Stephen

237 Flips | 18 Magazines | 16 Likes | 1 Following | 5 Followers | @Stephen67dk | Keep up with Stephen on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Stephen”

5 Brilliant Non-Business Books That Will Make You Better at Thinking Outside the Box

Sometimes the best way to learn innovative approaches to innovation is to read something completely different.<p>If you want to be a better innovator, there are hundreds (maybe thousands) of great books on the topic.<p>But as I mentioned in an earlier article, expertise can be the enemy of innovation. …

Books

Headless Chrome: an answer to server-side rendering JS sites

<b>By</b> Eric Bidelman<p>Engineer @ Google working on web tooling: Headless Chrome, Puppeteer, Lighthouse<p>TL;DR<p>Headless Chrome can be a drop-in solution for …

Edward Snowden: Facebook is a surveillance company rebranded as 'social media'

<b>This story was updated at 10:37 p.m.</b><p>Former National Security Agency contractor Edward Snowden ripped Facebook in a tweet Saturday after the social …

‘I made Steve Bannon’s psychological warfare tool’: meet the data war whistleblower

For more than a year we’ve been investigating Cambridge Analytica and its links to the Brexit Leave campaign in the UK and Team Trump in the US presidential election. Now, 28-year-old Christopher Wylie goes on the record to discuss his role in hijacking the profiles of millions of Facebook users in …

Cambridge Analytica

A Journey into the Worst Corners of the Dark Web

Author Eileen Ormsby immersed herself in the drug markets and murder sites of the dark web. Quite quickly she found herself meeting its key players.<p><i>This article originally appeared on VICE UK</i>.<p>Last month, 29-year-old Cambridge graduate Matthew Falder was sentenced to 32 years in prison for a list of …

Dark Web

How To: Stealthfully Sniff Wi-Fi Activity Without Connecting to a Target Router

Identifying vulnerable devices and services on a target network can be difficult without leaving traces behind since hackers primarily attack the …

Several privacy-busting bugs found in popular VPN services

The bugs can leak real-world IP addresses, which in some cases can identify individual users and determine a user's location.<p>Three popular VPN …

Information Security

The spread of true and false news online

AAAS login provides access to <i>Science</i> for AAAS members, and access to other journals in the <i>Science</i> family to users who have purchased individual …

Facebook Really Is Spying on You, Just Not Through Your Mic

“Can I try the Cole Haans in a size 8?” Later that night on Facebook: An advertisement for Cole Haan pumps.<p>OK, maybe a coincidence.<p>“What’s the best high-tech scale?” my wife asks aloud. Five minutes later on Instagram: An ad for scales.<p>Wait, are they listening?<p>“Get the little red Sudafed pills,” my …

Privacy

Veil is private browsing for the ultra-paranoid

If you’re worried about someone finding out what you’re pointing your browser at, there are plenty of options for keeping it secret, with varying levels of difficulty and effectiveness. Veil takes things further than perhaps any other anonymous browsing method by masking the page you’re viewing not …

Want a Side Hustle That'll Actually Make You Rich in 2018? Read This Book Now | Inc.com

The podcast Don't Keep Your Day Job with Cathy Heller showcases creatives who make a living doing what they love. It tells the stories of people who have figured out how to pursue their life's purpose and get paid for it (it was also, incidentally, the #1 podcast in the "New Year, New You" podcast …

Entrepreneurship

Word Vectors with Tidy Data Principles - Open Data Science - Your News Source for AI, Machine Learning & more

Last week I saw Chris Moody’s post on the Stitch Fix blog about calculating word vectors from a corpus of text using word counts and matrix …

Data Science

5 Tips for Writing an Awesome Blog Post

How to write content like a pro.<p>Opinions expressed by <i>Entrepreneur</i> contributors are their own.<p>If you have a lot of knowledge about a given topic and think you might be able to make a difference with a blog, but you don't have the technical knowledge of exactly how to get started, Entrepreneur …

Introduction To Neural Networks

<i>This tutorial was originally posted here on Ben's blog, GormAnalysis.</i>Artificial Neural Networks are all the rage. One has to wonder if the catchy …

Deep Learning

The data that transformed AI research—and possibly the world

In 2006, Fei-Fei Li started ruminating on an idea.<p>Li, a newly-minted computer science professor at University of Illinois Urbana-Champaign, saw her colleagues across academia and the AI industry hammering away at the same concept: a better algorithm would make better decisions, regardless of the …

Deep Learning

Microsoft's new iPhone app narrates the world for blind people

The app uses AI to recognize people, objects, and scenes<p>Microsoft has released Seeing AI — a smartphone app that uses computer vision to describe the world for the visually impaired. With the app downloaded, the users can point their phone’s camera at a person and it’ll say who they are and how …

Dockless bike share: privacy and safety concerns voiced ahead of Sydney launch

Reddy Go will start in Sydney in July, and Obike and the publicly funded Melbourne Bike Share are operating in Melbourne<p>Cycling advocates and transport consultants have warned that Sydney’s first dockless bike-sharing service will need to resolve questions of privacy, safety and public clutter …

Australia

How hackers can steal your 2FA email account by getting you to sign up for another website

In a paper for IEEE Security, researchers from Cyberpion and Israel's College of Management Academic Studies describe a "Password Reset …

The NSA (yes, that NSA) has a Github account now

The National Security Agency is amongst the most secretive of the US’ intelligence agencies. It employs genius-level coders and mathematicians in order to break codes, gather information on adversaries, and defend the country against digital threats.<p>Unsurprisingly, the NSA has always to preferred …

Surveillance

Pirate Bay founder: We’ve lost the internet, it’s all about damage control now

At its inception, the internet was a beautifully idealistic and equal place. But the world sucks and we’ve continuously made it more and more centralized, taking power away from users and handing it over to big companies. And the worst thing is that we can’t fix it — we can only make it slightly …

Mark Zuckerberg

How to Find Out Who’s Tracking You Through Your Smartphone

Safety should always be our top priority. With the help of just a few short codes, you can find out more about the settings of your phone and work …

The Seven Sins of Statistical Misinterpretation

Statistics is a useful tool for understanding the patterns in the world around us. But our intuition often lets us down when it comes to interpreting …

Hackers Came, but the French Were Prepared

PARIS — Everyone saw the hackers coming.<p>The National Security Agency in Washington picked up the signs. So did Emmanuel Macron’s bare-bones technology team. And mindful of what happened in the American presidential campaign, the team created dozens of false email accounts, complete with phony …

Security

The complete list of Infosec related cheat sheets

Infosec

Apple Just Acquired This Little-Known Artificial Intelligence Startup

Apple has acquired a data mining and machine learning company Lattice.io, according to multiple sources familiar with the matter.<p>Apple confirmed the …

How to escape the online spies

Whether you’re tweeting, shopping or just browsing, internet companies are monitoring you. Here’s how to evade the snoopers<p>Nobody likes being spied on. When you’re innocently browsing the web, it’s deeply unpleasant to think that faceless technology corporations are monitoring and recording your …

Privacy

The Russian Way of Cyberwar

Information, Disinformation and Influence<p>Theres good reason to believe the Russian intelligence agencies have just pulled off an amazing influence …

The Datasaurus Dozen - Same Stats, Different Graphs: Generating Datasets with Varied Appearance and Identical Statistics through Simulated Annealing

...make both calculations and graphs. Both sorts of output should be studied; each will contribute to understanding. F. J. Anscombe, 1973<br>(and echoed …

bqplot: Bringing more interactivity to data

Dhruv Madeka, a quantitative researcher at Bloomberg, describes the open source library D3 (or D3.js), which is used to make interactive data …