Link log versions
• <https://dotat.at/:/>
• landing pages
• Atom feed
• Dreamwidth links
• LiveJournal links
My other activity
• Dreamwidth blog
• work blog
• Twitter
everything
2002
2003
2004
2005
2006
2007
2008
2009
2010
2011
2012
2013
2014
2015
2016
2017
2018
2019
2020
2021
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
Dec
<<
2014-01
>>
- 2014-01-31: What are you playing at? Lift the flaps to flip the gender stereotypes.
- 2014-01-31: The ObjectStore database system. (1991)
- 2014-01-31: California regulator seeks to shut down "learn to code" bootcamps.
- 2014-01-31: Demographics of housing in Cambridge.
- 2014-01-31: When your account is the target of a cloud service spear phishing attack.
- 2014-01-30: An empirical investication into programming language syntax.
- 2014-01-30: EU has secret plan for police to "remote stop" cars. (Fun for autosec hackers!)
- 2014-01-30: OpenSSH 6.5 release announcement.
- 2014-01-30: Nine things to expect from HTTP/2.
- 2014-01-29: The Labour case for electoral reform in local government.
- 2014-01-29: An open letter to Baroness Howe from Andrews and Arnold, on Internet censorship.
- 2014-01-29: Budget and average annual costs of snow removal operations in Montreal.
- 2014-01-29: Stanford NetDB.
- 2014-01-29: "Quoth" the raven? The heartwarming tale of a defective verb.
- 2014-01-29: Open Dylan calls for help.
- 2014-01-28: What type of machine is the C preprocessor?
- 2014-01-28: Analysis of the OpenSSL random API.
- 2014-01-28: There's only four billion floats, so test them all!
- 2014-01-28: A spam cartoon.
- 2014-01-28: sex.py: safe-extract is a Python script that unpacks compressed archives (tarballs etc.) safely.
- 2014-01-28: Dutch ISPs do not have to implement DNS or IP copyright censorship because it is disproportionate and/or ineffecive.
- 2014-01-28: Some simple unix commands implemented in sed.
- 2014-01-27: The descent to C.
- 2014-01-27: How the UK GDS uses git and github.
- 2014-01-27: Sky UK Internet censorship breaks jquery.
- 2014-01-27: Not with a bang, but with a whimper: trademark dispute over gaijin.com.
- 2014-01-27: In memory of Roger Bucklesby, who hated this park and everyone in it.
- 2014-01-27: Model Boeing 777 paper plane project.
- 2014-01-27: Free software maintenance: adding features (or not).
- 2014-01-27: The Third Way... make the third generation pay. (1999)
- 2014-01-27: Map of vaccine-preventable disease outbreaks.
- 2014-01-27: Why sugar helped remove the Victoria Line cement flood.
- 2014-01-26: Automatically entering the grand C++ error explosion competition.
- 2014-01-26: Results of the grand C++ error explosion competition.
- 2014-01-26: 2014: The year of CSV.
- 2014-01-26: Secret papers show extent of senior royals' veto over British legislation.
- 2014-01-26: Randomized practice schedules improve mental engagement and subsequent performance.
- 2014-01-26: Decentralized trustworthiness measures and certificate pinning; hash mining Zooko's triangle.
- 2014-01-25: Making GIFs from video files with Python.
- 2014-01-25: Six misunderstandings about consensus in distributed systems.
- 2014-01-25: Did this Tor developer become a victim of the NSA's laptop interception program?
- 2014-01-25: Why patriarchy fears the scissors: for women, short hair is a political statement.
- 2014-01-25: Google Chrome moving from NSS to OpenSSL.
- 2014-01-25: Level 3 are now hijacking failed DNS requests for ad revenue on 4.2.2.x.
- 2014-01-24: And the Academy Award goes to... a literate program!
- 2014-01-24: The dirty secret behind ball lightning is dirt.
- 2014-01-24: Gay couple threaten to sue UK government over converting civil partnership to marriage.
- 2014-01-24: The monkeys in 2013: Firefox's JavaScript work.
- 2014-01-24: The R inferno: If you are using R and you think you're in hell, this is a map for you.
- 2014-01-24: File IO in Rust.
- 2014-01-23: Notes on the history of graph paper.
- 2014-01-23: Almost everything in "Dr Strangelove" was true.
- 2014-01-23: What is so great about the Julia programming language.
- 2014-01-23: UKIP are true libertarians.
- 2014-01-23: SSL/TLS survey of the Alexa top 1,000,000 web sites.
- 2014-01-23: Block cipher mode failures.
- 2014-01-23: "Spoiled onions" perform MitM attacks against the Tor network.
- 2014-01-23: Microsoft's platform-of-the-week and the loss of developer trust.
