https://bartoszmilewski.com/2014/10/28/category-theory-for-programmers-the-preface/
Tags: #programming
Tags: #programming
Bartosz Milewski's Programming Cafe
Category Theory for Programmers: The Preface
Table of Contents Part One Category: The Essence of Composition Types and Functions Categories Great and Small Kleisli Categories Products and Coproducts Simple Algebraic Data Types Functors Functo…
https://blog.dominodatalab.com/an-introduction-to-model-based-machine-learning/
Tags: #machinelearning
Tags: #machinelearning
Dominodatalab
An Introduction to Model-Based Machine Learning
This article introduces Model-Based Machine Learning, a new paradigm in machine learning which makes use of Bayesian inference, rather an optimization.
http://eli.thegreenplace.net/2016/the-chain-rule-of-calculus/
"The chain rule of derivatives is, in my opinion, the most important formula in differential calculus. In this post I want to explain how the chain rule works for ..."
Tags: #math
"The chain rule of derivatives is, in my opinion, the most important formula in differential calculus. In this post I want to explain how the chain rule works for ..."
Tags: #math
https://www.youtube.com/watch?v=NpN9NzO4Mo8
This documentary talks about a stolen mobile with installed Cerberus, through which a dutch film student spies the phone and its thief.
Tags: #security #privacy
This documentary talks about a stolen mobile with installed Cerberus, through which a dutch film student spies the phone and its thief.
Tags: #security #privacy
YouTube
Short Film: Find my Phone - Subtitled
Any questions? Check the Reddit AmA: https://redd.it/5jg18f
After my phone got stolen, I quickly realized just how much of my personal information and data the thief had instantly obtained. So, I let another phone get stolen. This time my phone was pre-programmed…
After my phone got stolen, I quickly realized just how much of my personal information and data the thief had instantly obtained. So, I let another phone get stolen. This time my phone was pre-programmed…
We opened techbinder more than 5 months ago with the aim of offering you the most interesting news and resources about tech world.
To improve your experience and our productivity, we also developed a bot, @techbinderbot, to let you send us feedbacks and news or resources you think might interest to the community.
For the support you gave us during this period, we want to thank you. How? By telling you that the news doesn't finish here. We have a lot of unique ideas, some are awaiting for a full Telegram support and others still have to be developed, everything to improve your experience with the bot and the channel.
Thank you again and keep following us. Merry Christmas (to those who celebrate it) and happy new year to everybody.
–– Syra's Techbinder staff
To improve your experience and our productivity, we also developed a bot, @techbinderbot, to let you send us feedbacks and news or resources you think might interest to the community.
For the support you gave us during this period, we want to thank you. How? By telling you that the news doesn't finish here. We have a lot of unique ideas, some are awaiting for a full Telegram support and others still have to be developed, everything to improve your experience with the bot and the channel.
Thank you again and keep following us. Merry Christmas (to those who celebrate it) and happy new year to everybody.
–– Syra's Techbinder staff
https://threatpost.com/generic-os-x-malware-detection-method-explained/120503/
Tags: #security #macOS
Tags: #security #macOS
Threatpost | The first stop for security news
Generic OS X Malware Detection Method Explained
A researcher says the future of OS X malware detection may be rooted in patterns and heatmap visualization.