https://news.developer.nvidia.com/new-ai-imaging-technique-reconstructs-photos-with-realistic-results/
Tags: #ai #deeplearning #technology
Tags: #ai #deeplearning #technology
NVIDIA Technical Blog
New AI Imaging Technique Reconstructs Photos with Realistic Results
Researchers from NVIDIA, led by Guilin Liu, introduced a state-of-the-art deep learning method that can edit images or reconstruct a corrupted image, one that has holes or is missing pixels.
https://codeburst.io/react-native-vs-real-native-apps-ad890986f1f
An efficiency comparison in the world of Mobile apps development: Swift vs. React Native.
Tags: #swift #react #javascript
An efficiency comparison in the world of Mobile apps development: Swift vs. React Native.
Tags: #swift #react #javascript
Medium
React Native vs Real Native Apps
If you’re into mobile app development, the name of React Native mustn’t be new for you. The term has been trending in the world of…
https://www.httpcs.com/fr/actualites-cybersecurite/impact-study-aws-buckets-amazon-s3-configuration
A security research made by HTTPCS about AWS buckets.
Tags: #security #aws
A security research made by HTTPCS about AWS buckets.
Tags: #security #aws
Httpcs
HTTPCS - NEWS : Impact study - Amazon S3 AWS Buckets configuration [EN]
http://homepages.inf.ed.ac.uk/wenfei/qsx/reading/gupta95maintenance.pdf
This paper motivate and describe materialized views, their applications, and the problems and techniques for their maintenance
Tags: #database
This paper motivate and describe materialized views, their applications, and the problems and techniques for their maintenance
Tags: #database
https://arstechnica.com/information-technology/2018/05/critical-pgp-and-smime-bugs-can-reveal-encrypted-e-mails-uninstall-now/
Tags: #security #encryption #flaw
Tags: #security #encryption #flaw
Ars Technica
Critical PGP and S/MIME bugs can reveal encrypted emails—uninstall now [Updated]
The flaws can expose emails sent in the past and "pose an immediate threat."
https://www.nytimes.com/2018/05/10/technology/alexa-siri-hidden-command-audio-attacks.html
Tags: #security #assistants
Tags: #security #assistants
NY Times
Alexa and Siri Can Hear This Hidden Command. You Can’t. (Published 2018)
Researchers can now send secret audio instructions undetectable to the human ear to Apple’s Siri, Amazon’s Alexa and Google’s Assistant.
https://fsharpforfunandprofit.com/series/why-use-fsharp.html
This series of posts will give you a guided tour through the main features of F# and then show you ways that F# can help you in your day-to-day development
Tags: #programming #fsharp
This series of posts will give you a guided tour through the main features of F# and then show you ways that F# can help you in your day-to-day development
Tags: #programming #fsharp
https://www.infoq.com/presentations/Null-References-The-Billion-Dollar-Mistake-Tony-Hoare
Tags: #programming #null
Tags: #programming #null
InfoQ
Null References: The Billion Dollar Mistake
Tony Hoare introduced Null references in ALGOL W back in 1965 "simply because it was so easy to implement", says Mr. Hoare. He talks about that decision considering it "my billion-dollar mistake".
https://arstechnica.com/information-technology/2018/06/simple-technique-bypassed-macos-signature-checks-by-third-party-tools/
Tags: #macos #security
Tags: #macos #security
Ars Technica
For almost 11 years, hackers could easily bypass 3rd-party macOS signature checks
Technique caused security apps to falsely show untrusted apps were signed by Apple.
https://arxiv.org/pdf/1806.05179.pdf
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
A research that aims to a structural redesign of CPUs to solve Spectre and Meltdown flaws.
Tags: #security #hardware #cpu
SafeSpec: Banishing the Spectre of a Meltdown with Leakage-Free Speculation
A research that aims to a structural redesign of CPUs to solve Spectre and Meltdown flaws.
Tags: #security #hardware #cpu
https://vane.pl/content/images/tmp/ios-at-facebook.pdf
An interesting presentation with transcription about how things work in Facebook and the reason behind the heaviness of Facebook for iOS (which binary is now over 350MBs of weight)
Tags: #facebook #ios #it
An interesting presentation with transcription about how things work in Facebook and the reason behind the heaviness of Facebook for iOS (which binary is now over 350MBs of weight)
Tags: #facebook #ios #it
https://www.wi-fi.org/news-events/newsroom/wi-fi-alliance-introduces-wi-fi-certified-wpa3-security
WPA3 specification for network authentication is now official. This is the official announcement.
Tags: #networking #security
WPA3 specification for network authentication is now official. This is the official announcement.
Tags: #networking #security
https://arstechnica.com/information-technology/2018/07/rash-of-fortnite-cheaters-infected-by-malware-that-breaks-https-encryption/
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Even if we are talking about a game, a malware such this can be very risky.
Tags: #security #malware
Ars Technica
Rash of Fortnite cheaters infected by malware that breaks HTTPS encryption
Malware can read, intercept, or tamper with the traffic of any HTTPS-protected site.
https://nakedsecurity.sophos.com/2018/06/28/windows-10-security-can-be-bypassed-by-settings-page-weakness/
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Perhaps Microsoft won't ever fix this because "it's not a bug, it's a feature". Through this, you can execute cmd and Powershell commands.
Tags: #windows #security
Naked Security
Windows 10 security can be bypassed by Settings page weakness
The file type used by Windows 10’s settings page can be used to trick Windows into running files it’s supposed to block.