Tony Finch – link log
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024
- 2013‑12‑31:
About Python 3 (lack of) adoption.
- 2013‑12‑31:
Where will we live? The British housing crisis.
- 2013‑12‑30:
Xplain: explaining X11 for the rest of us.
- 2013‑12‑30:
Hacking MicroSD cards.
- 2013‑12‑29:
On geek culture.
- 2013‑12‑29:
Nine lies about fat that ruined the western world's health.
- 2013‑12‑29:
Scientists tell us their favourite jokes: 'An electron and a positron walked into a bar...'
- 2013‑12‑29:
Viral sharing and truth in journalism.
- 2013‑12‑28:
Quantities: type-safe units of measurement for Idris.
- 2013‑12‑28:
C# for systems programming.
- 2013‑12‑28:
Analysis of SSD reliability during power outages.
- 2013‑12‑28:
Imperative reasoning is hard.
- 2013‑12‑28:
MailChimp CEO on email's age defying resilience.
- 2013‑12‑27:
Replicant: distributed state machines made easy.
- 2013‑12‑27:
10 of the best open source hardware projects of 2013.
- 2013‑12‑26:
Joose: an advanced metaclass system for JavaScript.
- 2013‑12‑26:
Advanced design patterns in Python.
- 2013‑12‑26:
Cheques are in decline, but UK gov't says 'We want cheques to have a crucial role in the ongoing success of the UK.'
- 2013‑12‑26:
Albrecht Dürer's Roman letters.
- 2013‑12‑25:
Implementing Elligator for Curve25519.
- 2013‑12‑25:
So, you want to crypto...
- 2013‑12‑24:
Why is Git HTTPS not working on GitHub?
- 2013‑12‑24:
Strong TLS security on nginx (and Apache and lighttpd).
- 2013‑12‑24:
Gitlab and Active Directory LDAP authentication.
- 2013‑12‑24:
Mobile ISP image recompression.
- 2013‑12‑24:
PNG can be a lossy format.
- 2013‑12‑24:
10 best and most memorable maker projects of 2013.
- 2013‑12‑24:
Cameron's internet filter goes far beyond porn - and that was always the plan.
- 2013‑12‑23:
The mathematical hacker.
- 2013‑12‑23:
Adam Rosenberg's programming style.
- 2013‑12‑23:
Perl 6 unary sort.
- 2013‑12‑23:
A local augmented root zone with DNSSEC.
- 2013‑12‑23:
Copyright is not stealing, says the Supreme Court of the US.
- 2013‑12‑23:
The beauty of mathematics. (Vimeo)
- 2013‑12‑23:
Take charge of your batteries!
- 2013‑12‑22:
Railgun: fast strstr() implementation.
- 2013‑12‑22:
Why marketers fear the female geek.
- 2013‑12‑22:
UPS's holiday shipping planner: they call him Mr Peak.
- 2013‑12‑22:
Former Top NSA official: "we are now in a police state".
- 2013‑12‑22:
Brand contamination: when men's products get girl cooties.
- 2013‑12‑22:
Algorithmic defamation: the case of the shameless autocomplete.
- 2013‑12‑21:
Growing up unvaccinated.
- 2013‑12‑21:
How to search on encrypted data.
- 2013‑12‑21:
Who in Whitehall approved torture after 9/11?
- 2013‑12‑21:
New openssh key format and bcrypt pbkdf.
- 2013‑12‑20:
NSA/RSA DUAL_EC_DRBG arrangement was known in September.
- 2013‑12‑20:
Sierpiński calendar.
- 2013‑12‑20:
NSA paid RSA $10 million to promote backdoored DUAL_EC_DRBG.
- 2013‑12‑20:
Critics say NSA agent co-chairing key crypto standards body should be removed.
- 2013‑12‑20:
Canada lifts all restrictions on prostitution, because they increase harm.
- 2013‑12‑20:
Requesting removal of NSA employee from chair of IETF crypto forum research group.
- 2013‑12‑20:
UPS My Choice has amazingly creepy security questions and bait-and-switch pricing.
- 2013‑12‑20:
On the matter of strlcpy/strlcat acceptance by industry.
- 2013‑12‑20:
0x10 years of protecting privacy with GnuPG.
- 2013‑12‑20:
When is a 'cluster' a real cluster? Cyclist deaths in London.
- 2013‑12‑20:
'Free trade' and the death of democracy.
- 2013‑12‑20:
UK porn block fiasco goes mainstream.
- 2013‑12‑20:
100 years of monopoly phone service.
- 2013‑12‑20:
The inventor of Karaoke.
- 2013‑12‑20:
"I wrote the Anarchist Cookbook in 1969. Now I see its premise as flawed."
- 2013‑12‑20:
Flaw in OpenSSL Dual EC DRBG (no not that one).
- 2013‑12‑20:
Winkel Tripel warping trouble.
- 2013‑12‑19:
Nutrient: an indexed key-value store based on crit-bit tries with a cdb-like API.
- 2013‑12‑19:
Golang 1.3+ compiler overhaul: The Go compiler today is written in C. It is time to move to Go.
- 2013‑12‑19:
Bitcoin, magical thinking, and political ideology.
- 2013‑12‑19:
Why WordPress bloggers were blocked by TalkTalk, and what it tells us about Internet filtering.
- 2013‑12‑18:
MacBook webcams can spy on their users without warning.
- 2013‑12‑18:
One Weird Old Trick to Undermine the Patriarchy.
- 2013‑12‑18:
RSA key extraction via low-bandwidth acoustic cryptanalysis.
- 2013‑12‑18:
The magazine that featured in War Games.
- 2013‑12‑18:
Why I want Bitcoin to die in a fire.
- 2013‑12‑18:
We are allowed to hate Silicon Valley.
- 2013‑12‑18:
Common markup for Markdown and reStructuredText.
- 2013‑12‑17:
UK Internet archive will not be accessible via the Internet, because copyright.
- 2013‑12‑17:
It's the Macroeconomy, Stupid. Neoliberal policy targets the structure not the level of wealth.
- 2013‑12‑17:
We need to talk about TED.
- 2013‑12‑17:
git-integration: easily merge several work-in-progress topic branches onto a base branch.
- 2013‑12‑16:
Recommendations for secure use of TLS and DTLS.
- 2013‑12‑16:
Fast blitting on the 6809.
- 2013‑12‑15:
So you think you have a power law - well, isn't that special?
- 2013‑12‑15:
It's not harming anyone, so why is Brussels trying to remove my e-cigarette?
- 2013‑12‑15:
On undoing, fixing, or removing commits in git.
- 2013‑12‑15:
The web needs view object containment.
- 2013‑12‑15:
The mission to decentralize the Internet.
- 2013‑12‑15:
The basics of taking good photos.
- 2013‑12‑14:
Bugs in the wetware? The psychology of computer insecurity.
- 2013‑12‑13:
Bicycle Helmets and the law: a perfect teaching case for epidemiology.
- 2013‑12‑13:
A vintage cargo bike collection in Italy.
- 2013‑12‑13:
The drop in teenage pregnancies is a great political success story.
- 2013‑12‑13:
Cap'n Proto: promise pipelining RPC protocol.
- 2013‑12‑12:
Simple Binary Encoding: a new ultra-fast marshalling API in C++, Java and .NET.
- 2013‑12‑12:
lazysorted: a partially and lazily sorted list data structure for Python.
- 2013‑12‑12:
Better and better keyboard prototypes.
- 2013‑12‑12:
Running a web browser on a Macintosh Plus.
- 2013‑12‑11:
The birth of stderr.
- 2013‑12‑11:
Obscure C++ features.
- 2013‑12‑10:
Doom at 20: John Carmack's hellspawn changed gaming forever.
- 2013‑12‑10:
NSA ♥︎ Facebook.
- 2013‑12‑10:
Samantha West: the telemarketer robot who swears she's not a robot.
- 2013‑12‑10:
Doom: 20 years of a gaming legend.
- 2013‑12‑10:
Maria Leijerstam's South Pole trike.
- 2013‑12‑09:
Why are Upworthy headlines suddenly everywhere?
- 2013‑12‑09:
Exile: disassembly of the most technically advanced game released for the BBC Micro.
- 2013‑12‑08:
There are now two Americas. The country is a horror show.
- 2013‑12‑08:
talloc: The Tutorial.
- 2013‑12‑07:
Still waiting for the stupid network.
- 2013‑12‑07:
Ten lazy assumptions that are part of the mainstream political consensus.
- 2013‑12‑07:
WHAT THE FLUCK! The point at which journalism fails and modern power begins.
- 2013‑12‑06:
Telepathwords: preventing weak passwords by reading your mind.
- 2013‑12‑06:
Clocks: a collection of experiments in generative art.
- 2013‑12‑06:
reptyr: change the pty of a running process on Linux.
- 2013‑12‑06:
Multiprocess Firefox.
- 2013‑12‑05:
Edward Snowden and Glenn Greenwald: the people who leaked the NSA's secrets.
- 2013‑12‑05:
King James programming: a Markov chain trained on the bible and Structure and Interpretation of Computer Programs.
- 2013‑12‑05:
Gmail download and escape hatch.
- 2013‑12‑04:
Dispute over infinity divides mathematics.
- 2013‑12‑03:
Greenwald: the journalist who hacked the old system.
- 2013‑12‑03:
The SSD endurance experiment: testing data retention at 300TB.
- 2013‑12‑03:
Project Oberon 2013: the design of an operating system, a compiler, and a computer.
- 2013‑12‑03:
How does the NSA break SSL?
- 2013‑12‑03:
A young person's guide to BCPL programming on the Raspberry Pi.
- 2013‑12‑03:
NSA werewolf.
- 2013‑12‑03:
Applied crypto hardening.
- 2013‑12‑02:
The return of the open mail relays.
- 2013‑12‑02:
A linguist explains the rules of summoning Benedict Cumberbatch.
- 2013‑12‑02:
Headlines from a mathematically literate world.
- 2013‑12‑01:
Most important innovations are not patented.
- 2013‑12‑01:
Bedsheet Problem: how many times can you fold it in half?
- 2013‑12‑01:
CC0 vs CC-BY.
- 2013‑12‑01:
TPM chip protecting SSH keys, properly.
- 2013‑12‑01:
Comedian gets the last laugh over FCUK logo row.
- 2013‑11‑30:
Reverse-engineering Vermeer's secret technique.
- 2013‑11‑30:
The Jolla phone: first impressions.
- 2013‑11‑30:
Myth: Apollo astronauts didn't float away because they had heavy boots.
- 2013‑11‑30:
San Francisco's DC power grid.
- 2013‑11‑30:
OK to clone software by testing it and reading the manual, rules UK court.
- 2013‑11‑29:
Cheaper IPv6-only servers.
- 2013‑11‑28:
Configure BIND to validate answers to recursive queries in zones for which it is authoritative.
- 2013‑11‑28:
Root zone KSK rollover. (slides)
- 2013‑11‑28:
SSAC advisory on DNSSEC key rollover in the root zone. (slides)
- 2013‑11‑28:
SSAC advisory on DNSSEC key rollover in the root zone.
- 2013‑11‑28:
Computer science course fills seats at Harvard.
- 2013‑11‑27:
Algorave is the future of dance music (if you're a nerd).
- 2013‑11‑27:
Linux memory management and linear big data scans.
- 2013‑11‑27:
Trends in cybersecurity.
- 2013‑11‑27:
Pre-paid SIM cards for travellers.
- 2013‑11‑27:
Comcast now has the world's largest IPv6 deployment.
- 2013‑11‑27:
Farming hard drives: 2 years and $1M later.
- 2013‑11‑27:
The Google+ real names policy has had an amazing effect on the quality of YouTube comments.
- 2013‑11‑27:
Tradeoffs in cybersecurity.
- 2013‑11‑26:
FFTS: fastest fourier transform in the south.
- 2013‑11‑26:
NTP amplification attacks.
- 2013‑11‑26:
Mail supremacy: The newspaper that rules Britain.
- 2013‑11‑26:
Jury decides that Newegg infringes the bogus TQP crypto patent.
- 2013‑11‑26:
Creative Commons licences version 4.0.
- 2013‑11‑25:
The dot, our simplest punctuation mark, has become a sign of anger.
- 2013‑11‑25:
Healthcare.gov and the gulf between planning and reality.
- 2013‑11‑25:
Unresolvable host names in the Alexa top 1,000,000 web site list.
- 2013‑11‑25:
A simple explanation of how money moves around the banking system.
- 2013‑11‑25:
Whitfield Diffie takes the stand in the Newegg crypto patent troll trial.
- 2013‑11‑25:
NDK quartz crystal manufacturing plant exploded, killing someone 200 metres away.
- 2013‑11‑25:
ICANN kills Scott Richter's spam-friendly registrar Dynamic Dolphin.
- 2013‑11‑24:
Northwestern Lightboard, for recording lecture graphics without lots of post-production.
- 2013‑11‑24:
Boolean satisfiability: from theoretical hardness to practical success.
- 2013‑11‑23:
Teach debugging by playing the sabotage game.
- 2013‑11‑23:
Fixing Walmart's node.js memory leak.
- 2013‑11‑23:
Breaking OS X signed kernel extensions with a NOP.
- 2013‑11‑23:
The long-gone tax that everyone still thinks they're paying.
- 2013‑11‑23:
Geeks for monarchy: the rise of the neoreactionaries.
- 2013‑11‑23:
555 footstool.
- 2013‑11‑23:
Circuit stickers.
- 2013‑11‑23:
Information Is Beautiful awards 2013 winners.
- 2013‑11‑22:
Fixing fsync().
- 2013‑11‑22:
Louis Essen on the history of leap seconds. (1981)
- 2013‑11‑21:
Microsoft are selling a Google mug.
- 2013‑11‑21:
To kill a centrifuge: a technical analysis of what Stuxnet's creators tried to achieve.
- 2013‑11‑21:
Leonardo da Vinci's viola organista cello/piano cross has at last been built 500 years after it was designed.
- 2013‑11‑21:
Mathematicians team up on twin primes conjecture.
- 2013‑11‑20:
Software patent reform just died thanks to lobbying from IBM and Microsoft.
- 2013‑11‑20:
Halting password puzzles: hard-to-break encryption from human-memorable keys.
- 2013‑11‑20:
Nominet will go ahead and flatten the .uk DNS namespace.
- 2013‑11‑20:
Cycling and trucks the Dutch way.
- 2013‑11‑19:
Rosetta stone for Unix.
- 2013‑11‑19:
JSTOR denies access to five people every second.
- 2013‑11‑19:
A new diagnostic test to distinguish benign and life-threatening prostate cancers. #movember
- 2013‑11‑19:
Zalgol: an esoteric programming language.
- 2013‑11‑19:
Visual cryptography.
- 2013‑11‑18:
Analysis of the https X.509 certificate ecosystem.
- 2013‑11‑18:
The forgotten giant arrows that guided the mail across America.
- 2013‑11‑17:
What mathematical structure models arithmetic with physical units?
- 2013‑11‑17:
An efficient non-moving garbage collector for functional languages.
- 2013‑11‑17:
'Because' has become a preposition, because grammar.
- 2013‑11‑17:
Why is it so difficult and expensive to make your own clothes?
- 2013‑11‑17:
What has gone wrong with RNGs in practice.
- 2013‑11‑17:
The dsfjdssdfsd list provides a venue for discussion of randomness in IETF protocols.
- 2013‑11‑17:
Acid Retirement Home: 20 years of cultural stagnation.
- 2013‑11‑16:
The two dualities of computation: negative and fractional types.
- 2013‑11‑16:
Lorries, cyclists, and delivery restrictions in Paris.
- 2013‑11‑16:
A 2x speedup with one line of code: prefetching Python objects during array traversal.
- 2013‑11‑15:
What happens to Google Maps when tectonic plates move?
- 2013‑11‑15:
Afnic promotes .fr DNSSEC.
- 2013‑11‑15:
Robust de-anonymization of large datasets: how to break anonymity of the Netflix prize dataset.
- 2013‑11‑15:
What happens when a GPRS terminal attaches to the network.
- 2013‑11‑15:
Detecting stealthy distributed ssh brute force attackers.
- 2013‑11‑15:
Should quadrotors look like this?
- 2013‑11‑15:
How a journalist faced his fears and learned to be good at maths.
- 2013‑11‑15:
With Great Power. (A superhero short story.)
- 2013‑11‑14:
CrunchBase's contradictory Creative Commons copyright case.
- 2013‑11‑14:
Terra: a low-level system programming language embedded in Lua.
- 2013‑11‑14:
dataset: databases for lazy Python programmers.
- 2013‑11‑14:
The second operating system hiding in every mobile phone.
- 2013‑11‑14:
Police try to recuit a student to spy on political activity at Cambridge University.
- 2013‑11‑14:
Integer undefined behaviour in open source crypto libraries.
- 2013‑11‑13:
Snowden and the future.
- 2013‑11‑13:
Vi Hart on Google+ YouTube integration.
- 2013‑11‑13:
The secret life of SIM cards.
- 2013‑11‑13:
40% more of what salary balances happiness against a long commute?
- 2013‑11‑13:
Bechdel gets testy.
- 2013‑11‑12:
Our privacy problem is a democracy problem in disguise.
- 2013‑11‑11:
Web latency benchmark.
- 2013‑11‑11:
Weak statistical standards implicated in scientific irreproducibility: p should be 0.005 or less.
- 2013‑11‑11:
The Dr Who theme as Ron Grainer may have intended.
- 2013‑11‑11:
The big data brain drain: science is in trouble.
- 2013‑11‑11:
A person with a one-hour commute has to earn 40% more to be as happy as someone who walks.
- 2013‑11‑10:
Why do Brits accept surveillance?
- 2013‑11‑10:
A short history of software development methods.
- 2013‑11‑10:
Psychedelics and mental health: a population study.
- 2013‑11‑10:
Why the Cornell paper on selfish Bitcoin mining is important.
- 2013‑11‑10:
The Pyret programming language.
- 2013‑11‑09:
Evaluation of New Zealand's bicycle helmet law: compulsory helmets increase risk of injury by 20-30%.
- 2013‑11‑09:
Rotate the world with JavaScript D3.
- 2013‑11‑08:
Google shell style guide.
- 2013‑11‑07:
Geography of top-level domains.
- 2013‑11‑07:
Bitcoin isn't so broken after all.
- 2013‑11‑07:
Bootstrapping the adoption of Internet security protocols.
- 2013‑11‑06:
Who's the biggest spy? NSA, GCHQ, and the "special relationship".
- 2013‑11‑06:
Mozilla anticookie tool plans crumbling.
- 2013‑11‑06:
The best and worst countries to be an expatriate.
- 2013‑11‑06:
Part of Internet Archive building badly burned in early morning fire.
- 2013‑11‑06:
Statistics done wrong: the woefully complete guide.
- 2013‑11‑05:
DiffPDF: compare two PDF files, textually or visually.
- 2013‑11‑05:
Undefined behaviour: what happened to my code?
- 2013‑11‑04:
Bitcoin is fundamentally broken.
- 2013‑11‑04:
25th anniversary of the Morris worm.
- 2013‑11‑03:
Best visual illusion of the year contest, 2005-present.
- 2013‑11‑03:
Browsing history: A heritage site is being set up in the UCLA room where the first ARPANET message originated.
- 2013‑11‑03:
The highly unusual company behind Sriracha, the world's coolest hot sauce.
- 2013‑11‑02:
An interview with the old man of floating point.
- 2013‑11‑02:
Unii, a student-only social network, signs up 100,000+ users in six months in the UK.
- 2013‑11‑02:
Google's plans for a 1-million-square-foot London office at King's Cross.
- 2013‑11‑02:
Ditch Microsoft Office or take a pay cut: Which would you choose?
- 2013‑11‑02:
A devil's dictionary of programming.
- 2013‑11‑02:
Neo900: open phone project.
- 2013‑11‑01:
Patent war goes nuclear: Rockstar sues Google with ex-Nortel patents.
- 2013‑11‑01:
The 2008 Liberty vs UK case: an ECHR ruling on Snowden's disclosures.
- 2013‑11‑01:
Bitcoin as protocol.
- 2013‑10‑30:
Announcing the Dark Mail Alliance, founded by Silent Circle and Lavabit.
- 2013‑10‑30:
Lavabit and Silent Circle join forces to make all email surveillance-proof.
- 2013‑10‑30:
Toyota's killer firmware: Bad design and its consequences.
- 2013‑10‑30:
Why are "Ghost," "Ghastly," and "Ghoul" Spelled with "gh"?
- 2013‑10‑29:
The status of Moore's Law: it's complicated.
- 2013‑10‑29:
Seagate comedic open storage.
- 2013‑10‑28:
Diebold charged with bribery and falsifying docs in a worldwide pattern of criminal conduct.
- 2013‑10‑28:
C in CAP != C in ACID.
- 2013‑10‑28:
Phishing with Linkedin's Intro.
- 2013‑10‑27:
The keys to the keydom: RSA keys with common factors.
- 2013‑10‑27:
The war on hackers.
- 2013‑10‑27:
The e-cigarette industry, waiting to exhale.
- 2013‑10‑27:
Making 128MB SIMMs from 64MB SIMMs.
- 2013‑10‑27:
Data Cube: a relational aggregation operator generalizing group-by, cross-tab, and sub-total.
- 2013‑10‑27:
How to write New Age Jargon.
- 2013‑10‑27:
Mac OS 10.9: infinity times your spam.
- 2013‑10‑26:
I challenged hackers to investigate me and what they found out is chilling.
- 2013‑10‑26:
The Netherlands: a whole country that has transformed itself for cycling.
- 2013‑10‑26:
Schrödinger's token: parsing with multiple-typed tokens.
- 2013‑10‑26:
What's new in Unicode 7.0.
- 2013‑10‑26:
What it would take for self-driving cars to catch on.
- 2013‑10‑26:
Lua: Good, different, and ugly parts.
- 2013‑10‑26:
The Slash programming language.
- 2013‑10‑26:
Delayed printf for real-time logging.
- 2013‑10‑25:
LinkedIn Intro? No thanks. My email security is too important.
- 2013‑10‑25:
A quick audit of CryptoCat's elliptic curve crypto.
- 2013‑10‑25:
LinkedIn 'Intro'duces email man-in-the-middle attack on its users.
- 2013‑10‑25:
Reinventing storage: ethernet über alles!
- 2013‑10‑25:
Optimizing TLS record size and buffering latency.
- 2013‑10‑25:
A relatively easy to understand primer on elliptic curve cryptography.
- 2013‑10‑25:
NASD: network-attached secure disks.
- 2013‑10‑25:
The Seagate Kinetic open storage vision.
- 2013‑10‑24:
OS X Mavericks ruined Apple Mail for Gmail users.
- 2013‑10‑23:
Security fixes in OS X Mavericks v10.9.
- 2013‑10‑23:
Trace and replay retrospective debugging?
- 2013‑10‑23:
Curl: a note to users of OS X Mavericks 10.9.
- 2013‑10‑23:
Color blindness and palette choice.
- 2013‑10‑23:
Edit the HTML of sites that insist on binary gendered titles.
- 2013‑10‑23:
Gerrit code review: Change-IDs.
- 2013‑10‑22:
Regenerator: Let's get serious about ES6 generator functions.
- 2013‑10‑22:
Tubewhacking.
- 2013‑10‑22:
The decline of Wikipedia: as more people rely on it, fewer people create it.
- 2013‑10‑22:
Raspberry Pi GPS NTP without soldering.
- 2013‑10‑22:
Maps of average cloud coverage.
- 2013‑10‑22:
How to lose $172,222 a second for 45 minutes.
- 2013‑10‑21:
The roots of the US government shutdown.
- 2013‑10‑21:
Why civil resistance works: the strategic logic of nonviolent conflict.
- 2013‑10‑21:
TP-Link TL-WR703N: an extremely small networked computer.
- 2013‑10‑21:
Is math a gift? Beliefs that put females at risk.
- 2013‑10‑21:
Everything you always wanted to know about synchronization but were afraid to ask.
- 2013‑10‑21:
Six decades of the USA's most popular names for girls, state-by-state.
- 2013‑10‑21:
The invention of switch mode power supplies.
- 2013‑10‑20:
13 nutrition lies that made the world sick and fat.
- 2013‑10‑20:
A few Utah panoramas.
- 2013‑10‑20:
Anti-racism campaigner and immigration caseworker sent 'go home' text message by Home Office.
- 2013‑10‑20:
Graph of Radiohead songs by genre.
- 2013‑10‑20:
Dianne Feinstein's bragging about NSA surveillance program may lead to I t being declared unconstitutional.
- 2013‑10‑20:
Every position of Rubik's Cube can be solved in twenty moves or less.
- 2013‑10‑20:
Sweden becomes first western nation to reject low-fat dogma in favor of low-carb high-fat nutrition.
- 2013‑10‑20:
Showing you this map of aggregated bullfrog occurrences would be illegal.
- 2013‑10‑20:
Engineering the LOUDS succinct tree representation.
- 2013‑10‑20:
Analysis of Apple iMessage privacy.
- 2013‑10‑20:
4 reasons clang is becoming my go-to compiler.
- 2013‑10‑20:
The ocean is broken.
- 2013‑10‑20:
Six weeks to provision a VM?!?
- 2013‑10‑17:
Recovering a corrupted git packfile.
- 2013‑10‑17:
Your brain on beer vs coffee.
- 2013‑10‑16:
Is Bitcoin an NSA honeypot?
- 2013‑10‑15:
Bollocks cycling infrastructure.
- 2013‑10‑15:
The Cambridge CAP capability-based computer.
- 2013‑10‑15:
The BCS computer conservation society.
- 2013‑10‑15:
Stained glass sundials.
- 2013‑10‑15:
Land unknown to humans before the European age of discovery.
- 2013‑10‑14:
GCHQ hid its network spying capability from parliamentary snoopers charter scrutiny.
- 2013‑10‑14:
A diary of four wars: where war reporting goes wrong.
- 2013‑10‑14:
How to design a city for women.
- 2013‑10‑14:
A review of the Avegant Virtual Retinal Display.
- 2013‑10‑14:
Time to leave leap seconds behind?
- 2013‑10‑14:
A cylindrical cut-glass sundial.
- 2013‑10‑14:
SafeCurves: choosing safe curves for elliptic-curve cryptography.
- 2013‑10‑14:
The trouble with timestamps in distributed databases.
- 2013‑10‑14:
Proofs as Cryptography: a new interpretation of Curry-Howard for software certificates.
- 2013‑10‑13:
Unemployment is not a sign of bad character.
- 2013‑10‑13:
Cambridge bike theft conviction rate barely above 1%.
- 2013‑10‑13:
Property in London is like a global reserve currency.
- 2013‑10‑13:
Labour will be more right wing than the Tories.
- 2013‑10‑13:
Reverse engineering a D-Link backdoor.
- 2013‑10‑13:
The US fears back-doored hardware because they are building it too.
- 2013‑10‑12:
Why email is hard: internationalization.
- 2013‑10‑12:
The awful body-shaming future of 3D printing.
- 2013‑10‑12:
Microsoft Word must die.
- 2013‑10‑12:
The registrars who obeyed City of London police demands to disable web sites likely violated ICANN policy.
- 2013‑10‑11:
The London Ringways: a post-war plan for a dense network of motorways through and around the capital.
- 2013‑10‑11:
European ruling spells trouble for unmoderated online comment.
- 2013‑10‑10:
evldns: libevent + ldns.
