Open Source Could Be a Casualty of the Trade War

Open Source Could Be a Casualty of the Trade War

He told me that apparently the US government has been sending cease and desist letters to some foreign companies that derive more than 25% of their revenue from US sources, threatening to hold their market access hostage in order to coerce them from doing business with Huawei. The abrupt loss of Huawei as a customer will represent billions of dollars in losses for a large number of US component suppliers, resulting in collateral damage to US citizens and companies. Reality Check: Supply Chains are Not Guided Missiles

The EAR was implemented 40 years ago, during the previous Cold War, as part of an effort to weaponize the US dollar.

Source: www.bunniestudios.com

Keras – Hyperparameter Tuning for Humans

Keras – Hyperparameter Tuning for Humans

Note: the purpose of having multiple executions per trial is to reduce results variance and therefore be able to more accurately assess the performance of a model. If you want to get results faster, you could set (single round of training for each model configuration). You can print a summary of the search space:

Then, start the search for the best hyperparameter configuration.

Source: github.com

Streak CRM for Gmail (YC S11) Is Hiring in Vancouver (Streak.com)

Streak CRM for Gmail (YC S11) Is Hiring in Vancouver (Streak.com)

Our backend is running on Google Cloud Platform (GCP). We make extensive use of GCP’s managed services and are always at the forefront of GCP’s evolution:

On the frontend we’ve built the InboxSDK library (https://www.inboxsdk.com) to power our best-in-class integration with Gmail. State and data synchronization is accomplished with a battle tested in-house framework that makes extensive use of streams will be very competitive with compensation, we’re not opening a Vancouver office to get cheap labor.

Source: www.streak.com

Light Tracer – Experimental GPU ray tracer for web

Light Tracer – Experimental GPU ray tracer for web

Light Tracer is the world’s first solution for GPU accelerated, photorealistic client-side rendering inside a Web browser. Light Tracer uses progressive rendering mode starting with a noisy image and then progressively refining it towards the final result. Light Tracer is mainly designed to use HDRI environment maps, but it also supports mesh emitters and analytically defined emitters like spherical and distant light sources.

Source: lighttracer.org

A Small Colorado Town Ran Out of Water

A Small Colorado Town Ran Out of Water

Herz is president of a small water company that purchases treated drinking water from the town for him and a few of his rural neighbors. Knight is the town administrator, meaning he’s in charge of making sure the water system works. Because the incident affected the entire community in such an intimate way, Knight said the water shortage has forced Paonia into having some tense conversations that had otherwise bubbled under the surface.

Source: www.kunc.org

Testing advertisements across the network

Testing advertisements across the network

We’ve got over 170 sites – I’ve given up counting by now – and it would of course be absolutely absurd to expect you guys to somehow figure out a whole bunch of ludicrously on-topic ads for each one. But at the same time . . . not all of those sites are exactly prime ad targets, as had been acknowledged a couple years earlier. But from what you’re saying, every site will get these ads eventually, at least in this phase of things.

Source: meta.stackexchange.com

Light Tracer: WebGL path tracer for photorealistic rendering in the browser

Light Tracer: WebGL path tracer for photorealistic rendering in the browser

Light Tracer is the world’s first solution for GPU accelerated, photorealistic client-side rendering inside a Web browser. Light Tracer uses progressive rendering mode starting with a noisy image and then progressively refining it towards the final result. Light Tracer is mainly designed to use HDRI environment maps, but it also supports mesh emitters and analytically defined emitters like spherical and distant light sources.

Source: lighttracer.org

Learning to Build Distributed Systems

Learning to Build Distributed Systems

There’s a wealth of information online, many distributed systems papers are very accessible, and you can’t visit a computer science school without tripping over a distributed systems course. If you prefer to start with practice, many of the biggest distributed systems shops on the planet publish papers, blogs, and talks describing their work. Some COEs contain as many great distributed systems lessons as the best research papers.

Source: brooker.co.za

Avoiding Instruction Cache Misses

Avoiding Instruction Cache Misses

However, if its job is to execute complex logic on a small amount of data, the instruction cache is likely to become a problem at some point. HyperThreading can make sure that this part of the processor still does some useful work, but it is also the source of the second problem – all resources, including the L1 instruction cache and µop cache are shared between the hardware threads. In other words, we have introduced two stages:

The way this can help with the instruction cache misses is that the execution stage, being smaller, is more likely to fit in the instruction cache.

Source: pdziepak.github.io

Budapest Convention Offers an Opportunity for Modernizing Crimes in Cyberspace

Budapest Convention Offers an Opportunity for Modernizing Crimes in Cyberspace

Ensuring that such emerging activities are as illegal as counterpart activity applied to traditional software systems is a key challenge for criminal law—and yet another reason to modernize the CFAA. In addition, our proposal broadens the definition of illegal activity from simple “unauthorized access,” as relied on by the CFAA, toward the creation of specific harms in cyberspace targeted at data or at software systems as a whole. This, in turn, ensures that malicious activities targeting machine learning models are categorized as criminal activity while also protecting traditional software systems already covered by the CFAA.

Source: www.lawfareblog.com