Tony Finch – link log
2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 latest
-
2014‑12‑31:
New long-lasting material for solar thermal power plants converts 90% of light to heat.
-
2014‑12‑30:
Over 78% of PHP installations have a security vulnerability.
-
2014‑12‑30:
Dissent: accountable anonymous group communication.
-
2014‑12‑30:
Dark Mail: key distribution and end-to-end encrypted email.
-
2014‑12‑30:
On nerd entitlement.
-
2014‑12‑30:
Cyranoids: If someone secretly controlled what you say, would anyone notice?
-
2014‑12‑30:
Quake on an oscilloscope.
-
2014‑12‑30:
Clean sheet: how to release data or statistics in a spreadsheet.
-
2014‑12‑29:
The ternary calculating machine built by Thomas Fowler in 1840.
-
2014‑12‑28:
Worse than a defeat: the British military in Iraq and Afghanistan.
-
2014‑12‑28:
Domebuilder's blues.
-
2014‑12‑28:
Another ad blocking /etc/hosts file.
-
2014‑12‑28:
An ad blocking /etc/hosts file.
-
2014‑12‑28:
Tracking protection in Firefox: built-in ad blocking.
-
2014‑12‑27:
Quantum random number generation using a smartphone camera.
-
2014‑12‑27:
U&lc typography magazine online.
-
2014‑12‑27:
robdns: authoritative DNS server with user land IP stack.
-
2014‑12‑27:
DNS speed test.
-
2014‑12‑27:
Slow, flexible, and cheap: developing a dome kit.
-
2014‑12‑27:
Fear makes you a worse programmer (and sysadmin).
-
2014‑12‑27:
Setting up PHP-FastCGI and nginx? Don't trust the tutorials: check your configuration!
-
2014‑12‑26:
Why deployment freezes don't prevent outages.
-
2014‑12‑26:
ISC WordPress site compromised to serve malware.
-
2014‑12‑26:
Using fast matrix exponentiation to write an interpreter for a simple programming language.
-
2014‑12‑26:
arXiv racing toward the one million mark.
-
2014‑12‑26:
PLOS is anti-elitist! PLOS is elitist! The weird world of open access journalism.
-
2014‑12‑26:
UCL: universal configuration language.
-
2014‑12‑26:
Do not use subtraction to compare numbers.
-
2014‑12‑26:
Adventures in piano building.
-
2014‑12‑26:
Turf: a modular GIS engine written in JavaScript.
-
2014‑12‑25:
Laws restricting technology actually expose us to greater harm.
-
2014‑12‑25:
Uncertain<T>: a first-order type for uncertain data.
-
2014‑12‑24:
Ten myths of innovation.
-
2014‑12‑24:
Coz: causal profiling for C/C++.
-
2014‑12‑24:
Principles of distributed computing.
-
2014‑12‑24:
Safe VSP: horizontal scrolling reveals a hardware bug in the Commodore 64.
-
2014‑12‑23:
The update framework: a plug-and-play library for securing a software updater.
-
2014‑12‑23:
Docker image insecurity.
-
2014‑12‑23:
PHP's new hashtable implementation.
-
2014‑12‑23:
Erdős conjecture on large gaps between primes has been proved.
-
2014‑12‑22:
GCHQ failed to stop the 2008 Mumbai attacks despite having an eye on the perpetrators.
-
2014‑12‑21:
ntimed: PHK's NTP implementation on GitHub.
-
2014‑12‑21:
Illegal Guys: a history of digital subcultures in Europe during the 1980s.
-
2014‑12‑21:
Meet the CIA's queen of torture.
-
2014‑12‑21:
Maps of religious belief and disbelief in Cambridge.
-
2014‑12‑21:
E-rhythms data sonifier: listen to your activity logs.
-
2014‑12‑21:
What cities have learned about tearing down urban highways.
-
2014‑12‑21:
How to write a proof: Leslie Lamport's structured proofs.
-
2014‑12‑20:
The rise of the shitpic: memes that keep getting copied imperfectly.
-
2014‑12‑20:
The mystery of the missing Tim Hortons apostrophe.
-
2014‑12‑20:
Avoiding tethering blocks on Android KitKat.
-
2014‑12‑20:
How to spot counterfeit passive electronic components.
-
2014‑12‑20:
PHK at work on NTP.
-
2014‑12‑19:
Thoughts on cryptography in Rust.
-
2014‑12‑19:
Roaring bitmaps: a better compressed bitset.
-
2014‑12‑19:
Network Time Protocol daemon (ntpd) contains multiple vulnerabilities.
-
2014‑12‑19:
Colonial gin and tonic.
-
2014‑12‑18:
Fundamental plot arcs, seen through multidimensional analysis of thousands of TV and movie scripts.
-
2014‑12‑18:
Interactive smartphone comparison chart.
-
2014‑12‑17:
Some systems at ICANN were compromised.
-
2014‑12‑17:
A two-rotor swashplateless helicopter.
-
2014‑12‑17:
The US government's role in root zone management.
-
2014‑12‑16:
The NIPS experiment: academic conference paper acceptance is more random than expected.
-
2014‑12‑15:
evSrc: apply a bioinformatics technique to your source history to reveal bad areas of software design.
-
2014‑12‑15:
Programming and programming languages: an introductory CS textbook using Pyret.
-
2014‑12‑15:
The low oil price could cause a crisis for banks that hold trillions in commodity derivatives.
-
2014‑12‑15:
Amplio: software for measuring the performance of surgeons.
-
2014‑12‑14:
Fast integer overflow detection with LLVM.
-
2014‑12‑14:
There is no evidence that businesses are more efficient than the public sector.
-
2014‑12‑13:
Cold water cures: experiments in cold brew coffee.
-
2014‑12‑13:
Advances in statistics lead to advances in ecology.
-
2014‑12‑13:
Curfew tags: the gory details.
-
2014‑12‑12:
The infinitely delegating name servers attack.
-
2014‑12‑12:
Garbage collection and totality.
-
2014‑12‑11:
Simple hack you can use to bypass Keurig 2.0 coffee DRM.
-
2014‑12‑11:
JMAP: JSON Mail Access Protocol.
-
2014‑12‑09:
OSTree: git for operating system binaries.
-
2014‑12‑09:
A study into UK IPv4 and IPv6 address allocations.
-
2014‑12‑09:
Why women are leaving the tech industry.
-
2014‑12‑09:
mermaid: generate diagrams from markdown-like text.
-
2014‑12‑09:
Diagrammix: commercial diagram software for Mac OS.
-
2014‑12‑09:
ditaa: convert ASCII art diagrams to nice images.
-
2014‑12‑09:
Gliffy: draw diagrams in your browser.
-
2014‑12‑08:
Five A350 XWBs flying in close formation. (YouTube)
-
2014‑12‑08:
Galileo satellite successfully recovered to correct orbit and transmitting navigation signals.
-
2014‑12‑07:
The gender politics of pockets.
-
2014‑12‑07:
Lampsort: Leslie Lamport's non-recursive quicksort.
-
2014‑12‑07:
Zusie: a home-made relay computer.
-
2014‑12‑07:
The UK's new porno censorship regulations are a step towards international trade sanctions.
-
2014‑12‑07:
When data gets creepy: the secrets we don't realise we're giving away.
-
2014‑12‑06:
Phyllis Pearsall, creator of the London A-Z map.
-
2014‑12‑06:
Many academics who write software have had no formal training.
-
2014‑12‑05:
Introducing Varnish Massive Storage Engine.
-
2014‑12‑05:
The ongoing failure of the PG-13 rating: lots of killing but no sex.
-
2014‑12‑05:
The programming language wars.
-
2014‑12‑05:
The cost of the S in HTTPS.
-
2014‑12‑04:
Flipping bits in memory without accessing them: an experimental study of DRAM disturbance errors.
-
2014‑12‑03:
The open-plan office trap.
-
2014‑12‑02:
Nature makes all its articles free to view in an annoying proprietary crappy PDF reader.
-
2014‑12‑02:
Jackie Chan Blu-ray disc boosts solar panel efficiency by a massive 22%.
-
2014‑12‑01:
The superiority of economists.
-
2014‑12‑01:
The "fundamental rule" of traffic: building new roads makes people drive more.
-
2014‑12‑01:
Code everything in Java.
-
2014‑12‑01:
The long road to Maxwell's equations.
-
2014‑12‑01:
The misunderstood limits of folk science: an illusion of explanatory depth.
-
2014‑11‑30:
Big brother IS watching you. Don't be complacent about the surveillance state.
-
2014‑11‑30:
Checklists for software.
-
2014‑11‑30:
A Minecraft server monitor in Perl.
-
2014‑11‑30:
Zero knowledge proofs: an illustrated primer.
-
2014‑11‑29:
LEGO's letter to parents: how not to tell fake typography when you don't see it.
-
2014‑11‑26:
Reconstructed EDSAC switched on for the first time.
-
2014‑11‑26:
Transactions: the limits of isolation. Databases are not properly ACID.
-
2014‑11‑26:
Solving the mystery of trunked link imbalance: a metastable failure state at Facebook.
-
2014‑11‑26:
The impact of email work done at RAND in the 1970s.
-
2014‑11‑26:
Ansible reminds me of PHP's salad days.
-
2014‑11‑26:
The art of insight in science and engineering.
-
2014‑11‑26:
Cambridge University fibre network diagram, London Underground tube map style.
-
2014‑11‑26:
WiFried: iOS 8 / Mac OS X 10.10 WiFi performance problems.
-
2014‑11‑26:
How to remove yourself from background check sites.
-
2014‑11‑26:
Doxxing defense: Remove your personal info from data brokers.
-
2014‑11‑26:
A working Lego particle accelerator.
-
2014‑11‑25:
Social status is more strongly inherited even than height.
-
2014‑11‑25:
How do I draw a pair of buttocks by plotting a 3D formula?
-
2014‑11‑25:
Understanding Boys, Understanding Girls. Teaching the implications of gender roles to children.
-
2014‑11‑24:
Snake on a keyboard: a reverse engineering story.
-
2014‑11‑24:
A peek into the massive scale of Amazon AWS.
-
2014‑11‑23:
"What Wikipedia taught me about my grandfather."
-
2014‑11‑23:
Fibonacci layered lemonade.
-
2014‑11‑23:
How mediaeval astronomers calculated trigonometry tables.
-
2014‑11‑23:
Wait a minute! A fast cross-VM cache side-channel key recovery attack on AES.
-
2014‑11‑23:
Empirical analysis of UK legislation started this weekend.
-
2014‑11‑23:
Footage of the first bungee jump, by Oxonians from Clifton suspension bridge in 1979.
-
2014‑11‑23:
ST&G's marvellous map of Great British place names.
-
2014‑11‑22:
The state of Creative Commons.
-
2014‑11‑22:
runfs: self-cleaning FUSE file system for per-process state (e.g. pid files).
-
2014‑11‑22:
crates.io: the hosting service for Rust programming language packages.
-
2014‑11‑22:
The real roots of the midlife crisis.
-
2014‑11‑22:
What it would take to really reverse climate change.
-
2014‑11‑21:
AnsibleFest London February 2015.
-
2014‑11‑21:
VoCore: a one inch square Linux computer.
-
2014‑11‑21:
Mapumental: how far you can travel by public transport in a given time.
-
2014‑11‑21:
Bogus academic journal accepts profanity-laden anti-spam paper.
-
2014‑11‑21:
World maps without New Zealand.
-
2014‑11‑20:
Atlas of audiovisual artifacts.
-
2014‑11‑20:
MIT developing miniature laser fountain atomic clocks.
-
2014‑11‑20:
Cache is the new RAM: a perspective on databases.
-
2014‑11‑20:
Interpreting Debian's general resolution on init systems.
-
2014‑11‑19:
Learn to code with Anna and Elsa from Frozen.
-
2014‑11‑19:
French company builds bare metal ARM server cloud.
-
2014‑11‑19:
New EU VAT rules change the game for digital businesses.
-
2014‑11‑19:
The horrible implications of the EU VAT "place of supply" rule change.
-
2014‑11‑19:
Standards for scientific graphic presentation.
-
2014‑11‑19:
The Internet has disintermediated the music industry, and it is going from strength to strength.
-
2014‑11‑19:
How Google brought PILE OF POO to America.
-
2014‑11‑19:
Twelve infographics about London.
-
2014‑11‑18:
Zonemaster DNS checker.
-
2014‑11‑18:
Interpreting alpha values of pixels: coverage vs opacity.
-
2014‑11‑18:
CVE-2014-6324: privilege escalation vulnerability in Microsoft Active Directory.
-
2014‑11‑18:
A Silicon Valley company is developing Dalek security robots.
-
2014‑11‑18:
HANDS: heuristic online storage deduplication with low memory overhead.
-
2014‑11‑18:
Attic: deduplicated encrypted incremental backups.
-
2014‑11‑18:
Relatively complete counterexamples for higher-order programs: automatically find erroneous inputs.
-
2014‑11‑17:
RAPPOR: privacy-preserving data collection from client software.
-
2014‑11‑17:
Why we should give free money to everyone.
-
2014‑11‑17:
PostgreSQL vs MS SQL Server from the point of view of a data analyst.
-
2014‑11‑17:
The impact of widespread HTTP encryption on traffic interception middleboxes in mobile networks.
-
2014‑11‑17:
Triggering the MS14-066 winshock SChannel vulnerability.
-
2014‑11‑17:
Mediaeval siege warfare against old server hardware. (video)
-
2014‑11‑17:
UK launches orphan work licensing scheme, but misses the opportunity to make it much better.
-
2014‑11‑17:
How does copyright work in space?
-
2014‑11‑17:
Petition to replace the benefits system with a universal basic income.
-
2014‑11‑17:
Six-way banana genome Venn diagram.
-
2014‑11‑17:
Two simple rules for avoiding a #shirtstorm
-
2014‑11‑17:
A growing proportion of citations are to older scientific papers.
-
2014‑11‑17:
The last PC replacement cycle is about to start turning.
-
2014‑11‑16:
The chemistry of seasoning cast iron pans: a science-based how-to.
-
2014‑11‑16:
Pesticides increase the risk of depression in farmers.
-
2014‑11‑16:
Albert Michaelson's harmonic analyser: Fourier analysis with a mechanical computer.
-
2014‑11‑16:
Why there is a winter flu season.
-
2014‑11‑16:
Electoral fraud in the UK.
-
2014‑11‑16:
Docking with an uncooperative object: the little-known Soviet mission to rescue a dead space station.
-
2014‑11‑16:
How the Enigma machine worked.
-
2014‑11‑16:
Thousands join "stop the killing" road safety protest in London.
-
2014‑11‑16:
Why the Rosetta science guy's sexy shirt crash landed.
-
2014‑11‑16:
How the House of Lords mixes politics and business.
-
2014‑11‑15:
Grimms' fairytales have blood and horror restored in new translation.
-
2014‑11‑14:
Hard drive SMART stats.
-
2014‑11‑14:
Newstweek is a device for manipulating news read by other people on wireless hotspots.
-
2014‑11‑14:
Array operators using multiple dispatch in Julia.
-
2014‑11‑13:
We perceive negative comments to be inherently more intelligent than positive ones.
-
2014‑11‑13:
The Headington Shark house in Oxford is available to rent.
-
2014‑11‑12:
CREAM: the scary SSL attack you've probably never heard of.
-
2014‑11‑12:
Amazon to begin testing same-day delivery drones in Cambridge.
-
2014‑11‑12:
Underground London: adventures in the secret city beneath our feet.
-
2014‑11‑11:
TCP is harder than it looks.
-
2014‑11‑11:
giltene/wrk2: an HTTP benchmarking tool which avoids co-ordinated omission of high latency requests.
-
2014‑11‑11:
At last Apple lets you deactivate iMessage and solve your missing txt problem.
-
2014‑11‑10:
Announcing Bosun: StackExchange's alerting software written in Golang.
-
2014‑11‑10:
An overview of Linux kernel lock improvements.
-
2014‑11‑10:
A review of Black Cow pure milk vodka.
-
2014‑11‑10:
All cameras are police cameras.
-
2014‑11‑10:
Joan Clarke, Bletchley Park cryptanalyst.
-
2014‑11‑10:
The quinoa quarrel.
-
2014‑11‑10:
Batch NFS: factorizing many RSA keys with the number field sieve.
-
2014‑11‑09:
Gov.uk rolls out its federated online identity verification system.
-
2014‑11‑09:
Trying out Rust and Golang.
-
2014‑11‑09:
Why a programming language designer finds IEEE 754 frustrating.
-
2014‑11‑08:
Restoring the IBM 1401 computer.
-
2014‑11‑08:
Julia: a fresh approach to numerical computing.
-
2014‑11‑08:
Creating user profiles from DNS lookups and other network behaviour.
-
2014‑11‑08:
Synthesizing JPEGs out of thin air using the afl fuzz tester.
-
2014‑11‑08:
A fire took out a huge Bitcoin mining operation.
-
2014‑11‑08:
Gamergate is a seemingly self-sustaining system of hatred.
-
2014‑11‑07:
Security requirements of time protocols (NTP and PTP) in packet switched networks.
-
2014‑11‑07:
Receiving signals from dead satellites with the RTL-SDR.
-
2014‑11‑07:
Moshpit simulation.
-
2014‑11‑07:
Animations of asteroid (and comet) groups in the solar system.
-
2014‑11‑07:
The horror of blimps.
-
2014‑11‑07:
The $9 billion whistleblower describes JPMorgan Chase's securities fraud.
-
2014‑11‑07:
What is new in Cobol 2014.
-
2014‑11‑07:
The Oculus Rift makes Elite: Dangerous amazing—and impossible to describe.
-
2014‑11‑06:
Running a supercomputer at the south pole.
-
2014‑11‑06:
The Greater Manchester Combined Authority will have more devolved powers than anywhere in England, including London.
-
2014‑11‑06:
Imposition of identity, English Parliaments, and "Englishness".
-
2014‑11‑06:
More articles about idleness at work.
-
2014‑11‑06:
Google Docs stores the full timestamped history of each document's keystrokes.
-
2014‑11‑06:
The art of not working at work.
-
2014‑11‑06:
Belgian and French copyright laws ban photos of buildings.
-
2014‑11‑05:
Zoetrope chocolate cake. (video)
-
2014‑11‑05:
The diatomist. (Vimeo)
-
2014‑11‑05:
Precise measurements of Earth's changing gravity field for monitoring weather and climate.
-
2014‑11‑05:
Highly sensitive atomic clocks may end time as we know it.
-
2014‑11‑05:
FixedFixer: turn position:fixed into position:static to get rid of obtrusive HTML elements.
-
2014‑11‑05:
Redis latency spikes, alternative malloc()s and the Linux kernel.
-
2014‑11‑05:
Please grow your buffers exponentially.
-
2014‑11‑05:
Dropping a hammer and a feather on the moon.
-
2014‑11‑05:
Dropping a bowling ball and some feathers in the world's biggest vacuum chamber.
-
2014‑11‑05:
Cambridge University's new £20M low-PUE data centre.
-
2014‑11‑04:
The Dunning-Kruger effect: we are all confident idiots.
-
2014‑11‑04:
The 1960s Batman TV series will soon be available on DVD.
-
2014‑11‑04:
C4: C in 4 functions.
-
2014‑11‑04:
A Lisper's first impression of Julia.
-
2014‑11‑04:
What would the Tube map look like if it only contained ghost stations?
-
2014‑11‑04:
The zombie system: how capitalism has gone off the rails.
-
2014‑11‑02:
How Apple Pay and Google Wallet work.
-
2014‑11‑02:
Euclid location analytics uses WiFi to track shoppers.
-
2014‑11‑02:
France's great wines are feeling the heat of climate change.
-
2014‑11‑02:
Why weird domestic architecture is common in Japan.
-
2014‑11‑02:
Eleven countries studied, one inescapable conclusion: the drug laws don't work.
-
2014‑11‑01:
LORAN Europe.
-
2014‑11‑01:
Gamergate is a disaster for those promoting the artistic respectability of games.
-
2014‑11‑01:
Cellphone redirection allows Google 2FA bypass.
-
2014‑11‑01:
Solving British housing crisis: building homes where we need them.
-
2014‑11‑01:
UK deploys eLoran at 7 locations.
-
2014‑11‑01:
Harvard libraries opened to women in 1967.
-
2014‑11‑01:
The Phaistos disk has been decoded.
-
2014‑11‑01:
BTAgent HomeHub CPE backdoor.
-
2014‑11‑01:
Is it possible to compile Mac OS Darwin from source?
-
2014‑11‑01:
Mac OS X launchd functional overview.