- 2013‑10‑10:
"What happened to me after I read dinosaur erotica."
- 2013‑10‑10:
The 9 kinds of physics seminar.
- 2013‑10‑09:
Chelsea Manning: I'm no "pacifist".
- 2013‑10‑09:
802.11ac 'gigabit Wi-Fi' starts to show its potential and limits.
- 2013‑10‑09:
Name That Blue.
- 2013‑10‑09:
Commodore Pet killer poke.
- 2013‑10‑09:
Why and how Ben Goldacre wrote Bad Pharma.
- 2013‑10‑09:
The Great Library at Alexandria was destroyed by budget cuts, not fire.
- 2013‑10‑09:
The Financial Times switches to a digital-first publishing model.
- 2013‑10‑09:
Constructing the Sierpinsky triangle.
- 2013‑10‑09:
The bogus Starbucks duffin trademark is provoking cake rage.
- 2013‑10‑08:
Shards: How the high-wizard Mordaine invented NoSQL.
- 2013‑10‑08:
An informal anti-virus comparison.
- 2013‑10‑08:
Optimizing Linux memory management for low-latency / high-throughput databases.
- 2013‑10‑08:
Lossless decompression and the generation of random samples.
- 2013‑10‑08:
Intellectual Ventures buys patent donated by AmEx for the public good... and starts suing.
- 2013‑10‑08:
How the FBI forced Lavabit to shut down.
- 2013‑10‑08:
BioLite fan-assisted wood stove and generator with USB power out.
- 2013‑10‑08:
GADT meet subtyping.
- 2013‑10‑07:
Tea Party radicalism is misunderstood: meet the "newest right".
- 2013‑10‑07:
A profile of Alan Rusbridger and the Guardian in the New Yorker.
- 2013‑10‑07:
Grandma's cooking from around the world.
- 2013‑10‑07:
How (not) to trigger a layout in WebKit.
- 2013‑10‑07:
Preventing web page layout thrashing.
- 2013‑10‑06:
nedtries.
- 2013‑10‑06:
ZeroMQ: helping OpenDNS block malicious domains in real time.
- 2013‑10‑06:
The coming world of automated mass anti-terror false positives.
- 2013‑10‑06:
Dogs are people too.
- 2013‑10‑06:
Luje: a pure Lua JVM.
- 2013‑10‑06:
The shutdown prophet: maybe Washington was destined to go dark all along.
- 2013‑10‑06:
A scientific guide to saying "no": How to avoid temptation and distraction.
- 2013‑10‑06:
A federal budget crisis months in the planning.
- 2013‑10‑06:
Coffee experiments.
- 2013‑10‑05:
Maven is broken by design.
- 2013‑10‑05:
1m2 space-saving staircase from EeStairs.
- 2013‑10‑04:
And then Steve said, 'let there be an iPhone'.
- 2013‑10‑04:
Patent troll Lodsys settles for nothing to avoid trial.
- 2013‑10‑04:
"RFCs were just a temporary expedient intended to last just a few months."
- 2013‑10‑04:
Guillermo del Toro's Simpsons couch gag is the best thing ever. (video)
- 2013‑10‑03:
extprot: compact, efficient, extensible, binary, cross-language, long-term serialization protocols.
- 2013‑10‑03:
Visualizing suffix primes.
- 2013‑10‑03:
Silk Road, Lavabit, and the limits of crypto.
- 2013‑10‑02:
Edward Snowden's email provider defied FBI demands to turn over private crypto keys.
- 2013‑10‑02:
The hallmark of a truly effective internal security system would be the maximum possible disclosure.
- 2013‑10‑02:
Cockblocked by redistribution: a pick-up artist fails in Denmark.
- 2013‑10‑02:
Bathys Hawaii Cesium 133 atomic wristwatch.
- 2013‑10‑02:
Kardashev scale of levels of civilization. Type III is about 4E37 W.
- 2013‑10‑02:
The Death Star used 1E38 joules to destroy Alderaan.
- 2013‑10‑01:
Write build rules in Lua with tup.
- 2013‑10‑01:
What will the completed Sagrada Família look like? (YouTube)
- 2013‑10‑01:
Efficient custom allocators in C.
- 2013‑10‑01:
Food verbiage that should be banned.
- 2013‑09‑30:
Why whistleblowers should be listened to.
- 2013‑09‑30:
Responsive web design tips from BBC News.
- 2013‑09‑30:
Steal this research paper! (You already paid for it.) Michael Eisen and open access publishing.
- 2013‑09‑29:
Judge tosses Apple motion, allows patent troll Lodsys to continue rampage.
- 2013‑09‑29:
ARM64 and Objective C.
- 2013‑09‑29:
Topological rope trick.
- 2013‑09‑29:
Knight v Snail in medieval manuscripts.
- 2013‑09‑29:
Why mathematicians make great comedy writers.
- 2013‑09‑29:
US nuclear commander suspended for gambling problems.
- 2013‑09‑28:
Internet centralization is not a conspiracy.
- 2013‑09‑27:
Edward Snowden has started a global debate. So why the silence in Britain?
- 2013‑09‑27:
FastMail staff purchase the business from Opera.
- 2013‑09‑25:
Preparing an IPv6 addressing plan.
- 2013‑09‑25:
The Seven Lady Godivas: Dr. Seuss's little-known book of nudes.
- 2013‑09‑25:
Make a Minecraft map of Britain with 230 lines of Python.
- 2013‑09‑25:
Norway: tobacco harm reduction in the real world.
- 2013‑09‑25:
Zab vs. Paxos: distributed consensus in ZooKeeper.
- 2013‑09‑25:
Normal vs fat-tailed distributions.
- 2013‑09‑25:
How does Dutch street design work for pedestrians?
- 2013‑09‑24:
Availability in globally distributed storage systems: Google's failure stats.
- 2013‑09‑24:
Name server selection of DNS caching resolvers. (slides)
- 2013‑09‑24:
Authority selection in DNS caching resolvers.
- 2013‑09‑24:
iodine: IPv4 over DNS.
- 2013‑09‑24:
US DHS DNS security reference architecture.
- 2013‑09‑24:
Could you pass a Dutch cycling exam?
- 2013‑09‑24:
Stateless TCP for higher DNS capacity on FreeBSD.
- 2013‑09‑24:
LPEG tutorial.
- 2013‑09‑24:
A brief introduction to LPEG.
- 2013‑09‑24:
Job offer: user admin database manager for the University of Cambridge Computing Service.
- 2013‑09‑24:
A Minecraft map of Great Britain from the Ordnance Survey.
- 2013‑09‑24:
Hacking around with Reading Borough Council's urban traffic management and real-time passenger information infrastructure.
- 2013‑09‑23:
The myth of the 10x programmer.
- 2013‑09‑22:
IRIX alert sounds for iOS.
- 2013‑09‑22:
The 500 highest bridges.
- 2013‑09‑22:
Chaos Computer Club breaks Apple TouchID.
- 2013‑09‑22:
Weird machines in ELF: the RTLD is Turing complete.
- 2013‑09‑22:
Percussive Maintenance. (Vimeo)
- 2013‑09‑22:
Hardened stateless session cookies.
- 2013‑09‑22:
Carpet designer threatens cosplayers with legal action.
- 2013‑09‑21:
iOS 7 includes support for Multipath TCP.
- 2013‑09‑21:
Edward C++Hands.
- 2013‑09‑21:
Git internals.
- 2013‑09‑21:
SecurID: security through obscurity.
- 2013‑09‑21:
iPhone 5s: basic fingerprint replication fails to defeat TouchID sensor.
- 2013‑09‑20:
Frog's knickers: a review of "Holy Shit: A Brief History of Swearing".
- 2013‑09‑19:
Time to tame the NSA behemoth trampling our rights.
- 2013‑09‑19:
The cltq story: undefined behaviour in code that seems to use only unsigned integers.
- 2013‑09‑18:
The d-left CBF has the same functionality as a counting Bloom filter, but generally uses half the space or less.
- 2013‑09‑18:
How Tim O'Reilly failed.
- 2013‑09‑18:
CEO who sold Doubleclick to Google replies to patent troll with racketeering lawsuit.
- 2013‑09‑18:
Cryptography for the paranoid.
- 2013‑09‑18:
A jewel at the heart of quantum physics.
- 2013‑09‑17:
Cryptography coding standard.
- 2013‑09‑17:
Getting real about distributed system reliability.
- 2013‑09‑17:
CDC report links use of antibiotics as livestock growth enhancer to human deaths.
- 2013‑09‑17:
Not the morphine: the size of the cage! Rat Park upturns conventional wisdom on addiction.
- 2013‑09‑17:
Updated SSL/TLS deployment best practices deprecate RC4.
- 2013‑09‑16:
Ronn: markdown to manpage converter.
- 2013‑09‑16:
The bizarre evolution of the word "cyber".
- 2013‑09‑16:
The banality of systemic evil.
- 2013‑09‑16:
DNSSEC validation for the PowerDNS Recursor.
- 2013‑09‑16:
SmartFacts: factorizing crypto keys created by certified secure smart cards.
- 2013‑09‑16:
NSA performs active MITM attacks.
- 2013‑09‑16:
The Republican plot to kill Obamacare.
- 2013‑09‑16:
Towards representing APL in Haskell.
- 2013‑09‑16:
Betrayal of the Internet imaginaire.
- 2013‑09‑15:
Good SSL server configuration is absurdly difficult in practice.
- 2013‑09‑14:
The Cambridge Tab has improved student journalism.
- 2013‑09‑14:
Things you should NEVER say during presentations.
- 2013‑09‑14:
Mac OS X security configuration guides.
- 2013‑09‑14:
Photos from the roof above King's Cross Station.
- 2013‑09‑14:
The ugliest C feature: tgmath.h
- 2013‑09‑14:
The Feynman lectures on physics.
- 2013‑09‑14:
Four options for reopening Varsity train line from Cambridge to Bedford revealed by Railfuture.
- 2013‑09‑13:
Solaris random number generation.
- 2013‑09‑13:
Stealthy dopant-level hardware trojans: malicious chips resistant to microscopic inspection.
- 2013‑09‑13:
The Hornsleth deep storage project is deeply, darkly, weird.
- 2013‑09‑13:
Software engineering: a great discipline for an academic fraudster.
- 2013‑09‑13:
Ray Dolby, 1933-2013.
- 2013‑09‑12:
It takes a village to save a hard drive.
- 2013‑09‑12:
Battle Mountain world human-powered speed challenge 2013.
- 2013‑09‑12:
Graeme Obree is aiming for 100mph on his "Beastie" at Battle Mountain this week.
- 2013‑09‑12:
History and implementation status of Opportunistic Encryption for IPsec.
- 2013‑09‑12:
Cambridge Teslathon, 26th/27th October 2013.
- 2013‑09‑12:
Defeating ebook DRM with a Kindle, an iSight, and Lego Mindstorms.
- 2013‑09‑11:
ZooKeeper vs. Doozer vs. Etcd.
- 2013‑09‑11:
(Intellectual) Property is Theft!
- 2013‑09‑11:
Gems mined from NSA documents and FISA court opinions.
- 2013‑09‑11:
The NSA machine: Too big for anyone to understand.
- 2013‑09‑11:
NSA: still bound by laws of computational complexity.
- 2013‑09‑11:
x86 oddities.
- 2013‑09‑10:
Bring back monad comprehensions.
- 2013‑09‑10:
How to fake fingerprints.
- 2013‑09‑10:
Polymer banknotes coming to the UK in 2016.
- 2013‑09‑10:
Superlinear indexes research project.
- 2013‑09‑10:
The TokuFS streaming file system.
- 2013‑09‑10:
Tokutek fractal tree indexing overview.
- 2013‑09‑10:
Hoxton Street Monster Supplies.
- 2013‑09‑10:
Counting to four billion really fast.
- 2013‑09‑10:
Fake storefronts in New York. (The Brooklyn Superhero Supply Company is super cool.)
- 2013‑09‑10:
The real NSA tradeoff: quality of governance.
- 2013‑09‑09:
Understanding the robustness of SSDs under power fault.
- 2013‑09‑09:
Code archaeology with Git.
- 2013‑09‑09:
How the cult of shareholder value wrecked American business.
- 2013‑09‑09:
Nothing up my sleeve number.
- 2013‑09‑09:
A guide to branching in Mercurial.
- 2013‑09‑09:
An in-depth analysis of Mercurial and Git branches.
- 2013‑09‑09:
git-remote-gcrypt: gpg-encrypted git remote storage.
- 2013‑09‑09:
NSA intelligence coup: terrorist suspects use pizza shops.
- 2013‑09‑09:
Authenticated encryption: encrypt-and-MAC vs encrypt-then-MAC vs MAC-then-encrypt.
- 2013‑09‑09:
ReDS: a framework for reputation-enhanced distributed hash tables.
- 2013‑09‑09:
Problems with IPSEC crypto. (1995)
- 2013‑09‑08:
On the British press's lack of interest in the NSA/GCHQ scandal.
- 2013‑09‑08:
National Service Bill. The 1950s called: they want their policies back.
- 2013‑09‑08:
Smoothies and fruit juices are a risk to health.
- 2013‑09‑08:
Dubstep: the musical.
- 2013‑09‑08:
Harvard Business School case study: gender equity.
- 2013‑09‑08:
Obama administration had restrictions on NSA reversed in 2011.
- 2013‑09‑08:
NSA can spy on all kinds of smart phones.
- 2013‑09‑07:
Global jellyfish populations appear to fluctuate on a decadal basis.
- 2013‑09‑07:
90% of Tor keys can be broken by the NSA.
- 2013‑09‑07:
Jellyfish are taking over!
- 2013‑09‑07:
UK government plans to take money from the working poor.
- 2013‑09‑07:
Sweden sits on pipeline of communications intelligence 'gold'.
- 2013‑09‑07:
1Password and the crypto wars.
- 2013‑09‑07:
A brief history of unusual punctuation marks.
- 2013‑09‑07:
Speculation on NSA activity in IPSEC standardization.
- 2013‑09‑07:
NSA access is built into Windows.
- 2013‑09‑06:
Certified lies: detecting and defeating government interception attacks against SSL.
- 2013‑09‑06:
A path forward for an LLVM toolchain on Windows.
- 2013‑09‑06:
What if an attacker tampers with /etc/ssh/moduli?
- 2013‑09‑06:
How CMU increased the proportion of women in computer science from 7% to 42%.
- 2013‑09‑06:
Nginx is taking over the Internet.
- 2013‑09‑06:
Toys R Us pledges to stop gender specific product marketing.
- 2013‑09‑06:
BeeLine reader: colour gradients help eyes track lines more easily.
- 2013‑09‑06:
The public interest argument for publishing the NSA decryption story.
- 2013‑09‑06:
Matt Green on the NSA.
- 2013‑09‑06:
Security dangers of NIST elliptic curves.
- 2013‑09‑06:
Cambridge parkour POV. (YouTube)
- 2013‑09‑06:
Did the NSA put a backdoor in new crypto RNG standard?
- 2013‑09‑06:
Cambridge UKIP candidate Hugh Mennie fined for forging election signatures.
- 2013‑09‑06:
How advanced is the NSA's cryptanalysis, and can we resist it?
- 2013‑09‑06:
How to remain secure against NSA surveillance.
- 2013‑09‑06:
Bias in computer systems.
- 2013‑09‑06:
Technological due process.
- 2013‑09‑06:
Welcome to human rights: make yourself uncomfortable. Internet freedom and humanitarian aid.
- 2013‑09‑05:
NSA and GCHQ defeat crypto and security on the internet.
- 2013‑09‑05:
Train toilets of the world.
- 2013‑09‑05:
1000 Americans try to name a British city other than London.
- 2013‑09‑05:
The baby and the Ba'ath water: US interference in Syria in the 1940s.
- 2013‑09‑04:
DNS cache poisoning: new vulnerabilities and implications.
- 2013‑09‑04:
DNS UDP fragmentation considered poisonous.
- 2013‑09‑04:
Don't run a Tor router and a hidden service from the same connection!
- 2013‑09‑04:
Bridge over troubled bolts: safety concerns about new Bay Bridge.
- 2013‑09‑04:
Soviet cable cars above a Georgian mining town.
- 2013‑09‑03:
Microsoft plus Nokia: Pending patent troll?
- 2013‑09‑03:
Trying for academic tenure without publishing.
- 2013‑09‑03:
The patent troll crisis is really a software patent crisis.
- 2013‑09‑03:
Sealand is planning Havenco 2.0.
- 2013‑09‑02:
Google Play Services: the closed-source meta-app that is defragging Android.
- 2013‑09‑02:
Generators vs fibers in node.js: statically marked vs unmarked coroutines.
- 2013‑09‑02:
On compiling 34 year old C code.
- 2013‑09‑02:
Wikipedia decides to disregard Manning's change of name.
- 2013‑09‑02:
How to choose colours procedurally.
- 2013‑09‑02:
The Leaky Establishment: nuclear comedy ebook.
- 2013‑09‑02:
Offender tagging: electronic curfew in the UK.
- 2013‑09‑02:
Syria: climate change, drought and social unrest.
- 2013‑09‑01:
One-legged man accused of benefit fraud after officials examine wrong leg.
- 2013‑09‑01:
Indiana man accused of teaching people to beat lie detector tests faces prison.
- 2013‑09‑01:
Who has more info: Guantánamo defense lawyers or Hollywood?
- 2013‑08‑31:
Build cycling infrastructure like Livingston!
- 2013‑08‑31:
What happens when someone takes on US consumer protection regulators.
- 2013‑08‑31:
MOV is Turing complete.
- 2013‑08‑31:
A properly untranslatable word: 爽
- 2013‑08‑31:
Ballmer: The man who got the Innovator's Dilemma too much.
- 2013‑08‑31:
The US GAO on the problems with software patents.
- 2013‑08‑31:
The sovereign double-standard: US power and interventionism.
- 2013‑08‑31:
All 9,866,539 buildings in the Netherlands, shaded according to year of construction.
- 2013‑08‑31:
After patent loss, Apple tweaks FaceTime to route all calls via their servers.
- 2013‑08‑31:
Reversing Sinclair's amazing 1974 single chip scientific calculator.
- 2013‑08‑31:
How much does HFT latency arbitrage take from other traders?
- 2013‑08‑31:
California's foie gras ban is upheld by appeals court.
- 2013‑08‑31:
CoffeeScript is 4 times more concise than C.
- 2013‑08‑30:
High school journalists successfully test shield law In cyberbullying suicide case.
- 2013‑08‑30:
How to make your own halloumi.
- 2013‑08‑30:
The active badge location system. (1992)
- 2013‑08‑30:
Guided busway legal battle with BAM Nuttall settled by Cambridgeshire County Council.
- 2013‑08‑30:
Success for LGBT+ campaign, as Cambridge University drops gendered dress codes.
- 2013‑08‑30:
UK government may develop new chemical weapon for use on protesters.
- 2013‑08‑29:
Spy Kids: the NSA and the end of jobs for life.
- 2013‑08‑29:
The strange death of the British middle class.
- 2013‑08‑28:
London to Brighton by train, in 1953, 1983, and 2013.
- 2013‑08‑28:
SQLite's next-generation query planner.
- 2013‑08‑28:
Looking inside the Dropbox client: reverse engineering and security analysis.
- 2013‑08‑28:
Dang ol' babies!
- 2013‑08‑28:
Gallery of multiprocessor cache effects.
- 2013‑08‑27:
The CODE keyboard. (Pity about the typography.)
- 2013‑08‑27:
8 questions to ask before you automate.
- 2013‑08‑27:
Spoof geolocation with a rogue WiFi AP.
- 2013‑08‑27:
Necessary and proportionate surveillance?
- 2013‑08‑27:
Righting the ship on US higher education costs.
- 2013‑08‑27:
GitHub featured in the New Yorker.
- 2013‑08‑27:
The Bristol bus boycott that led to the race relations acts.
- 2013‑08‑27:
Cryptobox: a crypto API modelled on DJB's NaCl using NIST ciphers.
- 2013‑08‑27:
How might the feds have snooped on Lavabit?
- 2013‑08‑27:
Wireless mesh networks will save us from censorship.
- 2013‑08‑26:
High resolution photographs and 3D models of British fossils.
- 2013‑08‑26:
Wireless mesh networks won't save us from censorship.
- 2013‑08‑26:
The spooks' aim: To make journalism harder, slower, less secure.
- 2013‑08‑26:
How Snowden did it.
- 2013‑08‑26:
Mind the gap: London Underground station platform gaps.
- 2013‑08‑26:
Security Debianisms.
- 2013‑08‑26:
Accidentally Turing-Complete.
- 2013‑08‑26:
Lessons learned from mistakes made scaling Reddit to 1 billion pageviews a month.
- 2013‑08‑26:
Phone hack can block calls and SMS on GSM networks.
- 2013‑08‑26:
The greatest mystery of the Inca Empire was its strange economy.
- 2013‑08‑26:
ostree: atomic upgrade and rollback for Linux systems.
- 2013‑08‑26:
The Posix filesystem API sucks.
- 2013‑08‑26:
Comparing U.S. vs world covers of TIME magazine.
- 2013‑08‑26:
State of innovation: Busting the private-sector myth.
- 2013‑08‑26:
The best map ever made of America's racial segregation.
- 2013‑08‑26:
Write-optimized B-trees.
- 2013‑08‑26:
The Science of Cycology: can you draw a bicycle?
- 2013‑08‑26:
When authorities confiscate your electronics they will install malware before returning them.
- 2013‑08‑26:
Fewer accidents in Oxford after speed limits reduced to 20mph.
- 2013‑08‑26:
Mesh networking approaches the mainstream.
- 2013‑08‑26:
olsrd: an adhoc wireless mesh routing daemon.
- 2013‑08‑26:
Comparing AODV and OLSR mesh routing protocols.
- 2013‑08‑26:
Economic reductionism stops here.
- 2013‑08‑26:
Declassified CIA files prove America helped Saddam target chemical weapons against Iran.
- 2013‑08‑26:
Pregnancy: the hard facts.
- 2013‑08‑26:
Use two-factor authentication for Mozilla Persona on your own domain.
- 2013‑08‑25:
Net into dire muck (an anagram of Nominet Direct UK).
- 2013‑08‑25:
A third party report on the open .uk 2LD proposal.
- 2013‑08‑25:
Nimrod: a statically typed language with macros and message-passing concurrency.
- 2013‑08‑25:
Idea: git push requests.
- 2013‑08‑25:
Boilerplate for autotools-based C project.
- 2013‑08‑25:
The seven deadly sins of distributed systems.
- 2013‑08‑25:
1980s horror movie poster logos and typography.
- 2013‑08‑24:
Met police refusing to co-operate with IPCC investigation into abuse of border interrogation powers.
- 2013‑08‑24:
Closing TCP connections is unreliable.
- 2013‑08‑24:
The Lib Dems used to keep us honest. Not any more.
- 2013‑08‑24:
Somebody's listening: Duncan Campbell's report on Echelon. (1988)
- 2013‑08‑24:
How the government finally ruins 3D printing.
- 2013‑08‑24:
Banned hallucinogen ibogaine could cure heroin addiction.
- 2013‑08‑24:
What Manning revealed.
- 2013‑08‑24:
Parsing C++ is undecidable.
- 2013‑08‑24:
C++ and the culture of complexity.
- 2013‑08‑24:
CoVim: collaborative editing for vim.
- 2013‑08‑23:
CloudFlare's new WAF: compiling to Lua.
- 2013‑08‑23:
Two cheers for GitHub.
- 2013‑08‑23:
Divisibility rules for hex.
- 2013‑08‑23:
The obesity epidemic started around 1980.
- 2013‑08‑23:
UK government now leaking documents about itself.
- 2013‑08‑23:
UK's secret Mid-East internet surveillance base.
- 2013‑08‑23:
How biased is the BBC?
- 2013‑08‑23:
Soldering is Easy: here's how to do it.
- 2013‑08‑23:
SMT soldering: it's easier than you think!
- 2013‑08‑23:
Another Sokal takedown: the number 2.9013 will go down in the history of bad science.
- 2013‑08‑23:
The confidential memo at the heart of the global financial crisis.
- 2013‑08‑23:
How computers took over trading.
- 2013‑08‑23:
How to make perfect coffee.
- 2013‑08‑23:
The silent power of the NSA. (1983)
- 2013‑08‑23:
Chelsea Manning: on pressing the button.
- 2013‑08‑23:
NSA domestic spying: Mathematicians should speak out.
- 2013‑08‑22:
Authentication flaws in the Tesla Model S REST API.
- 2013‑08‑22:
Why do so many incompetent men become leaders?
- 2013‑08‑22:
The real, terrifying reason why the British authorities detained David Miranda.
- 2013‑08‑22:
SourceForge making money from malware installers.
- 2013‑08‑22:
Forward secrecy for asynchronous messaging.
- 2013‑08‑22:
OpenSSL PRNG is not really fork-safe.
- 2013‑08‑22:
nanomsg: an improved ØMQ.
- 2013‑08‑22:
Social Engineering: security through education.
- 2013‑08‑22:
Deterministic builds for Tor: why? Cyberwar and global compromise.
- 2013‑08‑22:
CIA closes office that declassifies historical materials.
- 2013‑08‑22:
DHS lawyer says travelers need not submit to TSA VIPR searches.
- 2013‑08‑22:
UK government considers banning tiny mobile phones.
- 2013‑08‑22:
Real spies got shorter sentences than Bradley Manning.
- 2013‑08‑22:
A PHP implementation written in PHP.
- 2013‑08‑21:
The algebra of Unix shell history substitution.
- 2013‑08‑21:
A week with Mozilla Rust.
- 2013‑08‑21:
Painted rainbow nails are too gay for the Olympics.
- 2013‑08‑21:
US intelligence on the record.
- 2013‑08‑21:
Surveillance, censorship, and secrecy - Pacific island style.
- 2013‑08‑21:
Volkan the Intruder: one-man underpants party in Merkel's jet.
- 2013‑08‑21:
The whistleblower's mad moral courage.
- 2013‑08‑21:
2011 FISA court opinion ruling some NSA surveillance unconstitutional.
- 2013‑08‑21:
The only way to avoid the US invention secrecy act is to forgo patent protection.
- 2013‑08‑21:
Containers and Docker: how secure are they?
- 2013‑08‑21:
Does the Cabinet Secretary think democracy is a frivolous game?
- 2013‑08‑21:
Pixarific Rim.
- 2013‑08‑21:
Four fears for authoritarians.
- 2013‑08‑21:
August 2013 GNU Toolchain update.
- 2013‑08‑21:
The key to happiness? love something to the point of ridicule.
- 2013‑08‑21:
Surveillance, totalitarianism and botched up causality.
- 2013‑08‑21:
Bradley Manning's sentence: 35 years for exposing us to the truth.
- 2013‑08‑21:
Zircon affair: UK government secrecy vs journalism in the 1980s.
- 2013‑08‑21:
NSA taps 75% of Internet traffic in the USA.
- 2013‑08‑21:
An astronaut nearly drowned in space.
- 2013‑08‑21:
The 5-in-1 network admin's cable.
- 2013‑08‑21:
The great App.net mistake.
- 2013‑08‑21:
DNS reflection attacks, and measuring resolver support for DNS over TCP.
- 2013‑08‑20:
NSA documents released to the public since June 2013.
- 2013‑08‑20:
What the spooks know. (2005)
- 2013‑08‑20:
Count the women. Count the people of color.
- 2013‑08‑20:
Heuristics and rules: why CloudFlare built a new old WAF.
- 2013‑08‑20:
Louise Mensch provides a right wing view of Snowden / Greenwald / Miranda.
- 2013‑08‑20:
Mac OS X hardening tips from the NSA.
- 2013‑08‑20:
Getopt::Declare: generate command line parsers for Perl programs from their usage documentation.
- 2013‑08‑20:
genparse: command line parser generator.
- 2013‑08‑20:
docopt: generate a command-line argument parser from your usage documentation.
- 2013‑08‑20:
Patent trolls: Tracking down the litigious invention owners.
- 2013‑08‑20:
Groklaw shuts down due to pervasive surveillance.
- 2013‑08‑20:
John le Carré: the spies who lost it.
- 2013‑08‑20:
John le Carré: "I was a secret even to myself."
- 2013‑08‑20:
Bradley Manning and the two Americas.
- 2013‑08‑20:
UK defence authority notice system: quasi-unofficial press censorship.
- 2013‑08‑20:
US government prosecuting instructors of polygraph-beating methods.
- 2013‑08‑19:
What did the US government ask Lavabit to do?
- 2013‑08‑19:
Research software engineers have no recognised career path within universities.
- 2013‑08‑19:
Srelipmoc in esruoc tsrif a.
- 2013‑08‑19:
The danger that reporters now face: GCHQ think destroying laptops in London will stop Snowden's stories.
- 2013‑08‑19:
New features in JavaScript / ECMAScript 6.
- 2013‑08‑19:
David Miranda detention at Heathrow and schedule 7 of the Terrorism Act.
- 2013‑08‑19:
Google claims it is not subject to UK privacy laws.
- 2013‑08‑19:
Moore's law could stay on track with progress in extreme UV photolithography.
- 2013‑08‑19:
The phenomenon of bullshit jobs.
- 2013‑08‑19:
JavaScript ~~ double bitwise not is a fast alternative to Math.floor.
- 2013‑08‑19:
Measuring the practical impact of DNSSEC deployment.
- 2013‑08‑19:
B4: Google's private globally-deployed software-defined WAN.
- 2013‑08‑19:
python-raven: ucam-webauth and Raven application agent in Python.
- 2013‑08‑19:
Managed runtime initiative: a (failed) attempt to improve Linux kernel support for userland garbage collection.
- 2013‑08‑19:
Teaching race to white kids.
- 2013‑08‑19:
How Laura Poitras helped Snowden spill his secrets.
- 2013‑08‑18:
C++ resumable functions: async and await.
- 2013‑08‑18:
UK limits on political campaign spending will criminalize dissent.
- 2013‑08‑18:
Update on PyPy software transactional memory.
- 2013‑08‑18:
I hate the Pumping Lemma.
- 2013‑08‑18:
UK border guards detain and interrogate journalist's partner over NSA/GCHQ spying reports.
- 2013‑08‑18:
Jeff Dean on how neural networks are improving everything Google does.
- 2013‑08‑18:
Are short methods actually worse?
- 2013‑08‑18:
Truffle/Graal: one VM to rule them all: fast dynamic languages, with a Ruby prototype.
- 2013‑08‑18:
Kal: a JavaScript reskin with async wait.
- 2013‑08‑18:
Preferential voting explained by a dingo-punching koala.
- 2013‑08‑18:
Cookieless cookies using ETag.
- 2013‑08‑18:
40 interesting maps.
- 2013‑08‑17:
New tweets per second record: how it became possible.
- 2013‑08‑17:
C ints are finite numbers! Using _Generic to define isnan().
- 2013‑08‑17:
Graceful degradation of SVG image tags.
- 2013‑08‑17:
Travels with Smalltalk.
- 2013‑08‑17:
PiCL crypto review: Firefox sync / profile in the cloud.
- 2013‑08‑17:
Effect of drug prohibition spending on addiction rates.
- 2013‑08‑17:
C# async: Callbacks are our generation's goto statement.
- 2013‑08‑16:
The International Olympic Committee supports Russia's homophobic law.
- 2013‑08‑14:
What mercury being liquid at room temperature has to do with Einstein's theory of relativity.
- 2013‑08‑14:
UK ISPs blindly block innocent web sites.
- 2013‑08‑14:
Aircrew map of Britain.
- 2013‑08‑14:
Understanding Russia's homophobia.
- 2013‑08‑14:
Subverting BIND's SRTT algorithm: derandomizing NS selection.
- 2013‑08‑14:
Why is cycling so popular in the Netherlands?
- 2013‑08‑14:
Latitude, longitude? MQTTitude! A decentralized Google Latitude.
- 2013‑08‑14:
Proof pearl: a verified bignum implementation in x86-64 machine code.
- 2013‑08‑13:
Beery type designers hack Jupiler coasters.
- 2013‑08‑13:
Babelmark FAQ: on the differences between Markdown implementations.
- 2013‑08‑13:
Hacking Transcend WiFi SD cards.
- 2013‑08‑13:
Railway safety doesn't need scare quotes: it works.
- 2013‑08‑13:
64-bit time_t now on OpenBSD.
- 2013‑08‑12:
Return by value in C.
- 2013‑08‑12:
Straight Pride UK try to censor their own press release.
- 2013‑08‑12:
Hyperloop.
- 2013‑08‑12:
Randomly failed! Weaknesses in Java SecureRandom.
- 2013‑08‑12:
Every important person in Bitcoin just got subpoenaed by New York's financial regulator.
- 2013‑08‑12:
Redefining 'undefined' in JavaScript.
- 2013‑08‑12:
LightSquared investor sues GPS companies in attempt to recover wasted money.
- 2013‑08‑12:
UKIP Cambridgeshire county council candidate charged with forging signatures on nomination form.
- 2013‑08‑12:
Mio: a high-performance multicore IO manager for GHC.
- 2013‑08‑11:
Newspapers in the US: How the post was lost.
- 2013‑08‑11:
Reverse engineering Megamos car security crypto?
- 2013‑08‑11:
When did we start trusting code without security management?
- 2013‑08‑11:
Hamlet is banned at the British Library.
- 2013‑08‑10:
Tallinn becomes "capital of free public transport".
- 2013‑08‑10:
The history of the default iPhone message alert sound.
- 2013‑08‑10:
The datacenter as a computer: an introduction to the design of warehouse-scale machines. (second edition)
- 2013‑08‑09:
Kids can't use computers... and this is why it should worry you.
- 2013‑08‑09:
Maybe the real state secret is that spies aren't very good at their jobs.
- 2013‑08‑09:
British court blocks publication of VW Megamos security analysis.
- 2013‑08‑09:
Two providers of secure email shut down.
- 2013‑08‑09:
STACK: optimisation-unstable code checker.
- 2013‑08‑09:
NSA to sack 90% of its system administrators.
- 2013‑08‑09:
Urban grid management and the police state in China.
- 2013‑08‑09:
Encrypted e-mail service linked to Edward Snowden shut down by US government.
- 2013‑08‑09:
Americans are eight times more likely to be killed by cops than by terrorists.
- 2013‑08‑09:
Why I changed my mind about cannabis.
- 2013‑08‑09:
What is it about the Internet that turns people into massive dicks?
- 2013‑08‑08:
Why everyone is pissed off about Google Chrome's password storage.
- 2013‑08‑08:
A leap second bug led Facebook to develop better data center infrastructure management tools.
- 2013‑08‑08:
The quiet carriage proficiency test.
- 2013‑08‑08:
Staring at the sun: Dalvik vs. ASM.js vs. native code.
- 2013‑08‑08:
What derailed the UK economic recovery?
- 2013‑08‑07:
Typo: a programming language that runs in Haskell's type system.
- 2013‑08‑07:
Shanghai 26 years ago and now.
- 2013‑08‑07:
Should legal codes be copyrighted? Let's sue to find out!
- 2013‑08‑07:
Defending against the BREACH https compression information leak attack.
- 2013‑08‑07:
If Bruce Schneier ran the NSA, he'd ask a basic question: "Does it do any good?"
- 2013‑08‑07:
The Toobin principle: repeal the concept of an informed public, repress your decision to take such a drastic step.
- 2013‑08‑06:
Resistive RAM: a terabyte on a chip, smaller than flash.
- 2013‑08‑06:
Former NSA chief terrified of nihilists, anarchists, activists, Lulzsec, Anonymous, twentysomethings.
- 2013‑08‑06:
Bruce Sterling vs Internet freedom activists.
- 2013‑08‑06:
The simplest periodic table: no numbers, no letters, just dots.
- 2013‑08‑06:
Phabricator: code review, bug tracker, source browser, wiki...
- 2013‑08‑06:
Configuring Apache, nginx, and OpenSSL for forward secrecy.
- 2013‑08‑06:
Sterling's "The Ecuadorian Library" vs civil liberties groups.
- 2013‑08‑06:
The use and abuse of civil forfeiture.
- 2013‑08‑06:
Welcome to post-constitutional America.
- 2013‑08‑06:
Remembering the Apple Newton's prophetic failure and lasting impact.
- 2013‑08‑05:
Car hacking research paper and software.
- 2013‑08‑05:
cson: compact textual json variant.
- 2013‑08‑05:
A switch failure in Utah took out four big hosting providers.
- 2013‑08‑05:
hlld: A high performance C server for HyperLogLog cardinality estimation.
- 2013‑08‑05:
SNMP reflection/amplification DDoS: the vulnerability you might not know you have.
- 2013‑08‑05:
Dava Sobel on leap seconds.
- 2013‑08‑05:
Co-ordinated omission: when high-latency requests make performance statistics look better.
- 2013‑08‑04:
Strongly universal string hashing is fast.
- 2013‑08‑04:
Sharing science is a crime.
- 2013‑08‑04:
Xerox scanners/photocopiers randomly alter numbers in scanned documents.
- 2013‑08‑04:
Half of TOR sites compromised.
- 2013‑08‑04:
Ethics and power in the long war.
- 2013‑08‑04:
How to support both Python 2 and 3.
- 2013‑08‑03:
Raft: an understandable consensus algorithm.
- 2013‑08‑03:
etcd: a highly-available key value store for shared configuration and service discovery.
- 2013‑08‑03:
Dust: a censorship-resistant Internet transport protocol.
- 2013‑08‑03:
40 unusual maps.
- 2013‑08‑03:
Why did the NSA not have a contingency plan?
- 2013‑08‑03:
Embedded C++
- 2013‑08‑03:
International principles on the application of human rights to communications surveillance.
- 2013‑08‑03:
The Ecuadorian Library: Bruce Sterling on the NSA.
- 2013‑08‑03:
How we all pay for bankers.
- 2013‑08‑03:
Archaeology: The milk revolution.
- 2013‑08‑03:
Most Dutch undersea cables are operated by friends of GCHQ.
- 2013‑08‑03:
If we ignore the human in the 'troll', they will always exist.
- 2013‑08‑03:
Universal Credit staff describe chaos behind scenes of flagship Tory reform.
- 2013‑08‑03:
Writing advice from Chuck Palahniuk.
- 2013‑08‑03:
Patient lost £18,000 data protection battle over GP medical records.
- 2013‑08‑03:
Bikes are taking over London.
- 2013‑08‑03:
Twitter issues new rules to crack down on abuse.
- 2013‑08‑03:
What are your rights if stopped by Home Office officials in the street?
- 2013‑08‑03:
Forebruary: a calendar for every month.
- 2013‑08‑03:
Sweden does not produce enough rubbish to feed its power plants.
- 2013‑08‑03:
How the Snowden saga will end.
- 2013‑08‑03:
And I'm like, Quotative 'like' isn't just for quoting.
- 2013‑08‑03:
Penguin's insane policy on electronic galleys for authors.
- 2013‑08‑02:
I can still see your actions on Google Maps over SSL.
- 2013‑08‑02:
Carriers rush to fix SIM card vulnerability by hacking into them.
- 2013‑08‑02:
Entire University of California goes open access.
- 2013‑08‑02:
More UKBA racism.
- 2013‑08‑02:
Paypal turns blind eye to payments totaling $35,000 for on-demand DDoS.
- 2013‑08‑02:
How to talk to your daughter about her body.
- 2013‑08‑02:
Updates to online archived news stories need to be kept current, rules High Court.
- 2013‑08‑02:
The Snowden Effect: definition and examples.
- 2013‑08‑02:
Goldman Sachs overstepped by criminally prosecuting its ex-programmer.
- 2013‑08‑02:
Fast and loose reasoning is morally correct: treating languages as if they are total.
- 2013‑08‑01:
Employer tipped off police to pressure cooker and backpack searches.
- 2013‑08‑01:
The future of https on Wikipedia.
- 2013‑08‑01:
NSA pays £100m in secret funding for GCHQ.
- 2013‑08‑01:
Pressure cookers, backpacks and quinoa: Internet searches lead to visit from terrorist task force.
- 2013‑08‑01:
NSA's Utah data centre construction project.
- 2013‑07‑31:
OSI: the internet that wasn't.
- 2013‑07‑31:
Great visualizations of twitter activity.
- 2013‑07‑31:
PEG.js: parser generator for JavaScript.
- 2013‑07‑31:
Most toxic behaviour does not come from toxic people.
- 2013‑07‑31:
Practical demo of GPS spoofing with an $80 million yacht.
- 2013‑07‑31:
How to help someone stopped for an immigration ID check.
- 2013‑07‑31:
Testing embedded applications with greatest.
- 2013‑07‑31:
Pictures of Tottenham Court Road Station works.
- 2013‑07‑31:
The struct hack invokes undefined behaviour, from Pascal strings to Python tuples.
- 2013‑07‑30:
NSA: the decision problem.
- 2013‑07‑30:
A hole in our collective memory: copyright made mid-century books vanish.
- 2013‑07‑30:
Naked ladies infected with smut fungus.
- 2013‑07‑30:
There are plenty of contexts in which to be "neutral" is simply to be wrong.
- 2013‑07‑30:
John Carmack's .plan files from 1997.
- 2013‑07‑30:
OMG! They're using Windows RT!
- 2013‑07‑30:
The "sea of nodes" approach in the Java HotSpot server compiler.
- 2013‑07‑30:
Fungicides implicated in bee colony collapse disorder.
- 2013‑07‑30:
Semantic hashing for similar document retrieval.
- 2013‑07‑30:
Regulation, technology and caution are making fires a thing of the past.
- 2013‑07‑30:
On the security of TLS: a systematic analysis.
- 2013‑07‑30:
New York Subway map based on radial lines.
- 2013‑07‑30:
Those who deny access to history are condemned repeatedly.
- 2013‑07‑30:
Serco: the company that is ru[in]ning Britain.
- 2013‑07‑30:
UK to charge £3000 bond for visas from six former colonies.
- 2013‑07‑30:
A purely hypothetical conversation about censorship.
- 2013‑07‑29:
A brief history of sour beer.
- 2013‑07‑29:
Simplifying OTR deniability.
- 2013‑07‑29:
GPS jamming.
- 2013‑07‑29:
Who are the trolls?
- 2013‑07‑29:
Raspberry Pi dashcam overlaid with OBD telemetry.
- 2013‑07‑29:
Why YouTube buffers: The secret deals that make and break online video.
- 2013‑07‑29:
Clever card fraud based on a land line user interface gotcha.
- 2013‑07‑29:
Women-hating trolls come out on a radio call-in.
- 2013‑07‑29:
How to choose randomly with a coin.
- 2013‑07‑29:
Political momentum builds against NSA surveillance.
- 2013‑07‑29:
The difference between Boolean objects and primitives in JavaScript.
- 2013‑07‑29:
The surprisingly short history of the history of technology.
- 2013‑07‑29:
SkyMall's SkyFall.
- 2013‑07‑28:
Variable scoping in CoffeeScript and JavaScript.
- 2013‑07‑28:
Scientist banned from revealing codes used to start luxury cars.
- 2013‑07‑28:
US government is trying to get user account passwords.
- 2013‑07‑27:
Le systeme Chappe: Napoleon's semaphore telegraph.
- 2013‑07‑27:
Government bee scientist behind controversial study joins pesticide firm.
- 2013‑07‑27:
Rape threats on Twitter won't get women to shut up. If we shout back we'll win.
- 2013‑07‑27:
20 years of attacks on RSA.
- 2013‑07‑27:
We need an engineering-oriented replacement for Applied Cryptography.
- 2013‑07‑27:
Hackers reveal nasty new car attacks.
- 2013‑07‑27:
Anita Sarkeesian and the gamification of misogyny.
- 2013‑07‑27:
Asciiflow: ASCII art flow diagram tool.
- 2013‑07‑26:
When smart homes get hacked.
- 2013‑07‑26:
Nate Silver's departure from the New York Times and fake vs real objectivity.
- 2013‑07‑26:
Group messaging crypto and the CAP theorem.
- 2013‑07‑26:
Stickonspy: NSA branded web cam stickers.
- 2013‑07‑26:
Performance of Haskell vs ninja C.
- 2013‑07‑26:
A measure of sacrifice: the mechanisation of time.
- 2013‑07‑26:
Mozilla's work on eliminating conservative GC to support moving generational GC.
- 2013‑07‑26:
Hollywood's takeover by Blake Snyder's formulaic screenwriting book, Save the Cat!
- 2013‑07‑25:
Switching from Gmail to FastMail.
- 2013‑07‑25:
The .pw and .la domain name auctions show there isn't much money in new TLDs.
- 2013‑07‑25:
The hourglass: an underrated invention.
- 2013‑07‑25:
US government is trying to get TLS private keys.
- 2013‑07‑25:
FAQs: why gov.uk doesn't have them.
- 2013‑07‑25:
Butterick's Practical Typography.
- 2013‑07‑25:
Anti-usability dark patterns: the slippery slope.
- 2013‑07‑25:
The unprofitable SaaS business model.
- 2013‑07‑25:
The Mail claims victory in moral crusade.
- 2013‑07‑25:
Macaw: the code-savvy web design tool.
- 2013‑07‑25:
Is overblocking defamatory?
- 2013‑07‑25:
LL and LR parsing demystified.
- 2013‑07‑24:
The evolution of Direct3D.
- 2013‑07‑24:
The vitamin myth.
- 2013‑07‑24:
Lots of ideas for software.
- 2013‑07‑24:
Common misconceptions about computers.
- 2013‑07‑24:
CloudFlare's fourth generation server design.
- 2013‑07‑24:
Crypto flaw makes millions of phone SIMs susceptible to hijacking.
- 2013‑07‑24:
First confirmed patent application rejected due to Ask Patents.
- 2013‑07‑24:
Visual Poi: very swish LED light-writing.
- 2013‑07‑24:
Distributed flight array: autonomous robots self-assemble and take flight as one.
- 2013‑07‑24:
What teachers make.
- 2013‑07‑19:
Our new same-sex marriage is not yet equal marriage.
- 2013‑07‑19:
AppleScript is protestant with a lower-case "p", as iOS and much of OS X is catholic with a lower-case "c".
- 2013‑07‑19:
JavaScript isn't Scheme.
- 2013‑07‑19:
North Sentinel: the forbidden island.
- 2013‑07‑19:
Archives of the Board of Longitude now online.
- 2013‑07‑19:
An arrest in response to the March DDoS attacks on Spamhaus.
- 2013‑07‑18:
Pitch drop experiment drops pitch after 69 years.
- 2013‑07‑18:
Gay marriage: a database engineering perspective.
- 2013‑07‑18:
Your dog can get vaccinated against Lyme disease but you can't.
- 2013‑07‑17:
What is the difference between common and civil law?
- 2013‑07‑17:
If the NSA can't do it over the net, the CIA will pwn your computer in person.
- 2013‑07‑17:
Should we regard young driver deaths as a scandal? RAC proposes graduated drivers licences.
- 2013‑07‑17:
Which proposed new gTLDs suffer the most from squatting and bogus query traffic?
- 2013‑07‑17:
Mission creep: when everything is terrorism.
- 2013‑07‑17:
Update on Computing Service moves.
- 2013‑07‑16:
A mechanical mosquito deterrent.
- 2013‑07‑16:
Is the EU data protection regulation revision dead? If not, should it be?
- 2013‑07‑15:
Who has the most web servers?
- 2013‑07‑15:
USA gave asylum to someone who leaked classified documents.
- 2013‑07‑15:
GitHub finally takes open source licenses seriously.
- 2013‑07‑15:
Dyninst API for runtime code insertion.
- 2013‑07‑15:
Cello: higher level programming in GNU C99.
- 2013‑07‑15:
US CALEA supports the use of strong end-to-end encryption.
- 2013‑07‑15:
Leaked letter shows ISPs and government at war over porn filters.
- 2013‑07‑15:
Water is a better metaphor for the great firewall of China.
- 2013‑07‑15:
Where the hell is the economic and political outrage?
- 2013‑07‑15:
NSA backdoors in old Crypto AG ciphering machines.
- 2013‑07‑15:
When a mathematical hypothesis is neither true nor false.
- 2013‑07‑15:
Engineers and the managers they make.
- 2013‑07‑15:
Where will all the traffic go when you remove an inner-city highway?
- 2013‑07‑15:
Has patent, will sue: an alert to corporate America.
- 2013‑07‑15:
Think your office is soulless? Check out this Amazon warehouse.
- 2013‑07‑14:
HyperRogue III: a roguelike game in non-Euclidean space.
- 2013‑07‑14:
A human-powered helicopter wins the $250,000 Sikorsky prize.
- 2013‑07‑14:
Reduce latency by putting TLS endpoints near users.
- 2013‑07‑14:
dygraphs: JavaScript visualization library.
- 2013‑07‑14:
Travellers' mobile phone data seized by police at UK border.
- 2013‑07‑14:
Why James Chartrand wears women's underpants.
- 2013‑07‑13:
There is no benefit in reducing salt intake and it may even be dangerous.
- 2013‑07‑13:
The USA's incarceration epidemic.
- 2013‑07‑13:
Stig of the Dump: an appreciation on its 50th anniversary.
- 2013‑07‑13:
Mozilla's root CA certificate store continues to grow.
- 2013‑07‑13:
David Cameron told to sack strategy chief over corrupt link to tobacco giants.
- 2013‑07‑13:
The death of David Kelly 10 years on.
- 2013‑07‑13:
Wanting to build first without Javascript is not the same as hating it.
- 2013‑07‑13:
An ingenious paper map with multiple zoom levels.
- 2013‑07‑13:
What most Americans don't know about America.
- 2013‑07‑13:
Changing the Creepy Guy narrative.
- 2013‑07‑13:
The history of CTRL + ALT + DELETE.
- 2013‑07‑13:
Using Phones/SMS for 2FA is unwise.
- 2013‑07‑13:
The Ireland abortion debate, summed up in one disrespectful gesture.
- 2013‑07‑13:
Staying on top of TLS attacks.
- 2013‑07‑13:
Barrett Brown, political prisoner of the information revolution.
- 2013‑07‑13:
Disrupting the pink aisle: an engineering toy that went from Kickstarter to bestseller.
- 2013‑07‑13:
The latest in a series of terrorist attacks in Britain.
- 2013‑07‑13:
A heart surgeon explains what really causes heart disease.
- 2013‑07‑13:
Why is nobody using SSL client certificates?
- 2013‑07‑12:
Data protection enforcement in UK, France and Germany.
- 2013‑07‑12:
Simon Tatham's adages, laws, and rules of thumb.
- 2013‑07‑12:
F-ing modules: an ML-style module system in System Fω.
- 2013‑07‑12:
Fandomized algorithms and fandom number generation.
- 2013‑07‑12:
Stop hiding your imperfect and incomplete ideas.
- 2013‑07‑11:
Desert Bus: the worst video game ever created.
- 2013‑07‑11:
Lightweight contention management for efficient CAS operations.
- 2013‑07‑11:
Calca: a symbolic calculating text editor for engineers.
- 2013‑07‑11:
Snooping on Microsoft wireless keyboards with cheap hardware.
- 2013‑07‑11:
Finding undefined behavior bugs by finding dead code.
- 2013‑07‑10:
The complete Calvin and Hobbes.
- 2013‑07‑10:
I made one change that day. I put Mr in front of my name on my CV.
- 2013‑07‑10:
Jordan Hubbard moves from Apple to iXsystems.
- 2013‑07‑10:
Combien de bises faites-vous dans votre département ?
- 2013‑07‑10:
Robotron and assembly language OOP.
- 2013‑07‑10:
Low latency requires smart queuing.
- 2013‑07‑10:
Senseless spying: the NSA's self-defeating espionage against the EU.
- 2013‑07‑10:
Programming by reasoning or from memory?
- 2013‑07‑10:
Snowden, Morales, and the Bolivian presidential plane: a massive own goal.
- 2013‑07‑10:
NSA scandal delivers record numbers of internet users to DuckDuckGo.
- 2013‑07‑10:
Full steam ahead for Chesterton station.
- 2013‑07‑10:
Why mobile web apps are slow.
- 2013‑07‑10:
Secret government: America against democracy.
- 2013‑07‑09:
Bunnie Huang's open laptop, "Novena".
- 2013‑07‑09:
Twitter's architecture.
- 2013‑07‑08:
Zombie Google Reader's reanimated corpse can browse archived data.
- 2013‑07‑08:
Microsoft announces minimal support for C99 in Visual Studio, fourteen years late.
- 2013‑07‑08:
Technical aspects of lawful interception. ITU technology watch report no.6. (2008)
- 2013‑07‑08:
Ambient backscatter: wireless communication out of thin air.
- 2013‑07‑08:
Mining PGP key servers for guilt-by-association.
- 2013‑07‑07:
"Peak water" for the Middle East.
- 2013‑07‑06:
Apple's security strategy: make it invisible.
- 2013‑07‑05:
Ban qat? The Tories might as well ban cats.
- 2013‑07‑05:
The life of Pi: how Britain's biggest hardware hit for a generation came to be.
- 2013‑07‑05:
Jomsborg and CUSFS reunion at Loncon 2014.
- 2013‑07‑04:
Finding out why guillemots have self-cleaning eggs after accidentally spilling a jug of water.
- 2013‑07‑04:
Révélations sur le Big Brother français.
- 2013‑07‑04:
Tron escapes from an Apple IIgs in real life.
- 2013‑07‑03:
Doug Engelbart obituary in the New York Times.
- 2013‑07‑03:
Berkeley DB changes licence to AGPL.
- 2013‑07‑03:
Homebrewing has only just become legal throughout the USA.
- 2013‑07‑03:
Detecting outliers.
- 2013‑07‑03:
Driving E-ink displays.
- 2013‑07‑03:
Burritos the size of babies, with photographic proof.
- 2013‑07‑03:
Motorola Droid X2 quietly sends your login credentials to Motorola.
- 2013‑07‑03:
Any examples of unwanted but authorized access?
- 2013‑07‑03:
Highly Automated Method for Maintaining Expiring Records (in your DNS cache).
- 2013‑07‑03:
How to build (and how not to build) secure persistent web logins.
- 2013‑07‑03:
Security analysis of children in the home.
- 2013‑07‑03:
In the land of the morally blind, the blind lead the way: the Marrakesh copyright treaty.
- 2013‑07‑03:
BBC blocking articles from UK residents.
- 2013‑07‑02:
Maximize shareholder value: the world's dumbest idea.
- 2013‑07‑02:
List of wars extended by diplomatic irregularity.
- 2013‑07‑02:
18 wars unimaginitively named after their length.
- 2013‑07‑02:
Death of the Internet.
- 2013‑07‑02:
The Helvetica Logo Agency.
- 2013‑07‑01:
The recomputation manifesto.
- 2013‑07‑01:
Ofcom rules Sky News did not breach the broadcasting code by illegally hacking an email account.
- 2013‑07‑01:
"The day I hit a child at 20mph - and realised the speed limit must be cut."
- 2013‑07‑01:
Embedded database microbenchmarks.
- 2013‑07‑01:
US IRS put open source on its "be on look out" list, restricting grants of non-profit status.
- 2013‑07‑01:
Austerity and the mistaken lessonss of history.
- 2013‑07‑01:
What it is like to receive a national security letter.
- 2013‑06‑30:
Alice Kober: Unsung heroine who helped decode Linear B.
- 2013‑06‑30:
Delightful puzzles.
- 2013‑06‑30:
Entrepreneurs get better with age.
- 2013‑06‑30:
Apple does not care about your living room.
- 2013‑06‑30:
undupfs: deduplicating layered filesystem.
- 2013‑06‑30:
A eulogy for AltaVista.
- 2013‑06‑30:
Some typography cheat sheets.
- 2013‑06‑29:
A quick review of Google's QUIC.
- 2013‑06‑29:
Google making the Web faster with new transport protocol that reduces round trips.
- 2013‑06‑29:
The scariest library.
- 2013‑06‑29:
c++filt: demangle C++/Java symbols.
- 2013‑06‑29:
G-Cloud: how to win government IT procurement contracts.
- 2013‑06‑29:
Encryption has foiled wiretaps for first time ever, feds say.
- 2013‑06‑29:
Anatomy of a two-compiler bug.
- 2013‑06‑29:
FBI tracking device teardown.
- 2013‑06‑29:
The Stephen Lawrence 'smear' proves that we cannot trust the state to snoop.
- 2013‑06‑29:
Vi Hart on twelve tone music. (YouTube)
- 2013‑06‑29:
The origin of "tweet".
- 2013‑06‑29:
Clojure core.async CSP channels.
- 2013‑06‑28:
A surprising JavaScript memory leak.
- 2013‑06‑28:
First passenger trains start using the new Hitchin flyover.
- 2013‑06‑28:
The changing shape of cinema: a history of aspect ratio.
- 2013‑06‑28:
sed.js: a JavaScript implementation of Unix sed running on node.js.
- 2013‑06‑28:
Snooper's charter has practically zero chance of becoming law, say senior MPs.
- 2013‑06‑28:
Memories of Stasi color Germans' view of U.S. surveillance programs.
- 2013‑06‑28:
AT&T helped the FBI calculate guilt by association.
- 2013‑06‑28:
How to botch TLS forward secrecy.
- 2013‑06‑28:
Useless box with surprises. (YouTube)
- 2013‑06‑27:
Biblical marriage.
- 2013‑06‑27:
Speeding up "counting objects" with bitmap data in Git.
- 2013‑06‑27:
Using bitmaps to accelerate fetch and clone in JGit.
- 2013‑06‑27:
Scaling up JGit.
- 2013‑06‑26:
Everything Jesus said against gay marriage.
- 2013‑06‑26:
How Texas Republicans will crush the Wendy Davis SB5 abortion filibuster.
- 2013‑06‑26:
American legislators are restricted in how they may defend civil liberties against the secret state.
- 2013‑06‑26:
Can Apple read your iMessages?
- 2013‑06‑26:
Perfect forward secrecy and SSL: Intercepted today, decrypted tomorrow.
- 2013‑06‑26:
Why do computers stop and what can be done about it? (1985)
- 2013‑06‑26:
Wendy Davis Texas senate abortion filibuster ends in chaotic dispute over midnight vote.
- 2013‑06‑26:
Marrakech treaty for the blind signed despite efforts of copyright lobby.
- 2013‑06‑25:
Privatising the courts: if anyone needs advice, it's the judiciary.
- 2013‑06‑25:
Why the IRS is targeting open source software groups.
- 2013‑06‑25:
Anglo-Saxon spies: German national security is at stake.
- 2013‑06‑25:
ECHR requires Serbian intelligence agency to reveal electronic snooping data.
- 2013‑06‑25:
Oh, Canada: America's friendly northern neighbor has become a rogue, reckless petrostate.
- 2013‑06‑25:
Proposed Histon Road traffic improvements.
- 2013‑06‑25:
More entries for the computer contradictionary.
- 2013‑06‑25:
Setting up perfect forward secrecy for nginx or stud.
- 2013‑06‑25:
Typhoid Mary.
- 2013‑06‑25:
NixOps: deploy NixOS machines in a cloud.
- 2013‑06‑25:
America's shameful human rights record.
- 2013‑06‑24:
A patent on ad-funded content was upheld in a US court.
- 2013‑06‑24:
Apple's Lightning connector authentication check 'permanently' cracked.
- 2013‑06‑24:
The other Snowden drama: a desire to prosecute journalists.
- 2013‑06‑24:
rss2imap.
- 2013‑06‑24:
Accuweather 25 day long-rage forecast inaccuracy.
- 2013‑06‑24:
Facebook's shadow profiles include personal data of people without Facebook accounts.
- 2013‑06‑24:
Hidden OS X features, tips and tricks.
- 2013‑06‑24:
AudioSerial: JavaScript code to use headphone socket as send-only serial port.
- 2013‑06‑24:
The physics of traffic jams.
- 2013‑06‑24:
Perfect forward secrecy can block the NSA from retrospectively snooping TLS traffic, but no one uses it.
- 2013‑06‑24:
Why Skype is no longer p2p with e2e crypto.
- 2013‑06‑23:
Frontend development bookmarks.
- 2013‑06‑23:
Apart from The Guardian the British press stays silent about mass surveillance.
- 2013‑06‑23:
Why to build your HTTP APIs around linking.
- 2013‑06‑23:
Building LLVM using Shake.
- 2013‑06‑23:
The infinitely profitable program.
- 2013‑06‑22:
The strange case of Barrett Brown.
- 2013‑06‑22:
The mathematics and statistics of Monopoly.
- 2013‑06‑22:
The HoTT book: Homotopy Type Theory.
- 2013‑06‑22:
Two dozen mathematicians wrote a 600 page book in less than 6 months using GitHub.
- 2013‑06‑22:
GCHQ's Master the Internet project. (2009)
- 2013‑06‑22:
IPMI passwords are easy to crack remotely.
- 2013‑06‑20:
A line of sages have to guess the colours of their hats, or get beheaded.
- 2013‑06‑20:
How not to handle a critical security vulnerability.
- 2013‑06‑20:
Derivatives are weapons of slow economic destruction.
- 2013‑06‑20:
A model for when disclosure helps security: what is different about computer and network security?
- 2013‑06‑20:
An introduction to nginx.
- 2013‑06‑19:
Puppet YAML+Ruby remote code execution vulnerability.
- 2013‑06‑19:
IO-Lite: a unified I/O buffering and caching system.
- 2013‑06‑19:
MegaPipe: a new programming interface for scalable network I/O.
- 2013‑06‑19:
Line comments versus line splicing in programming languages.
- 2013‑06‑19:
People who believe lack of exercise (rather than overeating) causes obesity tend to be fatter.
- 2013‑06‑19:
Pipelined FPGA Mandelbrot generator.
- 2013‑06‑19:
Java garbage collection distilled.
- 2013‑06‑19:
Memory barriers: a hardware view for software hackers.
- 2013‑06‑19:
How FPGAs work, and why you'll buy one.
- 2013‑06‑19:
Discussion about Exchange 2013 recipient verification breakage on the Postfix list.
- 2013‑06‑19:
Recipient filtering broken in Exchange 2013.
- 2013‑06‑19:
Is the rape porn cultural harm argument another rape myth?
- 2013‑06‑18:
LCPP: a Lua C pre-processor.
- 2013‑06‑18:
The Porter stemming algorithm: then and now.
- 2013‑06‑18:
The whistleblower's guide to secretly tipping off the press in a "turnkey totalitarian" state.
- 2013‑06‑18:
Supreme Court of the US mostly abolishes the right to remain silent.
- 2013‑06‑18:
Nominet brings back "direct.uk" proposal for unrestricted second-level .uk domains.
- 2013‑06‑18:
Ultimate tic-tac-toe.
- 2013‑06‑18:
Want to file a motion in the FISA court? First you have to find them.
- 2013‑06‑18:
If those services don't trust me enough to give me an RSS feed, why should I trust them with my data?
- 2013‑06‑17:
An old mystery solved: 1940s project C-43 and public key encryption.
- 2013‑06‑17:
Old age: the diminished thing.
- 2013‑06‑17:
Advanced bash scripting guide.
- 2013‑06‑17:
There are almost no films about women.
- 2013‑06‑17:
Big multiple sclerosis breakthrough.
- 2013‑06‑17:
The real enemy of privacy is the MEPs selling our rights to the direct marketing lobby.
- 2013‑06‑17:
Throwing children in prison turns out to be a really bad idea.
- 2013‑06‑17:
Simple linear-time suffix array construction.
- 2013‑06‑16:
UK intercepted most Irish international comms traffic 1990-1997.
- 2013‑06‑16:
roffit: convert man pages to HTML.
- 2013‑06‑16:
Archive on 4: Very British Dystopias.
- 2013‑06‑16:
On coalitions, courts, and the future after legal aid.
- 2013‑06‑16:
Leading programmers remember the impact of Kernighan and Ritchie: The C Programming Language.
- 2013‑06‑16:
The BBC's factual television is an insult to the nation.
- 2013‑06‑16:
The low-transaction-fee argument for Bitcoin is silly.
- 2013‑06‑15:
Why Boston and Skegness could be UKIP's Brighton Pavillion.
- 2013‑06‑15:
Bank of America lied to homeowners seeking remortgages and rewarded employees for foreclosing.
- 2013‑06‑15:
Secret to Prism success: Even bigger data seizure.
- 2013‑06‑15:
Not just spies: councils want your communications data too.
- 2013‑06‑15:
Melvyn Bragg on William Tyndale: his genius matched that of Shakespeare.
- 2013‑06‑15:
You do have the right to record council meetings.
- 2013‑06‑15:
Landmark US Patent Office ruling strikes abstract software patent.
- 2013‑06‑15:
Apple laptop charging vibration effect: "earth finger". (Informative comments.)
- 2013‑06‑15:
Ancient Roman concrete lasts 40 times longer than modern Portland cement.
- 2013‑06‑15:
The influence of spies has become too much. It's time politicians said no.
- 2013‑06‑15:
"Hardware eventually fails. Software eventually works."
- 2013‑06‑15:
On the legal importance of viewing genes as code.
- 2013‑06‑14:
Lawsuit claims "Happy Birthday" is not in copyright, and Warner owes hundreds of millions in improperly collected royalties.
- 2013‑06‑14:
Secret Courts: 8 nightmare scenarios now possible in Britain.
- 2013‑06‑14:
Spamalot reigns: data protection and Ireland's EU presidency.
- 2013‑06‑14:
Insubordination and the surveillance state.
- 2013‑06‑13:
Planning a computer system: Project Stretch. (1962)
- 2013‑06‑13:
Main Core: US government database of 8 million Americans who are supposedly threats to national security.
- 2013‑06‑13:
NSA has massive database of American phone calls. (2006)
- 2013‑06‑13:
Hopscotch hashing.
- 2013‑06‑13:
Two years of Cambridge Noir.
- 2013‑06‑12:
HHVM and the repurposed JIT phenomenon.
- 2013‑06‑12:
Thomas Drake on being an NSA whistleblower.
- 2013‑06‑12:
gitdown: moderate commit activity based on blood alcohol content.
- 2013‑06‑12:
America's price-gouging cable companies are latter-day robber barons.
- 2013‑06‑12:
Bike helmets and the law: Canadian legislation had minimal effect on serious head injuries.
- 2013‑06‑12:
McBits: fast constant-time code-based cryptography.
- 2013‑06‑12:
Attackers using chargen for UDP reflection/amplification attacks.
- 2013‑06‑12:
IBM jargon and general computing dictionary.
- 2013‑06‑12:
Banks rig foreign exchange benchmark rates.
- 2013‑06‑12:
PRISM explains the wider lobbying issues surrounding EU data protection reform.
- 2013‑06‑12:
Disagree with an Atos decision? Then starve, says DWP.
- 2013‑06‑12:
Politics and Iain Banks.
- 2013‑06‑11:
Public WiFi is mostly crappy and user-hostile.
- 2013‑06‑11:
The PRISM details matter: if it works like the UK communications data bill, it is apparently no big deal.
- 2013‑06‑11:
Opera desktop mail client.
- 2013‑06‑11:
Family courts risk 'collapse' as surge in custody cases follows legal aid cuts.
- 2013‑06‑11:
The value of a hacked email account.
- 2013‑06‑11:
The Case for compressed caching in virtual memory systems.
- 2013‑06‑11:
Has the US become the type of nation from which you have to seek asylum?
- 2013‑06‑11:
Expect more intrusive surveillance now that PRISM is public.
- 2013‑06‑11:
Why didn't tech company leaders blow the whistle?
- 2013‑06‑10:
libottery: drop-in fast secure replacement for your RNG.
- 2013‑06‑10:
The end is nigh for OpenVMS.
- 2013‑06‑10:
Snowden/Greenwald contact delayed by weeks owing to difficulty of using PGP.
- 2013‑06‑10:
Ken MacLeod on Iain Banks: A science fiction star first and foremost.
- 2013‑06‑10:
Counter-cryptanalysis exploits unavoidable anomalies to detect and block cryptanalytic attacks.
- 2013‑06‑10:
Daniel Ellsberg says Edward Snowden is saving us from the United Stasi of America.
- 2013‑06‑10:
PRISM: The real concern is that governments may not be breaking any law at all.
- 2013‑06‑10:
As Bradley Manning's trial begins, the press predictably misses the point.
- 2013‑06‑10:
These are the mobile phones and tablet computers that will give you the fastest Internet speeds.
- 2013‑06‑10:
Viviane Reding dismantles UK's arguments against effective data protection.
- 2013‑06‑10:
The omniscient states: seven decades of shared intelligence.
- 2013‑06‑10:
University admission happens far to late to fix school inequality.
- 2013‑06‑10:
Safety triangle / misogyny triangle.
- 2013‑06‑10:
A few notes on the Culture.
- 2013‑06‑10:
There is more to anticompetitive patent licensing than trolls.
- 2013‑06‑10:
Some links about Iain Banks.
- 2013‑06‑10:
Council of the EU releases compromise draft the proposed data protection regulations.
- 2013‑06‑10:
LobbyPlag: which MEPs support less data privacy and more spam.
- 2013‑06‑09:
How the US turned three pacifists into violent terrorists.
- 2013‑06‑09:
Security against compelled disclosure.
- 2013‑06‑09:
Greene King accused of cultural vandalism after scrapping more than 200 traditional pub signs.
- 2013‑06‑09:
Boundless Informant: the NSA's secret tool to track global surveillance data.
- 2013‑06‑09:
The sealed bottle garden still thriving after 40 years without fresh air or water.
- 2013‑06‑09:
Shortcat: keyboard productivity app for Mac OS X.
- 2013‑06‑09:
Seeing ultraviolet after cataract surgery with Crystalens.
- 2013‑06‑08:
The ABC trial: a 1970s prosecution for revealing UK spying activity.
- 2013‑06‑08:
UK government censors PRISM news with a D-notice.
- 2013‑06‑08:
Public documents contradict government claim that mass surveillance foiled terror plot.
- 2013‑06‑08:
A lesson from history for those who strive to bring intelligence agencies to account.
- 2013‑06‑07:
All the infrastructure a tyrant would need.
- 2013‑06‑07:
Anonymous just leaked a trove of NSA documents. (See also UKUSA / Five Eyes.)
- 2013‑06‑07:
On whistleblowers and government threats of investigation.
- 2013‑06‑07:
Was the Communications Data Bill just a cover for Prism Data?
- 2013‑06‑07:
Melton: A static memory leak detector for C programs.
- 2013‑06‑07:
Lawfully Good vs Lawfully Evil.
- 2013‑06‑07:
Anyone (with a PhD in physics) can design a nuclear bomb.
- 2013‑06‑07:
Kismet: WiFi sniffing software.
- 2013‑06‑07:
inSSIDer: WiFi monitoring software.
- 2013‑06‑07:
Senators knew the NSA's universal snooping has been going on since 2007.
- 2013‑06‑07:
Value of the cloud: CPU performance.
- 2013‑06‑07:
Metadata matters: spying on comms records harms civil liberties and the free press.
- 2013‑06‑07:
US NSA is mining data from 9 leading Internet firms.
- 2013‑06‑07:
EU council of ministers proposes to gut data protection regulations, to please direct marketing lobby.
- 2013‑06‑06:
Universal Credit: government closer to recognising failure of world's largest agile development project.
- 2013‑06‑06:
Top US patent judge pens anti-troll op-ed in the New York Times.
- 2013‑06‑06:
Best practices for designing a pragmatic RESTful API.
- 2013‑06‑06:
CamelCase is less readable than under_score.
- 2013‑06‑06:
CamelCase is more readable than under_score.
- 2013‑06‑06:
The NSA is spying on millions of Americans.
- 2013‑06‑06:
Bureaucratic needs assessments and the debate over IP address conservation.
- 2013‑06‑06:
Calling for an end to the war on drugs.
- 2013‑06‑06:
What would British politics look like with small parties and proportional representation?
- 2013‑06‑06:
Affordable quality: comparing childcare in the UK and Europe.
- 2013‑06‑06:
Amazon S3 failure in July 2008 due to single bit corruption. Checksum all the things!
- 2013‑06‑06:
Game theory of IPv6.
- 2013‑06‑05:
Pink/Blue.
- 2013‑06‑05:
Microsoft asks for feedback on the standards conformance of Outlook and Exchange.
- 2013‑06‑05:
Guile and delimited continuations.
- 2013‑06‑05:
Japan's radiation disaster toll: none dead, none sick.
- 2013‑06‑05:
The bright side of dark silicon.
- 2013‑06‑05:
Tetris printer algorithm.
- 2013‑06‑05:
The network is reliable?
- 2013‑06‑04:
Cameron eyes 'non legislative options' to extend domestic spying powers.
- 2013‑06‑04:
Prosecute the patent trolls!
- 2013‑06‑04:
A "child pornographer", according to the police.
- 2013‑06‑04:
The risks of Microsoft Exchange features that use Oracle Outside In.
- 2013‑06‑04:
45 ways to communicate two quantities.
- 2013‑06‑04:
Brompton stunts. (YouTube)
- 2013‑06‑04:
Huge registrar shake-up coming to .biz and .info.
- 2013‑06‑04:
A look at the Crossrail tunnels under Oxford Street.
- 2013‑06‑04:
Elsevier-style bulk licences the answer to taming patent trolls?!
- 2013‑06‑04:
Call-by-push-value: a model for the lambda calculus that subsumes call-by-name and call-by-value.
- 2013‑06‑03:
On "geek" versus "nerd".
- 2013‑06‑03:
First intercontinental 100 Gbps link for research and education.
- 2013‑06‑03:
Reinventing the wheel: Loopwheels: bike wheels with built-in suspension.
- 2013‑06‑03:
Reinventing the train: Ideas coming down the track.
- 2013‑06‑03:
How curly braces got included in ASCII.
- 2013‑06‑03:
Think the Greens are the party of the middle-class? Think again.
- 2013‑06‑03:
Possible ban on factory food in French restaurants.
- 2013‑06‑03:
O, BIND, BIND, wherefore art thou BIND? Results of fingerprinting all Internet DNS servers.
- 2013‑06‑03:
What can't you do with a criminal conviction?
- 2013‑06‑03:
LangSec: safely dealing with magical text.
- 2013‑06‑03:
A unified theory of garbage collection.
- 2013‑06‑03:
Removing garbage collection from the Rust language.
- 2013‑06‑03:
Civil legal aid reforms in the UK: what will this mean for you?
- 2013‑06‑03:
The reaction to Eric Weinstein's lecture at Oxford on the geometric prospects for unification.
- 2013‑06‑03:
Istanbul's demonstrators celebrate victory in Istiklal and Taksim Square.
- 2013‑06‑03:
Sustainable fishing success story, but why do we have to trawl for the facts about Britain and the EU?
- 2013‑06‑03:
Max Headroom and the strange world of pseudo-CGI.
- 2013‑06‑03:
Hexagonal grids.
- 2013‑06‑03:
Apple, betrayed by its own patent law firm.
- 2013‑06‑02:
Five ugly lessons hiding in every superhero movie.
- 2013‑06‑02:
More background on the violence in Isranbul.
- 2013‑06‑02:
Teardown and exploration of Apple's Magsafe connector.
- 2013‑06‑02:
Researcher decodes prairie dog language and discovers they've been talking about us. (video)
- 2013‑06‑02:
Michael Douglas says cunnilingus gives you cancer - but is he right?
- 2013‑06‑02:
What mobile internet filtering tells us about porn blocks.
- 2013‑06‑02:
What is happenning in Istanbul.
- 2013‑06‑02:
Examining the IWF's claim that 1.5 million adults have stumbled across child porn online.
- 2013‑06‑02:
The real Cuban missile crisis.
- 2013‑06‑02:
Vinegar could save 73,000 women a year from cancer.
- 2013‑06‑02:
H.264 patent pools kill web video competitors.
- 2013‑06‑02:
The algebra of algebraic data types.
- 2013‑06‑02:
Funny computer books?
- 2013‑06‑01:
Clay programming language.
- 2013‑06‑01:
Google/Motorola prototype authentication tokens: pill passwords and electronic tattoos.
- 2013‑06‑01:
Haskell apply ($) vs F#'s pipe forward operator (|>).
- 2013‑05‑31:
The new nutritional consensus: key opinion leaders.
- 2013‑05‑31:
Joe Armstrong spends a week with Elixir: a Ruby-ish language for the Erlang virtual machine.
- 2013‑05‑31:
Facebook bans campaigner against images of violence against women.
- 2013‑05‑31:
Former head of ACPO weighs in against snoopers' charter.
- 2013‑05‑31:
Short cuts: the consequences of restricting access to the law.
- 2013‑05‑31:
First-ever high-resolution images of a molecule as it breaks and reforms chemical bonds.
- 2013‑05‑31:
Why DIY fecal transplants are a thing (and the FDA is only part of the reason).
- 2013‑05‑31:
The NRA's end: a real gun control movement has arrived.
- 2013‑05‑30:
Proof of existence: embed the SHA256 of a document in the Bitcoin block chain.
- 2013‑05‑30:
Watchman: faster builds of large source trees by tracking file alterations.
- 2013‑05‑30:
Google, Microsoft, Facebook, Yahoo! and Twitter weigh in against snooper's charter.
- 2013‑05‑30:
Falsehoods programmers believe about addresses.
- 2013‑05‑30:
Industrial influences on the evolution of landscape in North Wales.
- 2013‑05‑30:
Origins of generational garbage collection.
- 2013‑05‑30:
Weston display/window manager on Raspberry Pi.
- 2013‑05‑30:
Moore's Law fail at NAND flash node 1Ynm.
- 2013‑05‑29:
Snoopers' charter is a domestic policy problem, but a foreign policy disaster.
- 2013‑05‑29:
Long live the local pub in Cambridge.
- 2013‑05‑29:
A lock-free ... linear search?
- 2013‑05‑29:
Videos of Blackhole malware-in-the-browser attack.
- 2013‑05‑29:
A brief overview of Chapel: a parallel language from Cray.
- 2013‑05‑29:
Unlicensed code: movement or madness?
- 2013‑05‑29:
'Snooper's charter' would not have prevented Woolwich attack, says MI5.
- 2013‑05‑29:
Peer-review practices of psychological journals: The fate of published articles, submitted again.
- 2013‑05‑28:
Array languages for Lisp programmers.
- 2013‑05‑28:
DNS anomaly detection: Defend against sophisticated malware.
- 2013‑05‑28:
Is sugar toxic?
- 2013‑05‑28:
PlexConnect: DNS hijacking to make Apple TV view media from a Plex server.
- 2013‑05‑28:
Snoopers' charter: how you can stop it coming back ... again.
- 2013‑05‑28:
Elsevier journals: has anything changed?
- 2013‑05‑28:
parboiled2: compile-time PEG parser generator in Scala macros.
- 2013‑05‑28:
Easy MS IE VMs under Linux.
- 2013‑05‑28:
Courts may be privatised to siphon public money to hedge fund managers.
- 2013‑05‑28:
The zombie communications data snooping bill is back.
- 2013‑05‑28:
Twin beam phase conjugation for 400Gbit/s transoceanic fibre.
- 2013‑05‑28:
Agatha Christie and computerised foulups.
- 2013‑05‑28:
HTTPS and Referer: headers.
- 2013‑05‑28:
How far can you overhang blocks?
- 2013‑05‑28:
Better estimation when perfection is unlikely: a Bayesian example.
- 2013‑05‑28:
Raspberry Pi eye in the sky.
- 2013‑05‑28:
You are dangerously bad at cryptography.
- 2013‑05‑27:
The ZigZag database and visualization system.
- 2013‑05‑27:
Autodependencies with GNU make.
- 2013‑05‑27:
Rules with multiple outputs in GNU make.
- 2013‑05‑27:
How NOT to review a paper: the tools and techniques of the adversarial reviewer.
- 2013‑05‑27:
How to reject any scientific manuscript.
- 2013‑05‑27:
International Space Station upgrades from Windows XP to Linux.
- 2013‑05‑27:
Less than 1% of European terrorist attacks are by Muslims.
- 2013‑05‑27:
Mythbusting modern hardware to gain "mechanical sympathy".
- 2013‑05‑27:
DNS traffic logging, summarizing, and presentation with Logstash, ElasticSearch, and Kibana.
- 2013‑05‑27:
Three implementation models for Scheme.
- 2013‑05‑27:
Three types of build-system dependency.
- 2013‑05‑27:
42 symmetries.
- 2013‑05‑27:
High levels of home ownership can seriously damage the labor market.
- 2013‑05‑26:
X.org security advisory: protocol handling issues in X client libraries.
- 2013‑05‑25:
Yitang Zhang, twin primes conjecture: A huge discovery about prime numbers - and what it means for the future of math.
- 2013‑05‑24:
History of zero.
- 2013‑05‑24:
Improving the security of your SSH private key files.
- 2013‑05‑24:
Log-shuttle delivers messages to log routers and processors via https.
- 2013‑05‑24:
Eric Weinstein may have found the answer to the biggest problems of physics.
- 2013‑05‑24:
SIGGRAPH 2013 technical papers preview. (YouTube)
- 2013‑05‑23:
Kim Dotcom is now a two-factor-authentication patent troll.
- 2013‑05‑23:
MinimaLT: minimal-latency networking through better security.
- 2013‑05‑22:
Stop using linked lists.
- 2013‑05‑22:
Myth: DRAM costs and buying in bulk.
- 2013‑05‑22:
Dowser: a guided fuzzer to find buffer overflow vulnerabilities.
- 2013‑05‑22:
Average home sizes around the world.
- 2013‑05‑22:
The oldest algorithmic patent?
- 2013‑05‑22:
Plan 9 coding style.
- 2013‑05‑22:
UK supported 1622 CIA kidnap flights.
- 2013‑05‑21:
Bertrand Russell: "Why I am not a Christian."
- 2013‑05‑21:
The day that hell was abolished in Britain.
- 2013‑05‑21:
Scripps News reporters use Google, find breach, get branded as "hackers", like Weev.
