background preloader

Computers

Facebook Twitter

Automated Prosper Investing with ProsperBot - mtlynch.io. Overview I started investing in peer to peer lending in 2014 through a site called Prosper. I thought peer to peer lending was a neat idea and could potentially earn lucrative returns. When I began, I chose each of my loan investments manually, but over time, I have automated this process by building a lending bot called ProsperBot that invests for me automatically. In this blog post, I’ll give a brief overview of peer to peer lending and walk through the process of building ProsperBot. What is Peer to Peer Lending? Imagine that Alice wants to borrow $3,000 to pay back over the next 5 years.

With peer to peer lending, Alice visits a peer to peer intermediary (such as Lending Club and Prosper). The theory is that by cutting out the bank as the middleman, borrowers can get better rates than from traditional lenders and investors (lenders) can earn better interest than depositing their money in a bank through a savings account or CD. What is ProsperBot Piece by Piece ProsperBot.

TDD/testing

Content Management System. Full Stack. Live editing. React. Odd. Rights of Man - Wikipedia. Rights of Man (1791), a book by Thomas Paine, including 31 articles, posits that popular political revolution is permissible when a government does not safeguard the natural rights of its people. Using these points as a base it defends the French Revolution against Edmund Burke's attack in Reflections on the Revolution in France (1790).[1] It was published in two parts in March 1791 and February 1792.[2] Background[edit] Arguments[edit] Paine argues that the interests of the monarch and his people are united, and insists that the French Revolution should be understood as one which attacks the despotic principles of the French monarchy, not the king himself, and he takes the Bastille, the main prison in Paris, to symbolise the despotism that had been overthrown.[3] Human rights originate in Nature; thus, rights cannot be granted via political charter, because that implies that rights are legally revocable, hence, would be privileges: ...

Reformation of English Government[edit] Heredity[edit]

Browser extension

Moderate screen use 'boosts teen wellbeing' Image copyright Thinkstock A study of screen time and mental wellbeing among teenagers has suggested moderate use of devices may be beneficial in a connected world. The researchers collected self-reported data from 120,000 English 15-year-olds about their digital device habits. They found a "Goldilocks effect" where a few hours of device-use seemed to boost mental wellbeing. One developmental psychologist welcomed the paper but said there was still room for more study. "Moderate engagement in digital activities is not harmful," notes the paper, published today in the journal Psychological Science. In addition, the first hour or two of screen time was actually associated with an increase in mental wellbeing for those using computers, smartphones, video games and watching TV or films. 'Goldilocks effect' Weekday use with a positive effect on wellbeing was described as follows: The effect was boosted at weekends, with the peak lasting up to four hours and 50 minutes when watching TV.

Letter wars. Design and Implementation of an Intelligent Mobile Game.

Machine learning/nlp/AI

Julian Assange - Google Is Not What It Seems. Google Is Not What It Seems by Julian Assange Google Chairman Eric Schmidt shares a joke with Hillary Clinton during a special "fireside chat" with Google staff. The talk was held on 21 Jul 2014 at Google's headquarters in Mountain View, California. In this extract from his new book When Google Met Wikileaks, WikiLeaks' publisher Julian Assange describes the special relationship between Google, Hillary Clinton and the State Department -- and what that means for the future of the internet. WikiLeaks readers can obtain a 20 percent discount on the cover price when ordering from the OR Books website by using the coupon code "WIKILEAKS". ric Schmidt is an influential figure, even among the parade of powerful characters with whom I have had to cross paths since I founded WikiLeaks.

In some ways the higher echelons of Google seemed more distant and obscure to me than the halls of Washington. I was intrigued that the mountain would come to Muhammad. The stated reason for the visit was a book. Android - Getting Started Guide. Firstly, you’ll need to download the app! Open up the Google Play Storeapp and search for TunnelBear, or click this link (from your Android device) Android will ask permission to continue with the installation Give the device a few moments, the installation will complete. We can now go ahead and open the TunnelBear app You’ll be prompted to create a new TunnelBear account (or log in with one that you’ve already created) Verify your email address.

You’re almost done! Android will display a generic warning during the first connection attempt. Wait for the connection process to finish. You’re now ready to browse the internet privately! Troy Hunt: The beginners guide to breaking website security with nothing more than a Pineapple. You know how security people get all uppity about SSL this and SSL that? Stuff like posting creds over HTTPS isn’t enough, you have to load login forms over HTTPS as well and then you can’t send auth cookies over HTTP because they’ll get sniffed and sessions hijacked and so on and so forth. This is all pretty much security people rhetoric designed to instil fear but without a whole lot of practical basis, right?

