While “Software to discover equations and mathematical relationships in data” isn’t at the top of our christmas wish list, we have to admit that Eureqa is pretty cool. Developed at Cornell University, Eureqa uses machine learning algorithms to determine the underlying math behind data sets. It derived Newton’s second law of motion in a few hours on … Read the rest
[Sprite_tm] has whipped up yet another interesting tutorial – software-based this time. He basically describes how he connected his Wiimotes to an HTPC. A USB Bluetooth receiver, and a little bit of Linux scripting, was all that was necessary to get the system up and running. To add to the fun, [Sprite_tm] configured a the controllers to work … Read the rest
Have you heard the latest track by gzip? Maybe it’ll end up on a “Greatest Hits” album alongside Philip Glass.
Visualization techniques such as animated algorithms can help programmers better grasp the abstract theories that make software work. Could auralization, the sound equivalent of visualization, provide similar insights? Postgrad student (and J. S. Bach fan) [Cessu] developed a program to … Read the rest
Fritzing is an open source project designed to help you move from a prototype to a finished project. Aimed at those basing their projects around Arduino, you start by building your physical prototype, then recreate it with Fritzing software’s graphical editor. From there you can generate a schematic, PCB artwork, and PCB production files.
[thanks CH]… Read the rest
Everybody hates it when they have to rename a fileset to fit a new naming scheme. Instead of doing it the hard way and writing a one-time script to go through and rename everything, check out Bulk Rename Utility from [Jim Willsher]. It provides you with a multitude of methods to take care of business and allows you do … Read the rest
[Kyle McDonald] sent in his latest project, a software keylogger that twitters what you type. He wrote it using C++ and OpenFrameworks. It logs each keystroke, then it posts to twitter 140 characters at a time. To protect himself, he set up a whitelist of private strings like passwords and credit card numbers that would be stripped before … Read the rest