- 2014-01-23: Emacs strip tease.
- 2014-01-23: XSugar: dual syntax for XML languages.
- 2014-01-23: XML attack vectors.
- 2014-01-23: Researcher gets $33k bug bounty for snatching the password file from a Facebook server.
- 2014-01-23: Supernova in Messier 82 discovered by UCL students.
- 2014-01-23: Chesterton's fence.
- 2014-01-23: Network Solutions WebLock program will be opt-in not opt-out.
- 2014-01-22: A closer look at the best password managers.
- 2014-01-22: JSCert: a mechanised specification of JavaScript, using the Coq proof assistant.
- 2014-01-22: Division algebras and wireless communication.
- 2014-01-22: 8086tiny: a tiny PC emulator/virtual machine.
- 2014-01-22: The biggest land rush in the history of the internet begins on February 4: new gTLDs.
- 2014-01-22: Domain name analysis: lengths, ngrams, etc.
- 2014-01-22: The Tab compares Cambridge college wine bills to outreach spending.
- 2014-01-22: NTP relflections.
- 2014-01-22: Brython: Python 3 running in the browser.
- 2014-01-21: Backblaze on HDD reliability.
- 2014-01-21: Network Solutions tries to increase cost of two domain names by $1,850.
- 2014-01-21: The effect of today's technology on tomorrow's jobs will be immense—and no country is ready for it.
- 2014-01-21: Teensy USB development board.
- 2014-01-21: analemma.c
- 2014-01-21: Tom Van Baak on the equation of time and driving quartz clock stepper motors.
- 2014-01-21: Top-down operator precedence (Pratt) parsing.
- 2014-01-21: An electro-mechanical VLF radio receiver.
- 2014-01-21: Equation clocks, that show apparent solar time.
- 2014-01-21: UCAS and the extent of FOIA: tribunal favours a wide approach.
- 2014-01-21: Financial conflicts of interest and reporting bias regarding the association between sugar-sweetened beverages and weight gain.
- 2014-01-20: Linux 3.13 release highlights.
- 2014-01-20: Google vs Intellectual Ventures in landmark patent troll trial.
- 2014-01-20: Useful perl one-liners.
- 2014-01-20: In search of National Grid reference OV0000.
- 2014-01-20: Magnetic north is on the move again.
- 2014-01-20: A big step towards generational compacting garbage collection in Firefox.
- 2014-01-19: Guile uses ELF for its bytecode file format and DWARF for bytecode debugging info.
- 2014-01-19: What happens when the poor receive a stipend?
- 2014-01-19: Ed25519 key format variants.
- 2014-01-19: Twister: P2P microblogging. (home page)
- 2014-01-19: Twister: a p2p microblogging platform, based on bitcoin, bittorrent, and DHTs.
- 2014-01-18: The 5 best punctuation marks in literature.
- 2014-01-18: Vi Hart on logarithms.
- 2014-01-18: Why programming needs explicit state.
- 2014-01-18: Pachelbel's canon.
- 2014-01-18: Yale students made a better version of their course catalogue. Then Yale shut it down.
- 2014-01-17: Why an intelligent Scot would vote for independence.
- 2014-01-17: Scientific errors in the European tobacco products directive.
- 2014-01-17: Experimenting at scale with Google Chrome's SSL warning to reduce the click-through rate.
- 2014-01-17: Bitrot and atomic COWs: Inside "next-gen" filesystems btrfs and ZFS.
- 2014-01-16: Time Warp prevents Time Machine from deleting important backup snapshots.
- 2014-01-16: Review of Nominet's .uk registration policy. (How could a domain name be a sex crime?!)
- 2014-01-16: Happy 25th birthday to Tcl.
- 2014-01-16: Good fun with bad crypto: Citrix CTX1 password encoding.
- 2014-01-15: The science of Boston's great molasses flood of 1919.
- 2014-01-15: DNS hijacking with just one mail.
- 2014-01-15: OSv: a new operating system designed to execute a single application on top of a hypervisor.
- 2014-01-15: Mathematical purity in distributed systems: CRDTs without fear.
- 2014-01-15: Use the mean absolute deviation instead of the standard deviation.
- 2014-01-15: Intrepid modder builds Hackintosh Mac Pro replica inside a real trashcan.
- 2014-01-15: An experimental study of sorting and branch prediction.
- 2014-01-15: How to complain about mobile internet over-blocking.
- 2014-01-15: 40 more maps that explain the world.
- 2014-01-14: How an emulator-fueled robot reprogrammed Super Mario World on the fly.
- 2014-01-14: Transactional mutex locks.
- 2014-01-14: The search for the lost Cray supercomputer OS.
- 2014-01-14: Man poses as woman on online dating site; barely lasts two hours.
