Recurrent Models: Decoding Faster with Lower Latency and Higher Throughput

:::info Authors: (1) Soham De, Google DeepMind and with Equal contributions; (2) Samuel L. Smith, Google DeepMind and with Equal contributions; (3) Anushan Fernando, Google DeepMind and with Equal contributions; (4) Aleksandar Botev, Google DeepMind and with Equal contributions; (5) George Cristian-Muraru, Google DeepMind and with Equal contributions; (6) Albert Gu, Work done while at … Read more

Training speed on longer sequences

:::info Authors: (1) Soham De, Google DeepMind and with Equal contributions; (2) Samuel L. Smith, Google DeepMind and with Equal contributions; (3) Anushan Fernando, Google DeepMind and with Equal contributions; (4) Aleksandar Botev, Google DeepMind and with Equal contributions; (5) George Cristian-Muraru, Google DeepMind and with Equal contributions; (6) Albert Gu, Work done while at … Read more

HackerNoon Decoded: How Users Searched in 2024

Seasons greetings, Hackers! As the year 2024 came to a close, we took a moment to reflect on how YOU—our growing community of curious readers and talented writers—engaged with our platform. And what better place to start than by examining how you made use of our search feature last year? Most Searched Tags on HackerNoon … Read more

Discover Funnel Bottlenecks: Step-by-Step Analysis with BigQuery

If you’re running an e-commerce store, you’ve probably been there: people are visiting your site, browsing around, and then… poof, they’re gone without buying anything. Frustrating, right? That’s where funnel analysis comes in. It’s all about figuring out what’s going on at each step of the customer journey and spotting where they’re dropping off. In … Read more

Researchers Develop Promising Method for Collecting Facial Expression Data Through Gamification

:::info Authors: (1) Krist Shingjergji, Educational Sciences, Open University of the Netherlands, Heerlen, The Netherlands (krist.shingjergji@ou.nl); (2) Deniz Iren, Center for Actionable Research, Open University of the Netherlands, Heerlen, The Netherlands (deniz.iren@ou.nl); (3) Felix Bottger, Center for Actionable Research, Open University of the Netherlands, Heerlen, The Netherlands; (4) Corrie Urlings, Educational Sciences, Open University of … Read more

Building Smarter Code: How LLMs Bring Context-Aware Intelligence to IDEs

For years, developers have dreamed of having a coding buddy who would understand their projects well enough to automatically create intelligent code, not just pieces of it. We’ve all struggled with the inconsistent naming of variables across files, trying to recall exactly what function signature was defined months ago, and wasted valuable hours manually stitching … Read more

Gamified Facial Recognition Could Teach Machines to Read Your Emotions More Accurately

:::info Authors: (1) Krist Shingjergji, Educational Sciences, Open University of the Netherlands, Heerlen, The Netherlands (krist.shingjergji@ou.nl); (2) Deniz Iren, Center for Actionable Research, Open University of the Netherlands, Heerlen, The Netherlands (deniz.iren@ou.nl); (3) Felix Bottger, Center for Actionable Research, Open University of the Netherlands, Heerlen, The Netherlands; (4) Corrie Urlings, Educational Sciences, Open University of … Read more

Researchers Think Playing a Game Could Help AI Better Understand Human Emotions

:::info Authors: (1) Krist Shingjergji, Educational Sciences, Open University of the Netherlands, Heerlen, The Netherlands (krist.shingjergji@ou.nl); (2) Deniz Iren, Center for Actionable Research, Open University of the Netherlands, Heerlen, The Netherlands (deniz.iren@ou.nl); (3) Felix Bottger, Center for Actionable Research, Open University of the Netherlands, Heerlen, The Netherlands; (4) Corrie Urlings, Educational Sciences, Open University of … Read more

Selling Niche Tech Products with the Perfect Sales Team—Part 1: Hiring

Yoo gals and boys! Sales. Sales is what brings us together today. More specifically, the sales of Niche Tech Products. So, if you’re launching the next big BioTech breakthrough to turn butterflies into helicopters, or you’ve cooked up a FoodTech solution that transforms flies into fish food—congrats, my friend (or my gal). You’re about this … Read more

Can This Gamified App Train AI to Understand Emotions Like Humans Do?

:::info Authors: (1) Krist Shingjergji, Educational Sciences, Open University of the Netherlands, Heerlen, The Netherlands (krist.shingjergji@ou.nl); (2) Deniz Iren, Center for Actionable Research, Open University of the Netherlands, Heerlen, The Netherlands (deniz.iren@ou.nl); (3) Felix Bottger, Center for Actionable Research, Open University of the Netherlands, Heerlen, The Netherlands; (4) Corrie Urlings, Educational Sciences, Open University of … Read more

How To Make Cross-Chain Tokens Fungible Again: Part I

Introduction The modular maxis say the future of crypto is a million (or more) interconnected domains and users hopping between blockchains like Alice traipsing through Wonderland. Why stick with one chain if you can access cutting-edge tech, novel applications, moonshot returns on staking/liquidity provision, high performance, and ultra-low transaction fees on other blockchains? But moving … Read more

