You're up and running!
Next you can update your site name, avatar and other options using the _config.yml file in the root of your repository (shown below ).
The easiest way to...
Because technology is not yet secure for everyone.
Next you can update your site name, avatar and other options using the _config.yml file in the root of your repository (shown below ).
The easiest way to...
There's been a lot of discussion lately about iOS apps showing users modal dialogues requesting that they rate the app on the App Store. Like this (from Eff Your Review):
...Last year, I worked on reverse engineering Android implementations of IMS, the next generation 4G IP based telephony suite of protocols, with Jethro Beekman at Berkeley.
In addition to our technical report on MITM...
We released a technical report on our MITM attack against T-Mobile's WiFi Calling service, which I realized I never linked to this here. This was joint work with Jethro Beekman, another EECS...
Lukas Mathis on the mysterious Gmail checkbox-with-dropdown, and why empirical design is important:
“What Leggett described is exactly how I felt about the widget when I first saw it. I immediately figured out how to...
“Would you like a pocket-size device that reminded you of each appointment and daily event? I would. I am waiting for the day when portable computers become small enough that I can keep one with me at all times. I...
[caption id="attachment_31" align="alignnone" width="500"] Source: Wikipedia (https://en.wikipedia.org/wiki/Ant_colony_optimization)[/caption]
I've been looking at ant-algorithms for pathfinding lately. They're interesting because they are very simple multi-agent search, but some of...
From mrgan.tumblr.com:
Another much-linked chart, this one deemed beautiful enough to grace the cover of a book. An appealing image, certainly. I'm not sure how it relates to flowers, but ok.
Now let's try using the...
From feross.org:
Check out this little GCC gem that I just discovered read about.
...
When GCC identified bad C++ code, it tried to start NetHack, Rogue, or Towers of Hanoi. Failing all three, GCC printed out a...
ASCII from the MIT KEMAR FAQ, circa 1997, on how to apply HRTF impulse responses. (Okay, now I'll move on to something else...)
My time spent playing around with cSound has both delighted me, and made me kind of sad. There's so much more I could learn, and a lot of that is fundamental to really understanding signal processing, digital instrumentation, and computer music....
Download: SOUND_FALL-1.0.tar.gz
GitHub: github.com/christhompson/sound_fall
Place blocks of sound without using your eyes.
Download, start it, and then close your eyes. See what you can build using only your ears.
Requirements: