Forgot your password?
typodupeerror

Comment: Give WEKA a try (Score 2) 56

by AlienSexist (#47251925) Attached to: Microsoft To Launch Machine Learning Service
WEKA is Open Source, has an adequate GUI, many different kinds of algorithms available, and a "knowledge flow" visual designer for you to chain it all together. I've used it in a few personal and professional projects to find things like which variables most strongly influence an outcome, decision trees, derived formulas and expressions that accurately predict outputs from inputs, and various kinds of data visualizations for clustering data samples. Code is in Java so I presume you could embed it within a system to automatically perform analysis and swap algorithms on the fly. Best of all, since this is software under your control, and not a Corporate-offered service, your valuable data never leaves your control.

I think WEKA already did a lot to make these kinds of data analysis accessible as Microsoft is aiming to do. No matter who provides it to you, there is something totally awesome about being able to click a few buttons and get some interesting results to munch on.

+ - Ancient Roman Military Camp Unearthed in Eastern Germany->

Submitted by sciencehabit
sciencehabit (1205606) writes "Archaeologists have confirmed the presence of a long-lost Roman military camp deep in eastern Germany. The 18-hectare site, found near the town of Hachelbich in Thuringia, would have sheltered a Roman legion of up to 5000 troops. Its location in a broad valley with few impediments suggests it was a stopover on the way to invade territory further east. “People have been searching for evidence of the Romans in this part of Germany for 200 years,” says team leader Mario Kuessner, an archaeologist working for the state of Thuringia. “It took a long time before we realized what we had, and we wanted to be sure.”"
Link to Original Source

+ - 5 years old bug in Linux kernel fixed-> 1

Submitted by rastos1
rastos1 (601318) writes "Ars Technica takes a look at serious bug in the Linux kernel that was introduced in 2009. "The memory-corruption vulnerability, which was introduced in version 2.6.31-rc3, released no later than 2009, allows unprivileged users to crash or execute malicious code on vulnerable systems, according to the notes accompanying proof-of-concept code available here. The flaw resides in the n_tty_write function controlling the Linux pseudo tty device." This flaw has been identified as CVE-2014-0196."
Link to Original Source

Comment: My experience is mixed (Score 1) 466

Having worked with and managed a number of programmers over the years I've had the privilege of working alongside a number of truly gifted people. But for every rock star there are far more mediocre and inept persons for the role. On the lower-end of the quality I've seen work so shoddy that it was insulting - those people don't last long in the role but might be suitable for other positions. We try our hardest to retain the top talent but sometimes they just like to wander from project to project for their own interests. Thankfully they seem to like us enough that they always consider coming back after they've had their walkabout.

Not starting a religious war here, but the only pattern I can offer is that those lacking any formal education (self-taught/hobbyist) and those whose primary skill and experience is PHP have had the most disappointing performance. Those among the best performers stay current and attend technical conferences & seminars on topics that interest them. One particular symposium that yields great results for our team and projects has been No Fluff Just Stuff YMMV.

+ - NSA Tampers With US Made Routers Before Export 7

Submitted by Bob9113
Bob9113 (14996) writes "According to Glenn Greenwald, reporting at The Guardian: 'A June 2010 report from the head of the NSA's Access and Target Development department is shockingly explicit. The NSA routinely receives – or intercepts – routers, servers, and other computer network devices being exported from the US before they are delivered to the international customers. The agency then implants backdoor surveillance tools, repackages the devices with a factory seal, and sends them on. The NSA thus gains access to entire networks and all their users. The document gleefully observes that some "SIGINT tradecraft is very hands-on (literally!)".'"

+ - What Caused a 1300-Year Deep Freeze?->

Submitted by sciencehabit
sciencehabit (1205606) writes "Things were looking up for Earth about 12,800 years ago. The last Ice Age was coming to an end, mammoths and other large mammals romped around North America, and humans were beginning to settle down and cultivate wild plants. Then, suddenly, the planet plunged into a deep freeze, returning to near-glacial temperatures for more than a millennium before getting warm again. The mammoths disappeared at about the same time, as did a major Native American culture that thrived on hunting them. A persistent band of researchers has blamed this apparent disaster on the impact of a comet or asteroid, but a new study concludes that the real explanation for the chill, at least, may lie strictly with Earth-bound events."
Link to Original Source

Comment: JVM-based languages like Scala, Groovy, Clojure (Score 2) 177

by AlienSexist (#46943655) Attached to: Programming Language Diversity On the Rise
... would further inflate Java's domination of the stats. Java as the core is very strong. I'm seeing increasing adoption of (and job offerings for) the JVM-based languages though. If you don't already know about it, ThroughtWorks has a wonderful semi-annual Technology Radar comprising their consultancy's experience and evaluations of various tech.

+ - AMD Is Adding Games onto Your Games

Submitted by cagraham
cagraham (3027657) writes "AMD has a new program designed to reward users for playing video games. Every time a member of it's AMD Rewards program begins playing a new game in a 24 hour period, they'll get five "Raptr Points." They'll then receive an additional two points for every twenty minutes of play. Eventually, they can redeem these for AMD hardware, or discounts on products. The whole program is tied into their Gaming Evolved app, that helps people find the perfect gameplay settings for their hardware.

A loyalty program for video games — genius, or overkill?"

Comment: What about cheat haters? (Score 1) 373

by AlienSexist (#46266505) Attached to: Report: Valve Anti-Cheat (VAC) Scans Your DNS History
I've known gamers to frequent cheat sites just to see what the cheaters are using and what is possible to exploit When a legitimate player suddenly faces inexplicable challenges sometimes they go find where people are downloading their skills/advantages from in order to explain their new struggles. Often times it starts with the feeling "that HAS to be a cheat" then digging around finding if there is a cheat the enables that behavior.

Thus spake the master programmer: "When a program is being tested, it is too late to make design changes." -- Geoffrey James, "The Tao of Programming"

Working...