-
2014‑11‑01:
What computer scientists should know.
-
2014‑11‑01:
Collected advice on Unix CLI design and implementation.
-
2014‑11‑01:
Netflix Message Security Layer.
-
2014‑10‑31:
Reversing D-Link's WPS PIN algorithm.
-
2014‑10‑31:
Shellshock in Java apps.
-
2014‑10‑31:
Music theory for musicians and normal people.
-
2014‑10‑31:
Parental leave in the USA.
-
2014‑10‑31:
IT change management.
-
2014‑10‑31:
news.demon.co.uk is no more
-
2014‑10‑30:
The Internet Arcade at the Internet Archive.
-
2014‑10‑30:
Metal meets classical. (Videos)
-
2014‑10‑30:
Most web page loads will experience 99%ile server latency.
-
2014‑10‑29:
A quick intro to Rust macros.
-
2014‑10‑29:
Why the UK is being asked to pay €2 billion to the EU.
-
2014‑10‑29:
A survey comparison of Green and UKIP supporters.
-
2014‑10‑29:
The speed of the Python, Ruby, and Lua parsers.
-
2014‑10‑29:
Private sector bureaucracy is twice as wasteful as government red tape.
-
2014‑10‑29:
Cuckoo filters: practically better than Bloom.
-
2014‑10‑28:
The water clocks of Bernard Gitton.
-
2014‑10‑28:
UK High Court rules that ISPs must censor sites selling counterfeit goods.
-
2014‑10‑28:
ISC BIND developer information.
-
2014‑10‑28:
The drunk utilitarian.
-
2014‑10‑28:
Cray announced as supplier for new Met Office supercomputer.
-
2014‑10‑27:
A comic about seagulls.
-
2014‑10‑27:
A code of conduct is not enough to eliminate sexual harassment at a conference.
-
2014‑10‑27:
Stats from 72 hours of #gamergate on Twitter.
-
2014‑10‑27:
Be grateful for drizzle: high frequency trading.
-
2014‑10‑27:
Metacrap: putting the torch to seven straw-men of the metadata / semantic web utopia.
-
2014‑10‑27:
The crude UKIP/Tory assault on Europe strikes at the very heart of Enlightenment values.
-
2014‑10‑26:
New Jersey's e-vote experiment after Hurricane Sandy was a disaster.
-
2014‑10‑26:
The bottom 90 percent of Americans are poorer today than they were in 1987.
-
2014‑10‑26:
Wikipedia needs an IDE, not a WYSIWYG editor.
-
2014‑10‑26:
Mercurial revsets.
-
2014‑10‑26:
Some versions of Linux ldd are vulnerable to social engineering exploits.
-
2014‑10‑26:
Walter Bright on C's biggest mistake.
-
2014‑10‑26:
HiStar: securing untrustworthy software using information flow control.
-
2014‑10‑25:
Stealthy startup Soft Machines launches virtual CPU cores that trounce traditional processors.
-
2014‑10‑25:
USB armory: flash key sized open source computer for security applications.
-
2014‑10‑25:
Mailinator private domains.
-
2014‑10‑25:
Marginal tax rates of close to 90% on the top 1% of earners are optimal.
-
2014‑10‑25:
Don't run 'strings' on untrusted files.
-
2014‑10‑25:
Intellectual property, Jewish ethics, and Aaron Swartz.
-
2014‑10‑23:
Jan-Piet Mens on DNS.
-
2014‑10‑23:
Software engineers should keep lab notebooks.
-
2014‑10‑23:
Hackers are using micro-targeted ads to deliver malware to weapons manufacturers.
-
2014‑10‑23:
Microwaves are going solid state: say goodbye to the last mass-market vacuum tube product.
-
2014‑10‑23:
Trinity: a Linux syscall fuzzer.
-
2014‑10‑23:
The Radarange Collection: keeping the oldest microwave ovens working.
-
2014‑10‑22:
Hostile subdomain takeover using Heroku/Github/Desk + more.
-
2014‑10‑22:
New FTDI drivers are killing fake USB/serial chips.
-
2014‑10‑21:
Hints for writing Unix tools.
-
2014‑10‑21:
Xerox Alto source code.
-
2014‑10‑21:
Noether: programming language design based on preserving and carefully breaking symmetries.
-
2014‑10‑21:
Porting a raytracer from C++ to Rust.
-
2014‑10‑21:
A masterclass in epithets from an NFL player re gamergate.
-
2014‑10‑21:
The hidden Templar symbology of the OREO cookie.
-
2014‑10‑21:
Gamergate from another journalist's point of view.
-
2014‑10‑20:
Security collapse in the https market.
-
2014‑10‑19:
Cyclists should get a "toad tax" (vehicle excise duty) rebate.
-
2014‑10‑19:
Average number of languages spoken by people in each EU country.
-
2014‑10‑18:
Everything you need to know about cooking with blood.
-
2014‑10‑18:
Impending kOS: what happens when an APL implementer gets into systems programming.
-
2014‑10‑18:
A history of the octave.
-
2014‑10‑18:
Gamergate from a journalist's point of view.
-
2014‑10‑18:
The man who was too drunk to die.
-
2014‑10‑18:
Your language's writing system sucks.
-
2014‑10‑18:
Yosemite upgrade made slow by non-Apple files in /usr - tips and workarounds.
-
2014‑10‑18:
A myth-busting guide to UK crime statistics.
-
2014‑10‑18:
Autism as a disorder of prediction?
-
2014‑10‑18:
X.509 certificate revocation awareness test.
-
2014‑10‑18:
titus: totally isolated TLS unwrapping server.
-
2014‑10‑18:
The parents of #gamergate.
-
2014‑10‑17:
Stop Spotlight in Mac OS X Yosemite from sending all queries to Apple.
-
2014‑10‑17:
Gandi CLI: easily create and manage domains / certificates / VMs / etc. from the command line.
-
2014‑10‑17:
SSLmate: buy X.509 certificates from the command line.
-
2014‑10‑17:
FFS SSL.
-
2014‑10‑17:
American Fuzzy Lop: a practical instrumentation-driven fuzz tester.
-
2014‑10‑17:
Cambridge's Perne Road roundabout design.
-
2014‑10‑17:
Brain baloney has no place in the classroom / popular neuroscience myths.
-
2014‑10‑16:
Stop secret public sector contracts.
-
2014‑10‑16:
Morris dancing. Borderline racist?
-
2014‑10‑15:
South Korean ID system to be rebuilt from scratch.
-
2014‑10‑15:
Cryptic genetic variation in software: hunting a 41 year old bug in RANLIB.
-
2014‑10‑15:
Lockheed Skunk Works reveals compact fusion reactor details.
-
2014‑10‑15:
Separated by a common language: "twang".
-
2014‑10‑15:
Some POODLE notes.
-
2014‑10‑15:
POODLE attacks on SSLv3.
-
2014‑10‑15:
Mozilla security on the POODLE attack and the end of SSLv3.
-
2014‑10‑15:
POODLE SSLv3 vulnerability stats and recommended actions.
-
2014‑10‑15:
Mozilla recommendations for server TLS configuration.
-
2014‑10‑15:
How POODLE happened.
-
2014‑10‑15:
This POODLE bites: exploiting the SSL 3.0 fallback with a padding oracle attack.
-
2014‑10‑14:
CARDIAC: cardboard illustrative aid to computation.
-
2014‑10‑14:
Near miss project: investigating cycling safety.
-
2014‑10‑14:
World standards day.
-
2014‑10‑14:
DNS reverse lookup REMOTE_HOST environment variable shellshock.
-
2014‑10‑14:
99.99% uptime on a 9-to-5 schedule.
-
2014‑10‑14:
Alerting philosophy of a Google site reliability engineer.
-
2014‑10‑13:
Always bet on text.
-
2014‑10‑13:
Guerrilla capacity planning mantras.
-
2014‑10‑13:
When theft was worse than murder: centuries of trial documents reveal our changing attitudes to crime.
-
2014‑10‑13:
Logical fallacies: your baloney detection kit sucks.
-
2014‑10‑13:
cAPTain: a server for distributing site-local Debian packages.
-
2014‑10‑13:
aptly: manage a Debian mirror with version snapshots.
-
2014‑10‑12:
Blocked sewage pipe leads to power plant explosion and $500 million damage.
-
2014‑10‑12:
Rich command shells.
-
2014‑10‑11:
Document Liberation: open source software to read unsupported proprietary files.
-
2014‑10‑11:
EDNS compliance report.
-
2014‑10‑11:
Apache Spark breaks large-scale sort record.
-
2014‑10‑11:
The sub-2-hour marathon: who and when?
-
2014‑10‑11:
What will it take to run a sub-2-hour marathon?
-
2014‑10‑11:
Lzz: C++ .c/.h splitter for lazy programmers.
-
2014‑10‑10:
Why Elite matters.
-
2014‑10‑10:
EE, Vodafone, and Three give police mobile call records at click of a button.
-
2014‑10‑10:
Samsung's 3-bit 3D V-NAND enters mass production; cheaper SSDs on the horizon.
-
2014‑10‑10:
IX: a protected dataplane operating system for high throughput and low latency.
-
2014‑10‑10:
Intel's fsin instruction is horribly inaccurate.
-
2014‑10‑09:
Spritz: a spongy RC4-like stream cipher and hash function. (slides)
-
2014‑10‑09:
How gov.uk plans to verify your identity online.
-
2014‑10‑09:
Why Peak Oil predictions haven't come true.
-
2014‑10‑09:
New Tube trains and signalling for London.
-
2014‑10‑09:
Map of London. (1851)
-
2014‑10‑09:
The Clark-Wilson data security model.
-
2014‑10‑09:
A detailed examination of the Shellshock bash bug.
-
2014‑10‑08:
European Court of Human Rights strengthens anti-torture safeguards.
-
2014‑10‑08:
Meatball Wiki: What is a troll? Resources for moderators.
-
2014‑10‑08:
Evaluating student evaluations of university courses.
-
2014‑10‑08:
Linux containers and the future cloud.
-
2014‑10‑08:
Simple DNSSEC fact sheet.
-
2014‑10‑08:
Faster JavaScript parsing.
-
2014‑10‑08:
Building efficient query engines in Scala.
-
2014‑10‑08:
SQLite is now 50% faster than it was last year.
-
2014‑10‑07:
Rust means never having to close a socket.
-
2014‑10‑07:
A brief look at the security of Apple Pay.
-
2014‑10‑07:
Seven deadly sins when talking about types.
-
2014‑10‑07:
New class of vulnerability in Perl web apps: right operand of => evaluated in list context.
-
2014‑10‑06:
Schumpeterian Profits and the Alchemist Fallacy: most of the benefits of technological change are passed on to consumers rather than captured by producers.
-
2014‑10‑06:
The anti-smartphone beer glass. (video)
-
2014‑10‑06:
An open letter to anyone who has experienced my son's meltdowns.
-
2014‑10‑06:
What happens when evangelical christians debate climate change.
-
2014‑10‑06:
Polyphonic overtone singing: one person in harmony with herself.
-
2014‑10‑06:
The bacon craze was not an accident.
-
2014‑10‑05:
Postal censorship in England 1635-1844.
-
2014‑10‑05:
Vim blowfish encryption is broken.
-
2014‑10‑05:
Reversible, tiny, faster: Hands-on with the USB Type-C plug.
-
2014‑10‑05:
Routing meals on wheels using a space-filling curve.
-
2014‑10‑05:
"In 1976 I discovered Ebola, now I fear an unimaginable tragedy."
-
2014‑10‑05:
Standard sexist action movie plot.
-
2014‑10‑05:
Aboard the largest container ship, Mary Maersk.
-
2014‑10‑04:
Cisco rogue WiFi detection and jamming.
-
2014‑10‑04:
WiFi jamming via deauthentication packets.
-
2014‑10‑04:
The man who smuggles Traders Joe's into Canada.
-
2014‑10‑04:
Why don't students like school?
-
2014‑10‑04:
Mandos: unattended boot for servers with encrypted filesystems.
-
2014‑10‑04:
The Silk Road CAPTCHA configuration: a case of parallel construction?
-
2014‑10‑04:
Samsung V-NAND 3D vertical stacked flash cells.
-
2014‑10‑04:
Ikea's new toolless furniture.
-
2014‑10‑03:
The NSA and James Bamford.
-
2014‑10‑03:
Kim Jong-un is no longer in control of North Korea.
-
2014‑10‑02:
How I rewired my brain to become fluent in mathematics.
-
2014‑10‑02:
Moazzam Begg was prosecuted for "terrorism" activities that were agreed with MI5.
-
2014‑10‑02:
IBM discontinues Lotus 123. "There are no replacement programs."
-
2014‑10‑02:
Interactive map of every British railway line ever.
-
2014‑10‑02:
Why is exporting shell functions ever useful?
-
2014‑10‑02:
Seven digital deadly sins. (HTML5 video etc.)
-
2014‑10‑02:
It's no joke: humour is rarely welcome in research write-ups.
-
2014‑10‑02:
A fresh look at Rust.
-
2014‑10‑02:
Compile-time PostgreSQL query syntax checking for Rust.
-
2014‑10‑02:
Emergent info: tracking bullshit, like Snopes for Twitter.
-
2014‑10‑02:
"Not" neutrality?
-
2014‑10‑02:
Facebook's "cold storage" is literally as well as metaphorically cold.
-
2014‑10‑01:
More about the bash shellshock bugs, including the other two remote code execution vulnerabilities.
-
2014‑10‑01:
7,000 years older than Stonehenge: stone circles that predate agriculture.
-
2014‑09‑30:
Hacker News is a cesspit.
-
2014‑09‑30:
A review of the High Sierra shower head.
-
2014‑09‑30:
Idiomatic generics in golang as a service.
-
2014‑09‑30:
Opening the source repository with anonymous CVS.
-
2014‑09‑30:
Limitations of iOS 8 MAC address randomization.
-
2014‑09‑30:
Tory party wants to roll back weights and measures education to the 1800s.
-
2014‑09‑30:
Krakatoa made a sound so loud it circled the earth four times.
-
2014‑09‑30:
Postgres full-text search is good enough!
-
2014‑09‑29:
Most people addicted to drugs simply grow out of it.
-
2014‑09‑29:
DNSSEC: how far have we come?
-
2014‑09‑29:
The various unix shells.
-
2014‑09‑29:
Beyond the selfie stick: the personal photography drone.
-
2014‑09‑29:
Langsec: From "shotgun parsers" to more secure stacks.
-
2014‑09‑29:
Bash's parser is locale-sensitive.
-
2014‑09‑29:
E-cigarettes: a scientific review.
-
2014‑09‑29:
Bye bye Microsoft Research Silicon Valley.
-
2014‑09‑29:
Take the Red Pill *and* the Blue Pill: how to provide a trusted path for authenticating online transactions.
-
2014‑09‑29:
The start of the digital revolution at Bell Labs and the NSA: the SIGSALY system that inspired Shannon.
-
2014‑09‑28:
Writing high-performance .NET code.
-
2014‑09‑28:
ML programmer's guide to ATS.
-
2014‑09‑28:
LibreSSL: five months in.
-
2014‑09‑27:
Optimizing a compression algorithm's byte value histogram calculation.
-
2014‑09‑27:
systemd: the end of Linux?
-
2014‑09‑27:
Trademark case could set a precedent for website blocking.
-
2014‑09‑27:
Firefox's new privacy button.
-
2014‑09‑27:
The bash shellshock bug: a failure to apply formal grammars.
-
2014‑09‑27:
Why academics stink at writing.
-
2014‑09‑27:
How to write consistently boring scientific literature.
-
2014‑09‑27:
CVE-2014-6277: another bug in bash.
-
2014‑09‑27:
Penetration testing using DNS.
-
2014‑09‑27:
Automasymbolic differentiation.
-
2014‑09‑27:
About the PKCS#1 signature validation bug in NSS.
-
2014‑09‑27:
Developing software in a hostile environment: OpenBSD's experiences with exploit mitigation.
-
2014‑09‑27:
How to make error handling less error-prone: rescuing techniques from the 1970s.
-
2014‑09‑27:
Yahoo plans to kill the web index it was founded on.
-
2014‑09‑27:
The secret Goldman Sachs tapes reveal a supine Fed.
-
2014‑09‑27:
Breaking the Silk Road CAPTCHA.
-
2014‑09‑27:
xlwings: use Python instead of VBA in Excel.
-
2014‑09‑27:
Code highlighting should use different colours for each name.
-
2014‑09‑27:
John Carmack on big procedures and manually inlined code.
-
2014‑09‑26:
The great lightbulb conspiracy.
-
2014‑09‑25:
Left-Right: a concurrency control technique with wait-free population-oblivious reads.
-
2014‑09‑25:
Bill Weaver's Blackbird broke up around him at Mach 3+.
-
2014‑09‑25:
Nanotechnology leads to better, cheaper LEDs for phones and lighting.
-
2014‑09‑25:
How do male scientists balance the demands of work and family?
-
2014‑09‑25:
Neil Gaiman explains, Terry Pratchett isn't jolly. He's angry.
-
2014‑09‑25:
The SSD endurance experiment: only two remain after 1.5PB.
-
2014‑09‑24:
Oxytocin: the morality molecule.
-
2014‑09‑24:
Total moving face reconstruction.
-
2014‑09‑24:
Another patent troll slain. You are now free to rotate your smartphone.
-
2014‑09‑23:
Central Madrid bans non-resident cars.
-
2014‑09‑23:
Tonic Advance: promoting gender equality in theatres around Britain.
-
2014‑09‑23:
When good NICs do bad things: a blast of IPv6 multicast listener discovery queries.
-
2014‑09‑23:
Can you safely deliver entropy to a remote system?
-
2014‑09‑22:
Harmony: an LLVM profiling tool for tackling Amdahl's law.
-
2014‑09‑22:
Why Xenix 1.0 fails to run on an i386.
-
2014‑09‑22:
APNIC policy SIG chair resigns.
-
2014‑09‑21:
Why is Thomas Piketty's Capital a bestseller?
-
2014‑09‑21:
Uselessd: a stripped down systemd.
-
2014‑09‑21:
Lots of Lisp Machine links.
-
2014‑09‑21:
OpenGL in 2014.
-
2014‑09‑21:
Cattack: deter cats from messing up the garden.
-
2014‑09‑21:
What a can of Coke contains.
-
2014‑09‑20:
Futures aren't ersatz threads.
-
2014‑09‑20:
The Log: What every software engineer should know about real-time data's unifying abstraction.
-
2014‑09‑20:
Doing agile badly is cheaper than doing waterfall badly.
-
2014‑09‑20:
12 Java Snippets you won't believe actually compile.
-
2014‑09‑20:
Intel unveils new Xeon CPU with integrated FPGA.
-
2014‑09‑20:
Rust lifetimes: Getting away with things that would be reckless in C++.
-
2014‑09‑20:
The McDonald's cocaine spoon fiasco.
-
2014‑09‑20:
To get more out of science, show the rejected research.
-
2014‑09‑19:
Your iOS 8 data is not beyond law enforcement's reach - Yet.
-
2014‑09‑19:
Open source font development tools from Adobe.
-
2014‑09‑19:
Gandi CLI is now open source.
-
2014‑09‑19:
numdiff: show numeric differences between files.
-
2014‑09‑19:
CloudFlare keyless SSL.
-
2014‑09‑19:
Victims of .prod gTLD name collisions respond "fuck Google!".
-
2014‑09‑19:
Signed pushes for git.
-
2014‑09‑19:
Charlieplexed LED displays.
-
2014‑09‑19:
Thoughts on five years of the Emerging Languages conference.
-
2014‑09‑19:
Apple's warrant canary disappears.
-
2014‑09‑19:
Erlang in anger.
-
2014‑09‑19:
A scientist stole my root beer.
-
2014‑09‑19:
Tweet a program in the Wolfram language.
-
2014‑09‑18:
Privacy violations using microtargeted ads: a case study.
-
2014‑09‑18:
Pranking a roommate with eerily targeted Facebook ads.
-
2014‑09‑18:
sshrc: bring your dotfiles with you when you ssh.
-
2014‑09‑18:
Understanding weak isolation of database transactions is a serious problem.
-
2014‑09‑18:
Smoking rates increase in New York after e-cigs are banned.
-
2014‑09‑18:
Power of Optics: a chain reaction machine video.
-
2014‑09‑17:
Five large UK government contracts are being investigated for fraud.
-
2014‑09‑17:
What you need to know about the C++14 standard.
-
2014‑09‑17:
Where do children's earliest memories go?
-
2014‑09‑17:
Upgrading Github to Rails 3.0 with zero downtime.