- 2013‑05‑21:
James Burke's classic rocket takeoff piece-to-camera. (YouTube)
- 2013‑05‑21:
Google abandons open instant messaging. (But some xmpp support still lurks.)
- 2013‑05‑21:
LuaJIT 2.1 status and sponsorships.
- 2013‑05‑21:
Twitter granted patent on pull-to-refresh, promises to only use it defensively.
- 2013‑05‑21:
Next steps for the Firefox cookie policy.
- 2013‑05‑21:
How tcmalloc works.
- 2013‑05‑21:
Obituary of George Gray, liquid crystal scientist.
- 2013‑05‑21:
Implicit type conversion in MySQL and SQL injection attacks.
- 2013‑05‑21:
Windcatcher airbed inflates in seconds without power or pumping.
- 2013‑05‑21:
Cyclists hate road narrowing schemes, but have our cycling campaigns been asking for them all along?
- 2013‑05‑21:
Virtually everything the US government did to WikiLeaks is now being done to mainstream reporters.
- 2013‑05‑21:
But that's impossible! Clients fetching v6-only URLs over v4.
- 2013‑05‑21:
Network congestion, TCP's initial window, and web browsing.
- 2013‑05‑20:
Shor's quantum factorisation algorithm.
- 2013‑05‑20:
US DOJ criminalizes investigative journalism.
- 2013‑05‑20:
On average, we have built one large dam every day for the last 130 years.
- 2013‑05‑20:
Harwell Dekatron / Atomic Energy Research Establishment WITCH is oldest working computer.
- 2013‑05‑20:
Sonar-scanning usine a Macbook: synethetic aperture sonar using consumer electronics.
- 2013‑05‑20:
Labour are to blame for UKIP.
- 2013‑05‑20:
Conversations with a bulletproof hoster: did someone other than Kamphuis run the Spamhaus DDoS?
- 2013‑05‑20:
Stability patterns and antipatterns.
- 2013‑05‑20:
Sven Olaf Kamphuis, accused of the Spamhaus DDoS attack.
- 2013‑05‑20:
Attack by compiler: undefined behaviour and underhanded optimisation.
- 2013‑05‑20:
Your login form posts to HTTPS, but you blew it when you loaded it over HTTP.
- 2013‑05‑20:
"A manifestly unjustified, inappropriate or improper use of a formal procedure." Vexatious FOI requests.
- 2013‑05‑20:
Cambridge Airport unveils 50 new flights a week to Amsterdam, Paris, Milan and Geneva. (Hope they don't win a Darwin prize!)
- 2013‑05‑20:
CSS Tube map.
- 2013‑05‑20:
The trouble with the Enlightenment.
- 2013‑05‑20:
Becoming an American can be bad for your health.
- 2013‑05‑20:
Parallel and concurrent programming in Haskell. (draft book)
- 2013‑05‑20:
Plug-in covers reduce the safety of UK BS1363 mains sockets.
- 2013‑05‑20:
Statistical formulae for programmers.
- 2013‑05‑20:
SCADA vulnerabilities: how to hack a nation's infrastructure.
- 2013‑05‑20:
Docker: copy-on-write Linux containers.
- 2013‑05‑18:
Noether: a concurrent security-oriented language.
- 2013‑05‑18:
Contactless tills take money from the wrong cards at several UK retailers.
- 2013‑05‑18:
Elsevier, NewsCorp, Facebook, and Yahoo join ignorant attack on open access.
- 2013‑05‑18:
Opening the lid on StrongBox, the anonymous leak system coded by Aaron Swartz.
- 2013‑05‑18:
Rainbow Europe: UK is the most LGBTI friendly country.
- 2013‑05‑18:
D-Wave quantum computing devices: truth finally starts to emerge.
- 2013‑05‑18:
Bunny is a wireless meshing darknet that hides its comms in parts of 802.11.
- 2013‑05‑17:
Modern programming language syntax is not like C.
- 2013‑05‑17:
Vaughan Pratt's paper on top-down operator precedence parsers.
- 2013‑05‑17:
Nationwide survey reveals picture of UK's attitudes to science and medicine (and vaccines).
- 2013‑05‑17:
Explanation of yesterday's mozilla.org DNSSEC validation failures.
- 2013‑05‑17:
Newegg nukes "corporate troll" Alcatel in third patent appeal win this year.
- 2013‑05‑17:
1966 plan for segregated cycle routes in Cambridge.
- 2013‑05‑16:
BBC boosts UKIP: their 23% national projected vote debunked down to 10%.
- 2013‑05‑16:
The great google goat rodeo.
- 2013‑05‑16:
A collection of links about secure random number generation.
- 2013‑05‑16:
Extensible scannerless statically typed Pratt parser in C#.
- 2013‑05‑16:
Parallelism and concurrency need different tools.
- 2013‑05‑16:
Rachel on pregnancy and consent.
- 2013‑05‑16:
The New Yorker Strongbox and Aaron Swartz.
- 2013‑05‑15:
Simple top-down operator precedence Pratt parsing in Python.
- 2013‑05‑15:
Vetinari Clock: a clock that ticks randomly but still keeps accurate time.
- 2013‑05‑15:
MapBox: A cloudless atlas.
- 2013‑05‑15:
Euphemisms inspired by political scandals.
- 2013‑05‑15:
Rusty Russell's API design rating scheme.
- 2013‑05‑15:
2m40: un blog impactant.
- 2013‑05‑14:
Linux Containers on AWS.
- 2013‑05‑14:
The Hawkeye Initiative IRL.
- 2013‑05‑14:
At 10 million concurrent connections, the kernel is the problem, not the solution.
- 2013‑05‑14:
CAP Confusion: problems with 'partition tolerance'.
- 2013‑05‑14:
Approximate heavy hitters: the SpaceSaving algorithm.
- 2013‑05‑14:
JavaScript is already the elusive universal web bytecode.
- 2013‑05‑14:
What made Chris Hadfield's time on the ISS special.
- 2013‑05‑14:
ITU pursues Internet control - again - at WPTF13 this week.
- 2013‑05‑14:
Terms of service; didn't read. Aiming to fix the biggest lie on the web.
- 2013‑05‑14:
URLs in private Skype chats are accessed by Microsoft.
- 2013‑05‑14:
Dropping in on the Gottfried Leibniz archives.
- 2013‑05‑14:
Bees need Europe's neonicotinoid pesticide ban.
- 2013‑05‑14:
UK government study agrees with previous research: top downloaders spend the most on legit media.
- 2013‑05‑14:
Terra and Lua offer new high performance computing strategy.
- 2013‑05‑14:
Cellular encryption and interception.
- 2013‑05‑14:
Pregnancy, farting, and abortion law.
- 2013‑05‑14:
Crossrail 2 consultation and route options.
- 2013‑05‑14:
D-Wave's quantum optimizer pitted against traditional computers.
- 2013‑05‑14:
$45M in stolen cash still won't get rid of hackable ATM cards.
- 2013‑05‑14:
The sound of silence: the texture of background noise in quiet cities.
- 2013‑05‑14:
InterMune lies about clinical trial results and sues to preven European Medicines Agency from publishing data.
- 2013‑05‑14:
Do people turn mean because they're helpless?
- 2013‑05‑14:
Half of Labour supporters believe the welfare state is too generous.
- 2013‑05‑14:
A proof of the odd Goldbach conjecture that every odd number greater than five is the sum of three primes.
- 2013‑05‑14:
Getting closer to a proof that infinitely many primes come in pairs.
- 2013‑05‑14:
Triangular variable radix unary 12h clock face.
- 2013‑05‑14:
Met raid home of family who successfully sued police for racial abuse.
- 2013‑05‑14:
So long, Commander Hadfield - and thanks for all the awesome!
- 2013‑05‑13:
Ipsos MORI response to the EE personal data story.
- 2013‑05‑13:
Texting at wheel kills more US teens than drunk-driving.
- 2013‑05‑13:
Daniel Morgan axe murder, criminal private investigators, Murdoch papers, and senior Tories.
- 2013‑05‑13:
How Mythic Beasts dealt with the Raspberry Pi DDoS attacks.
- 2013‑05‑13:
The differing treatment of men and women on Reddit.
- 2013‑05‑13:
Ethical consequences of a Saudi Arabia telecoms surveillance pitch.
- 2013‑05‑13:
Executable archaeology: the stupid thing that eats RAM when shaken.
- 2013‑05‑13:
Fulton surface-to-air recovery system. (Featuring a flying pig.)
- 2013‑05‑13:
GM crops do not have better yields nor a much lower environmental footprint.
- 2013‑05‑13:
Neonicotinoids do not improve yields.
- 2013‑05‑13:
EE selling personal data to pollsters and police.
- 2013‑05‑13:
The devil in plain text.
- 2013‑05‑13:
Unfairness of FPTP leads to parties ignoring 59% of voters in Oxfordshire.
- 2013‑05‑13:
How certificate revocation (doesn't) work in practice.
- 2013‑05‑13:
ActiveHistory replies to Gove's accusation of 'infantilisation'.
- 2013‑05‑13:
Everything Everywhere, IpsosMori and the mystery of 27m people's data.
- 2013‑05‑13:
Kaspersky on patents against innovation.
- 2013‑05‑13:
Michael Gove bases education policy on bogus marketing surveys.
- 2013‑05‑13:
All about the new EU anti-diversity seed law.
- 2013‑05‑13:
CSS architecture.
- 2013‑05‑13:
Python's sad, unimaginative Enum.
- 2013‑05‑13:
WAN vs. datacenter link reliability.
- 2013‑05‑12:
DNS needs TCP.
- 2013‑05‑11:
Nobody reads the terms of service - not even those who write them.
- 2013‑05‑11:
Thieves stole $45 million from ATMs because the US uses absurd 40-year-old tech.
- 2013‑05‑11:
Communications interception bill in New Zealand.
- 2013‑05‑11:
"I contribute to the Windows kernel. We are slower than other operating systems. Here is why."
- 2013‑05‑11:
pdf2htmlEX: high-quality PDF to modern HTML converter.
- 2013‑05‑11:
Why is science behind a paywall?
- 2013‑05‑11:
Faster curve25519 with precomputation.
- 2013‑05‑11:
How to intercept and decrypt Snapchat images.
- 2013‑05‑11:
Wine tasting is bullshit.
- 2013‑05‑10:
The Daniel Morgan murder: an unsolved mystery of the Murdoch hacking scandal.
- 2013‑05‑10:
Daniel Morgan axe murder: independent panel to investigate police failings.
- 2013‑05‑10:
The justifications for airport expansion turn out to be bogus.
- 2013‑05‑10:
The human-powered helicopter challenge.
- 2013‑05‑10:
Average distance between tweeter and responder is about 750 miles.
- 2013‑05‑10:
The paradox of the ABC proof.
- 2013‑05‑10:
No boundary changes and no AV improve Labour's chances in 2015.
- 2013‑05‑10:
Apple platonic solids.
- 2013‑05‑10:
A FAQ about Brewer's CAP theorem.
- 2013‑05‑10:
Millenials aren't lazy: they're fucked.
- 2013‑05‑10:
The secret world of submarine cables.
- 2013‑05‑09:
Towards adoption of DNSSEC: availability and security challenges.
- 2013‑05‑09:
GeoGuessr: a Google Street View game.
- 2013‑05‑09:
Dodgy food practices banned in Europe but just fine in the USA.
- 2013‑05‑08:
Spamhaus DDoS suspect extradited to the Netherlands.
- 2013‑05‑08:
Taiwanese / Mandarin: how to forget your mother tongue and remember your national language.
- 2013‑05‑08:
Critique of the IO monad being viewed as a state monad operating on the world.
- 2013‑05‑08:
Why the UK government tried ID cards: because biometrics supposedly made identity theft 'impossible'.
- 2013‑05‑08:
SSH authentication forwarding with Mosh.
- 2013‑05‑08:
JDNS: a portable asynchronous stub resolver with mDNS support.
- 2013‑05‑08:
Why haven't the Greens become popular since the financial crash, rather than UKIP?
- 2013‑05‑08:
Feds drop hacking charges in video poker glitching case.
- 2013‑05‑08:
Obama may back FBI plan to wiretap web users.
- 2013‑05‑07:
The wrongly attributed statement: our democratic poetry.
- 2013‑05‑07:
A short introduction to TPMs.
- 2013‑05‑07:
Florence Nightingale's hockey stick: the real message of her rose diagram.
- 2013‑05‑07:
North American English dialects, based on pronunciation patterns.
- 2013‑05‑07:
Protected bicycle lanes boost local business in NYC.
- 2013‑05‑07:
Elon Musk talking to Google about autopilot systems for Tesla cars.
- 2013‑05‑07:
Megaupload, the copyright lobby, and the future of digital rights.
- 2013‑05‑07:
Bob Alberti: gopher was doomed by Moore's law, but what killed it was licensing.
- 2013‑05‑07:
BT retail is testing carrier-grade NAT under their own brand as well as PlusNet.
- 2013‑05‑07:
The definitive history of the colors of Crayola.
- 2013‑05‑07:
WWW: Why the Web Worked and why Gopher didn't go far.
- 2013‑05‑07:
Aquatic apes are the stuff of creationism, not evolution.
- 2013‑05‑07:
git? tig! A text-mode UI for git.
- 2013‑05‑07:
Firefox's inspector as a 3D modelling tool.
- 2013‑05‑07:
KSRegistry takes over .gd but questions remain about two other hijacked ccTLDs.
- 2013‑05‑07:
Population distribution of the US in units of Canadas.
- 2013‑05‑07:
Hacking the JVM by inducing memory glitches with an incandescent lamp.
- 2013‑05‑07:
2013 European LLVM conference slides / videos / papers.
- 2013‑05‑07:
Hacking into a Google building management system.
- 2013‑05‑07:
How to spot a weak argument.
- 2013‑05‑07:
Measuring DNSSEC performance.
- 2013‑05‑07:
Digging out the craziest bug you never heard about from 2008: a Linux threading regression.
- 2013‑05‑07:
Transferring domains from GoDaddy to Hover.
- 2013‑05‑07:
How much would it cost to store every phone call in the USA?
- 2013‑05‑07:
HTML canvas performance tips and tricks.
- 2013‑05‑06:
Implementation strategies for first-class continuations.
- 2013‑05‑06:
A great way of explaining delimited continuations.
- 2013‑05‑06:
More than half the world's population lives inside this circle.
- 2013‑05‑06:
Health and safety gone mad: government axes strict liability for workplace injuries.
- 2013‑05‑06:
Argonauts of the incredibly specific: anthropological field notes on the Liberal Democrat animal.
- 2013‑05‑06:
Unconditional income reduces poverty and corruption in India.
- 2013‑05‑06:
Honeywords: making password-cracking detectable.
- 2013‑05‑06:
A cultural shift in computing started with EDSAC.
- 2013‑05‑05:
Pictures of a NeXT cube.
- 2013‑05‑05:
Big-O algorithm complexity cheat sheet.
- 2013‑05‑04:
A determined 'hacker' decrypts RDS-TMC FM traffic broadcasts.
- 2013‑05‑04:
All telephone calls are recorded for access by the US government.
- 2013‑05‑04:
Predicting Google service shutdowns.
- 2013‑05‑04:
Golang and Rust: objects without class.
- 2013‑05‑04:
Video codecs in Javascript are the future.
- 2013‑05‑03:
Beating bufferbloat with fq_codel.
- 2013‑05‑03:
Active queue management algorithms for DOCSIS 3: a simulation study of CoDel, SFQ-CoDel and PIE.
- 2013‑05‑02:
MLWorks: a Standard ML compiler and development environment written at Harlequin in the 1990s, now open source.
- 2013‑05‑02:
SQLite as a standard layered image file format.
- 2013‑05‑02:
On sapphire screens, PV cells, and advanced material manufacturing efficiency.
- 2013‑05‑02:
The Internet archive: what 10 petabytes of data looks like. (video)
- 2013‑05‑02:
Acorn 4: a Mac OS X image editor.
- 2013‑05‑02:
Practical HTTP Host header attacks.
- 2013‑05‑01:
How to play Tetris forever.
- 2013‑05‑01:
Algorithms are replacing stock analysts and investors.
- 2013‑05‑01:
Eric Brewer on why banks are BASE not ACID.
- 2013‑05‑01:
Hoptroff is putting a chip-scale atomic clock into a pocket watch.
- 2013‑05‑01:
The communications data bill was a zombie bill that has been killed before. When will it be back?
- 2013‑05‑01:
Cambridge station ticket hall to be expanded.
- 2013‑05‑01:
World's most cycle-friendly cities.
- 2013‑05‑01:
How the hell is this photo of the Moon even possible?
- 2013‑05‑01:
Using a software bug to win at video poker leads to a federal computer hacking prosecution.
- 2013‑05‑01:
Blip: a tool for seeing your Internet latency.
- 2013‑05‑01:
"I don't know why people aren't freaking out about the fact that we're nearly at a post-antibiotic era."
- 2013‑05‑01:
Effective use of spare capacity at London airports could be better alternative to more runways.
- 2013‑05‑01:
Cambridge bids for money to build "Chisholm Trail" on-road segregated cycle lanes.
- 2013‑04‑30:
Reasoning about the heap in Rust, with Hoare logic and separation logic.
- 2013‑04‑30:
Why those who assault cyclists are usually not prosecuted.
- 2013‑04‑30:
Creative abuse of TLS servers as notaries.
- 2013‑04‑30:
On the lack of pure functions in the Rust programming language type system.
- 2013‑04‑30:
Mozilla to sue Gamma Group for trademark violation: making FinFisher look like Firefox.
- 2013‑04‑30:
An intro to the Mozilla Rust programming language.
- 2013‑04‑30:
Drones: when the future sneaks up on you.
- 2013‑04‑30:
The Hovenring: a new level of bike infrastructure.
- 2013‑04‑30:
Court ruling stops European Medicines Agency from releasing clinical study reports.
- 2013‑04‑30:
Eight things I like about universal benefits.
- 2013‑04‑30:
MiniPiOut: tiny breakout accessory for Raspberry Pi.
- 2013‑04‑30:
C=64 <-> PC data transfer the hard way.
- 2013‑04‑30:
Dutch roundabouts could be seen in London next year.
- 2013‑04‑30:
What happened to the crypto dream? Its failure to protect personal privacy.
- 2013‑04‑30:
First judicial determination of the meaning of RAND patent licences in the USA.
- 2013‑04‑29:
Beware the rise of the government scientists turned lobbyists.
- 2013‑04‑29:
Dead trees have been replaced by a paywall.
- 2013‑04‑29:
DNSSEC / EDNS0 fallback interop problem between BIND and PowerDNS.
- 2013‑04‑29:
The company that's buying up all the key pieces of the online news ecosystem.
- 2013‑04‑29:
In the future our police, lawyers and jails will be run by G4S.
- 2013‑04‑29:
Ironically named British Beer and Pub Ass'n fails to get judicial review of Cambridge's pub protection policy.
- 2013‑04‑29:
Hundreds of cycles in the Kite; no parking spaces.
- 2013‑04‑29:
Bee-harming pesticides banned in Europe.
- 2013‑04‑29:
EU pesticide restrictions are a victory for bees.
- 2013‑04‑29:
The disapproval matrix.
- 2013‑04‑29:
A cucumber map of Europe.
- 2013‑04‑29:
Joining an open WiFi network creates a long-term security risk to your device.
- 2013‑04‑29:
Who can stop these marauding wild pigs?
- 2013‑04‑29:
Bad seed law: EU planning to ban genetic diversity.
- 2013‑04‑29:
jq is like sed for JSON data.
- 2013‑04‑28:
A collection of programming fonts.
- 2013‑04‑28:
History of San Francisco street and landmark names.
- 2013‑04‑28:
A manifesto for the simple scribe: 25 commandments for journalists.
- 2013‑04‑28:
A crime mystery. It's going down, but no one really knows why.
- 2013‑04‑28:
Wikipedia's sexism.
- 2013‑04‑28:
Insecticide firms secretly lobbying against ban that could save bees.
- 2013‑04‑28:
Cook's continental time tables, March 1873.
- 2013‑04‑28:
A review and history of the Haymakers, Chesterton, Cambridge.
- 2013‑04‑28:
ISDAfix: the biggest price-fixing scandal ever.
- 2013‑04‑27:
Why your supermarket only sells 5 kinds of apples.
- 2013‑04‑27:
Matasano crypto challenges.
- 2013‑04‑26:
Dutchman arrested over the 300Gb/s Spamhaus DDoS attack.
- 2013‑04‑26:
Stevenage, and the sad tale of a cycle network innovator forgotten by the New Town he built.
- 2013‑04‑26:
Symantec / Brightmail IP mail reputation lookup.
- 2013‑04‑26:
Why one GP is retiring early to avoid NHS reforms.
- 2013‑04‑26:
Design, implementation and evaluation of congestion control for multipath TCP.
- 2013‑04‑26:
Eventual consistency today: limitations, extensions, and beyond.
- 2013‑04‑26:
US judge refuses to grant a warrant to hack.
- 2013‑04‑26:
Wandering around an Albuquerque airport terminal.
- 2013‑04‑25:
Feed reading is an open web problem, and what browsers could do about it.
- 2013‑04‑25:
Policy paper: identity assurance: enabling trusted transactions.
- 2013‑04‑25:
Government digital service: identity assurance.
- 2013‑04‑25:
Parliamentary office of science and technology: managing online identity.
- 2013‑04‑25:
Position based fluid simulation.
- 2013‑04‑24:
Slash: not just a punctuation mark anymore.
- 2013‑04‑24:
The first federated indieweb comment thread.
- 2013‑04‑24:
JavaScript demo of path finding algorithms.
- 2013‑04‑24:
Dyson: a Debian derivative using the Illumos kernel, libc, and SMF init.
- 2013‑04‑24:
DNS leak test.
- 2013‑04‑24:
ARIN projected to run out of IPv4 addresses in August 2013.
- 2013‑04‑24:
Coding, fast and slow: the psychology of development time estimates.
- 2013‑04‑24:
75th anniversary of the University of Cambridge Computer Laboratory.
- 2013‑04‑24:
Get Britain cycling: press release and links to parliamentary reports.
- 2013‑04‑24:
Intel's return to the DRAM business.
- 2013‑04‑24:
Special characters in a Content-Disposition filename.
- 2013‑04‑24:
The power of silence: why the SimCity story went away.
- 2013‑04‑23:
SoK: eternal war in memory. A survey of vulnerabilities and defences.
- 2013‑04‑23:
Dara O'Briain calls for more taxing exams after taking 10 minutes to get A* in GCSE maths.
- 2013‑04‑23:
Home Office fears Clegg will veto 'snooper's charter'.
- 2013‑04‑23:
BitTorrent's secure Dropbox alternative goes public.
- 2013‑04‑23:
The communications data bill: what's happening?
- 2013‑04‑23:
A detailed analysis of contemporary ARM and x86 architectures.
- 2013‑04‑23:
UK national debt: current, recent, and historical charts.
- 2013‑04‑23:
Government plans to eliminate at least 70% of criminal solicitor firms.
- 2013‑04‑23:
A heartbreaking work of staggering folly. (Econ 101 and the depression.)
- 2013‑04‑23:
List of English words without rhymes.
- 2013‑04‑23:
The Reinhart/Rogoff paper is a mostly-irrelevant sideshow.
- 2013‑04‑23:
Meagre legal aid fees could lead to criminals going free.
- 2013‑04‑23:
Dynamic map of predicted UK election results.
- 2013‑04‑23:
Section 75 of the health act is the engine for destruction of the NHS.
- 2013‑04‑23:
Assange's WikiLeaks party is popular in Australia.
- 2013‑04‑23:
$45 BeagleBone Black Arm Linux PC.
- 2013‑04‑22:
Connect an iPad retina LCD to a PC using DisplayPort.
- 2013‑04‑22:
Nuclear power saves millions of lives.
- 2013‑04‑22:
Running PostgreSQL on compression-enabled ZFS.
- 2013‑04‑22:
CISPA is a global problem.
- 2013‑04‑22:
Developers should be allowed to destroy nature reserves, says Government review.
- 2013‑04‑22:
Reimplementing `git clone` in Haskell from the bottom up.
- 2013‑04‑22:
Campaign to stop killer robots.
- 2013‑04‑22:
Discoverer of the Reinhart/Rogoff flaws explains why they are fundamentally wrong.
- 2013‑04‑22:
Lua: from Brazil to Wikipedia.
- 2013‑04‑22:
Detecting DNS censorship without an internal vantage point.
- 2013‑04‑22:
Mapumental and fire engine journey times.
- 2013‑04‑22:
Data Communications Bill: the Home Office is trying to trap Britain in the past.
- 2013‑04‑22:
Notes about an odd, esoteric, yet incredibly useful thread-aware debugging library: libthread_db.
- 2013‑04‑22:
Interesting DNS hacks.
- 2013‑04‑22:
Computer security researchers tell government to drop net snooping plans.
- 2013‑04‑22:
Why is social care facing the deepest cuts?
- 2013‑04‑22:
Amazon sells lots of erotica, but does not want you to find it.
- 2013‑04‑22:
tlsdate: secure parasitic rdate replacement.
- 2013‑04‑22:
Reinhart/Rogoff: ignoring fundamental issues in the use and abuse of statistical studies.
- 2013‑04‑22:
There's no need for all this economic sadomasochism.
- 2013‑04‑22:
VSRE: very short reply expected. A netiquette idea.
- 2013‑04‑22:
Swansea measles outbreak: a local paper's contribution to the MMR scare.
- 2013‑04‑21:
"The tail's wagging the dog": How outsourcing is eroding NHS services.
- 2013‑04‑21:
Four years of decoding UTF-8.
- 2013‑04‑21:
The REF is now pretty much the only reason why physicists have to use traditional journals.
- 2013‑04‑21:
Patients' guide to magic medicine.
- 2013‑04‑21:
Linux on an 8-bit micro.
- 2013‑04‑20:
Little known technologies that helped save the human genome.
- 2013‑04‑20:
Mystery aircraft parts and atomic clocks.
- 2013‑04‑20:
Smaller: the disposable diaper and the meaning of progress.
- 2013‑04‑20:
The Excel depression: Reinhart/Rogoff.
- 2013‑04‑20:
The most difficult bug: MSX sound chip emulation and human auditory perception.
- 2013‑04‑20:
Generic Merkelized authenticated data structures.
- 2013‑04‑20:
YouTube again beats Viacom's massive copyright infringement lawsuit.
- 2013‑04‑19:
The eternal mainframe.
- 2013‑04‑19:
The death of upcoming.org.
- 2013‑04‑19:
Tern: JavaScript editor integration with error-tolerant parsing and type inference.
- 2013‑04‑19:
Meet the grad student who demolished the Reinhart/Rogoff austerity argument.
- 2013‑04‑19:
OpenPGP best practices.
- 2013‑04‑19:
You lookin' at me? Reflections on Google Glass.
- 2013‑04‑19:
Hacking and rooting SOHO home routers.
- 2013‑04‑19:
Open home gateway forum: commercial consortium for open source secure functional upgradable router firmware.
- 2013‑04‑19:
Maybe is better than NULL.
- 2013‑04‑19:
Yahoo! Chat: a eulogy to a crazy protocol.
- 2013‑04‑18:
Bufferbloat vs codel: see how much faster the Internet could be. (video)
- 2013‑04‑18:
Thin films of water in space. (YouTube)
- 2013‑04‑18:
What happens if you wring out a washcloth in space? (video)
- 2013‑04‑18:
Pourquoi le droit d'auteur viole la constitution.
