, AI on Code, AMP, and Social Media's Effect on Adolescents
Account Hygiene, Conversational AI Playbook, Unix Time Falsehoods, and Testing/Debugging Machine Learning
Productsec, Supply Chain Attack, Sparse Neural Networks, and the Christchurch Call
Regulating Platforms, Amazon Development, Still Love Tech, and ML Cheatsheets
Privacy, Decision Trees, Other People's Problems, and Programming Tools
Designing for AI, Opinions, Data Moats, and Trans-inclusive Design
Git-rebase, Swift on the Web, Deepfake Dalí, and ML Style Guide
Flip Disc Display, Misinformation, Surveillance, and TCP/IP over Logs
Adversarial Examples, War Crimes, Open Source Firmware, and Better Questions
Old Timers, Web Flashback, Software Collapse, Revisions to Paxos
AI in Dev Tools, Reproducibility, Computing Space, and Social Media and Free Speech
Intercepting App's Network Traffic, Rules Engine, CC Search, and Pronouncing Names
Knowledge Graph, Volumetric Viewer, Neutral Painting, Weird Codes
Network Computation, Algorithmic Bias, Social Robotics, Single Founders Do Fine
Intermediate Vim, Newsletter Numbers, Automating Assessment, and Financial Modeling
AI Engines, Self-Grading Labs, Software Project Heroes, and Embedded Rust
Technology Radar, Influencers Dropping, Stuff That Matters, and Reverse Engineering
Simplify Gmail, Watch Web Pages, Easy Debugging, and Sleep Deprivation
Values Risk, Brain Interface, Hacking Scooters, and Behavioral Change
Control is a Shrug, Glitch Languages, Streaming Media Server, and CRISPR's New Model Organisms
Worker-run Gig Factories, Persistence of Firefighting, Discriminating Systems, and Activation Atlas
GANs via Spreadsheet, Open Source Chat, Sandboxing Libraries, and Flat Robot Sales