The Declaration on the Principles of the Law Governing the Internet is yet another bleak reminder of how far we’ve strayed from Internet Exceptionalism and John Perry Barlow’s 1996 Declaration of the Independence of Cyberspace Compare: “You claim there are problems among us that you need to solve. You use this claim as an excuse […]
This post is not just for technical people: it’s a discussion about what encryption is and how we can bust a few myths going around in the media. No matter your job title, it’s always good to know the signs of bad security so that even if you can’t fix it yourself, you can throw a fit until someone else does.
Below is a pseudo-outline of mixed advice, tricks, and links that should give you a fighting chance in any technical interview. Remember, interviewers aren’t out to get you.
Artificial Intelligence is, as a field of study, larger than Machine Learning. In fact, ML is just a specific subset of AI. I wasn’t too clear on where exactly the line was drawn, but it turns out the accepted industry answer is that you can have AI without ML, but whenever you’re doing ML, that’s a form of AI.
Knowing more about the internals of a problem can lead to better understanding and discussion across the board. Most algorithms that you’ll come across in practice aren’t going to be as simple as to fit into any one of these categories, but understanding the pieces of them allows you to get a better grasp of the system as a whole.
Let me repeat that, algorithms aren’t scary. There’s this whole negative idea going around the media that algorithms are running our lives: how we work, how we relax, how we interact with our surroundings, and even how we date and form interpersonal relationships. They’re correct about how deeply technology influences our society but where […]