Step 1: Install CentOS 7 Linux. Some R packages will not install without an active X window session, so if you are not logged in to a graphical interface on the machine you will need to connect via SSH with X-forwarding enabled, such as with PuTTY and VcXsrv on Windows. Most of this guide must […]
Deus Ex is widely regarded as one of the best computer games of all time, thanks to its immersive dystopian future setting, RPG-style character development, and a story that begins with a New York terror attack (before 9/11 happened), a genetically-designed disease outbreak (before CRISPR), and real conspiracy theories like global internet surveillance (before Snowden).
A follow-up to my previous post about the Dell XPS 13 9350. Thermal performance, dynamic brightness control, and a failed BIOS update.
When you visit a website on your computer or mobile device, you are potentially sharing that information with advertisers, hackers, co-workers and governments. Even though the content you are viewing is likely to be encrypted with HTTPS, your metadata (including the URL and IP address of websites you visit, your IP address, the time and […]
Is your Inbox full? Do you want to combine mail from multiple accounts into one convenient location? Are you concerned that your private messages are being stored insecurely (i.e. not encrypted) on a server that could be accessed by your co-workers, the government, or hackers? This tutorial will show you how to download your email […]
Remote sensing is the acquisition of information about an object or phenomenon without making physical contact with the object. In this context it refers to the use of NASA’s orbiting satellite OCO-2 to observe characteristics of the Earth’s atmosphere, specifically the concentration of Carbon Dioxide (CO2).
This essay was written by SFAM, founder of the defunct website cyberpunkreview.com on February 4, 2006. See the original at the Internet Archive. Overview: Since online debate around the Matrix Trilogy has been beaten to death, I’m guessing by now you’ve already long ago made up your mind on whether you liked or hated The […]
In a previous post I showed how a firewall app on Android can prevent metadata leaks when you connect to a wireless network but have not yet connected to your VPN. This guide achieves the same goal with OpenVPN or Torguard Lite on a Linux PC, blocking all outgoing connections and then allowing connections only […]
We recently acquired a Nvidia GTX Titan graphical processing unit (GPU) for statistical computing at work, specifically double-precision floating point operations on the CUDA API. Before I lock it away in the server room I would like to see how it compares to my primary GPU at home – a Nvidia GTX 680, and my […]