Here are some links to interesting web pages which I have encountered.
This list is gatewayed to
Twitter,
Dreamwidth, and
LiveJournal.
My main blog where I post longer pieces is also on
Dreamwidth.
The canonical URL for this page is
<https://dotat.at/:/feed.html>
.
There's an Atom version at
<https://dotat.at/:/feed.atom>
.
You can get versions with
short or
long links.
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
<<
2013-06
>>
- 2013-06-30: Alice Kober: Unsung heroine who helped decode Linear B.
- 2013-06-30: Delightful puzzles.
- 2013-06-30: Entrepreneurs get better with age.
- 2013-06-30: Apple does not care about your living room.
- 2013-06-30: undupfs: deduplicating layered filesystem.
- 2013-06-30: A eulogy for AltaVista.
- 2013-06-30: Some typography cheat sheets.
- 2013-06-29: A quick review of Google's QUIC.
- 2013-06-29: Google making the Web faster with new transport protocol that reduces round trips.
- 2013-06-29: The scariest library.
- 2013-06-29: c++filt: demangle C++/Java symbols.
- 2013-06-29: G-Cloud: how to win government IT procurement contracts.
- 2013-06-29: Encryption has foiled wiretaps for first time ever, feds say.
- 2013-06-29: Anatomy of a two-compiler bug.
- 2013-06-29: FBI tracking device teardown.
- 2013-06-29: The Stephen Lawrence 'smear' proves that we cannot trust the state to snoop.
- 2013-06-29: Vi Hart on twelve tone music. (YouTube)
- 2013-06-29: The origin of "tweet".
- 2013-06-29: Clojure core.async CSP channels.
- 2013-06-28: A surprising JavaScript memory leak.
- 2013-06-28: First passenger trains start using the new Hitchin flyover.
- 2013-06-28: The changing shape of cinema: a history of aspect ratio.
- 2013-06-28: sed.js: a JavaScript implementation of Unix sed running on node.js.
- 2013-06-28: Snooper's charter has practically zero chance of becoming law, say senior MPs.
- 2013-06-28: Memories of Stasi color Germans' view of U.S. surveillance programs.
- 2013-06-28: AT&T helped the FBI calculate guilt by association.
- 2013-06-28: How to botch TLS forward secrecy.
- 2013-06-28: Useless box with surprises. (YouTube)
- 2013-06-27: Biblical marriage.
- 2013-06-27: Speeding up "counting objects" with bitmap data in Git.
- 2013-06-27: Using bitmaps to accelerate fetch and clone in JGit.
- 2013-06-27: Scaling up JGit.
- 2013-06-26: Everything Jesus said against gay marriage.
- 2013-06-26: How Texas Republicans will crush the Wendy Davis SB5 abortion filibuster.
- 2013-06-26: American legislators are restricted in how they may defend civil liberties against the secret state.
- 2013-06-26: Can Apple read your iMessages?
- 2013-06-26: Perfect forward secrecy and SSL: Intercepted today, decrypted tomorrow.
- 2013-06-26: Why do computers stop and what can be done about it? (1985)
- 2013-06-26: Wendy Davis Texas senate abortion filibuster ends in chaotic dispute over midnight vote.
- 2013-06-26: Marrakech treaty for the blind signed despite efforts of copyright lobby.
- 2013-06-25: Privatising the courts: if anyone needs advice, it's the judiciary.
- 2013-06-25: Why the IRS is targeting open source software groups.
- 2013-06-25: Anglo-Saxon spies: German national security is at stake.
- 2013-06-25: ECHR requires Serbian intelligence agency to reveal electronic snooping data.
- 2013-06-25: Oh, Canada: America's friendly northern neighbor has become a rogue, reckless petrostate.
- 2013-06-25: Proposed Histon Road traffic improvements.
- 2013-06-25: More entries for the computer contradictionary.
- 2013-06-25: Setting up perfect forward secrecy for nginx or stud.
- 2013-06-25: Typhoid Mary.
- 2013-06-25: NixOps: deploy NixOS machines in a cloud.
