Ravi Shekhar Singh

340 Flips | 18 Magazines | 62 Likes | 13 Following | 4 Followers | @rudrarya | Keep up with Ravi Shekhar Singh on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Ravi Shekhar Singh”

What Is Consciousness?

INNOVATIONS IN<p>Scientists are beginning to unravel a mystery that has long vexed philosophers.<p>Christof Koch<p>Christof Koch is chief scientist and …

Consciousness

Google's New Voice Bot Sounds, Um, Maybe Too Real

On the first day of Google's annual conference for developers, the company showed off a robot with a voice so convincingly human that it was able to call a salon and book a haircut – never revealing that it wasn't a real person making the call.<p>CEO Sundar Pichai demonstrated the new AI technology on …

Artificial Intelligence

10 Must watch videos illustrating Amazing Applications of Artificial Intelligence (AI)

Introduction<p>5 years ago, who would have imagined AI getting this far? Self-driving cars are no longer a figment of our imagination, they are here! As …

Artificial Intelligence

An Introduction to Deep Learning for Tabular Data

Written: 29 Apr 2018 by <i>Rachel Thomas</i><p>There is a powerful technique that is winning Kaggle competitions and is widely used at Google (according to Jeff …

Data Science

NEW Deep Learning Course: Advanced NLP and RNNs

Over the past year, many of you have been asking for a followup on my RNN and Deep NLP courses. I am glad to announce that today, that course is …

Machine Learning

How To: Easily Detect CVEs with Nmap Scripts

Nmap is possibly the most widely used security scanner of its kind, in part because of its appearances in films such as <i>The Matrix Reloaded</i> and <i>Live</i> …

Linux

How To: Use Kismet to Watch Wi-Fi User Activity Through Walls

Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a …

Wi-Fi

How To: Scan Websites for Potential Vulnerabilities Using Vega in Kali Linux

Withstanding an attack from a motivated hacker is one of most important responsibilities a system administrator must undertake. This is especially …

Information Security

How To: Use Google's Advanced Protection Program to Secure Your Account from Phishing

It's easy to have your password stolen. Important people like executives, government workers, journalists, and activists face sophisticated phishing …

White Hat

How To: Hack Your Neighbor with a Post-It Note, Part 1 (Performing Recon)

Using just a small sticky note, we can trigger a chain of events that ultimately results in complete access to someone's entire digital and personal …

How To: Hack Your Neighbor with a Post-It Note, Part 2 (Setting Up the Attack)

In the previous article in this short series, we learned how to find our neighbor's name using publicly accessible information and how to monitor …

How To: Hack Your Neighbor with a Post-It Note, Part 3 (Executing the Attack)

Now that we have our payload hosted on our VPS, as well as Metasploit installed, we can begin developing the webpage which will trick our "John …

How To: Hack Anyone's Wi-Fi Password Using a Birthday Card, Part 1 (Creating the Payload)

With an ordinary birthday card, we can introduce a physical device which contains malicious files into someone's home and deceive them into inserting …

How To: Hack Anyone's Wi-Fi Password Using a Birthday Card, Part 2 (Executing the Attack)

In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload …

Greedy, Brittle, Opaque, and Shallow: The Downsides to Deep Learning

Sundar Pichai, the chief executive of Google, has said that AI “is more profound than … electricity or fire.” Andrew Ng, who founded Google Brain and …

If you’re a darker-skinned woman, this is how often facial-recognition software decides you’re a man

All people are created equal, but in the eyes of the algorithm, not all faces are just yet.<p>A new study from MIT and Microsoft rearchers (pdf) is providing more evidence of exactly how bad facial-recognition software is at accurately identifying darker faces, especially when those faces belong to …

Artificial Intelligence

How to build a deep learning model in 15 minutes – tech-at

<i>An open source framework for configuring, building, deploying and maintaining deep learning models in Python.</i><p>As Instacart has grown, we’ve learned a …

Astronomers image 40-light-year-wide space donut

The supermassive black holes lurking at the centers of galaxies have been known to chow down on anything unlucky enough to pass too close, but the …

Universe

There's No One Way to Explain How Flying Works

Let's be clear—airplanes are complicated. Sure, it's entirely possible to get a piece of paper and fold it in a particular way so that it flies. But …

Learning representations by back-propagating errors

Learning representations by back-propagating errors Rumelhart et al., <i>Nature, 1986</i>It’s another selection from Martonosi’s 2015 Princeton course on …

Deep Learning

UML Tutorial - Use Case, Activity, Class and Sequence Diagrams - Essential Software Modeling

UML 2.0 Tutorial

UML Class Diagram Tutorial

Design Patterns and Refactoring

Visitor Design Pattern<p>Intent<p>Represent an operation to be performed on the elements of an object structure. Visitor lets you define a new operation …

Software Development

The API Facade Pattern: Overview - Episode 1

The API Facade Pattern: Common Patterns - Episode 2

The API Facade Pattern: Technology - Episode 3

Design Patterns 3 of 3 - Behavioral Design Patterns

This is the third (and the last) article about Design Patterns. In the first article of this series I discussed about Creational design patters. The …

Design Patterns 2 of 3 - Structural Design Patterns

This is the second article about design patterns. In the first article I have discussed about creational design patters and now I will describe …

Design Patterns 1 of 3 - Creational Design Patterns

In software engineering, a design patterns are general reusable solutions to a software design problems you find again and again in a real life …