Crunk. Hyphy. Death Rap. There is a subgenre of hip-hop for everyone, and for the past 10 years, geeks, hackers and gamers have had nerdcore—that sometimes-impressive, sometimes-cringeworthy lyrical ledger of rapid-fire references to anime, gaming, hacking, cosplay and programming.
But even within nerdcore, there are subdivisions, like CS rap: songs specifically for coders and Read More
Google’s artificial intelligence firm, DeepMind Technologies, has been making headlines with a computer that can program itself, a quest for “AI scientists” and software that can learn to play classic Atari games better than a human expert.
Today, a video showing their famed software learning to play Breakout and mastering nine other Atari games including Enduro, Boxing and Demon Attack has resurfaced online. Although it was uploaded to YouTube last April, it seems it’s finally receiving the attention it deserves. Read More
Arrangement Finders is a dating site catering to a very specific clientele: wealthy, heterosexual men, and the women who want to date them.
Founded in 2009, the site announced on Friday it was bringing on porn performer and producer Kayden Kross as its new president. We caught up with Ms. Kross to congratulate her on the new position, as well as hear the latest about the burgeoning sugar daddies site. Read More
C-SPAN, that much-ignored trove of treasures hidden beneath uncountable hours of bureaucratic pomp and process, has served up another gem for the annals of tech history.
A new company called Bond specializes in helping busy people keep communication with loved ones personal. Simply type up a note you’d like to send someone, and Bond will put it on stationary in a curly cursive or other friendly font and mail it for you. It’s like in the movie Her, except the message contains your own sentiments. Oh yeah, and it can also be written in your own handwriting, if you so choose.
Bond has made this possible by building a fleet of robots that can identically copy a person’s handwriting. These are more than the simple autopens that have been signing signatures for decades; these robots go beyond replication, using software that actually learns all the intricacies and imperfections of a handwriting sample—from the way one connects letters to the spaces between words and lines—to produce writing indistinguishable from something the person would’ve written himself. Read More
Uber has always dodged taxi regulation with a Silicon Valley pitch that they’re not a taxi company, they’re a “platform” for connecting drivers to riders. Finally, India has gotten them to drop the shtick.
On Wednesday, Uber applied for a license under New Delhi’s Radio Taxi Scheme, according to an Uber blog post published late last night. In order to comply with the local laws, Uber is going to have to add a panic button to their app, have over 200 cars on the road and maintain a 24-hour call center. Read More
If there’s anything that Netflix, Tumblr and the Internet in general have taught us, it’s that laziness knows no bounds. Still, sometimes we all wish that there was a way to make the Internet do your bidding without actually having to type things out.
Luckily, Internet of Things (IoT) company Spark, a startup that makes kits and cores for building smart devices, is now selling something they call the Internet Button. It’s a physical, light-up, WiFi-enabled button that you can easily program to execute a single, potentially evil command—any command you need, like: Read More
As the President pushes dated cybersecurity legislation and Band-Aid solutions, the Department of Defense reminds us that we have much bigger threats to our cybersecurity than shared our HBO Go passwords.
After a year of running dozens of tests and simulations on over 40 military weapons systems, Pentagon Director of Operations Test and Evaluation (DOT&E) Michael Gilmore found that almost all of them have some kind of major cybersecurity weakness.
“Cyber adversaries have become as serious a threat to U.S. military forces as the air, land, sea, and undersea threats represented in operational testing for decades,” Mr. Gilmore wrote in his annual report for 2014. “Any electronic data exchange, however brief, provides an opportunity for a determined and skilled cyber adversary to monitor, interrupt, or damage information and combat systems.” Read More