- 2013‑04‑18:
A history of coffee.
- 2013‑04‑18:
Weird and wonderful London Underground maps.
- 2013‑04‑18:
DNSmasq is not the best intermediary for a reflection/amplification attack.
- 2013‑04‑18:
TXDNS: aggressive multithreaded DNS digger for Windows.
- 2013‑04‑17:
Genome size, complexity, and the c-value paradox.
- 2013‑04‑17:
Extrapolating Moore's Law backwards, and applying it to the origin of life.
- 2013‑04‑17:
Viewing a web page is not a breach of copyright in the UK.
- 2013‑04‑17:
Adventures in undefined behaviour: monkey-patching malloc() for fun and profit.
- 2013‑04‑17:
We are still saving British science from Margaret Thatcher.
- 2013‑04‑17:
IMAP as the proto personal cloud.
- 2013‑04‑17:
Template Haskell on impossible architectures.
- 2013‑04‑16:
Enabling DNSSEC validation on Windows 2012 server.
- 2013‑04‑16:
Copyright: a new prohibition.
- 2013‑04‑16:
Guidelines for bias-free writing: a review by P.J. O'Rourke.
- 2013‑04‑16:
The myth of Margaret Thatcher.
- 2013‑04‑16:
Certificate revocation and the performance of OCSP.
- 2013‑04‑15:
Mimi Silbert and rehabilitation at the Delancey Street Foundation.
- 2013‑04‑15:
ldp: LDAP distributed shell profile.
- 2013‑04‑15:
That's a big transistor: why you are not going to space on a coil gun today.
- 2013‑04‑15:
37,112 insert/remove cycles for Lego pieces to lose their clutch power.
- 2013‑04‑15:
On the trail of malicious dynamic DNS domains.
- 2013‑04‑15:
Dotfiles distribution at login with git and LDAP.
- 2013‑04‑15:
DNSSEC zone signing made easy.
- 2013‑04‑15:
Why dodgy downloads use RAR files.
- 2013‑04‑15:
WiFi Pineapple: hot-spot honeypot pen-testing platform.
- 2013‑04‑15:
Ked: the first scripting language to emerge from The People's Republic of Cork.
- 2013‑04‑15:
IT security in a nutshell.
- 2013‑04‑15:
Tailmatching them cookies: the latest cURL security bug.
- 2013‑04‑15:
Hacktivists as gadflies: the crime of being too clever and annoying the powerful.
- 2013‑04‑14:
Be careful on your birthday!
- 2013‑04‑14:
Want to block common passwords? Sorry, that is patented.
- 2013‑04‑14:
The exploding toilet.
- 2013‑04‑14:
Paradise Silk Mills, Macclesfield.
- 2013‑04‑14:
Google deal with EU regulates search results.
- 2013‑04‑14:
Junction design the Dutch cycle friendly way. (YouTube)
- 2013‑04‑14:
More thoughts on why Python, Ruby, and Javascript are slow.
- 2013‑04‑13:
"Do you use Boy Words or Girl Words? Or the other words, but I can't 'amember them."
- 2013‑04‑13:
Stanford scientists develop new reflective/emissive structure that cools buildings in full sunlight.
- 2013‑04‑13:
The post-Thatcher generation: We might be young, but we weren't born yesterday.
- 2013‑04‑13:
Forecast: it's not a web app, it's an app you install from the web.
- 2013‑04‑12:
Peak Oil as seen through the eyes of Arab oil producers.
- 2013‑04‑12:
Measuring DNSSEC deployment, and Google Public DNS.
- 2013‑04‑12:
Obscure C.
- 2013‑04‑12:
Charles Carreon the Oatmeal/Funnyjunk lawyer has to pay $46K in legal fees.
- 2013‑04‑12:
Zerocoin: making Bitcoin anonymous.
- 2013‑04‑12:
Elm is a functional reactive programming language that compiles to HTML, CSS, and JS.
- 2013‑04‑12:
My comments on ICANN's root zone KSK rollover consultation.
- 2013‑04‑12:
You know, Google, the web already had this feature.
- 2013‑04‑12:
IBM VM and the VM community: past, present, and future.
- 2013‑04‑11:
Hijacking airplanes with an Android phone.
- 2013‑04‑11:
Building BSD in meta mode.
- 2013‑04‑11:
Panda IMAP: Mark Crispin's successor to UW-IMAP.
- 2013‑04‑11:
The Empire acquires the rebel alliance: Mendeley users revolt against Elsevier takeover.
- 2013‑04‑10:
Can someone explain Haskell's wager to me?
- 2013‑04‑10:
Bean leaves stop bedbugs in their tracks.
- 2013‑04‑10:
"Everything I had been taught to regard as a vice, under Thatcherism became a virtue." (video)
- 2013‑04‑10:
The economic achievements and failures of Margaret Thatcher.
- 2013‑04‑10:
No tail call elimination in Rust.
- 2013‑04‑10:
Managing SSH keys for automated access: current recommended practice.
- 2013‑04‑10:
A town without poverty? A 1970s Canadian experiment with Citizens' Income.
- 2013‑04‑10:
Artist's impression of the refurbished Arup building. (Vimeo)
- 2013‑04‑10:
A practical utopian's guide to the coming collapse.
- 2013‑04‑10:
Margaret Thatcher and the constitution.
- 2013‑04‑09:
Motorola Android devices unlocked by exploiting flaw in TrustZone kernel.
- 2013‑04‑09:
Dispelling the Thatcher myths.
- 2013‑04‑09:
Papers from the lost culture of array languages.
- 2013‑04‑09:
Thatcher: the woman who wrecked Britain.
- 2013‑04‑09:
Tamale: a TAble MAtching Lua Extension.
- 2013‑04‑09:
Mozilla Persona beta 2, including "identity bridging".
- 2013‑04‑09:
DNSSEC validator plugin for browsers.
- 2013‑04‑09:
Facebook HipHop HHVM is 2.3x .. 2.5x faster than standard PHP.
- 2013‑04‑09:
General purpose programming languages' maximal complexity.
- 2013‑04‑09:
BIND on RHEL6 now includes RRL patch.
- 2013‑04‑09:
The only Susan Greenfield article you'll ever need.
- 2013‑04‑09:
Thatcherism was a national catastrophe that still poisons us.
- 2013‑04‑09:
Verizon deploying carrier-grade NAT on DSL customers.
- 2013‑04‑09:
Meet the "nice-guy" patent trolls who want $1,000 per worker for using scanners.
- 2013‑04‑09:
Margaret Thatcher left a dark legacy that has still not disappeared.
- 2013‑04‑08:
Shodan: the scariest search engine on the Internet.
- 2013‑04‑08:
Puzzle: make three NOT gates using only two NOT gates.
- 2013‑04‑08:
If hackers didn't exist, governments would have to invent them.
- 2013‑04‑08:
Git koans.
- 2013‑04‑08:
David Willetts on Margaret Thatcher. (2009)
- 2013‑04‑08:
What can politicians learn from Margaret Thatcher.
- 2013‑04‑08:
Designing Kerberos IV: a dialogue in four scenes.
- 2013‑04‑08:
Wearable video cameras reduce police violence.
- 2013‑04‑08:
Explain like I'm 5: Kerberos.
- 2013‑04‑08:
More US ISPs doing man-in-the-middle ad injection.
- 2013‑04‑08:
Waffles: a collection of command-line tools for machine learning and data mining.
- 2013‑04‑07:
Tony Blair and Iraq: The damning evidence.
- 2013‑04‑06:
Lies about the Key Stage 2 spelling, punctuation, and grammar test.
- 2013‑04‑06:
The impact of the lambda calculus in logic and computer science.
- 2013‑04‑06:
With a broken promise, the government has handed the NHS over to the market private sector.
- 2013‑04‑06:
A review of Android for blind and partially sighted users.
- 2013‑04‑06:
Learn vimscript the hard way.
- 2013‑04‑06:
CSS media queries are the wrong thing.
- 2013‑04‑05:
AMI firmware source code and test private key leaked.
- 2013‑04‑05:
Apple to cripple VPN On Demand in iOS 6.1 due to VirnetX patent lawsuit.
- 2013‑04‑05:
Google says it's time to take action against patent trolls and patent privateering.
- 2013‑04‑05:
The baseline compiler has landed in Firefox Nightly.
- 2013‑04‑05:
Possible security disasters loom with rollout of new top-level domains.
- 2013‑04‑05:
Programming Erlang 2nd edition.
- 2013‑04‑05:
Closing the door on hackers.
- 2013‑04‑05:
The most ridiculous scene in Jurassic Park.
- 2013‑04‑04:
Do more to prevent DNS DDoS attacks.
- 2013‑04‑04:
Consortium for Plant Biotechnology Research plagiarised a web page, and sued its author when asked to respect copyright.
- 2013‑04‑04:
AMD declares the end of Moore's law.
- 2013‑04‑04:
Rackspace is suing the most notorious patent troll in America.
- 2013‑04‑04:
US DEA says it is impossible to intercept iMessages between two Apple devices even with a court order.
- 2013‑04‑04:
Why aren't we all talking with our devices yet? On voice UI design.
- 2013‑04‑04:
An explanatory model for the Senate's surge in support for same-sex marriage.
- 2013‑04‑04:
Q&A: Iain Banks / Rationalist Association.
- 2013‑04‑04:
American teenagers who read news online can be prosecuted under the CFAA.
- 2013‑04‑04:
Re-enacting the Night Watch. (video)
- 2013‑04‑04:
MIT puts up a firewall.
- 2013‑04‑04:
What you're reading about Blink is probably wrong.
- 2013‑04‑04:
Translation from bullshit to English of the Chrome Blink FAQ.
- 2013‑04‑03:
Next time you see a plea for cybersecurity spending on more cyberwarriors ...
- 2013‑04‑03:
Google Chrome Blink and security.
- 2013‑04‑03:
Google Chrome Blink developer FAQ.
- 2013‑04‑03:
Google forks WebKit to make Blink, a rendering engine for Chrome.
- 2013‑04‑03:
Links about programming for kids.
- 2013‑04‑03:
A mother tongue spoken by millions of Americans still gets no respect.
- 2013‑04‑03:
The patent protection racket.
- 2013‑04‑03:
"Not even wrong" and "wronger than wrong".
- 2013‑04‑03:
Hack the music industry to get from YouTube to an xmas top ten hit in under 8 weeks.
- 2013‑04‑03:
An interview with computing pioneer Alan Kay.
- 2013‑04‑03:
Andrew Tyrie: the most powerful backbencher in the House of Commons.
- 2013‑04‑03:
The Underhanded C Contest 2013.
- 2013‑04‑03:
Nuclear power has prevented about 1.84 million air pollution-related deaths.
- 2013‑04‑03:
Honest download meter prototype.
- 2013‑04‑02:
First sale doctrine does not apply to MP3s in the US.
- 2013‑04‑02:
checkedthreads: bug-free shared memory parallelism.
- 2013‑04‑02:
How the BBC betrayed the NHS.
- 2013‑04‑01:
Paradoxical gears.
- 2013‑04‑01:
Inside the gcc size overflow plugin.
- 2013‑04‑01:
We have to talk about why some people agree with benefit cuts.
- 2013‑04‑01:
Defrosting a cold storage building frozen for 90 years.
- 2013‑04‑01:
Crude benchmarks of NaCl and scrypt in the browser.
- 2013‑03‑31:
Terrorists of the right colour.
- 2013‑03‑31:
Callbacks are imperative, promises are functional: Node's biggest missed opportunity.
- 2013‑03‑30:
Fast collision attack on MD5.
- 2013‑03‑30:
Another NYT article on the Spamhaus DDoS; should have emphasised BCP 38 more.
- 2013‑03‑30:
Intellectual Property rights and innovation: evidence from the human genome.
- 2013‑03‑30:
The Spamhaus DDoS attack: how big a deal was it?
- 2013‑03‑30:
Donglegate: why the tech community hates feminists.
- 2013‑03‑30:
Looking at the Spamhaus BGP hijack.
- 2013‑03‑30:
How the Spamhaus DDoS could have been prevented.
- 2013‑03‑29:
Cisco's chronology of the Spamhaus DDoS.
- 2013‑03‑29:
Verisign does not think ICANN is ready for a thousand new TLDs.
- 2013‑03‑29:
The Wiley/Kirtsaeng first sale decision has echoes of Betamax.
- 2013‑03‑29:
The Spamhaus DDoS was hyped by shoddy journalism.
- 2013‑03‑29:
No, ZFS really doesn't need a fsck.
- 2013‑03‑29:
Is your open DNS resolver part of a criminal conspiracy?
- 2013‑03‑29:
What is the maximum DNS amplification factor?
- 2013‑03‑29:
Chilling effects of the DMCA on security research.
- 2013‑03‑29:
What can be done about source address spoofing and amplification attacks?
- 2013‑03‑29:
Open acces material published under a CC-BY-NC licence cannot be used for teaching.
- 2013‑03‑29:
Adobe Blank: a non-spacing non-marking typeface.
- 2013‑03‑28:
One of CloudFlare's bandwidth providers on the 300Gbit/s DDoS attack.
- 2013‑03‑28:
A 300Gbit/s DDoS is not enough to break the Internet.
- 2013‑03‑27:
Update from CloudFlare on the Spamhaus DDoS.
- 2013‑03‑27:
The BBC on the massive Spamhaus DDoS.
- 2013‑03‑27:
The power of the RSS reader.
- 2013‑03‑27:
Spamhaus DDoS grows to 300Gbit/s.
- 2013‑03‑27:
Memory address disclosure via weak hash tables and garbage collection.
- 2013‑03‑27:
Preparing for Google Groups shutdown.
- 2013‑03‑27:
Persona supports distributed identity providers today.
- 2013‑03‑26:
IBM 1360 Photostore at LLNL.
- 2013‑03‑26:
Entire editorial board of the Journal of Library Administration resigns over open access following death of Aaron Swartz.
- 2013‑03‑26:
The twisted London Underground map.
- 2013‑03‑26:
The highest-level feature of C.
- 2013‑03‑26:
Antipodean punting.
- 2013‑03‑26:
On the distribution of DNS TTLs.
- 2013‑03‑26:
"Cargo Cult Science" - by Richard Feynman.
- 2013‑03‑26:
The fragility of AES-GCM authenticated encryption.
- 2013‑03‑26:
Testing Cambridge's safer cycle network.
- 2013‑03‑26:
Reflections on a foray into post-publication peer review.
- 2013‑03‑26:
A Cambridge cycling infrastructure safari.
- 2013‑03‑26:
Inquiry-based learning about data structures, when teaching computer science.
- 2013‑03‑26:
Apple text APIs and upper/lower case digits.
- 2013‑03‑26:
USPS discrimination against atheist packing tape.
- 2013‑03‑26:
IBM 1360 photo-digital storage system: terabit capacity in the 1960s.
- 2013‑03‑26:
GCHQ recruitment website stores passwords in plain text.
- 2013‑03‑26:
The Irish approach to sharing roads between cars, bikes, and pedestrians.
- 2013‑03‑26:
When a deaf man has Tourette's.
- 2013‑03‑26:
Shrinking blob gets within 5%-10% of optimal in small travelling salesman problems.
- 2013‑03‑26:
The end of needs assessments in IPv4?
- 2013‑03‑25:
What happens when a domain registrar shuts down?
- 2013‑03‑25:
The million-plus open DNS resolver challenge.
- 2013‑03‑25:
Frozen spring linked to dramatic loss of Arctic sea ice.
- 2013‑03‑25:
A big password cracking wordlist.
- 2013‑03‑25:
Compiling LLJS to asm.js.
- 2013‑03‑25:
Prince Rupert's Drop: glass with interesting properties. (video)
- 2013‑03‑25:
miTLS: a formally verified reference implementation of TLS 1.2.
- 2013‑03‑25:
Open recursive DNS server survey.
- 2013‑03‑25:
A review of OneTab for Chrome.
- 2013‑03‑25:
DANE: the next big thing after DNSSEC.
- 2013‑03‑25:
Unix crypt encoding for scrypt.
- 2013‑03‑25:
How a self-confessed script kiddie became a password cracker.
- 2013‑03‑25:
Python speed optimization for reposurgeon.
- 2013‑03‑25:
Graphene supercapacitors sound promising.
- 2013‑03‑25:
The brains of the animal kingdom.
- 2013‑03‑25:
Difficulties in backing up live git repositories.
- 2013‑03‑24:
The origin of ketchup.
- 2013‑03‑24:
The future of the NHS—irreversible privatisation?
- 2013‑03‑24:
Normal human infant sleep.
- 2013‑03‑23:
CIA CTO on big data and mass surveillance.
- 2013‑03‑23:
Land of plenty (of government).
- 2013‑03‑23:
T-Mobile WiFi calling unverified X.509 MITM vulnerability.
- 2013‑03‑23:
DakaRand 1.0: revisiting clock drift for entropy generation.
- 2013‑03‑23:
Timer entropy daemon.
- 2013‑03‑23:
twuewand: a truerand algorithm for generating entropy.
- 2013‑03‑23:
How to kill Wi-Fi.
- 2013‑03‑23:
Securing ZeroMQ: CurveZMQ protocol and implementation.
- 2013‑03‑23:
The Crystal programming language: a compiled version of Ruby.
- 2013‑03‑23:
Cycling in two university cities: Cambridge and Münster.
- 2013‑03‑23:
Changing the way social scientists think about human behavior and culture.
- 2013‑03‑23:
Assemble two IKEA stools into a balance bike. (video)
- 2013‑03‑22:
Apple uses only renewable energy in its data centers.
- 2013‑03‑22:
20 years of NetBSD.
- 2013‑03‑22:
Major security hole allows Apple passwords to be reset with only email address and date of birth.
- 2013‑03‑22:
Cloudflare's CDNJS vs. Google hosted libraries.
- 2013‑03‑22:
Google's trust problem.
- 2013‑03‑22:
Setting your JavaScript free.
- 2013‑03‑22:
Firefox Nightly now includes OdinMonkey, an asm.js optimization module.
- 2013‑03‑22:
Radio jammers in the Sistine Chapel protected the secrecy of the papal election.
- 2013‑03‑22:
Two reasons the functional style is slow in SpiderMonkey.
- 2013‑03‑22:
Neil Gaiman on political correctness.
- 2013‑03‑22:
The Big Brother Watch amendment to limit the damage of the Leveson press regulations.
- 2013‑03‑21:
Verify DANE TLSA records.
- 2013‑03‑21:
Advice for writing messages for technical mailing lists.
- 2013‑03‑21:
gdnsd: geographic DNS server.
- 2013‑03‑21:
An old patch to BIND for matching by country in ACLs using MaxMind's GeoIP database.
- 2013‑03‑21:
Geolocation-aware DNS with BIND views.
- 2013‑03‑21:
The DDoS attack that knocked the Spamhaus website offline, and how Cloudflare mitigated it.
- 2013‑03‑21:
The invasion of Iraq was the single worst foreign policy decision in American history.
- 2013‑03‑20:
The end of the ISBN?
- 2013‑03‑20:
Sugar, not fat, is the deadly villain in the obesity epidemic.
- 2013‑03‑20:
The growth of BGP, or lack thereof.
- 2013‑03‑20:
BGP scaling revisited.
- 2013‑03‑20:
AdamsNames ccTLD hijack resolved.
- 2013‑03‑20:
Report of the 19th meeting of the consultative committee for time and frequency.
- 2013‑03‑20:
UTCr (rapid UTC) nears official production status.
- 2013‑03‑20:
Thieves in $80 million Eli Lilly heist used warehouse security schematics.
- 2013‑03‑20:
The purpose of DRM is to give content providers leverage against creators of playback devices.
- 2013‑03‑20:
Brian Krebs attacked by script kiddie "Phobia", previously involved in the Matt Honan hack.
- 2013‑03‑20:
The lesser of two Weevs.
- 2013‑03‑20:
Things publishers can't do: alternate business models for books.
- 2013‑03‑19:
Avoid silent data corruption in MySQL by setting sql_mode.
- 2013‑03‑19:
Python Software Foundation wins battle for EU Python trademark.
- 2013‑03‑19:
Fedora 19 bugs cannot be reported because the server side cannot handle the release name "Schrödinger's Cat".
- 2013‑03‑19:
Guardian's StrongTrustManager vulnerabilities: a case study in X.509 validation failure.
- 2013‑03‑19:
Steubenville is rape culture's Abu Ghraib moment.
- 2013‑03‑19:
What if Weev had just read one record and done "responsible disclosure"?
- 2013‑03‑19:
First sale doctrine upheld by US Supreme Court. Kirtsaeng wins against Wiley.
- 2013‑03‑19:
Open access: The 'avalanche of change' in higher education must be contextualised in terms of the government's broader neoliberal policies.
- 2013‑03‑19:
Bloomd: high performance Bloom filter server.
- 2013‑03‑19:
WikiLeaks cables and the end of the Iraq War.
- 2013‑03‑19:
Google Public DNS now supports DNSSEC validation.
- 2013‑03‑19:
Leveson's Royal Charter will not establish a blog regulator.
- 2013‑03‑19:
CRIME attack against TLS adapted to decrypt compressed server responses.
- 2013‑03‑19:
Some companies chasing innovations that really matter.
- 2013‑03‑19:
Internal-use X.509 certificates pose security risk for new gTLDs.
- 2013‑03‑19:
Post-quantum cryptography.
- 2013‑03‑18:
Port scanning /0 using insecure consumer routers.
- 2013‑03‑18:
When speaking, entertain, don't teach.
- 2013‑03‑18:
The insupportable equilibrium of economic thought.
- 2013‑03‑18:
Optimizing a single producer/consumer lock free queue, step by step.
- 2013‑03‑18:
Computer science in primary and secondary schools in Vietnam.
- 2013‑03‑18:
Preview of JSON support in BIND 9.10's statistics server.
- 2013‑03‑18:
Dangers of trailing dots in web host names.
- 2013‑03‑17:
Cryptography worst practices.
- 2013‑03‑17:
Terrain flyover demo in JavaScript and WebGL.
- 2013‑03‑17:
PayPal's concerns with new gTLDs that match popular internal private TLDs.
- 2013‑03‑17:
How beer gave us civilization.
- 2013‑03‑17:
Qthreads: a library for programming with millions of lightweight threads.
- 2013‑03‑16:
Plaintext recovery attack on broadcast RC4.
- 2013‑03‑16:
Using a Raspberry Pi to trojan a Dell laptop docking station.
- 2013‑03‑16:
Half of spam comes from just 20 ISPs.
- 2013‑03‑16:
MesoCalc: a Mesopotamian base-60 calculator.
- 2013‑03‑16:
Ubuntu unveils its next-generation graphical shell and display server.
- 2013‑03‑15:
C compiled to Lua runs on LuaJIT as fast as native gcc.
- 2013‑03‑15:
National security letters with gag orders are an unconstitutional restriction on free speech.
- 2013‑03‑15:
Longest C++ error message?
- 2013‑03‑15:
An overview of spam botnets.
- 2013‑03‑15:
CPC: continuation passing C.
- 2013‑03‑15:
Google Reader lived on borrowed time: its creator Chris Wetherell reflects.
- 2013‑03‑15:
DRM is such a fucking stupid idea.
- 2013‑03‑15:
Anonymity in the real world is very hard.
- 2013‑03‑15:
Avast! anti-virus intercepts TLS connections, and resets non-invasive settings after boot.
- 2013‑03‑15:
sthttpd
- 2013‑03‑15:
Dashes and hyphens and Unicode.
- 2013‑03‑14:
Two new attacks on TLS allow decryption of authentication cookies.
- 2013‑03‑14:
UK bank fraud up by 11% in 2012, but how much do customers lose?
- 2013‑03‑13:
Any time we deviate from object-capability security, we regret it.
- 2013‑03‑13:
NSFWCORP gets banned by Vegas distributors: freedom of the press in the USA.
- 2013‑03‑13:
Reading indeterminate contents might as well be undefined in C.
- 2013‑03‑13:
GitSync: connect PlasticSCM to GitHub
- 2013‑03‑13:
Aaron Swartz lawyers accuse prosecutor Stephen Heymann illegally withholding exculpatory evidence.
- 2013‑03‑13:
DNS domain names: 253 or 255 bytes/octets?
- 2013‑03‑13:
Tim O'Reilly defends his company's soul.
- 2013‑03‑13:
9th Circuit appeals court says 4th Amendment applies at US border, and encrypted files are not suspicious.
- 2013‑03‑13:
Destructors, finalizers, and synchronization.
- 2013‑03‑13:
O'Reilly has lost its soul.
- 2013‑03‑13:
Where and when did the symbols "+" and "-" originate?
- 2013‑03‑13:
Torque: an OBD2 performance and diagnostic tool for Android devices.
- 2013‑03‑13:
Automatic: transmit car telemetry data from the on-board diagnostics port to your phone.
- 2013‑03‑13:
Confessions of a job destroyer.
- 2013‑03‑12:
Lego robot folds and shoots paper planes.
- 2013‑03‑12:
Retailer sues Visa over $13 million 'fine' for being hacked.
- 2013‑03‑12:
RC4 is kind of broken in TLS.
- 2013‑03‑12:
Confusion reigns over three "hijacked" ccTLDs.
- 2013‑03‑12:
Discretized streams: an efficient and fault-tolerant model for stream processing on large clusters.
- 2013‑03‑12:
Come and help save posterous from oblivion!
- 2013‑03‑12:
Sample code for verifying TLS certs with OpenSSL.
- 2013‑03‑12:
A salute to Bradley Manning, whistleblower, as we hear his words for the first time.
- 2013‑03‑12:
A theorem fit to terrify bankers: M&M implies banks should be less indebted.
- 2013‑03‑12:
What I wish Tim Berners-Lee understood about DRM.
- 2013‑03‑12:
Notes on Intel microcode updates.
- 2013‑03‑12:
Securing ØMQ with libsodium.
- 2013‑03‑12:
You can ring my bell! Adventures in sub-GHz RF land.
- 2013‑03‑12:
Version skew leads to Bitcoin netsplit; price temporarily falls 23%.
- 2013‑03‑12:
AdamsNames TLD registry hijack due to corporate infighting.
- 2013‑03‑12:
Failures of secret key cryptography.
- 2013‑03‑12:
US-EU free trade deal: foundation for a new global economic order.
- 2013‑03‑12:
Sugar industry's secret documents echo tobacco tactics.
- 2013‑03‑11:
Registry operator AdamsNames hacked, locking up .TC, .GD, and .VC.
- 2013‑03‑11:
Improve the volume and quality of contributions by giving commit access to anyone who sends a pull request.
- 2013‑03‑11:
Hacking Donkey Kong so Pauline rescues Mario.
- 2013‑03‑11:
Optimizing software occlusion culling in 3D graphics.
- 2013‑03‑11:
Fenland ditch fire blamed on pigeon fireball.
- 2013‑03‑11:
Here come the encryption apps!
- 2013‑03‑11:
The Lazy K esoteric programming language.
- 2013‑03‑10:
How OCaml type checking works; or what polymorphism and garbage collection have in common.
- 2013‑03‑10:
The perfect error message.
- 2013‑03‑10:
A manifesto for error reporting.
- 2013‑03‑10:
Yo as a gender-neutral pronoun in Baltimore.
- 2013‑03‑10:
Fit LEDs into Lego minifigures for Halloween.
