Garden

~A Moment To Remember~

Marchine Learning Syllabus Part1

What is Machine Learning? Two definitions of Machine Learning are offered. Arthur Samuel described it as: “the field of study that gives computers the ability to learn without being explicitly programmed.” This is an older, informal definition. Tom Mitchell provides a more modern definition: “A computer program is said to learn from experience E with respect to some class of tasks T and performance measure P, if its performance at tasks in T, as measured by P, improves with experience E.

Set Up ChinaDNS with DNS over HTTPS on macOS

Because of shortage of UDP, it’s very often to get false DNS results. So I use 1.1.1.1 with DNS over HTTPS as my DNS server and I also set up ChinaDNS to get a faster experience since many websites use CDN nowadays. At the same time, I use Dnsmasq to cache DNS results.

.. / .-.. --- ...- . / -.-- --- ..- / -- .- -- .-

其实近两年我经常和母亲通话,很频繁,一周可能有3-4次。我们谈了很多,会谈她上学时候的事,谈她刚开始工作的事,谈男孩子追她的事,会谈她的哥哥姐姐妹妹弟弟。

Using Duplicity With Google Drive for Backup on macOS

Duplicity uses librsync for incremental backup which is space efficient. When I installed duplicity from homebrew and tried to backup to Google Drive with pydrive, there was always an error that httplib2 module could not be found, even if it was installed already. So I installed duplicity manually and this article records a brief process of configuring and using duplicity with Google Drive on macOS High Sierra.

Can Ethereum Be Replaced Easily by a New Efficient Blockchain?

There are some technical highlights of Ethereum.

Usuability

The api of Ethereum is very simple and its protocol is understandble as well. If you want to make a better blockchain, firstly you have to achieve a easy-to-use VM, a programming language, a script for parameter serialization and deserialization, a data structure for storing information, leveldb interface and protocols.

Threat Modeling for Proxy Software

Key Cracking

If software uses modern encryption protocols like AES or CHACHA20, then there are no known ways to crack. It means that even if we get unencrypted text and its corresponding encrypted text, we cannot get the key used for encryption, no matter how much text we get.