- 2014-01-14: Firefox asm.js AOT compilation and startup performance.
- 2014-01-14: A 30 minute introduction to Rust.
- 2014-01-13: The state of Rust 0.9.
- 2014-01-13: Comparing filesystem performance in virtual machines.
- 2014-01-13: A personal history of the Royal Greenwich Observatory at Herstmonceux Castle.
- 2014-01-13: The Sinclair QL is 30 years old.
- 2014-01-13: Elliptic curve cryptography in practice.
- 2014-01-12: The essence of Reynolds.
- 2014-01-12: Brussels contemplates going car-free.
- 2014-01-12: Boys are born to prefer dolls over masculine toys like cars.
- 2014-01-12: GLO: print on to flow-in-the-dark paint with UV LEDs.
- 2014-01-11: 1983-1993: the wonder years of sequential Prolog implementation.
- 2014-01-11: A fishy chat with Sainsbury's.
- 2014-01-11: Such DFW. Very Orwell. So Doge. Wow.
- 2014-01-11: Building an open source laptop.
- 2014-01-11: Implementing a JIT compiler with Haskell and LLVM.
- 2014-01-11: HTTP/2 considerations and tradeoffs.
- 2014-01-10: Extracts from the coffee club diary.
- 2014-01-10: Malicious use of the HTML5 vibrate API.
- 2014-01-10: Carte Blanche: a social experiment with cloned blank credit cards.
- 2014-01-10: An appraisal of the utility of a chocolate teapot.
- 2014-01-10: City of London Police cannot seize domains just because Hollywood says the websites are infringing.
- 2014-01-10: How useless is a chocolate teapot?
- 2014-01-10: Understanding and mitigating NTP-based DDoS amplification attacks.
- 2014-01-09: Detailed London Underground track map.
- 2014-01-09: Software in 2014.
- 2014-01-08: Typox: urban typography in and around Oxford.
- 2014-01-08: Chaps is a PKCS #11 implementation that provides TPM-backed cryptographic services for Chrome OS.
- 2014-01-08: UK postcodes geographical data service.
- 2014-01-08: Mapping high-level programming language constructs to LLVM IR.
- 2014-01-07: The icosahedron and the pentagon-hexagon-decagon identity.
- 2014-01-07: Lyra: password key derivation based on the sponge construction.
- 2014-01-07: Knot DNS 1.4.0 released with support for automatic DNSSEC signing.
- 2014-01-07: More about Unicode in Python 2 and 3.
- 2014-01-06: Optimising Haskell for a tight inner loop.
- 2014-01-06: Edelweiss: automatic storage reclamation for distributed programming.
- 2014-01-06: Mythryl: a fork of SML/NJ.
- 2014-01-06: Sightsmap: a map of the most popular locations for photography.
- 2014-01-06: What is new in purely functional data structures since Okasaki?
- 2014-01-06: sedsed: a sed script debugger and prettifier.
- 2014-01-06: Hexaflexagon cushions.
- 2014-01-06: DNSSEC infrastructure audit framework.
- 2014-01-06: Smartphones versus DSLRs versus film: A look at how far we've come.
- 2014-01-06: Windows portability shim for snprintf().
- 2014-01-06: Top Hollywood movies that passed the Bechdel Test earned more in 2013.
- 2014-01-06: Backpack: retrofitting Haskell with interfaces.
- 2014-01-06: Anatomy of a cheap USB to Ethernet adapter.
- 2014-01-05: Paul Dacre of the Daily Mail: The man who hates liberal Britain.
- 2014-01-05: Much more than you wanted to know about marijuana.
- 2014-01-05: Pluralistic ignorance: the self-reinforcing cycle of false belief.
- 2014-01-05: Why we should give free money to everyone.
- 2014-01-05: How misaligning data can increase performance 12x by reducing cache misses.
- 2014-01-05: 23% of global electricity generation is supplied by renewable sources.
- 2014-01-04: Inception: memory manipulation and hacking over FireWire.
- 2014-01-04: Reverse engineering a bank's secure authentication app.
- 2014-01-04: Haskell vs. Erlang for bittorent clients.
- 2014-01-04: Ori: a secure distributed file system.
- 2014-01-03: Technology didn't kill middle class jobs, public policy did.
- 2014-01-02: Times, dates, and computers: this way lies madness.
- 2014-01-02: bzr: a retrospective.
- 2014-01-02: Creating a rogue CA certificate. (2008)
- 2014-01-01: DUAL_EC_DRBG backdoor proof-of-concept.
- 2014-01-01: Welcome to the hardware jungle, in the twilight of Moore's law.
- 2014-01-01: The financial crisis: Why have no high-level executives been prosecuted?
Tony Finch is
<dot@dotat.at>