Hossam Hassanein

330 Flips | 17 Magazines | 108 Likes | 28 Following | 15 Followers | @hossamhassanien | Keep up with Hossam Hassanein on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Hossam Hassanein”

Even The Most Advanced Computer Programmers Have Probably Never Heard Of This Concept

<i>What are some advanced concepts in programming that most average programmers have never heard of? originally appeared on Quora:</i> <i>the place to gain and share knowledge, empowering people to learn from others and better understand the world</i>.<p><b>Answer by Tikhon Jelvis, studied programming languages and did</b> …

Machine Learning

This physicist’s ideas of time will blow your mind

Time feels real to people. But it doesn’t even exist, according to quantum physics. “There is no time variable in the fundamental equations that describe the world,” theoretical physicist Carlo Rovelli tells Quartz.<p>If you met him socially, Rovelli wouldn’t assault you with abstractions and math to …

Equations

Physicists Just Discovered an Entirely New Type of Superconductivity

"No one thought this was possible in solid materials."<p>One of the ultimate goals of modern physics is to unlock the power of superconductivity, where …

Why April 9 Could Be the Biggest #DeleteFacebook Day in History

Facebook could find itself on the edge of a major shift.<p>A huge movement could hit Facebook next Monday. Mike Schroepfer, its chief technology …

How to Hack Wi-Fi: Stealing Wi-Fi Passwords with an Evil Twin Attack

While Wi-Fi networks can be set up by smart IT people, that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how an …

How To: Hack Your Neighbor with a Post-It Note, Part 2 (Setting Up the Attack)

In the previous article in this short series, we learned how to find our neighbor's name using publicly accessible information and how to monitor …

Hacking Tools List for Hackers & Security Professionals

Penetration testing & Hacking Tools Tools are more often used by security industries to test the vulnerabilities in network and applications. Here …

Information Security

Confessions of a former hacker: 5 techniques to make you more secure online

Consumers are daily targets of email and phone scams, not to mention the frequent cyberattacks on big data. So it’s never been more important to …

What is a ‘death clean’ and why should you do it?

This article is reprinted by permission from NerdWallet.<p>The phrase “death cleaning” may sound jarring to unaccustomed ears, but the concept makes …

Personal Finance

Deep Reinforcement Learning Models: Tips & Tricks for Writing Reward Functions

<i>In this post, I’m going to cover tricks and best practices for how to write the most effective reward functions for reinforcement learning models. If</i> …

Machine Learning

Security Central: The NSA Is Hacked...Again

This week’s Security Central takes a look at the infiltration of the National Security Agency (NSA) by the mysterious hacking group called the Shadow …

Surveillance

Top 10 Videos on Deep Learning in Python

Playlists, individual tutorials (not part of a playlist) and online courses on Deep Learning (DL) in Python using the Keras, Theano, TensorFlow and …

Deep Learning

This Man Is Leading an AI Revolution in Silicon Valley—And He’s Just Getting Started

<b>The cofounder and CEO of semiconductor and software maker Nvidia saw the future of computing more than a decade ago, and began developing products</b> …

Yann LeCun Discusses the Power, Limits of Deep Learning

LeCun was both enthusiastic on the progress the field has made in recent years and realistic about what such systems can and cannot do.<p>PCMag reviews …

Deep Learning

What are file-less cyber attacks and how do you protect against them

Businesses and internet users are finally becoming more aware of the danger of cyber attacks. They’ve started to boost their defending techniques, leaving hackers with fewer options to carry out their malicious deeds.<p>However, exploiting a vulnerability is just a matter of techniques and available …

Cybersecurity

IBM scientists say radical new ‘in-memory’ computing architecture will speed up computers by 200 times

(Left) Schematic of conventional von Neumann computer architecture, where the memory and computing units are physically separated. To perform a …

Machine Learning

APIs are everywhere, but documentation is wanting

Recent survey points to popularity of APIs and weak spots. Also, an API expert looks at what's next in APIs..<p>Private or internal APIs are far more …

This AI Technique Was Kept Quiet so Spammers Wouldn’t Misuse It

A new brain-inspired computer vision algorithm could help advance the state of AI—but it could also fill your in-box with spam.<p>Vicarious, a startup …

Why blockchain is the future of IoT

The Internet of Things is rapidly expanding its potential to transform everyday life with smart homes, cities, farms and manufacturing facilities. …

Blockchain

Internet of Things and Blockchain Technology: How Does It Work?

"Internet Of Things is when your toaster mines Bitcoins to pay off its gambling debts to the fridge.”<p>When this was tweeted by Andrew Miller in 2015, …

Blockchain

5 Incredible Blockchain IoT Applications

If we use Blockchain IoT applications to identify and govern our devices, what kind of economy would we enable?<p>First — let’s understand how a …

Blockchain

A Beginners Guide To Nude Photography & How to get Started

Rating:<p>3.35 based on 17 Ratings<p>April 5, 2018 By Michael Moodie<p>A Beginners Guide To Nude Photography www.sleeklens.com<p>Nude photography has been a …

This new botnet could take down the internet - and it's rapidly spreading across the world

New botnet spotted enslaving internet-of-things (IoT) devices, said Check Point.<p>Up to a million organisations around the world have already been …

The Difference Between Bitcoin and Ethereum Technology

Everyone is talking about blockchain. But do you know the difference between the technology running bitcoin and ethereum?<p>ConsenSys Chief Strategy …

Archaeologists find gates of Hell in Saudi Arabia

When researchers are searching for remnants of structures and settlements constructed by ancient peoples they typically focus on areas that are …

Your Browser Could Be Mining Cryptocurrency For a Stranger

There’s something new to add to your fun mental list of invisible internet dangers. Joining classic favorites like adware and spyware comes a new, …

You Could Become an AI Master Before You Know It. Here’s How. - MIT Technology Review

At first blush, Scot Barton might not seem like an AI pioneer. He isn’t building self-driving cars or teaching computers to thrash humans at computer …

More artificial intelligence, fewer screens: the future of computing unfolds

Screen-free user experiences such as Amazon Echo and autonomous vehicles portend a future of computing without screens.<p>We are approaching the day …

Artificial Intelligence

We Now Have an Equation That Explains How The Hell Quantum Chaos Behaves

Even chaos can be predicted.<p>While physicists have managed to wrap their minds around chaos theory in the macroscopic world, chaos also has its way at …