hrsflip

16 Flips | 3 Magazines | @hrsflip | Keep up with hrsflip on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “hrsflip”

A Sneak Peek at Intel's Knights Landing

Over at <i>TweakTown</i>, Anthony Garreffa offers us a sneak peak at Intel’s Knights Landing, the second generation MIC architecture product from Intel, …

What does this code do?

At the SciPy 2010 conference, a speaker showed several short code samples and asked us what each sample did. The samples were clearly written, but we …

DDoS Attacks originated from thousands of .EDU and .GOV WordPress Blogs

In a recent cyber attack on a Forum site, thousands of outdated legitimate WordPress blogs were abused to perform DDOS attacks using previously known …

Cross Site Scripting (XSS) and prevention

Variants of Cross site scripting (XSS) attacks are almost limitless as mentioned on the OWASP site …

WebGL With Three.js: Textures & Particles

Since its introduction, 3D graphics in the browser has been a popular topic. But if you were to create your apps using plain old WebGL it would take …

A Whirlwind Tour of Computational Geometry | Mathematical Association of America

<b>Year of Award</b>: 1991<p><b>Publication Information:</b> <i>The American Mathematical Monthly</i>, vol. 97, 1990, pp. 687-701<p><b>Summary:</b> This survey of the field of …

Generating Sequences of Primes in Conway's Game of Life

One of the most interesting patterns that has ever been constructed in Conway’s Game of Life is primer, a gun that fires lightweight spaceships that …

ExplainShell Breaks Down Long, Confusing Linux Commands

Ever come across a tutorial online that tells you to run a long terminal command, but want to know what each part of it actually <i>means</i>? ExplainShell …

A set of top Computer Science Education blogs

on Nov 17, 20136 January 2015<p>Further to my most-read blog post (from May 2012: <i>A set of top Computer Science blogs</i>, 80,000 hits and counting), here’s …

DOS Attack Types And Tools

<b>Denial of service (DOS) attack</b>, a type of attack on a network that is designed to bring the network to its knees by flooding it with useless traffic. …

Shtetl-Optimized » Blog Archive » Timeline of computer science

<b>Update (Feb. 14):</b> Thanks so much to the many commenters who offered suggestions—I’ve implemented a large fraction of them! In addition to many …

Smoothest curve through points: natural cubic spline

How do you fit the smoothest curve through a set of points? Suppose you have a set of increasing x values <i>x</i>1, <i>x</i>2, <i>x</i>3, … , <i>xn</i> and a corresponding set of <i>y</i> …

Deep Learning oral traditions

This past week I had the good fortune of attending two great talks1 on Deep Learning, given by Googlers Ilya Sutskever and Jeff Dean. Much of the …

The Coming Age of the Qubit - Quantum Computing Explained

What makes the quantum world different and how can these differences be used to build Quantum Computers? In this video from the <i>Quantum Frontiers …

15 Inspiring TED Talks for Freshman Year

You've selected your classes and shopped for your dorm room. You've bought some new clothes and packed your favorite things. The new semester is …