Blog

Google Credential Provider for Windows

Google Credential Provider for Windows® (GCPW) lets users sign in to Windows® devices with the Google Account they use for work. GCPW provides users with a single sign-on experience to Google services and all the security features available with their Google Account. Learn more about GCPW Download 64-bit Download 32-bit

Read More

Let’s Invent B(+)-Trees

Let’s invent B(+)-trees.Say we have some things, and we want to be able to store and look them up in order. We could just put them in a big sorted array: 10,20,30,40,50,60,70 This is great, but it’s hard to mutate — to insert or delete an element, we might have to move all the others!So,…

Read More

Read More
blog image

First Release of Rust-Analyzer

I am pleased to announce the first alpha release of rust-analyzer — a new “IDE backend” for the Rust programming language. Support rust-analyzer on Open Collective. Wait a second…​ Haven’t people been using rust-analyzer for a long time now? Well, yes, but we’ve never actually made a release announcement, so here’s one! Better late than never :-)…

Read More

textfiles.com

On the face of things, we seem to be merely talking about text-based files, containing only the letters of the English Alphabet (and the occasional punctuation mark). On deeper inspection, of course, this isn’t quite the case. What this site offers is a glimpse into the history of writers and artists bound by the 128…

Read More
blog image

YOLOv4: Optimal Speed and Accuracy of Object Detection

[Submitted on 23 Apr 2020] Download PDF Abstract: There are a huge number of features which are said to improve Convolutional Neural Network (CNN) accuracy. Practical testing of combinations of such features on large datasets, and theoretical justification of the result, is required. Some features operate on certain models exclusively and for certain problems exclusively,…

Read More
blog image

Keys.pub – Keybase Without the Cruft

# Install Download for macOS Download for Windows Download for Linux Or the command line only. # What is it? Manage cryptographic keys, sigchains and user identities. Search for keys, verify and import them. Securely store passwords and secrets. Encrypt, decrypt, sign, verify. Create a secure connection (Wormhole) between 2 computers. Most features available in…

Read More
blog image

Germany flips to Apple-Google approach on smartphone contact tracing

BERLIN (Reuters) – Germany changed course on Sunday over which type of smartphone technology it wanted to use to trace coronavirus infections, backing an approach supported by Apple and Google along with a growing number of other European countries. FILE PHOTO: A sign with distancing rules and the notice that masks must be worn, is…

Read More
blog image

VC Charles Hudson on ‘the conversation no one has during an upmarket’

For pre-seed startups, precarious times are baseline until they secure their first customer, first hire and first check. But no matter how built-in turbulence might be for a pre-seed founder, we’re entering a period where stresses are amplified and outlooks are unpredictable. In light of the new market conditions, a harder fundraising market and slower…

Read More
blog image

How much power can we expect from rainfall?

1. The puzzle of power from raindrops The usually excellent Marginal Revolution blog features daily “Assorted Links” that point to interesting articles on an exceptionally wide variety of topics, most often related to economics or sociology. Monday’s included a truly awful article from “engadget.com” on “Rain as a source of renewable energy”. Of course, there…

Read More