Twitter went into an uproar Friday after a BuzzFeed report that the social network was on the brink of tossing its traditional timeline for a Facebook-style feed. Twitter CEO Jack Dorsey tried to calm fears this morning in a series of tweets, but
All the hashtag angst and insider commentary regarding Twitter’s potential timeline changes finally came to a head on Saturday, forcing the company’s CEO,Jack Dorsey to finally weigh in on the matter
Twitter is a place filled with #content. And sometimes (read: frequently), that #content also has at least tinge of #sarcasm. So it’s no surprise that two computer scientists found away to use Twitter’s proclivity for dry humor to help teach computers to identify when people are being sarcastic over text. In the paper, titled “Contextualized Sarcasm Detection on Twitter,” researchers said that they trained their computers to detect sarcasm based on a variety of factors, including keywords ( “clearly,” “shocked,” “gasp”) as well as hyperbole (“really”) and even hasthtags like “#lol” and, yes, “#sarcasm.” The computers also analyzed for a variety…
Rob Joyce runs the NSA’s Tailored Access Operations group, the spies who figure out how to hack systems, publishing a spook’s version of the Skymall catalog, filled with software and hardware that other spies can order for use. (more…)
With consumer-ready devices hitting the market and artists creating gobs of interesting content, VR looks poised to take off.
Over the past several years few individuals operating in the anti-piracy space have received more press than Henrik Pontén. Loved by rights-holders and hated by many pirates in equal measures, Pontén has been a thorn in the side of dozens of file-sharing sites.
The chief lawyer of Rights Alliance, which counts major Hollywood studios among its members, Pontén has definitely made a unique mark on file-sharing history.
FBI’s war on encryption is unnecessary because the Internet of Things will spy on us just fine
The war on encryption waged by the F.B.I. and other intelligence agencies is unnecessary, because the data trails we voluntarily leak allow “Internet of Things” devices and social media networks to track us in ways the government can access.
Vía Erkan’s Field Diary http://ift.tt/1S8AGot
Filed under: Uncategorized
No comments:
Post a Comment