Published inNashSecurity tokensHow Nash views regulation in the new digital economySep 6, 201810Sep 6, 201810
Published inProof of WorkingCoZ Software Bounty ProgramThe City of Zion is excited to announce our first software bounty program. Through this program, we aim to encourage the targeted…May 2, 2018May 2, 2018
Published inProof of WorkingGuidelines for Responsible Token SalesToken sales allow developers to raise capital without the friction associated with traditional venture capital investment. As a force for…Nov 10, 20173Nov 10, 20173
Published inHackerNoon.comA Conversational Agent for Data ScienceScience fiction has long imagined a future in which humans converse with machines. But what are the limits of conversational interfaces…Jul 12, 20171Jul 12, 20171
Published inHackerNoon.comLong-term Trends in the Public Perception of Artificial IntelligenceArtificial intelligence has a long history of boom and bust cycles.Feb 3, 2017Feb 3, 2017
Published inHackerNoon.comWhat’s in an Inauguration Speech? A Lexical Analysis via EmpathLast year we published Empath, a tool for text analysis, which was fortunate enough to win a Best Paper award at CHI. Empath allows…Jan 22, 20173Jan 22, 20173
The Best Fiction I Read in 2016I read fewer books in 2016 than I have in the past (30 or so novels, which is half what I used to consume during high school or college)…Jan 5, 2017Jan 5, 2017
On Introductions and Research PapersFirst impressions matter. Whether you are reading this paragraph, or the first page of a novel, or the introduction of an academic paper…Jul 5, 2016Jul 5, 2016
A Student’s Guide to PC MeetingsWhen I was a new PhD student, program committee (PC) meetings were colored by a sense of power and mystery. Expert judgements, backroom…Jun 28, 2016Jun 28, 2016