-
2014‑09‑17:
Galt's Gulch Chile libertarian utopia falls apart almost immediately.
-
2014‑09‑16:
What you might learn when you become the Internet's most hated person.
-
2014‑09‑16:
How the super-rich got richer: inequality in the UK.
-
2014‑09‑16:
Lessons from real-life revolutions that fictional dystopias ignore.
-
2014‑09‑16:
Who killed lard?
-
2014‑09‑16:
Incremental garbage collection: the train algorithm.
-
2014‑09‑16:
Incremental mature garbage collection using the train algorithm.
-
2014‑09‑16:
The courts have greatly restricted the Information Commissioner's powers to fight spam texts.
-
2014‑09‑16:
Gmail accounts can take days to sync over IMAP.
-
2014‑09‑16:
Netflix has a new slogan: Chaos Engineering.
-
2014‑09‑16:
Desmos graphing calculator.
-
2014‑09‑16:
Press and hold a key to get a mathematical symbol.
-
2014‑09‑16:
Mathway
-
2014‑09‑16:
MATHJQ: WYSIWYG equation editor supporting MathML and LaTeX.
-
2014‑09‑16:
A visual equation editor.
-
2014‑09‑16:
Online handwritten equation recognizer.
-
2014‑09‑16:
Windows math input panel typesets handwritten equations.
-
2014‑09‑16:
Detexify: handwritten symbol recognition for LaTeX.
-
2014‑09‑16:
ASCIIMathML.js translates ASCII math notation to MathML and graphics.
-
2014‑09‑16:
ASCIIMathML: mathematical markup without the backslashes.
-
2014‑09‑16:
KaTeX: The fastest mathematics typesetting library for the web.
-
2014‑09‑15:
Mailpile enters beta. It's like Gmail, but you run it on your own computer.
-
2014‑09‑15:
The road to Rust 1.0.
-
2014‑09‑15:
Android browser up to version 4.4 has easy JavaScript same-origin policy bypass.
-
2014‑09‑15:
"You just chip away everything that doesn't look like David."
-
2014‑09‑15:
Schizophrenia not a single disease but multiple genetically distinct disorders.
-
2014‑09‑15:
Types don't know #: type-independent hashing for C++
-
2014‑09‑15:
What the Internet's most infamous trolls tell us about online feminism.
-
2014‑09‑15:
Notch is leaving Mojang and Minecraft.
-
2014‑09‑15:
Atchafalaya: sinking Louisiana. (1987)
-
2014‑09‑15:
Ghostbusters is the best comedy ever made about the limits of the Lovecraftian worldview.
-
2014‑09‑14:
Why is it taking so long to secure BGP?
-
2014‑09‑14:
Onity wins: hotels don't have standing to sue them over their easily hacked locks.
-
2014‑09‑14:
Wears jump suit. Sensible shoes. Uses husband's last name. Marked women, unmarked men.
-
2014‑09‑14:
Fifteenth anniversary of the Cluetrain Manifesto.
-
2014‑09‑14:
Algomation: animated algorithms.
-
2014‑09‑14:
Get a copy of the New York City Transit Authority Graphic Standards Manual.
-
2014‑09‑13:
A free qemu image of Coherent Unix.
-
2014‑09‑13:
Certificate Transparency in ACM Queue.
-
2014‑09‑13:
Software patents are crumbling, thanks to the Supreme Court.
-
2014‑09‑13:
The Rust Guide.
-
2014‑09‑13:
Louisiana is sinking into the Gulf of Mexico.
-
2014‑09‑12:
Rich, educated and stupid parents are driving the vaccination crisis.
-
2014‑09‑12:
Superbugs meet their match in rapid genome sequencing.
-
2014‑09‑12:
Exploring TLA+ with two-phase commit.
-
2014‑09‑12:
iPhone 6 screens demystified.
-
2014‑09‑12:
The curious case of the iPhone 6+ 1080p display.
-
2014‑09‑12:
Hands on with USB type C reversible connectors.
-
2014‑09‑12:
Probable DNS cache poisoning of mail handling domains.
-
2014‑09‑12:
US Government threatened to fine Yahoo $250,000 per day for not complying with PRISM.
-
2014‑09‑12:
Death of RAID predicted, film at 11.
-
2014‑09‑12:
netresolv: libc resolver, descendent of libbind.
-
2014‑09‑12:
When no redundancy is more reliable than RAID 5.
-
2014‑09‑12:
A termination detection algorithm for distributed computations.
-
2014‑09‑12:
When random is better: parallel file tree walking.
-
2014‑09‑12:
dcp: copy files in parallel on a distributed system.
-
2014‑09‑12:
Problems copying lots of files with GNU cp: massive time and memory overhead.
-
2014‑09‑12:
Copyright law offers such powerful remedies that it is increasingly being used in non-copyright cases.
-
2014‑09‑12:
Dan Bricklin on disconnected mobile database apps.
-
2014‑09‑11:
CAMRA's Good Beer Guide 2015 shows UK has most breweries per head of population.
-
2014‑09‑11:
How the US DoD DREN selects IPv6 capable suppliers.
-
2014‑09‑11:
Firefox add-on enables web developer tools on other browsers and devices.
-
2014‑09‑11:
Parliament without Scottish MPs: how would it have looked different since 1997?
-
2014‑09‑11:
Hiding a WiFi network makes its mobile clients broadcast SSID probes instead of the AP.
-
2014‑09‑11:
The character of physical law: Feynman's Messenger Lectures at Cornell, 1964.
-
2014‑09‑11:
D-Wave: the revolutionary quantum computer that may not be quantum at all.
-
2014‑09‑11:
No quantum speed-up from D-Wave computers?
-
2014‑09‑10:
Apple Pay's identification revolution.
-
2014‑09‑10:
Why we fight wars.
-
2014‑09‑10:
America's climate swerve.
-
2014‑09‑10:
The curious case of the cyclist's shaven legs.
-
2014‑09‑10:
Perspectives on Brewer's CAP theorem.
-
2014‑09‑10:
git-as-svn: a svn server daemon with a git repository backend.
-
2014‑09‑10:
How Apple Pay works and why it matters for developers.
-
2014‑09‑10:
Power Dive into the danger zone: copyright and 555uHz.
-
2014‑09‑09:
The design of the REXX programming language.
-
2014‑09‑09:
The London Hydraulic Power Company's extensive mains network.
-
2014‑09‑09:
C100M: 100 million clients, 6.5 million requests per second, with userland TCP+HTTP.
-
2014‑09‑09:
openSUSE gardened: Linux kernel with SUSE and grsec patches.
-
2014‑09‑09:
Portal power: free energy with railway technology.
-
2014‑09‑09:
The real Men in Black, Hollywood, and the great UFO cover-up.
-
2014‑09‑09:
Socratic electronics.
-
2014‑09‑09:
All about circuits.
-
2014‑09‑09:
Google is pushing web sites to upgrade from SHA-1.
-
2014‑09‑09:
What the online security experts tell their kids about Internet safety.
-
2014‑09‑08:
How upvotes and downvotes shape user behaviour.
-
2014‑09‑08:
When your prey's in a hole and you don't have a pole, use a moray.
-
2014‑09‑08:
OpenSSL security policy.
-
2014‑09‑08:
IPv6 neighbor discovery problems with layer 2 multicast state.
-
2014‑09‑08:
Recommended reading on computer security.
-
2014‑09‑08:
Notes from the development of xkcd's "Pixels".
-
2014‑09‑07:
The design and implementation of probabilistic programming languages.
-
2014‑09‑07:
Solarpunk: notes toward a manifesto.
-
2014‑09‑07:
Alien Contact: a comic on gender roles.
-
2014‑09‑07:
Twitter should not algorithmically curate the timeline.
-
2014‑09‑07:
The phantom menace of militant atheism.
-
2014‑09‑07:
IPv6 doom at MIT: the network nightmare that ate a week.
-
2014‑09‑07:
YunoHost is a server operating system aiming to make self-hosting accessible to everyone.
-
2014‑09‑07:
iRedMail: free, open source mail server solution for Linux/BSD.
-
2014‑09‑07:
How to run your own e-mail server with your own domain.
-
2014‑09‑07:
Sovereign: Ansible playbooks for personal replacements for cloud services.
-
2014‑09‑07:
Mail-in-a-Box.
-
2014‑09‑06:
Reverse engineering a counterfeit 7805 voltage regulator IC.
-
2014‑09‑06:
300 (and more) flat-out evil lies: David Brin on Frank Miller's sequel.
-
2014‑09‑06:
Designing analog chips.
-
2014‑09‑06:
Water's edge: the crisis of rising sea levels.
-
2014‑09‑06:
33 things to do before climate change ruins everything.
-
2014‑09‑06:
The ramifications of the SCotUS "Alice" patent legality decision.
-
2014‑09‑06:
Bullet Journal: a paper note-taking system.
-
2014‑09‑06:
Designing a personal knowledgebase.
-
2014‑09‑06:
Modern anti-spam and E2E crypto.
-
2014‑09‑06:
Why Amazon has no profits (and why it works).
-
2014‑09‑06:
Memorizing "$19.05" helps you outsmart the New York MTA.
-
2014‑09‑06:
Why a dead alkaline battery bounces more than a fresh one.
-
2014‑09‑06:
Walking helps us think.
-
2014‑09‑06:
Zeroing buffers is insufficient.
-
2014‑09‑05:
Adding bike lanes in New York actually reduced traffic delays.
-
2014‑09‑05:
The kind of story Facebook's algorithm finds positively toxic.
-
2014‑09‑05:
Irish postcodes at last but random numbers don't address efficiency.
-
2014‑09‑05:
Twitter CFO promises to kill its main selling point.
-
2014‑09‑04:
How to zero a buffer. (Interesting volatile trick.)
-
2014‑09‑04:
Ten surprises from numerical linear algebra.
-
2014‑09‑04:
Better identification of Viking corpses reveals many of the warriors were female.
-
2014‑09‑04:
Answers to 10 frequent comments on feminist blogposts.
-
2014‑09‑04:
Notes on the celebrity nude photo data theft.
-
2014‑09‑04:
vfmd: Markdown with a formal spec.
-
2014‑09‑04:
Standard markdown.
-
2014‑09‑04:
The few tough species known to survive the rigors of space.
-
2014‑09‑04:
Visualizing garbage collection algorithms.
-
2014‑09‑04:
DHCP client problems on systems with no battery backed clock.
-
2014‑09‑03:
UK Government bans all schools from teaching creationism as science.
-
2014‑09‑03:
A brief history of AUTODIN. (1973)
-
2014‑09‑03:
Recalling the AUTODIN.
-
2014‑09‑03:
The origins of network mail.
-
2014‑09‑03:
Email history through RFCs.
-
2014‑09‑03:
Bitsquatting: DNS hijacking via bit error name corruption.
-
2014‑09‑03:
An epic rant about nude photos.
-
2014‑09‑03:
A call for a low-carb diet that embraces fat.
-
2014‑09‑02:
High performance packet filtering with pflua.
-
2014‑09‑02:
Why is Huffington Post running a multi-part series promoting a guy who pretends he invented email?
-
2014‑09‑02:
Limits to Growth was right. New research shows we're nearing collapse.
-
2014‑09‑02:
The C book.
-
2014‑09‑02:
On teaching introductory computer science using "How To Design Programs".
-
2014‑09‑02:
Formal methods in safety-critical railway systems.
-
2014‑09‑02:
Rationale for the design of the Ada programming language.
-
2014‑09‑02:
Invertible Bloom lookup tables.
-
2014‑09‑01:
On the origins of "fuck", part 2: but what about the "d"?
-
2014‑09‑01:
btrfs as a Linux packaging system.
-
2014‑09‑01:
End-to-end arguments in the Internet: principles, practices, and theory. (test IDN link)
-
2014‑09‑01:
A Minnesota man built a 3D printed concrete folly in his back garden.
-
2014‑09‑01:
Digi-Comp II: wooden ball-bearing toy computer.
-
2014‑09‑01:
A culture of innovation: insider accounts of computing and life at BBN.
-
2014‑09‑01:
End-to-end arguments in the Internet: principles, practices, and theory.
-
2014‑09‑01:
Resurrection of the 1973 ARPANET IMP code.
-
2014‑09‑01:
A technical history of the ARPANET.
-
2014‑09‑01:
In TCP, we have a model: Sender --(miracle)-- Receiver.
-
2014‑08‑31:
London maps: a unique view of the capital through classic cartography.
-
2014‑08‑31:
US telecoms giants call on FCC to block cities' expansion of high-speed internet.
-
2014‑08‑31:
libco: coroutines for C89.
-
2014‑08‑31:
Resizeable arrays in optimal time and space.
-
2014‑08‑31:
Facebook's optimized std::vector replacement.
-
2014‑08‑31:
States with medical marijuana have fewer painkiller deaths.
-
2014‑08‑30:
Last call: there is no future for printed newspapers.
-
2014‑08‑30:
Mass and length may not be fundamental properties of nature, according to new ideas bubbling out of the multiverse.
-
2014‑08‑30:
Robert Lustig argues sugar is poison.
-
2014‑08‑30:
Readings in databases.
-
2014‑08‑30:
Inside Google's secret drone-delivery development program.
-
2014‑08‑30:
Coffee naps are better than coffee or naps alone.
-
2014‑08‑29:
The downfall of Motorola.
-
2014‑08‑29:
Keurig competitors have cracked their coffee DRM system.
-
2014‑08‑29:
Networks all the way down, part 2.
-
2014‑08‑29:
Why haven't China's cities learned from America's mistakes?
-
2014‑08‑29:
Five reasons Belgium has the worst traffic in Europe.
-
2014‑08‑29:
Networks all the way down: the death of the bus.
-
2014‑08‑28:
Student-built apps teach colleges a thing or two.
-
2014‑08‑28:
Google's proposal for OpenPGP key distribution for their end-to-end browser extension.
-
2014‑08‑28:
Call-by-meaning: applying the semantic web to APIs.
-
2014‑08‑28:
Outside the closed world: on using machine learning for network intrusion detection.
-
2014‑08‑28:
The CryptoPhone 500 detects IMSI catchers.
-
2014‑08‑28:
First observation of sliding rocks in motion on Racetrack Playa, Death Valley National Park.
-
2014‑08‑27:
Vermont tones down War on Drugs to treat heroin as health issue.
-
2014‑08‑27:
Proposal for a friendly dialect of C.
-
2014‑08‑27:
NSEC5: provably preventing DNSSEC zone enumeration.
-
2014‑08‑27:
The Mathematical Pirate's guide to factorizing cubics.
-
2014‑08‑26:
The poisoned NUL byte exploit, 2014 edition.
-
2014‑08‑26:
Summer school on hashing theory and applications.
-
2014‑08‑26:
JavaScript: Servo's only garbage collector.
-
2014‑08‑26:
25 words that describe other words.
-
2014‑08‑26:
Some "dark patterns" of underhanded e-commerce are now illegal in the UK.
-
2014‑08‑26:
The relative cost of bandwidth around the world.
-
2014‑08‑25:
The origin of death.
-
2014‑08‑25:
Unofficial bash strict mode.
-
2014‑08‑25:
How much wine was lost in the Napa Valley earthquake?
-
2014‑08‑25:
What is the deal with NULL in SQL?
-
2014‑08‑25:
The poorest regions of Northern Europe are in the UK.
-
2014‑08‑25:
Side platforms vs island platforms.
-
2014‑08‑25:
Atomic accidents.
-
2014‑08‑25:
A review of the Philips Hue LED lighting system: the future of lighting?
-
2014‑08‑25:
A review of nuclear criticality accidents.
-
2014‑08‑25:
What happens when you stop clicking "like" on Facebook.
-
2014‑08‑25:
C/C++ development environment for Emacs.
-
2014‑08‑25:
Slavery lasted until Pearl Harbor.
-
2014‑08‑25:
Not a Tea Party, a Confederate Party.
-
2014‑08‑24:
FOX TWO: the AIM-9 Sidewinder air-to-air missile.
-
2014‑08‑24:
All life is contained in CROBOTS: the effectiveness of simple battle tactics.
-
2014‑08‑23:
How the woman got her period.
-
2014‑08‑23:
Optimizing seed selection for fuzzing.
-
2014‑08‑23:
Six points about type safety.
-
2014‑08‑23:
How to be a fan of problematic things.
-
2014‑08‑23:
"Escalator" was originally a trademark of the Otis elevator company.
-
2014‑08‑23:
A Lego calendar, with photo-to-iCalendar conversion software.
-
2014‑08‑23:
Most of the IKEA catalogue pictures are computer graphics not photography.
-
2014‑08‑22:
Only 1 percent of "terrorists" caught by the FBI are real.
-
2014‑08‑22:
NuSI: Gary Taubes' nutrition science initiative.
-
2014‑08‑22:
Most Americans want to criminalize pre-teens playing unsupervised.
-
2014‑08‑22:
You can watch an 'unaltered' version of Star Wars in HD today, if you bend the law.
-
2014‑08‑22:
Canadian government suppresses scientific reports on polar melt.
-
2014‑08‑22:
Linux performance tools.
-
2014‑08‑22:
The invisible chair that you can wear.
-
2014‑08‑22:
An intro to Linux ftrace and perf-tools.
-
2014‑08‑21:
How Scotland might be robbed.
-
2014‑08‑21:
The importance of vaccination; also, zombies.
-
2014‑08‑21:
How about solarpunk?
-
2014‑08‑21:
Why Racket? Why Lisp?
-
2014‑08‑21:
40 maps that explain the Roman Empire.
-
2014‑08‑21:
fork() can fail.
-
2014‑08‑21:
Gyrophone: recognizing speech using a phone's gyroscope.
-
2014‑08‑20:
It is amusingly easy to hack traffic lights.
-
2014‑08‑20:
Spritz: a spongy RC4-like stream cipher and hash function.
-
2014‑08‑20:
RetroBSD: unix for microcontrollers.
-
2014‑08‑20:
Sunil Dutta tells it like it is about American policing.
-
2014‑08‑20:
How cops became soldiers: an interview with police militarization expert Radley Balko.
-
2014‑08‑20:
Patent troll king Intellectual Ventures sacks 20% of its staff.
-
2014‑08‑20:
Nyms Identity Directory: an alternative to the PGP web of trust.
-
2014‑08‑20:
VisuAlgo: visualising data structures and algorithms through animation.
-
2014‑08‑20:
Frogsort as an exam question.
-
2014‑08‑19:
Star Wars: The Despecialized Edition.
-
2014‑08‑19:
What law enforcement needs to understand about Ferguson.
-
2014‑08‑19:
The definition of Standard ML. (Now available as free PDFs.)
-
2014‑08‑19:
We have C++14!
-
2014‑08‑19:
The problem with NTP.
-
2014‑08‑17:
Why the option type is better than nullable types.
-
2014‑08‑17:
The City of London: a tax haven in the heart of Britain.
-
2014‑08‑17:
Removing centre lines from roads significantly decreases traffic speed.
-
2014‑08‑17:
UNGOV.UK: Policymaking is broken. Together we can fix it.
-
2014‑08‑16:
Bankers make electricity more expensive when people most need it.
-
2014‑08‑16:
PSA prostate screening is inaccurate and a waste of money.
-
2014‑08‑16:
Viking ship discovered near Mississippi River.
-
2014‑08‑16:
Genetic study supports link between carbohydrate digestion and obesity.
-
2014‑08‑16:
What our most famous evolutionary cartoon gets wrong.
-
2014‑08‑16:
Utopian for beginners: John Quijada and his conlang Ithkuil.
-
2014‑08‑15:
Could hemp nanosheets topple graphene for making the ideal supercapacitor?
-
2014‑08‑15:
Fifty Tom Swifties.
-
2014‑08‑15:
Fifty years since the last death penalty in Britain.
-
2014‑08‑15:
What's the matter with PGP?
-
2014‑08‑14:
Mitro releases a new free and open source password manager.
-
2014‑08‑14:
Law students defeat a patent troll.
-
2014‑08‑14:
Erratum prompts Intel to disable TSX in Haswell and early Broadwell CPUs.
-
2014‑08‑14:
Print this file, your printer will jam.
-
2014‑08‑14:
Humans need not apply. (YouTube)
-
2014‑08‑14:
Security as a class of interface guarantee.
-
2014‑08‑14:
Security ceremony design and analysis.
-
2014‑08‑13:
When the NSA accidentally cut Syria off the net.
-
2014‑08‑13:
James Bamford interviews Edward Snowden.
-
2014‑08‑13:
Just kill all of the comments already.
