Original Prusa i3 MK3 kit
The Original Prusa I3 MK3 is the successor of the award-winning Original Prusa i3 MK2/S 3D printer. Our previous model is the winner of the 3D Printer Shootout 2017 and 2018 in prestigious MAKE: Magazine and for more than a year, it's the best desktop 3D printer according to 3Dhubs.com Trends. MK2S is also The Best 3D Printer for 2018 in "Workhorse" category on 3DHubs.com Guide with score 9.3 (the highest rated printer overall).
prusa  i3  mk3  3d  printer  kit 
Unum & Posit
Unum is a number format that is similar to IEEE 754 format (floating point numbers) that is publicly proposed by John L. Gustafson in 2013. By August 2013, he had a working unum environment to explain and justify his number system. The book "The End of Error" authored by John in 2015 elaborates his comprehensive proposal to have unums replace floating point numbers for improvement in performance and accuracy. Unum has since evolved. The original Type I provides a compact way to express interval arithmetic. Type II enables a clean mathematic design based on projective reals. The latest version, Posits and Valids, has all the advantages of the original Type I and Type II and is additionally hardware-friendly, making it a favourite among many.
unum  number  computer  floating  point  alternative  gustafson  posit 
3 days ago
Impact of Open Offices on Collaboration | Philosophical Transactions of the Royal Society B: Biological Sciences
Organizations’ pursuit of increased workplace collaboration has led managers to transform traditional office spaces into ‘open’, transparency-enhancing architectures with fewer walls, doors and other spatial boundaries, yet there is scant direct empirical research on how human interaction patterns change as a result of these architectural changes. In two intervention-based field studies of corporate headquarters transitioning to more open office spaces, we empirically examined—using digital data from advanced wearable devices and from electronic communication servers—the effect of open office architectures on employees' face-to-face, email and instant messaging (IM) interaction patterns. Contrary to common belief, the volume of face-to-face interaction decreased significantly (approx. 70%) in both cases, with an associated increase in electronic interaction. In short, rather than prompting increasingly vibrant face-to-face collaboration, open architecture appeared to trigger a natural human response to socially withdraw from officemates and interact instead over email and IM. This is the first study to empirically measure both face-to-face and electronic interaction before and after the adoption of open office architecture. The results inform our understanding of the impact on human behaviour of workspaces that trend towards fewer spatial boundaries.
architecture  collaboration  work  office  open  human  productivity  impact 
3 days ago
Fibonacci Hashing: The Optimization that the World Forgot (or: a Better Alternative to Integer Modulo) | Probably Dance
I recently posted a blog post about a new hash table, and whenever I do something like that, I learn at least one new thing from my comments. In my last comment section Rich Geldreich talks about his hash table which uses “Fibonacci Hashing”, which I hadn’t heard of before. I have worked a lot on hash tables, so I thought I have at least heard of all the big important tricks and techniques, but I also know that there are so many small tweaks and improvements that you can’t possibly know them all. I thought this might be another neat small trick to add to the collection.
algorithms  programming  hash  fibonacci  algorithm 
3 days ago
Vox Product Accessibility Guildelines
Making work accessible creates a better experience across the board. Use this checklist to help build accessibility into your process no matter your role or stage in a project.
vox  accessibility  guidelines  web  dev 
4 days ago
Hierarchy is Detrimental for Human Cooperation | Scientific Reports
Studies of animal behavior consistently demonstrate that the social environment impacts cooperation, yet the effect of social dynamics has been largely excluded from studies of human cooperation. Here, we introduce a novel approach inspired by nonhuman primate research to address how social hierarchies impact human cooperation. Participants competed to earn hierarchy positions and then could cooperate with another individual in the hierarchy by investing in a common effort. Cooperation was achieved if the combined investments exceeded a threshold, and the higher ranked individual distributed the spoils unless control was contested by the partner. Compared to a condition lacking hierarchy, cooperation declined in the presence of a hierarchy due to a decrease in investment by lower ranked individuals. Furthermore, hierarchy was detrimental to cooperation regardless of whether it was earned or arbitrary. These findings mirror results from nonhuman primates and demonstrate that hierarchies are detrimental to cooperation. However, these results deviate from nonhuman primate findings by demonstrating that human behavior is responsive to changing hierarchical structures and suggests partnership dynamics that may improve cooperation. This work introduces a controlled way to investigate the social influences on human behavior, and demonstrates the evolutionary continuity of human behavior with other primate species.
psychology  hierarchy  human  cooperation 
5 days ago
[1808.00659] Chaff Bugs: Deterring Attackers by Making Software Buggier
Sophisticated attackers find bugs in software, evaluate their exploitability, and then create and launch exploits for bugs found to be exploitable. Most efforts to secure software attempt either to eliminate bugs or to add mitigations that make exploitation more difficult. In this paper, we introduce a new defensive technique called chaff bugs, which instead target the bug discovery and exploit creation stages of this process. Rather than eliminating bugs, we instead add large numbers of bugs that are provably (but not obviously) non-exploitable. Attackers who attempt to find and exploit bugs in software will, with high probability, find an intentionally placed non-exploitable bug and waste precious resources in trying to build a working exploit. We develop two strategies for ensuring non-exploitability and use them to automatically add thousands of non-exploitable bugs to real-world software such as nginx and libFLAC; we show that the functionality of the software is not harmed and demonstrate that our bugs look exploitable to current triage tools. We believe that chaff bugs can serve as an effective deterrent against both human attackers and automated Cyber Reasoning Systems (CRSes).
chaff  bugs  security  buggier 
5 days ago
Archiving cryptographic secrets on paper — whitequark’s lab notebook
For storing rarely used secrets that should not be kept on a networked computer, it is convenient to print them on paper. However, ordinary barcodes can store not much more than 2000 octets of data, and in practice even such small amounts cannot be reliably read by widely used software (e.g. ZXing).

