1How to Hack: A Step-by-Step Journey (opens in new tab)(live-bug-crowd.pantheonsite.io)2jkestelyn3y ago0
2How Different Hacker Roles Contribute to Crowdsourced Security (opens in new tab)(live-bug-crowd.pantheonsite.io)1jkestelyn3y ago0
3Podcast: Using machine learning to monitor and optimize chatbots (opens in new tab)(oreilly.com)2jkestelyn8y ago0
4To Give A.I. The Gift of Gab, Silicon Valley Needs to Offend You (opens in new tab)(nytimes.com)4jkestelyn8y ago1
6AI May Have Finally Decoded the Bizarre, Mysterious 'Voynich Manuscript' (opens in new tab)(sciencealert.com)3jkestelyn8y ago1
7Pivoting to new opportunities, VoiceLabs recommends Chatbase for voice analytics (opens in new tab)(blog.chatbase.com)1jkestelyn8y ago1
8Your Bot Doesn’t Need Personality, It Needs User-Centric Design (opens in new tab)(chatbotsmagazine.com)1jkestelyn8y ago0
11My summer project: a rock-paper-scissors machine built on TensorFlow (opens in new tab)(cloud.google.com)1jkestelyn8y ago0
12Performing prediction with TensorFlow object detection models (opens in new tab)(cloud.google.com)1jkestelyn8y ago0
13The canonical new book about stream processing (opens in new tab)(cloud.google.com)2jkestelyn8y ago0
14When art meets big data: Analyzing 200K items from the Met in BigQuery (opens in new tab)(cloud.google.com)1jkestelyn8y ago0
15Build your own ML-powered robot arm using TensorFlow and Google Cloud (opens in new tab)(cloud.google.com)3jkestelyn8y ago0