-
2014‑08‑13:
An American doctor experiences an NHS emergency room.
-
2014‑08‑13:
Salt: the secret ingredient in your cocktail.
-
2014‑08‑13:
First cordon sanitaire in a century: west African countries quarantine Ebola regions.
-
2014‑08‑13:
Internet touches 512k BGP prefixes: outages possible next week.
-
2014‑08‑13:
Swedish dad takes gamer kids to warzone.
-
2014‑08‑13:
512k BGP prefixes caused today's Internet hiccup.
-
2014‑08‑13:
Cisco Catalyst 6500 and 7600 TCAM routing table size adjustment procedures.
-
2014‑08‑13:
Ants in telecommunications equipment.
-
2014‑08‑13:
BGP reaches 512k prefix limit in old Cisco routers; Internet breaks.
-
2014‑08‑13:
The Matasano crypto challenges.
-
2014‑08‑12:
Automated proof of Kepler's sphere packing conjecture using Isabelle and HOL.
-
2014‑08‑12:
A DNS failure that turned tracking analytics into adware redirects.
-
2014‑08‑12:
The copyright molly: making a living as a creator was always difficult; stronger copyright doesn't fix it.
-
2014‑08‑12:
Tiny reversible USB Type-C connector finalized.
-
2014‑08‑12:
Things that sometimes help if you have depression.
-
2014‑08‑12:
What happens when you "like" everything you see on Facebook.
-
2014‑08‑12:
Australia sees large fall in smoking after introduction of standardised packs.
-
2014‑08‑12:
Medical research: What is a conflict of interest anyway?
-
2014‑08‑12:
The Canadian Bitcoin BGP hijack.
-
2014‑08‑12:
This is the face of my mental illness.
-
2014‑08‑11:
The crooked ladder: the gangster's guide to upward mobility.
-
2014‑08‑11:
Safely composable type-specific programming languages.
-
2014‑08‑10:
Distributed systems theory for the distributed systems engineer.
-
2014‑08‑10:
The man who can see the Internet: a profile of Renesys.
-
2014‑08‑10:
Security of OS-level virtualization technologies.
-
2014‑08‑10:
When is one thing equal to some other thing?
-
2014‑08‑10:
Secrets of amazing teachers: What both sides of the education reform debate get wrong about autonomy and accountability.
-
2014‑08‑10:
The agricultural revolution 10,000 years ago that wasn't.
-
2014‑08‑10:
Haskell Backpack: What's a module system good for anyway?
-
2014‑08‑09:
The origin of the term 0day in hacking.
-
2014‑08‑09:
Earl Grey tea intoxication.
-
2014‑08‑09:
Hacker used BGP attack against 19 ISPs to steal bitcoins.
-
2014‑08‑08:
Understanding Clojure transducers through types.
-
2014‑08‑08:
Worst API ever.
-
2014‑08‑08:
p5.js: Processing re-done for the web. (Follow the Hello! link.)
-
2014‑08‑06:
The study of adjective order and GSSSACPM.
-
2014‑08‑06:
Twitter won't stop harassment, so its users are making apps to help.
-
2014‑08‑06:
An inventor who is working on ultrasound / piezoelectric wireless chargers.
-
2014‑08‑06:
Breaking the GameBoy Tetris world record.
-
2014‑08‑06:
TCP and its lower bound on web latency.
-
2014‑08‑06:
3D object manipulation in a 2D photograph using stock 3D models.
-
2014‑08‑06:
Dutch roads have speed-measuring induction loops. It's open data: here's a map.
-
2014‑08‑05:
Malicious SHA-1: tweaked constants allow easy collisions.
-
2014‑08‑05:
Ansible vs SaltStack.
-
2014‑08‑04:
Robot exoskeletons in Korean shipyards.
-
2014‑08‑04:
Venn diagrams vs Euler diagram vs lolcircles.
-
2014‑08‑04:
When "colourless green ideas sleep furiously" makes sense.
-
2014‑08‑04:
Some universities are successful at drawing women to computer science.
-
2014‑08‑03:
Your 'craft' whiskey is probably from a factory distillery in Indiana.
-
2014‑08‑03:
Remy: computer-generated congestion control algorithms for TCP.
-
2014‑08‑03:
theft: property-based testing for C.
-
2014‑08‑03:
Breaking antivirus software.
-
2014‑08‑03:
If all the ice melted: interactive map.
-
2014‑08‑03:
"Theater" vs. "theatre": the great New York Times language swap.
-
2014‑08‑03:
Police files reveal endemic corruption in the Met.
-
2014‑08‑03:
Decentralization: I want to believe.
-
2014‑08‑03:
The telehash protocol: secure decentralized overlay network.
-
2014‑08‑02:
Cold War strategies are back, but now Russia is more like North Korea.
-
2014‑08‑02:
Gerry Judah: amazing sculptures for the Goodwood festival of speed and elsewhere.
-
2014‑08‑02:
European Commission consultation on copyright reveals chasm between views of public and publishers.
-
2014‑08‑02:
Quantifying Comcast's monopoly power.
-
2014‑08‑02:
Barriers faced by newcomers to open source projects: a systematic review.
-
2014‑08‑01:
Learning how to think about computer system security after a breach.
-
2014‑08‑01:
Middlebox vendors campaigning to kill multipath TCP.
-
2014‑08‑01:
Private copying exception faces possible legal action from music industry.
-
2014‑08‑01:
Why were CERT researchers attacking Tor?
-
2014‑08‑01:
Seven habits of highly fraudulent users.
-
2014‑08‑01:
The impossible music of black MIDI.
-
2014‑07‑31:
Doctor delivers $1.2 billion blow to tobacco, and counting.
-
2014‑07‑31:
Why local state is a fundamental primitive in stream processing.
-
2014‑07‑31:
Debit card override hack.
-
2014‑07‑31:
From Concorde to the iPhone, state intervention drives technological innovation.
-
2014‑07‑31:
Errors by FBI forensic lab found in nearly every case that has been reviewed.
-
2014‑07‑31:
Why many programmers don't bother joining the ACM.
-
2014‑07‑30:
Podcasting patent troll fails to drop lawsuit against Adam Carolla.
-
2014‑07‑30:
We now know how to get to the moon more efficiently than Apollo.
-
2014‑07‑30:
Private copying: a new copyright exception in the UK.
-
2014‑07‑30:
The Pirate Party: how downloading copyright material turned into a political movement.
-
2014‑07‑30:
seL4 secure microkernel.
-
2014‑07‑29:
The suburbs will die: sprawl is like a Ponzi scheme.
-
2014‑07‑29:
Under-25s are better behaved than ever.
-
2014‑07‑29:
Using category theory to design implicit conversions and generic operators.
-
2014‑07‑29:
A MITM proxy for backdooring any Java libraries downloaded from Maven Central.
-
2014‑07‑28:
Impossible engineering problems often aren't: timeseries processing by Scalyr.
-
2014‑07‑28:
RISKS of digital key reproduction services.
-
2014‑07‑28:
Gender decoder for job ads.
-
2014‑07‑28:
BBC R&D test IP studio ultra-HD Commonwealth Games multicast over JANET.
-
2014‑07‑28:
Alphabetical order explained in a mere 27,817 words.
-
2014‑07‑28:
The gratuitous injustice of American tipping culture.
-
2014‑07‑28:
What is 25 Gbit Ethernet and why would you want it?
-
2014‑07‑27:
Repeal prohibition again, says the New York Times.
-
2014‑07‑27:
Gay marriage went from unthinkable to inevitable.
-
2014‑07‑27:
Councils can no longer exclude the press and public from their meetings.
-
2014‑07‑27:
"Learning to Read" by Malcolm X.
-
2014‑07‑26:
The typical US household is worth 1/3 less than 10 years ago.
-
2014‑07‑26:
400th anniversary of logarithms.
-
2014‑07‑26:
A guaranteed income would eliminate poverty and it wouldn't destroy the economy.
-
2014‑07‑26:
Better explained mathematical insights.
-
2014‑07‑25:
How Marvel became the envy (and scourge) of Hollywood.
-
2014‑07‑25:
The Apple backdoor that wasn't.
-
2014‑07‑25:
The secret of Minecraft.
-
2014‑07‑25:
Macroscopic quantum objects cannot exist if P≠NP.
-
2014‑07‑25:
Government agents are directly involved in most US terrorism plots.
-
2014‑07‑25:
Long-hidden photos reveal construction of Cambridge University Library.
-
2014‑07‑25:
True Names.
-
2014‑07‑25:
Hotel WiFi test.
-
2014‑07‑25:
The network is reliable.
-
2014‑07‑24:
After the trending: coping with sudden notoriety.
-
2014‑07‑24:
What Is Public?
-
2014‑07‑24:
IPFS: the permanent web.
-
2014‑07‑24:
Apple confirms iOS back doors, and downplays their severity.
-
2014‑07‑24:
Warwick University charges one of its professors with insubordination.
-
2014‑07‑24:
Measuring IPv6 adoption.
-
2014‑07‑24:
The Little Box Challenge: an open competition to build a much smaller power inverter.
-
2014‑07‑24:
Authoritarianism and "social justice warriors".
-
2014‑07‑23:
Wireless home alarms are easy to hack.
-
2014‑07‑23:
Terminator 2 and the world's biggest spoiler.
-
2014‑07‑23:
How recursion got into programming: a comedy of errors.
-
2014‑07‑23:
Metrics-driven development.
-
2014‑07‑23:
Comcast reaches key milestone in launch of IPv6 broadband network.
-
2014‑07‑22:
Ark: a real-world distributed consensus implementation.
-
2014‑07‑22:
New material generates steam from the sun more efficiently.
-
2014‑07‑22:
US ISPs argue that the public sector is unfairly cheaper and better.
-
2014‑07‑21:
FTL: WebKit's fourth-tier LLVM-based JavaScript JIT.
-
2014‑07‑21:
The modern bathroom is a wasteful unhealthy design.
-
2014‑07‑21:
Domain Registry of America Inc. (NameJuice etc.) suspended by ICANN.
-
2014‑07‑21:
A Lisper's first impression of Julia.
-
2014‑07‑19:
Identifying back doors, attack points, and surveillance mechanisms in iOS devices.
-
2014‑07‑18:
How to link to specific lines of code on GitHub.
-
2014‑07‑18:
Lettering with Lego.
-
2014‑07‑17:
perl -le 'print(two + two == five ? "true" : "false")'
-
2014‑07‑17:
Cryptocurrencies without proof of work.
-
2014‑07‑17:
Perfect pilfering: how HFT rigs the market, examined from a data-centric approach.
-
2014‑07‑17:
How the Bootstrap 3 grid works.
-
2014‑07‑16:
GPS and relativity.
-
2014‑07‑16:
How Cambridge University's public WiFi handled the Tour de France.
-
2014‑07‑16:
Google+ drops its "real names" policy.
-
2014‑07‑15:
gpg-edit-recpients: add or remove public-key encrypted session key packets without decrypting entire file.
-
2014‑07‑14:
xxHash: extremely fast hash algorithm.
-
2014‑07‑14:
Updates to X.509 certificate verification in Firefox. (95% code reduction!)
-
2014‑07‑14:
NIST review of the Dual EC DRBG standardisation failure.
-
2014‑07‑14:
A tu / vous flow chart for Bastille day.
-
2014‑07‑14:
OCaml-TLS: the protocol implementation and mitigations to known attacks.
-
2014‑07‑14:
Why Rust is called Rust.
-
2014‑07‑14:
Rust for functional programmers.
-
2014‑07‑13:
The user interface design trends that we love to hate.
-
2014‑07‑12:
A more fundamental International System of Units.
-
2014‑07‑12:
All the widgets: a history of GUIs. (Vimeo)
-
2014‑07‑12:
Xplain: how X11 works (with in-browser demos).
-
2014‑07‑12:
Performance pitfalls of object oriented programming.
-
2014‑07‑11:
Unikernels: library operating systems for the cloud.
-
2014‑07‑11:
Disclosing Internet peering agreements creates anticompetitive risks.
-
2014‑07‑11:
Does the UK's emergency DRIP data retention bill violate the EU Charter of Fundamental Rights?
-
2014‑07‑11:
Slay a nightmare, with science!
-
2014‑07‑10:
Integrating dependent and linear types.
-
2014‑07‑10:
Multicolour fonts and colorful typography on the web.
-
2014‑07‑10:
Anti-patterns in Python programming.
-
2014‑07‑10:
Color Emoji in Windows 8.1: vector glyphs not PNG.
-
2014‑07‑09:
netresolve: non-blocking name resolution intended to replace NSS in glibc.
-
2014‑07‑09:
USPTO grants two patents on the DNS.
-
2014‑07‑09:
The value of a dangling pointer is indeterminate in C.
-
2014‑07‑09:
Brave men take paternity leave: take-up snowballs after early adopters show the way.
-
2014‑07‑09:
German BPjM-Modul Internet censorship URL blacklist leaked.
-
2014‑07‑08:
OCaml-TLS demo server with interactive live protocol trace.
-
2014‑07‑08:
Corrupt personalization: the dangers of the algorithmic social media bubble.
-
2014‑07‑08:
The tail at scale: low latency distributed systems at Google.
-
2014‑07‑08:
The return of Microsoft Office VBA macro viruses.
-
2014‑07‑08:
Former head of MI6 says Islamic threats exaggerated by government and media.
-
2014‑07‑08:
Alloy: a language and tool for analysing relational models.
-
2014‑07‑08:
Web content security information leaks.
-
2014‑07‑08:
Breaking Spotify DRM with PANDA.
-
2014‑07‑07:
Apple vs Google Unix wars.
-
2014‑07‑06:
The Milgram experiment: a troubling feature of people who seem nice all the time.
-
2014‑07‑06:
How the Tour de France is broadcast to the world.
-
2014‑07‑06:
The significance of SIMD, SSE, and AVX.
-
2014‑07‑05:
The Ceylon programming language.
-
2014‑07‑05:
"Run," Bakri says. (short story)
-
2014‑07‑05:
Validating the XKeyScore code leak.
-
2014‑07‑05:
PyPy-STM is becoming a plausible GIL-less Python.
-
2014‑07‑05:
How Thatcher killed the UK's superfast broadband before it even existed.
-
2014‑07‑05:
Straight answers or slippery digressions? The art of the parliamentary written answer, in numbers.
-
2014‑07‑05:
The march towards Golang.
-
2014‑07‑05:
CSS is unnecessary given a layout language with means of abstraction and combination (e.g. Elm).
-
2014‑07‑04:
Austrian economists, 9/11 truthers and brain worms.
-
2014‑07‑04:
phpinfo() type confusion infoleak vulnerability and SSL private keys.
-
2014‑07‑04:
BBC journalist being trained to stop inviting cranks on to provide false balance.
-
2014‑07‑04:
The No-IP takedown: Microsoft doesn't understand DNS.
-
2014‑07‑04:
Kafka: questioning the Lambda Architecture.
-
2014‑07‑03:
US IRS policy targeting political groups also aimed at open source projects.
-
2014‑07‑03:
An overview of the CHERI capability model: revisiting RISC in an age of risk.
-
2014‑07‑03:
Region-based memory management in Cyclone.
-
2014‑07‑03:
Toyota labs page on their free piston engine generator.
-
2014‑07‑03:
Free piston engine research at Newcastle.
-
2014‑07‑03:
Free piston engines
-
2014‑07‑03:
Koenigsegg is developing a camless car engine.
-
2014‑07‑03:
Tor exit node operator prosecuted in Austria.
-
2014‑07‑02:
Toyota free piston engine linear generator: no crankshaft, fewer moving parts.
-
2014‑07‑02:
How to give an academic talk.
-
2014‑07‑01:
Dependently typed programming will (one day) rock your world.
-
2014‑07‑01:
OpenSSL project roadmap.
-
2014‑07‑01:
The lemon market in programming language adoption.
-
2014‑07‑01:
Essential futurist SF.
-
2014‑07‑01:
Golang is not good.
-
2014‑07‑01:
Gregg shorthand: How to write 225 words per minute with a pen.
-
2014‑06‑30:
DRM pods: can Keurig kill K-Cup coffee copy-cats?
-
2014‑06‑30:
Microsoft seized 22 domains without reporting abuse problem to the provider first.
-
2014‑06‑30:
Bitcrypt ransomware broken: 128 digit RSA key is not 1024 bits.
-
2014‑06‑30:
Clang's memory model for static analysis of C programs.
-
2014‑06‑30:
Developing with Nix.
-
2014‑06‑30:
ByteArrayOutputStream is really slow at growing large objects in JDK6.
-
2014‑06‑30:
emojli: the emoji-only network.
-
2014‑06‑30:
SPEC2000 performance comparisons between gcc and llvm.
-
2014‑06‑30:
The dark side of .io: ethnic cleansing by the UK to please the USA.
-
2014‑06‑30:
Life of Pixel: a tribute to 8 bit gaming.
-
2014‑06‑30:
Glitch: Programming with managed time.
-
2014‑06‑30:
Half of all London car thefts use electronic hacking tools.
-
2014‑06‑30:
The CHERI capability architecture: Revisiting RISC in an age of risk.
-
2014‑06‑30:
Lightning protection and proper earth/grounding.
-
2014‑06‑30:
Qubes for Windows? A failed attempt at strong process isolation.
-
2014‑06‑30:
www.www.extra-www.org
-
2014‑06‑29:
Legal pot in the US is crippling Mexican drug cartels.
-
2014‑06‑29:
Incompatibilities and inconsistencies in the MS Office Open XML document format.
-
2014‑06‑29:
Frax: fractal app for iOS.
-
2014‑06‑29:
Why use www in website domain names?
-
2014‑06‑29:
Ammonia/hydrogen breakthrough could be a game changer for vehicle fuel.
-
2014‑06‑29:
The ghost in the MP3.
-
2014‑06‑29:
Undefined behavior can result in time travel.
-
2014‑06‑28:
POC || GTFO 0x04
-
2014‑06‑28:
The Fermi paradox.
-
2014‑06‑28:
Emoji get lost in translation.
-
2014‑06‑28:
μg: free replacements for proprietary Google apps.
-
2014‑06‑28:
Android without the Google mothership.
-
2014‑06‑28:
Recovering SpaceX's Falcon 9 ocean landing video: how it was done.
-
2014‑06‑28:
Migrating Instagram from AWS to FB: a NAT nightmare.
-
2014‑06‑28:
Theranos: miniaturized fast blood diagnostics.
-
2014‑06‑28:
Farewell to Tinderbox, the world's 1st? 2nd? continuous integration server.
-
2014‑06‑27:
How Tory immigration rules discriminate against British children.
-
2014‑06‑27:
Even sweatshops are getting automated.
-
2014‑06‑27:
A less angry rainbow.
-
2014‑06‑27:
How the rainbow color map misleads.
-
2014‑06‑27:
Visualizing algorithms.
-
2014‑06‑27:
Checkout github pull requests locally.
-
2014‑06‑27:
"Merge pull request" considered harmful.
-
2014‑06‑27:
Block randomized malware queries in your name server.
-
2014‑06‑27:
UK scientific advisory committee on nutrition draft report on carbohydrates and health.
-
2014‑06‑27:
Doctorow on Piketty's Capital in the 21st Century.
-
2014‑06‑26:
Avalanche: a dynamic defect detection tool that generates "inputs of death".
-
2014‑06‑26:
More on over-provisioning bandwidth and QoE problems.
-
2014‑06‑26:
Governance for agile service delivery.
-
2014‑06‑26:
V8 JavaScript optimization killers.
-
2014‑06‑26:
The death of the Urdu script.
-
2014‑06‑25:
Typographers' top typefaces.
-
2014‑06‑25:
Breakthrough in solar panel manufacture promises cheap energy within a decade.
-
2014‑06‑25:
What university libraries pay for academic journals.
-
2014‑06‑25:
The Gunfighter. (Vimeo)
-
2014‑06‑25:
Storing passwords in plaintext is a breach of the Australian Privacy Act.
-
2014‑06‑25:
Rediscovered EDSAC diagrams reveal secrets of one of the earliest computer.
-
2014‑06‑25:
Blinking text support for man pages.
-
2014‑06‑25:
What space debris does to the Kevlar shielding protecting the international space station.
-
2014‑06‑25:
Osama Bin Laden's seven rules for terrorists: ISIS ignore the al-Qaida leader's advice.
-
2014‑06‑25:
The war on drugs is lost: legalise the heroin trade.
-
2014‑06‑25:
The Scottish independence referendum can give hope to the Left across Britain.
-
2014‑06‑25:
Alien vs coffee machine. (YouTube)
-
2014‑06‑25:
Time transfer by observation of lightning strikes?
