Skip to main content
 

Checked into Ski Dagmar

Zoey and Lisa are running the 5K Foam Fest πŸƒβ€β™€οΈ

 
 
 
 
 

Well, think I'm done with Dropbox now. I switched all my stuff to iCloud Drive quite a while ago, so I really have no need to have it on my computers anymore. https://arstechnica.com/gadgets/2019/07/dropbox-silently-installs-new-file-manager-app-on-users-syst...

 
 
 
 
 
 
 

Trump certainly is running the country like one of his companies https://www-m.cnn.com/2019/07/12/politics/mnuchin-congress-letter-debt-crisis/index.html

 
 
 
 

Humans Fold: AI Conquers Poker's Final Milestone

Jeremy Hsu writing for Scientific American

So Pluribus instead deployed its depth-limited search, which considers how opponents might choose among only four general betting strategies: the precomputed blueprint, one biased toward folding, another biased toward calling and a fourth biased toward raising. This modified search helps explain why Pluribus’s success in six-player poker required relatively minimal computing resources and memory in comparison with past superhuman achievements in gaming AIs. Specifically, during live poker play, Pluribus ran on a machine with just two central CPUs and 128 gigabytes of memory. β€œIt’s amazing this can be done at all, and second, that it can be done with no [graphics processing units] and no extreme hardware,” Sandholm says. By comparison, DeepMind’s famous AlphaGo program used 1,920 CPUs and 280 GPUs during its 2016 matches against top professional Go player Lee Sedol.

 
 
 

Thousands of Android apps can track your phone — even if you deny permissions - The Verge

Sean Hollister writing for The Verge

Even if you say β€œno” to one app when it asks for permission to see those personally identifying bits of data, it might not be enough: a second app with permissions you have approved can share those bits with the other one or leave them in shared storage where another app β€” potentially even a malicious one β€” can read it. The two apps might not seem related, but researchers say that because they’re built using the same software development kits (SDK), they can access that data, and there’s evidence that the SDK owners are receiving it. It’s like a kid asking for dessert who gets told β€œno” by one parent, so they ask the other parent.