Jumat, 30 Mei 2014

How to Become a Linux Kernel Hacker; Takedown of Misogyny in Nerd Culture



Spreadsheets Not Designed for Serious, Reliable Work | All Deep Neural Nets Are Flawed

To view a web version of this message, click here

Slashback - The Best of Slashdot

Send this message to a friend



How to Become a Linux Kernel Hacker

Spreadsheets Not Designed for Serious, Reliable Work

Takedown of Misogyny in Nerd Culture

All Deep Neural Nets Are Flawed

Google's New Self-Driving Car Has No Steering Wheel

Hot Comment: "I love it when atheists say that Jesus is fictional. It's..."

From the Vault: Could the U.S. Phase Out Nuclear Power?

Watch It: Printing Circuits Inside of Plastic

Poll Booth: Which desktop environment do you like the best?

Sponsored Resource: Built-in Protection for Big Data Environments


Top Stories


How to Become a Linux Kernel Hacker
It might sound daunting, but kernel hacking isn't a mysterious black art reserved for the geekiest of programmers. With a bit of background knowledge, anyone with a grounding in C can implement a new kernel module and understand how the kernel works internally.
Sound Off>>

Spreadsheets Not Designed for Serious, Reliable Work
In response to evaluations of a notable new economics tome by Thomas Piketty, computer science professor Daniel Lemire explains why spreadsheets shouldn't be used for important work, especially where dedicated software could do a better job.
Sound Off>>

Takedown of Misogyny in Nerd Culture
In the wake of the UCSB killing spree, Jeopardy champion Arthur Chu pens a heartfelt takedown of misogyny in nerd culture and calls upon his fellow nerds to reevaluate their beliefs that have been shaped by movies, sitcoms and video games that teach men that women "are things to 'earn,' to 'win.'"
Sound Off>>

All Deep Neural Nets Are Flawed
A recent paper by a team that includes authors from Google's deep learning research project, outlines news about the way neural networks behave that run counter to what we believed. And if the problems aren't fixed, we cannot rely on a neural network in any safety critical system.
Sound Off>>

Google's New Self-Driving Car Has No Steering Wheel
Many big-name automakers, including Mercedes-Benz and Tesla, have committed to self-driving cars by 2017. And Google recently unveiled an in-house-designed prototype with no steering wheel or pedals.
Sound Off>>

Hot Comment

Re:Wait a sec
"I love it when atheists say that Jesus is fictional. It's low hanging fruit to debunk since the existence of a man named Jesus who was crucified in the first century is one of the most verified humans in antiquity. Saying that Jesus is fictional is as bad as believing in geocentrism. In fact, many atheists encourage their fellow unbelievers to stop saying nonsense like "Jesus is fictional" since it is such low hanging fruit for an apologist to debunk." --by gameboyhippo
Read More>>

 

From the Vault

Could the U.S. Phase Out Nuclear Power?
Three years ago, in the wake of the Fukushima nuclear disaster in Japan, German Chancellor Merkel announced that her country would close all of its 17 existing reactors by 2022. Could the U.S. do the same? A number of reports suggest it is not beyond the realm of possibility.
Read More>> 

Watch It

Printing Circuits Inside of Plastic
You can create some amazing things with 3-D printers, but you're still limited mostly to one basic material at a time. But that be changing. Take a look at a system where a filament printer is used to fabricate the object itself, but at the same time, both capacitive and conductive features can be baked -- or rather printed -- right in, with a separate print head.
Watch the Video>>

 

Poll Booth

Which desktop environment do you like the best?

  • Cinnamon
  • GNOME
  • KDE
  • LXDE
  • MATE
  • Unity
  • Xfce
  • Other (list in comments)

Cast Your Vote>>
 

Sponsored Resource

Built-in Protection for Big Data Environments
As organizations plan big data projects, business and IT leaders must recognize that data security cannot simply be added later--it must be built into big data implementations from the start. This ebook walks through the requirements of big data security.
Learn More>> 
 

Follow Slashdot on Twitter and Facebook.

To unsubscribe, click here or send an email to: unsubscribe-213087@elabs10.com
To ensure delivery of this newsletter to your inbox and to enable images, please add slashdot@newsletters.slashdot.org to your e-mail address book or safe senders list.
Slashdot | 594 Howard Street, Suite 300 | San Francisco, CA 94105
To view our Privacy Policy click
here.

 

Tidak ada komentar:

Posting Komentar