Fortinet FortiGate-VM: Enterprise-class Security for Applications and Workloads Running on AWS

A firewall enables organizations to monitor, filter, and control network traffic and prevent unauthorized access. As an organization grows and expands its cloud footprint, its network grows, making it essential that the firewall has the capacity to expand accordingly. The challenge for CISOs and SecOps teams is finding the right firewall solution without breaking the … Read more

Pro-Rata Mechanisms: Game Theory Insights for Decentralized Exchanges

:::info Authors: (1) Nicholas A. G. Johnson (nagj@mit.edu); (2) Theo Diamandis (tdiamand@mit.edu); (3) Alex Evans (aevans@baincapital.com); (4) Henry de Valence (hdevalence@penumbra.zone); (5) Guillermo Angeris (gangeris@baincapital.com). ::: Table of Links Abstract and Introduction 1 The concave pro-rata game 1.1 Symmetric pure strict equilibrium 1.2 Uniqueness of equilibrium 1.3 Equilibrium payoff 2 Batched decentralized exchanges 2.1 Arbitrage … Read more

The TechBeat: With Gelsinger’s Departure, Could Intel Be Headed Towards a Stock Surge? (1/14/2025)

How are you, hacker? 🪐Want to know what’s trending right now?: The Techbeat by HackerNoon has got you covered with fresh content from our trending stories of the day! Set email preference here. ## With Gelsinger’s Departure, Could Intel Be Headed Towards a Stock Surge? By @journalistic [ 4 Min read ] Intel shares have … Read more

OpenVPN is Open to VPN Fingerprinting: Appendix

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

OpenVPN is Open to VPN Fingerprinting: Acknowledgement and References

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

OpenVPN Detection Risks: Scaling Attacks and Calls for Stronger Obfuscation

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

Mitigating OpenVPN Fingerprinting: Risks and Defensive Strategies

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

Study Flags OpenVPN Flows with High Accuracy and Minimal False Positives

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

OpenVPN Obfuscation Flaws: Study Uncovers Detection Vulnerabilities

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

OpenVPN is Open to VPN Fingerprinting: Real-world Deployment Setup

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

Probing UDP and Obfuscated OpenVPN Servers: Leveraging Subnet Proximity

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

Server Churn Insights: Balancing Efficiency and Accuracy in OpenVPN Probing

:::info Authors: (1) Diwen Xue, University of Michigan; (2) Reethika Ramesh, University of Michigan; (3) Arham Jain, University of Michigan; (4) Arham Jain, Merit Network, Inc.; (5) J. Alex Halderman, University of Michigan; (6) Jedidiah R. Crandall, Arizona State University/Breakpointing Bad; (7) Roya Ensaf, University of Michigan. ::: Table of Links Abstract and 1 Introduction … Read more

Efficient linear recurrences on device

:::info Authors: (1) Soham De, Google DeepMind and with Equal contributions; (2) Samuel L. Smith, Google DeepMind and with Equal contributions; (3) Anushan Fernando, Google DeepMind and with Equal contributions; (4) Aleksandar Botev, Google DeepMind and with Equal contributions; (5) George Cristian-Muraru, Google DeepMind and with Equal contributions; (6) Albert Gu, Work done while at … Read more

Efficient Training: Scaling Griffin Models for Large-Scale AI on TPUs

:::info Authors: (1) Soham De, Google DeepMind and with Equal contributions; (2) Samuel L. Smith, Google DeepMind and with Equal contributions; (3) Anushan Fernando, Google DeepMind and with Equal contributions; (4) Aleksandar Botev, Google DeepMind and with Equal contributions; (5) George Cristian-Muraru, Google DeepMind and with Equal contributions; (6) Albert Gu, Work done while at … Read more

Node.js now supports TypeScript, 2024’s JavaScript Rising Stars, and NEW tools – This Week in JS

Hello JavaScript Enthusiasts! Welcome to this week’s edition of “This Week in JavaScript“! What’s on the agenda? Node.js embraces native TypeScript, Shadcn/ui steals the spotlight in JavaScript Rising Stars, and we’ve got new Import Attributes—plus the must-know tools for devs in 2025! Native TypeScript in Node.js: A Game-Changer Starting from Node.js v23.6.0, you can now … Read more

Object Design Checklist: An Index on Software Design Articles

This is an index to already published articles on software design. Some rules must be followed and embraced to create great software designs. This article summarizes them, serving as an index to full stories. TL;DR: Important concepts about Object-Oriented Programming Axioms Build a MAPPER https://hackernoon.com/what-is-wrong-with-software-uh8j3y7k?embedable=true Keep a bijection to real entities: https://hackernoon.com/the-one-and-only-software-design-principle-1x983ylp?embedable=true Definitions https://hackernoon.com/object-oriented-programming-explained-in-5-levels-of-difficulty?embedable=true Corollaries … Read more