-
2014‑06‑25:
How to make breaking changes and not break all the things.
-
2014‑06‑25:
Houston, we have a copyright problem.
-
2014‑06‑24:
How to modify ITIL to accommodate DevOps.
-
2014‑06‑24:
Security of symmetric encryption against mass surveillance.
-
2014‑06‑24:
An introduction to the Beaglebone PRU.
-
2014‑06‑24:
All the major preconditions for revolution are present in the US and UK.
-
2014‑06‑24:
Chinese hospitals introduce hands-free automatic sperm extractor.
-
2014‑06‑24:
Over-provisioning bandwidth does not solve quality-of-experience problems.
-
2014‑06‑24:
Queueing in the Linux network stack.
-
2014‑06‑23:
The Implicit Calculus: a new foundation for generic programming.
-
2014‑06‑23:
Map of bankers in Europe earning €1 million or more.
-
2014‑06‑23:
Introducing the vacuum transistor: a curious mash-up of vacuum tube and MOSFET.
-
2014‑06‑23:
The race to the Tour de France start line: free public WiFi in Cambridge.
-
2014‑06‑23:
Free public WiFi in Cambridge provided by the University and councils.
-
2014‑06‑23:
Why the summer solstice isn't the start of summer.
-
2014‑06‑23:
Announcing the FastMail calendar.
-
2014‑06‑23:
On prejudice and cognitive biases.
-
2014‑06‑23:
A Dutch perspective on protected intersections and cycle-friendly junction design.
-
2014‑06‑23:
Secret Trade in Services Agreement (TISA) - Financial Services Annex.
-
2014‑06‑22:
Ape molecules with a barrel of monkeys.
-
2014‑06‑22:
Eigenmorality.
-
2014‑06‑22:
College teaching in the US is no longer a middle-class job.
-
2014‑06‑21:
C++ design goals related to Rust.
-
2014‑06‑21:
The Egison programming language.
-
2014‑06‑21:
I am sexist. Let's talk about how, why and what I'm doing about it.
-
2014‑06‑21:
Union, intersection, refinement types, and type disjointness for secure protocol implementations.
-
2014‑06‑21:
C++ Boost: calculating distances made difficult.
-
2014‑06‑21:
Data sharing safe harbour deal with US referred to EU's top court.
-
2014‑06‑21:
Google forced by Canadian court to e-forget a company worldwide.
-
2014‑06‑21:
The amazing micro-engineered water-repelling surface that lives outside my window.
-
2014‑06‑21:
What happened when we tried to publish a scientific paper investigating time travel.
-
2014‑06‑21:
8088 Domination post-mortem, Part 1.
-
2014‑06‑21:
Cube Slam: behind the THREE.Scene().
-
2014‑06‑21:
freshmeat.net, 1997-2014.
-
2014‑06‑21:
Hardware and software stats from "The Setup" interviews.
-
2014‑06‑20:
Videogrep: automatic supercuts with Python.
-
2014‑06‑20:
DRM is how Amazon is holding Hachette hostage.
-
2014‑06‑20:
Busted: elegant Lua unit testing.
-
2014‑06‑20:
Janet Moonshot and FreeRADIUS on Microsoft Azure.
-
2014‑06‑20:
Redwood Stone: gothic follies for your garden.
-
2014‑06‑20:
A comparison of Cap'n Proto, FlatBuffers, and SBE.
-
2014‑06‑20:
US Supreme Court unanimously strikes down abstract software patent.
-
2014‑06‑20:
Presentations from the Dublin RINA workshop. (Interesting but very flawed.)
-
2014‑06‑19:
RINA: Surviving networking's dark ages, or, how in hell do you lose a layer!?
-
2014‑06‑19:
The abstinence method: Dutch farmers say no to antibiotics for livestock.
-
2014‑06‑19:
AWS console breach leads to demise of code hosting service, despite their backup plan.
-
2014‑06‑19:
The more CEOs are paid the worse they perform.
-
2014‑06‑18:
UK intelligence forced to reveal secret policy for mass surveillance of residents' Facebook and Google use.
-
2014‑06‑18:
The Princess Bride sword fight: how does Thibault cancel out Capoferro?
-
2014‑06‑18:
Viewstamped replication: a less-famous consensus protocol.
-
2014‑06‑18:
The SSD endurance experiment: casualties on the way to a petabyte.
-
2014‑06‑18:
Following the Linux /usr merge: factory reset and stateless / reproducible / verifiable systems.
-
2014‑06‑18:
Jump consistent hash: a fast minimal-memory sharding algorithm.
-
2014‑06‑18:
JavaScript sequence diagrams.
-
2014‑06‑18:
Optimisation: The act of replacing something that works with something that almost works, but is cheaper. (Roger Needham)
-
2014‑06‑18:
FlatBuffers: an efficient cross platform serialization library for C++ and Java.
-
2014‑06‑18:
Use ImageMagick to clean up photographs of whiteboards.
-
2014‑06‑18:
Web sequence diagrams.
-
2014‑06‑18:
Towards energy proportionality for large-scale latency-critical workloads: how Google shaved 20% off search power consumption.
-
2014‑06‑18:
An empirical study on bribing users to ignore security advice.
-
2014‑06‑18:
Use of formal methods at Amazon Web Services.
-
2014‑06‑17:
Unofficial DynASM documentation.
-
2014‑06‑17:
8088 Domination: video played by an IBM PC 5160. (YouTube)
-
2014‑06‑17:
Fast money: the battle against the high frequency traders.
-
2014‑06‑17:
Building roads makes traffic worse.
-
2014‑06‑17:
The scientific way to cut a cake. (YouTube)
-
2014‑06‑17:
Solar power at scale.
-
2014‑06‑17:
A proposal for reforming private rental housing.
-
2014‑06‑17:
We're losing all our strong female characters to Trinity Syndrome.
-
2014‑06‑17:
How should mathematics be taught to non-mathematicians?
-
2014‑06‑17:
The cosmic distance ladder.
-
2014‑06‑17:
Preprint of paper proposing a global network of entangled atomic clocks.
-
2014‑06‑17:
Theorists propose a global network of entangled atomic clocks.
-
2014‑06‑17:
Plans for a Heath Robinson museum.
-
2014‑06‑17:
A 52 page handbook to help determine if something is public domain.
-
2014‑06‑17:
Numbers and the common-sense bypass.
-
2014‑06‑16:
How to avoid the endless corridors at King's Cross St Pancras.
-
2014‑06‑16:
Coding as the new literacy.
-
2014‑06‑16:
Conan Doyle estate loses its copyright claim on public domain Sherlock Holmes stories.
-
2014‑06‑16:
Inside Swift: differences from the Objective C runtime system.
-
2014‑06‑16:
The largest black hole in the known universe.
-
2014‑06‑16:
The true cost of hidden money / tax evasion.
-
2014‑06‑15:
Green party peer put on database of domestic political extremists.
-
2014‑06‑14:
Epidemic of whooping cough in California has caused two unnecessary deaths.
-
2014‑06‑14:
Split Ticket: save money on train fares.
-
2014‑06‑14:
Flavours of type theory: What we talk about when we talk about types.
-
2014‑06‑14:
Everything you need to know about cryptography in 1 hour.
-
2014‑06‑14:
From parametricity to conservation laws, via Noether's Theorem. Type theory and fundamental physics.
-
2014‑06‑13:
Cambridge May Bumps notes and fines from the Umpires.
-
2014‑06‑13:
uutils: Unix commands / GNU coreutils rewritten in Rust.
-
2014‑06‑12:
US military fail: long Asian land wars have been a route to disaster since 1963.
-
2014‑06‑12:
Chromebooks as rack mounted build servers.
-
2014‑06‑10:
Typed tagless final interpreters.
-
2014‑06‑10:
There is no fork: an abstraction for efficient, concurrent, and concise data access.
-
2014‑06‑10:
NeoLucida. (Vimeo)
-
2014‑06‑10:
Vermeer's paintings might be 350 year-old color photographs.
-
2014‑06‑10:
Welcome to the .uk - unless you're not in the UK.
-
2014‑06‑10:
Watchmaking: The high-tech world of old-world watches.
-
2014‑06‑10:
LGV Est track laying. (YouTube)
-
2014‑06‑10:
Continuous welded rail.
-
2014‑06‑10:
UK leap seconds policy review: findings from the public dialogue.
-
2014‑06‑09:
How mistakes can save lives: an airline pilot's mission to revolutionise the NHS.
-
2014‑06‑09:
Red Button attack allows over-the-air malware installation on smart TVs.
-
2014‑06‑09:
Sumer is icumen in: The translation of "bucke uerteþ" is uncertain, but the current critical consensus is "the stag farts".
-
2014‑06‑09:
Cambridge airport safety concerns.
-
2014‑06‑09:
PyParallel: How we got Python to exploit all cores on Windows.
-
2014‑06‑09:
The illusion of motion: frame rate, refresh rate, persistence, motion blur, etc.
-
2014‑06‑08:
Whose entropy is it anyway? Part 1: Boltzmann, Shannon, and Gibbs.
-
2014‑06‑08:
Murder Machines: how cars took over the streets of America.
-
2014‑06‑08:
Colleges are full of it: Behind the three-decade scheme to raise tuition fees.
-
2014‑06‑08:
Napkin: Painlessly annotate images or create diagrams and share the results quickly.
-
2014‑06‑08:
How to rob a bank (from the inside, that is). (video)
-
2014‑06‑08:
Conditional review acceptance policy: using peer review to promote open access to academic journals.
-
2014‑06‑08:
Rendezvous hashing, an alternative to consistent hashing.
-
2014‑06‑08:
A patent troll is on the verge of winning 1% of iPhone revenue.
-
2014‑06‑08:
How Foyles moved 500,000 books. (video)
-
2014‑06‑08:
Michelangelo's David: a new perspective.
-
2014‑06‑08:
HippyVM: a fast PHP implementation based on PyPy.
-
2014‑06‑08:
The last line effect in copy-paste code.
-
2014‑06‑07:
Tickets for restaurants.
-
2014‑06‑07:
Python to OCaml retrospective.
-
2014‑06‑06:
Speculative lock elision: enabling highly concurrent multithreaded execution.
-
2014‑06‑06:
Better metaphors for cryptography: key, padlock, seal, imprint.
-
2014‑06‑06:
Vannevar Bush: As We May Think. (1945)
-
2014‑06‑06:
Eliminating inefficient cross-layer interactions in wireless networking.
-
2014‑06‑06:
Network Rail confirms plans for restoring the Oxford to Bedford line.
-
2014‑06‑06:
The battle of Midway: cryptanalysis and metadata.
-
2014‑06‑05:
In defence of modern lexicography and dictionaries.
-
2014‑06‑05:
OpenSSL ChangeCipherSpec vulnerability found by considering formal analysis of TLS protocol.
-
2014‑06‑05:
The diggers buried in London's basement conversions.
-
2014‑06‑05:
Cambridge was a probable nuclear target in the 1970s, but Oxford was not.
-
2014‑06‑05:
Economic forecasting has an astonishing record of complete failure.
-
2014‑06‑04:
All the dialogue from Star Wars in alphabetical order. (YouTube)
-
2014‑06‑04:
David Graeber explains why the more your job helps others, the less you get paid.
-
2014‑06‑04:
Akamai implements the DNS client-subnet extension.
-
2014‑06‑04:
Mathematical symbols are not all created equal.
-
2014‑06‑04:
DuckDuckGo will be a supported search provider in Safari.
-
2014‑06‑04:
MicroPython: a lean and efficient implementation of (most of) Python 3.
-
2014‑06‑04:
History and technology of reverse debugging.
-
2014‑06‑04:
A look at Swift from the perspective of Rust.
-
2014‑06‑03:
Abusing the algebra of algebraic data types: why does this work?
-
2014‑06‑03:
The motivation for host name syntax checking in BIND was a workaround for a Sendmail security vulnerability.
-
2014‑06‑02:
PMA: the packed memory array.
-
2014‑06‑01:
An adaptive loosely packed-memory sorted array.
-
2014‑06‑01:
Savage capitalism is back, and it will not tame itself.
-
2014‑06‑01:
Women who were duped by undercover spies are back in court to challenge the police's delaying tactics.
-
2014‑06‑01:
A critique of Debraj Ray's critique of Piketty's Capital in the 21s Century.
-
2014‑06‑01:
Piketty's 'Second Law of Capitalism' vs. standard macro theory.
-
2014‑06‑01:
Getty Images is trying to depict women less as dead-eyed props and more as real people.
-
2014‑06‑01:
Git repository integrity with gpg-signed commits.
-
2014‑06‑01:
Govia's plans for the Cambridge and Thameslink rail franchise.
-
2014‑06‑01:
Pre-selected opt-in tickboxes do not count as consent to receive spam.
-
2014‑06‑01:
What would math class look like if it were a fine art?
-
2014‑05‑31:
A major upgrade to Haskell's attoparsec: more speed, more power.
-
2014‑05‑31:
No more NXDOMAIN redirection to advert portal by OpenDNS.
-
2014‑05‑31:
An-225 Mriya: pictures of the world's largest aircraft.
-
2014‑05‑31:
Breakthrough in UK copyright law reform confirmed.
-
2014‑05‑31:
Cree LED light bulb teardown.
-
2014‑05‑31:
How LEDs are made.
-
2014‑05‑31:
The makings of a great logo.
-
2014‑05‑31:
Pinterest logo design notes.
-
2014‑05‑31:
Taiwanese recycle symbol.
-
2014‑05‑30:
US cybercrime laws being used to target security researchers.
-
2014‑05‑30:
Avoiding a war on unauthorized computation: the danger of exploit regulation.
-
2014‑05‑30:
The dangers of obverse journalism.
-
2014‑05‑30:
Drugs and prostitution add £10bn a year to UK economy.
-
2014‑05‑30:
Britain is still feasting on credit, and the next crunch will hit in 2016.
-
2014‑05‑29:
Newspapers: The most dangerous drug.
-
2014‑05‑29:
Absolute Zero is 0K: a history of low temperature physics.
-
2014‑05‑29:
Machines v. Lawyers.
-
2014‑05‑29:
Be skeptical of both Piketty and his skeptics.
-
2014‑05‑29:
Logo trends of 2014.
-
2014‑05‑29:
Amazon v Hachette: don't believe the spin.
-
2014‑05‑28:
Stop buying load balancers and control your traffic flow with software instead.
-
2014‑05‑28:
Tower Hamlets: London's rotten borough?
-
2014‑05‑28:
Microsoft PowerShell's Monad Manifesto.
-
2014‑05‑28:
You shouldn't use a spreadsheet for important work. For example, Piketty.
-
2014‑05‑27:
Logical fallacies that should exist.
-
2014‑05‑27:
Reconsidering generic composition of crypto primitives: when encrypt-then-MAC fails.
-
2014‑05‑27:
Reasons for not using mmap().
-
2014‑05‑27:
How the patent trolls won in Congress.
-
2014‑05‑27:
End mass incarceration now.
-
2014‑05‑27:
Whitewood under siege: white vs blue pallets.
-
2014‑05‑26:
The best way to win an argument.
-
2014‑05‑26:
Improving the security of your SSH private key files with PKCS#8.
-
2014‑05‑26:
Simple, fast, and practical non-blocking and blocking concurrent queue algorithms.
-
2014‑05‑25:
The science of Bruce Lee's one inch punch.
-
2014‑05‑25:
The insecurity of password expiration: it is easy for attackers to guess the user's next password.
-
2014‑05‑25:
Supreme Court of the US quietly edits decisions after publication, sometimes substantively.
-
2014‑05‑25:
Kill the hamburger three-line menu button.
-
2014‑05‑25:
Why online communities decay over time.
-
2014‑05‑24:
The diamond market is no longer controlled by De Beers.
-
2014‑05‑24:
Tsunami or sea change? Responding to the explosion of student interest in computer science.
-
2014‑05‑24:
Words matter, even in code.
-
2014‑05‑24:
sysdig: Think of it as strace + tcpdump + lsof + awesome sauce.
-
2014‑05‑24:
How SSL 3.1 came to be called TLS 1.0.
-
2014‑05‑24:
When will patent trolls learn not to mess with Newegg?
-
2014‑05‑24:
Tracedump captures all TCP and UDP packets of a single Linux process.
-
2014‑05‑24:
Attacking hardened Linux systems with kernel JIT spraying.
-
2014‑05‑24:
BPF: Linux's universal in-kernel virtual machine.
-
2014‑05‑24:
Dynamic packet filter: fast flexible demultiplexing.
-
2014‑05‑24:
Mach packet filter: efficient demultiplexing for multiple endpoints and large messages.
-
2014‑05‑24:
libpcap: an architecture and optimization methodology for packet capture.
-
2014‑05‑24:
BPF: Berkeley packet filter bytecode in action at Cloudflare.
-
2014‑05‑23:
Write-down of two-thirds of US shale oil explodes fracking hopes.
-
2014‑05‑23:
Teach your children to argue.
-
2014‑05‑23:
A short guide to Capital in the 21st Century.
-
2014‑05‑23:
Facebook's product director is furious at Facebook's effect on news.
-
2014‑05‑23:
miniBAE: software MIDI synth.
-
2014‑05‑23:
Former BP geologist says peak oil is here and it will 'break economies'
-
2014‑05‑22:
Why did GCHQ target such weird laptop components for destruction at the Guardian?
-
2014‑05‑22:
Erlang intentional code style.
-
2014‑05‑22:
Congestion control (lack of) before Van Jacobson.
-
2014‑05‑22:
Interoperability scoring rules for the second TCP bake-off, April 1980.
-
2014‑05‑22:
Interoperability scoring rules for the first TCP bake-off, January 1979.
-
2014‑05‑22:
Twenty questions for Donald Knuth.
-
2014‑05‑22:
JavaScript-injected "async scripts" considered harmful.
-
2014‑05‑21:
On the future of MetaFilter.
-
2014‑05‑21:
Clochure is an educated attempt to solve Clojure's number one problem.
-
2014‑05‑21:
Use inet_pton() when possible to avoid bloat and bugs in getaddrinfo().
-
2014‑05‑21:
UK National Rail Enquiries real-time train location database will provide free access.
-
2014‑05‑21:
Longitude prize 2014: nothing to do with longitude except for a big anniversary.
-
2014‑05‑21:
When AES(☢) = ☠ : encrypting a valid JPG so it yields a valid JPG.
-
2014‑05‑21:
Ladar Levison's story of how he was forced to shut down Lavabit.
-
2014‑05‑21:
You're probably using the wrong dictionary.
-
2014‑05‑20:
Censors killed the weird, experimental, progressive golden age of comics.
-
2014‑05‑20:
What would a UKIP of the left actually look like?
-
2014‑05‑20:
Why do people persist in believing things that just aren't true?
-
2014‑05‑20:
Van Jacobson's pearls of wisdom about TCP. (1987-1993)
-
2014‑05‑20:
Consultation on ac.uk domain name policy.
-
2014‑05‑20:
Ghost signs in London.
-
2014‑05‑19:
Hungary and the end of politics.
-
2014‑05‑19:
Mouthbreathing Machiavellis dream of a silicon Reich: Bay Area fascism.com.
-
2014‑05‑19:
OpenStreetMap now has data for car navigation.
-
2014‑05‑19:
What happens when patients find out how good their doctors really are?
-
2014‑05‑19:
Solar-powered mosquito larvae killer.
-
2014‑05‑19:
The Mezzo programming language.
-
2014‑05‑19:
Type soundness and race freedom for Mezzo.
-
2014‑05‑19:
Did the NSA help kill UWB?
-
2014‑05‑18:
Old computer horror stories, folklore, and anecdotes from Usenet.
-
2014‑05‑18:
Everyone should know just how much the US government lied to defend the NSA.
-
2014‑05‑18:
Led Zeppelin is being sued for copyright infringement in Stairway to Heaven.
-
2014‑05‑18:
Hate mail barrage reveals climate disinformation's true colours.
-
2014‑05‑18:
Researchers who provided key evidence for gluten sensitivity have shown they were wrong.
-
2014‑05‑18:
Practical tmux.
-
2014‑05‑18:
Net neutrality: local governments choke broadband competition.
-
2014‑05‑17:
A DNS router for sharding large zones.
-
2014‑05‑17:
What does 1#J mean? C# tries to round infinity when printing.
-
2014‑05‑17:
The leaked New York Times innovation report is one of the key documents of this media age.
-
2014‑05‑17:
What do animals see in a mirror?
-
2014‑05‑17:
Emory.edu: A Windows 7 deployment image accidently overwrote all Windows machines.
