- CompSci Weekend SuperThread (August 18, 2017)
- It is settled, Norbert Blum's proof that P does not equal NP is false.
- Guys, seriously..(how) do you review test files?
- On Norbert Blum’s claimed proof that P does not equal NP
- What is Computer Science?
- A Self-Organizing Prediction Algorithm
- How data processing needs drove cloud computing development, including connecting the Titan HPC
- Conal Elliott - Teaching New Tricks to Old Programs -- YOW! Lambda Jam 2017
- The traveling salesperson algorithm routing 260,000 grocery deliveries a week

- An Introduction to Quantum Computing, Without the Physics
- A Solution of the P versus NP Problem
- Indicators of Problem Design
- Whats your thoughts on A.I.? Future A.I.?
- German professor says he has proven that P!=NP
- A Conversation with Alan Kay
- Discrete tomography and Z3 SMT-solver
- CompSci Weekend SuperThread (August 11, 2017)
- Algorithm trims communication, accelerates massive matter simulations
- Constructing a Domain Specific Language using a Petri-Net
- IBM PC: The complete history, part 1
- I want to write a book on "casual" logic for people with no background. Would anybody be...
- [pdf] Real-Time Anomaly Detection for Streaming Analytics
- [PDF] Elementary proof of the Stirling Approximation Formula
- CompSci Weekend SuperThread (August 04, 2017)
- FP Conf, Compose :: Melbourne 2017 — August 28-29th (x-post /r/haskell)
- Chinese team breaks record for largest virtual universe

- Access to internal Machine via RDP/WEB
- Testing/Reviewing new software for malicious activity
- National Cyber Security Strategy 2016 - 2021
- A Burp Suite Automation Tool with Slack Integration
- WannaCry hero gets bail; pleading not guilty over Kronos malware
- WSJ: 'The Man Who Wrote Those Password Rules Has a New Tip: N3v$r M1^d!'
- Anti-Virus software, Free vs Paid
- Which is better for Windows 8- Microsoft Defender or AVG Antivirus?

- Can I ask a really dumb question?
- Details leaked on CIA's "Aeris" malware for Debian, RHEL, CentOS, Solaris, and FreeBSD.
- Running Linux off USB Stick
- When companies get hacked, should they be allowed to hack back?
- Tips for Applying Security Patches Network wide
- How I learned to stop worrying and love my threat model
- Operating Systems
- using random numbers
- how does one deal with / test suspicious email links?
- The RNC Files: Inside the Largest US Voter Data Leak
- Can I block all tcp connections to specific domains from my computer?
- Why Car Companies Are Hiring Computer Security Experts
- Bruce Schneier takes to the stage at Infosecurity Europe 2017
- FalconGate - Open source security for home networks
- Hacked by a family member: What tool(s) can I use to require an additional password for "my...
- What are SaaS Applications doing to keep customer's data safe from attacks like Malware?
- Proper way to restrict access to SMB Shares

- PySwarms - an open-source research toolkit for Particle Swarm Optimization in Python
- Mechanism designs for scheduling problems? Are they translated into use in practice?
- Pilots have an unmatching algorithm
- Can't install Google Operation Research Tools [Help]
- Python-based solver for the policy- and path-based "SOTA" problems: planning routes over a graph...
- "Aether: Leveraging Linear Programming For Optimal Cloud Computing In Genomics", Luber et al 2017
- GLPK was used in the proof of the 300 year old Kepler conjecture

- Advice for transitioning into Operations Research
- University of Toronto Operations Researchers build Optimization Web App for NHL Expansion Draft.
- Graphical Linear Programming
- Documentaries about airport design optimization?
- Solving the vehicle routing problem with split delivery
- "Scalable Planning with Tensorflow for Hybrid Nonlinear Domains", Wu et al 2017
- How to make a constraint linear?
- Looking for good heuristic algorithms for vehicle routing problems.
- Definitive resources and research for Queueing Theory?
- What are some cool problems in Operations Research for which Algorithms have not been developed yet?
- Mobile ordering
- safety schools for operations research?
- Standard resources for keeping up with the field?
- Heat map to visualize the score of a fitness function in a constraint solver
- Water LP
- Algorithm formulation for an assignment problem
- Adding time windows to a nearest neighbour heuristic for vehicle routing.
- Production Planning

- Scheduling algorithm for recurring basis
- What are the pros and the cons of DFS and BFS in graph theory?
- On Norbert Blum’s claimed proof that P does not equal NP
- Is this problem NP hard?
- A Solution of the P versus NP Problem
- Seeking algorithm to solve: Traversing weighted map with multiple entities
- Fairy Dust, Pandora’s Box… or a Hammer (response to Cathy O'Neil)
- The Machine Learning Abstracts: Support Vector Machines

- Advice for a noob
- P=NP Official description problem is easy?
- Why We Need Accountable Algorithms
- Depth-first search in a graph with memoization of reachable nodes counts
- 3 variable problem with a single equation
- B-tree left prefix pattern matching
- Which Machine Learning Algorithm Should I Use?
- Is there a universal algorithm (or near universal set of algorithms) for finding convergence of...
- Optimal substructure in counting variant of change problem
- Applicable Algorithms for Dating and Relationships
- Finding the respective land plot for a (lat,long) coordinate
- Minkowski for heightmaps ?
- Which data structure for an algorithm using both graph and KD tree features?
- Conquest Problem
- Visualizing Algorithms
- Is there a clever way to find a column permutation that would maximize the matrix trace?
- Creating unique pair sets in random order