That’s an easy assumption to make because it’s hard to observe the risk of insufficient transport layer protection being exploited, at least compared to something like XSS or SQL injection. But it turns out that exploiting unprotected network traffic can actually be extremely simple, you just need to have the right gear. Say hello to my little friend: This, quite clearly, is a Pineapple. What is this “Pineapple” you speak of?! Huh? This isn’t the only way of configuring the thing, but being tethered to the attacker’s PC is the easiest way of understanding how it works. Karma, baby. Library Solutions. Leading, Learning and Linking Through conversations with hundreds of librarians about Linked Data in Libraries and the purpose and promise of BIBFRAME, we at Zepheira have heard three key themes: Awareness and EducationAssessment and Planning (request more information)Action and Exploration In response to these themes, Zepheira now provides several Linked Data and BIBFRAME services focused on Libraries.

In addition, we are the Founding Sponsor of the Libhub Initative (libhub.org). Linked Data and BIBFRAME Practical Practitioner Training Our Linked Data in Libraries and BIBFRAME training curriculum is a modular self-paced series where attendees progress through the courses with a cohort of other information professionals and interact with the Zepheira instructors and team. Linked Data Readiness and Assessment The promise of moving library assets to become visible on the web is exciting. Libhub Initiative Packages Contact us at solutions@zepheira.com to learn more about how Zepheira can help. Deep Learning Is Going to Teach Us All the Lesson of Our Lives: Jobs Are for Machines — Basic income. Deep Learning Is Going to Teach Us All the Lesson of Our Lives: Jobs Are for Machines (An alternate version of this article was originally published in the Boston Globe) On December 2nd, 1942, a team of scientists led by Enrico Fermi came back from lunch and watched as humanity created the first self-sustaining nuclear reaction inside a pile of bricks and wood underneath a football field at the University of Chicago.

Known to history as Chicago Pile-1, it was celebrated in silence with a single bottle of Chianti, for those who were there understood exactly what it meant for humankind, without any need for words. Now, something new has occurred that, again, quietly changed the world forever. Like a whispered word in a foreign language, it was quiet in that you may have heard it, but its full meaning may not have been comprehended. What actually ended up happening when they faced off?

“AlphaGo’s historic victory is a clear signal that we’ve gone from linear to parabolic.” So, what is Go? Fossil: Home. What Is Fossil? Fossil is a simple, high-reliability, distributed software configuration management system with these advanced features: Integrated Bug Tracking, Wiki, and Technotes - In addition to doing distributed version control like Git and Mercurial, Fossil also supports bug tracking, wiki, and technotes.Built-in Web Interface - Fossil has a built-in and intuitive web interface with a rich assortment of information pages (examples) designed to promote situational awareness.

This entire website¹ is just a running instance of Fossil. The pages you see here are all wiki or embedded documentation. Self-Contained - Fossil is a single self-contained stand-alone executable. Links For Fossil Users: "Fuel" is cross-platform GUI front-end for Fossil written in Qt. Links For Fossil Developers: Dana chisnell. Meet CHIP, the $9 computer. Next Thing’s CHIP could be the next big little thing: A $9 literally chip-sized BYOP (Bring Your Own Peripherals) computer that runs a variant of Debian Linux.

The hardware design is Open Hardware, meaning you can study and learn how it works and modify the design, if you want to fabricate your own tiny computer. With nearly a month of backing left, it’s nearing $1 million in Kickstarter funding — far exceeding its target goal of $50,000. Although it is somewhat similar to the successful $35 Raspberry Pi, CHIP has just enough differences to make interesting beyond its ultra-low price. For example, it has WiFi and Bluetooth support built-in. CHIP has 4GB of NAND flash storage built-in. The option that may draw the most interest is the PocketCHIP case (pictured, right). The AllWinner Tech A13-based R8 is a 1GHz single core processor (ARM Cortex A8) designed primarily for use in low-priced Android tablets.

Such Android API levels, much confuse. Wow. – Redth. I have been bitten more than once by the confusion of Android’s many API levels when building Xamarin.Android apps. It gets even more complex when you start referencing other libraries that target different API levels. Just the other day I had an issue come up with AndHUD where the resolution for a runtime error had nothing to do with the code itself. I decided it was time to finally write this post. As if it weren’t confusing enough, Google generally gives three names to every API level: an integer API Level number, a version number, and a delicious sounding dessert name.

For example, Gingerbread was version 2.3 or API Level 9 (also Gingerbread had 2.3.7 and API level 10 as an update). When it comes to your Xamarin.Android apps, it’s important to be aware of all of the spots you can set API levels in your project settings. 1. This setting is arguably the most important one. 2. This one’s pretty simple, it’s the lowest API level that your app will allow itself to be installed and run on.

