Titus Blair

Kingdom Work

Month: October 2016 Page 1 of 4

PM2.5 exposure possibly leads to 1.37 million people’s premature death


Google AI invents its own cryptographic algorithm; no one knows how it works

Google Brain has created two artificial intelligences that evolved their own cryptographic algorithm to protect their messages from a third AI, which was trying to evolve its own method to crack the AI-generated crypto. The study was a success: the first two AIs learnt how to communicate securely from scratch…


Direct link to research…


Scientists discover elixir of youth – for mice – and begin tests on humans

Scientists in the US claim to have discovered a natural compound found in avocado, broccoli and cucumber that has “remarkable anti-ageing effects in mice” – and could also work on humans…


Bill Gates: He eats Big Macs for lunch and schedules every minute of his day – meet the man worth $80 billion

Gates’s timetable is planned for him, in the style of the US president, on a minute-by- minute basis. Long days are carved into five-minute slices, with every meeting and handshake timed to the second. Where possible, he clings to routine…


The App Launch Checklist

Actionable insights on how to successfully launch and grow your app.

There are so many things to think about! When should you start working on your press kit? What is the best way to track your acquisition channels? How can you get featured on Product Hunt?

Check out this awesome list!


Welcome to Asgardia, the first ever space nation – a global, unifying and humanitarian project.


Who Should a Startup Hire First?


Full Self-Driving Hardware on All Teslas

I was jumping for joy at the end of the video, you have to check it out! #tesla #selfdriving


How brushing your teeth could help prevent a heart attack


Reverse Engineering Native Apps by Intercepting Network Traffic

The ability to debug web applications is baked into every major browser – just click Inspect Element and you’ll see lots of information. It’s not quite as easy to do this with native apps, especially if you don’t have their source code. I’d like to show you how to understand the behavior of an application by inspecting its network requests (with or without SSL). I’ll also discuss some security implications relevant to developers who are building their own API (private or public).


Page 1 of 4

Powered by WordPress & Theme by Anders Norén