In this note I show a script for splitting small amounts of data across multiple barcodes and generating a printable document. Specifically, this script is limited to less than 7650 alphanumeric characters, such as from the Base-64 alphabet. It can be used for archiving Tarsnap keys, GPG keys, SSH keys, etc.
encryption  security  print  secrets  barcode 
5 days ago
What is Nuitka | Nuitka Home
Nuitka is a Python compiler.

It's fully compatible with Python 2.6, 2.7, 3.2, 3.3, 3.4, 3.5, and 3.6.

You feed it your Python app, it does a lot of clever things, and spits out an executable or extension module.
python  compiler  nuitka 
5 days ago
SHAKTI Processor Project
The SHAKTI processor project aims to build 6 variants of processors based on the RISC-V ISA from UC Berkeley (www.riscv.org). The project will develop a complete reference SoC for each family which will serve as an exemplar for that category of processor. While the cores and most of the SoC components (including bus and interconnect fabrics) will be in open source, some standard components like PCIe controller, DDR controller and PHY IP will be proprietary 3rd part IP.
shakti  risc-v  processor 
11 days ago
In praise of the 30-hour work week – Valerie Aurora's blog
I’ve been working about 30 hours a week for the last two and a half years. I’m happier, healthier, and wealthier than when I was working 40, 50, or 60 hours a week as a full-time salaried software engineer (that means I was only paid for 40 hours a week).
30  hour  work  week  valerie  aurora 
17 days ago
Minimalist Feed Reader - Miniflux
Miniflux is a minimalist and opinionated feed reader.
miniflux  rss  reader 
17 days ago
modm barebone embedded library
modm (pronounced like dial-up "modem") is a toolbox for building custom C++17 libraries tailored to your embedded device. modm generates startup code, HALs and their implementations, communication protocols, drivers for external devices, BSPs, etc… in a modular, customizable process that you can fine-tune to your needs.
modm  c++  hal  code  generation  embedded 
17 days ago
Information Civics
Information Civics:
Deconstructing the power structures of large-scale social computing networks
networks  deconstructing  information  civics 
17 days ago
Hewlett-Packard Journals - The Hewlett Packard Archive
The Hewlett-Packard Journal was published in 50 volumes, from 1949 until 1998. The table below features file links (click the year beside any entry) to our on-line versions of this historic publication. In all, there were 479 issues published, if you count the “Special Sputnik Supplement” in 1957
hp  journal  hewlett  packard  digitized  archive 
24 days ago
[1105.4514] Synthesis of Parallel Binary Machines
Binary machines are a generalization of Feedback Shift Registers (FSRs) in which both, feedback and feedforward, connections are allowed and no chain connection between the register stages is required. In this paper, we present an algorithm for synthesis of binary machines with the minimum number of stages for a given degree of parallelization. Our experimental results show that for sequences with high linear complexity such as complementary, Legendre, or truly random, parallel binary machines are an order of magnitude smaller than parallel FSRs generating the same sequence. The presented approach can potentially be of advantage for any application which requires sequences with high spectrum efficiency or high security, such as data transmission, wireless communications, and cryptography.
lfsr  synthesis  parallel  binary  machines 
april 2018
« earlier      
2012 2013 2014 3d acm advice algorithms api app architecture archive arm art article artists audio backup bash best bibliography blog book books browser build business c c++ cli cloud cnc co-op code collaboration command community compiler computer computing concurrency conference control cpu css culture data database david db design dev development distributed diy documentation domain ebook economics editor education electronics emacs email embedded encryption engine engineering essay example fab federated fedora feed file firefoxos font forth fpga framework free freedom functional game generator git github gnu google graphics guide hardware haskell history hosting howto html html5 http indieweb infoq inspiration internet javascript john journal kernel language languages learning library line linux lisp list logic lua lwn mac machine magazine management math mozilla music network news o'reilly online open opensource operating os osx p2p pa paper papers parallel parser parsing pdf pdx people performance philosophy platform plt podcast politics portland practices presentation principles privacy programming project protocol public pycon python radio reader reference regex research resource resources review rss ruby rust scheme science sculpture search security server service shell social software source static storage svg syntax system systems tech technology testing text theory tips tool tools tpp tutorial ui unhosted unix verilog version video virtual visualization vps web wiki windows work writing youtube

Copy this bookmark: