../../MikeMacBook.jpg

Plain Ben On Twitter I Stuck All Those Doodlestoguns Together

I stuck all those #DoodlesToGuns together and put them all into a Twitter Moment for easier viewing! I stopped counting but there's like 50 of 'em... Thank you to those who took part, supported with kind words, or simply clicked like 💙https://t.co/HkvUz4t0mt pic.twitter.com/v1A5cZGSdy — Ben (@PlainBen) July 14, 2019

RT @JohnHemmings2: Excellent report on the technical vulnerabilities found in #Huawei’s devices, code, and #5G systems. A superb and highly…

(original)

Humans Fold AI Conquers Pokers Final Milestone

Jeremy Hsu writing for Scientific American So Pluribus instead deployed its depth-limited search, which considers how opponents might choose among only four general betting strategies: the precomputed blueprint, one biased toward folding, another biased toward calling and a fourth biased toward raising. This modified search helps explain why Pluribus’s success in six-player poker required relatively minimal computing resources and memory in comparison with past superhuman achievements in gaming AIs. Specifically, during live poker play, Pluribus ran on a machine with just two central CPUs and 128 gigabytes of memory. “It’s amazing this can be done at all, and second, that it can be done with no $&graphics processing units$& and no extreme hardware,” Sandholm says. By comparison, DeepMind’s famous AlphaGo program used 1,920 CPUs and 280 GPUs during its 2016 matches against top professional Go player Lee Sedol.

Thousands Of Android Apps Can Track Your Phone Even If

Sean Hollister writing for The Verge Even if you say “no” to one app when it asks for permission to see those personally identifying bits of data, it might not be enough: a second app with permissions you have approved can share those bits with the other one or leave them in shared storage where another app — potentially even a malicious one — can read it. The two apps might not seem related, but researchers say that because they’re built using the same software development kits (SDK), they can access that data, and there’s evidence that the SDK owners are receiving it. It’s like a kid asking for dessert who gets told “no” by one parent, so they ask the other parent.

James Newman On Twitter First Go At Me Replicating The

First go at me replicating the Arcstrider activation animation. WAY more to come and better videos. I want to match the way we see it in game but just wanted to share something😎🤙🏼🤙🏼 @Bungie @DestinyTheGame #hunter #arcstrider #animation #mocap pic.twitter.com/TnDIvOiSBs — James Newman (@IRL_Guardian) June 27, 2019

Internet Providers Look To Cash In On Your Web Habits

Sarah Krouse and Patience Haggin writing for WSJ Internet providers could learn that someone in a household is using online dating services, or deduce that a person is engaged by the number of visits to wedding-planning websites. By combining web activity with voter-registration data, a provider could theoretically identify households with a 25-year-old on the cusp of needing health insurance, and show those households ads for coverage, say ad executives and privacy advocates. In general, marketers are willing to pay a premium for such hypertargeted ads.

How Doug Ford Upgraded Hydro Ones Six Million Dollar Man

Martin Regg Cohn writing for The Star: Second, Ford’s intervention caused catastrophic harm to the utility’s takeover of U.S.-based Avista Corp., because local state regulators concluded that the Ontario government was calling the shots rather than Hydro One management. When they overruled the transaction, it triggered a “kill fee” that cost Hydro One about $139 million, on top of Schmidt’s severance