- 2013-06-25: America's shameful human rights record.
- 2013-06-24: A patent on ad-funded content was upheld in a US court.
- 2013-06-24: Apple's Lightning connector authentication check 'permanently' cracked.
- 2013-06-24: The other Snowden drama: a desire to prosecute journalists.
- 2013-06-24: rss2imap.
- 2013-06-24: Accuweather 25 day long-rage forecast inaccuracy.
- 2013-06-24: Facebook's shadow profiles include personal data of people without Facebook accounts.
- 2013-06-24: Hidden OS X features, tips and tricks.
- 2013-06-24: AudioSerial: JavaScript code to use headphone socket as send-only serial port.
- 2013-06-24: The physics of traffic jams.
- 2013-06-24: Perfect forward secrecy can block the NSA from retrospectively snooping TLS traffic, but no one uses it.
- 2013-06-24: Why Skype is no longer p2p with e2e crypto.
- 2013-06-23: Frontend development bookmarks.
- 2013-06-23: Apart from The Guardian the British press stays silent about mass surveillance.
- 2013-06-23: Why to build your HTTP APIs around linking.
- 2013-06-23: Building LLVM using Shake.
- 2013-06-23: The infinitely profitable program.
- 2013-06-22: The strange case of Barrett Brown.
- 2013-06-22: The mathematics and statistics of Monopoly.
- 2013-06-22: The HoTT book: Homotopy Type Theory.
- 2013-06-22: Two dozen mathematicians wrote a 600 page book in less than 6 months using GitHub.
- 2013-06-22: GCHQ's Master the Internet project. (2009)
- 2013-06-22: IPMI passwords are easy to crack remotely.
- 2013-06-20: A line of sages have to guess the colours of their hats, or get beheaded.
- 2013-06-20: How not to handle a critical security vulnerability.
- 2013-06-20: Derivatives are weapons of slow economic destruction.
- 2013-06-20: A model for when disclosure helps security: what is different about computer and network security?
- 2013-06-20: An introduction to nginx.
- 2013-06-19: Puppet YAML+Ruby remote code execution vulnerability.
- 2013-06-19: IO-Lite: a unified I/O buffering and caching system.
- 2013-06-19: MegaPipe: a new programming interface for scalable network I/O.
- 2013-06-19: Line comments versus line splicing in programming languages.
- 2013-06-19: People who believe lack of exercise (rather than overeating) causes obesity tend to be fatter.
- 2013-06-19: Pipelined FPGA Mandelbrot generator.
- 2013-06-19: Java garbage collection distilled.
- 2013-06-19: Memory barriers: a hardware view for software hackers.
- 2013-06-19: How FPGAs work, and why you'll buy one.
- 2013-06-19: Discussion about Exchange 2013 recipient verification breakage on the Postfix list.
- 2013-06-19: Recipient filtering broken in Exchange 2013.
- 2013-06-19: Is the rape porn cultural harm argument another rape myth?
- 2013-06-18: LCPP – a Lua C pre-processor.
- 2013-06-18: The Porter stemming algorithm: then and now.
- 2013-06-18: The whistleblower's guide to secretly tipping off the press in a "turnkey totalitarian" state.
- 2013-06-18: Supreme Court of the US mostly abolishes the right to remain silent.
- 2013-06-18: Nominet brings back "direct.uk" proposal for unrestricted second-level .uk domains.
- 2013-06-18: Ultimate tic-tac-toe.
- 2013-06-18: Want to file a motion in the FISA court? First you have to find them.
- 2013-06-18: If those services don't trust me enough to give me an RSS feed, why should I trust them with my data?
- 2013-06-17: An old mystery solved: 1940s project C-43 and public key encryption.
- 2013-06-17: Old age: the diminished thing.
- 2013-06-17: Advanced bash scripting guide.
- 2013-06-17: There are almost no films about women.
- 2013-06-17: Big multiple sclerosis breakthrough.
- 2013-06-17: The real enemy of privacy is the MEPs selling our rights to the direct marketing lobby.
- 2013-06-17: Throwing children in prison turns out to be a really bad idea.