Instructional Design

Advancements & Innovations. Yes, You Really Can Use WordPress To Build Apps. Mobile App Development. Automation/Productivity. Back-End. CSS. Javascript. Web Development. Social Engineering 2.0 - Google Algorithm Poses "Serious Threat to Democratic System" By Aaron Dykes Did democracy just get downgraded (yet again)? Social engineering is now a dated practice, that has undoubtedly influenced nearly all our lives for the past century in ways that many of us perhaps don’t notice. I have a book titled Social Control from 1901, by Edward Alsworth Ross, that as the dust jacket explains, “formulated (and gave an answer to) the problems of the massive transformation of the American society by industrialization” where Ross “analyzed the dynamics of social change for modern socieities in general and for America in particular.”

The book was a hit, and influenced economists, scholars, politicians and Progressives. The BBC has an excellent mini-series called The Century Of The Self that explains the huge impact that Edward Bernays and Madison Avenue had in transforming America. But… A simple algorithm could allow Google to swing popular opinion on election candidates or issues by as much as 20%, and beyond according to this report. There is no voting.

Robotics

Raspberry Pi. Julianne Wurm Connecting the Dots - A Picture is Worth a Thousand Words... Un bloqueur de pub pour ceux qui ne supportent plus de vivre dans le monde réel. Si vous utilisez des bloqueurs de publicité lorsque vous surfez sur le net, peut-être vous sentez-vous démuni par la vie lorsque vous quittez l'ordinateur pour vous promener dans le monde réel. Vous ne pouvez plus conduire de peur de vous évanouir au volant à cause d'une pub au bord de la route. Écouter la radio est un calvaire, car tomber sur une pub vous fait convulser. Vous êtes au chômage, car votre entreprise fait sa pub dans les médias et comme vous avez des convictions, vous avez choisi de démissionner.

Et vous n'allez plus au supermarché de peur que votre tête explose face à tous ces packagings colorés. Bref, votre vie dans ce XXIe siècle perverti par la publicité est un enfer. Pour le moment, ce système ne fonctionne qu'avec les marques suivantes : Dr. Pour être enfin raccord avec vos convictions et vous lancer dans ce bricolage, le code est disponible ici. Rejoignez les 50782 korbenautes et réveillez le bidouilleur qui est en vous Suivez KorbenUn jour ça vous sauvera la vie.. The internet mystery that has the world baffled. Sleepily – it was late, and he had work in the morning – Eriksson thought he’d try his luck decoding the message from "3301”. After only a few minutes work he’d got somewhere: a reference to "Tiberius Claudius Caesar” and a line of meaningless letters. Joel deduced it might be an embedded "Caesar cipher” – an encryption technique named after Julius Caesar, who used it in private correspondence. It replaces characters by a letter a certain number of positions down the alphabet.

As Claudius was the fourth emperor, it suggested "four” might be important – and lo, within minutes, Eriksson found another web address buried in the image’s code. Feeling satisfied, he clicked the link. It was a picture of a duck with the message: "Woops! Just decoys this way. "If something is too easy or too routine, I quickly lose interest,” says Eriksson. For some, it’s just a fun game, like a more complicated Sudoku; for others, it has become an obsession. Suddenly, the encryption techniques jumped up a gear. Enormous Changes to Google Summer of Code in 2015. By Steve Burge The Google Summer of Code (GSOC) is a progam that has helped many, many open source projects.

Google accepts applications from projects and provides up to $150,000 in stipends to help student developers contribute code. Since it started in 2005, Google estimates that GSOC, has brought together over 8,500 successful student participants from 101 countries and over 8,300 mentors from over 109 countries worldwide to produce over 50 million lines of code. Last year, there was a 10% increase in the program to commemorate its 10th anniversary. This year, there was been far more significant decrease in the size of the program. After seeing reaction to the news on Twitter, I compared the list of accepted projects in 2015 to the list from 2014.

Some the biggest names in open source weren't accepted this year, including Mozilla, WordPress, the Linux Foundation and the Tor Project. The Winners: In GSOC 2015, but not last year The Disappointed: In GSOC 2014, but not this year. Scrum (software development) REST API Resources | Developer Resources. Gitcolony | Build bulletproof software faster.

Scrum (software development) Interesting Search Engines. PCMAG. Applin-Fischer FInal IE2011 I - Applin_Fischer_PervasiveComputingInTimeAndSpace.pdf. Fever° Red hot. Well read. An open-source HTML5 puzzle game engine. Learn Web Design, Web Development, and More | Treehouse.

Design

Bluetooth Keyboard & Mouse with iPad. Setting up Home Sharing on your iOS device - Apple Support. FileBrowserLite. Best remote desktop apps for iPad: Access your Mac or PC from anywhere! | iMore.