-
2014‑05‑17:
Vernam, Mauborgne, and Friedman: the one-time pad and the index of coincidence.
-
2014‑05‑17:
Crypto won't save you.
-
2014‑05‑16:
The multiple SQLite problem.
-
2014‑05‑16:
Independent report on the insecurity of e-voting in Estonia.
-
2014‑05‑16:
'The Problem With Music' has been solved by the Internet.
-
2014‑05‑16:
More Mac OS command line utils.
-
2014‑05‑16:
Command line utilities that Unix users need to know on Mac OS.
-
2014‑05‑15:
A time-travelling debugger for the Elm programming language.
-
2014‑05‑15:
On following rules.
-
2014‑05‑15:
Octotree: extensions for various browsers to improve file hierarchy views on GitHub.
-
2014‑05‑15:
Falsehoods programmers believe about 8 categories of things.
-
2014‑05‑15:
Ten articles every programmer shoud read.
-
2014‑05‑15:
Compacting garbage collection with ambiguous roots.
-
2014‑05‑15:
Introducing the WebKit FTL LLVM-based JIT.
-
2014‑05‑14:
The decline and fall of BIND 10.
-
2014‑05‑14:
Does the Firefox DRM architecture give non-sandbox code access to the decrypted media?
-
2014‑05‑14:
SIGGRAPH 2014 papers.
-
2014‑05‑14:
SIGGRAPH 2014 technical papers preview. (YouTube)
-
2014‑05‑14:
RIPE68 DNS services update.
-
2014‑05‑14:
ISPs in New Zealand must register their staff and get network changes approved with the GCSB spy agency.
-
2014‑05‑14:
iMessage purgatory.
-
2014‑05‑13:
ANPR and mass surveillance of transport: a British export.
-
2014‑05‑13:
How to use your "no award" vote in the Hugo ballots.
-
2014‑05‑13:
Dutch spend €220m on bike racks and it is still not enough.
-
2014‑05‑13:
DevOps Against Humanity.
-
2014‑05‑13:
What's so scary about smart girls?
-
2014‑05‑13:
Your surname doesn't match your child's? Good luck at border control.
-
2014‑05‑12:
West Antarctic ice sheet has started to collapse.
-
2014‑05‑12:
High Court slams HMRC for unlawfully concealing information about export of spyware FinFisher.
-
2014‑05‑12:
The NSA tampers with US-made internet routers during shipping.
-
2014‑05‑12:
Significant portion of HTTPS web connections made by forged certificates.
-
2014‑05‑12:
DNS flood of 25 million requests per second: when anti-DDoS services attack.
-
2014‑05‑12:
Drawing the Eurotunnel: publication-quality graphics in 1987.
-
2014‑05‑12:
The mystery of Go, the ancient game computers still can't win.
-
2014‑05‑12:
git concepts simplified.
-
2014‑05‑12:
GitHub training resources.
-
2014‑05‑12:
DNSSEC outages.
-
2014‑05‑11:
The Oracle of Bacon.
-
2014‑05‑11:
Early superoptimizer results: Csmith + Souper + LLVM.
-
2014‑05‑11:
DUMB.domains, if you need help thinking of them.
-
2014‑05‑11:
Zonemaster: combined rewrite of DNSCheck and Zonecheck.
-
2014‑05‑11:
cpthook is a git hook manager.
-
2014‑05‑11:
Why Python is slow: looking under the hood.
-
2014‑05‑11:
jsfmt: enforce JavaScript style.
-
2014‑05‑11:
ClangFormat: enforce C/C++/ObjC style.
-
2014‑05‑10:
git man page generator.
-
2014‑05‑10:
British public wrong about nearly everything, survey shows.
-
2014‑05‑10:
The war on some drugs is over. Drugs won.
-
2014‑05‑10:
Hindsight: it's not just for past events. Examine possible failures with a premortem.
-
2014‑05‑10:
Shackleton's ad: really the manliest thing in the history of manly manliness?
-
2014‑05‑10:
HFT: the backlash continues.
-
2014‑05‑10:
The court that created the patent troll mess is screwing up copyright too.
-
2014‑05‑10:
40 maps that explain the Middle East.
-
2014‑05‑10:
How Munich switched 15000 desktops from Windows to Linux.
-
2014‑05‑10:
Searching logs at 20 GB/sec with carefully engineered brute force.
-
2014‑05‑10:
White House supports CC0 for US federal government datasets.
-
2014‑05‑10:
Honeybees abandoning hives and dying due to neonicotinoid insecticide use, research finds.
-
2014‑05‑09:
The operating system: should there be one? The Smalltalk in Unix.
-
2014‑05‑09:
Oracle wins copyright ruling against Google over Android Java APIs.
-
2014‑05‑09:
The logic of Buddhist philosophy.
-
2014‑05‑09:
Software inspection and the Heartbleed bug.
-
2014‑05‑08:
Post-mortem analysis of a Linux honeypot using sysdig.
-
2014‑05‑08:
American executioners: untrained, incompetent, and "complete idiots".
-
2014‑05‑08:
Nanotrusting nanotime: the remarkable pitfalls in measuring time on modern computers.
-
2014‑05‑07:
Golygons and golyhedra.
-
2014‑05‑07:
IBM Java SecureRandom is very weak.
-
2014‑05‑07:
The return of Upcoming.org.
-
2014‑05‑07:
A post-Snowden chilling effect observed in Google search data.
-
2014‑05‑07:
On properly packaging perl.
-
2014‑05‑07:
Viennese mazes: what they are, and how to make one.
-
2014‑05‑07:
Crash optimization for self-driving cars: what do you hit when you can't stop in time?
-
2014‑05‑07:
Same-sex marriages and coats of arms.
-
2014‑05‑06:
PyPy.js now faster than CPython.
-
2014‑05‑06:
Some of the sundials in Cambridgeshire.
-
2014‑05‑06:
New analemmatic sundial on Jesus Green.
-
2014‑05‑06:
Greenwich Meridian markers in the UK: an interactive map.
-
2014‑05‑06:
An Arabic programming language: قلب
-
2014‑05‑05:
CLOStrophobia: its etiology and treatment.
-
2014‑05‑05:
Teaching mathematics at high school: graph theory.
-
2014‑05‑05:
Predator vs Jeeves.
-
2014‑05‑05:
Jeeves and the singularity.
-
2014‑05‑05:
Chinese number websites: the meanings of numeric URLs.
-
2014‑05‑04:
Why the UK has a high child mortality rate.
-
2014‑05‑04:
U2 flies too high and fast for air traffic control computers, shutting down LAX.
-
2014‑05‑04:
Our manifesto for Europe, by Thomas Piketty and others.
-
2014‑05‑04:
An analysis of Facebook photo caching.
-
2014‑05‑03:
Common LibreSSL porting mistakes.
-
2014‑05‑03:
Some famous unit conversion errors.
-
2014‑05‑03:
Systemantics and the fundamental failure mode theorem.
-
2014‑05‑02:
Proposed enhancements to Java for small immutable identityless value types.
-
2014‑05‑02:
Operation Cotton and the 23 pages which skewered the government's legal aid reforms.
-
2014‑05‑02:
Butler Lampson's hints for computer system design.
-
2014‑05‑02:
Coping with the TCP TIME-WAIT state on busy Linux servers.
-
2014‑05‑02:
What have we learnt in 20 years of L4 microkernels?
-
2014‑05‑01:
An experimental study of TLS forward secrecy deployments: 83% use weak DH params.
-
2014‑05‑01:
Some papers about garbage collection.
-
2014‑05‑01:
Dark Google will earn its money by knowing, manipulating, controlling reality and cutting it into the tiniest pieces.
-
2014‑05‑01:
50th anniversary of BASIC and, more important, computer literacy courses.
-
2014‑05‑01:
Baby we were born to RUN: celebrating 50 years of BASIC.
-
2014‑05‑01:
Leap seconds: the UK public dialogue.
-
2014‑05‑01:
Google is trying out IBM POWER8 CPUs.
-
2014‑05‑01:
Burying the URL: location bar becomes a write-only field in latest Google Chrome.
-
2014‑05‑01:
Celebrating 50 years of BASIC.
-
2014‑05‑01:
What's new in Mercurial 3.0.
-
2014‑04‑30:
List processing in real time on a serial computer.
-
2014‑04‑30:
A few notes on book design.
-
2014‑04‑30:
The people who saw evolution in action.
-
2014‑04‑30:
Behind the scenes of Cards Against Humanity's PWNMEAL prank at PAX East.
-
2014‑04‑30:
What is a photocopier? A reconstruction of a court deposition. (Video)
-
2014‑04‑29:
Fifty years of BASIC, the programming language that made computers personal.
-
2014‑04‑29:
Safe shell-like sub-commands and pipelines in Julia.
-
2014‑04‑29:
The hackers who recovered NASA's lost lunar photos.
-
2014‑04‑29:
Numbers from 1 to 10 in over 5000 languages.
-
2014‑04‑29:
Sweden's great welfare heist.
-
2014‑04‑28:
Not All Men: a brief history of every dude's favorite argument.
-
2014‑04‑28:
BGP stats up to the end of 2013.
-
2014‑04‑28:
Internet passes 500,000 address prefixes.
-
2014‑04‑28:
OpenSSL: The Internet is being protected by two guys named Steve.
-
2014‑04‑28:
Omnibus: a word for all.
-
2014‑04‑28:
NetBSD filesystem drivers compiled to Javascript and run in browser.
-
2014‑04‑28:
Highly available transactions: virtues and limitations.
-
2014‑04‑28:
Spot the question.
-
2014‑04‑27:
Fred Brownell: The man who made South Africa's flag.
-
2014‑04‑27:
Nigel Farage is a phoney. Scrutinise him and he'll crumble. Don't expect the BBC to.
-
2014‑04‑27:
Rollin' Wild: what if animals were round?
-
2014‑04‑27:
The curse of the excluded middle: mostly-functional programming does not work.
-
2014‑04‑27:
Old aerial photos of Britain.
-
2014‑04‑27:
101 illustrated mathematical analysis bedtime stories: epsilon red riding hood.
-
2014‑04‑27:
$10,000 security bug bounty for Mozilla's new certificate verification code.
-
2014‑04‑27:
What's your Honeywell bubble count?
-
2014‑04‑27:
Bras in Space: Playtex and the Apollo spacesuits.
-
2014‑04‑27:
The twelve-factor app.
-
2014‑04‑27:
Golang frequent comments from code reviews.
-
2014‑04‑27:
Golang best practices for production environments.
-
2014‑04‑27:
Stanford allows fewer classes of character in longer passwords.
-
2014‑04‑27:
Syntax extensions and regular expressions for Rust.
-
2014‑04‑27:
Bicycle-friendly cobblestones.
-
2014‑04‑27:
Groningen: cycling city.
-
2014‑04‑26:
The Kindle wink to Neal Stephenson.
-
2014‑04‑25:
It is insanely easy to hack hospital equipment.
-
2014‑04‑25:
Amazon's Glacier secret: BDXL.
-
2014‑04‑25:
F* (a dependently-typed variant of F# for program verification) re-released under Apache 2.0.
-
2014‑04‑25:
11 simple truths from Buddhism.
-
2014‑04‑25:
Google to end forced G+ integration, drastically cut division resources.
-
2014‑04‑25:
Hasklig: Ligatures for Haskell code.
-
2014‑04‑24:
64-bit ARM emulation status in QEMU 2.0.0.
-
2014‑04‑24:
Andreas Gal is the new CTO of Mozilla.
-
2014‑04‑24:
Boycott systemd.
-
2014‑04‑24:
Kea: ISC continuing to develop the DHCP server part of the BIND 10 project.
-
2014‑04‑24:
Microsoft OneDrive for Business quietly modifies the files it syncs.
-
2014‑04‑24:
Elsevier journals: some facts.
-
2014‑04‑24:
Deadlines and the IT industry: Y2K, XP, IPv4, ...
-
2014‑04‑24:
Projecting images onto scent-filled bubbles.
-
2014‑04‑24:
Factcheck: Are we really getting less violent?
-
2014‑04‑24:
Using automatic language analysis to apply the Bechdel test to movie scripts and conversations on Twitter.
-
2014‑04‑24:
A reappraisal of validation in the RPKI.
-
2014‑04‑23:
How strtod() works (and sometimes doesn't).
-
2014‑04‑23:
Humans replacing robots at Toyota, to learn how to improve their manufacturing processes.
-
2014‑04‑23:
"Sell me this pen:" The real answer to The Wolf of Wall Street's challenge.
-
2014‑04‑23:
Link-time optimization in gcc: compiling Firefox.
-
2014‑04‑23:
Link-time optimization in gcc: a brief history.
-
2014‑04‑23:
ISC stops work on BIND-10, and renames the orphaned code to Bundy.
-
2014‑04‑23:
AOL follows Yahoo! in setting DMARC p=reject. Death of mailing lists to follow.
-
2014‑04‑23:
Causal consistency: don't settle for eventual consistency.
-
2014‑04‑23:
Gogs: git repository hosting implemented in Golang.
-
2014‑04‑23:
Gitblit: git repository hosting implemented in Java.
-
2014‑04‑22:
NIST belatedly removes Dual_EC_DRBG from its recommendations.
-
2014‑04‑22:
Copyright is out of control
-
2014‑04‑22:
First completed trial ends with total loss for patent troll Intellectual Ventures.
-
2014‑04‑22:
Economic policy in a post-Piketty world.
-
2014‑04‑22:
Macmillan's Trident sell-out is a vital lesson for Scotland.
-
2014‑04‑22:
Leap seconds: a public dialogue in the UK.
-
2014‑04‑22:
After every crash in the Netherlands, intense scrutiny.
-
2014‑04‑22:
The case for formal verification.
-
2014‑04‑22:
Tiny Docker images with musl libc and no package manager.
-
2014‑04‑22:
Lead poisoning and Rome.
-
2014‑04‑21:
This guy's revolutionary idea for a sign for gender neutral toilets.
-
2014‑04‑21:
High frequency rentseeking: when 3ms is worth $300 million.
-
2014‑04‑21:
Fighting McDonald's to end gendered Happy Meal toys.
-
2014‑04‑21:
Did removing lead from petrol spark a decline in crime?
-
2014‑04‑21:
How to do UPSERT in Postgres.
-
2014‑04‑21:
Home entertainment implementations are pretty appaling: region-free DVD by hacking embedded Linux.
-
2014‑04‑20:
TrueType Instruction Compiler: compile a C-like language into a font file.
-
2014‑04‑20:
Java: real class names or Markov chain fakes?
-
2014‑04‑20:
Easter Hack: RSA padding bugs in Java's SSL/TLS implementation.
-
2014‑04‑20:
More on Apple and OpenSSL.
-
2014‑04‑20:
How to exploit home routers for anonymity.
-
2014‑04‑20:
Patents, greed, and the Wright Brothers.
-
2014‑04‑20:
Fairy tales in password hashing with scrypt.
-
2014‑04‑19:
The problems of high frequency trading.
-
2014‑04‑19:
How Apple dodged the Heartbleed bullet.
-
2014‑04‑19:
Filesystem namespaces in Plan 9 and Inferno.
-
2014‑04‑19:
Where to find stock photos that don't suck.
-
2014‑04‑19:
You don't read code, you explore it.
-
2014‑04‑19:
Linux /dev/urandom and (lack of) concurrency.
-
2014‑04‑19:
Hi-LAB: A powerful, precise language aptitude test is entering civilian life.
-
2014‑04‑19:
A bit of XENIX history.
-
2014‑04‑19:
America is an oligarchy not a democracy.
-
2014‑04‑17:
Why are diamonds clear, but coal black?
-
2014‑04‑17:
OpenSSL Valhalla rampage.
-
2014‑04‑17:
Proving and quantifying institutional sexism.
-
2014‑04‑17:
The arrow of time is caused by quantum entanglement.
-
2014‑04‑16:
Performance effects of architectural complexity in the i432.
-
2014‑04‑16:
Barrelfish research OS architecture overview.
-
2014‑04‑16:
Das Kapital for the Twenty-First Century? A review of Thomas Piketty's new book by James K. Galbraith.
-
2014‑04‑16:
Powers of ten for clocks.
-
2014‑04‑16:
The graffiti drone: an interview with KATSU.
-
2014‑04‑16:
Confessions of a full-stack DevOps coder.
-
2014‑04‑16:
Diffie-Hellman and TLS with nonsense parameters: 15 is a prime number?
-
2014‑04‑16:
A summary of Golang's flaws.
-
2014‑04‑16:
Quantiles on streams.
-
2014‑04‑16:
How it took 10 years to publish the Boyer-Moore MJRTY algorithm.
-
2014‑04‑16:
Valve publishes detailed Steam game usage data on its community profile pages.
-
2014‑04‑16:
Data skeletons: simultaneous estimation of multiple quantiles for massive streaming datasets with applications to density estimation.
-
2014‑04‑16:
The P^2 algorithm for dynamic calculation of quantiles and histograms without storing observations.
-
2014‑04‑16:
Shuffle Sharding: massive and magical fault isolation.
-
2014‑04‑16:
A new metric for Internet performance.
-
2014‑04‑15:
Raising a moral child.
-
2014‑04‑15:
Occupy was right: capitalism has failed the world. (Thomas Piketty)
-
2014‑04‑15:
Shared Space and other bad junction designs lead to crashes and injuries.
-
2014‑04‑15:
Heartbleed disclosure timeline.
-
2014‑04‑15:
Did a date calculation bug cost the Co-op Bank £110m?
-
2014‑04‑15:
A better way to enfoorce anti-harassment policies than zero tolerance.
-
2014‑04‑15:
MEPs approve rules for safer lorry designs in EU.
-
2014‑04‑15:
The lock-picking controversy of 1851.
-
2014‑04‑15:
The MIT lockpicking guide.
-
2014‑04‑15:
GitHub cheat sheet.
-
2014‑04‑15:
The benefits of EU membership have been underestimated.
-
2014‑04‑15:
America, Afghanistan and opium: Ten billion wasted in the war on some drugs.
-
2014‑04‑15:
More on Akamai's flawed secure allocation patch.
-
2014‑04‑14:
Sarah Wollaston asks: Why am I being blamed for the Nigel Evans sex case?
-
2014‑04‑14:
Akamai secure allocation patch failed to protect all private key components from Heartbleed.
-
2014‑04‑14:
UK trying to block US Senate report on torture.
-
2014‑04‑14:
sayI: trusted user authentication at Internet scale; efficient PKI.
-
2014‑04‑14:
Stalled SCP and hanging TCP connections: stupid middlebox breaks SACK.
-
2014‑04‑14:
Why Varnish does not support TLS.
-
2014‑04‑14:
Untie the mavericks: the stifling effect of peer review.
-
2014‑04‑14:
Apple claims Mogenerator's methods / lack of namespacing in Objective C.
-
2014‑04‑14:
Timekeeping in VMWare virtual machines.
-
2014‑04‑13:
The perils of dynamic scope.
-
2014‑04‑13:
The OpenSSL Foundation: of money, responsibility, and pride.
-
2014‑04‑13:
Egg: a culinary exploration of the most versatile ingredient.
-
2014‑04‑13:
Private keys should be isolated from server processes.
-
2014‑04‑13:
How does Akamai's "secure heap" patch to OpenSSL work?
-
2014‑04‑13:
Rise of the right: eurosceptics and teapartiers, cross-Atlantic extremism.
-
2014‑04‑13:
Interrogate: a proof-of-concept tool for identification of cryptographic keys in binary data.
-
2014‑04‑13:
Transcribing piano rolls with Python.
-
2014‑04‑13:
Project Pluto: nuclear-powered ramjet.
-
2014‑04‑13:
Seven cylinders that each touch all the others.
-
2014‑04‑12:
Recreating the THX deep note.
-
2014‑04‑12:
What if the moon were a disco ball? (YouTube)
-
2014‑04‑12:
Why you hate Comic Sans.
-
2014‑04‑12:
Visual explanations of mathematical concepts.
-
2014‑04‑12:
The username is a relic. Here's how to fix it.
-
2014‑04‑12:
Menstruation: What is the evolutionary or biological purpose of having periods?
-
2014‑04‑12:
Google finds centralized control, distributed data architectures work better than fully decentralized systems.
-
2014‑04‑12:
How Walter Bright came to write D.
-
2014‑04‑12:
Ants build complex structures with a few simple rules.
-
2014‑04‑12:
Comic Neue: polishing a turd.
-
2014‑04‑12:
When two-factor authentication is not enough.
-
2014‑04‑12:
Is the Oculus Rift sexist?