- 2013-06-17: Simple linear-time suffix array construction.
- 2013-06-16: UK intercepted most Irish international comms traffic 1990-1997.
- 2013-06-16: roffit: convert man pages to HTML.
- 2013-06-16: Archive on 4: Very British Dystopias.
- 2013-06-16: On coalitions, courts, and the future after legal aid.
- 2013-06-16: Leading programmers remember the impact of Kernighan and Ritchie: The C Programming Language.
- 2013-06-16: The BBC's factual television is an insult to the nation.
- 2013-06-16: The low-transaction-fee argument for Bitcoin is silly.
- 2013-06-15: Why Boston and Skegness could be UKIP's Brighton Pavillion.
- 2013-06-15: Bank of America lied to homeowners seeking remortgages and rewarded employees for foreclosing.
- 2013-06-15: Secret to Prism success: Even bigger data seizure.
- 2013-06-15: Not just spies: councils want your communications data too.
- 2013-06-15: Melvyn Bragg on William Tyndale: his genius matched that of Shakespeare.
- 2013-06-15: You do have the right to record council meetings.
- 2013-06-15: Landmark US Patent Office ruling strikes abstract software patent.
- 2013-06-15: Apple laptop charging vibration effect: "earth finger". (Informative comments.)
- 2013-06-15: Ancient Roman concrete lasts 40 times longer than modern Portland cement.
- 2013-06-15: The influence of spies has become too much. It's time politicians said no.
- 2013-06-15: "Hardware eventually fails. Software eventually works."
- 2013-06-15: On the legal importance of viewing genes as code.
- 2013-06-14: Lawsuit claims "Happy Birthday" is not in copyright, and Warner owes hundreds of millions in improperly collected royalties.
- 2013-06-14: Secret Courts: 8 nightmare scenarios now possible in Britain.
- 2013-06-14: Spamalot reigns: data protection and Ireland's EU presidency.
- 2013-06-14: Insubordination and the surveillance state.
- 2013-06-13: Planning a computer system: Project Stretch. (1962)
- 2013-06-13: Main Core: US government database of 8 million Americans who are supposedly threats to national security.
- 2013-06-13: NSA has massive database of American phone calls. (2006)
- 2013-06-13: Hopscotch hashing.
- 2013-06-13: Two years of Cambridge Noir.
- 2013-06-12: HHVM and the repurposed JIT phenomenon.
- 2013-06-12: Thomas Drake on being an NSA whistleblower.
- 2013-06-12: gitdown: moderate commit activity based on blood alcohol content.
- 2013-06-12: America's price-gouging cable companies are latter-day robber barons.
- 2013-06-12: Bike helmets and the law: Canadian legislation had minimal effect on serious head injuries.
- 2013-06-12: McBits: fast constant-time code-based cryptography.
- 2013-06-12: Attackers using chargen for UDP reflection/amplification attacks.
- 2013-06-12: IBM jargon and general computing dictionary.
- 2013-06-12: Banks rig foreign exchange benchmark rates.
- 2013-06-12: PRISM explains the wider lobbying issues surrounding EU data protection reform.
- 2013-06-12: Disagree with an Atos decision? Then starve, says DWP.
- 2013-06-12: Politics and Iain Banks.
- 2013-06-11: Public WiFi is mostly crappy and user-hostile.
- 2013-06-11: The PRISM details matter: if it works like the UK communications data bill, it is apparently no big deal.
- 2013-06-11: Opera desktop mail client.
- 2013-06-11: Family courts risk 'collapse' as surge in custody cases follows legal aid cuts.
- 2013-06-11: The value of a hacked email account.
- 2013-06-11: The Case for compressed caching in virtual memory systems.
- 2013-06-11: Has the US become the type of nation from which you have to seek asylum?
- 2013-06-11: Expect more intrusive surveillance now that PRISM is public.
- 2013-06-11: Why didn't tech company leaders blow the whistle?
- 2013-06-10: libottery: drop-in fast secure replacement for your RNG.
- 2013-06-10: The end is nigh for OpenVMS.
