Humans Fold: AI Conquers Poker’s Final Milestone: https://apple.news/AnvlTtUvoSHW3Sw2Y1kJtkA
(original)
Hello!🙃 I'm Jessica and this is my passion!😊🖌️
💪🏽#PortfolioDay pic.twitter.com/IbXDsZz5N7
— Painthisice (@Painthisice) July 10, 2019
Sean Hollister writing for The Verge
Even if you say “no” to one app when it asks for permission to see those personally identifying bits of data, it might not be enough: a second app with permissions you have approved can share those bits with the other one or leave them in shared storage where another app — potentially even a malicious one — can read it. The two apps might not seem related, but researchers say that because they’re built using the same software development kits (SDK), they can access that data, and there’s evidence that the SDK owners are receiving it. It’s like a kid asking for dessert who gets told “no” by one parent, so they ask the other parent.
.
Seeing Toy Story 4 with the kids
Here’s the heavy Sword attack animation IRL from @Bungie @DestinyTheGame This one was a lot of fun to replicate.l😎 #animation #mocap #destiny2 #Guardiancon2019 #martialartist pic.twitter.com/DTV0qwiaWl
— James Newman (@IRL_Guardian) July 5, 2019
First go at me replicating the Arcstrider activation animation. WAY more to come and better videos. I want to match the way we see it in game but just wanted to share something😎🤙🏼🤙🏼 @Bungie @DestinyTheGame #hunter #arcstrider #animation #mocap pic.twitter.com/TnDIvOiSBs
— James Newman (@IRL_Guardian) June 27, 2019
Sarah Krouse and Patience Haggin writing for WSJ
Internet providers could learn that someone in a household is using online dating services, or deduce that a person is engaged by the number of visits to wedding-planning websites. By combining web activity with voter-registration data, a provider could theoretically identify households with a 25-year-old on the cusp of needing health insurance, and show those households ads for coverage, say ad executives and privacy advocates. In general, marketers are willing to pay a premium for such hypertargeted ads.
Martin Regg Cohn writing for The Star:
Second, Ford’s intervention caused catastrophic harm to the utility’s takeover of U.S.-based Avista Corp., because local state regulators concluded that the Ontario government was calling the shots rather than Hydro One management. When they overruled the transaction, it triggered a “kill fee” that cost Hydro One about $139 million, on top of Schmidt’s severance
How Doug Ford upgraded Hydro One’s ‘Six Million Dollar Man’ to a $150 million mess: https://apple.news/A4hEIWNeuR_q7VUwFsfOrDA
(original)
Raymond Zhong writing for The New York Times
The app’s simple design makes the inspection process easy for border officers to carry out. After Fengcai is installed on a phone, the researchers found, it gathers all stored text messages, call records, contacts and calendar entries, as well as information about the device itself. The app also checks the files on the phone against the list of more than 73,000 items.
.
China Snares Tourists’ Phones in Surveillance Dragnet by Adding Secret App - The New York Times: https://www.nytimes.com/2019/07/02/technology/china-xinjiang-app.html
(original)
. source
How iOS 13 FaceTime Attention Correction works: it simply uses ARKit to grab a depth map/position of your face, and adjusts the eyes accordingly.
Notice the warping of the line across both the eyes and nose. pic.twitter.com/U7PMa4oNGN
— Dave Schukin (@schukin) July 3, 2019 How iOS 13 FaceTime Attention Correction works: it simply uses ARKit to grab a depth map/position of your face, and adjusts the eyes accordingly.
Notice the warping of the line across both the eyes and nose.
RT @schukin: How iOS 13 FaceTime Attention Correction works: it simply uses ARKit to grab a depth map/position of your face, and adjusts th…
(original)
Look at NASA trying to cover up the Moon being haunted We all know better. pic.twitter.com/4L5VhfaQNy
— SpartanZero (@SpartanZero__) July 1, 2019
.
.
🇨🇦 Day celebrations 🎉
These images are unreal.