- 2013‑03‑10:
Extreme debugging: fixing microcode with an oven.
- 2013‑03‑09:
Introducing Sodium, a new cryptographic library.
- 2013‑03‑09:
RetroArch emulates nearly every classic gaming console on Android.
- 2013‑03‑09:
TLS PKIX tree of trust.
- 2013‑03‑09:
MySQL performance hurt by glibc malloc on manycore machines.
- 2013‑03‑08:
Consultation on DNSSEC root trust anchor rollover.
- 2013‑03‑08:
A visualisation of contradictions in the Bible.
- 2013‑03‑07:
The US military uses IRC as a primary comms path.
- 2013‑03‑07:
Arup building redevelopment plans.
- 2013‑03‑07:
passwdqc: password strength checking and policy enforcement toolset.
- 2013‑03‑07:
Fast submenus that don't disappear out from under you.
- 2013‑03‑07:
Golang at Google: language design in the service of software engineering.
- 2013‑03‑06:
Printer ink costs more than human blood.
- 2013‑03‑06:
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols.
- 2013‑03‑06:
Lord Puttnam's Leveson amendment has put libel reform in serious danger.
- 2013‑03‑06:
Malicious Java applet is signed with revoked certificate but still runs automatically.
- 2013‑03‑06:
Phidelius: constructing asymmetric keypairs from mere passwords for fun and PAKE.
- 2013‑03‑06:
Prevent DoS attacks against slow password hash functions?
- 2013‑03‑06:
Deep C monsters.
- 2013‑03‑06:
DNSSEC monitoring tools.
- 2013‑03‑06:
ZFS ZIL-related fragmentation.
- 2013‑03‑06:
ZFS write performance: impact of fragmentation.
- 2013‑03‑06:
Helping users create better passwords.
- 2013‑03‑06:
DRM chair.
- 2013‑03‑05:
The Google Glass feature no one is talking about.
- 2013‑03‑05:
The Finkbeiner test for profiles of scientists.
- 2013‑03‑05:
Exploits that do good rather than evil.
- 2013‑03‑05:
Advanced auto-dependency generation for make.
- 2013‑03‑05:
makefile-death: A make-based configuration and build system.
- 2013‑03‑05:
Libre Office now builds with a single instance of make.
- 2013‑03‑05:
Former directors of the DEA warn Obama about his obligations to fight the war on drugs.
- 2013‑03‑05:
Slaughter: a system administration and configuration tool.
- 2013‑03‑05:
Honest job advertisement for a lectureship / assistant professorship.
- 2013‑03‑05:
Cambridge pub study. (Not as fun as it sounds.)
- 2013‑03‑05:
The US industrial revolution was built on piracy.
- 2013‑03‑05:
PHP Manual Masterpieces: strcmp.
- 2013‑03‑05:
Military malware may have killed the iPhone jailbreak.
- 2013‑03‑05:
Bitrig is a free, fast, and secure Unix-like Open Source operating system.
- 2013‑03‑05:
Deep Impact: Unintended consequences of journal rank.
- 2013‑03‑05:
Problems with UK's new open access academic publishing policies.
- 2013‑03‑05:
Facebook Android app uses crazy Dalvik VM patch to load on old phones.
- 2013‑03‑05:
You never, ever, under any circumstances want to use Maven!
- 2013‑03‑05:
Getting started with Ansible.
- 2013‑03‑05:
The first five minutes on a new server with Ansible.
- 2013‑03‑05:
Segway + iPad = telepresence.
- 2013‑03‑05:
The cost of botnets and the implications for Internet voting.
- 2013‑03‑05:
Welcome to peak capitalism.
- 2013‑03‑04:
The BBC's bad (pseudo)science reporting will make people sick.
- 2013‑03‑04:
MPs vote for secret courts. Injustice must not be seen to be done.
- 2013‑03‑04:
The Pirate Bay hosted in North Korea? No, it's fake.
- 2013‑03‑04:
Exotic necktie knots: Eldredge; Trinity; Cape.
- 2013‑03‑04:
Parsoid: round-trip conversion between HTML5 and wikitext.
- 2013‑03‑04:
Honest trailers: Skyfall. (YouTube)
- 2013‑03‑04:
Breaking the law by reading it.
- 2013‑03‑04:
Centre for Computing History: how you can help.
- 2013‑03‑04:
Objects and aspects: row polymorphism.
- 2013‑03‑04:
Things you should know about the "cured" HIV baby before you get too excited.
- 2013‑03‑04:
Mir: yet another successor to X11.
- 2013‑03‑04:
The various locations and encodings for filenames in Zip archives.
- 2013‑03‑04:
SSD power faults are likely to scramble your data.
- 2013‑03‑04:
Fab stops sending you emails you don't read, even when you don't ask them to.
- 2013‑03‑04:
NHS 'privatisation' reform 'could place people in danger'.
- 2013‑03‑04:
Days since last Java 0day.
- 2013‑03‑04:
Aging canned goods: time and heat can make tuna and Spam even more delicious..
- 2013‑03‑04:
Category theory for scientists.
- 2013‑03‑04:
Pevsner architectural guides (now with app).
- 2013‑03‑04:
Bradley Manning Nobel peace prize nomination 2013.
- 2013‑03‑04:
Techniques for efficient secure computation based on Yao's protocol.
- 2013‑03‑04:
The nonsense math effect.
- 2013‑03‑04:
The financial system as a whole functions as a hostile AI.
- 2013‑03‑04:
A baby has been cured of HIV with antiretroviral drugs.
- 2013‑03‑03:
Human Rights and Bingham's Question: which rights are we to discard?
- 2013‑03‑03:
Algorithmic rape jokes and object spam.
- 2013‑03‑03:
ACM: tear down this paywall.
- 2013‑03‑03:
Sony proposes DRM for electricity.
- 2013‑03‑03:
Interesting JavaScript Webcrypto question.
- 2013‑03‑03:
Peek and poke upstart (init) to fix process states on Linux.
- 2013‑03‑03:
AESOP: an autoparallelizing compiler based on LLVM.
- 2013‑03‑03:
Safe C64 VSP: fix a hardware bug triggered by a demo hack.
- 2013‑03‑03:
Fundamental problems of Lisp: irregular syntax; cons cells.
- 2013‑03‑03:
CloudFlare outage post mortem.
- 2013‑03‑03:
Literally IPv6: Microsoft Exchange vs Apple Mail.
- 2013‑03‑03:
Intellectual debt.
- 2013‑03‑02:
The Apple i-device Lightning digital AV adapter surprise.
- 2013‑03‑02:
Into the continuum.
- 2013‑03‑02:
We know how Eastleigh voted. Here's why.
- 2013‑03‑02:
How to make a Java jar file executable on unix.
- 2013‑03‑02:
Please continue to hold: an empirical study of tolerance to security delays.
- 2013‑03‑02:
"Establishing secure connection..." and other artificial delays.
- 2013‑03‑02:
When slower is better.
- 2013‑03‑02:
Why Python, Ruby, and Javascript are slow.
- 2013‑03‑02:
The resurgence of neural networks.
- 2013‑03‑02:
The contested Barbie: what happens to marginal subcultures as the web becomes popular:
- 2013‑03‑02:
C/C++ gripe: integer types.
- 2013‑03‑01:
Corporations are post-human hostile AI.
- 2013‑03‑01:
Pwn Pad.
- 2013‑03‑01:
Ten years of PyPy.
- 2013‑03‑01:
Tim Gowers on the Episciences project and arXiv overlay journals.
- 2013‑03‑01:
Tim Gowers on the Forum of Mathematics.
- 2013‑03‑01:
Aaron Swartz was right.
- 2013‑03‑01:
Centre for Computing History finds a home in Cambridge.
- 2013‑03‑01:
A new Java memory corruption 0day.
- 2013‑03‑01:
What is (and is not) in WebKit.
- 2013‑03‑01:
Connection management in Chromium.
- 2013‑03‑01:
They found their son in the subway!
- 2013‑03‑01:
The court of public opinion, reputation, revenge, and the unfairness of the courts.
- 2013‑03‑01:
Marvin the meme android.
- 2013‑03‑01:
Two surgeons debate cycle helmets.
- 2013‑02‑28:
It's the sugar, folks.
- 2013‑02‑28:
Video of the planned new Cambridge Station multi-storey cycle parking.
- 2013‑02‑28:
IP upgrade will allow US telcos to escape regulation.
- 2013‑02‑28:
NTP pool DNS server monitor.
- 2013‑02‑28:
NTP pool DNS server rewritten in Golang.
- 2013‑02‑28:
Eating sugar correlated to more diabetes: an econometric analysis of repeated cross-sectional population-level data.
- 2013‑02‑28:
Russian speeding cameras crippled by malware.
- 2013‑02‑28:
Users must give cPanel their root password to get support. cPanel support database hacked.
- 2013‑02‑28:
British citizens get their nationality revoked while on holiday, and killed by US drones.
- 2013‑02‑28:
Fuck you very much, graffiti.
- 2013‑02‑28:
Segregated yoghurts.
- 2013‑02‑28:
A few good things about Ansible.
- 2013‑02‑27:
List of static code analysis tools.
- 2013‑02‑27:
People refusing to co-operate at DHS checkpoints. (video)
- 2013‑02‑27:
In praise of "boring" technology (DNS).
- 2013‑02‑27:
Nominet backs off on direct.uk plan, but still wants open 2LD registration and more DNSSEC deployment.
- 2013‑02‑27:
Microsoft offers security audits to ccTLD registries.
- 2013‑02‑27:
Why is BIND10 written in C++ and Python?
- 2013‑02‑27:
Top universities in social media marketing.
- 2013‑02‑27:
A case where DNSSEC would help. (part 2)
- 2013‑02‑27:
A case where DNSSEC would help. (part 1)
- 2013‑02‑27:
Using PDF as a code distribution archive format.
- 2013‑02‑27:
Keeping it on-topic: the problem with discussing sex at technical conferences.
- 2013‑02‑27:
What happened with Violet Blue's Security BSides SF talk.
- 2013‑02‑26:
Music sales rise when it is easier to buy.
- 2013‑02‑26:
Crypto law survey.
- 2013‑02‑26:
Carne Ross's testimony to the Butler inquiry into the invasion of Iraq.
- 2013‑02‑26:
London taxi history.
- 2013‑02‑26:
F*: secure distributed programming with value-dependent types.
- 2013‑02‑26:
The high cost of a biometric identity card to tackle illegal immigration to the USA.
- 2013‑02‑26:
DoJ admits the Aaron Swartz prosecution was political.
- 2013‑02‑26:
Vi Hart explains how to cope with negative comments.
- 2013‑02‑26:
Broken by design: MongoDB fault tolerance.
- 2013‑02‑26:
Dragonfly key exchange.
- 2013‑02‑26:
A closer look at the performance of Google Chrome.
- 2013‑02‑25:
Bypassing Google's two-factor authentication using application-specific passwords.
- 2013‑02‑25:
Exact chaos.
- 2013‑02‑25:
Canada's DNSSEC setup.
- 2013‑02‑25:
The eminently self-evident effectiveness of C.
- 2013‑02‑25:
The unknown robber barons: Internet monopoly in the US.
- 2013‑02‑25:
Pragmatic Unicode.
- 2013‑02‑25:
DANE maakt het PKI-systeem weer veilig en betaalbaar.
- 2013‑02‑25:
CAs will stop issuing X.509 certificates with non-FQDNs 20 years late.
- 2013‑02‑25:
You're wrong and can never be convinced otherwise.
- 2013‑02‑24:
If boys struggle to learn from women... then why?
- 2013‑02‑24:
Changeset evolution: safe and easy history rewrites for Mercurial.
- 2013‑02‑24:
Lessons from the failed war on drugs.
- 2013‑02‑24:
The dark side of C++.
- 2013‑02‑24:
The bonehouse of St Leonard's church.
- 2013‑02‑23:
Redacted: a font to keep your wireframes free of distracting Lorem Ipsum.
- 2013‑02‑23:
Non-existent "bigger than 7/7" plot.
- 2013‑02‑23:
How "golden eagle snatches kid" ruled the Internet.
- 2013‑02‑23:
A tale of two queues: Redis vs ØMQ, Python vs Golang.
- 2013‑02‑23:
DevOps Reactions.
- 2013‑02‑23:
Cyphernomicon: a cypherpunk FAQ.
- 2013‑02‑23:
Using Silk Road, an anonymous drug marketplace based on Tor and Bitcoin.
- 2013‑02‑22:
Bitter pill: medical bills are killing Americans.
- 2013‑02‑22:
You can't use the live UK train data without accepting a gagging clause.
- 2013‑02‑22:
Chrome OS and open source firmware.
- 2013‑02‑22:
Render PDFs on the server with pdf.js and node-canvas.
- 2013‑02‑22:
Amdahl's law in reverse: the wimpy core advantage.
- 2013‑02‑22:
The extraordinary science of addictive junk food.
- 2013‑02‑22:
The Intel MMU fault handling mechanism is Turing complete.
- 2013‑02‑22:
To understand the iOS passcode bug, consider the use case.
- 2013‑02‑21:
Clarifications and implementation notes for DNSSEC.
- 2013‑02‑21:
DNSSEC deployment: the time is now.
- 2013‑02‑21:
The power of two random choices in load balancing.
- 2013‑02‑21:
Going bright: governments should ensure that systems aren't systematically vulnerable.
- 2013‑02‑21:
Going bright: wiretapping without weakening communications infrastructure.
- 2013‑02‑21:
Custom network stack: it goes to 11.
- 2013‑02‑20:
"Server push" already exists, but SPDY server push is better.
- 2013‑02‑20:
Why does everybody have the same MAC address as me?
- 2013‑02‑20:
Medical research fraud almost destroyed the comics industry.
- 2013‑02‑20:
Mandiant APT1 report has critical analytic flaws.
- 2013‑02‑20:
Tweetbot and the updated Twitter display guidelines.
- 2013‑02‑20:
How we hacked Facebook with OAuth2 and Chrome bugs.
- 2013‑02‑20:
Why have the white British left London?
- 2013‑02‑20:
Thug: a low-interaction honeyclient written in Python.
- 2013‑02‑20:
The NYT public editor on Broder's dodgy Tesla test drive.
- 2013‑02‑19:
An update on the Python trademark dispute.
- 2013‑02‑19:
Total functional programming.
- 2013‑02‑19:
The farmer vs. Monsanto: "to suggest that plants just grow themselves is preposterous."
- 2013‑02‑19:
Remote code execution vulnerability on BlackBerry Enterprise Server triggered by handset users viewing TIFFs.
- 2013‑02‑19:
Hackers may have stolen .edu domain passwords.
- 2013‑02‑19:
I can't let you do that, Dave: what it means to design our computers and devices to disobey us.
- 2013‑02‑19:
BBC China crew detained by military after filming 'cyber-warfare headquarters'.
- 2013‑02‑19:
Kids use Tumblr not Facebook.
- 2013‑02‑19:
Underwater ice hockey.
- 2013‑02‑19:
Mouse-driven colour picker.
- 2013‑02‑19:
Double murder trial halted due to "unfairness" of legal aid cuts.
- 2013‑02‑19:
On partial functions in Idris.
- 2013‑02‑19:
Do something useful with those recruiting emails.
- 2013‑02‑19:
The C10M problem.
- 2013‑02‑19:
Power Struggles: revisiting the RISC vs. CISC debate on contemporary ARM and x86 architectures.
- 2013‑02‑19:
SEO for scholarship: hacking citation metrics.
- 2013‑02‑19:
Destabilizing the bullying power structure.
- 2013‑02‑19:
Facebook has a problem with women.
- 2013‑02‑19:
Python trademark filer was ignorant of Python.
- 2013‑02‑19:
F**K CAPTCHA
- 2013‑02‑19:
Serious syslog problems?
- 2013‑02‑19:
Tidal Lock: optional static type checking and inference for Lua.
- 2013‑02‑19:
The Chinese army unit behind hacking attacks on US corporate and government targets.
- 2013‑02‑18:
HDCP is dead. Long live HDCP. A peek into the curious world of HDMI copy protection...
- 2013‑02‑18:
Origin of the abbreviation "i18n".
- 2013‑02‑17:
Colony: a JavaScript to Lua source compiler.
- 2013‑02‑17:
New body mass index (BMI).
- 2013‑02‑16:
If Pixar did Star Trek...
- 2013‑02‑16:
Linux kernel 0day: race condition with PTRACE_SETREGS.
- 2013‑02‑16:
Mogridge's law and the speed of urban traffic.
- 2013‑02‑16:
"Hubris": a new documentary reexamines the Iraq war hoax.
- 2013‑02‑16:
Unlawful Deal arms: heraldry gone mad!
- 2013‑02‑16:
The lesson from Poundland: work pays.
- 2013‑02‑16:
Anti-piracy ad uses pirated music.
- 2013‑02‑15:
A rant about CBC-MAC implementation errors.
- 2013‑02‑15:
A comparison between git and Microsoft Team Foundation Server.
- 2013‑02‑15:
Bert's secret-wg DNS calculator supports DNSSEC.
- 2013‑02‑15:
DNS calculator: how NOT to use the DNS!
- 2013‑02‑15:
Using CryptoStick as an HSM.
- 2013‑02‑15:
Ten years ago we marched against the Iraq war and I learned a lesson in betrayal.
- 2013‑02‑15:
Password hashing competition.
- 2013‑02‑15:
Python trademark at risk in Europe.
- 2013‑02‑14:
No compulsory cycle helmets: instead, save lives by encouraging more cycling, making it a safer and more attractive transport option.
- 2013‑02‑14:
The New York Times's most peculiar Tesla test drive.
- 2013‑02‑14:
A Raspberry Pi VAX cluster.
- 2013‑02‑14:
Braess's paradox: building a new road often increases travel time.
- 2013‑02‑14:
TRILL and 802.1aq are like apples and oranges.
- 2013‑02‑13:
Policy-based evidence: Department of Health and Prince's Foundation censor NHS web pages on homeopathy.
- 2013‑02‑13:
Wi-Fi patent troll emerges unscathed from racketeering lawsuit.
- 2013‑02‑13:
Biggest lies of mainstream nutrition.
- 2013‑02‑13:
What is steampunk for?
- 2013‑02‑13:
NSFNET: the partnership that changed the world.
- 2013‑02‑13:
Collective motion of moshers at heavy metal concerts.
- 2013‑02‑13:
Stop pretending cyberspace exists: it's an idea that makes you dumber the moment you learn of it.
- 2013‑02‑12:
LibTech Auditing Cheatsheet: things to look for when auditing extremely high value applications.
- 2013‑02‑12:
The experimental effectiveness of mathematical proof.
- 2013‑02‑12:
PeerJ, eLIFE, OLH: disruptive innovation in academic publishing.
- 2013‑02‑12:
SSLShader: GPU-accelerated TLS proxy.
- 2013‑02‑12:
The school food plan.
- 2013‑02‑12:
Exponentially decaying lists: log scale for lists.
- 2013‑02‑12:
Exponential decay of history: summarize lots of past activity in bounded space.
- 2013‑02‑12:
Ruby on Rails json_class vulnerability.
- 2013‑02‑12:
"When the Pancake Bell rings we are free": Shrove Tuesday in the 1600s.
- 2013‑02‑12:
Canada gives up on its mass Internet surveillance plan.
- 2013‑02‑12:
Workfare breaks anti-slavery laws.
- 2013‑02‑12:
A beautiful thing happens when you project video onto falling snow.
- 2013‑02‑12:
Minecraft: Raspberry Pi edition.
- 2013‑02‑11:
Tweet-sized mathematics problems.
- 2013‑02‑11:
Coordination costs and EU integration.
- 2013‑02‑11:
Gold is a completely false market.
- 2013‑02‑11:
iWantHue: optimally distinct colour palettes for data scientists.
- 2013‑02‑11:
git-crypt: transparent encryption of some files in a git repo.
- 2013‑02‑11:
Effects of bicycle helmet laws on children's injuries.
- 2013‑02‑11:
Intel 82574L packet of death problem due to motherboard manufacturer's bad EEPROM.
- 2013‑02‑11:
Understanding quarternions.
- 2013‑02‑11:
Atmel SAM7XC crypto co-processor key recovery (with bonus Mifare DESFire hack).
- 2013‑02‑11:
No, The Sun, the Court of Appeal and the Human Rights Act are not the EU.
- 2013‑02‑11:
IRMA versus Frau Mustermann: the advantages of attributes over attestation in smart card authorization.
- 2013‑02‑11:
The continuing ITU meltdown.
- 2013‑02‑11:
The design and implementation of Idris, a general purpose dependently typed programming language.
- 2013‑02‑11:
What we know about spreadsheet errors.
- 2013‑02‑10:
The importance of Excel.
- 2013‑02‑10:
Gender bias in mathematics.
- 2013‑02‑10:
Compile brainfuck to ELF relocation instructions.
- 2013‑02‑10:
Mathics: a free, light-weight alternative to Mathematica.
- 2013‑02‑10:
Native Linux KVM host, without QEMU.
- 2013‑02‑10:
php.js: run PHP code in the browser.
- 2013‑02‑10:
Medians and beyond: new aggregation techniques for sensor networks.
- 2013‑02‑10:
Herd immunity demo.
- 2013‑02‑10:
Base64 has a fixed point.
- 2013‑02‑10:
Exploiting Turing-complete DWARF exception handling data.
- 2013‑02‑10:
Patents and innovation: evidence from economic history.
- 2013‑02‑09:
The evolution of Microsoft's data centre designs.
- 2013‑02‑09:
For sale: trusted X.509 root signing certificates.
- 2013‑02‑09:
How the Star Wars traceroute works.
- 2013‑02‑09:
Xerox PARC, Apple, and the creation of the mouse.
- 2013‑02‑09:
NTSB determines origin of 787 battery fire.
- 2013‑02‑09:
LANGSEC: language-theoretic security.
- 2013‑02‑09:
Cultural values versus economic values: how can low-paid workers have compassion to spare, when they are never shown any?
- 2013‑02‑09:
Fast CPU emulation using LuaJIT.
- 2013‑02‑09:
The Elsevier boycott one year on.
- 2013‑02‑09:
Top ten worst graphs.
- 2013‑02‑09:
The defamation bill is now in thrall to a politically motivated Leveson clause.
- 2013‑02‑09:
Going underneath the Albert Memorial.
- 2013‑02‑09:
Remap key bindings on Mac OS X.
- 2013‑02‑09:
The result of pinging all the Internet IP addresses.
- 2013‑02‑08:
Hooked on DTrace.
- 2013‑02‑08:
Remotely exploiting the PHY layer.
- 2013‑02‑08:
Remotely exploitable buffer overflow in libcurl POP3 and SMTP protocol handlers.
- 2013‑02‑08:
What happened to Lego prices.
- 2013‑02‑08:
Up-goer five: Are you, my love, just like a summer's day?
- 2013‑02‑07:
Ember.js, accessibility, WAI-ARIA, and Mac OS X Voice Over.
- 2013‑02‑07:
European court of human rights decides that copyright interferes with the right to freedom of expression.
- 2013‑02‑07:
MySQL character encoding bugs are awesome!
- 2013‑02‑07:
Not a beard: an example of women's technical contributions going unrecognized.
- 2013‑02‑07:
Debating anti-virus with security experts.
- 2013‑02‑07:
The Twist pencil sharpner.
- 2013‑02‑07:
Equal marriage in France.
- 2013‑02‑07:
Open letter to Andrew Turner MP.
- 2013‑02‑07:
The surprising Menger Sponge slice.
- 2013‑02‑06:
Make a BRIC using FUSE and mdadm.
- 2013‑02‑06:
BRIC (Bunch of Redundant Independent Clouds): using Tahoe-LAFS to RAID data across several Dropbox-alikes.
- 2013‑02‑06:
Access to communications data by UK intelligence and security agencies.
- 2013‑02‑06:
Red Hat Bugzilla discussion on another Intel 82574L hardware lockup.
- 2013‑02‑06:
Packets of death.
- 2013‑02‑06:
House of Lords amends the Defamation Bill to include some of Leveson's press regulation recommendations.
- 2013‑02‑06:
Microsoft Surface with Windows 8 Pro: hotter, thicker, faster, louder.
- 2013‑02‑06:
Anatomy of the Mac OS X file: URL crash bug.
- 2013‑02‑06:
Centennial of Markov chains.
- 2013‑02‑06:
UK communications interception plan rests on "pretty heroic assumptions", said director of MI5.
- 2013‑02‑06:
Techno Viking and the curse of Internet celebrity.
- 2013‑02‑05:
Bad Pharma: "In the 1800s we made huge leaps in medicine with clean, clear water. In the 2000s we'll make the same leaps with clean clear information."
- 2013‑02‑05:
No-fly lists: A new tactic of exile?
- 2013‑02‑05:
Basketball trick shot video of Titus, aged 1.5 - 2. (YouTube)
- 2013‑02‑05:
Function types in Golang.
- 2013‑02‑05:
Civilized Discourse Construction Kit.
- 2013‑02‑05:
The case against patents.
- 2013‑02‑05:
SMACK: static checker for C/C++ programs.
- 2013‑02‑05:
Fractal high precision deep zoom technical info.
- 2013‑02‑05:
British Beer and Pub Association seeks judicial review against Cambridge City Council's pro-pub planning policy.
- 2013‑02‑05:
People of Timbuktu saved 95% of manuscripts from invaders.
- 2013‑02‑05:
Magdalene laundries report to be published.
- 2013‑02‑05:
The Bun Shop to reopen as the Cambridge Brew House.
- 2013‑02‑05:
InterNyet: why the Soviet Union did not build a nationwide computer network.
- 2013‑02‑05:
Programming language checklist.
- 2013‑02‑05:
Pakistan domain registry hacked again: 23000 domains affected.
- 2013‑02‑05:
The Roman Catholic church's convenient morality.
- 2013‑02‑04:
Ross Anderson's "Security Engineering" now available free online.
- 2013‑02‑04:
The trouble with Wall Street: the "shocking" news that Goldman Sachs is greedy.
- 2013‑02‑04:
YAML remote code execution is not limited to Rails or Ruby.
- 2013‑02‑04:
Poynton's stunningly successful shared space scheme on a trunk road junction in the village centre. (YouTube)
- 2013‑02‑04:
Submarine cable map 2013.
- 2013‑02‑04:
Even more delays to the botched Digital Economy Act.
- 2013‑02‑04:
$25 Raspberry Pi Model A now for sale in Europe.
- 2013‑02‑04:
Going from suck to non-suck as a public speaker.
- 2013‑02‑04:
Too fast to fail: is high-speed trading the next Wall Street disaster?
- 2013‑02‑04:
Malvertising campaigns at multiple ad networks invoke Black Hole exploit kit.
- 2013‑02‑04:
Notes on redesigning the Rust runtime.
- 2013‑02‑04:
List of unusual deaths.
- 2013‑02‑04:
Comparing popular and formal scientific writing using Bill Bryson and Simon Peyton Jones as examples.
- 2013‑02‑04:
Geeks are the new guardians of our civil liberties.
- 2013‑02‑04:
A clock referenced to mc^2/ℏ would enable high-precision mass measurements and a fundamental definition of the second.
- 2013‑02‑04:
eSTREAM: the ECRYPT stream cipher project.
- 2013‑02‑04:
How to unlearn economics.
- 2013‑02‑04:
Attack of the week: TLS timing oracles.