- 2013-06-10: Snowden/Greenwald contact delayed by weeks owing to difficulty of using PGP.
- 2013-06-10: Ken MacLeod on Iain Banks: A science fiction star first and foremost.
- 2013-06-10: Counter-cryptanalysis exploits unavoidable anomalies to detect and block cryptanalytic attacks.
- 2013-06-10: Daniel Ellsberg says Edward Snowden is saving us from the United Stasi of America.
- 2013-06-10: PRISM: The real concern is that governments may not be breaking any law at all.
- 2013-06-10: As Bradley Manning's trial begins, the press predictably misses the point.
- 2013-06-10: These are the mobile phones and tablet computers that will give you the fastest Internet speeds.
- 2013-06-10: Viviane Reding dismantles UK's arguments against effective data protection.
- 2013-06-10: The omniscient states: seven decades of shared intelligence.
- 2013-06-10: University admission happens far to late to fix school inequality.
- 2013-06-10: Safety triangle / misogyny triangle.
- 2013-06-10: A few notes on the Culture.
- 2013-06-10: There is more to anticompetitive patent licensing than trolls.
- 2013-06-10: Some links about Iain Banks.
- 2013-06-10: Council of the EU releases compromise draft the proposed data protection regulations.
- 2013-06-10: LobbyPlag: which MEPs support less data privacy and more spam.
- 2013-06-09: How the US turned three pacifists into violent terrorists.
- 2013-06-09: Security against compelled disclosure.
- 2013-06-09: Greene King accused of cultural vandalism after scrapping more than 200 traditional pub signs.
- 2013-06-09: Boundless Informant: the NSA's secret tool to track global surveillance data.
- 2013-06-09: The sealed bottle garden still thriving after 40 years without fresh air or water.
- 2013-06-09: Shortcat: keyboard productivity app for Mac OS X.
- 2013-06-09: Seeing ultraviolet after cataract surgery with Crystalens.
- 2013-06-08: The ABC trial: a 1970s prosecution for revealing UK spying activity.
- 2013-06-08: UK government censors PRISM news with a D-notice.
- 2013-06-08: Public documents contradict government claim that mass surveillance foiled terror plot.
- 2013-06-08: A lesson from history for those who strive to bring intelligence agencies to account.
- 2013-06-07: All the infrastructure a tyrant would need.
- 2013-06-07: Anonymous just leaked a trove of NSA documents. (See also UKUSA / Five Eyes.)
- 2013-06-07: On whistleblowers and government threats of investigation.
- 2013-06-07: Was the Communications Data Bill just a cover for Prism Data?
- 2013-06-07: Melton: A static memory leak detector for C programs.
- 2013-06-07: Lawfully Good vs Lawfully Evil.
- 2013-06-07: Anyone (with a PhD in physics) can design a nuclear bomb.
- 2013-06-07: Kismet: WiFi sniffing software.
- 2013-06-07: inSSIDer: WiFi monitoring software.
- 2013-06-07: Senators knew the NSA's universal snooping has been going on since 2007.
- 2013-06-07: Value of the cloud: CPU performance.
- 2013-06-07: Metadata matters: spying on comms records harms civil liberties and the free press.
- 2013-06-07: US NSA is mining data from 9 leading Internet firms.
- 2013-06-07: EU council of ministers proposes to gut data protection regulations, to please direct marketing lobby.
- 2013-06-06: Universal Credit: government closer to recognising failure of world's largest agile development project.
- 2013-06-06: Top US patent judge pens anti-troll op-ed in the New York Times.
- 2013-06-06: Best practices for designing a pragmatic RESTful API.
- 2013-06-06: CamelCase is less readable than under_score.
- 2013-06-06: CamelCase is more readable than under_score.
- 2013-06-06: The NSA is spying on millions of Americans.
- 2013-06-06: Bureaucratic needs assessments and the debate over IP address conservation.
- 2013-06-06: Calling for an end to the war on drugs.
- 2013-06-06: What would British politics look like with small parties and proportional representation?
- 2013-06-06: Affordable quality: comparing childcare in the UK and Europe.