-
2014‑04‑11:
Looking for Tom Lehrer, comedy's mysterious genius.
-
2014‑04‑11:
What the Tamiflu saga tells us about drug trials and big pharma.
-
2014‑04‑05:
The Study of Anglophysics. (A short story.)
-
2014‑04‑05:
Google lifts the veil on its "Andromeda" virtual networking.
-
2014‑04‑04:
FAQ: The "snake fight" portion of your thesis defense.
-
2014‑04‑04:
Hacked Prius runs on SF Muni trolleybus power lines.
-
2014‑04‑04:
Blizzard: fast, cloud-scale block storage for cloud-oblivious applications.
-
2014‑04‑04:
Hackers are using ssh tunnels to send spam.
-
2014‑04‑04:
NIST launches new time standard: NIST-F2 caesium fountain atomic clock.
-
2014‑04‑03:
Better database index performance with Roaring Bitmaps.
-
2014‑04‑03:
11 hour GLONASS outage due to bad ephemerides upload.
-
2014‑04‑03:
Cloud computing companies ranked by their use of renewable energy.
-
2014‑04‑03:
The Supercombiner, a peculiar Unicode smoke-test.
-
2014‑04‑03:
Using routers to build logic circuits: BGP is Turing complete.
-
2014‑04‑03:
The dollar-and-cents case against Hollywood's exclusion of women.
-
2014‑04‑03:
Writing code that runs on Python 2 and 3.
-
2014‑04‑02:
Bad governance in the civil service: short-term jobs and no operational expertise.
-
2014‑04‑02:
The inexplicable rise of open floor plans in tech companies.
-
2014‑04‑02:
Redis new data structure: the HyperLogLog.
-
2014‑04‑02:
Stand-up comics who steal jokes can face escalating repercussions.
-
2014‑04‑01:
Generational GC has landed in Mozilla.
-
2014‑04‑01:
US stock markets are rigged to the advantage of HFT.
-
2014‑03‑31:
Treat benchmarks like you're a scientist.
-
2014‑03‑31:
Microsoft's C compiler sometimes embeds IE.
-
2014‑03‑31:
Apple's A7 Cyclone 64 bit ARM microarchitecture.
-
2014‑03‑31:
On the practical exploitability of Dual EC DRBG in TLS implementations.
-
2014‑03‑31:
NSA revelations 'changing how businesses store sensitive data'.
-
2014‑03‑31:
Refactoring with LZ77: compression is compilation?
-
2014‑03‑31:
HEFCE-funded research to be open access from 2016.
-
2014‑03‑31:
Oxford flood network. "The Internet of Things sometimes involves laying in duck shit."
-
2014‑03‑31:
Flat white vs latte.
-
2014‑03‑31:
Class hierarchies? Don't do that!
-
2014‑03‑31:
Labour party proposes to start charging separately for healthcare.
-
2014‑03‑31:
Abstract ideas don't deserve patents.
-
2014‑03‑31:
Coffee and its effects on feature creep: a Starbucks shopping list chat bot that turned into a banking system.
-
2014‑03‑30:
UK copyright reforms will allow content-mining, parody and much more.
-
2014‑03‑30:
UK will finally allow people to legally rip CDs.
-
2014‑03‑30:
25 microchips that shook the world.
-
2014‑03‑30:
Under the Hood: warp, a fast C and C++ preprocessor.
-
2014‑03‑29:
Password hashing security in 1Password.
-
2014‑03‑29:
The true costs of automobility: external costs of cars.
-
2014‑03‑29:
Cambridge cycle route plans on Hills Road and Huntingdon Road.
-
2014‑03‑29:
Six ways the UK still doesn't have full marriage equality.
-
2014‑03‑29:
How to remove gender bias from the hiring process.
-
2014‑03‑29:
Where everyone in the world is migrating, in one gorgeous chart.
-
2014‑03‑29:
Revamped parallel web page layout in Mozilla Servo.
-
2014‑03‑28:
The Mill: a new VLIW CPU. It might just work!
-
2014‑03‑28:
We may have witnessed an NSA "Shotgiant" TAO-like action.
-
2014‑03‑28:
Forces of divergence: Is surging inequality endemic to capitalism?
-
2014‑03‑27:
Introducing rr, Mozilla's record/replay debugger.
-
2014‑03‑27:
ASCII history and control codes.
-
2014‑03‑27:
The evolution of character codes, 1874-1968.
-
2014‑03‑27:
Prototype BeagleBone Black cape with Adafruit Ultimate GPS board and device tree overlay file.
-
2014‑03‑27:
NSRC DNS+DNSSEC workshop.
-
2014‑03‑26:
Butter is back.
-
2014‑03‑26:
What is the first story featuring time travel to the past.
-
2014‑03‑26:
Fourier transforms for dummies.
-
2014‑03‑26:
ANTLR4 ALL(*) parsing: the power of dynamic analysis.
-
2014‑03‑25:
What it's like to use Haskell instead of PHP.
-
2014‑03‑25:
How to mass-produce pasta spirals.
-
2014‑03‑25:
A history and evaluation of System R, an experimental relational database.
-
2014‑03‑25:
Brogrammers might not be macho, but that's not all there is to it.
-
2014‑03‑25:
The misguided freakout over the US DoC relinquishing its oversight of ICANN.
-
2014‑03‑25:
You might be prosecuted for reading Islamist websites in the UK.
-
2014‑03‑25:
Germans try to get their tongues around gender-neutral language.
-
2014‑03‑25:
The making of neon signs in Hong Kong. (YouTube)
-
2014‑03‑24:
When did finger-tenting, or steepling, become a symbol of evil?
-
2014‑03‑24:
Zero-day vulnerability in Microsoft Word under active attack.
-
2014‑03‑24:
Diagram showing relationships between probability distributions.
-
2014‑03‑24:
WTF, HTML and CSS? A list of commonly frustrating HTML and CSS quandaries, miscues, and dilemmas.
-
2014‑03‑24:
Two places with similar urban/college populations: the one with more immigrants produces more notable people.
-
2014‑03‑24:
California police use of body cameras cuts violence and complaints.
-
2014‑03‑23:
DNA double take: bodies often contain multiple distinct genomes.
-
2014‑03‑23:
Almost everything you've been told about unhealthy foods is wrong.
-
2014‑03‑23:
How to design an elliptic-curve signature system.
-
2014‑03‑23:
This 8-year-old girl's shredding will melt your face.
-
2014‑03‑23:
Internet censorship is 21st century book burning.
-
2014‑03‑23:
Sinkhole of bureaucracy: the unautomated process behind US federal employee retirement.
-
2014‑03‑23:
Carbon fibre 3D printer.
-
2014‑03‑23:
The Europe Tories hate no longer exists.
-
2014‑03‑23:
ATM operators eye Linux as replacement for Windows XP.
-
2014‑03‑23:
Another stolen generation: Australia is breaking up Aboriginal families faster than ever.
-
2014‑03‑23:
deFUDing "DNSSEC has failed".
-
2014‑03‑22:
C++11 FQA anyone? With observations of C++ culture.
-
2014‑03‑22:
Berkeley researchers recover typed text using audio recording of keystrokes.
-
2014‑03‑22:
The world's most valuable cannabis business is growing in a sleepy corner of England.
-
2014‑03‑22:
A new kind of playground offers freedom to overprotected kids.
-
2014‑03‑22:
DNS requests from port 0 lead to weird errors.
-
2014‑03‑22:
The only 8 software innovations we actually use.
-
2014‑03‑22:
BLAKE2: "harder, better, faster, stronger" than MD5.
-
2014‑03‑22:
Why writing firmware is kinda like software exploitation.
-
2014‑03‑22:
Oops. The fly in the IANA internationalization ointment.
-
2014‑03‑22:
Scribe, the Guardian's in-browser extensible rich text editor.
-
2014‑03‑21:
The road to IPv6 at Facebook.
-
2014‑03‑21:
Serious vulnerabilities in ASUS routers, requiring manual firmware update to fix.
-
2014‑03‑21:
About that time Google spied on Michael Arrington's Gmail.
-
2014‑03‑21:
Brian Krebs the Movie?!
-
2014‑03‑21:
Inside the NSA's secret efforts to hunt and hack system administrators.
-
2014‑03‑21:
GCHQ via Theresa May warns Yahoo that its move to Dublin is a security worry.
-
2014‑03‑21:
Recommendations for DNSSEC deployment.
-
2014‑03‑21:
8- to 10-year-old kids do science and write a paper about the vision of bees.
-
2014‑03‑21:
Many homophobes do not believe in the existence of straight people.
-
2014‑03‑21:
US tech giants knew of NSA data collection, agency's top lawyer insists.
-
2014‑03‑21:
Youth subcultures: what are they now?
-
2014‑03‑20:
The story behind the Rob Ford story: defamation law and the press in Canada.
-
2014‑03‑20:
UCL open letter complains about racist sexist Daily Mail.
-
2014‑03‑20:
Timezone fun at Troll, a Norwegian Antarctic station.
-
2014‑03‑20:
DNS for massive-scale botnet command and control.
-
2014‑03‑20:
Backblaze Storage Pod 4.0.
-
2014‑03‑19:
How do you know if a random number generator is working?
-
2014‑03‑19:
Git is now using sane three-component semantic version numbers.
-
2014‑03‑19:
NIST is planning to privatise its NTP service.
-
2014‑03‑18:
The #node.js IRC channel policy on trolling.
-
2014‑03‑18:
Reproducibility in computer systems research.
-
2014‑03‑18:
On your permanent record: Anonymity, pseudonymity, and ephemerality.
-
2014‑03‑17:
The BBC's rightwing bias.
-
2014‑03‑17:
Trying out TLS for http:// URLs.
-
2014‑03‑17:
Art of the luggage label.
-
2014‑03‑17:
Physicists, Generals and CEOs agree: ditch the PowerPoint.
-
2014‑03‑17:
Popcorn Time is back, because it is open source.
-
2014‑03‑17:
Target ignored intrusion detection alerts that could have prevented their massive credit card breach.
-
2014‑03‑17:
Why does modern Perl avoid UTF-8 by default?
-
2014‑03‑17:
Half of UK government now outsourced under hopelessly bad secret contracts.
-
2014‑03‑17:
Record accessors and mutators in the Frege programming language.
-
2014‑03‑16:
Intro to type programming in Scala.
-
2014‑03‑16:
London firm at centre of hack redirecting DNS of 300,000 home gateways.
-
2014‑03‑16:
Drones will cause an upheaval of society like we haven't seen in 700 years.
-
2014‑03‑16:
In the US, where income is lower, life spans are reducing.
-
2014‑03‑16:
Follow-up on 4K TVs for programmers.
-
2014‑03‑16:
The slow death of Silicon Roundabout.
-
2014‑03‑15:
How corporations are crippling U.S. prosperity.
-
2014‑03‑15:
Why Atom can't replace Vim. 1976 was a good year for text editors.
-
2014‑03‑15:
The infinite lives of BitTorrent.
-
2014‑03‑15:
FastMail's Cyrus server architecture, and a failure recovery report.
-
2014‑03‑14:
A 100-year-old emergency water supply put out a fire in San Francisco this week.
-
2014‑03‑14:
Partial/incomplete git import of X consortium historical RCS up to X11R6.0
-
2014‑03‑14:
Some dumb DNS forwarders are vulnerable to trivial unspoofed cache poisoning attacks.
-
2014‑03‑14:
The parable of Google Flu: traps in big data analysis.
-
2014‑03‑14:
Post-publication peer review works better.
-
2014‑03‑14:
Cefaly: TENS migrane preventing space tiara.
-
2014‑03‑14:
162,000+ WordPress sites used for pingback DDoS attack.
-
2014‑03‑13:
Samsung Galaxy devices have a backdoor allowing filesystem access from the baseband processor.
-
2014‑03‑13:
Attacking the iOS 7 early_random() kernel PRNG.
-
2014‑03‑13:
Nine amazing facts about English social history that will blow your mind!
-
2014‑03‑13:
Free and common socage, as of the manor of East Greenwich in Kent.
-
2014‑03‑12:
Is Popcorn Time really immune from copyright liability?
-
2014‑03‑11:
How to eat your entropy and have it too: optimal recovery strategies for compromised random number generators.
-
2014‑03‑11:
Agile is dead. Long live agility.
-
2014‑03‑11:
Linux's disk write bufferbloat fsync() woes are getting some attention.
-
2014‑03‑10:
No, Americans are not all to blame for the financial crisis: exposing the big lie of the post-crash economy.
-
2014‑03‑10:
An overview of projects working on next-generation secure email.
-
2014‑03‑10:
LINQ for C++
-
2014‑03‑10:
A visit to the US Office of the Director of National Intelligence.
-
2014‑03‑10:
Startup myths and obsessions.
-
2014‑03‑10:
George Osborne wants a smaller state; economist Mariana Mazzucato argues instead that forward-thinking public spending is crucial for a creative, prosperous society.
-
2014‑03‑10:
America's university system is getting destroyed: faculty are increasingly hired on the Wal-Mart model as temps.
-
2014‑03‑10:
We are all intelligence officers now.
-
2014‑03‑10:
The forty-year slump: the declining value of work since 1974.
-
2014‑03‑10:
The Hitchhiker's Guide to the Galaxy game: 30th anniversary edition.
-
2014‑03‑10:
Stealing Bitcoins from wallets with weak addresses.
-
2014‑03‑09:
Determinism is not enough: making parallel programs reliable with stable multithreading.
-
2014‑03‑09:
Alan Adler, the inventor of the Aerobie and AeroPress.
-
2014‑03‑09:
Myths about /dev/urandom
-
2014‑03‑08:
The Temple Operating System: a simple single-user unprotected x86-64 OS.
-
2014‑03‑07:
Propositions as types: the Curry/Howard isomorphism.
-
2014‑03‑07:
What every C programmer should know about undefined behaviour.
-
2014‑03‑07:
Treating inequality with redistribution: is the cure worse than the disease?
-
2014‑03‑06:
Creating software for sysops: make sure you do not suck.
-
2014‑03‑05:
In Mario Kart you don't get blue shells or lightning bolts when you're already in first place.
-
2014‑03‑05:
Using OpenSSH certificate authentication.
-
2014‑03‑05:
The story of the GnuTLS bug.
-
2014‑03‑05:
European ccTLD news, with a piece on DNSSEC.
-
2014‑03‑05:
Readable code and named values.
-
2014‑03‑04:
fuzzdb: the most comprehensive Open Source database of malicious and malformed input test cases.
-
2014‑03‑04:
Thoughts on style, TLS, and errors.
-
2014‑03‑04:
A roadmap for globalizing IANA.
-
2014‑03‑04:
The Indian sanitary pad revolutionary.
-
2014‑03‑04:
TLS triple handshake vulnerability.
-
2014‑03‑03:
Downloading PuTTY safely is nearly impossible.
-
2014‑03‑03:
What most likely happened to MtGox.
-
2014‑03‑03:
What did not happen at Mt. Gox.
-
2014‑03‑02:
Star in a bottle: a profile of ITER.
-
2014‑03‑02:
The perovskite lightbulb moment for solar power.
-
2014‑03‑02:
Root DNSSEC witnesses plus quorate secure time.
-
2014‑03‑02:
How academia and publishing are destroying scientific innovation: a conversation with Sydney Brenner.
-
2014‑03‑02:
The sound of drawing swords.
-
2014‑03‑01:
A brief history of one line security fixes.
-
2014‑03‑01:
Delve deep into DNSSEC with BIND 9.10.
-
2014‑03‑01:
Why Sweden has so few road deaths.
-
2014‑03‑01:
What is a root DNSSEC key ceremony like?
-
2014‑03‑01:
A birthday present from Broadcom: open source VideoCore IV drivers.
-
2014‑03‑01:
"DNS Experiment Concludes", a classic from the 1st April 2001.
-
2014‑03‑01:
An open letter to Erik Voorhees: when markets fail to punish bad actors effectively.
-
2014‑03‑01:
British public is far to the left of the Labour Party.
-
2014‑03‑01:
How Steve Perlman's "revolutionary" wireless technology works - and why it I s a bigger deal than anyone realizes.
-
2014‑02‑28:
Linux IPv6 route cache is too small by default.
-
2014‑02‑28:
DNSSEC in Windows Server 2012.
-
2014‑02‑28:
To close or not to close: void elements in HTML.
-
2014‑02‑27:
Error handling in ICU: avoiding goto fail.
-
2014‑02‑27:
Row polymorphism is not subtyping.
-
2014‑02‑26:
Servo: Mozilla's effort to reinvent the web browser for the multi-core age.
-
2014‑02‑25:
How to safely generate a random number.
-
2014‑02‑25:
Paramount does a DMCA takedown on @555uHz two-frames-per-hour Top Gun Twitter account.
-
2014‑02‑25:
Stunning brilliant demo of the Wolfram Language.
-
2014‑02‑25:
An ssh server written in PHP for MtGox.
-
2014‑02‑25:
The unlikely tale of how ARM came to rule the world.
-
2014‑02‑25:
Springer and IEEE withdraw more than 120 computer-generated papers.
-
2014‑02‑24:
How to get a busy person to respond to your email.
-
2014‑02‑24:
Apple's TLS backdoor is so lame that the Internet has an opinion about it.
-
2014‑02‑24:
Most winning A/B test results are illusory.
-
2014‑02‑24:
Inside the Netflix/Comcast deal and what the media is getting very wrong.
-
2014‑02‑24:
Secure salted password hashing: how to do it properly.
-
2014‑02‑23:
John Yudkin: sugar's spurned prophet.
-
2014‑02‑23:
Netflix will pay Comcast for direct peering.
-
2014‑02‑23:
Why systemd is winning the init wars.
-
2014‑02‑23:
Junction design in the Netherlands.
-
2014‑02‑23:
X can now run without root privilege on OpenBSD.
-
2014‑02‑23:
Running Mac OS X as a QEMU/KVM guest.
-
2014‑02‑23:
Learning from Apple's #gotofail security bug.
-
2014‑02‑23:
Rope clock.
-
2014‑02‑23:
The very hungry rust monster.
-
2014‑02‑23:
Radiation-hardened Ruby quine (with link to a Perl version).
-
2014‑02‑22:
A look back at "security problems in the TCP/IP protocol suite" fifteen years later.
-
2014‑02‑22:
Why you should deploy DNSSEC.
-
2014‑02‑22:
Apple's TLS bug.
-
2014‑02‑21:
Cryptographic obfuscation and "unhackable" software.
-
2014‑02‑21:
The part where I hack my Github graph.
-
2014‑02‑21:
git-fat: a simple way to handle large files with git.
-
2014‑02‑21:
Cannabis tax revenue and spending plans in Colorado.
-
2014‑02‑21:
Emscripten LLVM "fascomp" backend.
-
2014‑02‑21:
Old arctic ice is melting and taking the rest of the ice with it.
-
2014‑02‑20:
Difference between standard time and solar time around the world.
-
2014‑02‑20:
Scaling WhatsApp to millions of simultaneous connections.
-
2014‑02‑20:
Don't let shoulder-surfers video password entry on public transport.
-
2014‑02‑20:
Progress decoding the Voynich manuscript.
-
2014‑02‑19:
Botnet C&C over DNS.
-
2014‑02‑19:
DNS server activity logging on Windows.
-
2014‑02‑19:
London population growth: how quickly will Crossrail's new trains fill up?
-
2014‑02‑18:
How the Guardian successfully moved to a new unified domain name.
-
2014‑02‑18:
5 surprisingly painful things about client-side JavaScript.
-
2014‑02‑18:
A comprehensive study of convergent and commutative replicated data types.
-
2014‑02‑18:
Locating London's past: scrolly zoomy historical maps.
-
2014‑02‑18:
Using Scala will make you less productive.
-
2014‑02‑18:
Cambridge is at the heart of Britain's economic recovery.
-
2014‑02‑18:
Trace-based just-in-time compilation for lazy functional programming languages.
-
2014‑02‑17:
A lot of water coming our way.
-
2014‑02‑17:
Kids, phones and routing around parental restrictions.
-
2014‑02‑16:
Why collisions don't occur between cyclists on Simultaneous Green junctions.
-
2014‑02‑16:
The public voice of women.
-
2014‑02‑15:
Germany's great university tuition fee U-turn.
-
2014‑02‑15:
The museum of copulatory organs.
-
2014‑02‑15:
In Germany, house prices keep falling, because that's what they're supposed to do.
-
2014‑02‑15:
European Court of Justice declares that linking does not infringe copyright.
-
2014‑02‑15:
The French way of cancer treatment.
-
2014‑02‑14:
Python script to play Radio 4 slightly slower in order to skip over the Archers.