- 2013‑02‑04:
Lucky Thirteen attack on TLS CBC.
- 2013‑02‑04:
The distress of the privileged.
- 2013‑02‑04:
Who firebombed London's oldest anarchist bookshop?
- 2013‑02‑04:
How to win arguments by pretending to be a simpleton.
- 2013‑02‑04:
Swiss love affair with rail turns sour.
- 2013‑02‑04:
A map of world alcohol consumption.
- 2013‑02‑04:
Welfare fraud is a drop in the ocean compared to tax avoidance.
- 2013‑02‑04:
Knocking on private back doors with the web browser.
- 2013‑02‑04:
How not to layout cycle parking.
- 2013‑02‑04:
Patent troll sues creator of X-Plane flight simulator for using standard Android copy protection.
- 2013‑02‑04:
Vestas SailRocket 2: How a boat-plane hybrid shattered the sound barrier of sailing.
- 2013‑02‑03:
The robustness principle is a bad idea.
- 2013‑02‑03:
Microsoft cannibalizes ARM Surface RT to boost Intel Surface Pro.
- 2013‑02‑03:
Google two-factor authentication myths and realities.
- 2013‑02‑03:
Authenticated encryption in practice.
- 2013‑02‑02:
How profilers lie: the cases of gprof and KCachegrind.
- 2013‑02‑02:
UK government has spent over £400 million on invasive communications interception before it becomes law.
- 2013‑02‑02:
The PNG image file format is now more popular than GIF.
- 2013‑02‑02:
DNSSEC: what every sysadmin should be doing to keep things working.
- 2013‑02‑01:
A brief chronology of TLS attacks and weaknesses.
- 2013‑02‑01:
Obree's bike includes part of a cooking pot.
- 2013‑02‑01:
Graeme Obree is building a bike for a human-powered speed record attempt.
- 2013‑02‑01:
Hard questions about quantum crypto and quantum computing.
- 2013‑02‑01:
Quantum crypto still not proven, claim Cambridge experts.
- 2013‑02‑01:
Shapecatcher: draw the Unicode character you want.
- 2013‑02‑01:
IPMI: freight train to hell.
- 2013‑01‑31:
The colour of London's commute.
- 2013‑01‑31:
Git support in Microsoft Visual Studio.
- 2013‑01‑31:
Who knows what is in a placebo?
- 2013‑01‑31:
Routine criminal records checks for job applicants are unlawful.
- 2013‑01‑31:
iOS security.
- 2013‑01‑31:
39% of web sites run PHP.
- 2013‑01‑31:
Performance of the SIMON and SPECK families of lightweight block ciphers.
- 2013‑01‑31:
The stupid cookie law is dead at last.
- 2013‑01‑30:
V.90 modem handshake diagram.
- 2013‑01‑30:
Copyleft Next.
- 2013‑01‑30:
Post-open-source software: a rejection of copyright, licensing, and permission culture.
- 2013‑01‑30:
MAKE me a sandwich: shouty sudo for zsh.
- 2013‑01‑30:
The mechanized art of coffee: no barista?
- 2013‑01‑30:
If you can't manage comments well, don't offer comments at all.
- 2013‑01‑30:
If your website's full of assholes, it's your fault.
- 2013‑01‑30:
Commenting threads: good, bad, or not at all.
- 2013‑01‑30:
Haskell: IO inside.
- 2013‑01‑30:
The USA has discovered Eduroam.
- 2013‑01‑30:
Boeing's 787 problems run deeper than outsourcing.
- 2013‑01‑30:
Elon Musk explains why the Boeing 787 batteries are fundamentally unsafe.
- 2013‑01‑30:
Raspberry Jam event news registration page.
- 2013‑01‑30:
Git: a nightmare of mixed metaphors.
- 2013‑01‑30:
Nearly 5 years after Kaminsky's DNS flaw was discovered, few domains have deployed DNSSEC.
- 2013‑01‑29:
Third World Problems.
- 2013‑01‑29:
Bangladesh gains a terrestrial Internet link via India.
- 2013‑01‑29:
Down, by law: the damage being done to the legal system in England and Wales.
- 2013‑01‑29:
23 million IP addresses with remotely exploitable uPnP.
- 2013‑01‑29:
Fun with INT_MIN divided by -1.
- 2013‑01‑28:
Courier Prime: like Courier, but better. (Polishing a turd?)
- 2013‑01‑28:
Computer programming languages are not copyrightable, says High Court judge in SAS vs WPL ruling.
- 2013‑01‑28:
Virtual Pickett N4-ES slide rule.
- 2013‑01‑28:
How to think about OAuth.
- 2013‑01‑28:
Verified LISP implementations on ARM, x86 and PowerPC.
- 2013‑01‑28:
You and your research and the elements of style.
- 2013‑01‑28:
How Gingrich changed Washington.
- 2013‑01‑28:
Cambridge, cabs, and Copenhagen: establishing the study of existential risk.
- 2013‑01‑28:
Fuzzy fingerprints: attacking vulnerabilities in the human brain.
- 2013‑01‑28:
NHS spending has been cut, Tories forced to admit.
- 2013‑01‑28:
Raspberry Pi NTP server image.
- 2013‑01‑28:
Historians argue open access pay-to-publish gives too much power to university administrators.
- 2013‑01‑28:
Secret trials are neither just nor secure.
- 2013‑01‑28:
VulnHub: vulnerable virtual machine images for you to practise pentesting.
- 2013‑01‑28:
New tools and daemons in NetBSD 6.0.
- 2013‑01‑28:
Unattached: emailed links are better than attachments.
- 2013‑01‑28:
Workfare contractors refer to the disabled as "lying thieving bastards".
- 2013‑01‑28:
German children enjoy far more everyday freedom than their English peers.
- 2013‑01‑28:
A farewell to bioinformatics.
- 2013‑01‑28:
Considering MySQL? Use something else.
- 2013‑01‑28:
How Newegg crushed the "shopping cart" patent and saved online retail.
- 2013‑01‑27:
Bad pharma: drug research is riddled with half truths, omissions, and lies.
- 2013‑01‑26:
History of Arabic type.
- 2013‑01‑26:
Nasri Khattar's journey in Arabic typography.
- 2013‑01‑26:
Raspberry Pi AirPlay receiver.
- 2013‑01‑26:
What turned Jaron Lanier against the web?
- 2013‑01‑26:
AtFAB: furniture designs for laser cutters.
- 2013‑01‑26:
uscrypt: a Golang interface to the memory-hard key derivation function scrypt.
- 2013‑01‑26:
The inside story of SQL Slammer.
- 2013‑01‑26:
Apple Core Rot: : OS X is not getting more reliable and more stable, it is instead developing more and nastier problems.
- 2013‑01‑26:
Flowchart: Choosing an open source license.
- 2013‑01‑26:
If everyone just dressed appropriately for the weather, we wouldn't have to heat or cool buildings as much.
- 2013‑01‑26:
Antigua government to launch WTO-approved pirate website in retaliation for US gambling ban.
- 2013‑01‑25:
Verisign is considering enforcing its patents against other DNS registries.
- 2013‑01‑25:
C and C++ aren't future-proof.
- 2013‑01‑25:
Láadan: a feminist artificial natural language.
- 2013‑01‑25:
GitHub search down after crypto keys exposed.
- 2013‑01‑25:
Tips to accelerate TLS.
- 2013‑01‑25:
Magnus Manske day at the Sanger Institute: why Mediawiki was written in PHP.
- 2013‑01‑25:
Henry VIII's wine cellar's journey into the bowels of the Ministry of Defence.
- 2013‑01‑25:
Why everyone eventually hates Maven, or, contextual vs composable, or frameworks vs libraries.
- 2013‑01‑24:
The true power of PCRE regexes.
- 2013‑01‑24:
Strunk and White: fifty years of stupid grammar advice.
- 2013‑01‑24:
BEGIN RSA PRIVATE KEY
- 2013‑01‑24:
Can DNS be protected from spikes in attacks? GCN needs to learn about BIND and NSD RRL.
- 2013‑01‑23:
Megafail: the danger of using CBC-MAC inappropriately.
- 2013‑01‑23:
Turn the Raspberry Pi into an FM transmitter with a 20cm wire and some software.
- 2013‑01‑23:
A new publishing model for computer science.
- 2013‑01‑23:
EU data retention directive on the ropes?
- 2013‑01‑23:
Olimex A10S OLinuXino: another little ARM box.
- 2013‑01‑23:
Cubieboard: another little ARM box.
- 2013‑01‑23:
University of Cambridge Computing Service major infrastructure projects 2013-4.
- 2013‑01‑23:
How can I explain LaTeX to my grandma?
- 2013‑01‑23:
A close look at how Oracle repeatedly tries to install crapware with Java updates.
- 2013‑01‑23:
Disabling Java in Internet Explorer is unreasonably difficult.
- 2013‑01‑23:
Those who give away copyright in their research to paywalled journals are the victims not the perpetrators.
- 2013‑01‑23:
MIDI from the inside.
- 2013‑01‑23:
ITU WCIT was all about anti-US international politics, not network regulation.
- 2013‑01‑23:
Seven EU myths you should never believe.
- 2013‑01‑23:
How academia betrayed Aaron Swartz.
- 2013‑01‑22:
Squaring the square, in stained glass.
- 2013‑01‑22:
Excel induced banking failure.
- 2013‑01‑22:
Hackers take over MIT's DNS in revenge for Aaron Swartz.
- 2013‑01‑22:
Type-level selection sort in Scala.
- 2013‑01‑22:
The 30th anniversary of MIDI.
- 2013‑01‑22:
Assembled Gertboard for Raspberry Pi now for sale from element14.
- 2013‑01‑22:
Mackerel taken off conservationists' 'fish to eat' list.
- 2013‑01‑22:
For years EMI has used giveaway MP3s as a promotional tool to increase sales.
- 2013‑01‑22:
Google declares war on the password.
- 2013‑01‑22:
What the future without passwords will look like.
- 2013‑01‑22:
Mike Hearn / Google: abuse at scale.
- 2013‑01‑22:
The primary design principle of Google's login risk analysis system is to move users gently into the post-password age.
- 2013‑01‑22:
Smalltalk / Haskell / Lisp.
- 2013‑01‑22:
Constant time (table-free) AES bitslice implementation.
- 2013‑01‑22:
Fast elliptic curve cryptography in OpenSSL.
- 2013‑01‑22:
Ham Sandwich Nation: due process when everything is a crime.
- 2013‑01‑22:
Apple, Google and Microsoft still don't understand new TLDs.
- 2013‑01‑22:
Intel Silicon Photonics (another Light Peak successor) touted for splitting up server chassis.
- 2013‑01‑22:
The "quite rubbish" Raspberry Pi QR code clock.
- 2013‑01‑22:
Bringing your religious beliefs to work: what are the limits?
- 2013‑01‑22:
Liberty intervenes in case of autistic child heavily restrained by Met Police.
- 2013‑01‑22:
IMF says deterioration of UK balance of payments deficit 1970s - 2007 explained by rise in inequality.
- 2013‑01‑22:
An implementation of Judy Arrays in 1250 lines of C.
- 2013‑01‑22:
Do the outline after the writing.
- 2013‑01‑22:
Proper data and analysis on the effect of interruptions on programmers.
- 2013‑01‑22:
The non-binary relationship between gender and linguistic style on Twitter.
- 2013‑01‑22:
UK parliamentary cycling inquiry could have important effects on the future of cycling in the UK.
- 2013‑01‑22:
Andrew "weev" Auernheimer's pre-sentencing statement of responsibility.
- 2013‑01‑22:
Copyright law around the world has developed to become an obstacle to scientific research.
- 2013‑01‑22:
Company offers scholarship to student who was expelled after finding security bug in their software.
- 2013‑01‑22:
UK schools' national cipher challenge winners announced.
- 2013‑01‑22:
Lead and crime: Plumb crazy?
- 2013‑01‑22:
Rust's new borrow check (pointer aliasing) in a nutshell.
- 2013‑01‑21:
Status of HTTP pipelining in Google Chrome.
- 2013‑01‑21:
Internet Explorer vs murder rate.
- 2013‑01‑21:
Charles and Ray Eames for Polaroid, 1972. (Video)
- 2013‑01‑21:
The map of the Underground that was and could have been.
- 2013‑01‑21:
Cambs police commissioner Graham Bright proposes to break manifesto promise by increasing council tax.
- 2013‑01‑21:
The proposed getdns API.
- 2013‑01‑21:
Why the price of Raspberry Pi matters.
- 2013‑01‑21:
Almonds have 20% fewer dietary calories than previously thought.
- 2013‑01‑21:
Identifying the DNS server used to fulfill an HTTP request.
- 2013‑01‑21:
How Erlang does scheduling.
- 2013‑01‑21:
Secret key crypto disasters.
- 2013‑01‑21:
ASLR implementation in Linux 3.7.
- 2013‑01‑21:
How to share computer system usage data with academics.
- 2013‑01‑21:
Authenticated encryption using AES-GCM: a 50,000 foot view.
- 2013‑01‑21:
Authenticated encryption and how not to get caught chasing a coyote.
- 2013‑01‑21:
Student expelled from college for reporting security bug that compromised 250,000 students personal data.
- 2013‑01‑21:
When it comes to cycling as everyday transport the UK is so far down the table it's almost scary.
- 2013‑01‑21:
Things learned by writing Chimp's garbage collector.
- 2013‑01‑21:
Josh Nimoy's graphics art for Tron Legacy, featuring Emacs.
- 2013‑01‑20:
Aaron Swartz helped us realise the importance and effectiveness of lobbying for civil liberties online.
- 2013‑01‑20:
Defeating AES without a PhD. "I thought AES was safe. What should I use instead?"
- 2013‑01‑20:
Why can't BBC News 24 do LONG EXPLAINERS instead of repetition?
- 2013‑01‑20:
Publishing a scientific paper without the code is not enough.
- 2013‑01‑20:
Oxford college sued for using 'selection by wealth' for unfunded postgraduate courses.
- 2013‑01‑20:
Solihull court handed down £35 fine for killing cyclist, and £110 fine for bumping a parked car.
- 2013‑01‑20:
JK Rowling gave so much to charity she lost her billionaire status.
- 2013‑01‑19:
If Dr. Seuss books were titled according to their subtexts.
- 2013‑01‑19:
Investors do the opposite of what rational expectations models suggest they should do.
- 2013‑01‑19:
The serif readability myth.
- 2013‑01‑19:
Medical privacy considered harmful?
- 2013‑01‑19:
We must choose privacy or medical breakthroughs.
- 2013‑01‑18:
Why do we have ten fingers?
- 2013‑01‑18:
Mathematicians aim to take the publishers out of academic publishing.
- 2013‑01‑18:
Readable Lisp S-expressions.
- 2013‑01‑18:
Fast packed string matching for short patterns.
- 2013‑01‑17:
"Losing My Religion" adjusted to a major key. (Vimeo)
- 2013‑01‑16:
Doctors and patients can usually see through the blinding in placebo-controlled drug trials.
- 2013‑01‑16:
Police demand DNA samples from gay men.
- 2013‑01‑16:
HAIR: Hierarchical Architecture for Internet Routing.
- 2013‑01‑16:
A very curmudgeonly view of the IETF.
- 2013‑01‑16:
How to extract your download history from the Mac OS X launcher quarantine database.
- 2013‑01‑16:
Deploying a new hash algorithm.
- 2013‑01‑16:
The routing security battles intensify.
- 2013‑01‑16:
The Second Amendment was ratified to preserve slavery.
- 2013‑01‑16:
The RIRs are ITU-T wannabes who represent the interests of self-perpetuating organizational fiefdoms.
- 2013‑01‑15:
19-year-old activist Zack Kopplin is making life hell for Louisiana's creationists
- 2013‑01‑15:
Aaron Swartz memorial JSTOR liberator released by Archive Team.
- 2013‑01‑15:
The USA's enthusiasm for torture and illegal war.
- 2013‑01‑15:
CESAR: competition to develop an authenticated cipher.
- 2013‑01‑15:
Carrier-grade NAT breakage spreads beyond mobile ISPs.
- 2013‑01‑15:
Sandy Hook truthers.
- 2013‑01‑15:
UK drugs policy encourages people to try experimental new narcotics.
- 2013‑01‑15:
Hiding bugs in code even when its tests have complete branch coverage.
- 2013‑01‑15:
Tunlr: access geo-restricted content from foreign countries without a VPN.
- 2013‑01‑14:
Effective Scala.
- 2013‑01‑14:
FBI's Scientology investigation: balancing the First Amendment with charges of abuse and forced labor.
- 2013‑01‑14:
The .CZ domain celebrates its 20th birthday.
- 2013‑01‑14:
Notes on distributed systems for young bloods.
- 2013‑01‑14:
Cycling and the law.
- 2013‑01‑14:
Feminists don't need to police the borders of womanhood.
- 2013‑01‑14:
On Julie Burchill, hatred, and a massive crisis of empathy.
- 2013‑01‑14:
Science, dogma, genetically engineered crops, and Mark Lynas.
- 2013‑01‑14:
Guerilla open access manifesto.
- 2013‑01‑14:
Feds crack down on medical marijuana.
- 2013‑01‑13:
E-luminate Cambridge festival: highlighting clean tech. (February)
- 2013‑01‑13:
Bolivia gains exemption from international narcotics convention for the right to chew coca leaves.
- 2013‑01‑13:
What really powers innovation: high wages.
- 2013‑01‑13:
Live action Toy Story. (YouTube)
- 2013‑01‑13:
Compressorhead: a heavy metal band made of metal.
- 2013‑01‑13:
Building a wireless network for a high density of users.
- 2013‑01‑12:
Redacted torture evidence shows secret courts use "security" to hide political embarrassment.
- 2013‑01‑11:
Should public authorities be able to sue for libel?
- 2013‑01‑11:
Periodic password change myths.
- 2013‑01‑11:
Scalable NDN (named data network) forwarding.
- 2013‑01‑11:
Your gadgets are slowly breaking the Internet.
- 2013‑01‑11:
Textbook publishers claim copyright in tables of contents in order to suppress free educational material.
- 2013‑01‑11:
DNS response policy zones as an anti-spam tool.
- 2013‑01‑10:
The unreasonable effectiveness of C.
- 2013‑01‑10:
Mining your Ps and Qs: detection of widespread weak keys in network devices.
- 2013‑01‑10:
How to fold a Julia fractal: a tale of numbers that like to turn. (WebGL)
- 2013‑01‑10:
The war on terror, by design, can never end.
- 2013‑01‑10:
Notes on a putative BrowserID GSS-API mechanism.
- 2013‑01‑10:
NSFnet and the popularization of the Internet.
- 2013‑01‑10:
Five American misconceptions about healthcare in the civilized world.
- 2013‑01‑09:
Verisign's stupid patent applications for the use of HSMs in DNSSEC.
- 2013‑01‑09:
Cryptographic key length recommendations.
- 2013‑01‑09:
Rob Hansen's crypto FAQ.
- 2013‑01‑09:
Stealing laundry detergent to pay for drugs.
- 2013‑01‑09:
Serialization mischief in Ruby on Rails.
- 2013‑01‑09:
Trinity College New Court energy efficiency upgrade approved by planning committee.
- 2013‑01‑09:
Australian do-not-call register operator fined for do-not-call violations.
- 2013‑01‑08:
Creative Commons "non-commercial" licences are often a bad choice.
- 2013‑01‑08:
Accidentally stealing the Internet: BGP and MitM attacks.
- 2013‑01‑08:
Mail (MX) server survey January 2012.
- 2013‑01‑08:
The government responds to a West Coast Main Line bid from a toy company.
- 2013‑01‑08:
The myth of Tamiflu.
- 2013‑01‑08:
Efficient in-memory indexing with generalized prefix trees.
- 2013‑01‑08:
The adaptive radix tree: ARTful indexing for main-memory databases.
- 2013‑01‑08:
Burst tries: a fast, efficient data structure for string keys.
- 2013‑01‑08:
HAT-trie: a cache-conscious trie-based data structure for strings.
- 2013‑01‑08:
Video of Apollo Robbins pickpocketing.
- 2013‑01‑08:
Matters computational.
- 2013‑01‑07:
The architecture of open source applications: nginx.
- 2013‑01‑07:
A really teensy ELF executable for Linux.
- 2013‑01‑07:
Hammer: bitwise parser combinators in C.
- 2013‑01‑07:
Silence of the labs: Canadian government scientists cannot speak without public relations approval.
- 2013‑01‑07:
An interview with the Republican staffer who was fired for writing a sensible copyright memo.
- 2013‑01‑07:
A world without consent.
- 2013‑01‑07:
Raspberry Pi stratum 1 NTP server: accurate timekeeping at low cost.
- 2013‑01‑07:
The demise of desktop antivirus.
- 2013‑01‑07:
Pain of the new: on high-frame-rate movies.
- 2013‑01‑07:
The incredible shrinking public domain.
- 2013‑01‑07:
An opinionated guide to Scheme implementations.
- 2013‑01‑07:
Verisign Labs DANE demonstration.
- 2013‑01‑07:
Keep using antiquated metaphors in icons.
- 2013‑01‑07:
The Norwegian model of EU non-membership simply wouldn't work for the UK.
- 2013‑01‑07:
UK research councils have stopped giving grants for standalone postgraduate taught master's degrees.
- 2013‑01‑07:
Two factor federated authentication for SURFnet.
- 2013‑01‑07:
Leveson is being subverted by Cameron.
- 2013‑01‑07:
Lego Mindstorms EV3 announced.
- 2013‑01‑07:
A simple string-to-float function showing how beautiful rust's pattern matching is.
- 2013‑01‑07:
Google starts reporting false DMCA takedown requests.
- 2013‑01‑07:
Rape has a purpose.
- 2013‑01‑07:
English word and letter frequency counts: Mayzner revisited.
- 2013‑01‑07:
A grab bag of Git tricks.
- 2013‑01‑07:
How not to catch the norovirus.
- 2013‑01‑07:
How to start a root X.509 certification authority.
- 2013‑01‑07:
Videogames: let girls be girls.
- 2013‑01‑07:
High-performance garbage collection in Rust.
- 2013‑01‑07:
Brute forcing a GPS PIN with a robot built from spare parts.
- 2013‑01‑06:
Padding oracle attacks in depth.
- 2013‑01‑06:
A five-year-old Wikipedia hoax has finally been identified and deleted.
- 2013‑01‑06:
Objects at a negative temperature behave as if they are hotter than objects at a positive temperature.
- 2013‑01‑06:
Disney freaks out about sale of 3D movie conversion patents.
- 2013‑01‑05:
Cally Soukup's list of Nicoll Events.
- 2013‑01‑05:
British vs. American politics in minimalist vintage infographics.
- 2013‑01‑05:
Black and Whitey: how the Feds deny the accused a fair trial.
- 2013‑01‑04:
News about development of the Tux3 filesystem.
- 2013‑01‑04:
CIA torturers object to their war crimes being displayed in an American propaganda film.
- 2013‑01‑04:
Android blocks on /dev/random a lot.
- 2013‑01‑04:
Microsoft security advisory on the Turktrust certificate authority failure.
- 2013‑01‑04:
Linotype: the film.
- 2013‑01‑04:
Support for benefit cuts depends on prejudice and ignorance.
- 2013‑01‑04:
What should you really be afraid of?
- 2013‑01‑04:
A thorough writeup of the Turktrust certificate authority failure.
- 2013‑01‑04:
More about crit-bit trees.
- 2013‑01‑04:
Crit-bit trees.
- 2013‑01‑04:
The PHP equality operator == is the weirdest and most overused comparison operator in popular programming languages.
- 2013‑01‑04:
Nevin's papers relating crime and exposure to lead in petrol.
- 2013‑01‑04:
Data structure lock-in: why the computer is so slow.
- 2013‑01‑04:
If asked "What is a Giraffe?", Google Now finishes the description with "he now praises the iPad".
- 2013‑01‑04:
Negative temperature.
- 2013‑01‑04:
Crossbear: identifying / locating / tracing TLS MITM attacks.
- 2013‑01‑04:
foauth.org: OAuth for one.
- 2013‑01‑04:
Elderly should do community work or lose pension, says ex-chief of benefits agency.
- 2013‑01‑04:
The Labour Party's enthusiasm for incommunicado house arrest and internal exile.
- 2013‑01‑04:
Helmet Oddity: a supercut of space helmets in movies.
- 2013‑01‑04:
FuckItJS: JavaScript error steamroller.
- 2013‑01‑04:
The correlation between lead in petrol and violent crime.
- 2013‑01‑04:
When William Shatner tweeted at an astronaut.
- 2013‑01‑04:
Details of the TURKTRUST fraudulent digital certificates.
- 2013‑01‑03:
Unofficial colour recovery wiki.
- 2013‑01‑03:
The surprising subtleties of zeroing a register.
- 2013‑01‑03:
Mozilla suspends process for adding new TURKTRUST CA cert to trusted list.
- 2013‑01‑03:
Rats laugh when you tickle them. (YouTube)
- 2013‑01‑03:
Google detected a bogus X.509 certificate for *.google.com chaining back to a Turkish certificatation authority.
- 2013‑01‑03:
LLVM.js
- 2013‑01‑03:
Differences between marriages and civil partnerships.
- 2013‑01‑03:
Vigil: a very safe programming language with supreme moral vigilance.
- 2013‑01‑03:
Irish DNS registry was compromised via its website.
- 2013‑01‑03:
Norovirus deserves respect.
- 2013‑01‑03:
Algorithmic voting districts as a cure for gerrymandering.
- 2013‑01‑03:
Maths gear.
- 2013‑01‑03:
The known unknowns of Skype interception.
- 2013‑01‑03:
Non-transitive dice.
- 2013‑01‑03:
Non-deterministic JavaScript ParallelArray operations.
- 2013‑01‑02:
Trolls with patents on network scanner/copier/printers are shaking down small and mid-sized businesses for $1000 per employee.
- 2013‑01‑02:
Sleep better. Eat less sugar. Lift heavy things.
- 2013‑01‑02:
ITU leased line interconnection restrictions and the birth of the commercial Internet.
- 2013‑01‑02:
Vaccination matters, and hippies and conspiracy theorists who say otherwise are dangerous.
- 2013‑01‑02:
Measles: a dangerous illness, by Roald Dahl.
- 2013‑01‑02:
The process myth.
- 2013‑01‑02:
Ending sexism in hacker culture: a work in progress.
- 2013‑01‑02:
How complex systems fail.
- 2013‑01‑02:
Kyoto Protocol aimed for 5% cut in carbon emissions; instead, we got a 58% increase.
- 2013‑01‑01:
Which country is the best in which to be born?
- 2013‑01‑01:
Z: A tiny, strict, impure, curried, dynamically typed language with rather peculiar syntax.
- 2013‑01‑01:
Chomsky and the two cultures of statistical learning.
- 2013‑01‑01:
30 Years of TCP, and IP on everything!
- 2013‑01‑01:
The 30th birthday of the Internet.
- 2013‑01‑01:
Correlation without causation.
- 2013‑01‑01:
Antivirus software is often not very good at stopping viruses.
- 2013‑01‑01:
x86 IDIV DoS.
- 2013‑01‑01:
The spectacular thefts of Apollo Robbins, pickpocket.
- 2013‑01‑01:
Hello, JIT world! The joy of simple JITs and LuaJIT DynASM.
- 2013‑01‑01:
Australian ISP iiNet walks out of piracy talks: "We're not the internet police".