- 2013-06-06: Amazon S3 failure in July 2008 due to single bit corruption. Checksum all the things!
- 2013-06-06: Game theory of IPv6.
- 2013-06-05: Pink/Blue.
- 2013-06-05: Microsoft asks for feedback on the standards conformance of Outlook and Exchange.
- 2013-06-05: Guile and delimited continuations.
- 2013-06-05: Japan's radiation disaster toll: none dead, none sick.
- 2013-06-05: The bright side of dark silicon.
- 2013-06-05: Tetris printer algorithm.
- 2013-06-05: The network is reliable?
- 2013-06-04: Cameron eyes 'non legislative options' to extend domestic spying powers.
- 2013-06-04: Prosecute the patent trolls!
- 2013-06-04: A "child pornographer", according to the police.
- 2013-06-04: The risks of Microsoft Exchange features that use Oracle Outside In.
- 2013-06-04: 45 ways to communicate two quantities.
- 2013-06-04: Brompton stunts. (YouTube)
- 2013-06-04: Huge registrar shake-up coming to .biz and .info.
- 2013-06-04: A look at the Crossrail tunnels under Oxford Street.
- 2013-06-04: Elsevier-style bulk licences the answer to taming patent trolls?!
- 2013-06-04: Call-by-push-value: a model for the lambda calculus that subsumes call-by-name and call-by-value.
- 2013-06-03: On "geek" versus "nerd".
- 2013-06-03: First intercontinental 100 Gbps link for research and education.
- 2013-06-03: Reinventing the wheel: Loopwheels: bike wheels with built-in suspension.
- 2013-06-03: Reinventing the train: Ideas coming down the track.
- 2013-06-03: How curly braces got included in ASCII.
- 2013-06-03: Think the Greens are the party of the middle-class? Think again.
- 2013-06-03: Possible ban on factory food in French restaurants.
- 2013-06-03: O, BIND, BIND, wherefore art thou BIND? Results of fingerprinting all Internet DNS servers.
- 2013-06-03: What can't you do with a criminal conviction?
- 2013-06-03: LangSec: safely dealing with magical text.
- 2013-06-03: A unified theory of garbage collection.
- 2013-06-03: Removing garbage collection from the Rust language.
- 2013-06-03: Civil legal aid reforms in the UK: what will this mean for you?
- 2013-06-03: The reaction to Eric Weinstein's lecture at Oxford on the geometric prospects for unification.
- 2013-06-03: Istanbul's demonstrators celebrate victory in Istiklal and Taksim Square.
- 2013-06-03: Sustainable fishing success story, but why do we have to trawl for the facts about Britain and the EU?
- 2013-06-03: Max Headroom and the strange world of pseudo-CGI.
- 2013-06-03: Hexagonal grids.
- 2013-06-03: Apple, betrayed by its own patent law firm.
- 2013-06-02: Five ugly lessons hiding in every superhero movie.
- 2013-06-02: More background on the violence in Isranbul.
- 2013-06-02: Teardown and exploration of Apple's Magsafe connector.
- 2013-06-02: Researcher decodes prairie dog language and discovers they've been talking about us. (video)
- 2013-06-02: Michael Douglas says cunnilingus gives you cancer – but is he right?
- 2013-06-02: What mobile internet filtering tells us about porn blocks.
- 2013-06-02: What is happenning in Istanbul.
- 2013-06-02: Examining the IWF's claim that 1.5 million adults have stumbled across child porn online.
- 2013-06-02: The real Cuban missile crisis.
- 2013-06-02: Vinegar could save 73,000 women a year from cancer.
- 2013-06-02: H.264 patent pools kill web video competitors.
- 2013-06-02: The algebra of algebraic data types.
- 2013-06-02: Funny computer books?
- 2013-06-01: Clay programming language.
- 2013-06-01: Google/Motorola prototype authentication tokens: pill passwords and electronic tattoos.
- 2013-06-01: Haskell apply ($) vs F#'s pipe forward operator (|>).
Tony Finch is
<dot@dotat.at>