Category: Computers

Sort: Date | Views | Sort Ascending
View:

Tan Le ideaCity10

724 Views0 Comments

Think of Star Wars -- who wouldn't want to use "The Force," firsthand? Tan Le presents the EPOC headset; a device that makes it possible for specially designed computer applications to be controlled and influenced by ...

Recent Developments in Deep Learning

976 Views0 Comments

Deep networks can be learned efficiently from unlabeled data. The layers of representation are learned one at a time using a simple learning module that has only one layer of latent variables. The values of the latent...

CGAL: The Open Source Computational Geometry Algorithms Library

976 Views0 Comments

What's in CGAL: A survey on available data structures and algorithms, as well as examples how and by whom they are used. Topics include Triangulations, Voronoi diagrams, Boolean operations on polygons and polyhedra, a...

Ray Kurzweil “How to Create a Mind”

6.15K Views0 Comments

In How to Create a Mind, The Secret of Human Thought Revealed, the bold futurist and author of The New York Times bestseller The Singularity Is Near explores the limitless potential of reverse engineering the human br...

Authors@Google: Steve Wozniak

734 Views0 Comments

Steve Wozniak talks about his career at Apple as well as his life and new book "iWoz" at Google.

The Next Generation of Neural Networks

1.15K Views0 Comments

In the 1980's, new learning algorithms for neural networks promised to solve difficult classification tasks, like speech or object recognition, by learning many layers of non-linear features. The results were disappoi...

jQuery

801 Views0 Comments

jQuery is a JavaScript library that stands out among its competitors because it is faster, focuses on writing less code, and is very extensible. In this talk, I will explore jQuery and how to use it. I will start off ...

How to Steal a Botnet and What Can Happen When You Do

1.10K Views1 Comments

Botnets, which are networks of malware-infected machines that are controlled by an adversary, are the root cause of a large number of security threats on the Internet. A particularly sophisticated and insidious type o...

Ubuntu Linux

703 Views0 Comments

An overview of Ubuntu Linux given by Mark Shuttleworth at the Ubuntu Linux Developers Summit.

Rich Lesser Knowledge Worker

982 Views0 Comments

Rich Lesser discusses concept of knowledge.

Page 5 of 8« First...34567...Last »