How to hack your face to dodge the rise of facial recognition tech
By Elise Thomas | Feb 1, 2019
Use of facial recognition tech is on the rise, but how do you get away from it? 3D-printed face masks, makeup, infrared lights, and complex patterns are being used to dodge its all-seeing eye.
The Promise of Hierarchical Reinforcement Learning
By Yannis Flet-Berliac | Mar 9, 2019
Suppose your friend just baked and shared an excellent cake with you, and you would like to know its recipe.
The Bizarre and Terrifying Case of the "Deepfake" Video that Helped Bring an African Nation to the Brink
By Ali Breland | Mar 15, 2019
A controversial appearance by the president of Gabon portends a future where you can't believe your eyes.
Google's Stadia uses Style Transfer ML to manipulate video game environments
By Kyle Wiggers | Mar 19, 2019
At a press conference today during the 2019 Game Developers Conference, Google took the wraps off of Stadia, its cloud-powered gaming service, and demoed a particularly eye-catching feature: Style Transfer ML.
"It's Not Going to Be Easy": The Boeing Tragedy Is Just the Beginning of the Self-Driving Techpocalypse
By Nick Bilton | Mar 18, 2019
Wall Street is banking on technologies such as autonomous cars, which will allow us to watch advertisements instead of the road.
How Do You Insure a Driverless Car (h/t Socrates Pichardo)
By Emma Kennedy | Mar 21, 2019
Technology giants and automakers are investing billions of dollars to develop driverless cars that promise to make roads safer. But who will pay when a crash does happen?
To build the cities of the future, we must get out of our cars
By Robert Kunzig | April 2019
Remaking healthy urban areas means repairing the damage done to communities once blown apart to serve the automobile.
How Did the F.A.A. Allow the Boeing 737 Max to Fly?
By John Cassidy | Mar 18, 2019
With virtually every day that has passed since the crash of Ethiopian Airlines Flight 302, which killed a hundred and fifty-seven people, more disturbing news has emerged.
Life After Facebook: The Untold Story Of Billionaire Eduardo Saverin's Highly Networked Venture Firm
By Alex Konrad | Mar 19, 2019
When Eduardo Saverin greets entrepreneurs who come to visit him in his eighth-floor offices at the Singapore Land Tower, the 36-year-old knows he'll get asked the question.
Giant Military Contract Has a Hitch: A Little-Known Entrepreneur
By Karen Weise and Thomas Kaplan | Mar 20, 2019
Deap Ubhi is a restless guy. At 26, he quit his job in private equity in Northern California, where he had grown up and gone to college, and then moved to India to found Burrp!, a local search site similar to Yelp.
A Look at an Original Iphone Prototype
By Tom Warren | Mar 19, 2019
Apple's red iPhone M68 in all its glory.
Firenadoes and drifting embers: The secrets of extreme wildfires
By Alexandra Witze | Mar 14, 2019
Researchers probe the weather-like physics of deadly infernos.
Making 3D Terrain Maps
By Tom Patterson | Mar 19, 2017
On this site you will find ideas and advice about creating obliquely viewed 3D terrain maps for use on static computer displays or as hard-copy output.
A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments
By Mark Mazzetti, Adam Goldman, Ronen Bergman and Nicole Perlroth | Mar 21, 2019
Sophisticated surveillance, once the domain of world powers, is increasingly available on the private market. Smaller countries are seizing on the tools - sometimes for darker purposes.
Facebook admits it stored 'hundreds of millions' of account passwords in plaintext
By Zack Whittaker | Mar 21, 2019
Flip the "days since last Facebook security incident" back to zero.
Aluminum Giant Norsk Hydro Targeted by 'Extensive Cyber-Attack'
By David Meyer | Mar 19, 2019
Cyber-attacks against industrial systems are an increasing concern, and the Norwegian aluminum giant Norsk Hydro on Tuesday provided a new and worrying example of the phenomenon.
A Simple Way to Generate Strong Passwords
By Vincent Delft | Mar 16, 2019
More and more persons are using a password storage system. Thanks to those systems, we can put complex passwords in our different applications. So, the next need is to create such complex password.
The Treasure Behind the Wall
By Vanessa Friedman | Jan 21, 2019
Something in the new Oscar de la Renta boutique in Paris was not what it seemed.
The 15 Most Famous Transcendental Numbers
By Cliff Pickover | Dec 20, 2018
I am in love with the mysterious transcendental numbers. Did you know that there are "more" transcendental numbers than the more familiar algebraic ones?
Datasets for machine learning
By Nikola Plesa | 2019
A list of the biggest datasets for machine learning from across the web.