-
2014‑02‑14:
Met Office briefing on the recent storms and floods in the UK.
-
2014‑02‑14:
Technical details behind a 400Gbps NTP amplification DDoS attack.
-
2014‑02‑14:
On the origin of fuck. (Featuring a prominent Ely.)
-
2014‑02‑13:
JavaScript/CSS3 rail station departure board split-flap display.
-
2014‑02‑13:
How to manipulate who pays IP-over-X.25 traffic charges.
-
2014‑02‑13:
Random numbers only once.
-
2014‑02‑13:
Linux's leap second deadlocks.
-
2014‑02‑12:
Julia: a fast dynamic language for technical computing.
-
2014‑02‑12:
Why is eBay making life easy for bike thieves?
-
2014‑02‑12:
Klackity klack: a keyboard scoring system.
-
2014‑02‑10:
Evaluating the design of the R language.
-
2014‑02‑10:
Outdated, outmoded and increasingly inaccurate: is it time follow our European neighbours and say goodbye to "Miss"?
-
2014‑02‑10:
French journalist fined €3000 for "hacking" government website using Google and wget.
-
2014‑02‑09:
UDP-based amplification attacks.
-
2014‑02‑09:
Broken by design: systemd.
-
2014‑02‑09:
1000x faster spelling correction algorithm.
-
2014‑02‑08:
High speed trading isn't about efficiency: it's about cheating.
-
2014‑02‑08:
Backdoor found in Energizer Duo USB battery charger.
-
2014‑02‑08:
The Snowden era of journalism.
-
2014‑02‑08:
The terrifying surveillance case of Brandon Mayfield.
-
2014‑02‑08:
The bedroom tax has been significantly restricted by the courts.
-
2014‑02‑08:
json-pull: a streaming JSON pull parser in C.
-
2014‑02‑08:
Cisco wins case against wifi patent troll Innovatio.
-
2014‑02‑08:
Introduction to the Mill CPU programming model.
-
2014‑02‑08:
Flexible array members and struct padding.
-
2014‑02‑08:
The art of software security assessment: C language issues.
-
2014‑02‑08:
How to dump an info document to your pager.
-
2014‑02‑07:
Transport and Health Study Group letter to the Advertising Standards Agency about cycle helmets.
-
2014‑02‑07:
Simple dynamic strings for C. (A part of Redis.)
-
2014‑02‑07:
RoboCop: wanted for serious crimes against cinema.
-
2014‑02‑07:
ICANN registrar agreement is incompatible with EU data protection law.
-
2014‑02‑07:
How to use indistinguishability obfuscation: deniable encryption, and more.
-
2014‑02‑07:
That NBC story about getting hacked in Sochi is bullshit.
-
2014‑02‑06:
Neil Gaiman on the designer's job.
-
2014‑02‑06:
Large scale DNS redirection on home routers for financial theft.
-
2014‑02‑06:
Rate-limiting state: the edge of the Internet is an unruly place. (Vixie on BCP38)
-
2014‑02‑06:
What if Earth were a torus instead of a sphere?
-
2014‑02‑06:
UK charities take second place to domain squatters in Nominet's flattened .uk namespace.
-
2014‑02‑06:
Little's Law, scalability and fault tolerance: The OS is your bottleneck. What can you do?
-
2014‑02‑06:
Assertions are pessimistic; assumptions are optimistic.
-
2014‑02‑05:
The first congressman to battle the NSA is dead. No-one noticed, no-one cares.
-
2014‑02‑05:
Verizon using recent Net Neutrality victory to wage war against Netflix by throttling AWS.
-
2014‑02‑05:
Entropy attacks!
-
2014‑02‑05:
Storing ASCII art in the DNS.
-
2014‑02‑05:
A breakthrough in secure program obfuscation.
-
2014‑02‑04:
UK national grid status dashboard.
-
2014‑02‑04:
Jenga: a build system in OCaml.
-
2014‑02‑04:
Assertions and Frama-C.
-
2014‑02‑04:
Emotionally palatable criticism.
-
2014‑02‑04:
How to accidentally be a jerk on Twitter, and how to resolve it.
-
2014‑02‑04:
NIST continues using SHA-1 algorithm after banning it.
-
2014‑02‑04:
Blackfriars bridge is covered in solar panels.
-
2014‑02‑04:
Thinking in animation frames: tuning Google Chrome for 60 Hz.
-
2014‑02‑04:
Useful discussion of Mozilla Persona.
-
2014‑02‑04:
Why we love Mozilla Persona. And why you should, too.
-
2014‑02‑03:
Optimal system activity logging.
-
2014‑02‑03:
Minimizing unreproducible bugs.
-
2014‑02‑03:
A US court is poised to hand spooks the keys to the Internet.
-
2014‑02‑03:
Data structures are strange things: comparing tree implementations in Erlang.
-
2014‑02‑03:
Streets outside Guardian US office and staff homes suddenly dug up on the night of the first Snowden story.
-
2014‑02‑03:
Meet Julia, the one programming language to rule them all.
-
2014‑02‑03:
Support for secure transfer of DNSSEC signed domains in .nl (Dutch)
-
2014‑02‑03:
Animations of a perfectly centered break of a perfectly aligned pool ball rack.
-
2014‑02‑03:
What is it about the Lib Dems and Sci Fi?
-
2014‑02‑03:
10 things we forgot to monitor.
-
2014‑02‑03:
Fuzzers love assertions.
-
2014‑02‑03:
New books will not be compatible with old Adobe e-reader DRM from July.
-
2014‑02‑03:
LED there be light! Now better than fluorescent tubes.
-
2014‑02‑03:
It wasn't Yahoo that was hacked: consequences of password database leaks.
-
2014‑02‑03:
Regehr on assertions.
-
2014‑02‑01:
The typography of 2001: A Space Odyssey.
-
2014‑02‑01:
Enforcing Murphy's Law for advance identification of run-time failures, using syscall gremlins.
-
2014‑02‑01:
We know little about the effect of diet on health. That's why so much is written about it.
-
2014‑01‑31:
What are you playing at? Lift the flaps to flip the gender stereotypes.
-
2014‑01‑31:
The ObjectStore database system. (1991)
-
2014‑01‑31:
California regulator seeks to shut down "learn to code" bootcamps.
-
2014‑01‑31:
Demographics of housing in Cambridge.
-
2014‑01‑31:
When your account is the target of a cloud service spear phishing attack.
-
2014‑01‑30:
An empirical investication into programming language syntax.
-
2014‑01‑30:
EU has secret plan for police to "remote stop" cars. (Fun for autosec hackers!)
-
2014‑01‑30:
OpenSSH 6.5 release announcement.
-
2014‑01‑30:
Nine things to expect from HTTP/2.
-
2014‑01‑29:
The Labour case for electoral reform in local government.
-
2014‑01‑29:
An open letter to Baroness Howe from Andrews and Arnold, on Internet censorship.
-
2014‑01‑29:
Budget and average annual costs of snow removal operations in Montreal.
-
2014‑01‑29:
Stanford NetDB.
-
2014‑01‑29:
"Quoth" the raven? The heartwarming tale of a defective verb.
-
2014‑01‑29:
Open Dylan calls for help.
-
2014‑01‑28:
What type of machine is the C preprocessor?
-
2014‑01‑28:
Analysis of the OpenSSL random API.
-
2014‑01‑28:
There's only four billion floats, so test them all!
-
2014‑01‑28:
A spam cartoon.
-
2014‑01‑28:
sex.py: safe-extract is a Python script that unpacks compressed archives (tarballs etc.) safely.
-
2014‑01‑28:
Dutch ISPs do not have to implement DNS or IP copyright censorship because it is disproportionate and/or ineffecive.
-
2014‑01‑28:
Some simple unix commands implemented in sed.
-
2014‑01‑27:
The descent to C.
-
2014‑01‑27:
How the UK GDS uses git and github.
-
2014‑01‑27:
Sky UK Internet censorship breaks jquery.
-
2014‑01‑27:
Not with a bang, but with a whimper: trademark dispute over gaijin.com.
-
2014‑01‑27:
In memory of Roger Bucklesby, who hated this park and everyone in it.
-
2014‑01‑27:
Model Boeing 777 paper plane project.
-
2014‑01‑27:
Free software maintenance: adding features (or not).
-
2014‑01‑27:
The Third Way... make the third generation pay. (1999)
-
2014‑01‑27:
Map of vaccine-preventable disease outbreaks.
-
2014‑01‑27:
Why sugar helped remove the Victoria Line cement flood.
-
2014‑01‑26:
Automatically entering the grand C++ error explosion competition.
-
2014‑01‑26:
Results of the grand C++ error explosion competition.
-
2014‑01‑26:
2014: The year of CSV.
-
2014‑01‑26:
Secret papers show extent of senior royals' veto over British legislation.
-
2014‑01‑26:
Randomized practice schedules improve mental engagement and subsequent performance.
-
2014‑01‑26:
Decentralized trustworthiness measures and certificate pinning; hash mining Zooko's triangle.
-
2014‑01‑25:
Making GIFs from video files with Python.
-
2014‑01‑25:
Six misunderstandings about consensus in distributed systems.
-
2014‑01‑25:
Did this Tor developer become a victim of the NSA's laptop interception program?
-
2014‑01‑25:
Why patriarchy fears the scissors: for women, short hair is a political statement.
-
2014‑01‑25:
Google Chrome moving from NSS to OpenSSL.
-
2014‑01‑25:
Level 3 are now hijacking failed DNS requests for ad revenue on 4.2.2.x.
-
2014‑01‑24:
And the Academy Award goes to... a literate program!
-
2014‑01‑24:
The dirty secret behind ball lightning is dirt.
-
2014‑01‑24:
Gay couple threaten to sue UK government over converting civil partnership to marriage.
-
2014‑01‑24:
The monkeys in 2013: Firefox's JavaScript work.
-
2014‑01‑24:
The R inferno: If you are using R and you think you're in hell, this is a map for you.
-
2014‑01‑24:
File IO in Rust.
-
2014‑01‑23:
Notes on the history of graph paper.
-
2014‑01‑23:
Almost everything in "Dr Strangelove" was true.
-
2014‑01‑23:
What is so great about the Julia programming language.
-
2014‑01‑23:
UKIP are true libertarians.
-
2014‑01‑23:
SSL/TLS survey of the Alexa top 1,000,000 web sites.
-
2014‑01‑23:
Block cipher mode failures.
-
2014‑01‑23:
"Spoiled onions" perform MitM attacks against the Tor network.
-
2014‑01‑23:
Microsoft's platform-of-the-week and the loss of developer trust.
-
2014‑01‑23:
Emacs strip tease.
-
2014‑01‑23:
XSugar: dual syntax for XML languages.
-
2014‑01‑23:
XML attack vectors.
-
2014‑01‑23:
Researcher gets $33k bug bounty for snatching the password file from a Facebook server.
-
2014‑01‑23:
Supernova in Messier 82 discovered by UCL students.
-
2014‑01‑23:
Chesterton's fence.
-
2014‑01‑23:
Network Solutions WebLock program will be opt-in not opt-out.
-
2014‑01‑22:
A closer look at the best password managers.
-
2014‑01‑22:
JSCert: a mechanised specification of JavaScript, using the Coq proof assistant.
-
2014‑01‑22:
Division algebras and wireless communication.
-
2014‑01‑22:
8086tiny: a tiny PC emulator/virtual machine.
-
2014‑01‑22:
The biggest land rush in the history of the internet begins on February 4: new gTLDs.
-
2014‑01‑22:
Domain name analysis: lengths, ngrams, etc.
-
2014‑01‑22:
The Tab compares Cambridge college wine bills to outreach spending.
-
2014‑01‑22:
NTP relflections.
-
2014‑01‑22:
Brython: Python 3 running in the browser.
-
2014‑01‑21:
Backblaze on HDD reliability.
-
2014‑01‑21:
Network Solutions tries to increase cost of two domain names by $1,850.
-
2014‑01‑21:
The effect of today's technology on tomorrow's jobs will be immense—and no country is ready for it.
-
2014‑01‑21:
Teensy USB development board.
-
2014‑01‑21:
analemma.c
-
2014‑01‑21:
Tom Van Baak on the equation of time and driving quartz clock stepper motors.
-
2014‑01‑21:
Top-down operator precedence (Pratt) parsing.
-
2014‑01‑21:
An electro-mechanical VLF radio receiver.
-
2014‑01‑21:
Equation clocks, that show apparent solar time.
-
2014‑01‑21:
UCAS and the extent of FOIA: tribunal favours a wide approach.
-
2014‑01‑21:
Financial conflicts of interest and reporting bias regarding the association between sugar-sweetened beverages and weight gain.
-
2014‑01‑20:
Linux 3.13 release highlights.
-
2014‑01‑20:
Google vs Intellectual Ventures in landmark patent troll trial.
-
2014‑01‑20:
Useful perl one-liners.
-
2014‑01‑20:
In search of National Grid reference OV0000.
-
2014‑01‑20:
Magnetic north is on the move again.
-
2014‑01‑20:
A big step towards generational compacting garbage collection in Firefox.
-
2014‑01‑19:
Guile uses ELF for its bytecode file format and DWARF for bytecode debugging info.
-
2014‑01‑19:
What happens when the poor receive a stipend?
-
2014‑01‑19:
Ed25519 key format variants.
-
2014‑01‑19:
Twister: P2P microblogging. (home page)
-
2014‑01‑19:
Twister: a p2p microblogging platform, based on bitcoin, bittorrent, and DHTs.
-
2014‑01‑18:
The 5 best punctuation marks in literature.
-
2014‑01‑18:
Vi Hart on logarithms.
-
2014‑01‑18:
Why programming needs explicit state.
-
2014‑01‑18:
Pachelbel's canon.
-
2014‑01‑18:
Yale students made a better version of their course catalogue. Then Yale shut it down.
-
2014‑01‑17:
Why an intelligent Scot would vote for independence.
-
2014‑01‑17:
Scientific errors in the European tobacco products directive.
-
2014‑01‑17:
Experimenting at scale with Google Chrome's SSL warning to reduce the click-through rate.
-
2014‑01‑17:
Bitrot and atomic COWs: Inside "next-gen" filesystems btrfs and ZFS.
-
2014‑01‑16:
Time Warp prevents Time Machine from deleting important backup snapshots.
-
2014‑01‑16:
Review of Nominet's .uk registration policy. (How could a domain name be a sex crime?!)
-
2014‑01‑16:
Happy 25th birthday to Tcl.
-
2014‑01‑16:
Good fun with bad crypto: Citrix CTX1 password encoding.
-
2014‑01‑15:
The science of Boston's great molasses flood of 1919.
-
2014‑01‑15:
DNS hijacking with just one mail.
-
2014‑01‑15:
OSv: a new operating system designed to execute a single application on top of a hypervisor.
-
2014‑01‑15:
Mathematical purity in distributed systems: CRDTs without fear.
-
2014‑01‑15:
Use the mean absolute deviation instead of the standard deviation.
-
2014‑01‑15:
Intrepid modder builds Hackintosh Mac Pro replica inside a real trashcan.
-
2014‑01‑15:
An experimental study of sorting and branch prediction.
-
2014‑01‑15:
How to complain about mobile internet over-blocking.
-
2014‑01‑15:
40 more maps that explain the world.
-
2014‑01‑14:
How an emulator-fueled robot reprogrammed Super Mario World on the fly.
-
2014‑01‑14:
Transactional mutex locks.
-
2014‑01‑14:
The search for the lost Cray supercomputer OS.
-
2014‑01‑14:
Man poses as woman on online dating site; barely lasts two hours.
-
2014‑01‑14:
Firefox asm.js AOT compilation and startup performance.
-
2014‑01‑14:
A 30 minute introduction to Rust.
-
2014‑01‑13:
The state of Rust 0.9.
-
2014‑01‑13:
Comparing filesystem performance in virtual machines.
-
2014‑01‑13:
A personal history of the Royal Greenwich Observatory at Herstmonceux Castle.
-
2014‑01‑13:
The Sinclair QL is 30 years old.
-
2014‑01‑13:
Elliptic curve cryptography in practice.
-
2014‑01‑12:
The essence of Reynolds.
-
2014‑01‑12:
Brussels contemplates going car-free.
-
2014‑01‑12:
Boys are born to prefer dolls over masculine toys like cars.
-
2014‑01‑12:
GLO: print on to flow-in-the-dark paint with UV LEDs.
-
2014‑01‑11:
1983-1993: the wonder years of sequential Prolog implementation.
-
2014‑01‑11:
A fishy chat with Sainsbury's.
-
2014‑01‑11:
Such DFW. Very Orwell. So Doge. Wow.
-
2014‑01‑11:
Building an open source laptop.
-
2014‑01‑11:
Implementing a JIT compiler with Haskell and LLVM.
-
2014‑01‑11:
HTTP/2 considerations and tradeoffs.
-
2014‑01‑10:
Extracts from the coffee club diary.
-
2014‑01‑10:
Malicious use of the HTML5 vibrate API.
-
2014‑01‑10:
Carte Blanche: a social experiment with cloned blank credit cards.
-
2014‑01‑10:
An appraisal of the utility of a chocolate teapot.
-
2014‑01‑10:
City of London Police cannot seize domains just because Hollywood says the websites are infringing.
-
2014‑01‑10:
How useless is a chocolate teapot?
-
2014‑01‑10:
Understanding and mitigating NTP-based DDoS amplification attacks.
-
2014‑01‑09:
Detailed London Underground track map.
-
2014‑01‑09:
Software in 2014.
-
2014‑01‑08:
Typox: urban typography in and around Oxford.
-
2014‑01‑08:
Chaps is a PKCS #11 implementation that provides TPM-backed cryptographic services for Chrome OS.
-
2014‑01‑08:
UK postcodes geographical data service.
-
2014‑01‑08:
Mapping high-level programming language constructs to LLVM IR.
-
2014‑01‑07:
The icosahedron and the pentagon-hexagon-decagon identity.
-
2014‑01‑07:
Lyra: password key derivation based on the sponge construction.
-
2014‑01‑07:
Knot DNS 1.4.0 released with support for automatic DNSSEC signing.
-
2014‑01‑07:
More about Unicode in Python 2 and 3.
-
2014‑01‑06:
Optimising Haskell for a tight inner loop.
-
2014‑01‑06:
Edelweiss: automatic storage reclamation for distributed programming.
-
2014‑01‑06:
Mythryl: a fork of SML/NJ.
-
2014‑01‑06:
Sightsmap: a map of the most popular locations for photography.
-
2014‑01‑06:
What is new in purely functional data structures since Okasaki?
-
2014‑01‑06:
sedsed: a sed script debugger and prettifier.
-
2014‑01‑06:
Hexaflexagon cushions.
-
2014‑01‑06:
DNSSEC infrastructure audit framework.
-
2014‑01‑06:
Smartphones versus DSLRs versus film: A look at how far we've come.
-
2014‑01‑06:
Windows portability shim for snprintf().
-
2014‑01‑06:
Top Hollywood movies that passed the Bechdel Test earned more in 2013.
-
2014‑01‑06:
Backpack: retrofitting Haskell with interfaces.
-
2014‑01‑06:
Anatomy of a cheap USB to Ethernet adapter.
-
2014‑01‑05:
Paul Dacre of the Daily Mail: The man who hates liberal Britain.
-
2014‑01‑05:
Much more than you wanted to know about marijuana.
-
2014‑01‑05:
Pluralistic ignorance: the self-reinforcing cycle of false belief.
-
2014‑01‑05:
Why we should give free money to everyone.
-
2014‑01‑05:
How misaligning data can increase performance 12x by reducing cache misses.
-
2014‑01‑05:
23% of global electricity generation is supplied by renewable sources.
-
2014‑01‑04:
Inception: memory manipulation and hacking over FireWire.
-
2014‑01‑04:
Reverse engineering a bank's secure authentication app.
-
2014‑01‑04:
Haskell vs. Erlang for bittorent clients.
-
2014‑01‑04:
Ori: a secure distributed file system.
-
2014‑01‑03:
Technology didn't kill middle class jobs, public policy did.
-
2014‑01‑02:
Times, dates, and computers: this way lies madness.
-
2014‑01‑02:
bzr: a retrospective.
-
2014‑01‑02:
Creating a rogue CA certificate. (2008)
-
2014‑01‑01:
DUAL_EC_DRBG backdoor proof-of-concept.
-
2014‑01‑01:
Welcome to the hardware jungle, in the twilight of Moore's law.
-
2014‑01‑01:
The financial crisis: Why have no high-level executives been prosecuted?